期刊文献+
共找到2篇文章
< 1 >
每页显示 20 50 100
New Mathematical Modelling on BMR and Weight Prediction for Ghanaians
1
作者 Ian Yaw Asare ezer osei yeboah-boateng 《E-Health Telecommunication Systems and Networks》 2023年第4期78-90,共13页
Background: Basal Metabolic Rate (BMR) is the quantum of calories needed for optimum body function when at rest. This has long been an indicator of one’s health and the basis for determining the metabolic age of indi... Background: Basal Metabolic Rate (BMR) is the quantum of calories needed for optimum body function when at rest. This has long been an indicator of one’s health and the basis for determining the metabolic age of individuals. Many scholastic projects have led to the establishment of mathematical models and inventions that measure the BMR and other body composition parameters. However, existing computations have limitations as they do not offer accurate results for Ghanaians. Aim: The purpose of the study was to model BMR metrics that are most suitable for Ghanaians and to investigate the effect of caloric difference on weight, Lean Body Mass (LBM) and % fat composition that can be implemented with Information Technology. Research Methods and Procedures: This was an experimental study that adopted a quantitative approach. BMR and body composition were measured in a sample of 242 Ghanaian adults (141 males and 101 females) from 19 to 30 years of age. Body composition was measured using bioelectrical impendence analysis (BIA) in all participants. Each participant was under study for 7 days. A simple linear regression model was used to examine associations between BMR/calorie intake and total body weight and LBM. Results: There was a significant statistical relation between BMR and LBM and between BMR and weight of both men and women. Equations for BMR and weight were established for males and females. Furthermore, caloric intake differences affected changes in total weight as well as differences in % fat composition. Caloric intake however did not affect the difference in LBM. Conclusion: Caloric difference had an impact on total body weight and Lean Body Mass. The model derived from the study predicts weight change and BMR of Ghanaians from 19 to 30 years of age. It is termed the Health and Age Monitoring System (HAMS). 展开更多
关键词 Basal Metabolic Rate (BMR) Lean Body Mass (LBM) WEIGHT CALORIES
下载PDF
Remote Access Communications Security: Analysis of User Authentication Roles in Organizations 被引量:2
2
作者 ezer osei yeboah-boateng Grace Dzifa Kwabena-Adade 《Journal of Information Security》 2020年第3期161-175,共15页
Remote access is a means of accessing resources outside one’s immediate physical location. This has made employee mobility more effective and productive for most organizations. Remote access can be achieved via vario... Remote access is a means of accessing resources outside one’s immediate physical location. This has made employee mobility more effective and productive for most organizations. Remote access can be achieved via various channels of remote communication, the most common being Virtual Private Networks (VPNs). The demand for remote access is on the rise, especially during the Covid-19 pandemic, and will continue to increase as most organizations are re-structuring to make telecommuting a permanent part of their mode of operation. Employee mobility, while presenting organizations with some advantages, comes with the associated risk of exposing corporate cyber assets to attackers. The remote user and the remote connectivity technology present some vulnerabilities which can be exploited by any threat agent to violate the confidentiality, integrity and availability (CIA) dimensions of these cyber assets. So, how are users and remote devices authenticated? To what extent is the established connection secured? With employee mobility on the rise, it is necessary to analyze the user authentication role since the mobile employee is not under the monitoring radar of the organization, and the environment from which the mobile employee connects may be vulnerable. In this study, an experiment was setup to ascertain the user authentication roles. The experiment showed the process of 2FA in user authentication and it proved to be an effective means of improving user authentication during remote access. This was depicted via the use of what the user has (mobile phone/soft-token) as a second factor in addition to what the user knows, i.e. password. This authentication method overcomes the security weaknesses inherent in single-factor user authentication via the use of password only. However, the results also showed that though 2FA user authentication ensures security, the remote devices could exhibit further vulnerabilities and pose serious risks to the organization. Thus, a varied implementation was recommended to further enhance the security of remote access communication with regards to the remote user authentication. 展开更多
关键词 Remote Access Communications Security User Authentication 2FA Virtual Private Network (VPN) TELECOMMUTING Threats VULNERABILITIES
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部