CINXE.COM

Search results for: security personnel

<!DOCTYPE html> <html lang="en" dir="ltr"> <head> <!-- Google tag (gtag.js) --> <script async src="https://www.googletagmanager.com/gtag/js?id=G-P63WKM1TM1"></script> <script> window.dataLayer = window.dataLayer || []; function gtag(){dataLayer.push(arguments);} gtag('js', new Date()); gtag('config', 'G-P63WKM1TM1'); </script> <!-- Yandex.Metrika counter --> <script type="text/javascript" > (function(m,e,t,r,i,k,a){m[i]=m[i]||function(){(m[i].a=m[i].a||[]).push(arguments)}; m[i].l=1*new Date(); for (var j = 0; j < document.scripts.length; j++) {if (document.scripts[j].src === r) { return; }} k=e.createElement(t),a=e.getElementsByTagName(t)[0],k.async=1,k.src=r,a.parentNode.insertBefore(k,a)}) (window, document, "script", "https://mc.yandex.ru/metrika/tag.js", "ym"); ym(55165297, "init", { clickmap:false, trackLinks:true, accurateTrackBounce:true, webvisor:false }); </script> <noscript><div><img src="https://mc.yandex.ru/watch/55165297" style="position:absolute; left:-9999px;" alt="" /></div></noscript> <!-- /Yandex.Metrika counter --> <!-- Matomo --> <!-- End Matomo Code --> <title>Search results for: security personnel</title> <meta name="description" content="Search results for: security personnel"> <meta name="keywords" content="security personnel"> <meta name="viewport" content="width=device-width, initial-scale=1, minimum-scale=1, maximum-scale=1, user-scalable=no"> <meta charset="utf-8"> <link href="https://cdn.waset.org/favicon.ico" type="image/x-icon" rel="shortcut icon"> <link href="https://cdn.waset.org/static/plugins/bootstrap-4.2.1/css/bootstrap.min.css" rel="stylesheet"> <link href="https://cdn.waset.org/static/plugins/fontawesome/css/all.min.css" rel="stylesheet"> <link href="https://cdn.waset.org/static/css/site.css?v=150220211555" rel="stylesheet"> </head> <body> <header> <div class="container"> <nav class="navbar navbar-expand-lg navbar-light"> <a class="navbar-brand" href="https://waset.org"> <img src="https://cdn.waset.org/static/images/wasetc.png" alt="Open Science Research Excellence" title="Open Science Research Excellence" /> </a> <button class="d-block d-lg-none navbar-toggler ml-auto" type="button" data-toggle="collapse" data-target="#navbarMenu" aria-controls="navbarMenu" aria-expanded="false" aria-label="Toggle navigation"> <span class="navbar-toggler-icon"></span> </button> <div class="w-100"> <div class="d-none d-lg-flex flex-row-reverse"> <form method="get" action="https://waset.org/search" class="form-inline my-2 my-lg-0"> <input class="form-control mr-sm-2" type="search" placeholder="Search Conferences" value="security personnel" name="q" aria-label="Search"> <button class="btn btn-light my-2 my-sm-0" type="submit"><i class="fas fa-search"></i></button> </form> </div> <div class="collapse navbar-collapse mt-1" id="navbarMenu"> <ul class="navbar-nav ml-auto align-items-center" id="mainNavMenu"> <li class="nav-item"> <a class="nav-link" href="https://waset.org/conferences" title="Conferences in 2024/2025/2026">Conferences</a> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/disciplines" title="Disciplines">Disciplines</a> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/committees" rel="nofollow">Committees</a> </li> <li class="nav-item dropdown"> <a class="nav-link dropdown-toggle" href="#" id="navbarDropdownPublications" role="button" data-toggle="dropdown" aria-haspopup="true" aria-expanded="false"> Publications </a> <div class="dropdown-menu" aria-labelledby="navbarDropdownPublications"> <a class="dropdown-item" href="https://publications.waset.org/abstracts">Abstracts</a> <a class="dropdown-item" href="https://publications.waset.org">Periodicals</a> <a class="dropdown-item" href="https://publications.waset.org/archive">Archive</a> </div> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/page/support" title="Support">Support</a> </li> </ul> </div> </div> </nav> </div> </header> <main> <div class="container mt-4"> <div class="row"> <div class="col-md-9 mx-auto"> <form method="get" action="https://publications.waset.org/abstracts/search"> <div id="custom-search-input"> <div class="input-group"> <i class="fas fa-search"></i> <input type="text" class="search-query" name="q" placeholder="Author, Title, Abstract, Keywords" value="security personnel"> <input type="submit" class="btn_search" value="Search"> </div> </div> </form> </div> </div> <div class="row mt-3"> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Commenced</strong> in January 2007</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Frequency:</strong> Monthly</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Edition:</strong> International</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Paper Count:</strong> 3387</div> </div> </div> </div> <h1 class="mt-3 mb-3 text-center" style="font-size:1.6rem;">Search results for: security personnel</h1> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">3387</span> The Effect of Experimentally Induced Stress on Facial Recognition Ability of Security Personnel’s</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Zunjarrao%20Kadam">Zunjarrao Kadam</a>, <a href="https://publications.waset.org/abstracts/search?q=Vikas%20Minchekar"> Vikas Minchekar</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The facial recognition is an important task in criminal investigation procedure. The security guards-constantly watching the persons-can help to identify the suspected accused. The forensic psychologists are tackled such cases in the criminal justice system. The security personnel may loss their ability to correctly identify the persons due to constant stress while performing the duty. The present study aimed at to identify the effect of experimentally induced stress on facial recognition ability of security personnel’s. For this study 50, security guards from Sangli, Miraj & Jaysingpur city of the Maharashtra States of India were recruited in the experimental study. The randomized two group design was employed to carry out the research. In the initial condition twenty identity card size photographs were shown to both groups. Afterward, artificial stress was induced in the experimental group through the difficultpuzzle-solvingtask in a limited period. In the second condition, both groups were presented earlier photographs with another additional thirty new photographs. The subjects were asked to recognize the photographs which are shown earliest. The analyzed data revealed that control group has ahighest mean score of facial recognition than experimental group. The results were discussed in the present research. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=experimentally%20induced%20stress" title="experimentally induced stress">experimentally induced stress</a>, <a href="https://publications.waset.org/abstracts/search?q=facial%20recognition" title=" facial recognition"> facial recognition</a>, <a href="https://publications.waset.org/abstracts/search?q=cognition" title=" cognition"> cognition</a>, <a href="https://publications.waset.org/abstracts/search?q=security%20personnel" title=" security personnel"> security personnel</a> </p> <a href="https://publications.waset.org/abstracts/60784/the-effect-of-experimentally-induced-stress-on-facial-recognition-ability-of-security-personnels" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/60784.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">261</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">3386</span> The Benefits of Security Culture for Improving Physical Protection Systems at Detection and Radiation Measurement Laboratory</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Ari%20S.%20Prabowo">Ari S. Prabowo</a>, <a href="https://publications.waset.org/abstracts/search?q=Nia%20Febriyanti"> Nia Febriyanti</a>, <a href="https://publications.waset.org/abstracts/search?q=Haryono%20B.%20Santosa"> Haryono B. Santosa</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Security function that is called as Physical Protection Systems (PPS) has functions to detect, delay and response. Physical Protection Systems (PPS) in Detection and Radiation Measurement Laboratory needs to be improved continually by using internal resources. The nuclear security culture provides some potentials to support this research. The study starts by identifying the security function’s weaknesses and its strengths of security culture as a purpose. Secondly, the strengths of security culture are implemented in the laboratory management. Finally, a simulation was done to measure its effectiveness. Some changes were happened in laboratory personnel behaviors and procedures. All became more prudent. The results showed a good influence of nuclear security culture in laboratory security functions. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=laboratory" title="laboratory">laboratory</a>, <a href="https://publications.waset.org/abstracts/search?q=physical%20protection%20system" title=" physical protection system"> physical protection system</a>, <a href="https://publications.waset.org/abstracts/search?q=security%20culture" title=" security culture"> security culture</a>, <a href="https://publications.waset.org/abstracts/search?q=security%20function" title=" security function"> security function</a> </p> <a href="https://publications.waset.org/abstracts/102746/the-benefits-of-security-culture-for-improving-physical-protection-systems-at-detection-and-radiation-measurement-laboratory" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/102746.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">185</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">3385</span> A Study on Personnel Commitment Factors in Hafes Hospital</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Farzaneh%20Bayat">Farzaneh Bayat</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Successful and effective presence in regional and global markets along with optimal use of available utilities and proper utilization of new sources for offering desirable services based on customer satisfaction is inevitable. Commitment has a significant role in offering optimal services. Offering high quality job and desirable services to the customers are personnel’s commitment. Thus, Shiraz Chamran Hospital which is affiliated with Shiraz Medical School and is one of the orthopedic poles in southern Iran was studied. This hospital has 750 personnel and physicians which a sample of 200 of them were chosen as the statistic society for a 5 month period from June to November 2009. Main variables in this decision are: responsibility and responsiveness, job security, team work, task autonomy, gradation opportunity, information sharing, payments and commitment. The study approach is descriptive-correlative. With applied and segmental nature of the tests and statistic analysis, the 7 hypotheses were approved with 95% of certainty. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=commitment" title="commitment">commitment</a>, <a href="https://publications.waset.org/abstracts/search?q=information%20sharing" title=" information sharing"> information sharing</a>, <a href="https://publications.waset.org/abstracts/search?q=responsibility%20and%20responsiveness" title=" responsibility and responsiveness"> responsibility and responsiveness</a>, <a href="https://publications.waset.org/abstracts/search?q=job%20security" title=" job security"> job security</a>, <a href="https://publications.waset.org/abstracts/search?q=task%20autonomy" title=" task autonomy"> task autonomy</a> </p> <a href="https://publications.waset.org/abstracts/29959/a-study-on-personnel-commitment-factors-in-hafes-hospital" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/29959.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">340</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">3384</span> A Study of Behaviors in Using Social Networks of Corporate Personnel of Suan Sunandha Rajabhat University</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Wipada%20Chaiwchan">Wipada Chaiwchan</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This research aims to study behaviors in using social networks of Corporate personnel of Suan Sunandha Rajabhat University. The sample used in the study were two groups: 1) Academic Officer 70 persons and 2) Operation Officer 143 persons were used in this study. The tools in this research consisted of questionnaire which the data were analyzed by using percentage, average (X) and Standard deviation (S.D.) and Independent Sample T-Test to test the difference between the mean values obtained from two independent samples, and One-way anova to analysis of variance, and Multiple comparisons to test that the average pair of different methods by Fisher’s Least Significant Different (LSD). The study result found that the most of corporate personnel have purpose in using social network to information awareness aspect was knowledge and online conference with social media. By using the average more than 3 hours per day in everyday. Using time in working in one day and there are computers connected to the Internet at home, by using the communication in the operational processes. Behaviors using social networks in relation to gender, age, job title, department, and type of personnel. Hypothesis testing, and analysis of variance for the effects of this analysis is divided into three aspects: The use of online social networks, the attitude of the users and the security analysis has found that Corporate Personnel of Suan Sunandha Rajabhat University. Overall and specifically at the high level, and considering each item found all at a high level. By sorting of the social network (X=3.22), The attitude of the users (X= 3.06) and the security (X= 3.11). The overall behaviors using of each side (X=3.11). <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=social%20network" title="social network">social network</a>, <a href="https://publications.waset.org/abstracts/search?q=behaviors" title=" behaviors"> behaviors</a>, <a href="https://publications.waset.org/abstracts/search?q=social%20media" title=" social media"> social media</a>, <a href="https://publications.waset.org/abstracts/search?q=computer%20information%20systems" title=" computer information systems"> computer information systems</a> </p> <a href="https://publications.waset.org/abstracts/19563/a-study-of-behaviors-in-using-social-networks-of-corporate-personnel-of-suan-sunandha-rajabhat-university" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/19563.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">394</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">3383</span> Awareness of Child Rights as a Determinant of Effective Student Personnel Services in Public Secondary Schools in Southwestern Nigeria</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Ademola%20Ibukunolu%20Atanda">Ademola Ibukunolu Atanda</a>, <a href="https://publications.waset.org/abstracts/search?q=Gbenga%20Nathaniel%20Adeola"> Gbenga Nathaniel Adeola</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The study examined awareness of child rights as a determinant of effective student personnel services in public secondary schools in Southwestern Nigeria. It was survey research. The sample comprised 433 teachers, 137 school administrators, and 968 students who were drawn by simple random sampling techniques. The respondents were given copies of questionnaires tagged “school administrator/teacher’s awareness of child’s rights and student personnel services elements inventory.” Key Informant Interview (KII) was also employed. The data were analysed using frequency count, percentages, weighted average, grand mean, standard deviation, and Pearson Product Moment Correlation, while KII was qualitatively analysed. The findings of the study revealed that public secondary school administrator awareness of child rights was at a moderate level, but the awareness of child rights was low among the teachers. The study equally revealed that student personnel services are moderately provided in public secondary schools in Southwestern Nigeria, but security remains a major challenge. It was also found that there was a significant relationship between awareness of child rights and effective student personnel services. It was therefore recommended, based on the findings, that attention should be given to heightening awareness of child rights among public secondary school administrators and teachers for effective student personnel services. Copies of the Child Right Act 2003 should also be made available in all public secondary schools in Southwestern Nigeria, as the study revealed that the documents were not available. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=student%20personnel" title="student personnel">student personnel</a>, <a href="https://publications.waset.org/abstracts/search?q=child%20right" title=" child right"> child right</a>, <a href="https://publications.waset.org/abstracts/search?q=administrator%20awareness" title=" administrator awareness"> administrator awareness</a>, <a href="https://publications.waset.org/abstracts/search?q=practice%20of%20child%20right" title=" practice of child right"> practice of child right</a> </p> <a href="https://publications.waset.org/abstracts/161453/awareness-of-child-rights-as-a-determinant-of-effective-student-personnel-services-in-public-secondary-schools-in-southwestern-nigeria" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/161453.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">146</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">3382</span> Ethics and Military Defections in Nonviolent Resistance Campaigns </h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Adi%20Levy">Adi Levy</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Military and security personnel defections during nonviolent resistance (NVR) campaigns are recognized as an effective way of undermining the regime’s power, but they also may generate moral dilemmas that contradict the moral standing of NVR tactics. NVR campaigns have been primarily praised for their adherence to moral and legal norms, yet some of NVR tactics raise serious ethical concerns. This paper focuses on NVR tactics that seek to promote defections and disobedience within military and security personnel to sustain their campaign. Academic literature regarding NVR tactics indicates that compared to violent forms of resistance, defections are more likely to occur when security forces confront nonviolent activists. Indeed, defections play a strategically fundamental role in nonviolent campaigns, particularly against authoritarian regimes, as it enables activists to undermine the regime’s central pillars of support. This study examines the events of the Arab Spring and discusses the ethical problems that arise in nonviolent activists’ promotion of defections and disobedience. The cases of Syria and Egypt suggest that the strategic promotion of defections and disobedience was significantly effective in sustaining the campaign. Yet, while such defections enhance nonviolent activists’ resilience, how they are promoted can be morally contentious and the consequences can be dire. Defections are encouraged by social, moral and emotional appeals that use the power disparities between unarmed civilians and powerful regimes to affect soldiers and security personnel’s process of decision-making. In what is commonly referred to as dilemma action, nonviolent activists deliberately entangle security forces in a moral dilemma that compels them to follow a moral code to protect unarmed civilians. In this way, activists sustain their struggle and even gain protection. Nonviolent activists are likely to be completely defeated when confronted with armed forces. Therefore they rely on the military and security personnel’s moral conscious of convincing them to refrain from using force against them. While this is effective, it also leaves soldiers and security forces exposed to the implications and punishments that might follow their disobedience or defection. As long as they remain nonviolent, activists enjoy civilian immunity despite using morally contentious tactics. But the severe implications brought upon defectors. As a result, demand a deep examination of this tactic’s moral permissibility and a discussion that assesses culpability for the moral implications of its application. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=culpability" title="culpability">culpability</a>, <a href="https://publications.waset.org/abstracts/search?q=defections" title=" defections"> defections</a>, <a href="https://publications.waset.org/abstracts/search?q=nonviolence" title=" nonviolence"> nonviolence</a>, <a href="https://publications.waset.org/abstracts/search?q=permissibility" title=" permissibility"> permissibility</a> </p> <a href="https://publications.waset.org/abstracts/117792/ethics-and-military-defections-in-nonviolent-resistance-campaigns" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/117792.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">117</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">3381</span> Personnel Marketing as Perceived by HR Managers in Czech Republic: Results of a Qualitative Research Study </h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Luk%C3%A1%C5%A1%20Maz%C3%A1nek">Lukáš Mazánek</a>, <a href="https://publications.waset.org/abstracts/search?q=Zde%C5%88ka%20Kone%C4%8Dn%C3%A1"> Zdeňka Konečná</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The article is devoted to the area of personnel marketing. A comprehensive review of scientific literature and articles published predominantly in personnel-oriented journals was carried out, followed by a qualitative exploratory research with the aim to explore and explain the perception of personnel marketing. Due to the lack of research in this field in Czech Republic, we have focused on Czech HR managers, more specifically, on how they understand the tasks of personnel marketing, which tools they use and whether the companies they work for try to be a preferred employer. The answers from our respondents were used to help us determine what is important within this field. All of the respondents strive to be a preferred employer and try to achieve it by using an extensive range of marketing tools. The most frequently used tools are advertising, job fairs presentations, employee care and employer brand promotion. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=Czech%20Republic" title="Czech Republic">Czech Republic</a>, <a href="https://publications.waset.org/abstracts/search?q=personnel%20marketing" title=" personnel marketing"> personnel marketing</a>, <a href="https://publications.waset.org/abstracts/search?q=preferred%20employer" title=" preferred employer"> preferred employer</a>, <a href="https://publications.waset.org/abstracts/search?q=qualitative%20research%20study" title=" qualitative research study"> qualitative research study</a> </p> <a href="https://publications.waset.org/abstracts/48385/personnel-marketing-as-perceived-by-hr-managers-in-czech-republic-results-of-a-qualitative-research-study" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/48385.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">339</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">3380</span> Protection of the Object of the Critical Infrastructure in the Czech Republic</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Michaela%20Va%C5%A1kov%C3%A1">Michaela Vašková</a> </p> <p class="card-text"><strong>Abstract:</strong></p> With the increasing dependence of countries on the critical infrastructure, it increases their vulnerability. Big threat is primarily in the human factor (personnel of the critical infrastructure) and in terrorist attacks. It emphasizes the development of methodology for searching of weak points and their subsequent elimination. This article discusses methods for the analysis of safety in the objects of critical infrastructure. It also contains proposal for methodology for training employees of security services in the objects of the critical infrastructure and developing scenarios of attacks on selected objects of the critical infrastructure. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=critical%20infrastructure" title="critical infrastructure">critical infrastructure</a>, <a href="https://publications.waset.org/abstracts/search?q=object%20of%20critical%20infrastructure" title=" object of critical infrastructure"> object of critical infrastructure</a>, <a href="https://publications.waset.org/abstracts/search?q=protection" title=" protection"> protection</a>, <a href="https://publications.waset.org/abstracts/search?q=safety" title=" safety"> safety</a>, <a href="https://publications.waset.org/abstracts/search?q=security" title=" security"> security</a>, <a href="https://publications.waset.org/abstracts/search?q=security%20audit" title=" security audit"> security audit</a> </p> <a href="https://publications.waset.org/abstracts/39230/protection-of-the-object-of-the-critical-infrastructure-in-the-czech-republic" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/39230.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">345</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">3379</span> A Game Theory Analysis of the Effectiveness of Passenger Profiling for Transportation Security</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Yael%20Deutsch">Yael Deutsch</a>, <a href="https://publications.waset.org/abstracts/search?q=Arieh%20Gavious"> Arieh Gavious</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The threat of aviation terrorism and its potential damage became significant after the 9/11 terror attacks. These attacks have led authorities and leaders to suggest that security personnel should overcome politically correct scruples about profiling and use it openly. However, there is a lack of knowledge about the smart usage of profiling and its advantages. We analyze game models that are suitable to specific real-world scenarios, focusing on profiling as a tool to detect potential violators, such as terrorists and smugglers. We provide analytical and clear answers to difficult questions, and by that help fighting against harmful violation acts. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=game%20theory" title="game theory">game theory</a>, <a href="https://publications.waset.org/abstracts/search?q=profiling" title=" profiling"> profiling</a>, <a href="https://publications.waset.org/abstracts/search?q=security" title=" security"> security</a>, <a href="https://publications.waset.org/abstracts/search?q=nash%20equilibrium" title=" nash equilibrium"> nash equilibrium</a> </p> <a href="https://publications.waset.org/abstracts/150701/a-game-theory-analysis-of-the-effectiveness-of-passenger-profiling-for-transportation-security" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/150701.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">109</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">3378</span> Work Happiness for Personnel of Suan Sunandha Rajabhat University</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Adisai%20Thovicha">Adisai Thovicha</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This study is the survey research, designed to study the work happiness level of personnel at Suan Sunandha Rajabhat University. The sample group consisted of 329 personnel. The results were collected by stratified sampling, using work positions for each stage. The results were analyzed and calculated by computer program. Statistics used during analyzing were percentage, mean, and standard deviation. From the study, the work happiness level of personnel were in very high score range in both overall and specific category. The top category which received the most score was positive attitude, work satisfaction, life satisfaction, and negative attitude. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=work%20happiness" title="work happiness">work happiness</a>, <a href="https://publications.waset.org/abstracts/search?q=Suan%20Sunandha%20Rajabhat%20University" title=" Suan Sunandha Rajabhat University"> Suan Sunandha Rajabhat University</a>, <a href="https://publications.waset.org/abstracts/search?q=personnel" title=" personnel"> personnel</a>, <a href="https://publications.waset.org/abstracts/search?q=positive%20attitude" title=" positive attitude"> positive attitude</a> </p> <a href="https://publications.waset.org/abstracts/10534/work-happiness-for-personnel-of-suan-sunandha-rajabhat-university" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/10534.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">375</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">3377</span> Attitudes of Health Personnel towards Patients as Expressed by Literate Adults in Ilorin Metropolis, Kwara State: Implications for Counseling</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Yahaya%20Lasiele%20Alabi">Yahaya Lasiele Alabi</a>, <a href="https://publications.waset.org/abstracts/search?q=Odebode%20Aminat%20Adeola"> Odebode Aminat Adeola</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Attitudes of health personnel usually influence the speed of recovery. It is essential that professional counsellors investigate the attitude of health personnel toward patients. In view of this, this study examined attitudes of health personnel towards patients as expressed by literate adults in Ilorin metropolis, Kwara State. The study also examined the influence of gender, age, and educational qualification on the respondents’ views. A self designed instrument tittled ‘Attitude of Health Personnel towards Patients Questionnaire (AHPPQ)’ was used to collect data from six hundred respondents, who were selected through a two-stage sampling procedure. Four research questions were constructed while three null hypotheses were formulated and tested using t-test and ANOVA at 0.05 alpha level. The findings of the study showed that literate adults in Ilorin metropolis expressed that health personnel have negative attitude towards patients. It was also found out that there was no significant difference in the attitude of health personnel towards Patients as expressed by literate adults in Ilorin metropolis on the basis of gender, age, and educational qualification. Based on the findings of this study, recommendations were made that Government should formulate policies and laws that will promote disposition of positive attitudes toward patients by health personnel. Health Counsellors should be employed and involved in organisation of seminars and workshops from time to time in order to encourage health personnel to interract positively with patients. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=attitude" title="attitude">attitude</a>, <a href="https://publications.waset.org/abstracts/search?q=health%20personnel" title=" health personnel"> health personnel</a>, <a href="https://publications.waset.org/abstracts/search?q=patients" title=" patients"> patients</a>, <a href="https://publications.waset.org/abstracts/search?q=Kwara%20State" title=" Kwara State"> Kwara State</a> </p> <a href="https://publications.waset.org/abstracts/28262/attitudes-of-health-personnel-towards-patients-as-expressed-by-literate-adults-in-ilorin-metropolis-kwara-state-implications-for-counseling" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/28262.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">571</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">3376</span> Climbing up to Safety and Security: The Facilitation of an NGO Awareness Culture</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Mirad%20B%C3%B6hm">Mirad Böhm</a>, <a href="https://publications.waset.org/abstracts/search?q=Diede%20De%20Kok"> Diede De Kok</a> </p> <p class="card-text"><strong>Abstract:</strong></p> It goes without saying that for many NGOs a high level of safety and security are crucial issues, which often necessitates the support of military personnel to varying degrees. The relationship between military and NGO personnel is usually a difficult one and while there has been progress, clashes naturally still occur owing to different interpretations of mission objectives amongst many other challenges. NGOs tend to view safety and security as necessary steps towards their goal instead of fundamental pillars of their core ‘business’. The military perspective, however, considers them primary objectives; thus, frequently creating a different vision of how joint operations should be conducted. This paper will argue that internalizing safety and security into the NGO organizational culture is compelling in order to ensure a more effective cooperation with military partners and, ultimately, to achieve their goals. This can be accomplished through a change in perception of safety and security concepts as a fixed and major point on the everyday agenda. Nowadays, there are several training programmes on offer addressing such issues but they primarily focus on the individual level. True internalization of these concepts should reach further by encompassing a wide range of NGO activities, beginning with daily proceedings in office facilities far from conflict zones including logistical and administrative tasks such as budgeting, and leading all the way to actual and potentially hazardous missions in the field. In order to effectuate this change, a tool is required to help NGOs realize, firstly, how they perceive and define safety and security, and secondly, how they can adjust this perception to their benefit. The ‘safety culture ladder’ is a concept that suggests what organizations can and should do to advance their safety. While usually applied to private industrial scenarios, this work will present the concept as a useful instrument to visualize and facilitate the internalization process NGOs ought to go through. The ‘ladder’ allows them to become more aware of the level of their safety and security measures, and moreover, cautions them to take these measures proactively rather than reactively. This in turn will contribute to a rapprochement between military and NGO priority setting in regard to what constitutes a safe working environment. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=NGO-military%20cooperation" title="NGO-military cooperation">NGO-military cooperation</a>, <a href="https://publications.waset.org/abstracts/search?q=organisational%20culture" title=" organisational culture"> organisational culture</a>, <a href="https://publications.waset.org/abstracts/search?q=safety%20and%20security%20awareness" title=" safety and security awareness"> safety and security awareness</a>, <a href="https://publications.waset.org/abstracts/search?q=safety%20culture%20ladder" title=" safety culture ladder"> safety culture ladder</a> </p> <a href="https://publications.waset.org/abstracts/33046/climbing-up-to-safety-and-security-the-facilitation-of-an-ngo-awareness-culture" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/33046.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">331</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">3375</span> Optimization of Personnel Selection Problems via Unconstrained Geometric Programming</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Vildan%20Kistik">Vildan Kistik</a>, <a href="https://publications.waset.org/abstracts/search?q=Tuncay%20Can"> Tuncay Can</a> </p> <p class="card-text"><strong>Abstract:</strong></p> From a business perspective, cost and profit are two key factors for businesses. The intent of most businesses is to minimize the cost to maximize or equalize the profit, so as to provide the greatest benefit to itself. However, the physical system is very complicated because of technological constructions, rapid increase of competitive environments and similar factors. In such a system it is not easy to maximize profits or to minimize costs. Businesses must decide on the competence and competence of the personnel to be recruited, taking into consideration many criteria in selecting personnel. There are many criteria to determine the competence and competence of a staff member. Factors such as the level of education, experience, psychological and sociological position, and human relationships that exist in the field are just some of the important factors in selecting a staff for a firm. Personnel selection is a very important and costly process in terms of businesses in today's competitive market. Although there are many mathematical methods developed for the selection of personnel, unfortunately the use of these mathematical methods is rarely encountered in real life. In this study, unlike other methods, an exponential programming model was established based on the possibilities of failing in case the selected personnel was started to work. With the necessary transformations, the problem has been transformed into unconstrained Geometrical Programming problem and personnel selection problem is approached with geometric programming technique. Personnel selection scenarios for a classroom were established with the help of normal distribution and optimum solutions were obtained. In the most appropriate solutions, the personnel selection process for the classroom has been achieved with minimum cost. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=geometric%20programming" title="geometric programming">geometric programming</a>, <a href="https://publications.waset.org/abstracts/search?q=personnel%20selection" title=" personnel selection"> personnel selection</a>, <a href="https://publications.waset.org/abstracts/search?q=non-linear%20programming" title=" non-linear programming"> non-linear programming</a>, <a href="https://publications.waset.org/abstracts/search?q=operations%20research" title=" operations research"> operations research</a> </p> <a href="https://publications.waset.org/abstracts/70257/optimization-of-personnel-selection-problems-via-unconstrained-geometric-programming" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/70257.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">271</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">3374</span> Capacity Building and Motivation as Determinants of Productivity among Library Personnel in Colleges of Education in Southwest, Nigeria</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=E.%20K.%20Soyele">E. K. Soyele</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This study is on capacity building and motivation as determinants of productivity among library personnel in colleges of education in South West, Nigeria. This study made use of a descriptive research design of survey type. A total enumeration sampling technique was used for the selected sample. The research sample consisted of 40 library personnel. The instrument used for the study was a structured questionnaire divided into four parts. Statistics data analysis used were descriptive statistics with frequencies, percentages, and regression statistics analysis. Findings from this study revealed that capacity building and motivation have positive impact on library personnel productivity with their percentages greater than 50% acceptance level. A test of null hypotheses at P < 0.05 significant level was tested to see the significance between capacity building and productivity, which was positive at P < 0.05 significant level. This implies that capacity building and motivation significantly determine productivity among library personnel in selected college libraries in Nigeria. The study concluded that there is need for institutions to equip their library personnel via training programmes, in-service, digital training, ICT training, seminars, and conferences, etc. Incentives should be provided to motivate personnel for high productivity. The study, therefore, recommends that government, institutions and library management should fund college libraries adequately so as to enhance capacity building, staff commitment and training for further education <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=capacity%20building" title="capacity building">capacity building</a>, <a href="https://publications.waset.org/abstracts/search?q=library%20personnel" title=" library personnel"> library personnel</a>, <a href="https://publications.waset.org/abstracts/search?q=motivation" title=" motivation"> motivation</a>, <a href="https://publications.waset.org/abstracts/search?q=productivity" title=" productivity"> productivity</a> </p> <a href="https://publications.waset.org/abstracts/122486/capacity-building-and-motivation-as-determinants-of-productivity-among-library-personnel-in-colleges-of-education-in-southwest-nigeria" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/122486.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">202</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">3373</span> Enhancement of Environmental Security by the Application of Wireless Sensor Network in Nigeria</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Ahmadu%20Girgiri">Ahmadu Girgiri</a>, <a href="https://publications.waset.org/abstracts/search?q=Lawan%20Gana%20Ali"> Lawan Gana Ali</a>, <a href="https://publications.waset.org/abstracts/search?q=Mamman%20M.%20Baba"> Mamman M. Baba</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Environmental security clearly articulates the perfections and developments of various communities around the world irrespective of the region, culture, religion or social inclination. Although, the present state of insecurity has become serious issue devastating the peace, unity, stability and progress of man and his physical environment particularly in developing countries. Recently, measure of security and it management in Nigeria has been a bottle-neck to the effectiveness and advancement of various sectors that include; business, education, social relations, politics and above all an economy. Several measures have been considered on mitigating environment insecurity such as surveillance, demarcation, security personnel empowerment and the likes, but still the issue remains disturbing. In this paper, we present the application of new technology that contributes to the improvement of security surveillance known as &ldquo;Wireless Sensor Network (WSN)&rdquo;. The system is new, smart and emerging technology that provides monitoring, detection and aggregation of information using sensor nodes and wireless network. WSN detects, monitors and stores information or activities in the deployed area such as schools, environment, business centers, public squares, industries, and outskirts and transmit to end users. This will reduce the cost of security funding and eases security surveillance depending on the nature and the requirement of the deployment. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=application" title="application">application</a>, <a href="https://publications.waset.org/abstracts/search?q=environment" title=" environment"> environment</a>, <a href="https://publications.waset.org/abstracts/search?q=insecurity" title=" insecurity"> insecurity</a>, <a href="https://publications.waset.org/abstracts/search?q=sensor" title=" sensor"> sensor</a>, <a href="https://publications.waset.org/abstracts/search?q=wireless%20sensor%20network" title=" wireless sensor network"> wireless sensor network</a> </p> <a href="https://publications.waset.org/abstracts/44680/enhancement-of-environmental-security-by-the-application-of-wireless-sensor-network-in-nigeria" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/44680.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">263</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">3372</span> Cultural Competence of Philippine National Police Personnel</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Nestor%20C.%20Nabe">Nestor C. Nabe</a>, <a href="https://publications.waset.org/abstracts/search?q=Melvie%20F.%20Bayog"> Melvie F. Bayog</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The cultural competence of police officers can lead to effective law enforcement and gain respect to their organization. This study evaluated the level of cultural competence of Philippine National Police Personnel in Midsayap, Cotabato, Philippines. Descriptive survey research design was used in this study. The survey utilized an adapted questionnaire to measure the level of cultural competence of the respondents. Questionnaires were administered to 305 ethnic minorities coming from the four major ethnic tribes in Midsayap, Cotabato, Philippines. The data gathered were treated using Percentage, Mean, T-test and Analysis of Variance (ANOVA). The findings are as follows: the level of cultural competence of police personnel is moderate; and, there is no significant difference in the cultural competence of the police personnel when analyzed by age, gender, civil status and, occupation while there is a significant difference analyzed by educational attainment and ethnic tribe. Based on the findings, the following conclusions were drawn: the level of cultural competence of police personnel is only manifested sometimes; and, civil status, and occupation has no significant difference in the cultural competence of police personnel while educational attainment and ethnic tribe has a significant difference. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=competence" title="competence">competence</a>, <a href="https://publications.waset.org/abstracts/search?q=cultural" title=" cultural"> cultural</a>, <a href="https://publications.waset.org/abstracts/search?q=Philippines" title=" Philippines"> Philippines</a>, <a href="https://publications.waset.org/abstracts/search?q=police" title=" police"> police</a> </p> <a href="https://publications.waset.org/abstracts/76183/cultural-competence-of-philippine-national-police-personnel" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/76183.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">345</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">3371</span> The Importance of Training in Supply Chain Management on Personnel Differentiation and Business Performance</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Arawati%20Agus">Arawati Agus</a>, <a href="https://publications.waset.org/abstracts/search?q=Rahmah%20Ismail"> Rahmah Ismail</a> </p> <p class="card-text"><strong>Abstract:</strong></p> An effective training has been increasingly recognized as critical factors in enhancing the skills and knowledge of employee or personnel in the organization. More and more manufacturing companies in Malaysia are increasingly incorporating training as an important element in supply chain management (SCM) to improve their employee skills and knowledge and ultimately organizational performances. In order to understand the connection of training in SCM and the performance of an organization, this paper considers of many arguments from various research papers. This paper presents the findings of a research which examines the relationship between training in SCM, personnel differentiation and business performance of manufacturing companies in Malaysia. The study measures perception of senior management regarding the incorporation of training in SCM and the level of personnel differentiation and business performance measurements in their companies. The associations between training in SCM, personnel differentiation and business performance dimensions are analyzed through methods such as Pearson’s correlations and Smart partial least squares (smart PLS) using 126 respondents’ data. The correlation results demonstrate that training in SCM has significant correlations with personnel differentiation determinants (comprises of variables namely employee differentiation and service differentiation). The findings also suggest that training in SCM has significant correlations with business performance determinants (comprises of indicators, namely market share, profitability, ROA and ROS). Specifically, both personnel differentiation and business performance have high correlations with training in SCM, namely ‘Employee training on production skills’, ‘On the job production employee training’ and ‘Management training on supply chain effectiveness’ and ‘Employee training on supply chain technologies’. The smart PLS result also reveals that training in SCM exhibits significant impact on both personnel differentiation (directly) and business performance (indirectly mediated by personnel differentiation). The findings of the study provide a demonstration of the importance of training in SCM in enhancing competitive performances in Malaysian manufacturing companies. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=training%20in%20SCM" title="training in SCM">training in SCM</a>, <a href="https://publications.waset.org/abstracts/search?q=personnel%20differentiation" title=" personnel differentiation"> personnel differentiation</a>, <a href="https://publications.waset.org/abstracts/search?q=business%20performance" title=" business performance"> business performance</a>, <a href="https://publications.waset.org/abstracts/search?q=Pearson%E2%80%99s%20correlation" title=" Pearson’s correlation"> Pearson’s correlation</a>, <a href="https://publications.waset.org/abstracts/search?q=Smart%20PLS" title=" Smart PLS"> Smart PLS</a> </p> <a href="https://publications.waset.org/abstracts/19837/the-importance-of-training-in-supply-chain-management-on-personnel-differentiation-and-business-performance" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/19837.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">324</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">3370</span> Building Capacity and Personnel Flow Modeling for Operating amid COVID-19</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Samuel%20Fernandes">Samuel Fernandes</a>, <a href="https://publications.waset.org/abstracts/search?q=Dylan%20Kato"> Dylan Kato</a>, <a href="https://publications.waset.org/abstracts/search?q=Emin%20Burak%20Onat"> Emin Burak Onat</a>, <a href="https://publications.waset.org/abstracts/search?q=Patrick%20Keyantuo"> Patrick Keyantuo</a>, <a href="https://publications.waset.org/abstracts/search?q=Raja%20%20Sengupta"> Raja Sengupta</a>, <a href="https://publications.waset.org/abstracts/search?q=Amine%20Bouzaghrane"> Amine Bouzaghrane</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The COVID-19 pandemic has spread across the United States, forcing cities to impose stay-at-home and shelter-in-place orders. Building operations had to adjust as non-essential personnel worked from home. But as buildings prepare for personnel to return, they need to plan for safe operations amid new COVID-19 guidelines. In this paper we propose a methodology for capacity and flow modeling of personnel within buildings to safely operate under COVID-19 guidelines. We model personnel flow within buildings by network flows with queuing constraints. We study maximum flow, minimum cost, and minimax objectives. We compare our network flow approach with a simulation model through a case study and present the results. Our results showcase various scenarios of how buildings could be operated under new COVID-19 guidelines and provide a framework for building operators to plan and operate buildings in this new paradigm. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=network%20analysis" title="network analysis">network analysis</a>, <a href="https://publications.waset.org/abstracts/search?q=building%20simulation" title=" building simulation"> building simulation</a>, <a href="https://publications.waset.org/abstracts/search?q=COVID-19" title=" COVID-19 "> COVID-19 </a> </p> <a href="https://publications.waset.org/abstracts/128718/building-capacity-and-personnel-flow-modeling-for-operating-amid-covid-19" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/128718.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">160</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">3369</span> Knowledge Management Efficiency of Personnel in Rajamangala University of Technology Srivijaya Songkhla, Thailand</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Nongyao%20Intasaso">Nongyao Intasaso</a>, <a href="https://publications.waset.org/abstracts/search?q=Atchara%20Rattanama"> Atchara Rattanama</a>, <a href="https://publications.waset.org/abstracts/search?q=Navarat%20Pewnual"> Navarat Pewnual</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This research is survey research purposed to study the factor affected to knowledge management efficiency of personnel in Rajamangala University of Technology Srivijaya, and study the problem of knowledge management affected to knowledge development of personnel in the university. The tool used in this study is structures questioner standardize rating scale in 5 levels. The sample selected by purposive sampling and there are 137 participation calculated in 25% of population. The result found that factor affected to knowledge management efficiency in the university included (1) result from the organization factor found that the university provided project or activity that according to strategy and mission of knowledge management affected to knowledge management efficiency in highest level (x̅ = 4.30) (2) result from personnel factor found that the personnel are eager for knowledge and active to learning to develop themselves and work (Personal Mastery) affected to knowledge management efficiency in high level (x̅ = 3.75) (3) result from technological factor found that the organization brought multimedia learning aid to facilitate learning process affected to knowledge management efficiency in high level (x̅ = 3.70) and (4) the result from learning factor found that the personnel communicated and sharing knowledge and opinion based on acceptance to each other affected to knowledge management efficiency in high level (x̅ = 3.78). The problem of knowledge management in the university included the personnel do not change their work behavior, insufficient of collaboration, lack of acceptance in knowledge and experience to each other, and limited budget. The solutions to solve these problems are the university should be support sufficient budget, the university should follow up and evaluate organization development based on knowledge using, the university should provide the activity emphasize to personnel development and assign the committee to process and report knowledge management procedure. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=knowledge%20management" title="knowledge management">knowledge management</a>, <a href="https://publications.waset.org/abstracts/search?q=efficiency" title=" efficiency"> efficiency</a>, <a href="https://publications.waset.org/abstracts/search?q=personnel" title=" personnel"> personnel</a>, <a href="https://publications.waset.org/abstracts/search?q=learning%20process" title=" learning process "> learning process </a> </p> <a href="https://publications.waset.org/abstracts/33835/knowledge-management-efficiency-of-personnel-in-rajamangala-university-of-technology-srivijaya-songkhla-thailand" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/33835.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">301</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">3368</span> Critical and Strategic Issues in Compensation, Staffing and Personnel Management in Nigeria</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Shonuga%20Olajumoke%20Adedoyinsola">Shonuga Olajumoke Adedoyinsola</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Staffing and Compensation are at the core of any employment exchange, and they serve as the defining characteristics of any employment relationship. Most organizations understand the benefits that a longer term approach to staff planning can bring and the answer to this problem lies not in trying to implement the traditional approach more effectively, but in implementing a completely different kind of process for strategic staffing. The study focuses on critical points of compensation, staffing and personnel management. The fundamentals of these programs include the elements of vision, potential, communication and motivation. The aim of the paper is to identify the most important attributes of compensation and incentives, staffing and personnel management. Research method is the analysis and synthesis of scientific literature, logical, comparative and graphic representation. On the basis of analysis, the author presents the models of these systems for positive employee attitudes and behaviors. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=compensation" title="compensation">compensation</a>, <a href="https://publications.waset.org/abstracts/search?q=employees" title=" employees"> employees</a>, <a href="https://publications.waset.org/abstracts/search?q=incentives" title=" incentives"> incentives</a>, <a href="https://publications.waset.org/abstracts/search?q=staffing" title=" staffing"> staffing</a>, <a href="https://publications.waset.org/abstracts/search?q=personnel%20management" title=" personnel management"> personnel management</a> </p> <a href="https://publications.waset.org/abstracts/32794/critical-and-strategic-issues-in-compensation-staffing-and-personnel-management-in-nigeria" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/32794.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">299</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">3367</span> PTSD in Peacekeepers: A Systematic Review</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Laura%20Rodrigues%20Carmona">Laura Rodrigues Carmona</a>, <a href="https://publications.waset.org/abstracts/search?q=Maria%20Jos%C3%A9%20Chambel"> Maria José Chambel</a>, <a href="https://publications.waset.org/abstracts/search?q=V%C3%A2nia%20Sofia%20Carvalho"> Vânia Sofia Carvalho</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Background: In peacekeeping operations, military personnel are often exposed to the same traumatic stress factors found during conventional war and may also be subject to the physical risks and psychological stressors associated with posttraumatic stress disorder (PTSD). Objectives: To discuss the prevalence of PTSD among peacekeepers as well as the risks of and protective factors against this disorder and its comorbidities and/or consequences. Methods: A systematic literature search was performed with relevant keywords, and 53 articles were identified for this review. Results and conclusions: Military personnel deployed in peacekeeping operations have a higher prevalence of PTSD than nonmilitary personnel, a prevalence similar to that of military personnel deployed in war situations. Concerning the salient risk factors, the contextual factors are highlighted, and in regard to the protective factors, the individual factors are highlighted. This study thus demonstrates that there are factors in which the role of the military is essential, via both its selection and monitoring of peacekeepers during and after their deployment, to protect deployed personnel’s mental health. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=peacekeepers" title="peacekeepers">peacekeepers</a>, <a href="https://publications.waset.org/abstracts/search?q=peacekeeping" title=" peacekeeping"> peacekeeping</a>, <a href="https://publications.waset.org/abstracts/search?q=military" title=" military"> military</a>, <a href="https://publications.waset.org/abstracts/search?q=PTSD" title=" PTSD"> PTSD</a>, <a href="https://publications.waset.org/abstracts/search?q=post-traumatic%20stress%20disorder" title=" post-traumatic stress disorder"> post-traumatic stress disorder</a>, <a href="https://publications.waset.org/abstracts/search?q=posttraumatic%20stress%20disorder" title=" posttraumatic stress disorder"> posttraumatic stress disorder</a> </p> <a href="https://publications.waset.org/abstracts/171904/ptsd-in-peacekeepers-a-systematic-review" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/171904.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">86</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">3366</span> Legal Issues of Food Security in Republic of Kazakhstan</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=G.%20T.%20Aigarinova">G. T. Aigarinova</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This article considers the legal issues of food security as a major component of national security of the republic. The problem of food security is the top priority of the economic policy strategy of any state, the effectiveness of this solution influences social, political, and ethnic stability in society. Food security and nutrition is everyone’s business. Food security exists when all people, at all times, have physical, social and economic access to sufficient safe and nutritious food that meets their dietary needs and food preferences for an active and healthy life. By analyzing the existing legislation in the area of food security, the author identifies weaknesses and gaps, suggesting ways to improve it. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=food%20security" title="food security">food security</a>, <a href="https://publications.waset.org/abstracts/search?q=national%20security" title=" national security"> national security</a>, <a href="https://publications.waset.org/abstracts/search?q=agriculture" title=" agriculture"> agriculture</a>, <a href="https://publications.waset.org/abstracts/search?q=public%20resources" title=" public resources"> public resources</a>, <a href="https://publications.waset.org/abstracts/search?q=economic%20security" title=" economic security"> economic security</a> </p> <a href="https://publications.waset.org/abstracts/4863/legal-issues-of-food-security-in-republic-of-kazakhstan" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/4863.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">425</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">3365</span> Assessing the Role of Water Research and Development Investment towards Water Security in South Africa: During the Five Years Period (2009/10 - 2013/14)</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Hlamulo%20Makelane">Hlamulo Makelane</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The study aims at providing new insights regarding research and development (R&D) public and private activities based on the national R&D survey of the past five years. The main question of the study is what role does water R&D plays on water security; to then analyze what lessons could be extracted to improve the security of water through R&D. In particular, this work concentrates on three main aspects of R&D investments: (i) the level of expenditures, (ii) the sources of funding related to water R&D, and (iii) the personnel working in the field, both for the public and private sectors. The nonlinear regression approached will be used for data analysis based on secondary data gathered from the South African nation R&D survey conducted annually by the Centre for science, technology and innovation indicators (CeSTII). <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=water" title="water">water</a>, <a href="https://publications.waset.org/abstracts/search?q=R%26D" title=" R&amp;D"> R&amp;D</a>, <a href="https://publications.waset.org/abstracts/search?q=investment" title=" investment"> investment</a>, <a href="https://publications.waset.org/abstracts/search?q=public%20sector" title=" public sector"> public sector</a>, <a href="https://publications.waset.org/abstracts/search?q=private%20sector" title=" private sector"> private sector</a> </p> <a href="https://publications.waset.org/abstracts/69065/assessing-the-role-of-water-research-and-development-investment-towards-water-security-in-south-africa-during-the-five-years-period-200910-201314" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/69065.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">237</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">3364</span> Security of Internet of Things: Challenges, Requirements and Future Directions</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Amjad%20F.%20Alharbi">Amjad F. Alharbi</a>, <a href="https://publications.waset.org/abstracts/search?q=Bashayer%20A.%20Alotaibi"> Bashayer A. Alotaibi</a>, <a href="https://publications.waset.org/abstracts/search?q=Fahd%20S.%20Alotaibi"> Fahd S. Alotaibi</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The emergence of Internet of Things (IoT) technology provides capabilities for a huge number of smart devices, services and people to be communicate with each other for exchanging data and information over existing network. While as IoT is progressing, it provides many opportunities for new ways of communications as well it introduces many security and privacy threats and challenges which need to be considered for the future of IoT development. In this survey paper, an IoT security issues as threats and current challenges are summarized. The security architecture for IoT are presented from four main layers. Based on these layers, the IoT security requirements are presented to insure security in the whole system. Furthermore, some researches initiatives related to IoT security are discussed as well as the future direction for IoT security are highlighted. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=Internet%20of%20Things%20%28IoT%29" title="Internet of Things (IoT)">Internet of Things (IoT)</a>, <a href="https://publications.waset.org/abstracts/search?q=IoT%20security%20challenges" title=" IoT security challenges"> IoT security challenges</a>, <a href="https://publications.waset.org/abstracts/search?q=IoT%20security%20requirements" title=" IoT security requirements"> IoT security requirements</a>, <a href="https://publications.waset.org/abstracts/search?q=IoT%20security%20architecture" title=" IoT security architecture"> IoT security architecture</a> </p> <a href="https://publications.waset.org/abstracts/71488/security-of-internet-of-things-challenges-requirements-and-future-directions" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/71488.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">375</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">3363</span> Design, Construction and Performance Evaluation of a HPGe Detector Shield</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=M.%20Sharifi">M. Sharifi</a>, <a href="https://publications.waset.org/abstracts/search?q=M.%20Mirzaii"> M. Mirzaii</a>, <a href="https://publications.waset.org/abstracts/search?q=F.%20Bolourinovin"> F. Bolourinovin</a>, <a href="https://publications.waset.org/abstracts/search?q=H.%20Yousefnia"> H. Yousefnia</a>, <a href="https://publications.waset.org/abstracts/search?q=M.%20Akbari"> M. Akbari</a>, <a href="https://publications.waset.org/abstracts/search?q=K.%20Yousefi-Mojir"> K. Yousefi-Mojir</a> </p> <p class="card-text"><strong>Abstract:</strong></p> A multilayer passive shield composed of low-activity lead (Pb), copper (Cu), tin (Sn) and iron (Fe) was designed and manufactured for a coaxial HPGe detector placed at a surface laboratory for reducing background radiation and radiation dose to the personnel. The performance of the shield was evaluated and efficiency curves of the detector were plotted by using of the various standard sources in different distances. Monte Carlo simulations and a set of TLD chips were used for dose estimation in two distances of 20 and 40 cm. The results show that the shield reduced background spectrum and the personnel dose more than 95%. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=HPGe%20shield" title="HPGe shield">HPGe shield</a>, <a href="https://publications.waset.org/abstracts/search?q=background%20count" title=" background count"> background count</a>, <a href="https://publications.waset.org/abstracts/search?q=personnel%20dose" title=" personnel dose"> personnel dose</a>, <a href="https://publications.waset.org/abstracts/search?q=efficiency%20curve" title=" efficiency curve"> efficiency curve</a> </p> <a href="https://publications.waset.org/abstracts/34295/design-construction-and-performance-evaluation-of-a-hpge-detector-shield" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/34295.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">456</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">3362</span> The Value of Job Security across Various Welfare Policies</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Eithan%20Hourie">Eithan Hourie</a>, <a href="https://publications.waset.org/abstracts/search?q=Miki%20Malul"> Miki Malul</a>, <a href="https://publications.waset.org/abstracts/search?q=Raphael%20Bar-El"> Raphael Bar-El</a> </p> <p class="card-text"><strong>Abstract:</strong></p> To investigate the relationship between various welfare policies and the value of job security, we conducted a study with 201 people regarding their assessments of the value of job security with respect to three elements: income stability, assurance of continuity of employment, and security in the job. The experiment simulated different welfare policy scenarios, such as the amount and duration of unemployment benefits, workfare, and basic income. The participants evaluated the value of job security in various situations. We found that the value of job security is approximately 22% of the starting salary, which is distributed as follows: 13% reflects income security, 8.7% reflects job security, and about 0.3% is for being able to keep their current employment in the future. To the best of our knowledge, this article is one of the pioneers in trying to quantify the value of job security in different market scenarios and at varying levels of welfare policy. Our conclusions may help decision-makers when deciding on a welfare policy. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=job%20security%20value" title="job security value">job security value</a>, <a href="https://publications.waset.org/abstracts/search?q=employment%20protection%20legislation" title=" employment protection legislation"> employment protection legislation</a>, <a href="https://publications.waset.org/abstracts/search?q=status%20quo%20bias" title=" status quo bias"> status quo bias</a>, <a href="https://publications.waset.org/abstracts/search?q=expanding%20welfare%20policy" title=" expanding welfare policy"> expanding welfare policy</a> </p> <a href="https://publications.waset.org/abstracts/161025/the-value-of-job-security-across-various-welfare-policies" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/161025.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">106</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">3361</span> Network Security Attacks and Defences</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Ranbir%20Singh">Ranbir Singh</a>, <a href="https://publications.waset.org/abstracts/search?q=Deepinder%20Kaur"> Deepinder Kaur</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Network security is an important aspect in every field like government offices, Educational Institute and any business organization. Network security consists of the policies adopted to prevent and monitor forbidden access, misuse, modification, or denial of a computer network. Network security is very complicated subject and deal by only well trained and experienced people. However, as more and more people become wired, an increasing number of people need to understand the basics of security in a networked world. The history of the network security included an introduction to the TCP/IP and interworking. Network security starts with authenticating, commonly with a username and a password. In this paper, we study about various types of attacks on network security and how to handle or prevent this attack. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=network%20security" title="network security">network security</a>, <a href="https://publications.waset.org/abstracts/search?q=attacks" title=" attacks"> attacks</a>, <a href="https://publications.waset.org/abstracts/search?q=denial" title=" denial"> denial</a>, <a href="https://publications.waset.org/abstracts/search?q=authenticating" title=" authenticating"> authenticating</a> </p> <a href="https://publications.waset.org/abstracts/53007/network-security-attacks-and-defences" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/53007.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">404</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">3360</span> Knowledge Management Factors Affecting the Level of Commitment</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Abbas%20Keramati">Abbas Keramati</a>, <a href="https://publications.waset.org/abstracts/search?q=Abtin%20Boostani"> Abtin Boostani</a>, <a href="https://publications.waset.org/abstracts/search?q=Mohammad%20Jamal%20Sadeghi"> Mohammad Jamal Sadeghi</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This paper examines the influence of knowledge management factors on organizational commitment for employees in the oil and gas drilling industry of Iran. We determine what knowledge factors have the greatest impact on the personnel loyalty and commitment to the organization using collected data from a survey of over 300 full-time personnel working in three large companies active in oil and gas drilling industry of Iran. To specify the effect of knowledge factors in the organizational commitment of the personnel in the studied organizations, the Principal Component Analysis (PCA) is used. Findings of our study show that the factors such as knowledge and expertise, in-service training, the knowledge value and the application of individuals&rsquo; knowledge in the organization as the factor &ldquo;learning and perception of personnel from the value of knowledge within the organization&rdquo; has the greatest impact on the organizational commitment. After this factor, &ldquo;existence of knowledge and knowledge sharing environment in the organization&rdquo;; &ldquo;existence of potential knowledge exchanging in the organization&rdquo;; and &ldquo;organizational knowledge level&rdquo; factors have the most impact on the organizational commitment of personnel, respectively. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=drilling%20industry" title="drilling industry">drilling industry</a>, <a href="https://publications.waset.org/abstracts/search?q=knowledge%20management" title=" knowledge management"> knowledge management</a>, <a href="https://publications.waset.org/abstracts/search?q=organizational%20commitment" title=" organizational commitment"> organizational commitment</a>, <a href="https://publications.waset.org/abstracts/search?q=loyalty" title=" loyalty"> loyalty</a>, <a href="https://publications.waset.org/abstracts/search?q=principle%20component%20analysis" title=" principle component analysis"> principle component analysis</a> </p> <a href="https://publications.waset.org/abstracts/29813/knowledge-management-factors-affecting-the-level-of-commitment" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/29813.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">352</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">3359</span> Urban Search, Rescue and Rapid Field Assessment of Damaged and Collapsed Building Structures</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Abid%20I.%20Abu-Tair">Abid I. Abu-Tair</a>, <a href="https://publications.waset.org/abstracts/search?q=Gavin%20M.%20Wilde"> Gavin M. Wilde</a>, <a href="https://publications.waset.org/abstracts/search?q=John%20M.%20Kinuthia"> John M. Kinuthia</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Urban Search and Rescue (USAR) is a functional capability that has been developed to allow the United Kingdom Fire and Rescue Service to deal with ‘major incidents’ primarily involving structural collapse. The nature of the work undertaken by USAR means that staying out of a damaged or collapsed building structure is not usually an option for search and rescue personnel. As a result, there is always a risk that they could become victims. For this paper, a systematic and investigative review using desk research was undertaken to explore the role which structural engineering can play in assisting search and rescue personnel to conduct structural assessments when in the field. The focus is on how search and rescue personnel can assess damaged and collapsed building structures, not just in terms of the structural damage that may be countered, but also in relation to structural stability. Natural disasters, accidental emergencies, acts of terrorism and other extreme events can vary significantly in nature and ferocity, and can cause a wide variety of damage to building structures. It is not possible or, even realistic, to provide search and rescue personnel with definitive guidelines and procedures to assess damaged and collapsed building structures as there are too many variables to consider. However, understanding what implications damage may have upon the structural stability of a building structure will enable search and rescue personnel to judge better and quantify the risk from a life-safety standpoint. It is intended that this will allow search and rescue personnel to make informed decisions and ensure every effort is made to mitigate risk so that they do not become victims. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=damaged%20and%20collapsed%20building%20structures" title="damaged and collapsed building structures">damaged and collapsed building structures</a>, <a href="https://publications.waset.org/abstracts/search?q=life%20safety" title=" life safety"> life safety</a>, <a href="https://publications.waset.org/abstracts/search?q=quantifying%20risk" title=" quantifying risk"> quantifying risk</a>, <a href="https://publications.waset.org/abstracts/search?q=search%20and%20rescue%20personnel" title=" search and rescue personnel"> search and rescue personnel</a>, <a href="https://publications.waset.org/abstracts/search?q=structural%20assessments%20in%20the%20field" title=" structural assessments in the field"> structural assessments in the field</a> </p> <a href="https://publications.waset.org/abstracts/21334/urban-search-rescue-and-rapid-field-assessment-of-damaged-and-collapsed-building-structures" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/21334.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">393</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">3358</span> Research on the Risks of Railroad Receiving and Dispatching Trains Operators: Natural Language Processing Risk Text Mining</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Yangze%20Lan">Yangze Lan</a>, <a href="https://publications.waset.org/abstracts/search?q=Ruihua%20Xv"> Ruihua Xv</a>, <a href="https://publications.waset.org/abstracts/search?q=Feng%20Zhou"> Feng Zhou</a>, <a href="https://publications.waset.org/abstracts/search?q=Yijia%20Shan"> Yijia Shan</a>, <a href="https://publications.waset.org/abstracts/search?q=Longhao%20Zhang"> Longhao Zhang</a>, <a href="https://publications.waset.org/abstracts/search?q=Qinghui%20Xv"> Qinghui Xv</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Receiving and dispatching trains is an important part of railroad organization, and the risky evaluation of operating personnel is still reflected by scores, lacking further excavation of wrong answers and operating accidents. With natural language processing (NLP) technology, this study extracts the keywords and key phrases of 40 relevant risk events about receiving and dispatching trains and reclassifies the risk events into 8 categories, such as train approach and signal risks, dispatching command risks, and so on. Based on the historical risk data of personnel, the K-Means clustering method is used to classify the risk level of personnel. The result indicates that the high-risk operating personnel need to strengthen the training of train receiving and dispatching operations towards essential trains and abnormal situations. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=receiving%20and%20dispatching%20trains" title="receiving and dispatching trains">receiving and dispatching trains</a>, <a href="https://publications.waset.org/abstracts/search?q=natural%20language%20processing" title=" natural language processing"> natural language processing</a>, <a href="https://publications.waset.org/abstracts/search?q=risk%20evaluation" title=" risk evaluation"> risk evaluation</a>, <a href="https://publications.waset.org/abstracts/search?q=K-means%20clustering" title=" K-means clustering"> K-means clustering</a> </p> <a href="https://publications.waset.org/abstracts/176556/research-on-the-risks-of-railroad-receiving-and-dispatching-trains-operators-natural-language-processing-risk-text-mining" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/176556.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">91</span> </span> </div> </div> <ul class="pagination"> <li class="page-item disabled"><span class="page-link">&lsaquo;</span></li> <li class="page-item active"><span class="page-link">1</span></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=security%20personnel&amp;page=2">2</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=security%20personnel&amp;page=3">3</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=security%20personnel&amp;page=4">4</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=security%20personnel&amp;page=5">5</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=security%20personnel&amp;page=6">6</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=security%20personnel&amp;page=7">7</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=security%20personnel&amp;page=8">8</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=security%20personnel&amp;page=9">9</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=security%20personnel&amp;page=10">10</a></li> <li class="page-item disabled"><span class="page-link">...</span></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=security%20personnel&amp;page=112">112</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=security%20personnel&amp;page=113">113</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=security%20personnel&amp;page=2" rel="next">&rsaquo;</a></li> </ul> </div> </main> <footer> <div id="infolinks" class="pt-3 pb-2"> <div class="container"> <div style="background-color:#f5f5f5;" class="p-3"> <div class="row"> <div class="col-md-2"> <ul class="list-unstyled"> About <li><a href="https://waset.org/page/support">About Us</a></li> <li><a href="https://waset.org/page/support#legal-information">Legal</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/WASET-16th-foundational-anniversary.pdf">WASET celebrates its 16th foundational anniversary</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Account <li><a href="https://waset.org/profile">My Account</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Explore <li><a href="https://waset.org/disciplines">Disciplines</a></li> <li><a href="https://waset.org/conferences">Conferences</a></li> <li><a href="https://waset.org/conference-programs">Conference Program</a></li> <li><a href="https://waset.org/committees">Committees</a></li> <li><a href="https://publications.waset.org">Publications</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Research <li><a href="https://publications.waset.org/abstracts">Abstracts</a></li> <li><a href="https://publications.waset.org">Periodicals</a></li> <li><a href="https://publications.waset.org/archive">Archive</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Open Science <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Science-Philosophy.pdf">Open Science Philosophy</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Science-Award.pdf">Open Science Award</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Society-Open-Science-and-Open-Innovation.pdf">Open Innovation</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Postdoctoral-Fellowship-Award.pdf">Postdoctoral Fellowship Award</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Scholarly-Research-Review.pdf">Scholarly Research Review</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Support <li><a href="https://waset.org/page/support">Support</a></li> <li><a href="https://waset.org/profile/messages/create">Contact Us</a></li> <li><a href="https://waset.org/profile/messages/create">Report Abuse</a></li> </ul> </div> </div> </div> </div> </div> <div class="container text-center"> <hr style="margin-top:0;margin-bottom:.3rem;"> <a href="https://creativecommons.org/licenses/by/4.0/" target="_blank" class="text-muted small">Creative Commons Attribution 4.0 International License</a> <div id="copy" class="mt-2">&copy; 2024 World Academy of Science, Engineering and Technology</div> </div> </footer> <a href="javascript:" id="return-to-top"><i class="fas fa-arrow-up"></i></a> <div class="modal" id="modal-template"> <div class="modal-dialog"> <div class="modal-content"> <div class="row m-0 mt-1"> <div class="col-md-12"> <button type="button" class="close" data-dismiss="modal" aria-label="Close"><span aria-hidden="true">&times;</span></button> </div> </div> <div class="modal-body"></div> </div> </div> </div> <script src="https://cdn.waset.org/static/plugins/jquery-3.3.1.min.js"></script> <script src="https://cdn.waset.org/static/plugins/bootstrap-4.2.1/js/bootstrap.bundle.min.js"></script> <script src="https://cdn.waset.org/static/js/site.js?v=150220211556"></script> <script> jQuery(document).ready(function() { /*jQuery.get("https://publications.waset.org/xhr/user-menu", function (response) { jQuery('#mainNavMenu').append(response); });*/ jQuery.get({ url: "https://publications.waset.org/xhr/user-menu", cache: false }).then(function(response){ jQuery('#mainNavMenu').append(response); }); }); </script> </body> </html>

Pages: 1 2 3 4 5 6 7 8 9 10