Search results for: cyber resilience
634 Considering Uncertainties of Input Parameters on Energy, Environmental Impacts and Life Cycle Costing by Monte Carlo Simulation in the Decision Making Process
Authors: Johannes Gantner, Michael Held, Matthias Fischer
Abstract:
The refurbishment of the building stock in terms of energy supply and efficiency is one of the major challenges of the German turnaround in energy policy. As the building sector accounts for 40% of Germany’s total energy demand, additional insulation is key for energy efficient refurbished buildings. Nevertheless the energetic benefits often the environmental and economic performances of insulation materials are questioned. The methods Life Cycle Assessment (LCA) as well as Life Cycle Costing (LCC) can form the standardized basis for answering this doubts and more and more become important for material producers due efforts such as Product Environmental Footprint (PEF) or Environmental Product Declarations (EPD). Due to increasing use of LCA and LCC information for decision support the robustness and resilience of the results become crucial especially for support of decision and policy makers. LCA and LCC results are based on respective models which depend on technical parameters like efficiencies, material and energy demand, product output, etc.. Nevertheless, the influence of parameter uncertainties on lifecycle results are usually not considered or just studied superficially. Anyhow the effect of parameter uncertainties cannot be neglected. Based on the example of an exterior wall the overall lifecycle results are varying by a magnitude of more than three. As a result simple best case worst case analyses used in practice are not sufficient. These analyses allow for a first rude view on the results but are not taking effects into account such as error propagation. Thereby LCA practitioners cannot provide further guidance for decision makers. Probabilistic analyses enable LCA practitioners to gain deeper understanding of the LCA and LCC results and provide a better decision support. Within this study, the environmental and economic impacts of an exterior wall system over its whole lifecycle are illustrated, and the effect of different uncertainty analysis on the interpretation in terms of resilience and robustness are shown. Hereby the approaches of error propagation and Monte Carlo Simulations are applied and combined with statistical methods in order to allow for a deeper understanding and interpretation. All in all this study emphasis the need for a deeper and more detailed probabilistic evaluation based on statistical methods. Just by this, misleading interpretations can be avoided, and the results can be used for resilient and robust decisions.Keywords: uncertainty, life cycle assessment, life cycle costing, Monte Carlo simulation
Procedia PDF Downloads 286633 Current Status of Industry 4.0 in Material Handling Automation and In-house Logistics
Authors: Orestis Κ. Efthymiou, Stavros T. Ponis
Abstract:
In the last decade, a new industrial revolution seems to be emerging, supported -once again- by the rapid advancements of Information Technology in the areas of Machine-to-Machine (M2M) communication permitting large numbers of intelligent devices, e.g. sensors to communicate with each other and take decisions without any or minimum indirect human intervention. The advent of these technologies have triggered the emergence of a new category of hybrid (cyber-physical) manufacturing systems, combining advanced manufacturing techniques with innovative M2M applications based on the Internet of Things (IoT), under the umbrella term Industry 4.0. Even though the topic of Industry 4.0 has attracted much attention during the last few years, the attempts of providing a systematic literature review of the subject are scarce. In this paper, we present the authors’ initial study of the field with a special focus on the use and applications of Industry 4.0 principles in material handling automations and in-house logistics. Research shows that despite the vivid discussion and attractiveness of the subject, there are still many challenges and issues that have to be addressed before Industry 4.0 becomes standardized and widely applicable.Keywords: Industry 4.0, internet of things, manufacturing systems, material handling, logistics
Procedia PDF Downloads 127632 Genetic Algorithms Based ACPS Safety
Authors: Emine Laarouchi, Daniela Cancila, Laurent Soulier, Hakima Chaouchi
Abstract:
Cyber-Physical Systems as drones proved their efficiency for supporting emergency applications. For these particular applications, travel time and autonomous navigation algorithms are of paramount importance, especially when missions are performed in urban environments with high obstacle density. In this context, however, safety properties are not properly addressed. Our ambition is to optimize the system safety level under autonomous navigation systems, by preserving performance of the CPS. At this aim, we introduce genetic algorithms in the autonomous navigation process of the drone to better infer its trajectory considering the possible obstacles. We first model the wished safety requirements through a cost function and then seek to optimize it though genetics algorithms (GA). The main advantage in the use of GA is to consider different parameters together, for example, the level of battery for navigation system selection. Our tests show that the GA introduction in the autonomous navigation systems minimize the risk of safety lossless. Finally, although our simulation has been tested for autonomous drones, our approach and results could be extended for other autonomous navigation systems such as autonomous cars, robots, etc.Keywords: safety, unmanned aerial vehicles , CPS, ACPS, drones, path planning, genetic algorithms
Procedia PDF Downloads 181631 The Impact of Artificial Intelligence on Human Rights Priciples and Obligations
Authors: Rady Farag Aziz Ibrahim
Abstract:
The gap between Islamic terrorism and human rights has become an important issue in the fight against Islamic terrorism worldwide. This situation is repeated because terrorism and human rights are interconnected in such a way that when the former begins, the latter becomes subject to violence. This unknown relationship was recognized in the Vienna Declaration and Program of Action adopted at the International Conference on Human Rights held in Vienna on 25 June 1993, confirming that terrorist acts, in all their forms and manifestations, aim to destroy the rights of individuals. humanity to destroy. Therefore, Islamic terrorism is a violation of basic human rights. For this purpose, the first part of the article will focus on the relationship between terrorism and human rights and the synergy between these two concepts. The second part then explores the emerging concept of cyber threats and how they exist. Additionally, technology analysis will be conducted against threats based on human rights. This will be achieved through analysis of the concept of 'securitization' of human rights and by striking a balance between counter-terrorism measures and the protection of human rights at all costs. This article concludes with recommendations on how to balance terrorism and human rights today.Keywords: sustainable development, human rights, the right to development, the human rights-based approach to development
Procedia PDF Downloads 44630 Banking Innovation and Customers' Satisfaction in Nigeria: A Case Study of Some Selected Banks
Authors: Jameelah O. Yaqub
Abstract:
The financial industry all over the world has undergone and still undergoing great transformation especially with the introduction of e-products which involves the use of computers and telecommunications to enable banking transactions to be done by telephone or computer rather than by humans. The adoption of e-banking in Nigeria is becoming more popular with customers now being able to use the ATM cards for different transactions. The internet banking, POS machines, telephone banking as well as mobile banking are some other e-products being used in Nigeria. This study examines how satisfied bank customers are with the e-products. The study found that the ATM is the most popular e-products among bank customers in Nigeria; followed by the POS. The least use of the e-products is telephone banking. The study also found that visits to banks for transactions declined with the use of e-products. The chi-square analysis shows that there is significant relationship between the use of banks’ e-products and customers’ satisfaction. One of the major reason adduced by respondents for low usage of e-products is insecurity or fear of cyber fraud, it is therefore recommended that banks should provide adequate. Security for transactions and ensure the proper backing up of critical data files. In addition, government should ensure stable electricity supply to reduce banks’ running costs and consequently, customers’ cost of transactions.Keywords: banks, e-products, innovation, Nigeria
Procedia PDF Downloads 337629 System Security Impact on the Dynamic Characteristics of Measurement Sensors in Smart Grids
Authors: Yiyang Su, Jörg Neumann, Jan Wetzlich, Florian Thiel
Abstract:
Smart grid is a term used to describe the next generation power grid. New challenges such as integration of renewable and decentralized energy sources, the requirement for continuous grid estimation and optimization, as well as the use of two-way flows of energy have been brought to the power gird. In order to achieve efficient, reliable, sustainable, as well as secure delivery of electric power more and more information and communication technologies are used for the monitoring and the control of power grids. Consequently, the need for cybersecurity is dramatically increased and has converged into several standards which will be presented here. These standards for the smart grid must be designed to satisfy both performance and reliability requirements. An in depth investigation of the effect of retrospectively embedded security in existing grids on it’s dynamic behavior is required. Therefore, a retrofitting plan for existing meters is offered, and it’s performance in a test low voltage microgrid is investigated. As a result of this, integration of security measures into measurement architectures of smart grids at the design phase is strongly recommended.Keywords: cyber security, performance, protocols, security standards, smart grid
Procedia PDF Downloads 325628 The Role of Virtual Reality in Mediating the Vulnerability of Distant Suffering: Distance, Agency, and the Hierarchies of Human Life
Authors: Z. Xu
Abstract:
Immersive virtual reality (VR) has gained momentum in humanitarian communication due to its utopian promises of co-presence, immediacy, and transcendence. These potential benefits have led the United Nations (UN) to tirelessly produce and distribute VR series to evoke global empathy and encourage policymakers, philanthropic business tycoons and citizens around the world to actually do something (i.e. give a donation). However, it is unclear whether or not VR can cultivate cosmopolitans with a sense of social responsibility towards the geographically, socially/culturally and morally mediated misfortune of faraway others. Drawing upon existing works on the mediation of distant suffering, this article constructs an analytical framework to articulate the issue. Applying this framework on a case study of five of the UN’s VR pieces, the article identifies three paradoxes that exist between cyber-utopian and cyber-dystopian narratives. In the “paradox of distance”, VR relies on the notions of “presence” and “storyliving” to implicitly link audiences spatially and temporally to distant suffering, creating global connectivity and reducing perceived distances between audiences and others; yet it also enables audiences to fully occupy the point of view of distant sufferers (creating too close/absolute proximity), which may cause them to feel naive self-righteousness or narcissism with their pleasures and desire, thereby destroying the “proper distance”. In the “paradox of agency”, VR simulates a superficially “real” encounter for visual intimacy, thereby establishing an “audiences–beneficiary” relationship in humanitarian communication; yet in this case the mediated hyperreality is not an authentic reality, and its simulation does not fill the gap between reality and the virtual world. In the “paradox of the hierarchies of human life”, VR enables an audience to experience virtually fundamental “freedom”, epitomizing an attitude of cultural relativism that informs a great deal of contemporary multiculturalism, providing vast possibilities for a more egalitarian representation of distant sufferers; yet it also takes the spectator’s personally empathic feelings as the focus of intervention, rather than structural inequality and political exclusion (an economic and political power relations of viewing). Thus, the audience can potentially remain trapped within the minefield of hegemonic humanitarianism. This study is significant in two respects. First, it advances the turn of digitalization in studies of media and morality in the polymedia milieu; it is motivated by the necessary call for a move beyond traditional technological environments to arrive at a more novel understanding of the asymmetry of power between the safety of spectators and the vulnerability of mediated sufferers. Second, it not only reminds humanitarian journalists and NGOs that they should not rely entirely on the richer news experience or powerful response-ability enabled by VR to gain a “moral bond” with distant sufferers, but also argues that when fully-fledged VR technology is developed, it can serve as a kind of alchemy and should not be underestimated merely as a “bugaboo” of an alarmist philosophical and fictional dystopia.Keywords: audience, cosmopolitan, distant suffering, virtual reality, humanitarian communication
Procedia PDF Downloads 145627 Intrusion Detection Based on Graph Oriented Big Data Analytics
Authors: Ahlem Abid, Farah Jemili
Abstract:
Intrusion detection has been the subject of numerous studies in industry and academia, but cyber security analysts always want greater precision and global threat analysis to secure their systems in cyberspace. To improve intrusion detection system, the visualisation of the security events in form of graphs and diagrams is important to improve the accuracy of alerts. In this paper, we propose an approach of an IDS based on cloud computing, big data technique and using a machine learning graph algorithm which can detect in real time different attacks as early as possible. We use the MAWILab intrusion detection dataset . We choose Microsoft Azure as a unified cloud environment to load our dataset on. We implement the k2 algorithm which is a graphical machine learning algorithm to classify attacks. Our system showed a good performance due to the graphical machine learning algorithm and spark structured streaming engine.Keywords: Apache Spark Streaming, Graph, Intrusion detection, k2 algorithm, Machine Learning, MAWILab, Microsoft Azure Cloud
Procedia PDF Downloads 149626 Developing Serious Games to Improve Learning Experience of Programming: A Case Study
Authors: Shan Jiang, Xinyu Tang
Abstract:
Game-based learning is an emerging pedagogy to make the learning experience more effective, enjoyable, and fun. However, most games used in classroom settings have been overly simplistic. This paper presents a case study on a Python-based online game designed to improve the effectiveness in both teaching and research in higher education. The proposed game system not only creates a fun and enjoyable experience for students to learn various topics in programming but also improves the effectiveness of teaching in several aspects, including material presentation, helping students to recognize the importance of the subjects, and linking theoretical concepts to practice. The proposed game system also serves as an information cyber-infrastructure that automatically collects and stores data from players. The data could be useful in research areas including human-computer interaction, decision making, opinion mining, and artificial intelligence. They further provide other possibilities beyond these areas due to the customizable nature of the game.Keywords: game-based learning, programming, research-teaching integration, Hearthstone
Procedia PDF Downloads 166625 General Awareness of Teenagers in Information Security
Authors: Magdaléna Náplavová, Tomáš Ludík, Petr Hrůza, František Božek
Abstract:
The use of IT equipment has become a part of every day. However, each device that is part of cyberspace should be secured against unauthorized use. It is very important to know the basics of these security devices, but also the basics of safe conduct their owners. This information should be part of every curriculum computer science education in primary and secondary schools. Therefore, the work focuses on the education of pupils in primary and secondary schools on the Internet. Analysis of the current state describes approaches to the education of pupils in security issues on the Internet. The paper presents a questionnaire-based survey which was carried out in the Czech Republic, whose task was to ascertain the level of opinion pupils in primary and secondary schools on the issue of communication in social networks. The research showed that awareness of socio-pathological phenomena on the Internet environment is very low. Based on the results it was proposed appropriate ways of teaching to this issue and its inclusion a proposal of curriculum for primary and secondary schools.Keywords: information security, cyber space, general awareness, questionnaire, socio-pathological phenomena, educational system
Procedia PDF Downloads 392624 Securing Healthcare IoT Devices and Enabling SIEM Integration: Addressing
Authors: Mubarak Saadu Nabunkari, Abdullahi Abdu Ibrahim, Muhammad Ilyas
Abstract:
This study looks at how Internet of Things (IoT) devices are used in healthcare to monitor and treat patients better. However, using these devices in healthcare comes with security problems. The research explores using Security Information and Event Management (SIEM) systems with healthcare IoT devices to solve these security challenges. Reviewing existing literature shows the current state of IoT security and emphasizes the need for better protection. The main worry is that healthcare IoT devices can be easily hacked, putting patient data and device functionality at risk. To address this, the research suggests a detailed security framework designed for these devices. This framework, based on literature and best practices, includes important security measures like authentication, data encryption, access controls, and anomaly detection. Adding SIEM systems to this framework helps detect threats in real time and respond quickly to incidents, making healthcare IoT devices more secure. The study highlights the importance of this integration and offers guidance for implementing healthcare IoT securely, efficiently, and effectively.Keywords: cyber security, threat intelligence, forensics, heath care
Procedia PDF Downloads 67623 Enterprise Risk Management: A Future Outlook
Authors: Ruchi Agarwal, Jake Ansell
Abstract:
Austerity impacts on all aspects of society. Companies into the future will have to be more capable of dealing with the risks they face. Enterprise Risk Management (ERM) has widely been accepted in recent years as an approach to manage risks within businesses. ERM attempts to tackle risk holistically with gains from opportunities in a managing risk and reduction in the risk of failure. The paper reviews merits and demerits of approaches to risk management in regard to antifragility. A qualitative study has investigated current practices and the problems with ERM implementation by interviewing over 25 chief risk officers and senior management. The findings indicate the gap in ERM description, understanding, and implementation. The paper suggests risk learning and expertise knowledge supports development of effective enterprise risk management by designing systems with inherent resilience.Keywords: risk management, interviews, antifragility, failure
Procedia PDF Downloads 562622 The Integration of Fintech Technologies in Crowdfunding: A Catalyst for Financial Inclusion and Responsible Finance
Authors: Badrane Hasnaa, Bouzahir Brahim
Abstract:
This article examines the impact of fintech technologies on crowdfunding, particularly their potential to enhance financial inclusion and promote responsible finance. It explores how the adoption of blockchain, artificial intelligence, and other fintech innovations is transforming crowdfunding by making it more accessible, transparent, and ethical. By analyzing case studies and recent data, the article illustrates how these technologies help overcome traditional barriers to financing while promoting sustainable financial practices. The findings suggest that integrating fintech into crowdfunding can not only broaden access to funding for marginalized populations but also encourage more responsible management of financial resources, contributing to a fairer and more resilient economy.Keywords: crowdfunding, fintech, inclusion financière, finance responsible, blockchain, resilience financière
Procedia PDF Downloads 24621 Determinants of Psychological Distress in Teenagers and Young Adults Affected by Cancer: A Systematic Review
Authors: Anna Bak-Klimek, Emily Spencer, Siew Lee, Karen Campbell, Wendy McInally
Abstract:
Background & Significance: Over half of Teenagers and Young Adults (TYAs) say that they experience psychological distress after cancer diagnosis and TYAs with cancer are at higher risk of developing distress compared to other age groups. Despite this there are no age-appropriate interventions to help TYAs manage distress and there is a lack of conceptual understanding of what causes distress in this population group. This makes it difficult to design a targeted, developmentally appropriate intervention. This review aims to identify the key determinants of distress in TYAs affected by cancer and to propose an integrative model of cancer-related distress for TYAs. Method: A literature search was performed in Cochrane Database of Systematic Reviews, MEDLINE, PsycINFO, CINAHL, EMBASE and PsycArticles in May-June, 2022. Quantitative literature was systematically reviewed on the relationship between psychological distress experienced by TYAs affected by cancer and a wide range of factors i.e. individual (demographic, psychological, developmental, and clinical factors) and contextual (social/environmental) factors. Evidence was synthesized and correlates were categorized using the Biopsychosocial Model. The full protocol is available from PROSPERO (CRD42022322069) Results: Thirty eligible quantitative studies met criteria for the review. A total of twenty-six studies were cross-sectional, three were longitudinal and one study was a case control study. The evidence on the relationship between the socio-demographic, illness and treatment-related factors and psychological distress is inconsistent and unclear. There is however consistent evidence on the link between psychological factors and psychological distress. For instance, the use of cognitive and defence coping, negative meta-cognitive beliefs, less optimism, a lack of sense of meaning and lower resilience levels were significantly associated with higher psychological distress. Furthermore, developmental factors such as poor self-image, identity issues and perceived conflict were strongly associated with higher distress levels. Conclusions: The current review suggests that psychological and developmental factors such as ineffective coping strategies, poor self-image and identity issues may play a key role in the development of psychological distress in TYAs affected by cancer. The review proposes a Positive Developmental Psychology Model of Distress for Teenagers and Young Adults affected by cancer. The review highlights that implementation of psychological interventions that foster optimism, improve resilience and address self-image may result in reduced distress in TYA’s with cancer.Keywords: cancer, determinant, psychological distress, teenager and young adult, theoretical model
Procedia PDF Downloads 97620 Enhancing Human Security Through Conmprehensive Counter-terrorism Measures
Authors: Alhaji Khuzaima Mohammed Osman, Zaeem Sheikh Abdul Wadudi Haruna
Abstract:
This article aims to explore the crucial link between counter-terrorism efforts and the preservation of human security. As acts of terrorism continue to pose significant threats to societies worldwide, it is imperative to develop effective strategies that mitigate risks while safeguarding the rights and well-being of individuals. This paper discusses key aspects of counter-terrorism and human security, emphasizing the need for a comprehensive approach that integrates intelligence, prevention, response, and resilience-building measures. By highlighting successful case studies and lessons learned, this article provides valuable insights for policymakers, law enforcement agencies, and practitioners in their quest to address terrorism and foster human security.Keywords: human security, risk mitigation, terrorist activities, civil liberties
Procedia PDF Downloads 91619 A Blockchain-Based Protection Strategy against Social Network Phishing
Authors: Francesco Buccafurri, Celeste Romolo
Abstract:
Nowadays phishing is the most frequent starting point of cyber-attack vectors. Phishing is implemented both via email and social network messages. While a wide scientific literature exists which addresses the problem of contrasting email spam-phishing, no specific countermeasure has been so far proposed for phishing included into private messages of social network platforms. Unfortunately, the problem is severe. This paper proposes an approach against social network phishing, based on a non invasive collaborative information-sharing approach which leverages blockchain. The detection method works by filtering candidate messages, by distilling them by means of a distance-preserving hash function, and by publishing hashes over a public blockchain through a trusted smart contract (thus avoiding denial of service attacks). Phishing detection exploits social information embedded into social network profiles to identify similar messages belonging to disjoint contexts. The main contribution of the paper is to introduce a new approach to contrasting the problem of social network phishing, which, despite its severity, received little attention by both research and industry.Keywords: phishing, social networks, information sharing, blockchain
Procedia PDF Downloads 330618 Predictive Output Feedback Linearization for Safe Control of Collaborative Robots
Authors: Aliasghar Arab
Abstract:
Autonomous robots interacting with humans, as safety-critical nonlinear control systems, are complex closed-loop cyber-physical dynamical machines. Keeping these intelligent yet complicated systems safe and smooth during their operations is challenging. The aim of the safe predictive output feedback linearization control synthesis is to design a novel controller for smooth trajectory following while unsafe situations must be avoided. The controller design should obtain a linearized output for smoothness and invariance to a safety subset. Inspired by finite-horizon nonlinear model predictive control, the problem is formulated as constrained nonlinear dynamic programming. The safety constraints can be defined as control barrier functions. Avoiding unsafe maneuvers and performing smooth motions increases the predictability of the robot’s movement for humans when robots and people are working together. Our results demonstrate the proposed output linearization method obeys the safety constraints and, compared to existing safety-guaranteed methods, is smoother and performs better.Keywords: robotics, collaborative robots, safety, autonomous robots
Procedia PDF Downloads 98617 Incorporating Multiple Supervised Learning Algorithms for Effective Intrusion Detection
Authors: Umar Albalawi, Sang C. Suh, Jinoh Kim
Abstract:
As internet continues to expand its usage with an enormous number of applications, cyber-threats have significantly increased accordingly. Thus, accurate detection of malicious traffic in a timely manner is a critical concern in today’s Internet for security. One approach for intrusion detection is to use Machine Learning (ML) techniques. Several methods based on ML algorithms have been introduced over the past years, but they are largely limited in terms of detection accuracy and/or time and space complexity to run. In this work, we present a novel method for intrusion detection that incorporates a set of supervised learning algorithms. The proposed technique provides high accuracy and outperforms existing techniques that simply utilizes a single learning method. In addition, our technique relies on partial flow information (rather than full information) for detection, and thus, it is light-weight and desirable for online operations with the property of early identification. With the mid-Atlantic CCDC intrusion dataset publicly available, we show that our proposed technique yields a high degree of detection rate over 99% with a very low false alarm rate (0.4%).Keywords: intrusion detection, supervised learning, traffic classification, computer networks
Procedia PDF Downloads 352616 Analysis of Environmental Sustainability in Post- Earthquake Reconstruction : A Case of Barpak, Nepal
Authors: Sudikshya Bhandari, Jonathan K. London
Abstract:
Barpak in northern Nepal represents a unique identity expressed through the local rituals, values, lifeways and the styles of vernacular architecture. The traditional residential buildings and construction practices adopted by the dominant ethnic groups: Ghales and Gurungs, reflect environmental, social, cultural and economic concerns. However, most of these buildings did not survive the Gorkha earthquake in 2015 that made many residents skeptical about their strength to resist future disasters. This led Barpak residents to prefer modern housing designs primarily for the strength but additionally for convenience and access to earthquake relief funds. Post-earthquake reconstruction has transformed the cohesive community, developed over hundreds of years into a haphazard settlement with the imposition of externally-driven building models. Housing guidelines provided for the community reconstruction and earthquake resilience have been used as a singular template, similar to other communities on different geographical locations. The design and construction of these buildings do not take into account the local, historical, environmental, social, cultural and economic context of Barpak. In addition to the physical transformation of houses and the settlement, the consequences continue to develop challenges to sustainability. This paper identifies the major challenges for environmental sustainability with the construction of new houses in post-earthquake Barpak. Mixed methods such as interviews, focus groups, site observation, and documentation, and analysis of housing and neighborhood design have been used for data collection. The discernible changing situation of this settlement due to the new housing has included reduced climatic adaptation and thermal comfort, increased consumption of agricultural land and water, minimized use of local building materials, and an increase in energy demand. The research has identified that reconstruction housing practices happening in Barpak, while responding to crucial needs for disaster recovery and resilience, are also leading this community towards an unsustainable future. This study has also integrated environmental, social, cultural and economic parameters into an assessment framework that could be used to develop place-based design guidelines in the context of other post-earthquake reconstruction efforts. This framework seeks to minimize the unintended repercussions of unsustainable reconstruction interventions, support the vitality of vernacular architecture and traditional lifeways and respond to context-based needs in coordination with residents.Keywords: earthquake, environment, reconstruction, sustainability
Procedia PDF Downloads 115615 Conducting Computational Physics Laboratory Course Using Cloud Storage Space
Authors: Ajay Wadhwa
Abstract:
A Laboratory course on computational physics is different from the conventional lab course on other topics of physics like Mechanics, Heat, Optics, etc. because it involves active participation of the teacher as well as one-to-one interaction between teacher and the student. The course content requires the teacher to teach programming language as well as numerical methods along with their applications in physics. The task becomes more daunting when about 90% of the students in the class have no previous experience of any programming language. In the presented work, we have described a methodology for conducting the computational physics course by using the Google Drive and Dropitto.me cloud storage services. We have evaluated the performance in a class of sixty students by dividing them equally into four groups. One of the groups was made the peer group on whom the presented methodology was tested. The other groups were taught by using conventional method of classroom lectures. In order to assess our methodology, we analyzed the performance of students in four class tests. A study of certain statistical parameters like the mean, standard deviation, and Z-test hypothesis revealed that the cyber methodology based on cloud storage is more efficient than the conventional method of teaching.Keywords: computational Physics, Z-test hypothesis, cloud storage, Google drive
Procedia PDF Downloads 300614 Sacred Echoes: The Shamanic Journey of Hushahu and the Empowerment of Indigenous Women
Authors: Nadia K. Thalji
Abstract:
The shamanic odyssey of Hushahu, a courageous indigenous woman from the Amazon, reverberates with profound significance, resonating far beyond the confines of her tribal boundaries. This abstract explores Hushahu's transformative journey, which serves as a beacon of empowerment for indigenous women across the Amazon region. Hushahu's narrative unfolds against the backdrop of entrenched gender norms and colonial legacies that have historically marginalized women from spiritual leadership and ritual practices. Despite societal expectations and entrenched traditions, Hushahu boldly embraces her calling as a shaman, defying cultural constraints and challenging prevailing gender norms. Her journey represents a symbolic uprising against centuries of patriarchal dominance, offering a glimpse into the resilience and strength of indigenous women. Drawing upon Jungian psychology, Hushahu's quest can be understood as a profound exploration of the symbolic dimensions of the psyche. Through Hushahu’s initiation rituals and visionary experiences, the initiate embarks on a transformative journey of self-discovery, encountering archetypal symbols and tapping into the collective unconscious. Symbolism permeates the path, guiding Hushahu through the depths of the rainforest and illuminating the hidden realms of consciousness. Central to Hushahu's narrative is the theme of empowerment—a theme that transcends individual experience to catalyze broader social change. As Hushahu finds a voice amidst the echoes of ancestral wisdom, the journey inspires a ripple effect of empowerment throughout indigenous communities. Other women within Hushahu's tribe and neighboring societies are emboldened to challenge traditional gender roles, stepping into leadership positions and reclaiming their rightful place in spiritual practices. The resonance of Hushahu's journey extends beyond the Amazon, reverberating across cultural boundaries and igniting conversations about gender equality and indigenous rights. Through courageous defiance of cultural norms, Hushahu emerges as a symbol of resilience and empowerment, offering hope and inspiration to marginalized women around the world. In conclusion, Hushahu's shamanic journey embodies the sacred echoes of empowerment, echoing across generations and landscapes. The story serves as a testament to the enduring power of the human spirit and the transformative potential of reclaiming one's voice in the face of adversity. As indigenous women continue to rise, Hushahu's legacy stands as a beacon of hope, illuminating the path towards a more equitable and inclusive world.Keywords: shamanic leadership, indigenous empowerment, gender norms, cultural transformation
Procedia PDF Downloads 48613 Amphibious Architecture: A Benchmark for Mitigating Flood Risk
Authors: Lara Leite Barbosa, Marco Imperadori
Abstract:
This article aims to define strategies for applying innovative technology so that housing in regions subject to floods can be more resilient to disasters. Based on case studies of seven amphibious and floating projects, it proposes design guidelines to implement this practice. Its originality consists of transposing a technology developed for fluctuating buildings for housing types in regions affected by flood disasters. The proposal could be replicated in other contexts, endowing vulnerable households with the ability to resist rising water levels after a flood. The results of this study are design guidelines to adapt for houses in areas subject to flooding, contributing to the mitigation of this disaster.Keywords: amphibious housing, disaster resilience, floating architecture, flood mitigation, post-disaster reconstruction
Procedia PDF Downloads 157612 A Framework for Blockchain Vulnerability Detection and Cybersecurity Education
Authors: Hongmei Chi
Abstract:
The Blockchain has become a necessity for many different societal industries and ordinary lives including cryptocurrency technology, supply chain, health care, public safety, education, etc. Therefore, training our future blockchain developers to know blockchain programming vulnerability and I.T. students' cyber security is in high demand. In this work, we propose a framework including learning modules and hands-on labs to guide future I.T. professionals towards developing secure blockchain programming habits and mitigating source code vulnerabilities at the early stages of the software development lifecycle following the concept of Secure Software Development Life Cycle (SSDLC). In this research, our goal is to make blockchain programmers and I.T. students aware of the vulnerabilities of blockchains. In summary, we develop a framework that will (1) improve students' skills and awareness of blockchain source code vulnerabilities, detection tools, and mitigation techniques (2) integrate concepts of blockchain vulnerabilities for IT students, (3) improve future IT workers’ ability to master the concepts of blockchain attacks.Keywords: software vulnerability detection, hands-on lab, static analysis tools, vulnerabilities, blockchain, active learning
Procedia PDF Downloads 100611 Navigating the VUCA World with a Strong Heart and Mind: How to Build Passion and Character
Abstract:
The paper presents the PASSION Programme designed by a government school in Singapore, guided by national goals as well as research-based pedagogies that aims to nurture students to become lifelong learners with the strength of character. The design and enactment of the integrated approach to develop in students good character, resilience and social-emotional well-being, future readiness, and active citizenship is guided by a set of principles that amalgamates Biesta’s domains of purposes of education and authentic learning. Data in terms of evidence of students’ learning and students’ feedback were collected, analysed, and suggests that the learning experience benefitted students by boosting their self-confidence, self-directed and collaborative learning skills, as well as empathy.Keywords: lifelong learning, character and citizenship education, education and career guidance, 21CC, teaching and learning empathy
Procedia PDF Downloads 147610 Defending the Right to Send Children with Disabilities to the Local School in New Zealand
Authors: Barbara A. Fogarty-Perry
Abstract:
This paper draws on one to one interviews with parents of children with high and complex needs conducted in 2019. Those interviewed were asked questions around various areas of well-being, and these were transcribed and then thematically analysed. Results were plotted to identify strategies that enhance resilience in parents of children with physical disabilities. The parents were asked to highlight challenges in the support systems they utilized, and all of those interviewed identified difficulties in the New Zealand education system. Legally in New Zealand, children have the right to attend their local primary school, but for 100% of those interviewed, this was an issue. This paper will discuss the way these parents navigated the New Zealand education system in order to defend this right for their children. The New Zealand education system is having to become more inclusive through parental actions despite precarious times of counter-movement by the New Zealand government.Keywords: autoethnography, human rights, inclusion, parents voice in disability
Procedia PDF Downloads 150609 Exploring the Lived Experiences of Breast Cancer Survivors Post-Treatment
Authors: Nova Grail S. Luminang, Gwyneth B. Gortiza, Alvin E. Haboc, Marinol K. Hate, Rhean Mitchel N. Joven, Kara Kate D. Lammao, Rosemarie M. Lambayung, Elmo Carl D. Lardizabal, Zyra B. Linggayo, Rizza Mae G. Liwag, Ronalyn O. Songcuan
Abstract:
Breast cancer survivorship represents a complex and continuous journey extending beyond the completion of treatment, involving coping with physical, emotional, and psychological aspects of life post-treatment. This study aimed to explore the lived experiences of breast cancer survivors after successful treatment in Tabuk City, focusing on their post-treatment experiences, coping mechanisms, and necessary lifestyle changes. Researchers have selected Tabuk City as their research locale. Utilizing Martin Heidegger’s descriptive phenomenological design, this qualitative research included six participants, allowing for data saturation. Purposive sampling was employed to select participants. Researchers used Colaizzi’s Phenomenological Method in analyzing the data in order to achieve a reliable understanding of the participants’ experiences. The findings revealed three main themes: going through post-treatment hurdles, building resilience, and transformative wellness adjustments. Breast cancer survivors faced significant challenges, including physical adversities, emotional turmoil, limited social life, memory lapses, decreased sexual intimacy, and economic constraints. To cope, survivors adjusted their thoughts and attitudes, accepted their situation, relied on religious beliefs, and joined the support group Kalinga Cancer Care Ministry INC. Additionally, they strived to return to a normal life and embraced gratitude. Survivors made essential changes to their daily routines, modifying their diets, exploring herbal remedies, and incorporating physical activities such as walking and household chores. These adjustments helped improve their overall well-being and prevent cancer recurrence. The researchers concluded that the journey of breast cancer survivors is marked by significant challenges and inspiring resilience. The impact of breast cancer treatment extends beyond physical recovery, encompassing profound emotional and social dimensions. Despite these difficulties, survivors demonstrate remarkable strength and adaptability, making positive lifestyle changes that offer a hopeful and inspiring narrative of recovery and perseverance.Keywords: breast cancer, lived experiences, breast cancer survivor, post-treatment hurdles, emotional turmoil
Procedia PDF Downloads 35608 Agile Succession Planning in the Post-Covid World
Authors: Ashneel Kumar Singh
Abstract:
The COVID-19 pandemic has dramatically transformed the global workforce, leading to significant challenges in staffing and employment. The shift to remote work, the health risks posed by the virus, and the phenomenon known as ‘The Great Termination’ have all contributed to the disruption of traditional succession planning methods. This paper explores how agile succession planning can be effectively implemented in the post-COVID world to retain top talent and ensure organizational resilience. Through a review of the literature and practical examples, the paper discusses the difficulties of succession planning in the current environment and the importance of adopting an agile approach and offers recommendations for businesses to navigate the complexities of succession planning in a rapidly changing landscape.Keywords: agile succession planning, adopt a culture of continuous learning, create a multi-successor planning approach, the great termination
Procedia PDF Downloads 35607 Gate Voltage Controlled Humidity Sensing Using MOSFET of VO2 Particles
Authors: A. A. Akande, B. P. Dhonge, B. W. Mwakikunga, A. G. J. Machatine
Abstract:
This article presents gate-voltage controlled humidity sensing performance of vanadium dioxide nanoparticles prepared from NH4VO3 precursor using microwave irradiation technique. The X-ray diffraction, transmission electron diffraction, and Raman analyses reveal the formation of VO2 (B) with V2O5 and an amorphous phase. The BET surface area is found to be 67.67 m2/g. The humidity sensing measurements using the patented lateral-gate MOSFET configuration was carried out. The results show the optimum response at 5 V up to 8 V of gate voltages for 10 to 80% of relative humidity. The dose-response equation reveals the enhanced resilience of the gated VO2 sensor which may saturate above 272% humidity. The response and recovery times are remarkably much faster (about 60 s) than in non-gated VO2 sensors which normally show response and recovery times of the order of 5 minutes (300 s).Keywords: VO2, VO2(B), MOSFET, gate voltage, humidity sensor
Procedia PDF Downloads 322606 DISGAN: Efficient Generative Adversarial Network-Based Method for Cyber-Intrusion Detection
Authors: Hongyu Chen, Li Jiang
Abstract:
Ubiquitous anomalies endanger the security of our system con- stantly. They may bring irreversible damages to the system and cause leakage of privacy. Thus, it is of vital importance to promptly detect these anomalies. Traditional supervised methods such as Decision Trees and Support Vector Machine (SVM) are used to classify normality and abnormality. However, in some case, the abnormal status are largely rarer than normal status, which leads to decision bias of these methods. Generative adversarial network (GAN) has been proposed to handle the case. With its strong generative ability, it only needs to learn the distribution of normal status, and identify the abnormal status through the gap between it and the learned distribution. Nevertheless, existing GAN-based models are not suitable to process data with discrete values, leading to immense degradation of detection performance. To cope with the discrete features, in this paper, we propose an efficient GAN-based model with specifically-designed loss function. Experiment results show that our model outperforms state-of-the-art models on discrete dataset and remarkably reduce the overhead.Keywords: GAN, discrete feature, Wasserstein distance, multiple intermediate layers
Procedia PDF Downloads 129605 Addressing Organizational Burnout in Higher Education: A Systemic Approach to Faculty Well-Being and Institutional Resilience
Authors: Liza L. S. Choi
Abstract:
Organizational burnout in higher education presents a critical challenge, undermining faculty well-being and institutional effectiveness. This study adopts a systemic perspective, addressing burnout through evidence-based strategies beyond individual coping mechanisms. Utilizing a meta-synthesis of existing literature, the author examines the underlying causes of burnout through the lenses of relational leadership, interpretivist theory, nudge theory, and the ADKAR model. The methodology synthesizes secondary data from peer-reviewed research, comprehensively analyzing key contributors to burnout, including excessive workloads, inadequate leadership, insufficient resources, and the absence of psychological safety. Key findings reveal that addressing burnout requires multi-faceted interventions. Effective implementation begins with leadership training programs grounded in relational leadership principles. These programs empower leaders to build trust by acknowledging and addressing faculty's unique challenges, such as workload inequities and insufficient support. For example, leaders can utilize interpretivist approaches to collect qualitative feedback through focus groups or anonymous surveys, providing actionable insights into the lived experiences of faculty. Institutions should establish policies encouraging open communication and normalizing feedback mechanisms to promote psychological safety. These initiatives include regular town halls, anonymous feedback portals, and structured team-building activities. They create environments where faculty feel supported and valued, reducing the stigma of voicing concerns. Drawing inspiration from successful practices in the healthcare sector, the author advocates for adopting an Associate Vice President (AVP) of Wellness role to lead organizational well-being initiatives. This role would centralize efforts to address faculty burnout and job satisfaction, ensuring alignment across departments and breaking down silos of operation. By fostering cross-departmental collaboration, this approach can lead to more integrated and efficient solutions, maximizing resource utilization and enhancing institutional resilience. The ADKAR model offers a structured framework for managing organizational change, emphasizing Awareness, Desire, Knowledge, Ability, and Reinforcement. Specific applications include facilitating workshops to raise awareness of burnout's impact, providing professional development programs that enhance faculty time management skills, and embedding well-being practices—such as flexible scheduling and equitable resource distribution—into institutional policies. Nudge theory further supports these efforts by employing subtle cues, such as reminders and default options, to encourage healthier work habits and foster collaboration. Finally, institutions should regularly evaluate the effectiveness of these interventions by implementing metrics such as faculty engagement scores, turnover rates, and utilization of wellness resources. By adopting a holistic and scalable framework that includes the AVP Wellness role and eliminates operational silos, this study provides academic institutions with practical tools to enhance morale, foster collaboration, and build resilience, ultimately addressing organizational burnout and creating a supportive educational environment.Keywords: higher education, organizational burnout, relational leadership, culture of well-being and engagement
Procedia PDF Downloads 9