Search results for: cybersecurity defense strategies
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 5516

Search results for: cybersecurity defense strategies

5246 Developing Reading Methods of Industrial Education Students at King Mongkut’s Institute of Technology Ladkrabang

Authors: Rattana Sangchan, Pattaraporn Thampradit

Abstract:

Teaching students to use a variety of reading methods in developing reading is essential for Thai university students. However, there haven’t been a lot of studies concerned about developing reading methods that are used by Thai students in the industrial education field. Therefore, this study was carried out not only to investigate the developing reading methods of Industrial Education students at King Mongkut’s Institute of Technology Ladkrabang, but also to determine if the developing reading strategies differ among the students’ reading abilities and differ gender: male and female. The research instrument used in collecting the data consisted of fourteen statements which include either metacognitive strategies, cognitive strategies or social / affective strategies. Results of this study revealed that students could develop their reading methods in moderate level (mean=3.13). Furthermore, high reading ability students had different levels of using reading methods to develop their reading from those of mid reading ability students. In addition, high reading ability students could use either metacognitive reading methods or cognitive reading methods to develop their reading much better than mid reading ability students. Interestingly, male students could develop their reading methods in great levels while female students could develop their reading methods only in moderate level. Last but not least, male students could use either metacognitive reading methods or cognitive reading methods to develop their reading much better than female students. Thus, the results of this study could indicate that most students need to apply much more reading strategies to develop their reading. At the same time, suggestions on how to motivate and train their students to apply much more appropriate effective reading strategies to better comprehend their reading were also provided.

Keywords: developing reading methods, industrial education, reading abilities, reading method classification

Procedia PDF Downloads 259
5245 Simulation Analysis of a Full-Scale Five-Story Building with Vibration Control Dampers

Authors: Naohiro Nakamura

Abstract:

Analysis methods to accurately estimate the behavior of buildings when earthquakes occur is very important for improving the seismic safety of such buildings. Recently, the use of damping devices has increased significantly and there is a particular need to appropriately evaluate the behavior of buildings with such devices during earthquakes in the design stage. At present, however, the accuracy of the analysis evaluations is not sufficient. One reason is that the accuracy of current analysis methods has not been appropriately verified because there is very limited data on the behavior of actual buildings during earthquakes. Many types of shaking table test of large structures are performed at the '3-Dimensional Full-Scale Earthquake Testing Facility' (nicknamed 'E-Defense') operated by the National Research Institute of Earth Science and Disaster Prevention (NIED). In this study, simulations using 3- dimensional analysis models were conducted on shaking table test of a 5-story steel-frame structure with dampers. The results of the analysis correspond favorably to the test results announced afterward by the committee. However, the suitability of the parameters and models used in the analysis and the influence they had on the responses remain unclear. Hence, we conducted additional analysis and studies on these models and parameters. In this paper, outlines of the test are shown and the utilized analysis model is explained. Next, the analysis results are compared with the test results. Then, the additional analyses, concerning with the hysteresis curve of the dampers and the beam-end stiffness of the frame, are investigated.

Keywords: three-dimensional analysis, E-defense, full-scale experimen, vibration control damper

Procedia PDF Downloads 161
5244 The Impact of Instructing Interpretation Specific Strategies on Interpretation Performance of Undergraduate Translation Students

Authors: Abolfazl Ghelichi, Ghasem Modarresi

Abstract:

The problem with interpretation courses arises from the fact that Interpretation Courses at University levels are presented by most of the instructors based on listening activities and testing listening performance while interpretation strategies have been underrated. The data are gathered from30 students majoring in Translation Studies to fulfill the major aims of the study including. The study aimed at: 1) examining the significant relationship between specific interpretation strategies and interpretation performance of translation students in interpretation courses, 2) investigating the significant difference between males and females in their interpretation performance, and 3) exploring the interpretation strategies which are more effective for the translation students to improve their interpretation performance from students’ opinions. The results of the study revealed that there was a statistically significant difference in the mean scores for the two groups. The experimental group outperformed the control group in their interpretation performance and the effect size was large. However, there was no significant difference between male and female with respect to their cognition [t (28) =.79, p<.05]. As for the results obtained from the interviews with the students, the commonalities emerged from the students’ responses were analyzed and reported by the researchers.

Keywords: anticipation, interpretation performance, interpretation strategy, shadowing

Procedia PDF Downloads 258
5243 Research on Autonomous Controllability of BeiDou Navigation Satellite System Based on Knowledge Transformation

Authors: Hang Ju, Changmin Zhu

Abstract:

The development level of the BeiDou Navigation Satellite System (BDS) can strongly reflect national defense strength as an important spatial information infrastructure. BDS can be not only used for military purposes, such as intelligence gathering, nuclear explosion monitoring, emergency communications, but also for location services, transportation, mapping, precision agriculture. In order to ensure the national defense security and the wide application of BDS in civil and military areas, BDS must be autonomous and controllable. As a complex system of knowledge-intensive, knowledge transformation runs through the whole process of research and development, production, operation, and maintenance of BDS. Based on the perspective of knowledge transformation, this paper expounds on the meaning of socialization, externalization, combination, and internalization of knowledge transformation, and the coupling relationship of autonomy and control on the basis of analyzing the status quo and problems of the autonomy and control of BDS. The autonomous and controllable framework of BDS based on knowledge transformation is constructed from six dimensions of management capability, R&D capability, technical capability, manufacturing capability, service support capability, and application capability. It can provide support for the smooth implementation of information security policy, provide a reference for the autonomy and control of the upstream and downstream industrial chains in Beidou, and provide a reference for the autonomous and controllable research of aerospace components, military measurement test equipment, and other related industries.

Keywords: knowledge transformation, BeiDou Navigation Satellite System, autonomy and control, framework

Procedia PDF Downloads 157
5242 From Ondoy to Habagat: Comparison of the Community Coping Strategies between Barangay Tumana and Provident Village, Marikina City

Authors: Dinnah Feye H. Andal, Ann Laurice V. Salonga

Abstract:

The paper investigates the flooding event that was experienced by Marikina City residents during the onslaught of Tropical Storm Ondoy on September 26, 2009 and during the heavy downpour caused by the southwest monsoon (Habagat) on August 1-8, 2012. Typhoon Ketsana, locally known as Tropical Storm Ondoy, devastated the whole of Marikina City, displacing a lot of people from their homes and damages properties as well, as flood rose at a very short period of time. Meanwhile, the massive amount of rain water brought by the southwest monsoon lasted for a week that also caused flooding to different parts of Metro Manila including Marikina City. This paper examines how the respondents’ experiences of the flooding caused by Tropical Storm Ondoy informed the coping strategies that the households in Barangay Tumana and Provident Village employed during the flooding brought by the southwest monsoon rains. Specifically, the research compares the coping strategies to flood hazards between residents of Barangay Tumana and Provident Village before, during and after the flooding caused by the southwest monsoon rains. Both study sites have relatively low elevation and are located along rivers and creeks which make them highly susceptible to flood. Interviews with affected residents were undertaken to understand how a household's coping strategies contribute to the development of community coping strategies at the respective neighborhood level. Based from the findings, income levels, local politics, religion and social relations between and among neighbors affect the way household and community coping strategies differ in the two case study sites.

Keywords: community coping strategies, Habagat, Marikina, Ondoy

Procedia PDF Downloads 295
5241 The Marketing Strategies of Five-Star Rated Herbal Businesses of One Tambon One Product (OTOP) Entrepreneurs in Songkhla Province, Thailand

Authors: S. Lungtae, C. Noknoi

Abstract:

The main purpose of this research is to analyze the marketing strategies of the various five-star rated herbal businesses of One Tambon One Product (OTOP) entrepreneurs in Songkhla province, Thailand. This includes the targeting, positioning and marketing mix in order to develop marketing strategies for OTOP entrepreneurs. The data were collected from the presidents of herbal-product enterprises in Songkhla province. The products of all these enterprises were selected as five-star herbal products for the OTOP project in 2012. In-depth interviews were conducted, and content analysis was used to analyze the data. The research found that the community enterprises should 1) increase the range of product sizes offered, 2) increase their distribution channels, 3) publicize more to inform consumers about their identities and products, 4) undertake promotional activities during the festival, and 5) choose salespeople who are knowledgeable about the features of their products.

Keywords: marketing mix, market positioning, marketing strategies, target market.

Procedia PDF Downloads 265
5240 Strategies to Enhance Export Performance of Thai Furniture Industry

Authors: Khomsan Laosillapacharoen

Abstract:

This research paper was aimed to analyze the current situation of the furniture industry and embark a plan to enhance the export volume of Thai furniture. This is a qualitative research which utilized meta-analysis and focus group. A total of 24 experts in both government and private sectors were interviewed. The findings revealed that Thai furniture had some advantages of access to raw material, high quality of labors, and have a unique skill. However, the threat included a tendency to have more foreign competitors in domestic market. In addition, the strategies to enhance the level of export included increase the standard quality of Thai furniture, offer new and modern designs, use marketing on the internet, use modern technology, and gain tax incentive from the government.

Keywords: export, furniture, strategies, marketing

Procedia PDF Downloads 374
5239 Early Diagnosis and Treatment of Cancer Using Synthetic Cationic Peptide

Authors: D. J. Kalita

Abstract:

Cancer is one of the prime causes of early death worldwide. Mutation of the gene involve in DNA repair and damage, like BRCA2 (Breast cancer gene two) genes, can be detected efficiently by PCR-RFLP to early breast cancer diagnosis and adopt the suitable method of treatment. Host Defense Peptide can be used as blueprint for the design and synthesis of novel anticancer drugs to avoid the side effect of conventional chemotherapy and chemo resistance. The change at nucleotide position 392 of a -› c in the cancer sample of dog mammary tumour at BRCA2 (exon 7) gene lead the creation of a new restriction site for SsiI restriction enzyme. This SNP may be a marker for detection of canine mammary tumour. Support vector machine (SVM) algorithm was used to design and predict the anticancer peptide from the mature functional peptide. MTT assay of MCF-7 cell line after 48 hours of post treatment showed an increase in the number of rounded cells when compared with untreated control cells. The ability of the synthesized peptide to induce apoptosis in MCF-7 cells was further investigated by staining the cells with the fluorescent dye Hoechst stain solution, which allows the evaluation of the nuclear morphology. Numerous cells with dense, pyknotic nuclei (the brighter fluorescence) were observed in treated but not in control MCF-7 cells when viewed using an inverted phase-contrast microscope. Thus, PCR-RFLP is one of the attractive approach for early diagnosis, and synthetic cationic peptide can be used for the treatment of canine mammary tumour.

Keywords: cancer, cationic peptide, host defense peptides, Breast cancer genes

Procedia PDF Downloads 61
5238 Strategies Considered Effective for Funding Public Tertiary Institutions in Nigeria

Authors: Jacinta Ifeoma Obidile

Abstract:

The study sought to ascertain from the opinions of the business educators, effective strategies for funding public tertiary institutions in Anambra State Nigeria, for effective functioning and delivery. Funding of tertiary institutions has become so important following the dilapidated state of most of the public tertiary institutions in Nigeria. Tertiary institutions are known for the production of competitive and competent workforce in the nation. Considering the state of public tertiary institutions currently, one wonders if their objectives are achieved. Many scholars have identified funding as one of the major barriers to effective functioning of tertiary institutions. Although federal and state governments have been supporting the tertiary institutions, but their support seems not to be adequate. This study therefore ascertained from the perspective of business educators, other strategies for funding public tertiary institutions in Anambra State Nigeria, for effective functioning and delivery. Survey research design was adopted for the study. A total of 104 business educators from the public tertiary institutions in the State constituted the population. There was no sampling, hence the whole population was used. Structured questionnaire validated by three experts with a reliability coefficient of 0.82 was the instrument for data collection. Data collected were analyzed using mean and standard deviation. Findings from the study revealed that public-private partnership and external aids were among the strategies considered effective for funding public tertiary institutions. It was therefore recommended among others that associations like alumni should be strongly instituted in each of the public tertiary institutions so as to assist in the funding of tertiary institutions for effective functioning and delivery.

Keywords: strategies, funding, tertiary institutions, business educators

Procedia PDF Downloads 120
5237 Optimality of Shapley Value Mechanism under Sybil Strategies

Authors: Bruno Mazorra Roig

Abstract:

In the realm of cost-sharing mechanisms, the vulnerability to Sybil strategies, where agents can create fake identities to manipulate outcomes, has not yet been studied. In this paper, we delve into the intricacies of different cost-sharing mechanisms proposed in the literature, highlighting its non-Sybil-resistance nature. Furthermore, we prove that under mild conditions, a Sybil-proof cost-sharing mechanism for public excludable goods is at least (n/2 + 1)−approximate. This finding reveals an exponential increase in the worst-case social cost in environments where agents are restricted from using Sybil strategies. We introduce the concept of Sybil Welfare Invariant mechanisms, where a mechanism maintains its worst-case welfare under Sybil strategies for every set of prior beliefs with full support even when the mechanism is not Sybil-proof. Finally, we prove that the Shapley value mechanism for public excludable goods holds this property and so deduce that the worst-case social cost of this mechanism is the nth harmonic number Hn under the equilibrium of the game with Sybil strategies, matching the worst-case social cost bound for cost-sharing mechanisms. This finding carries important implications for decentralized autonomous organizations (DAOs), indicating that they are capable of funding public excludable goods efficiently, even when the total number of agents is unknown.

Keywords: game theory, mechanism design, cost sharing, false-name proofness

Procedia PDF Downloads 27
5236 Interaction between Kazal-Type Serine Proteinase Inhibitor SPIPm2 and Cyclophilin A from the Black Tiger Shrimp Penaeus monodon

Authors: Sirikwan Ponprateep, Anchalee Tassanakajon, Vichien Rimphanitchayakit

Abstract:

A Kazal-type serine proteinase inhibitor, SPIPm2, was abundantly expressed in the hemocytes and secreted into shrimp plasma has anti-viral property against white spot syndrome virus (WSSV). To discover the molecular mechanism of antiviral activity, the binding assay showed that SPIPm2 bind to the components of viral particle and shrimp hemocyte. From our previous report, viral target protein of SPIPm2 was identified, namely WSV477 using yeast two-hybrid screening. WSV477 is an early gene product of WSSV and involved in viral propagation. In this study, the co-immunoprecipitation technique and Tandem Mass Spectrometry (LC-MS/MS) was used to identify the target protein of SPIPm2 from shrimp hemocyte. The target protein of SPIPm2 was cyclophilin A. In vertebrate, cyclophilin A or peptidylprolyl isomerase A was reported to be the immune suppressor interacted with cyclosporin A involved in immune defense response. The recombinant cyclophilin A from Penaeus monodon (rPmCypA) was produced in E.coli system and purified using Ni-NTA column to confirm the protein-protein interaction. In vitro pull-down assay showed the interaction between rSPIPm2 and rPmCypA. To study the biological function of these proteins, the expression analysis of immune gene in shrimp defense pathways will be investigated after rPmCypA administration.

Keywords: cyclophilin A, protein-protein interaction, Kazal-type serine proteinase inhibitor, Penaeus monodon

Procedia PDF Downloads 210
5235 Socio-Economic Factors Influencing the Use of Coping Strategies among Conflict Actors (Farmers and Herders) in Giron Masa Village, Kebbi State, Nigeria

Authors: S. Umar, B. F. Umar

Abstract:

This study was conducted at Giron Masa village, located 30 km from Yauri town. The study determines the socio-economic factors influencing the use of coping strategies among farmers and herders during post-conflict situation. Simple random sampling was employed to select one hundred respondents (50 farmers and 50 herders) from the study area. Logistic regression analysis (LR) was used to ascertain the socioeconomic variables that influenced the use of the coping strategies. The results of the study shows that age, income, family size and farming experience were individually significant and thus influenced the use of POCS by farmers. Annual income and production system influenced the use of POCS by herders. Age, farm size and farming experience were found to be individually significant in influencing the use of EOCS among farmers. Specifically, years of occupation experience among the herders increased the use of emotion oriented coping strategies among herders. The use of SSCS among farmers was influenced by educational level; farm size and farming experience, while the variables are not collectively significant in influencing the use of SSCS among the herders. The research recommends a need to adopt the strategy of community coping to cope with stress.

Keywords: farmers, herders, conflict, coping strategies

Procedia PDF Downloads 344
5234 Towards the Use of Innovative Teaching Methodologies in Nursing Education : A South African Study

Authors: R. Bhagwan, M. Subbhan

Abstract:

Nursing is a very challenging field in South Africa and due to the burden of disease it is critical that nursing students are prepared with the adequate knowledge and skills to deliver effective patient care. Despite this very little research has been done on the teaching strategies used by nurse educators to teach nursing students. It is in this context that a survey of all nurse educators at Nursing Colleges and Universities in Kwa-Zulu Natal was undertaken (n=300) to explore what current pedagogical strategies were being used and which more creative methodologies should be implemented in relation to specific nursing content. Findings revealed that most nurse educators still utlize the lecture approach, but although believe other methodologies such as e-learning are important have not done so because of inadequate training. The recommendations made are that more creative pedagogical strategies such as simultation, portfoloios and case studies be adopted.

Keywords: creative, teaching methodologies, dydactic, nursing

Procedia PDF Downloads 576
5233 Ten Patterns of Organizational Misconduct and a Descriptive Model of Interactions

Authors: Ali Abbas

Abstract:

This paper presents a descriptive model of organizational misconduct based on observed patterns that occur before and after an ethical collapse. The patterns were classified by categorizing media articles in both "for-profit" and "not-for-profit" organizations. Based on the model parameters, the paper provides a descriptive model of various organizational deflection strategies under numerous scenarios, including situations where ethical complaints build-up, situations under which whistleblowers become more prevalent, situations where large scandals that relate to leadership occur, and strategies by which organizations deflect blame when pressure builds up or when media finds out. The model parameters start with the premise of a tolerance to double standards in unethical acts when conducted by leadership or by members of corporate governance. Following this premise, the model explains how organizations engage in discursive strategies to cover up the potential conflicts that arise, including secret agreements and weakening stakeholders who may oppose the organizational acts. Deflection strategies include "preemptive" and "post-complaint" secret agreements, absence of (or vague) documented procedures, engaging in blame and scapegoating, remaining silent on complaints until the media finds out, as well as being slow (if at all) to acknowledge misconduct and fast to cover it up. The results of this paper may be used to guide organizational leaders into the implications of such shortsighted strategies toward unethical acts, even if they are deemed legal. Validation of the model assumptions through numerous media articles is provided.

Keywords: ethical decision making, prediction, scandals, organizational strategies

Procedia PDF Downloads 83
5232 Supplier Relationship Management and Selection Strategies: A Literature Review

Authors: Priyesh Kumar Singh, S. K. Sharma, Sanjay Verma, C. Samuel

Abstract:

Supplier Relationship Management (SRM), is strategic planning and managing of all interactions with suppliers to maximize its value. Its application varies from construction industries to healthcare system and investment banks to aviation industries. Several buyer-supplier relationship models, as well as supplier selection and evaluation strategies, have been documented by many academicians and researchers. In this paper, through a comprehensive literature review of over 30 published papers, different theoretical models, empirical data and conclusions were analysed relating to SRM to find its role in establishing better supplier relationships. These journal articles were searched by using the keyword “supplier relationship management,” in databases of Mendeley Library, ProQuest, EBSCO and Google Scholar. This paper reviews the academic literature on different relationship models, supplier evaluation, and selection strategies to discuss its implications in different situations. It also describes the dominant factors responsible for buyer-supplier relationships such trust and power. Finally, conclusions have been drawn which can be validated by various researchers and can help practitioners in industries.

Keywords: supplier relationship management, supplier performance, supplier evaluation, supplier selection strategies

Procedia PDF Downloads 227
5231 Strategies for the Development of Cultural Intelligence in the Foreign Language Classroom

Authors: Azucena Yearby

Abstract:

This study examined if cultural intelligence can be developed through the study of a foreign language. Specifically, the study sought to determine if strategies such as the Arts/History, Vocabulary and Real or Simulated Experiences have an effect on the development of cultural intelligence in the foreign language classroom. Students enrolled in Spanish 1114 or level 1 Spanish courses at the University of Central Oklahoma (UCO) completed Linn Van Dyne’s 20-item questionnaire that measures Cultural Intelligence (CQ). Results from the study indicated a slight cultural intelligence increase in those students who received an intervention. Therefore, the study recommended that foreign language educators implement the considered strategies in the classroom in order to increase their students’ cultural intelligence.

Keywords: cultural competency, cultural intelligence, foreign language, language

Procedia PDF Downloads 441
5230 Enhancing Email Security: A Multi-Layered Defense Strategy Approach and an AI-Powered Model for Identifying and Mitigating Phishing Attacks

Authors: Anastasios Papathanasiou, George Liontos, Athanasios Katsouras, Vasiliki Liagkou, Euripides Glavas

Abstract:

Email remains a crucial communication tool due to its efficiency, accessibility and cost-effectiveness, enabling rapid information exchange across global networks. However, the global adoption of email has also made it a prime target for cyber threats, including phishing, malware and Business Email Compromise (BEC) attacks, which exploit its integral role in personal and professional realms in order to perform fraud and data breaches. To combat these threats, this research advocates for a multi-layered defense strategy incorporating advanced technological tools such as anti-spam and anti-malware software, machine learning algorithms and authentication protocols. Moreover, we developed an artificial intelligence model specifically designed to analyze email headers and assess their security status. This AI-driven model examines various components of email headers, such as "From" addresses, ‘Received’ paths and the integrity of SPF, DKIM and DMARC records. Upon analysis, it generates comprehensive reports that indicate whether an email is likely to be malicious or benign. This capability empowers users to identify potentially dangerous emails promptly, enhancing their ability to avoid phishing attacks, malware infections and other cyber threats.

Keywords: email security, artificial intelligence, header analysis, threat detection, phishing, DMARC, DKIM, SPF, ai model

Procedia PDF Downloads 15
5229 Engineering the Human Mind: Social Engineering Attack Using Kali Linux

Authors: Joy Winston James, Abdul Kadher Jilani

Abstract:

This review article provides a comprehensive overview of social engineering attacks, specifically those executed through the Kali Linux operating system. It aims to present an in-depth analysis of the background and importance of social engineering in cybersecurity, the tools, and techniques used in these attacks, real-world case studies that demonstrate their effectiveness, and ethical considerations that need to be taken into account while using them. The article highlights the Kali Linux tools that are commonly used in social engineering attacks, including SET, Metasploit, and BeEF, and discusses techniques such as phishing, pretexting, and baiting that are crucial in conducting successful social engineering attacks. It further explores real-world case studies that demonstrate the effectiveness of these techniques, emphasizing the importance of implementing effective countermeasures to reduce the risk of successful social engineering attacks. Moreover, the article sheds light on ethical considerations that need to be taken into account while using social engineering tools, emphasizing the importance of using them ethically and legally. Finally, the article provides potential countermeasures such as two-factor authentication, strong password policies, and regular security audits to help individuals and organizations better protect themselves against this growing threat. By understanding the tools and techniques used in social engineering attacks and implementing appropriate countermeasures, individuals and organizations can minimize the risk of successful social engineering attacks and improve their cybersecurity posture. To illustrate the effectiveness of social engineering attacks, we present real-world case studies that demonstrate how easily individuals and organizations can fall prey to these attacks. We also discuss ethical considerations that must be taken into account while using social engineering tools, emphasizing the need for responsible and legal use of these tools.

Keywords: pen testing, hacking, Kali Linux, social engineering

Procedia PDF Downloads 57
5228 Strategies for E-Waste Management: A Literature Review

Authors: Linh Thi Truc Doan, Yousef Amer, Sang-Heon Lee, Phan Nguyen Ky Phuc

Abstract:

During the last few decades, with the high-speed upgrade of electronic products, electronic waste (e-waste) has become one of the fastest growing wastes of the waste stream. In this context, more efforts and concerns have already been placed on the treatment and management of this waste. To mitigate their negative influences on the environment and society, it is necessary to establish appropriate strategies for e-waste management. Hence, this paper aims to review and analysis some useful strategies which have been applied in several countries to handle e-waste. Future perspectives on e-waste management are also suggested. The key findings found that, to manage e-waste successfully, it is necessary to establish effective reverse supply chains for e-waste, and raise public awareness towards the detrimental impacts of e-waste. The result of the research provides valuable insights to governments, policymakers in establishing e-waste management in a safe and sustainable manner.

Keywords: e-waste, e-waste management, life cycle assessment, recycling regulations

Procedia PDF Downloads 240
5227 Computer Assisted Strategies Help to Pharmacist

Authors: Komal Fizza

Abstract:

All around the world in every field professionals are taking great support from their computers. Computer assisted strategies not only increase the efficiency of the professionals but also in case of healthcare they help in life-saving interventions. The background of this current research is aimed towards two things; first to find out if computer assisted strategies are useful for Pharmacist for not and secondly how much these assist a Pharmacist to do quality interventions. Shifa International Hospital is a 500 bedded hospital, and it is running Antimicrobial Stewardship, during their stewardship rounds pharmacists observed that a lot of wrong doses of antibiotics were coming at times those were being overlooked by the other pharmacist even. So, with the help of MIS team the patients were categorized into adult and peads depending upon their age. Minimum and maximum dose of every single antibiotic present in the pharmacy that could be dispensed to the patient was developed. These were linked to the order entry window. So whenever pharmacist would type any order and the dose would be below or above the therapeutic limit this would give an alert to the pharmacist. Whenever this message pop-up this was recorded at the back end along with the antibiotic name, pharmacist ID, date, and time. From 14th of January 2015 and till 14th of March 2015 the software stopped different users 350 times. Out of this 300 were found to be major errors which if reached to the patient could have harmed them to the greater extent. While 50 were due to typing errors and minor deviations. The pilot study showed that computer assisted strategies can be of great help to the pharmacist. They can improve the efficacy and quality of interventions.

Keywords: antibiotics, computer assisted strategies, pharmacist, stewardship

Procedia PDF Downloads 464
5226 The Effect of Merger Transference on the Maintenance of a Narcissistic Patient with a History of Treatment Interruption with Previous Therapists

Authors: Mehravar Javid

Abstract:

This case study delves into the psychological complexities of a 33-year-old woman, the second of three children, whose upbringing under a critical mother and a high-expectation father has significantly shaped her psychological landscape. Exhibiting a blend of worthlessness and a grandiose self, her life is a constant struggle between idealizing her father and devaluing her mother and sisters, coupled with a fear of intimacy and a desire for merger. This internal conflict manifests in symptoms of depression, anxiety, and a pattern of forming and quitting multiple relationships, all driven by a deep-seated need for validation and approval. The therapeutic journey reveals her resistance to treatment, particularly when her defense mechanisms are challenged, reflecting a complex transference dynamic where she yearns for merger yet fears it. The treatment focuses on empathetically addressing her idealization and mirroring needs, allowing for autonomy while repairing communication gaps. This approach not only confronts her emotional deficits rooted in her family dynamics but also aids in her quest for self-identity, navigating through her feelings of emptiness, inferiority, and powerlessness. The study highlights the nuanced interplay of family influence on the development and maintenance of narcissistic traits, offering insights into the therapeutic strategies that can facilitate growth and self-awareness in similar cases.

Keywords: narcissistic personality disorder, merger transference, treatment interruption, case study, family dynamics

Procedia PDF Downloads 35
5225 Modeling and Optimal Control of Pneumonia Disease with Cost Effective Strategies

Authors: Getachew Tilahun, Oluwole Makinde, David Malonza

Abstract:

We propose and analyze a non-linear mathematical model for the transmission dynamics of pneumonia disease in a population of varying size. The deterministic compartmental model is studied using stability theory of differential equations. The effective reproduction number is obtained and also the local and global asymptotically stability conditions for the disease free and as well as for the endemic equilibria are established. The model exhibit a backward bifurcation and the sensitivity indices of the basic reproduction number to the key parameters are determined. Using Pontryagin’s maximum principle, the optimal control problem is formulated with three control strategies; namely disease prevention through education, treatment and screening. The cost effectiveness analysis of the adopted control strategies revealed that the combination of prevention and treatment is the most cost effective intervention strategies to combat the pneumonia pandemic. Numerical simulation is performed and pertinent results are displayed graphically.

Keywords: cost effectiveness analysis, optimal control, pneumonia dynamics, stability analysis, numerical simulation

Procedia PDF Downloads 297
5224 Explaining the Changes in Contentious Politics of China: A Comparative Study of Falun Gong and 'Diaosi'

Authors: Larry Lai, Evans Leung

Abstract:

Falun gong is a self-proclaimed religious group that has been under crackdown by Beijing for more than two decades. Diaosi, on the other hand, is an emerging community with members loosely connected on the internet through different online social platforms, centering around the sharing of different hobbies and interests. Diaosi community has been transformed from a potential threat to the Chinese authority for different causes to a pro-government force. This paper seeks to explain the different strategies adopted by the People's Republic of China (PRC) regime in handling these two potential threatening communities. Both communities share some obvious similarities: (1) both have massive nation-wide participation; (2) both have attempted to challenge the PRC's authority through contentious means; (3) both have high level of mobility, online or offline; and (4) both have at first been unnoticed until the threat against the PRC have taken form. But the strategies the PRC endorsed against the communities were, in many ways, different. The question is: if the strategy against Falun Gong has been an effective one, why used other strategies against Diaosi? The authors argue that the main reason for using different strategies lies in the differences between the two communities in terms of (i) the nature of the groups, and (ii) the group dynamics. Lastly, based on this analysis, the authors attempt to explore the possible strategies that the PRC would adopt against the Hong Kong cyber-world political community in light of the latest national security law in Hong Kong.

Keywords: contentious politics, Diaosi, Falun Gong, Hong Kong, People's Republic of China

Procedia PDF Downloads 119
5223 Stress and Coping Strategies: A Correlational Analysis to Profiling Maladaptive Behaviors at Work

Authors: Silvia Riva, Ezekiel Chinyio

Abstract:

Introduction: Workers in different sectors are prone to stress at varying levels. They also respond to stress in different ways. An inspiration was to study stress development amongst workers in a work dangerous setting (Construction Industry) as well as how they cope with specific stress incidences. Objective: The overarching objective of the study was to study and correlate between stress and coping strategies. The research was conducted in an organizational industrial setting, and its findings on the coping actions of construction workers are reported in this article. Methods: An online cross-sectional survey was conducted with 80 participants aged 18-62. These were working for three different construction organizations in the West Midland region of the UK. Their coping actions were assessed using the COPE Inventory (Carver, 2013) instrument while the level of stress was assessed by the Perceived Stress Scale (Cohen, 1994). Results: Out of 80 workers (20 female, 25%, mean age 40.66), positive reinterpretation (M=4.15, SD=2.60) and active coping (M=4.18, SD=2.55) were the two most adaptive strategies reported by the workers while the most frequent maladaptive behavior was mental disengagement (M=3.62, SD=2.25). Among the maladaptive tactics, alcohol and drug abuse was a significant moderator in stress reactions (t=6.12, p=.000). Conclusion: Some maladaptive strategies are adopted by construction workers to cope with stress. So, it could be argued that programs of stress prevention and control in the construction industry have a basis to develop solutions that can improve and strengthen effective interventions when workers are stressed or getting stressed.

Keywords: coping, organization, strategies, stress

Procedia PDF Downloads 181
5222 Protective Effect of Cinnamomum zeylanicum Bark Extract against Doxorubicin Induced Cardiotoxicity: A Preliminary Study

Authors: J. A. N. Sandamali, R. P. Hewawasam, K. A. P. W. Jayatilaka, L. K. B. Mudduwa

Abstract:

Introduction: Doxorubicin is widely used in the treatment of solid organ tumors and hematological malignancies, but the dose-dependent cardiotoxicity due to free radical formation compromises its clinical utility. Therapeutic strategies which enhance cellular endogenous defense systems have been identified as promising approaches to combat oxidative stress-associated conditions. Cinnamomum zeylanicum (Ceylon cinnamon) has a number antioxidant compounds, which can effectively scavenge reactive oxygen including superoxide anions, hydroxyl radicals and as well as other free radicals. Therefore, the objective of the study was to elucidate the most effective dose of Cinnamomum bark extract which ameliorates doxorubicin-induced cardiotoxicity. Materials and methods: Wistar rats were divided into seven groups of 10 animals in each. Group 1: normal control (distilled water, orally, for 14 days, 10 mL/kg saline, ip, after 16 hours fast on the 11th day); Group 2: doxorubicin control (distilled water, orally, for 14 days, 18 mg/kg doxorubicin, ip, after 16 hour fast on the 11th day); Groups 3-7: five doses of freeze dried aqueous bark extracts (0.125, 0.25, 0.5, 1.0, 2.0g/kg, orally, daily for 14 days, 18 mg/kg doxorubicin, ip, after 16 hours fast on the 11th day). Animals were sacrificed on the 15th day and blood was collected for the estimation of cardiac troponin I (cTnI), AST and LDH concentrations and myocardial tissues were collected for histopathological assessment of myocardial damage and irreversible changes were graded by developing a score. Results: cTnI concentration of groups 1-7 were 0, 161.9, 128.6, 95.9, 38, 19.41 & 12.36 pg/mL showing significant differences (p<0.05) between group 2 and groups 4-7. In groups 1-7, serum AST concentration were 26.82, 68.1, 37.18, 36.23, 26.8, 26.62 & 22.43U/L and LDH concentrations were 1166.13, 2428.84, 1658.35, 1474.34, 1277.58, 1110.21 & 974.40U/L and a significant difference (p<0.05) was observed between group 2 and groups 3-7. The maximum score for myocardial necrosis was observed in group 2. Parallel to the increase of the dosage of plant extract, a gradual reduction of the score for myocardial necrosis was observed in groups 3-7. Reversible histological changes such as vacuolation, congestion were observed in group 2 and all plant treated groups. Haemorrhages, inflammatory cell infiltrations, and interstitial oedema were observed in group 2, but absent in groups treated with higher doses of the plant extract. Discussion & Conclusion: According to the in vitro antioxidant assays performed, Cinnamomum zeylanicum (Ceylon cinnamon) bark possesses high amounts of polyphenolic substances and high antioxidant activity. The present study showed that Cinnamomum zeylanicum extract at 2.0 g/kg possesses the most significant cardioprotective effect against doxorubicin-induced cardiotoxicity. It can be postulated that pretreatment with Cinnamomum bark extract may replenish the cardiomyocytes with antioxidants that are needed for the defense against oxidative stress induced by doxorubicin.

Keywords: cardioprotection, Cinnamomum zeylanicum, doxorubicin, free radicals

Procedia PDF Downloads 138
5221 Transferring Cultural Meanings: A Case of Translation Classroom

Authors: Ramune Kasperaviciene, Jurgita Motiejuniene, Dalia Venckiene

Abstract:

Familiarising students with strategies for transferring cultural meanings (intertextual units, culture-specific idioms, culture-specific items, etc.) should be part of a comprehensive translator training programme. The present paper focuses on strategies for transferring such meanings into other languages and explores possibilities for introducing these methods and practice to translation students. The authors (university translation teachers) analyse the means of transferring cultural meanings from English into Lithuanian in a specific travel book, attribute these means to theoretically grounded strategies, and make calculations related to the frequency of adoption of specific strategies; translation students are familiarised with concepts and methods related to transferring cultural meanings and asked to put their theoretical knowledge into practice, i.e. interpret and translate certain culture-specific items from the same source text, and ground their decisions on theory; the comparison of the strategies employed by the professional translator of the source text (as identified by the authors of this study) and by the students is made. As a result, both students and teachers gain valuable experience, and new practices of conducting translation classes for a specific purpose evolve. Conclusions highlight the differences and similarities of non-professional and professional choices, summarise the possibilities for introducing methods of transferring cultural meanings to students, and round up with specific considerations of the impact of theoretical knowledge and the degree of experience on decisions made in the translation process.

Keywords: cultural meanings, culture-specific items, strategies for transferring cultural meanings, translator training

Procedia PDF Downloads 317
5220 Factors Constraining the Utilization of Risk Management Strategies in the Execution of Public Construction Projects in North East Nigeria

Authors: S. U. Kunya, S. A. Mohammad

Abstract:

Construction projects in Nigeria are characterized with risks emanating from delays and accompanying cost-overruns. The aim of the study was to identify and assess factors constraining the utilization of risk management strategies in the execution of public construction project in North-East Nigeria. Data was collected with the aid of a well-structured questionnaire administered to three identified projects in the North-east. Data collected were analysed using the severity index. Findings revealed political involvement, selection of inexperienced contractors and lack of coordinated public sector strategy as the most severe factors constraining the utilization of risk management strategies. The study recommended that: formulation of laws to prevent negative political meddling in construction projects; selection of experienced, risk-informed contractors; and comprehensive risk assessment and planning on all public construction projects.

Keywords: factors, Nigeria, north-east, public projects, risk management, strategies, utilization

Procedia PDF Downloads 486
5219 Supply Chain Management Strategies of the Private Residential Construction Sector in South Africa

Authors: R. Khoza, K. K. Govender

Abstract:

The aim of the study was to review and critically evaluate the supply chain management (SCM) strategies and challenges in the private residential construction sector in South Africa. The study was grounded in three theories, namely, theory of constraints, principal-agency theory, and stakeholder theory. A quantitative approach was used to survey 320 private residential construction companies which registered with the National Homebuilders Registration Council (NHBRC) within the Gauteng province. The data from 250 questionnaires returned were analysed using SPSS (Versions 23) and Smart PLS. It became evident that the SCM challenges included lack of trust between the supplier and the organization; lack of adoption of SCM system; lack of a sufficiently skilled SCM workforce; and poor implementation of contract management. The findings also indicate that there is a significant positive relationship between the performance of the private residential construction sector in South Africa and SCM challenges, SCM strategies and SCM processes. A framework is proposed comprising SCM practices and strategies of private residential construction sector in South Africa, which will enable them to enhance performance.

Keywords: management challenges, residential housing, South Africa, supply chain management

Procedia PDF Downloads 52
5218 Cluster-Based Exploration of System Readiness Levels: Mathematical Properties of Interfaces

Authors: Justin Fu, Thomas Mazzuchi, Shahram Sarkani

Abstract:

A key factor in technological immaturity in defense weapons acquisition is lack of understanding critical integrations at the subsystem and component level. To address this shortfall, recent research in integration readiness level (IRL) combines with technology readiness level (TRL) to form a system readiness level (SRL). SRL can be enriched with more robust quantitative methods to provide the program manager a useful tool prior to committing to major weapons acquisition programs. This research harnesses previous mathematical models based on graph theory, Petri nets, and tropical algebra and proposes a modification of the desirable SRL mathematical properties such that a tightly integrated (multitude of interfaces) subsystem can display a lower SRL than an inherently less coupled subsystem. The synthesis of these methods informs an improved decision tool for the program manager to commit to expensive technology development. This research ties the separately developed manufacturing readiness level (MRL) into the network representation of the system and addresses shortfalls in previous frameworks, including the lack of integration weighting and the over-importance of a single extremely immature component. Tropical algebra (based on the minimum of a set of TRLs or IRLs) allows one low IRL or TRL value to diminish the SRL of the entire system, which may not be reflective of actuality if that component is not critical or tightly coupled. Integration connections can be weighted according to importance and readiness levels are modified to be a cardinal scale (based on an analytic hierarchy process). Integration arcs’ importance are dependent on the connected nodes and the additional integrations arcs connected to those nodes. Lack of integration is not represented by zero, but by a perfect integration maturity value. Naturally, the importance (or weight) of such an arc would be zero. To further explore the impact of grouping subsystems, a multi-objective genetic algorithm is then used to find various clusters or communities that can be optimized for the most representative subsystem SRL. This novel calculation is then benchmarked through simulation and using past defense acquisition program data, focusing on the newly introduced Middle Tier of Acquisition (rapidly field prototypes). The model remains a relatively simple, accessible tool, but at higher fidelity and validated with past data for the program manager to decide major defense acquisition program milestones.

Keywords: readiness, maturity, system, integration

Procedia PDF Downloads 60
5217 Strategic Development of Urban Environmental Management Base on Good Governance - Case study of (Waste Management of Tehran)

Authors: A. Farhad Sadri, B. Ali Farhadi, C. Nasim Shalamzari

Abstract:

Waste management is a principle of urban and environmental governance. Waste management in Tehran metropolitan requires good strategies for better governance. Using of good urban governance principles together with eight main indexes can be an appropriate base for this aim. One of the reasonable tools in this field is usage of SWOT methods which provides possibility of comparing the opportunities, threats, weaknesses, and strengths by using IFE and EFE matrixes. The results of the above matrixes, respectively 2.533 and 2.403, show that management system of Tehran metropolitan wastes has performed weak regarding to internal factors and has not have good performance regarding using the opportunities and dealing with threats. In this research, prioritizing and describing the real value of each 24 strategies in waste management in Tehran metropolitan have been surveyed considering good governance derived from Quantitative Strategic Planning Management (QSPM) by using Kolomogrof-Smirnoff by 1.549 and significance level of 0.073 in order to define normalization of final values and all of the strategies utilities and Variance Analysis of ANOVA has been calculated for all SWOT strategies. Duncan’s test results regarding four WT, ST, WO, and SO strategies show no significant difference. In addition to mean comparison by Duncan method in this research, LSD (Lowest Significant Difference test) has been used by probability of 5% and finally, 7 strategies and final model of Tehran metropolitan waste management strategy have been defined. Increasing the confidence of people with transparency of budget, developing and improving the legal structure (rule-oriented and law governance, more responsibility about requirements of private sectors, increasing recycling rates and real effective participation of people and NGOs to improve waste management (contribution) and etc, are main available strategies which have been achieved based on good urban governance management principles.

Keywords: waste, strategy, environmental management, urban good governance, SWOT

Procedia PDF Downloads 292