Search results for: educational services
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 6763

Search results for: educational services

3733 Lifelong Learning in Applied Fields (LLAF) Tempus Funded Project: Assessing Constructivist Learning Features in Higher Education Settings

Authors: Dorit Alt, Nirit Raichel

Abstract:

Educational practice is continually subjected to renewal needs, due mainly to the growing proportion of information communication technology, globalization of education, and the pursuit of quality. These types of renewal needs require developing updated instructional and assessment practices that put a premium on adaptability to the emerging requirements of present society. However, university instruction is criticized for not coping with these new challenges while continuing to exemplify the traditional instruction. In order to overcome this critical inadequacy between current educational goals and instructional methods, the LLAF consortium (including 16 members from 8 countries) is collaborating to create a curricular reform for lifelong learning (LLL) in teachers' education, health care and other applied fields. This project aims to achieve its objectives by developing, and piloting models for training students in LLL and promoting meaningful learning activities that could integrate knowledge with the personal transferable skills. LLAF has created a practical guide for teachers containing updated pedagogical strategies and assessment tools based on the constructivist approach for learning. This presentation will be limited to teachers' education only and to the contribution of a pre-pilot research aimed at providing a scale designed to measure constructivist activities in higher education learning environments. A mix-method approach was implemented in two phases to construct the scale: The first phase included a qualitative content analysis involving both deductive and inductive category applications of students' observations. The results foregrounded eight categories: knowledge construction, authenticity, multiple perspectives, prior knowledge, in-depth learning, teacher- student interaction, social interaction and cooperative dialogue. The students' descriptions of their classes were formulated as 36 items. The second phase employed structural equation modeling (SEM). The scale was submitted to 597 undergraduate students. The goodness of fit of the data to the structural model yielded sufficient fit results. This research elaborates the body of literature by adding a category of in-depth learning which emerged from the content analysis. Moreover, the theoretical category of social activity has been extended to include two distinctive factors: cooperative dialogue and social interaction. Implications of these findings for the LLAF project are discussed.

Keywords: constructivist learning, higher education, mix-methodology, lifelong learning

Procedia PDF Downloads 334
3732 Violence-Health Nexus: Examining the Impact of Ethnic Violence on Mental Health Disorders, A Global Perspective

Authors: Saqib Amina, Waqas Mehmoodb, Iftikhar Yasinc

Abstract:

This study analyzes the robust association between ethnic violence and mental health from a global perspective (201-countries across the world) by using the panel data for the period 1970 to 2020. Mental health has been determined through various dimensions such as mental disorders, anxiety disorder, depressive disorder, schizophrenia, and bipolar disorder. The empirical findings show that ethnic violence has a significant positive association with all types of mental health indicators, including mental disorders, anxiety disorder, depressive disorder, schizophrenia, and bipolar disorder. The study also reveals that institutional quality may reduce the effect of mental health disorders in a better way than promoting democracy. This study suggests the non-stigmatizing social form of community-based support services instead of a stigmatizing the concept of mental illnesses that promotes hospitalization and drug treatment.

Keywords: ethnic violence, unemployment, mental health, violence

Procedia PDF Downloads 171
3731 Forests, the Sanctuaries to Specialist and Rare Wild Native Bees at the Foothills of Western Himalayas

Authors: Preeti Virkar, V. P. Uniyal, Vinod Kumar Bhatt

Abstract:

With 50% decline in managed honey bee hives in the continents of Europe and America, farmers and landscape managers are turning to native wild bees for their essential ecosystem services of pollination. Wild bees population are too under danger due to the rapid land use changes from anthropogenic activities. With an escalating population reaching 9.0 billion by 2050, human-induced land use changes are predicted to further deteriorate the habitats of numerous species by the turn of this century. The status of bees are uncertain, especially in the tropical regions of the world, which also questions the crisis of global pollinator decline and their essential services to wild and managed flora. Our investigation collectively compares wild native bee diversity and their status in forests and agroecosystems in Doon Valley landscape, situated at the foothills of Himalayan ranges, Uttarakhand, India. We seek to ask whether (1) natural habitat are refuge to richer and rarer bees communities than the agroecosystems, (2) Are agroecosystems closer to natural habitats similar to them than agroecosystems farther away; hence support richer bee communities and hence, (3) Do polyculture farms support richer bee communities than monoculture. The data was collected using observation and pantrap sampling form February to May, 2012 to 2014. We recorded 43 species of bees in Doon Valley. They belonged to 5 families; Megachilidae, Apidae, Andrenidae, Halictidae and Collitidae. A multinomial model approach was used to classify the bees into 2 habitats, in which forests demonstrated to support greater number of specialist (26%, n= 11) species than agroecosystems (7%, n= 3). The valley had many species categorized as the rare (58%, n= 25) and very few generalists (9%, n=4). A linear regression model run on our data demonstrated higher bee diversity in agro-ecosystems in close proximity to forests (H’ for < 200 m = 1.60) compared to those further away (H’ for > 600 m = 0.56) (R2=0.782, SE=0.148, p value=0.004). Organic agriculture supported significantly greater species richness in comparison to conventional farms (Mann-Whitney U test, n1 = 33, n2 = 35; P = 0.001). Forests ecosystems are refuge to rare specialist groups and support bee communities in nearby agroecosystems. The findings of our investigation demonstrate the importance of natural habitats as a potential refuge for rare native wild bee pollinators. Polyculture in the valley behaves similar to natural habitats and supports diverse bee communities in comparison to conventional monocultures. Our study suggests that the farming communities adopt diverse organic agriculture systems to attract wild pollinators beneficial for better crop production. Forests are sanctuaries for bees to nest, forage, and breed. Therefore, our outcome also suggests landscape managers not only preserve protected areas but also enhance the floral diversity in semi-natural and urban areas.

Keywords: native bees, pollinators, polyculture, agroecosystem, natural habitat, diversity, monoculture, specialists, generalists

Procedia PDF Downloads 217
3730 The Application of Bayesian Heuristic for Scheduling in Real-Time Private Clouds

Authors: Sahar Sohrabi

Abstract:

The emergence of Cloud data centers has revolutionized the IT industry. Private Clouds in specific provide Cloud services for certain group of customers/businesses. In a real-time private Cloud each task that is given to the system has a deadline that desirably should not be violated. Scheduling tasks in a real-time private CLoud determine the way available resources in the system are shared among incoming tasks. The aim of the scheduling policy is to optimize the system outcome which for a real-time private Cloud can include: energy consumption, deadline violation, execution time and the number of host switches. Different scheduling policies can be used for scheduling. Each lead to a sub-optimal outcome in a certain settings of the system. A Bayesian Scheduling strategy is proposed for scheduling to further improve the system outcome. The Bayesian strategy showed to outperform all selected policies. It also has the flexibility in dealing with complex pattern of incoming task and has the ability to adapt.

Keywords: cloud computing, scheduling, real-time private cloud, bayesian

Procedia PDF Downloads 359
3729 Towards a Security Model against Denial of Service Attacks for SIP Traffic

Authors: Arellano Karina, Diego Avila-Pesántez, Leticia Vaca-Cárdenas, Alberto Arellano, Carmen Mantilla

Abstract:

Nowadays, security threats in Voice over IP (VoIP) systems are an essential and latent concern for people in charge of security in a corporate network, because, every day, new Denial-of-Service (DoS) attacks are developed. These affect the business continuity of an organization, regarding confidentiality, availability, and integrity of services, causing frequent losses of both information and money. The purpose of this study is to establish the necessary measures to mitigate DoS threats, which affect the availability of VoIP systems, based on the Session Initiation Protocol (SIP). A Security Model called MS-DoS-SIP is proposed, which is based on two approaches. The first one analyzes the recommendations of international security standards. The second approach takes into account weaknesses and threats. The implementation of this model in a VoIP simulated system allowed to minimize the present vulnerabilities in 92% and increase the availability time of the VoIP service into an organization.

Keywords: Denial-of-Service SIP attacks, MS-DoS-SIP, security model, VoIP-SIP vulnerabilities

Procedia PDF Downloads 203
3728 Use of Proton Pump Inhibitors Medications during the First Years of Life and Late Complications

Authors: Kamelia Hamza

Abstract:

Background: Proton pump inhibitors (PPIs) are the most prescribed drug classes for pediatric gastroesophageal reflux disease (GERD).Many patients are treated with these drugs for atypical manifestations attributed to gastroesophageal reflux (GER), even in the absence of proved causal relationship. There is an impression of increase use of PPI's treatment for reflux in "clalit health services," the largest health organization in Israel. In the recent years, the medicine is given without restriction, it's not limited to pediatric gastroenterologists only, but pediatricians and family doctors. The objective of this study is to evaluate the hypothesis that exposure to PPIs during the first year of life is associated with an increased risk of developing late adverse diseases: pneumonia, asthma, AGE, IBD, celiac disease, allergic disorders, obesity, attention deficit hyperactivity disorders (ADHD), autism spectrum disorders (ASD). Methods: The study is a retrospective case-control cohort study based on a computerized database of Clalit Health Services (CHS). It includes 9844 children born between 2002-2018 and reported to complain of at least one of the symptoms (reflux/ spitting up, irritability, feeding difficulties, colics). The study population included the study group (n=4922) of children exposed to PPIs at any time prior to the first year of life and a control group (n=4922) child not exposed to PPIs who were matched to each case of the study group on age, race, socioeconomic status, and year of birth. The prevalence of late complications/diseases in the study group was compared with the prevalence of late complications/diseases diagnosis between 2002-2020 in the control group. Odds ratios and 95% confidence intervals were calculated by using logistic regression models. Results: We found that compared to the control group, children exposed to PPIs in the first year of life had an increased risk of developing several late complications/ disorders: pneumonia, asthma, various allergies (urticaria, allergic rhinitis, or allergic conjunctivitis) OR, inhalant allergies, and food allergies. In addition, they showed an increased risk of being diagnosed with ADHD or ASD, but children exposed to PPIs in the first year of life had decrease the risk of obesity by 17% (OR 0.825, 95%CI 0.697-0.976). Conclusions: We found significant associations between the use of PPIs during the first year of life and subsequent development of late complications/diseases such as respiratory diseases, allergy diseases, ADHD, and ASD. More studies are needed to prove causality and determine the mechanism behind the effect of PPIs and the development of late complications.

Keywords: acid suppressing medications, proton pump inhibitors, histamine 2 blocker, late complications, gastroesophageal reflux, gastroesophageal reflux disease, acute gastroenteritis, community acquired pneumonia, asthma, allergic diseases, obesity, inflammatory bowel diseases, ulcerative colitis, crohn disease, attention deficit hyperactivity disorders, autism spectrum disorders

Procedia PDF Downloads 94
3727 Analysis of the Fair Distribution of Urban Facilities in Kabul City by Population Modeling

Authors: Ansari Mohammad Reza, Hiroko Ono

Abstract:

In this study, we investigated how much of the urban facilities are fairly distributing in the city of Kabul based on the factor of population. To find the answer to this question we simulated a fair model for the distribution of investigated facilities in the city which is proposed based on the consideration of two factors; the number of users for each facility and the average distance of reach of each facility. Then the model was evaluated to make sure about its efficiency. And finally, the two—the existing pattern and the simulation model—were compared to find the degree of bias in the existing pattern of distribution of facilities in the city. The result of the study clearly clarified that the facilities are not fairly distributed in Kabul city based on the factor of population. Our analysis also revealed that the education services and the parks are the most and the worst fair distributed facilities in this regard.

Keywords: Afghanistan, ArcGIS Software, Kabul City, fair distribution, urban facilities

Procedia PDF Downloads 179
3726 Integrated Model for Enhancing Data Security Processing Time in Cloud Computing

Authors: Amani A. Saad, Ahmed A. El-Farag, El-Sayed A. Helali

Abstract:

Cloud computing is an important and promising field in the recent decade. Cloud computing allows sharing resources, services and information among the people of the whole world. Although the advantages of using clouds are great, but there are many risks in a cloud. The data security is the most important and critical problem of cloud computing. In this research a new security model for cloud computing is proposed for ensuring secure communication system, hiding information from other users and saving the user's times. In this proposed model Blowfish encryption algorithm is used for exchanging information or data, and SHA-2 cryptographic hash algorithm is used for data integrity. For user authentication process a simple user-name and password is used, the password uses SHA-2 for one way encryption. The proposed system shows an improvement of the processing time of uploading and downloading files on the cloud in secure form.

Keywords: cloud computing, data security, SAAS, PAAS, IAAS, Blowfish

Procedia PDF Downloads 359
3725 Managing the Cloud Procurement Process: Findings from a Case Study

Authors: Andreas Jede, Frank Teuteberg

Abstract:

Cloud computing (CC) has already gained overall appreciation in research and practice. Whereas the willingness to integrate cloud services in various IT environments is still unbroken, the previous CC procurement processes run mostly in an unorganized and non-standardized way. In practice, a sufficiently specific, yet applicable business process for the important acquisition phase is often lacking. And research does not appropriately remedy this deficiency yet. Therefore, this paper introduces a field-tested approach for CC procurement. Based on an extensive literature review and augmented by expert interviews, we designed a model that is validated and further refined through an in-depth real-life case study. For the detailed process description, we apply the event-driven process chain notation (EPC). The gained valuable insights into the case study may help CC research to shift to a more socio-technical area. For practice, next to giving useful organizational instructions we will provide extended checklists and lessons learned.

Keywords: cloud procurement process, IT-organization, event-driven process chain, in-depth case study

Procedia PDF Downloads 394
3724 Generational Differences in Leadership and Motivation: A Multilevel Study of Federal Workers

Authors: Sally Selden, Jyoti Aggarwal

Abstract:

The research on generational expectations about leadership is developing, but little scholarship exists on this topic for public sector organizations. Given the size of the federal workforce, this research study fills an important gap in the knowledge base and will inform public organizations how to approach managing and leading a multigenerational workforce. The research objectives of this study are to explore leadership preferences and motivation within generations and to determine whether these qualities differ by type of federal agency (e.g., law enforcement, human services, etc.). This paper will review the research on generational differences, expectations, and leadership with a focus on studies of public organizations. Using hierarchical linear modeling (HLM), this study will examine how leadership and motivation vary by generation in the federal government workforce, controlling for other demographic characteristics. The study will also examine whether generational differences impact satisfaction and performance. The study will utilize the 2019 Federal Employee Viewpoint Survey.

Keywords: multigenerational workforce, leadership, generational differences, federal workforce

Procedia PDF Downloads 225
3723 Characterization of the Airtightness Level in School Classrooms in Mediterranean Climate

Authors: Miguel A. Campano, Jesica Fernández-Agüera, Samuel Domínguez-Amarillo, Juan J. Sendra

Abstract:

An analysis of the air tightness level is performed on a representative sample of school classrooms in Southern Spain, which allows knowing the infiltration level of these classrooms, mainly through its envelope, which can affect both energy demand and occupant's thermal comfort. By using a pressurization/depressurization equipment (Blower-Door test), a characterization of 45 multipurpose classrooms have been performed in nine non-university educational institutions of the main climate zones of Southern Spain. In spite of having two doors and a high ratio between glass surface and outer surface, it is possible to see in these classrooms that there is an adequate level of airtightness, since all the n50 values obtained are lower than 9.0 ACH, with an average value around 7.0 ACH.

Keywords: air infiltration, energy efficiency, school buildings, thermal comfort, indoor air quality, ventilation

Procedia PDF Downloads 478
3722 A User Study on the Adoption of Context-Aware Destination Mobile Applications

Authors: Shu-Lu Hsu, Fang-Yi Chu

Abstract:

With the advances in information and communications technology, mobile context-aware applications have become powerful marketing tools. In Apple online store, there are numerous mobile applications (APPs) developed for destination tour. This study investigated the determinants of adoption of context-aware APPs for destination tour services. A model is proposed based on Technology Acceptance Model and privacy concern theory. The model was empirically tested based on a sample of 259 users of a tourism APP published by Kaohsiung Tourism Bureau, Taiwan. The results showed that the fitness of the model is well and, among all the factors, the perceived usefulness and perceived ease of use have the most significant influences on the intention to adopt context-aware destination APPs. Finally, contrary to the findings of previous literature, the effect of privacy concern on the adoption intention of context-aware APP is insignificant.

Keywords: mobile application, context-aware, privacy concern, TAM

Procedia PDF Downloads 258
3721 Translation Training in the AI Era

Authors: Min Gao

Abstract:

In the past year, the advent of large language models (LLMs) has brought about a revolution in the language service industry, making it possible to efficiently produce more satisfactory and higher-quality translations. This is groundbreaking news for commercial companies involved in language services since much of a translator's work can now be completed by machines. However, it may be bad news for universities that provide translation training programs. They need to confront the challenges posed by AI in education by reconsidering issues such as the reform of traditional teaching methods, the translation ethics of students, and the new demands of the job market for their graduates. This article is an exploratory study of these issues based on the author's experiences in translation teaching. The research combines methods in the form of questionnaires and interviews. The findings include: (1) students may lose their motivation to learn in the AI era, but this can be compensated for by encouragement from the lecturer; (2) Translation ethics are not a serious problem in schools, considering the strict policies and regulations in place; (3) The role of translators has evolved in the new era, necessitating a reform of the traditional teaching methods.

Keywords: job market of translation, large language model, translation ethics, translation training

Procedia PDF Downloads 68
3720 Policy for Implementing Decolonial Practices, Equity, Inclusivity, and Diversity into Radical Democratic Informal Art Gallery Education

Authors: Kaida Kobylka

Abstract:

Museum education policy can be developed through the lens of radical democracy and radically democratic relational aesthetics to provoke a more wholistic, agonistic, and utopian educational experiences that expand a viewer’s experiences and knowledge of artwork in a museum’s permanent collection to encourage a deeper understanding of art and the community of a museum’s connections to equity, diversity, inclusion, and decolonization. Practices used by the museum will create cohesive and engaging informal education that utilizes community-based, alternative knowledge and create dignity-safe spaces for viewers to engage critically with the visual objects.

Keywords: museum education, radical democracy, Canadian policy, community-based knowledge

Procedia PDF Downloads 71
3719 Gender-Transformative Education: A Pathway to Nourishing and Evolving Gender Equality in the Higher Education of Iran

Authors: Sepideh Mirzaee

Abstract:

Gender-transformative (G-TE) education is a challenging concept in the field of education and it is a matter of hot debate in the contemporary world. Paulo Freire as the prominent advocate of transformative education considers it as an alternative to conventional banking model of education. Besides, a more inclusive concept has been introduced, namely, G-TE, as an unbiased education fostering an environment of gender justice. As its main tenet, G-TE eliminates obstacles to education and improves social shifts. A plethora of contemporary research indicates that G-TE could completely revolutionize education systems by displacing inequalities and changing gender stereotypes. Despite significant progress in female education and its effects on gender equality in Iran, challenges persist. There are some deficiencies regarding gender disparities in the society and, education, specifically. As an example, the number of women with university degrees is on the rise; thus, there will be an increasing demand for employment in the society by them. Instead, many job opportunities remain occupied by men and it is seen as intolerable for the society to assign such occupations to women. In fact, Iran is regarded as a patriarchal society where educational contexts can play a critical role to assign gender ideology to its learners. Thus, such gender ideologies in the education can become the prevailing ideologies in the entire society. Therefore, improving education in this regard, can lead to a significant change in a society subsequently influencing the status of women not only within their own country but also on a global scale. Notably, higher education plays a vital role in this empowerment and social change. Particularly higher education can have a crucial part in imparting gender neutral ideologies to its learners and bringing about substantial change. It has the potential to alleviate the detrimental effects of gender inequalities. Therefore, this study aims to conceptualize the pivotal role of G-TE and its potential power in developing gender equality within the higher educational system of Iran presented within a theoretical framework. The study emphasizes the necessity of stablishing a theoretical grounding for citizenship, and transformative education while distinguishing gender related issues including gender equality, equity and parity. This theoretical foundation will shed lights on the decisions made by policy-makers, syllabus designers, material developers, and specifically professors and students. By doing so, they will be able to promote and implement gender equality recognizing the determinants, obstacles, and consequences of sustaining gender-transformative approaches in their classes within the Iranian higher education system. The expected outcomes include the eradication of gender inequality, transformation of gender stereotypes and provision of equal opportunities for both males and females in education.

Keywords: citizenship education, gender inequality, higher education, patriarchal society, transformative education

Procedia PDF Downloads 65
3718 Cyber-Med: Practical Detection Methodology of Cyber-Attacks Aimed at Medical Devices Eco-Systems

Authors: Nir Nissim, Erez Shalom, Tomer Lancewiki, Yuval Elovici, Yuval Shahar

Abstract:

Background: A Medical Device (MD) is an instrument, machine, implant, or similar device that includes a component intended for the purpose of the diagnosis, cure, treatment, or prevention of disease in humans or animals. Medical devices play increasingly important roles in health services eco-systems, including: (1) Patient Diagnostics and Monitoring; Medical Treatment and Surgery; and Patient Life Support Devices and Stabilizers. MDs are part of the medical device eco-system and are connected to the network, sending vital information to the internal medical information systems of medical centers that manage this data. Wireless components (e.g. Wi-Fi) are often embedded within medical devices, enabling doctors and technicians to control and configure them remotely. All these functionalities, roles, and uses of MDs make them attractive targets of cyber-attacks launched for many malicious goals; this trend is likely to significantly increase over the next several years, with increased awareness regarding MD vulnerabilities, the enhancement of potential attackers’ skills, and expanded use of medical devices. Significance: We propose to develop and implement Cyber-Med, a unique collaborative project of Ben-Gurion University of the Negev and the Clalit Health Services Health Maintenance Organization. Cyber-Med focuses on the development of a comprehensive detection framework that relies on a critical attack repository that we aim to create. Cyber-Med will allow researchers and companies to better understand the vulnerabilities and attacks associated with medical devices as well as providing a comprehensive platform for developing detection solutions. Methodology: The Cyber-Med detection framework will consist of two independent, but complementary detection approaches: one for known attacks, and the other for unknown attacks. These modules incorporate novel ideas and algorithms inspired by our team's domains of expertise, including cyber security, biomedical informatics, and advanced machine learning, and temporal data mining techniques. The establishment and maintenance of Cyber-Med’s up-to-date attack repository will strengthen the capabilities of Cyber-Med’s detection framework. Major Findings: Based on our initial survey, we have already found more than 15 types of vulnerabilities and possible attacks aimed at MDs and their eco-system. Many of these attacks target individual patients who use devices such pacemakers and insulin pumps. In addition, such attacks are also aimed at MDs that are widely used by medical centers such as MRIs, CTs, and dialysis engines; the information systems that store patient information; protocols such as DICOM; standards such as HL7; and medical information systems such as PACS. However, current detection tools, techniques, and solutions generally fail to detect both the known and unknown attacks launched against MDs. Very little research has been conducted in order to protect these devices from cyber-attacks, since most of the development and engineering efforts are aimed at the devices’ core medical functionality, the contribution to patients’ healthcare, and the business aspects associated with the medical device.

Keywords: medical device, cyber security, attack, detection, machine learning

Procedia PDF Downloads 357
3717 Energy Savings with the Use of LED Lights at the Wastewater Treatment Plant

Authors: Kishen Prathivadi

Abstract:

The Sewer Authority Mid-Coastside (SAM) is a Joint Powers Authority formed in 1976 and provides secondary wastewater treatment to an average flow of 2.0 million gallons per day. SAM owns and operates a Wastewater Treatment Plant (WWTP) and a sanitary sewage collection system that collects sewage from its three member agencies: the City of Half Moon Bay, the Granada Community Services District and Montara Water and Sanitary District. The Sewer Authority Mid-Coastside (SAM) partnered with Pacific Gas & Electric, and its contractor GEL America, to review and replace all inefficient lighting fixtures and bulbs at the SAM treatment plant and administrative office. The project focused on replacing old and inefficient lighting fixtures and bulbs, reducing annual operating and maintenance costs, and reducing SAM’s carbon footprint. The project resulted in a 55% overall energy reduction, higher light quality and acuity, and a total operational savings of $495,000 over ten years.

Keywords: energy savings, LED, lighting, electrical

Procedia PDF Downloads 139
3716 The Role of Social Media in Activating Youth Participation in the Community

Authors: Raya Hamed Hilal Al Maamari

Abstract:

The Gulf societies have been undergoing radical changes due to the technology transfer. It altered the humanities attitudes, especially, youth habits as they have become an addicted to using social media. This study aimed to find out the ratio of social media in guiding youth to participate with government’s institutions in decision-making and developing their societies. The study considered a descriptive study, social survey method was used on a sample of 100 young from different gulf countries, using an electronic questionnaire, as well as, some interviews with famous leaders of youth groups. Finally, the researcher suggested some effective ways activate youth efforts using social media in an effective manner to plan for the development policy in the community. The findings illustrated that social media plays a vital role in encouraging youth to participate enthusiastically in providing services. Noticeably, social media contains large numbers of youth. Therefore, the influences will be widely and feasible. Moreover, the study indicated the fact that most of the youth teamwork started in social media. Then, it has been growing in the real society.

Keywords: community, participation, social media, youth

Procedia PDF Downloads 375
3715 The SEMONT Monitoring and Risk Assessment of Environmental EMF Pollution

Authors: Dragan Kljajic, Nikola Djuric, Karolina Kasas-Lazetic, Danka Antic

Abstract:

Wireless communications have been expanded very fast in recent decades. This technology relies on an extensive network of base stations and antennas, using radio frequency signals to transmit information. Devices that use wireless communication, while offering various services, basically act as sources of non-ionizing electromagnetic fields (EMF). Such devices are permanently present in the human vicinity and almost constantly radiate, causing EMF pollution of the environment. This fact has initiated development of modern systems for observation of the EMF pollution, as well as for risk assessment. This paper presents the Serbian electromagnetic field monitoring network – SEMONT, designed for automated, remote and continuous broadband monitoring of EMF in the environment. Measurement results of the SEMONT monitoring at one of the test locations, within the main campus of the University of Novi Sad, are presented and discussed, along with corresponding exposure assessment of the general population, regarding the Serbian legislation.

Keywords: EMF monitoring, exposure assessment, sensor nodes, wireless network

Procedia PDF Downloads 264
3714 Urban Security through Urban Transformation: Case of Saraycik District

Authors: Emir Sunguroglu, Merve Sunguroglu, Yesim Aliefendioglu, Harun Tanrivermis

Abstract:

Basic human needs range from physiological needs such as food, water and shelter to safety needs such as security, protection from natural disasters and even urban terrorism which are extant and not fulfilled even in urban areas where people live civilly in large communities. These basic needs when arose in urban life lead to a different kind of crime set defined as urban crimes. Urban crimes mostly result from differences between socioeconomic conditions in society. Income inequality increases tendency towards urban crimes. Especially in slum areas and suburbs, urban crimes not only threaten public security but they also affect deliverance of public services. It is highlighted that, construction of urban security against problems caused by urban crimes is not only achieved by involvement of urban security in security of the community but also comprises juridical development and staying above a level of legal standards concurrently. The idea of urban transformation emerged as interventions to demolishment and rebuilding of built environment to solve the unhealthy urban environment, inadequate infrastructure and socioeconomic problems came up during the industrialization process. Considering the probability of urbanization process driving citizens to commit crimes, The United Nations Commission on Human Security’s focus on this theme is conferred to be a proper approach. In this study, the analysis and change in security before, through and after urban transformation, which is one of the tools related to urbanization process, is strived to be discussed through the case of Sincan County Saraycik District. The study also aims to suggest improvements to current legislation on public safety, urban resilience, and urban transformation. In spite of Saraycik District residing in a developing County in Ankara, Turkey, from urbanization perspective as well as socioeconomic and demographic indicators the District exhibits a negative view throughout the County and the country. When related to the county, rates of intentional harm reports, burglary reports, the offense of libel and threat reports and narcotic crime reports are higher. The District is defined as ‘crime hotspot’. Interviews with residents of Saraycik claim that the greatest issue of the neighborhood is Public Order and Security (82.44 %). The District becomes prominent with negative aspects, especially with the presence of unlicensed constructions, occurrence of important social issues such as crime and insecurity and complicated lives of inhabitants from poverty and low standard conditions of living. Additionally, the social structure and demographic properties and crime and insecurity of the field have been addressed in this study. Consequently, it is claimed that urban crime rates were related to level of education, employment and household income, poverty trap, physical condition of housing and structuration, accessibility of public services, security, migration, safety in terms of disasters and emphasized that urban transformation is one of the most important tools in order to provide urban security.

Keywords: urban security, urban crimes, urban transformation, Saraycik district

Procedia PDF Downloads 305
3713 Identity-Based Encryption: A Comparison of Leading Classical and Post-Quantum Implementations in an Enterprise Setting

Authors: Emily Stamm, Neil Smyth, Elizabeth O'Sullivan

Abstract:

In Identity-Based Encryption (IBE), an identity, such as a username, email address, or domain name, acts as the public key. IBE consolidates the PKI by eliminating the repetitive process of requesting public keys for each message encryption. Two of the most popular schemes are Sakai-Kasahara (SAKKE), which is based on elliptic curve pairings, and the Ducas, Lyubashevsky, and Prest lattice scheme (DLP- Lattice), which is based on quantum-secure lattice cryptography. In or- der to embed the schemes in a standard enterprise setting, both schemes are implemented as shared system libraries and integrated into a REST service that functions at the enterprise level. The performance of both schemes as libraries and services is compared, and the practicalities of implementation and application are discussed. Our performance results indicate that although SAKKE has the smaller key and ciphertext sizes, DLP-Lattice is significantly faster overall and we recommend it for most enterprise use cases.

Keywords: identity-based encryption, post-quantum cryptography, lattice-based cryptography, IBE

Procedia PDF Downloads 136
3712 Critical Design - Concepts, Methods and Practices for Innovative Societal Relationships

Authors: Martina Maria Keitsch

Abstract:

Critical Design (CD) confronts traditional design practice. Instead of reproducing and reinforcing contemporary perceptions of products and services, CD seeks to challenge them with the goal to stimulate debates and visions on societal innovation. CD methods comprise, among other narratives and design of critical objects. The oral presentation is based on a study that discusses concepts, methods, and applications of CD links CD to traditional design, and identifies CD benefits and challenges for design research and practice. The objective of the study is to introduce CD as an alternative for design researchers and practitioners supplementing commercially oriented design approaches. The study utilizes a literature review on CD concepts and methods based on current publications and online documents and illustrates CD practice with help of selected case studies. Findings of the study indicate that CD contribute, among others, to create new societal roles for designers, foster innovative relationships between designers and users, and encourage creativity through imaginative aesthetics.

Keywords: critical design, postmodern design theories, narratives, rhizome

Procedia PDF Downloads 171
3711 Welfare State and Income Distribution to School-Age Children

Authors: Kanyarat Bussaban, Siriporn Poolsuwan

Abstract:

This study is conducted with the objective to prove how the distorted distribution of welfare affects the quality of school-age children lives differently in the case of an urban community in Bangkok. 334 samples are households from Suan Oi and Ratchapatubtim communities. The study of sample communities found the difference between two community areas that are close. The people of Suan Oi community are economically better off people than the people of the Ratchapatubtim community. They share the benefits of using most services except the welfare of a child’s education. The resulting analysis of the variability in quality of life of the school age children indicate that heads of the households are women looking for quality of life benefits when the compulsory school age is less. A study of the two communities suggests that the inequality in income distribution currently affects the quality of life of school-age children.

Keywords: inequality, income distribution, quality of school-age children lives, welfare state

Procedia PDF Downloads 373
3710 Retaining Users in a Commercially-Supported Social Network

Authors: Sasiphan Nitayaprapha

Abstract:

A commercially-supported social network has become an emerging channel for an organization to communicate with and provide services to customers. The success of the commercially-supported social network depends on the ability of the organization to keep the customers in participating in the network. Drawing from the theories of information adoption, information systems continuance, and web usability, the author develops a model to explore how a commercially-supported social network can encourage customers to continue participating and using the information in the network. The theoretical model will be proved through an online survey of customers using the commercially-supported social networking sites of several high technology companies operating in the same sector. The result will be compared with previous studies to learn about the explanatory power of the research model, and to identify the main factors determining users’ intention to continue using a commercially-supported social network. Theoretical and practical implications, and limitations are discussed.

Keywords: social network, information adoption, information systems continuance, web usability, user satisfaction

Procedia PDF Downloads 316
3709 Secure Mobile E-Business Applications

Authors: Hala A. Alrumaih

Abstract:

It is widely believed that mobile device is a promising technology for lending the opportunity for the third wave of electronic commerce. Mobile devices have changed the way companies do business. Many applications are under development or being incorporated into business processes. In this day, mobile applications are a vital component of any industry strategy. One of the greatest benefits of selling merchandise and providing services on a mobile application is that it widens a company’s customer base significantly. Mobile applications are accessible to interested customers across regional and international borders in different electronic business (e-business) area. But there is a dark side to this success story. The security risks associated with mobile devices and applications are very significant. This paper introduces a broad risk analysis for the various threats, vulnerabilities, and risks in mobile e-business applications and presents some important risk mitigation approaches. It reviews and compares two different frameworks for security assurance in mobile e-business applications. Based on the comparison, the paper suggests some recommendations for applications developers and business owners in mobile e-business application development process.

Keywords: e-business, mobile applications, risk mitigations, security assurance

Procedia PDF Downloads 295
3708 Sensor Data Analysis for a Large Mining Major

Authors: Sudipto Shanker Dasgupta

Abstract:

One of the largest mining companies wanted to look at health analytics for their driverless trucks. These trucks were the key to their supply chain logistics. The automated trucks had multi-level sub-assemblies which would send out sensor information. The use case that was worked on was to capture the sensor signal from the truck subcomponents and analyze the health of the trucks from repair and replacement purview. Open source software was used to stream the data into a clustered Hadoop setup in Amazon Web Services cloud and Apache Spark SQL was used to analyze the data. All of this was achieved through a 10 node amazon 32 core, 64 GB RAM setup real-time analytics was achieved on ‘300 million records’. To check the scalability of the system, the cluster was increased to 100 node setup. This talk will highlight how Open Source software was used to achieve the above use case and the insights on the high data throughput on a cloud set up.

Keywords: streaming analytics, data science, big data, Hadoop, high throughput, sensor data

Procedia PDF Downloads 404
3707 Towards a More Inclusive Society: A Study on the Assimilation and Integration of the Migrant Children in Kerala

Authors: Arun Perumbilavil Anand

Abstract:

For the past few years, the state of Kerala has been witnessing a large inflow of migrant workers from other states of the country, which emerged as a result of demographic transition and Gulf emigration. The in-migration patterns in Kerala have changed over the time with the migrants having a higher residence history bringing their families to the state, thereby making the process more complicated and divergent in its approach. These developments have led to an increase in the young migrant population at least in some parts of the state, which has opened up doubts and questions related to their future in the host society. At this juncture, the study ponders into the factors that are associated with the assimilation and wellbeing of migrant children in the society of Kerala. As one of the objectives, the study also analyzed the influence and role played by the educational institutions (both public and private) in meeting the needs and aspirations of both the children and their parents. The study gains significance as it tries to identify various impediments that hinder the cognitive skill formation and behaviour patterns of the migrant children in the host society. Data and Methodology: The study is based on the primary data collected through a series of interviews and interactions held with parents, children, and teachers of different educational institutions, including both public and private. The primary survey also made use of research techniques like observation, in-depth interviews, and case study method. The study was conducted in schools in the Kanjikode area of the Palakkad district in Kerala. The findings of the study are on the basis of a survey conducted in four schools and 40 migrant children. Findings: The study found that majority of the children have wholly integrated and assimilated into the host society. The influence of the peer group was quite visible in giving stimulus to the assimilation process. Most of the children do not have any emotional or cultural sentiments attached to their state of origin, and they consider Kerala as their ‘home state’ and the local language (Malayalam) as their ‘mother tongue'. The study could also find that the existing education system in the host society fails to meet the needs and aspirations of migrants as well as that of their children. On a comparative scale, to some extent, private schools have succeeded in fulfiling the special requirements of the migrant children. An interesting point that the study could pinpoint at is that the children of the migrants show better health conditions and wellbeing than compared to the natives, which is usually addressed as an epidemiologic paradox. As a concluding remark, the study recommends the inclusion concept of inclusive education into the education system of the state with giving due emphasis on those who are at higher risk of being excluded or marginalized, along with fostering increased interaction between diverse groups.

Keywords: assimilation, Kerala, migrant children, well-being

Procedia PDF Downloads 170
3706 Chaos Cryptography in Cloud Architectures with Lower Latency

Authors: Mohammad A. Alia

Abstract:

With the rapid evolution of the internet applications, cloud computing becomes one of today’s hottest research areas due to its ability to reduce costs associated with computing. Cloud is, therefore, increasing flexibility and scalability for computing services in the internet. Cloud computing is Internet based computing due to shared resources and information which are dynamically delivered to consumers. As cloud computing share resources via the open network, hence cloud outsourcing is vulnerable to attack. Therefore, this paper will explore data security of cloud computing by implementing chaotic cryptography. The proposal scenario develops a problem transformation technique that enables customers to secretly transform their information. This work proposes the chaotic cryptographic algorithms have been applied to enhance the security of the cloud computing accessibility. However, the proposed scenario is secure, easy and straightforward process. The chaotic encryption and digital signature systems ensure the security of the proposed scenario. Though, the choice of the key size becomes crucial to prevent a brute force attack.

Keywords: chaos, cloud computing, security, cryptography

Procedia PDF Downloads 345
3705 Strategies for Incorporating Intercultural Intelligence into Higher Education

Authors: Hyoshin Kim

Abstract:

Most post-secondary educational institutions have offered a wide variety of professional development programs and resources in order to advance the quality of education. Such programs are designed to support faculty members by focusing on topics such as course design, behavioral learning objectives, class discussion, and evaluation methods. These are based on good intentions and might help both new and experienced educators. However, the fundamental flaw is that these ‘effective methods’ are assumed to work regardless of what we teach and whom we teach. This paper is focused on intercultural intelligence and its application to education. It presents a comprehensive literature review on context and cultural diversity in terms of beliefs, values and worldviews. What has worked well with a group of homogeneous local students may not work well with more diverse and international students. It is because students hold different notions of what is means to learn or know something. It is necessary for educators to move away from certain sets of generic teaching skills, which are based on a limited, particular view of teaching and learning. The main objective of the research is to expand our teaching strategies by incorporating what students bring to the course. There have been a growing number of resources and texts on teaching international students. Unfortunately, they tend to be based on the deficiency model, which treats diversity not as strengths, but as problems to be solved. This view is evidenced by the heavy emphasis on assimilationist approaches. For example, cultural difference is negatively evaluated, either implicitly or explicitly. Therefore the pressure is on culturally diverse students. The following questions reflect the underlying assumption of deficiencies: - How can we make them learn better? - How can we bring them into the mainstream academic culture?; and - How can they adapt to Western educational systems? Even though these questions may be well-intended, there seems to be something fundamentally wrong as the assumption of cultural superiority is embedded in this kind of thinking. This paper examines how educators can incorporate intercultural intelligence into the course design by utilizing a variety of tools such as pre-course activities, peer learning and reflective learning journals. The main goal is to explore ways to engage diverse learners in all aspects of learning. This can be achieved by activities designed to understand their prior knowledge, life experiences, and relevant cultural identities. It is crucial to link course material to students’ diverse interests thereby enhancing the relevance of course content and making learning more inclusive. Internationalization of higher education can be successful only when cultural differences are respected and celebrated as essential and positive aspects of teaching and learning.

Keywords: intercultural competence, intercultural intelligence, teaching and learning, post-secondary education

Procedia PDF Downloads 211
3704 Application of Metroxylon Sagu Waste in Textile Process

Authors: Nazlina Shaari

Abstract:

Sustainability is economic, social and environmental systems that make up the community in providing a healthy, productive, meaningful life for all community residents, present and future. The environmental profile of goods and services that satisfy our individual and societal needs were shaped by design activities. The integration of environmental aspect of product design, especially in textiles present much confusion surrounds the incorporation of environmental objectives into the design process. This paper explores the effective use of waste materials that can contribute to the development of more environmentally responsible practice in textile sector. It introduces key elements of the ecological approach and innovative ideas from waste to wealth. The paper focuses on the potential methods of utilizing sago residue as a natural colour enhancer in natural dyeing process. It will discover the potential of waste materials to be fully utilized to attempt to make the production of that textile more environmentally friendly.

Keywords: sustainability, textiles, waste materials, environmentally friendly

Procedia PDF Downloads 319