Search results for: computer security incident response team
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 11043

Search results for: computer security incident response team

10773 A Study on Personnel Commitment Factors in Hafes Hospital

Authors: Farzaneh Bayat

Abstract:

Successful and effective presence in regional and global markets along with optimal use of available utilities and proper utilization of new sources for offering desirable services based on customer satisfaction is inevitable. Commitment has a significant role in offering optimal services. Offering high quality job and desirable services to the customers are personnel’s commitment. Thus, Shiraz Chamran Hospital which is affiliated with Shiraz Medical School and is one of the orthopedic poles in southern Iran was studied. This hospital has 750 personnel and physicians which a sample of 200 of them were chosen as the statistic society for a 5 month period from June to November 2009. Main variables in this decision are: responsibility and responsiveness, job security, team work, task autonomy, gradation opportunity, information sharing, payments and commitment. The study approach is descriptive-correlative. With applied and segmental nature of the tests and statistic analysis, the 7 hypotheses were approved with 95% of certainty.

Keywords: commitment, information sharing, responsibility and responsiveness, job security, task autonomy

Procedia PDF Downloads 301
10772 A Novel Unconditionally Secure and Lightweight Bipartite Key Agreement Protocol

Authors: Jun Liu

Abstract:

This paper introduces a new bipartite key agreement (2PKA) protocol which provides unconditionally security and lightweight. The unconditional security is stemmed from the known impossibility of distinguishing a particular solution from all possible solutions of an underdetermined system of equations. The indistinguishability prevents an adversary from inferring to the common secret-key even with the access to an unlimited amount of computing capability. This new 2PKA protocol is also lightweight because that the calculation of a common secret-key only makes use of simple modular arithmetic. This information-theoretic 2PKA scheme provides the desired features of Key Confirmation (KC), Session Key (SK) security, Know-Key (KK) security, protection of individual privacy, and uniformly distributed value of a common key under prime modulus.

Keywords: bipartite key agreement, information-theoretic cryptography, perfect security, lightweight

Procedia PDF Downloads 26
10771 Patient Safety Culture in Brazilian Hospitals from Nurse's Team Perspective

Authors: Carmen Silvia Gabriel, Dsniele Bernardi da Costa, Andrea Bernardes, Sabrina Elias Mikael, Daniele da Silva Ramos

Abstract:

The goal of this quantitative study is to investigate patient safety culture from the perspective of professional from the hospital nursing team.It was conducted in two Brazilian hospitals,.The sample included 282 nurses Data collection occurred in 2013, through the questionnaire Hospital Survey on Patient Safety Culture.Based on the assessment of the dimensions is stressed that, in the dimension teamwork across hospital units, 69.4% of professionals agree that when a lot of work needs to be done quickly, they work together as a team; about the dimension supervisor/ manager expectations and actions promoting safety, 70.2% agree that their supervisor overlooks patient safety problems.Related to organizational learning and continuous improvement, 56.5% agree that there is evaluation of the effectiveness of the changes after its implementation.On hospital management support for patient safety, 52.8% refer that the actions of hospital management show that patient safety is a top priority.On the overall perception of patient safety, 57.2% disagree that patient safety is never compromised due to higher amount of work to be completed.In what refers to feedback and communication about error, 57.7% refer that always and usually receive such information. Relative to communication openness, 42.9% said they never or rarely feel free to question the decisions / actions of their superiors.On frequency of event reporting, 64.7% said often and always notify events with no damages to patients..About teamwork across hospital units is noted similarity between the percentages of agreement and disagreement, as on the item there is a good cooperation among hospital units that need to work together, that indicates 41.4% and 40.5% respectively.Related to adequacy of professionals, 77.8 % disagree on the existence of sufficient amount of employees to do the job, 52.4% agree that shift changes are problematic for patients. On nonpunitive response to errors, 71.7% indicate that when an event is reported it seems that the focus is on the person.On the patient safety grade of the institution, 41.6 % classified it as very good. it is concluded that there are positive points in the safety culture, and some weaknesses as a punitive culture and impaired patient safety due to work overload .

Keywords: quality of health care, health services evaluation, safety culture, patient safety, nursing team

Procedia PDF Downloads 277
10770 Determining the Appropriate Methodology for the Security Evaluation of Equipment Related to Information and Communication Technology in the Industry

Authors: Sofia Ahanj Sofia Ahanj, Mahsa Rahmani Mahsa Rahmani, Zahra Sadeghigol, Vida Nobakht Vida Nobakht

Abstract:

Providing security in the electricity industry, as one of the vital infrastructures of the country, is one of the essential operations that must be taken in order to improve the security of the country. Resistant security strategies need to be regularly implemented as a dynamic process to improve security, and security evaluation is one of the most important steps in this process. Methodology in the field of evaluation in both technical and managerial dimensions is discussed in the laboratory. There are various standards in the field of general ICT technical-security evaluation. The most important are ISO / IEC 15408, ISO / IEC 27001 and NIST SP 800-53. In the present paper, these standards are first examined. Then, the standards and reports in the industrial field have been reviewed and compared, and finally, based on the results and special considerations of information and communication technology equipment in the electricity industry, the appropriate methodology has been presented.

Keywords: security standards, ISO/IEC 15408, ISA/IEC 62443 series, NIST SP 800-53, NISTIR 7628

Procedia PDF Downloads 134
10769 Kiira EV Project Transition from Student to Professional Team through Project-Based Skills Development

Authors: Doreen Orishaba, Paul Isaac Musasizi, Richard Madanda, Sandy Stevens Tickodri-Togboa

Abstract:

The world of academia tends to be a very insular place. Consequently, scholars who successfully completed their undergraduate and graduate studies are unpleasantly surprised at how challenging the transition to corporate life can get. This is a global trend even as the students who juggle work with attending some of the most demanding and best graduate programs may not easily adjust to and confirm to the professionalism required for corporate management of the industry. This paper explores the trends in the transition of Kiira EV Project from a predominantly student team to a professional team of a national pride program through mentorship and apprenticeship. The core disciplines within the Kiira EV Project include Electrical and Electronics Engineering, Mechanical Engineering, and Industrial Design.

Keywords: mentorship, apprenticeship, professional, development

Procedia PDF Downloads 377
10768 A Review of Food Security Policy Research in Central Asia

Authors: Mergen Dyussenov

Abstract:

Food security has become a prominent issue on the global policy agenda. Yet, one particular region that remains understudied is a cohort of Central Asian countries. To shed light onto the issue, the paper looks into a review of existing literature related to food security policies in Central Asia. In so doing, it seeks to systematize the context analyzed, key findings, and recommendations. Furthermore, it analyzes the role of key actors in promoting the food security policies across Central Asian nations. Finally, the paper attempts to set the agenda for further research.

Keywords: food security, central Asia, the role of actors, policy analysis

Procedia PDF Downloads 289
10767 Making the Right Call for Falls: Evaluating the Efficacy of a Multi-Faceted Trust Wide Approach to Improving Patient Safety Post Falls

Authors: Jawaad Saleem, Hannah Wright, Peter Sommerville, Adrian Hopper

Abstract:

Introduction: Inpatient falls are the most commonly reported patient safety incidents, and carry a significant burden on resources, morbidity, and mortality. Ensuring adequate post falls management of patients by staff is therefore paramount to maintaining patient safety especially in out of hours and resource stretched settings. Aims: This quality improvement project aims to improve the current practice of falls management at Guys St Thomas Hospital, London as compared to our 2016 Quality Improvement Project findings. Furthermore, it looks to increase current junior doctors confidence in managing falls and their use of new guidance protocols. Methods: Multifaceted Interventions implemented included: the development of new trust wide guidelines detailing management pathways for patients post falls, available for intranet access. Furthermore, the production of 2000 lanyard cards distributed amongst junior doctors and staff which summarised these guidelines. Additionally, a ‘safety signal’ email was sent from the Trust chief medical officer to all staff raising awareness of falls and the guidelines. Formal falls teaching was also implemented for new doctors at induction. Using an established incident database, 189 consecutive falls in 2017were retrospectively analysed electronically to assess and compared to the variables measured in 2016 post interventions. A separate serious incident database was used to analyse 50 falls from May 2015 to March 2018 to ascertain the statistical significance of the impact of our interventions on serious incidents. A similar questionnaire for the 2017 cohort of foundation year one (FY1) doctors was performed and compared to 2016 results. Results: Questionnaire data demonstrated improved awareness and utility of guidelines and increased confidence as well as an increase in training. 97% of FY1 trainees felt that the interventions had increased their awareness of the impact of falls on patients in the trust. Data from the incident database demonstrated the time to review patients post fall had decreased from an average of 130 to 86 minutes. Improvement was also demonstrated in the reduced time to order and schedule X-ray and CT imaging, 3 and 5 hours respectively. Data from the serious incident database show that ‘the time from fall until harm was detected’ was statistically significantly lower (P = 0.044) post intervention. We also showed the incidence of significant delays in detecting harm ( > 10 hours) reduced post intervention. Conclusions: Our interventions have helped to significantly reduce the average time to assess, order and schedule appropriate imaging post falls. Delays of over ten hours to detect serious injuries after falls were commonplace; since the intervention, their frequency has markedly reduced. We suggest this will lead to identifying patient harm sooner, reduced clinical incidents relating to falls and thus improve overall patient safety. Our interventions have also helped increase clinical staff confidence, management, and awareness of falls in the trust. Next steps include expanding teaching sessions, improving multidisciplinary team involvement to aid this improvement.

Keywords: patient safety, quality improvement, serious incidents, falls, clinical care

Procedia PDF Downloads 102
10766 Enhancing Civil Aviation Safety and Security: A Comprehensive Approach

Authors: J. Waldon

Abstract:

The civil aviation industry plays a crucial role in global transportation, connecting people and goods across the world. Ensuring the safety and security of passengers, crew, and aircraft is of paramount importance. This paper aims to address the aspect of training and human factors, amongst others, necessary for enhancing civil aviation safety and security. In this context, we are focusing on the level of attention exhibited in the checking of luggage and travel credentials, with the aim to identify areas of improvement and avoid compromising security and safety at the Nsimalen Airport Yaoundé, Cameroon. We found that there is a lack of proper awareness among both travelers and some staff on the safety and security of goods and passengers. We suggest that improved training and handling, and sensitization in the form of legible billboards are important. Thus, we recommend refresher courses like this one for staff to keep abreast with the fast-changing security landscape in air transport as well as proper sensitization, including health-related issues. In conclusion, we established that the human factors, as well as the frequency of training and refresher courses, have a positive outlook on safety and security in air transport.

Keywords: safety, security, passengers, cargo

Procedia PDF Downloads 37
10765 A Review Paper on Data Security in Precision Agriculture Using Internet of Things

Authors: Tonderai Muchenje, Xolani Mkhwanazi

Abstract:

Precision agriculture uses a number of technologies, devices, protocols, and computing paradigms to optimize agricultural processes. Big data, artificial intelligence, cloud computing, and edge computing are all used to handle the huge amounts of data generated by precision agriculture. However, precision agriculture is still emerging and has a low level of security features. Furthermore, future solutions will demand data availability and accuracy as key points to help farmers, and security is important to build robust and efficient systems. Since precision agriculture comprises a wide variety and quantity of resources, security addresses issues such as compatibility, constrained resources, and massive data. Moreover, conventional protection schemes used in the traditional internet may not be useful for agricultural systems, creating extra demands and opportunities. Therefore, this paper aims at reviewing state of the art of precision agriculture security, particularly in open field agriculture, discussing its architecture, describing security issues, and presenting the major challenges and future directions.

Keywords: precision agriculture, security, IoT, EIDE

Procedia PDF Downloads 62
10764 Seismic Response Analysis of Frame Structures Based on Super Joint Element Model

Authors: Li Xu, Yang Hong, T. Zhao Wen

Abstract:

Experimental results of many RC beam-column subassemblage indicate that slippage of longitudinal beam rebar within the joint and the shear deformation of joint core have significant influence on seismic behavior of the subassemblage. However, rigid joint assumption has been generally used in the seismic response analysis of RC frames, in which two kinds of inelastic deformation of joint have been ignored. Based on OpenSees platform, ‘Super Joint Element Model’ with more detailed inelastic mechanism is used to simulate the inelastic response of joints. Two finite element models of typical RC plane frame, namely considering or ignoring the inelastic deformation of joint respectively, were established and analyzed under seven strong earthquake waves. The simulated global and local inelastic deformations of the RC plane frame is shown and discussed. The analyses also confirm the security of the earthquake-resistant frame designed according to Chinese codes.

Keywords: frame structure, beam-column joint, longitudinal bar slippage, shear deformation, nonlinear analysis

Procedia PDF Downloads 383
10763 Analysis on Cyber Threat Actors Targeting Automated Border Security Systems

Authors: Mirko Sailio

Abstract:

Border crossing automatization reduces required human resources in handling people crossing borders. As technology replaces and augments the work done by border officers, new cyber threats arise to threaten border security. This research analyses the current cyber threat actors and their capabilities. The analysis is conducted by gathering the threat actor data from a wide range of public sources. A model for a general border automatization system is presented, and its most significant cyber-security attributes are then compared to threat actor activity and capabilities in order to predict priorities in securing such systems. Organized crime and nation-state actors present the clearest threat to border cyber-security, and additional focus is given to their motivations and activities.

Keywords: border automation, cyber-security, threat actors, border cyber-security

Procedia PDF Downloads 171
10762 Protecting Privacy and Data Security in Online Business

Authors: Bilquis Ferdousi

Abstract:

With the exponential growth of the online business, the threat to consumers’ privacy and data security has become a serious challenge. This literature review-based study focuses on a better understanding of those threats and what legislative measures have been taken to address those challenges. Research shows that people are increasingly involved in online business using different digital devices and platforms, although this practice varies based on age groups. The threat to consumers’ privacy and data security is a serious hindrance in developing trust among consumers in online businesses. There are some legislative measures taken at the federal and state level to protect consumers’ privacy and data security. The study was based on an extensive review of current literature on protecting consumers’ privacy and data security and legislative measures that have been taken.

Keywords: privacy, data security, legislation, online business

Procedia PDF Downloads 74
10761 General Awareness of Teenagers in Information Security

Authors: Magdaléna Náplavová, Tomáš Ludík, Petr Hrůza, František Božek

Abstract:

The use of IT equipment has become a part of every day. However, each device that is part of cyberspace should be secured against unauthorized use. It is very important to know the basics of these security devices, but also the basics of safe conduct their owners. This information should be part of every curriculum computer science education in primary and secondary schools. Therefore, the work focuses on the education of pupils in primary and secondary schools on the Internet. Analysis of the current state describes approaches to the education of pupils in security issues on the Internet. The paper presents a questionnaire-based survey which was carried out in the Czech Republic, whose task was to ascertain the level of opinion pupils in primary and secondary schools on the issue of communication in social networks. The research showed that awareness of socio-pathological phenomena on the Internet environment is very low. Based on the results it was proposed appropriate ways of teaching to this issue and its inclusion a proposal of curriculum for primary and secondary schools.

Keywords: information security, cyber space, general awareness, questionnaire, socio-pathological phenomena, educational system

Procedia PDF Downloads 359
10760 Implications of Creating a 3D Vignette as a Reflective Practice for Continuous Professional Development of Foreign Language Teachers

Authors: Samiah H. Ghounaim

Abstract:

The topic of this paper is significant because of the increasing need for intercultural training for foreign language teachers due to the continuous challenges they face in their diverse classrooms. First, the structure of the intercultural training program designed will be briefly described, and the structure of a 3D vignette and its intended purposes will be elaborated on. This was the first stage where the program was designed and implemented on the period of three months with a group of local and expatriate foreign language teachers/practitioners at a university in the Middle East. After that, a set of primary data collected during the first stage of this research on the design and co-construction process of a 3D vignette will be reviewed and analysed in depth. Each practitioner designed a personal incident into a 3D vignette where each dimension of the vignette viewed the same incident from a totally different perspective. Finally, the results and the implications of having participant construct their personal incidents into a 3D vignette as a reflective practice will be discussed in detail as well as possible extensions for the research. This process proved itself to be an effective reflective practice where the participants were stimulated to view their incidents in a different light. Co-constructing one’s own critical incidents –be it a positive experience or not– into a structured 3D vignette encouraged participants to decentralise themselves from the incidents and, thus, creating a personal reflective space where they had the opportunity to see different potential outcomes for each incident, as well as prepare for the reflective discussion of their vignette with their peers. This provides implications for future developments in reflective writing practices and possibilities for educators’ continuous professional development (CPD).

Keywords: 3D vignettes, intercultural competence training, reflective practice, teacher training

Procedia PDF Downloads 81
10759 Effectiveness of Variable Speed Limit Signs in Reducing Crash Rates on Roadway Construction Work Zones in Alaska

Authors: Osama Abaza, Tanay Datta Chowdhury

Abstract:

As a driver's speed increases, so do the probability of an incident and likelihood of injury. The presence of equipment, personnel, and a changing landscape in construction zones create greater potential for incident. This is especially concerning in Alaska, where summer construction activity, coinciding with the peak annual traffic volumes, cannot be avoided. In order to reduce vehicular speeding in work zones, and therefore the probability of crash and incident occurrence, variable speed limit (VSL) systems can be implemented in the form of radar speed display trailers since the radar speed display trailers were shown to be effective at reducing vehicular speed in construction zones. Allocation of VSL not only help reduce the 85th percentile speed but also it will predominantly reduce mean speed as well. Total of 2147 incidents along with 385 crashes occurred only in one month around the construction zone in the Alaska which seriously requires proper attention. This research provided a thorough crash analysis to better understand the cause and provide proper countermeasures. Crashes were predominantly recoded as vehicle- object collision and sideswipe type and thus significant amount of crashes fall in the group of no injury to minor injury type in the severity class. But still, 35 major crashes with 7 fatal ones in a one month period require immediate action like the implementation of the VSL system as it proved to be a speed reducer in the construction zone on Alaskan roadways.

Keywords: speed, construction zone, crash, severity

Procedia PDF Downloads 211
10758 The Role of Intellectual Security Immunisation in Reducing Extremism in the Kingdom of Saudi Arabia, 1979 – 2019

Authors: Anas Abdulrahman A. Almiman

Abstract:

In recent decades, efforts to combat extremism have focused on non-physical dimensions, as various countries have attempted to raise security awareness or promote authentic and moderate Islamic education. The Kingdom of Saudi Arabia is one of the most successful and unique cases because it has focused on the immunization of Islamic intellectual security to combat extremism. This study aims to define the concept and importance of Islamic intellectual security in the Kingdom of Saudi Arabia through a descriptive-analytical study. It describes the potential role of Islamic intellectual security immunization in reducing extremism in the Kingdom of Saudi Arabia from 1979 to 2019, identifying various factors that connect Islamic intellectual security immunization to extremism reduction. One such factor is the MISK Foundation’s forums and conferences intended to raise Islamic intellectual security and reduce intellectual deviation, thus reducing extremism. It concludes that the common significant factor for Islamic intellectual deviation is direct commands and prohibitions. This study supports the efforts made by the Kingdom of Saudi Arabia to immunize Islamic intellectual security and fight extremism as a consequence.

Keywords: extremism, intellectual security immunization , Saudi Arabia, Islamic

Procedia PDF Downloads 163
10757 Response Delay Model: Bridging the Gap in Urban Fire Disaster Response System

Authors: Sulaiman Yunus

Abstract:

The need for modeling response to urban fire disaster cannot be over emphasized, as recurrent fire outbreaks have gutted most cities of the world. This necessitated the need for a prompt and efficient response system in order to mitigate the impact of the disaster. Promptness, as a function of time, is seen to be the fundamental determinant for efficiency of a response system and magnitude of a fire disaster. Delay, as a result of several factors, is one of the major determinants of promptgness of a response system and also the magnitude of a fire disaster. Response Delay Model (RDM) intends to bridge the gap in urban fire disaster response system through incorporating and synchronizing the delay moments in measuring the overall efficiency of a response system and determining the magnitude of a fire disaster. The model identified two delay moments (pre-notification and Intra-reflex sequence delay) that can be elastic and collectively plays a significant role in influencing the efficiency of a response system. Due to variation in the elasticity of the delay moments, the model provides for measuring the length of delays in order to arrive at a standard average delay moment for different parts of the world, putting into consideration geographic location, level of preparedness and awareness, technological advancement, socio-economic and environmental factors. It is recommended that participatory researches should be embarked on locally and globally to determine standard average delay moments within each phase of the system so as to enable determining the efficiency of response systems and predicting fire disaster magnitudes.

Keywords: delay moment, fire disaster, reflex sequence, response, response delay moment

Procedia PDF Downloads 179
10756 An Examination of the Moderating Effect of Team Identification on Attitude and Buying Intention of Jersey Sponsorship

Authors: Young Ik Suh, Taewook Chung, Glaucio Scremin, Tywan Martin

Abstract:

In May of 2016, the Philadelphia 76ers announced that StubHub, the ticket resale company, will have advertising on the team’s jerseys beginning in the 2017-18 season. The 76ers and National Basketball Association (NBA) became the first team and league which embraced jersey sponsorships in the four major U.S. professional sports. Even though many professional teams and leagues in Europe, Asia, Africa, and South America have adopted jersey sponsorship actively, this phenomenon is relatively new in America. While the jersey sponsorship provides economic gains for the professional leagues and franchises, sport fans can have different points of view for the phenomenon of jersey sponsorship. For instance, since many sport fans in U.S. are not familiar with ads on jerseys, this movement can possibly cause negative reaction such as the decrease in ticket and merchandise sales. They also concern the small size of ads on jersey become bigger ads, like in the English Premier League (EPL). However, some sport fans seem they do not mind too much about jersey sponsorship because the ads on jersey will not affect their loyalty and fanship. Therefore, the assumption of this study was that the sport fans’ reaction about jersey sponsorship can be possibly different, especially based on different levels of the sport fans’ team identification and various sizes of ads on jersey. Unlike general sponsorship in sport industry, jersey sponsorship has received little attention regarding its potential impact on sport fans attitudes and buying intentions. Thus, the current study sought to identify how the various levels of team identification influence brand attitude and buying intention in terms of jersey sponsorship. In particular, this study examined the effect of team identification on brand attitude and buying intention when there are no ads, small size ads, and large size ads on jersey. 3 (large, small, and no ads) X 3 (Team Identification: high, moderate, low) between subject factorial design was conducted on attitude toward the brand and buying intention of jersey sponsorship. The ads on Philadelphia 76ers jersey were used. The sample of this study was selected from message board users provided by different sports websites (i.e., forums.realgm.com and phillysportscentral.com). A total of 275 respondents participated in this study by responding to an online survey questionnaire. The results showed that there were significant differences between fans with high identification and fans with low identification. The findings of this study are expected to have many theoretical and practical contributions and implications by extending the research and literature pertaining to the relationship between team identification and brand strategy based upon different levels of team identification.

Keywords: brand attitude, buying intention, Jersey sponsorship, team identification

Procedia PDF Downloads 219
10755 The Influence of an Occupation as a Calling on the Value of Job Security and Its Connection with Wage Levels

Authors: Malul Miki, Rafi Bar-El, Eithan Hourie

Abstract:

In this article, we test the influence of an occupation as a calling on the value of job security and its connection with wage levels. Our sample consists of 495 workers in Israel from 10 occupations in the public sector, who are assumed to have a relatively high level of job security, and the private sector, who are assumed to have less job security or none at all. These 10 occupations are social workers, lecturers, lawyers, administration workers, accountants, high school teachers, bank workers, high-tech worker, nurses and psychologists. Using regression analysis, we find that those who have occupations that the literature has defined as a calling value job security less than those in ordinary employment. In addition, salary level has no effect on this relationship. Finally, those who work in occupations that are regarded as a calling have less status quo bias than those in ordinary employment.

Keywords: calling, loss aversion, job security, status quo bias

Procedia PDF Downloads 76
10754 The Psychometric Properties of the Team Climate Inventory Scale: A Validation Study in Jordan’s Collectivist Society

Authors: Suhair Mereish

Abstract:

This research is aimed at examining the climate for innovation in organisations with the aim of validating the psychometric properties of the Team Climate Inventory (TCI -14) for Jordan’s collectivist society. The innovativeness of teams may be improved or obstructed by the climate within the team. Further, personal factors are considered an important element that influences the climate for innovation. Accordingly, measuring the employees' personality traits using the Big Five Inventory (BFI-44) could provide insights that aid in understanding how to improve innovation. Thus, studying the climate for innovation and its associations with personality traits is valuable, considering the insights it could offer on employee performance, job satisfaction, and well-being. Essentially, the Team Climate Inventory instrument has never been tested in Jordan’s collectivist society. Accordingly, in order to address the existing gap in the literature as a whole and, more specifically, in Jordan, it is essential to investigate its factorial structure and reliability in this particular context. It is also important to explore whether the factorial structure of the Team Climate Inventory in Jordan’s collectivist society demonstrates a similar or different structure to what has been found in individualistic ones. Lastly, examining if there are associations between the Team Climate Inventory and personality traits of Jordanian employees is pivotal. The quantitative study was carried out among Jordanian employees employed in two of the top 20 companies in Jordan, a shipping and logistics company (N=473) and a telecommunications company (N=219). To generalise the findings, this was followed by collecting data from the general population of this country (N=399). The participants completed the Team Climate Inventory. Confirmatory factor analyses and reliability tests were conducted to confirm the factorial structure, validity, and reliability of the inventory. Findings presented that the four-factor structure of the Team Climate Inventory in Jordan revealed a similar structure to the ones in Western culture. The four-factor structure has been confirmed with good fit indices and reliability values. Moreover, for climate for innovation, regression analysis identified agreeableness (positive) and neuroticism (negative) from the Big Five Inventory as significant predictors. This study will contribute to knowledge in several ways. First, by examining the reliability and factorial structure in a Jordanian collectivist context rather than a Western individualistic one. Second, by comparing the Team Climate Inventory structure in Jordan with findings for the Team Climate Inventory from Western individualistic societies. Third, by studying its relationships with personality traits in that country. Furthermore, findings from this study will assist practitioners in the field of organisational psychology and development to improve the climate for innovation for employees working in organisations in Jordan. It is also expected that the results of this research will provide recommendations to professionals in the business psychology sector regarding the characteristics of employees who hold positive and negative perceptions of the workplace climate.

Keywords: big five inventory, climate for innovation, collectivism, individualism, Jordan, team climate inventory

Procedia PDF Downloads 27
10753 An Optimized Approach to Generate the Possible States of Football Tournaments Final Table

Authors: Mouslem Damkhi

Abstract:

This paper focuses on possible states of a football tournament final table according to the number of participating teams. Each team holds a position in the table with which it is possible to determine the highest and lowest points for that team. This paper proposes an optimized search space based on the minimum and maximum number of points which can be gained by each team to produce and enumerate the possible states for a football tournament final table. The proposed search space minimizes producing the invalid states which cannot occur during a football tournament. The generated states are filtered by a validity checking algorithm which seeks to reach a tournament graph based on a generated state. Thus, the algorithm provides a way to determine which team’s wins, draws and loses values guarantee a particular table position. The paper also presents and discusses the experimental results of the approach on the tournaments with up to eight teams. Comparing with a blind search algorithm, our proposed approach reduces generating the invalid states up to 99.99%, which results in a considerable optimization in term of the execution time.

Keywords: combinatorics, enumeration, graph, tournament

Procedia PDF Downloads 87
10752 A Reinforcement Learning Based Method for Heating, Ventilation, and Air Conditioning Demand Response Optimization Considering Few-Shot Personalized Thermal Comfort

Authors: Xiaohua Zou, Yongxin Su

Abstract:

The reasonable operation of heating, ventilation, and air conditioning (HVAC) is of great significance in improving the security, stability, and economy of power system operation. However, the uncertainty of the operating environment, thermal comfort varies by users and rapid decision-making pose challenges for HVAC demand response optimization. In this regard, this paper proposes a reinforcement learning-based method for HVAC demand response optimization considering few-shot personalized thermal comfort (PTC). First, an HVAC DR optimization framework based on few-shot PTC model and DRL is designed, in which the output of few-shot PTC model is regarded as the input of DRL. Then, a few-shot PTC model that distinguishes between awake and asleep states is established, which has excellent engineering usability. Next, based on soft actor criticism, an HVAC DR optimization algorithm considering the user’s PTC is designed to deal with uncertainty and make decisions rapidly. Experiment results show that the proposed method can efficiently obtain use’s PTC temperature, reduce energy cost while ensuring user’s PTC, and achieve rapid decision-making under uncertainty.

Keywords: HVAC, few-shot personalized thermal comfort, deep reinforcement learning, demand response

Procedia PDF Downloads 38
10751 AMBICOM: An Ambient Computing Middleware Architecture for Heterogeneous Environments

Authors: Ekrem Aksoy, Nihat Adar, Selçuk Canbek

Abstract:

Ambient Computing or Ambient Intelligence (AmI) is emerging area in computer science aiming to create intelligently connected environments and Internet of Things. In this paper, we propose communication middleware architecture for AmI. This middleware architecture addresses problems of communication, networking, and abstraction of applications, although there are other aspects (e.g. HCI and Security) within general AmI framework. Within this middleware architecture, any application developer might address HCI and Security issues with extensibility features of this platform.

Keywords: AmI, ambient computing, middleware, distributed-systems, software-defined networking

Procedia PDF Downloads 241
10750 Response Reduction Factor for Earthquake Resistant Design of Special Moment Resisting Frames

Authors: Rohan V. Ambekar, Shrirang N. Tande

Abstract:

The present study estimates the seismic response reduction factor (R) of reinforced concrete special moment resisting frame (SMRF) with and without shear wall using static nonlinear (pushover) analysis. Calculation of response reduction factor (R) is done as per the new formulation of response reduction factor (R) given by Applied Technology Council (ATC)-19 which is the product of strength factor (Rs), ductility factor (Rµ) and redundancy factor (RR). The analysis revealed that these three factors affect the actual value of response reduction factor (R) and therefore they must be taken into consideration while determining the appropriate response reduction factor to be used during the seismic design process. The actual values required for determination of response reduction factor (R) is worked out on the basis of pushover curve which is a plot of base shear verses roof displacement. Finally, the calculated values of response reduction factor (R) of reinforced concrete special moment resisting frame (SMRF) with and without shear wall are compared with the codal values.

Keywords: response reduction factor, ductility ratio, base shear, special moment resisting frames

Procedia PDF Downloads 454
10749 Artificial Neural Network in FIRST Robotics Team-Based Prediction System

Authors: Cedric Leong, Parth Desai, Parth Patel

Abstract:

The purpose of this project was to develop a neural network based on qualitative team data to predict alliance scores to determine winners of matches in the FIRST Robotics Competition (FRC). The game for the competition changes every year with different objectives and game objects, however the idea was to create a prediction system which can be reused year by year using some of the statistics that are constant through different games, making our system adaptable to future games as well. Aerial Assist is the FRC game for 2014, and is played in alliances of 3 teams going against one another, namely the Red and Blue alliances. This application takes any 6 teams paired into 2 alliances of 3 teams and generates the prediction for the final score between them.

Keywords: artifical neural network, prediction system, qualitative team data, FIRST Robotics Competition (FRC)

Procedia PDF Downloads 480
10748 Nurse's Professional Space: Psychiatric Outpatient Clinic of Ottawa's Montfort Hospital 1976-2002

Authors: Silvia Maria Moya

Abstract:

After the Great Depression, the number of admissions to psychiatric facilities saw a significant increase. This increase, coupled with the arrival of new antipsychotic drugs, prepared the ground to the psychiatric deinstitutionalization movement in North America. Community services became an essential part of care where the role of the nurse also became crucial in the management of patients. Looking through the archives of the Department of Psychiatry at the Ottawa Montfort Hospital, this project aims to assess the role of the nurse in a multidisciplinary team in a period of psychiatric deinstitutionalization. This research focuses on the different roles of the mental health nurse during the second half of the twentieth century. The case study, used as a methodological approach allows in-depth analysis of the journey of a female patient with long hospital course. The analysis of the document ‘psychiatric evaluation’ on the medical records of outpatient Montfort Hospital – where, on a regular basis, different health professionals of the multidisciplinary team write their notes – allow us to better understand the difficulties of the patient, their problems, their family and work relationships and the evolution of their self-esteem, but most importantly, it allows us to identify the importance of the different nurse`s roles in the team and in the mental health setting. This project therefore reveals that the nurse occupies a larger professional space than the other professionals in the multidisciplinary team and highlights the role of mental health nurses with patients and their families and their leadership role within a multidisciplinary team.

Keywords: mental health, nursing, deinstitutionalization, professional space

Procedia PDF Downloads 339
10747 Understanding Sixteen Basic Desires and Modern Approaches to Agile Team Motivation: Case Study

Authors: Anna Suvorova

Abstract:

Classical motivation theories hold that there are two kinds of motivation, intrinsic and extrinsic. Leaders are looking for effective motivation techniques, but frequently external influences do not work or, even worse, reduce team productivity. We see only the tip of the iceberg -human behavior. However, beneath the surface of the water are factors that directly affect our behavior -desires. Believing that employees need to be motivated, companies design a motivation system based on the principle: do it and get a reward. As a matter of fact, we all have basic desires. Everybody is motivated but to different extents. Following the principle "intrinsic motivation over extrinsic rewards", we need to create an environment that will support intrinsic motivation and potential of employees, and team, rather than individual work.

Keywords: motivation profile, motivation techniques, agile HR, basic desires, agile people, human behavior, people management

Procedia PDF Downloads 82
10746 The Effect of Using Water Wireless Aqua Com System on the Development of Dolphin Kick Movements on the Female Swimming Team at the Faculty of Physical Education

Authors: Wisal Alrabadi

Abstract:

The study's goal was to see how the use of water wireless Aqua Com System and its accompanying music affected the Female Swimming Team at the Faculty of Physical Education's development of dolphin kick movements. To that end, a training program consisting of (12) training units spread out over four weeks, three units per week, was created and applied to a study sample of (10) students from the swimming pool enrolled in the first semester of the academic year 2022. Pre-measuring and timing the movements of dolphins kicking with and without fins above and below, measuring the water's surface over a distance of 25 meters. The results showed that there are statistically significant differences in favor of telemetry from the start within the limits of the area specified for a distance of 15 m after the comparison between the pre and post-measurement using the test (T) of the double samples, and this indicates the impact of the training program using the Aqua Com System in the swimming team(Female) at Faculty of Physical Education, and in light of this a set of recommendations was developed.

Keywords: aqua com system training program, accompanying music, dolphin kick movements, swimming team female

Procedia PDF Downloads 116
10745 Password Cracking on Graphics Processing Unit Based Systems

Authors: N. Gopalakrishna Kini, Ranjana Paleppady, Akshata K. Naik

Abstract:

Password authentication is one of the widely used methods to achieve authentication for legal users of computers and defense against attackers. There are many different ways to authenticate users of a system and there are many password cracking methods also developed. This paper is mainly to propose how best password cracking can be performed on a CPU-GPGPU based system. The main objective of this work is to project how quickly a password can be cracked with some knowledge about the computer security and password cracking if sufficient security is not incorporated to the system.

Keywords: GPGPU, password cracking, secret key, user authentication

Procedia PDF Downloads 244
10744 Intelligent Recognition Tools for Industrial Automation

Authors: Amin Nazerzadeh, Afsaneh Nouri Houshyar , Azadeh Noori Hoshyar

Abstract:

With the rapid growing of information technology, the industry and manufacturing systems are becoming more automated. Therefore, achieving the highly accurate automatic systems with reliable security is becoming more critical. Biometrics that refers to identifying individual based on physiological or behavioral traits are unique identifiers provide high reliability and security in different industrial systems. As biometric cannot easily be transferred between individuals or copied, it has been receiving extensive attention. Due to the importance of security applications, this paper provides an overview on biometrics and discuss about background, types and applications of biometric as an effective tool for the industrial applications.

Keywords: Industial and manufacturing applications, intelligence and security, information technology, recognition; security technology; biometrics

Procedia PDF Downloads 125