Background: Basal Metabolic Rate (BMR) is the quantum of calories needed for optimum body function when at rest. This has long been an indicator of one’s health and the basis for determining the metabolic age of indi...Background: Basal Metabolic Rate (BMR) is the quantum of calories needed for optimum body function when at rest. This has long been an indicator of one’s health and the basis for determining the metabolic age of individuals. Many scholastic projects have led to the establishment of mathematical models and inventions that measure the BMR and other body composition parameters. However, existing computations have limitations as they do not offer accurate results for Ghanaians. Aim: The purpose of the study was to model BMR metrics that are most suitable for Ghanaians and to investigate the effect of caloric difference on weight, Lean Body Mass (LBM) and % fat composition that can be implemented with Information Technology. Research Methods and Procedures: This was an experimental study that adopted a quantitative approach. BMR and body composition were measured in a sample of 242 Ghanaian adults (141 males and 101 females) from 19 to 30 years of age. Body composition was measured using bioelectrical impendence analysis (BIA) in all participants. Each participant was under study for 7 days. A simple linear regression model was used to examine associations between BMR/calorie intake and total body weight and LBM. Results: There was a significant statistical relation between BMR and LBM and between BMR and weight of both men and women. Equations for BMR and weight were established for males and females. Furthermore, caloric intake differences affected changes in total weight as well as differences in % fat composition. Caloric intake however did not affect the difference in LBM. Conclusion: Caloric difference had an impact on total body weight and Lean Body Mass. The model derived from the study predicts weight change and BMR of Ghanaians from 19 to 30 years of age. It is termed the Health and Age Monitoring System (HAMS).展开更多
Remote access is a means of accessing resources outside one’s immediate physical location. This has made employee mobility more effective and productive for most organizations. Remote access can be achieved via vario...Remote access is a means of accessing resources outside one’s immediate physical location. This has made employee mobility more effective and productive for most organizations. Remote access can be achieved via various channels of remote communication, the most common being Virtual Private Networks (VPNs). The demand for remote access is on the rise, especially during the Covid-19 pandemic, and will continue to increase as most organizations are re-structuring to make telecommuting a permanent part of their mode of operation. Employee mobility, while presenting organizations with some advantages, comes with the associated risk of exposing corporate cyber assets to attackers. The remote user and the remote connectivity technology present some vulnerabilities which can be exploited by any threat agent to violate the confidentiality, integrity and availability (CIA) dimensions of these cyber assets. So, how are users and remote devices authenticated? To what extent is the established connection secured? With employee mobility on the rise, it is necessary to analyze the user authentication role since the mobile employee is not under the monitoring radar of the organization, and the environment from which the mobile employee connects may be vulnerable. In this study, an experiment was setup to ascertain the user authentication roles. The experiment showed the process of 2FA in user authentication and it proved to be an effective means of improving user authentication during remote access. This was depicted via the use of what the user has (mobile phone/soft-token) as a second factor in addition to what the user knows, i.e. password. This authentication method overcomes the security weaknesses inherent in single-factor user authentication via the use of password only. However, the results also showed that though 2FA user authentication ensures security, the remote devices could exhibit further vulnerabilities and pose serious risks to the organization. Thus, a varied implementation was recommended to further enhance the security of remote access communication with regards to the remote user authentication.展开更多
文摘Background: Basal Metabolic Rate (BMR) is the quantum of calories needed for optimum body function when at rest. This has long been an indicator of one’s health and the basis for determining the metabolic age of individuals. Many scholastic projects have led to the establishment of mathematical models and inventions that measure the BMR and other body composition parameters. However, existing computations have limitations as they do not offer accurate results for Ghanaians. Aim: The purpose of the study was to model BMR metrics that are most suitable for Ghanaians and to investigate the effect of caloric difference on weight, Lean Body Mass (LBM) and % fat composition that can be implemented with Information Technology. Research Methods and Procedures: This was an experimental study that adopted a quantitative approach. BMR and body composition were measured in a sample of 242 Ghanaian adults (141 males and 101 females) from 19 to 30 years of age. Body composition was measured using bioelectrical impendence analysis (BIA) in all participants. Each participant was under study for 7 days. A simple linear regression model was used to examine associations between BMR/calorie intake and total body weight and LBM. Results: There was a significant statistical relation between BMR and LBM and between BMR and weight of both men and women. Equations for BMR and weight were established for males and females. Furthermore, caloric intake differences affected changes in total weight as well as differences in % fat composition. Caloric intake however did not affect the difference in LBM. Conclusion: Caloric difference had an impact on total body weight and Lean Body Mass. The model derived from the study predicts weight change and BMR of Ghanaians from 19 to 30 years of age. It is termed the Health and Age Monitoring System (HAMS).
文摘Remote access is a means of accessing resources outside one’s immediate physical location. This has made employee mobility more effective and productive for most organizations. Remote access can be achieved via various channels of remote communication, the most common being Virtual Private Networks (VPNs). The demand for remote access is on the rise, especially during the Covid-19 pandemic, and will continue to increase as most organizations are re-structuring to make telecommuting a permanent part of their mode of operation. Employee mobility, while presenting organizations with some advantages, comes with the associated risk of exposing corporate cyber assets to attackers. The remote user and the remote connectivity technology present some vulnerabilities which can be exploited by any threat agent to violate the confidentiality, integrity and availability (CIA) dimensions of these cyber assets. So, how are users and remote devices authenticated? To what extent is the established connection secured? With employee mobility on the rise, it is necessary to analyze the user authentication role since the mobile employee is not under the monitoring radar of the organization, and the environment from which the mobile employee connects may be vulnerable. In this study, an experiment was setup to ascertain the user authentication roles. The experiment showed the process of 2FA in user authentication and it proved to be an effective means of improving user authentication during remote access. This was depicted via the use of what the user has (mobile phone/soft-token) as a second factor in addition to what the user knows, i.e. password. This authentication method overcomes the security weaknesses inherent in single-factor user authentication via the use of password only. However, the results also showed that though 2FA user authentication ensures security, the remote devices could exhibit further vulnerabilities and pose serious risks to the organization. Thus, a varied implementation was recommended to further enhance the security of remote access communication with regards to the remote user authentication.