Search results for: cyber security awareness
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 5330

Search results for: cyber security awareness

2450 The Role of Teaching Assistants for Deaf Pupils in a Mainstream Primary School in England

Authors: Hatice Yildirim

Abstract:

This study was an investigation into the role of teaching assistants (TAs) for deaf pupils in an English primary school. This study aimed to provide knowledge about how TAs support deaf pupils in mainstream schools in England. It is accepted that TAs have an important role in the inclusion of students with disabilities in mainstream schools. However, there has been a lack of attention paid to the role of TAs for deaf pupils in the literature. A qualitative case study approach was used to address the research questions. Twelve semi-structured classroom observations and six semi-structured interviews were carried out with four TAs and two teachers in one English mainstream primary school. The data analysis followed a thematic analysis framework. The results indicated that TAs are utilised based on a one-on-one support model and are deployed under the class teachers in the classroom. The classroom activities are carried out in small groups with the TAs and the class teacher’s agreement, as per the school’s policy. Findings show that TAs carried out seven different roles in the education of deaf pupils in an English mainstream primary school. Supporting the academic and social development of deaf pupils is TA`s main role. Also, they record pupils’ progress, communicate with pupils’ parents, take on a pastoral care role, tutor pupils in additional support lessons and raise awareness of deaf pupils’ issues.

Keywords: deaf, mainstream primary school, teaching assistant, teaching assistant`s roles

Procedia PDF Downloads 187
2449 Personality Traits of NEO Five Factors and Statistics Anxiety among Social Sciences University Students

Authors: Oluyinka Ojedokun, S. E. Idemudia

Abstract:

In Nigeria, statistics is a compulsory course required from all social sciences students as part of their academic training. However, a rising number of social sciences undergraduates usually express statistics anxiety. The prevalence of statistics anxiety among undergraduates in social sciences has created a growing concern for educators and researchers in the higher education institutions, mainly because this statistics anxiety adversely affects their performance in statistics and research methods courses. From a societal perspective it is important to reverse this trend. Although scholars and researchers have highlighted some psychosocial factors that influence statistics anxiety in students but few empirical studies exist on the association between personality traits of NEO five factors and statistics anxiety. It is in the light of this situation that this study was designed to assess the extent to which the personality traits of NEO five factors influence statistics anxiety of students in social sciences courses. The participants were 282 undergraduates in the faculty of social sciences at a state owned public university in Nigeria. The findings demonstrate that the personality traits contributing to statistics anxiety include openness to experience, conscientious, extraversion, and neuroticism. These results imply that statistics anxiety is related to individual differences in personality traits and suggest that certain aspects of statistics anxiety may be relatively stable and resistant to change. An effective and simple method to reduce statistics anxiety among social sciences students is to create awareness of the statistical and methodological requirements of the social sciences courses before commencement of their programmes.

Keywords: personality traits, statistics anxiety, social sciences, students

Procedia PDF Downloads 519
2448 Exploring Eating Disorders in Sport: Coaching Knowledge and the Effects of the Pandemic

Authors: Rebecca Quinlan

Abstract:

Background: The pandemic has caused a surge in eating disorders (ED). The prevalence of ED is higher in athletes than in the general population. It would therefore be expected that there will be a rise in ED among athletic populations. Coaches regularly work with athletes and should be in a position to identify signs of ED in their athletes. However, there is limited awareness of ED among coaches. Given the effects of the pandemic, it is crucial that coaches have the skills and knowledge to identify ED. This research will explore the effects of the pandemic on athletes, current knowledge of ED among coaches, and possible solutions for building back better from the pandemic. Methods: Freedom of Information requests were conducted, and a systematic review of the literature was undertaken regarding ED in sports and following the pandemic. Results: The systematic review of the literature showed that there had been a rise in ED in athletes due to the pandemic. Freedom of Information results revealed that ED is not covered in level 1 coaching courses. This lack of education has resulted in many coaches stating they feel unable to identify ED. Discussion: The increased prevalence of ED in athletes, coupled with the negative effects of the pandemic, highlight the need for action. Recommendations are provided, which include Level 1 coaching courses to include compulsory ED education, including signs and symptoms, what to do if an athlete has an ED, and resources/contacts. It is anticipated that the findings will be used to improve coaching knowledge of ED and support offered to athletes, with the overarching aim of building back better and faster from the pandemic.

Keywords: eating disorders, sport, athletes, pandemic

Procedia PDF Downloads 106
2447 Facial Biometric Privacy Using Visual Cryptography: A Fundamental Approach to Enhance the Security of Facial Biometric Data

Authors: Devika Tanna

Abstract:

'Biometrics' means 'life measurement' but the term is usually associated with the use of unique physiological characteristics to identify an individual. It is important to secure the privacy of digital face image that is stored in central database. To impart privacy to such biometric face images, first, the digital face image is split into two host face images such that, each of it gives no idea of existence of the original face image and, then each cover image is stored in two different databases geographically apart. When both the cover images are simultaneously available then only we can access that original image. This can be achieved by using the XM2VTS and IMM face database, an adaptive algorithm for spatial greyscale. The algorithm helps to select the appropriate host images which are most likely to be compatible with the secret image stored in the central database based on its geometry and appearance. The encryption is done using GEVCS which results in a reconstructed image identical to the original private image.

Keywords: adaptive algorithm, database, host images, privacy, visual cryptography

Procedia PDF Downloads 111
2446 An Empirical Study of Critical Success Factors for the Adoption of M-Government Services in Tanzania

Authors: Fredrick Ishengoma, Leonard Mselle, Hector Mongi

Abstract:

The growing number of mobile phone subscribers in Tanzania offers the government a new channel for the delivery of information and government services to citizens, thus mobile Government (m-Government). In Tanzania, m-Government services usage is in the early stages, and factors that influence its adoption are yet to be known. This study seeks to identify and understand the critical success factors (CSFs) that influence citizens’ behavioural intention (BI) to adopt m-Government services in Tanzania. The study employed the mobile services acceptance model (MSAM) and extends it with external factors relevant in the Tanzanian context. A survey questionnaire was used to collect primary data from users of m-Government services in Dar es salaam and Dodoma cities, and 253 responses were received. Data were analyzed by IBM-SPSS AMOS 23.0 software using structural equation modeling (SEM). The findings of the study indicate that perceived usefulness, trust, perceived mobility, power distance, quality of service, awareness, perceived cost, personal initiatives, and characteristics significantly influence the BI to adopt m-Government services. However, perceived ease of use was found statistically insignificant to predict BI. Furthermore, the interplay between CSFs, discussion on theoretical and practical implications that follow from the results are presented.

Keywords: adoption, critical success factors, structural equation modeling, m-Government, MSAM, Tanzania

Procedia PDF Downloads 131
2445 Enhancing Financial Security: Real-Time Anomaly Detection in Financial Transactions Using Machine Learning

Authors: Ali Kazemi

Abstract:

The digital evolution of financial services, while offering unprecedented convenience and accessibility, has also escalated the vulnerabilities to fraudulent activities. In this study, we introduce a distinct approach to real-time anomaly detection in financial transactions, aiming to fortify the defenses of banking and financial institutions against such threats. Utilizing unsupervised machine learning algorithms, specifically autoencoders and isolation forests, our research focuses on identifying irregular patterns indicative of fraud within transactional data, thus enabling immediate action to prevent financial loss. The data we used in this study included the monetary value of each transaction. This is a crucial feature as fraudulent transactions may have distributions of different amounts than legitimate ones, such as timestamps indicating when transactions occurred. Analyzing transactions' temporal patterns can reveal anomalies (e.g., unusual activity in the middle of the night). Also, the sector or category of the merchant where the transaction occurred, such as retail, groceries, online services, etc. Specific categories may be more prone to fraud. Moreover, the type of payment used (e.g., credit, debit, online payment systems). Different payment methods have varying risk levels associated with fraud. This dataset, anonymized to ensure privacy, reflects a wide array of transactions typical of a global banking institution, ranging from small-scale retail purchases to large wire transfers, embodying the diverse nature of potentially fraudulent activities. By engineering features that capture the essence of transactions, including normalized amounts and encoded categorical variables, we tailor our data to enhance model sensitivity to anomalies. The autoencoder model leverages its reconstruction error mechanism to flag transactions that deviate significantly from the learned normal pattern, while the isolation forest identifies anomalies based on their susceptibility to isolation from the dataset's majority. Our experimental results, validated through techniques such as k-fold cross-validation, are evaluated using precision, recall, and the F1 score alongside the area under the receiver operating characteristic (ROC) curve. Our models achieved an F1 score of 0.85 and a ROC AUC of 0.93, indicating high accuracy in detecting fraudulent transactions without excessive false positives. This study contributes to the academic discourse on financial fraud detection and provides a practical framework for banking institutions seeking to implement real-time anomaly detection systems. By demonstrating the effectiveness of unsupervised learning techniques in a real-world context, our research offers a pathway to significantly reduce the incidence of financial fraud, thereby enhancing the security and trustworthiness of digital financial services.

Keywords: anomaly detection, financial fraud, machine learning, autoencoders, isolation forest, transactional data analysis

Procedia PDF Downloads 36
2444 Sportband: An Idea for Workout Monitoring in Amateur and Recreational Sports

Authors: Kamila Mazur-Oleszczuk, Rafal Banasiuk, Dawid Krasnowski, Maciej Pek, Marcin Podgorski, Krzysztof Rykaczewski, Sabina Zoledowska, Dawid Nidzworski

Abstract:

Workout safety is one of the most significant challenges of recreational sports. Loss of water and electrolytes is a consequence of thermoregulatory sweating during exercise. The rate of sweat loss and its chemical composition can fluctuate within and among individuals. That is why we propose our sportband 'Flow' as a device for monitoring these parameters. 'Flow' consists of two parts: an intelligent module and a mobile application. The application allows verifying the training progress and data archiving. The sportband intelligent module includes temperature, heart rate and pulse measurement (non-invasive, continuous methods of workout monitoring). Apart from the standard components, the device will consist of a sweat composition analyzer situated in sportband intelligent module. Sweat is a water solution of numerous compounds such as ions (sodium up to 1609 µg/ml, potassium up to 274 µg/ml), lactic acid (skin pH is between 4.5 - 6) and a small amount of glucose. Awareness of sweat composition allows personalizing electrolyte intake after training. A comprehensive workout monitoring (sweat composition, heart rate, blood oxygen level) will provide improvement in the training routine and time management, which is our goal for the development of the sweat composition analyzer.

Keywords: flow, sportband, sweat, workout monitoring

Procedia PDF Downloads 137
2443 A Model for Adaptive Online Quiz: QCitra

Authors: Rosilah Hassan, Karam Dhafer Mayoof, Norngainy Mohd Tawil, Shamshubaridah Ramlee

Abstract:

Application of adaptive online quiz system and a design are performed in this paper. The purpose of adaptive quiz system is to establish different questions automatically for each student and measure their competence on a definite area of discipline. This model determines students competencies in cases like distant-learning which experience challenges frequently. Questions are specialized to allow clear deductions about student gains; they are able to identify student competencies more effectively. Also, negative effects of questions requiring higher knowledge than competency over student’s morale and self-confidence are dismissed. The advantage of the system in the quiz management requires less total time for measuring and is more flexible. Self sufficiency of the system in terms of repeating, planning and assessment of the measurement process allows itself to be used in the individual education sets. Adaptive quiz technique prevents students from distraction and motivation loss, which is led by the questions with quite lower hardness level than student’s competency.

Keywords: e-learning, adaptive system, security, quiz database

Procedia PDF Downloads 435
2442 The Politicization of Foreign Aid and Its Effect on Afghanistan, 2001-2016

Authors: Narender Banwala

Abstract:

The study critically evaluates that the politics of foreign aid and its effect on Afghanistan. The study argues that dynamics of foreign aid to Afghanistan are not driven solely by the Afghan political, social, and economic realities but much more by the ephemeral political goals of international donor countries. The objective of this paper is to find out the political reality of foreign aid given to Afghanistan in a post 9/11 era. The study analyses the gap between the donor countries' interests and the Afghan government's priorities in aid coordination and management. The aid given to Afghanistan has been accompanied by the political interests of the major powers and therefore violated the core principles of humanitarianism, i.e., humanity, impartiality, neutrality, and independence. This research attempts to explain the areas which are of high priority, extremely vulnerable, and have been a neglected part since 2001. The study focuses on how as a result of politicization, foreign aid could not yield the expected results even after prolong presence of international donors in Afghanistan. Methodologically, the study includes both qualitative and quantitative data, which are collected by interviews with government officials and other government documents.

Keywords: Afganistan, aid, politics, security

Procedia PDF Downloads 108
2441 Optimization of Our Eyes Cooperation as the Counter-Terrorism Strategy in Association of South East Asian Nations

Authors: Chastiti Mediafira Wulolo

Abstract:

Our Eyes is a cooperation pact in the field of intelligence information exchanges initiated by the Indonesian Ministry of Defense, which has been signed by Indonesia, Philippines, Malaysia, Brunei Darussalam, Thailand, and Singapore. This cooperation mostly engages the military acts as a central role, but this pact still requires the involvement of various parties such as police and other linear institution. This paper will use a qualitative content analysis method by doing some deep analyzing the pattern of cooperation itself. As the implementation of translantic counter-terrorism cooperation, this research will address how the role of Our Eyes can be optimized as a form of government’s response towards the contemporary threat in the Dynamics of Strategic Environmental Security in the Asia Pacific Region. Optimizing the role of this cooperation will also acquire from the previous counter-terrorism cooperation in ASEAN region, so it expects that Our Eyes collaboration can be the most effective cooperation in overcoming terrorism issues in ASEAN, eventually in Asia Pacific.

Keywords: our eyes, Defense Ministry of Indonesia, ASEAN, counter-terrorism

Procedia PDF Downloads 167
2440 Investigating the Factors Affecting on One Time Passwords Technology Acceptance: A Case Study in Banking Environment

Authors: Sajad Shokohuyar, Mahsa Zomorrodi Anbaji, Saghar Pouyan Shad

Abstract:

According to fast technology growth, modern banking tries to decrease going to banks’ branches and increase customers’ consent. One of the problems which banks face is securing customer’s password. The banks’ solution is one time password creation system. In this research by adapting from acceptance of technology model theory, assesses factors that are effective on banking in Iran especially in using one time password machine by one of the private banks of Iran customers. The statistical population is all of this bank’s customers who use electronic banking service and one time password technology and the questionnaires were distributed among members of statistical population in 5 selected groups of north, south, center, east and west of Tehran. Findings show that confidential preservation, education, ease of utilization and advertising and informing has positive relations and distinct hardware and age has negative relations.

Keywords: security, electronic banking, one time password, information technology

Procedia PDF Downloads 434
2439 Human Motion Capture: New Innovations in the Field of Computer Vision

Authors: Najm Alotaibi

Abstract:

Human motion capture has become one of the major area of interest in the field of computer vision. Some of the major application areas that have been rapidly evolving include the advanced human interfaces, virtual reality and security/surveillance systems. This study provides a brief overview of the techniques and applications used for the markerless human motion capture, which deals with analyzing the human motion in the form of mathematical formulations. The major contribution of this research is that it classifies the computer vision based techniques of human motion capture based on the taxonomy, and then breaks its down into four systematically different categories of tracking, initialization, pose estimation and recognition. The detailed descriptions and the relationships descriptions are given for the techniques of tracking and pose estimation. The subcategories of each process are further described. Various hypotheses have been used by the researchers in this domain are surveyed and the evolution of these techniques have been explained. It has been concluded in the survey that most researchers have focused on using the mathematical body models for the markerless motion capture.

Keywords: human motion capture, computer vision, vision-based, tracking

Procedia PDF Downloads 302
2438 Systematic Review of Sexual Assault Prevention Methods for Older Adults: Exploring the Hidden Needs of a Growing Population

Authors: Michelle Hand, Brieanne Beaujolais

Abstract:

Rape stereotypes have long involved the assault of young females by strangers desiring sex. As such, older adult women and men have largely been excluded from research, policies, and awareness raising initiatives to address sexual violence. Moreover sexual assault accounts for the most underreported type of abuse experienced by older adults, highlighting a need to expand our knowledge base in this area. Thus a systematic review of peer-reviewed scholarly articles and reports was conducted to explore the ways sexual assault has been prevented among older adults in recent years and to identify implications for researchers and practitioners as they aim to meet the needs of this population. Articles and reports published during or after 2007 were eligible if their focus included methods to address sex abuse among older adults as well as practice or research implications. Forty-four articles met this criteria and were included in this systematic review. The findings from this review will provide an in-depth understanding of the under-researched issue of sexual violence among older adult women and men as well as current prevention strategies. In addition, implications and recommendations will be provided for practitioners, educators and researchers as they aim to meet the hidden needs of this growing yet under-researched population.

Keywords: elder, rape, sexual assault, sexual violence

Procedia PDF Downloads 300
2437 Allergy to Animal Hair in the Algerian Population

Authors: Meriche Hacene, Gadiri Sabiha

Abstract:

Introduction: Allergy to animal hair is hypersensitivity to animal appendages to look for in front of any rhinoconjunctivitis or asthma. An anamnesis associated with the prick-tests makes it possible to guide the diagnosis, which will be supplemented in case of doubt by specific immunoglobulin E (IgE) assays. The objective of our study is to study the characteristics of patients sensitized to animal hair. Patients and methods: Retrospective study conducted on 105 adult patients and 69 children over a period of 3 years, including patients who received a specific IgE assay (respiratory panel and pediatric panel) by immunodot method. Result: 105 adult patients, including 74 women and 31 men, with an average age of 41 years, of which 8.5% had sensitization to animal hair (5 men and 4 women), namely: cat (5%), horse (4.7%) and dog (3.8%). For the 69 children, a slight female predominance was noted (56%), with an average age of 7.5 years, of which (13%) are sensitized to animal hair (5 girls and 4 boys): cat (10%), while awareness of dog and horse hair was less frequent with an identical prevalence of (4.34%). The dominant symptoms are rhinorrhea and sneezing for both categories, respectively (40% and 26.6% in adults and 23% for both symptoms in children). Cross-sensitization was observed in the 2 series: 1 single cat-dog and cat-horse case and 2 dog-horse cases in adults. In children 100% of patients with sensitization to dog hair had cross-sensitization to cat hair, only 1 case was observed for cat-horse cross-reactivity. Conclusion: This work shows that allergy to animal hair is common. Studies on more representative samples are recommended.

Keywords: children, allegy to animals, specific Ig E, hypersensitivity

Procedia PDF Downloads 53
2436 Understanding Climate Change with Chinese Elderly: Knowledge, Attitudes and Practices on Climate Change in East China

Authors: Pelin Kinay, Andy P. Morse, Elmer V. Villanueva, Karyn Morrissey, Philip L Staddon, Shanzheng Zhang, Jingjing Liu

Abstract:

The present study aims to evaluate the climate change and health related knowledge, attitudes and practices (KAP) of the elderly population (60 years plus) in Hefei and Suzhou cities of China (n=300). This cross-sectional study includes 150 participants in each city. Data regarding demographic characteristics, KAP, and climate change perceptions were collected using a semi-structured questionnaire. When asked about the potential impacts of climate change over 79% of participants stated that climate change affected their lifestyle. Participants were most concerned about storms (51.7%), food shortage (33.3%) and drought (26%). The main health risks cited included water contamination (32%), air pollution related diseases (38.3%) and lung disease (43%). Finally, a majority (68.3%) did not report receiving government assistance on climate change issues. Logistic regression models were used to analyse the data in order to understand the links between socio-demographical factors and KAP of the participants. These findings provide insights for potential adaptation strategies targeting the elderly. It is recommended that government should take responsibility in creating awareness strategies to improve the coping capacity of elderly in China to climate change and its health impacts and develop climate change adaptation strategies.

Keywords: China, climate change, elderly, KAP

Procedia PDF Downloads 250
2435 Assessing of Social Comfort of the Russian Population with Big Data

Authors: Marina Shakleina, Konstantin Shaklein, Stanislav Yakiro

Abstract:

The digitalization of modern human life over the last decade has facilitated the acquisition, storage, and processing of data, which are used to detect changes in consumer preferences and to improve the internal efficiency of the production process. This emerging trend has attracted academic interest in the use of big data in research. The study focuses on modeling the social comfort of the Russian population for the period 2010-2021 using big data. Big data provides enormous opportunities for understanding human interactions at the scale of society with plenty of space and time dynamics. One of the most popular big data sources is Google Trends. The methodology for assessing social comfort using big data involves several steps: 1. 574 words were selected based on the Harvard IV-4 Dictionary adjusted to fit the reality of everyday Russian life. The set of keywords was further cleansed by excluding queries consisting of verbs and words with several lexical meanings. 2. Search queries were processed to ensure comparability of results: the transformation of data to a 10-point scale, elimination of popularity peaks, detrending, and deseasoning. The proposed methodology for keyword search and Google Trends processing was implemented in the form of a script in the Python programming language. 3. Block and summary integral indicators of social comfort were constructed using the first modified principal component resulting in weighting coefficients values of block components. According to the study, social comfort is described by 12 blocks: ‘health’, ‘education’, ‘social support’, ‘financial situation’, ‘employment’, ‘housing’, ‘ethical norms’, ‘security’, ‘political stability’, ‘leisure’, ‘environment’, ‘infrastructure’. According to the model, the summary integral indicator increased by 54% and was 4.631 points; the average annual rate was 3.6%, which is higher than the rate of economic growth by 2.7 p.p. The value of the indicator describing social comfort in Russia is determined by 26% by ‘social support’, 24% by ‘education’, 12% by ‘infrastructure’, 10% by ‘leisure’, and the remaining 28% by others. Among 25% of the most popular searches, 85% are of negative nature and are mainly related to the blocks ‘security’, ‘political stability’, ‘health’, for example, ‘crime rate’, ‘vulnerability’. Among the 25% most unpopular queries, 99% of the queries were positive and mostly related to the blocks ‘ethical norms’, ‘education’, ‘employment’, for example, ‘social package’, ‘recycling’. In conclusion, the introduction of the latent category ‘social comfort’ into the scientific vocabulary deepens the theory of the quality of life of the population in terms of the study of the involvement of an individual in the society and expanding the subjective aspect of the measurements of various indicators. Integral assessment of social comfort demonstrates the overall picture of the development of the phenomenon over time and space and quantitatively evaluates ongoing socio-economic policy. The application of big data in the assessment of latent categories gives stable results, which opens up possibilities for their practical implementation.

Keywords: big data, Google trends, integral indicator, social comfort

Procedia PDF Downloads 185
2434 Error Analysis: Examining Written Errors of English as a Second Language (ESL) Spanish Speaking Learners

Authors: Maria Torres

Abstract:

After the acknowledgment of contrastive analysis, Pit Coder’s establishment of error analysis revolutionized the way instructors analyze and examine students’ writing errors. One question that relates to error analysis with speakers of a first language, in this case, Spanish, who are learning a second language (English), is the type of errors that these learners make along with the causes of these errors. Many studies have looked at the way the native tongue influences second language acquisition, but this method does not take into account other possible sources of students’ errors. This paper examines writing samples from an advanced ESL class whose first language is Spanish at non-profit organization, Learning Quest Stanislaus Literacy Center. Through error analysis, errors in the students’ writing were identified, described, and classified. The purpose of this paper was to discover the type and origin of their errors which generated appropriate treatments. The results in this paper show that the most frequent errors in the advanced ESL students’ writing pertain to interlanguage and a small percentage from an intralanguage source. Lastly, the least type of errors were ones that originate from negative transfer. The results further solidify the idea that there are other errors and sources of errors to account for rather than solely focusing on the difference between the students’ mother and target language. This presentation will bring to light some strategies and techniques that address the issues found in this research. Taking into account the amount of error pertaining to interlanguage, an ESL teacher should provide metalinguistic awareness of the students’ errors.

Keywords: error analysis, ESL, interlanguage, intralangauge

Procedia PDF Downloads 287
2433 Nutrition and Food Safety as Strategic Assets

Authors: Daniel C. S. Lim, W. Y. Tan

Abstract:

The world is facing a growing food crisis. The concerns of food nutritional value, food safety and food security are becoming increasingly real. There is also a direct relationship to the risk of diseases, particularly chronic diseases, to the food we consume. So, there are increasing concerns about the modern day food ecosystem creating foods that can provide the nutritional components for organ function sustenance, as well as, taking a serious view on diet-related diseases. This paper addresses some of the above concerns and gives an overview of the current global situation relating to food nutrition and safety. The paper reviews nutritional aspects of food today compared to those of the last century, compares whole foods found in supermarkets versus those organically grown, as well as population behaviour towards food choices. It provides scientific insights into the effects of some of the global trends such as climate change and other changes environmental changes, and presents what individuals and corporations are doing to use the latest nutritional technologies as strategic assets. Finally, it briefly highlights some of the innovative solutions that are being applied to address several of the above concerns.

Keywords: food crisis, food safety, global trends, nutritional aspects

Procedia PDF Downloads 370
2432 Self-Medicating Behavior of Urban Pakistani Population toward Psychotropic Agents and Its Correlates

Authors: M. Umar Hafeez, Furqan Khursheed Hashmi, Nadeem Irfan Bukhari, Shahzad Ali, Muzammil Ali

Abstract:

The trend of self-medication is increasing due to various factors and is associated with a large number of complications. A cross-sectional study was aimed to investigate self-medication trend in an urban community and its correlates such as level of education, gender and behavior of using psychoactive medicines. A validated questionnaire was used to collect the data from different locations of Lahore, provincial capital of Punjab, Pakistan. The trend of self-medication was noted in reference to difference in educational level and in gender. This study showed that total 110 respondents, all literate,were found to be self-medicating, and their educational status was as 73.13% primary, 63.15% secondary, 61.12% higher secondary and 62.15% university going. In this sample 74.99% were males and 48.00%were females. Twenty nine (26.36%) of the total sample were found to be using psychoactive agents without consulting the physician. The trend of self-medication was 10% higher in individuals having primary level education, whereas there was not much difference of self-medication trend in other levels of education. The main reasons involved in self-medication trend were socio-economic status, medicine accessibility, religious and cultural beliefs, lack of awareness about risks associated with medicine, non-prescription sale of medicines and previous medication experience. The trend of self-medication of psychotropic agents is quite significant.

Keywords: self-medication, educated community, psychotropic drugs, education levels

Procedia PDF Downloads 379
2431 Corporate Social Responsibility in Indian Apparel Industry

Authors: Archana Gandhi

Abstract:

Indian apparel manufacturers see several benefits of Corporate Social Responsibility (CSR). At the same time, they clearly face steep challenges in its implementation. From the perspective of the participants, the challenges tend to outweigh the benefits. The short-term expenses, misperceptions about the financial benefits of CSR and the additional burden of implementing CSR-related policies and activities tend to overshadow perceptions of the long-term benefits. CSR activities currently seen in the Indian apparel industry are primarily people focused, society-focused or environment-focused. However, most CSR activities focus on employee welfare, including teaching employees about health and safety awareness, creating opportunities for community building, and providing general education to employees. Employee retention is very high in socially responsible Indian firms as compared to non-CSR firms, largely because CSR plays a crucial role in overall employee satisfaction, which translates to worker loyalty and low turnover. Employee retention and commitment are not the​ only potential benefits of CSR in the Indian apparel industry. CSR can also enhance a company’s image. Although it is a long-term benefit, being socially responsible can build a company’s social reputation and help it to gain others’ trust. Buyers do not hesitate to do business with these companies, since it is difficult to find socially responsible firms in India.

Keywords: corporate social responsibility, apparel industry, workers, improve work life

Procedia PDF Downloads 346
2430 An Attack on the Lucas Based El-Gamal Cryptosystem in the Elliptic Curve Group Over Finite Field Using Greater Common Divisor

Authors: Lee Feng Koo, Tze Jin Wong, Pang Hung Yiu, Nik Mohd Asri Nik Long

Abstract:

Greater common divisor (GCD) attack is an attack that relies on the polynomial structure of the cryptosystem. This attack required two plaintexts differ from a fixed number and encrypted under same modulus. This paper reports a security reaction of Lucas Based El-Gamal Cryptosystem in the Elliptic Curve group over finite field under GCD attack. Lucas Based El-Gamal Cryptosystem in the Elliptic Curve group over finite field was exposed mathematically to the GCD attack using GCD and Dickson polynomial. The result shows that the cryptanalyst is able to get the plaintext without decryption by using GCD attack. Thus, the study concluded that it is highly perilous when two plaintexts have a slight difference from a fixed number in the same Elliptic curve group over finite field.

Keywords: decryption, encryption, elliptic curve, greater common divisor

Procedia PDF Downloads 234
2429 Cognitive Stereotype Behaviors and Their Imprinting on the Individuals with Autism

Authors: Li-Ju Chen, Hsiang-Lin Chan, Hsin-Yi Kathy Cheng, Hui-Ju Chen

Abstract:

Stereotype behavior is one of the maladaptive syndromes of the individuals with autism. Most of the previous researches focused on the stereotype behavior with stimulating type, while less on the stereotype behavior about cognition (This research names it cognitive stereotype behavior; CSB). This research explored CSB and the rationality to explain CSB with imprinting phenomenon. After excluding the samples without CSB described, the data that came from 271 individuals with autism were recruited and analyzed with quantitative and qualitative analyses. This research discovers that : (1) Most of the individuals with autism originally came out CSB at 3 years old and more than a half of them appeared before 4 years old; The average age which firstly came out CSB was 6.10 years old, the average time insisting or ossifying CSB was 31.71 minutes each time and the average longest time which they last was 358.35 minutes (5.97 hours). (2) CSB demonstrates various aspects, this research classified them into 4 fields with 26 categories. They were categorized into sudden CSB or habitual CSB by imprinting performance. (3) Most of the autism commented that their CSBs were not necessary but they could not control them well. One-third of them appeared CSB suddenly and the first occurrence accompanied a strong emotional or behavioral response. (4) Whether respondent is the person with autism himself/herself or not was the critical element: on the awareness of the severity degree, disturbance degree, and the emotional /behavioral intensity at the first-time CSB happened. This study concludes imprinting could reasonably explain the phenomenon CSB forms. There are implications leading the individuals with autism and their family to develop coping strategies to promote individuals with autism having a better learning accomplishment and life quality in their future.

Keywords: autism, cognitive stereotype behavior, constructivism, imprinting, stereotype

Procedia PDF Downloads 113
2428 Cognitive Behavioral Modification in the Treatment of Aggressive Behavior in Children

Authors: Dijana Sulejmanović

Abstract:

Cognitive-behavioral modification (CBM) is a combination of cognitive and behavioral learning principles to shape and encourage the desired behaviors. A crucial element of cognitive-behavioral modification is that a change the behavior precedes awareness of how it affects others. CBM is oriented toward changing inner speech and learning to control behaviors through self-regulation techniques. It aims to teach individuals how to develop the ability to recognize, monitor and modify their thoughts, feelings, and behaviors. The review of literature emphasizes the efficiency the CBM approach in the treatment of children's hyperactivity and negative emotions such as anger. The results of earlier research show how impulsive and hyperactive behavior, agitation, and aggression may slow down and block the child from being able to actively monitor and participate in regular classes, resulting in the disruption of the classroom and the teaching process, and the children may feel rejected, isolated and develop long-term poor image of themselves and others. In this article, we will provide how the use of CBM, adapted to child's age, can incorporate measures of cognitive and emotional functioning which can help us to better understand the children’s cognitive processes, their cognitive strengths, and weaknesses, and to identify factors that may influence their behavioral and emotional regulation. Such a comprehensive evaluation can also help identify cognitive and emotional risk factors associated with aggressive behavior, specifically the processes involved in modulating and regulating cognition and emotions.

Keywords: aggressive behavior, cognitive behavioral modification, cognitive behavioral theory, modification

Procedia PDF Downloads 306
2427 Assets Misappropriation in the Malaysian Public and Private Sectors

Authors: I. K. Norziaton, M. D. Ridhuan, A. N. Nur Adura

Abstract:

Assets misappropriation is becoming a major concern in organizations. Over the years, the Malaysian Auditor General has reported high occurrences of assets misappropriation at the federal, state and even local governments. It is surprising that assets misappropriation is not the only major concern in the public sector but it has also indicates a common sight in private sector. The current situation is rather disconcerting because employees are accountable to perform their jobs at the interest of the organizations. Various researches in the past has found that the incidence of assets misappropriation occurs when employees used the official vehicles, internet connection, computers, stationery and facilities for personal and family benefits. The issue of assets misappropriation has continue to be a major concern for organizations and its impact on the reputation and financial health can be enormous. Even though the issue seems to be trivial, yet, if it is left untreated, the symptoms will become an incurable disease that it will cause major leakages to the organizations. Hence, this paper highlights the common practices of assets misappropriation in public and private sectors. It also discusses why the acts of assets misappropriation occurs. Using the data through questionnaire survey, a total of 250 questionnaires were distributed to the private and public sectors employees. However 173 (69.2%) were returned and usable. This paper concludes that it is vital to promote awareness to the public and private sectors employees on issues of assets misappropriation. Assets misappropriation could have been avoided provided that the officers in charge are more vigilant, competent and practice high level of integrity in discharging their responsibilities towards the organizations.

Keywords: assets misappropriation, fraud, public sector, private sector

Procedia PDF Downloads 178
2426 Iris Detection on RGB Image for Controlling Side Mirror

Authors: Norzalina Othman, Nurul Na’imy Wan, Azliza Mohd Rusli, Wan Noor Syahirah Meor Idris

Abstract:

Iris detection is a process where the position of the eyes is extracted from the face images. It is a current method used for many applications such as for security purpose and drowsiness detection. This paper proposes the use of eyes detection in controlling side mirror of motor vehicles. The eyes detection method aims to make driver easy to adjust the side mirrors automatically. The system will determine the midpoint coordinate of eyes detection on RGB (color) image and the input signal from y-coordinate will send it to controller in order to rotate the angle of side mirror on vehicle. The eye position was cropped and the coordinate of midpoint was successfully detected from the circle of iris detection using Viola Jones detection and circular Hough transform methods on RGB image. The coordinate of midpoint from the experiment are tested using controller to determine the angle of rotation on the side mirrors.

Keywords: iris detection, midpoint coordinates, RGB images, side mirror

Procedia PDF Downloads 408
2425 Spacial Poetic Text throughout Samih al-Qasim's Poetry

Authors: Saleem Abu Jaber, Khaled Igbaria

Abstract:

For readers, space/place is one of the most significant references to reveal deep significances and indications in modern Arabic poetic texts. Generally, when poets evoke places and/or spaces, they do not mean to refer readers to detailed geographic or physical spaces, but to the symbolic significances and dimensions that those spaces have and through which poets encourage spacial awareness in their readers. Recently, as a result, there has been a great deal of interest in research addressing spacial poetic texts and dimensions in modern Arabic poetry in general and in Palestinian poetry in particular. Samih al-Qasim is one of the most recent prominent Palestinian revolutionary poets. Al-Qasim has published six series of poems that are well known in the Arab world. Although several researchers have studied al-Qasim's poetry, to our knowledge, yet no one has studied the aspect of spacial poetic text in his poetry. Therefore, this paper seeks to fill a gap in the scholarship that has not been addressed up to now. This article aims, not only to demonstrate the presence of spacial poetic text and dimensions throughout al-Qasim's poetry, but also to investigate the purpose for which the poet uses spacial poetic text. Our theory is that the poet, consciously and significantly, uses spacial poetic texts to magnify the Palestinian identity of the Palestinian readers.  Methodologically, we applied a descriptive analytic method, referencing al-Qasim's poetry, addressing spacial poetic texts practically but not theoretically or statistically.

Keywords: spatial poetic text, Samih al-Qasim, space and identity, Palestinian poetry

Procedia PDF Downloads 297
2424 Women's Rights in the Constitution of Nepal: 2015

Authors: Sudir Silwal, Surendra KC

Abstract:

Nepalese legal system was derived from Hindu sacred before the democratic movement in 1990. Before this movement, Nepal had a patrimonial system. Nepal has ratified the UN Convention on the Elimination of all forms of Discrimination Against Women (CEDAW). Women organizations of the various political parties, different social organizations and women activists are playing the significant role to empower the women through the social awareness campaign across the country. As a result, 33% women representation in the local government has ascertained by the current constitution. The Constitution of Nepal-2015 has mentioned the rights of women as a fundamental right and it also has provisioned the National Women Commission as the constitutional body. This constitution is the model of gender friendly constitution in the world. As per this constitution, the Citizenship certificate is issued based on the lineage of the mother or father along with gender identity. The current constitution has guaranteed 33% women participation in judiciary, bureaucracy and legislation. This constitution further states that the parliament must elect a woman either as the president or the vice president. Similarly same rule is applied to elect the speaker and the deputy speaker in the parliament. In the same constitution, rights of the third gender also has guaranteed. The guiding principles of the constitution further explain that the constitution has followed the rule of positive discrimination and proportional representation of women in all elements of the state. This study shows that the state is not only focused in the representation of women in all structure of the nation but also need to emphasize the enhancement of the capability of the women to make them equal to the men.

Keywords: constitution, empowerment, representation, women's rights

Procedia PDF Downloads 495
2423 Teaching Reading in English: The Neglect of Phonics in Nigeria

Authors: Abdulkabir Abdullahi

Abstract:

Nigeria has not yet welcomed phonics into its primary schools. In government-owned primary schools teachers are functionally ignorant of the stories of the reading wars amongst international scholars. There are few or no Nigerian-authored phonics textbooks, and there has been no government-owned phonics curriculum either. There are few or no academic journal articles on phonics in the country and there is, in fact, a certain danger of confusion between phonics and phonetics among Nigerian publishers, authors, writers and academics as if Nigerian teachers of English and the educational policy makers of the country were unaware of reading failures/problems amongst Nigerian children, or had never heard of phonics or read of the stories of the reading wars or the annual phonics test in the United Kingdom, the United States of America and other parts of the world. It is on this note that this article reviews and examines, in the style of a qualitative inquiry, the body of arguments on phonics, and explores the effectiveness of phonics teaching, particularly, in a second-language learning contexts. While the merit of the paper is, perhaps, situated in its supreme effort to draw global attention to reading failures/problems in Nigeria and the ways the situation may affect English language learning, international academic relations and the educational future of the country, it leaves any quantitative verification of its claims to interested quantitative researchers in the world.

Keywords: graphemes, phonics, reading, reading wars, reading theories, phonemic awareness

Procedia PDF Downloads 218
2422 A Comparative Analysis of Hyper-Parameters Using Neural Networks for E-Mail Spam Detection

Authors: Syed Mahbubuz Zaman, A. B. M. Abrar Haque, Mehedi Hassan Nayeem, Misbah Uddin Sagor

Abstract:

Everyday e-mails are being used by millions of people as an effective form of communication over the Internet. Although e-mails allow high-speed communication, there is a constant threat known as spam. Spam e-mail is often called junk e-mails which are unsolicited and sent in bulk. These unsolicited emails cause security concerns among internet users because they are being exposed to inappropriate content. There is no guaranteed way to stop spammers who use static filters as they are bypassed very easily. In this paper, a smart system is proposed that will be using neural networks to approach spam in a different way, and meanwhile, this will also detect the most relevant features that will help to design the spam filter. Also, a comparison of different parameters for different neural network models has been shown to determine which model works best within suitable parameters.

Keywords: long short-term memory, bidirectional long short-term memory, gated recurrent unit, natural language processing, natural language processing

Procedia PDF Downloads 189
2421 Lessons Learned from Covid19 - Related ERT in Universities

Authors: Sean Gay, Cristina Tat

Abstract:

This presentation will detail how a university in Western Japan has implemented its English for Academic Purposes (EAP) program during the onset of CoViD-19 in the spring semester of 2020. In the spring semester of 2020, after a 2 week delay, all courses within the School of Policy Studies EAP Program at Kwansei Gakuin University were offered in an online asynchronous format. The rationale for this decision was not to disadvantage students who might not have access to devices necessary for taking part in synchronous online lessons. The course coordinators were tasked with consolidating the materials originally designed for face-to-face14 week courses for a 12 week asynchronous online semester and with uploading the modified course materials to Luna, the university’s network, which is a modified version of Blackboard. Based on research to determine the social and academic impacts of this CoViD-19 ERT approach on the students who took part in this EAP program, this presentation explains how future curriculum design and implementation can be managed in a post-CoViD world. There are a wide variety of lessons that were salient. The role of the classroom as a social institution was very prominent; however, awareness of cognitive burdens and strategies to mitigate that burden may be more valuable for teachers. The lessons learned during this period of ERT can help teachers moving forward.

Keywords: asynchronous online learning, emergency remote teaching (ERT), online curriculum design, synchronous online learning

Procedia PDF Downloads 188