Search results for: college access
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 4185

Search results for: college access

3585 Resources-Based Ontology Matching to Access Learning Resources

Authors: A. Elbyed

Abstract:

Nowadays, ontologies are used for achieving a common understanding within a user community and for sharing domain knowledge. However, the de-centralized nature of the web makes indeed inevitable that small communities will use their own ontologies to describe their data and to index their own resources. Certainly, accessing to resources from various ontologies created independently is an important challenge for answering end user queries. Ontology mapping is thus required for combining ontologies. However, mapping complete ontologies at run time is a computationally expensive task. This paper proposes a system in which mappings between concepts may be generated dynamically as the concepts are encountered during user queries. In this way, the interaction itself defines the context in which small and relevant portions of ontologies are mapped. We illustrate application of the proposed system in the context of Technology Enhanced Learning (TEL) where learners need to access to learning resources covering specific concepts.

Keywords: resources query, ontologies, ontology mapping, similarity measures, semantic web, e-learning

Procedia PDF Downloads 300
3584 Managers’ Mobile Information Behavior in an Openness Paradigm Era

Authors: Abd Latif Abdul Rahman, Zuraidah Arif, Muhammad Faizal Iylia, Mohd Ghazali, Asmadi Mohammed Ghazali

Abstract:

Mobile information is a significant access point for human information activities. Theories and models of human information behavior have developed over several decades but have not yet considered the role of the user’s computing device in digital information interactions. This paper reviews the literature that leads to developing a conceptual framework of a study on the managers mobile information behavior. Based on the literature review, dimensions of mobile information behavior are identified, namely, dimension information needs, dimension information access, information retrieval and dimension of information use. The study is significant to understand the nature of librarians’ behavior in searching, retrieving and using information via the mobile device. Secondly, the study would provide suggestions about various kinds of mobile applications which organization can provide for their staff to improve their services.

Keywords: mobile information behavior, information behavior, mobile information, mobile devices

Procedia PDF Downloads 333
3583 Adaptive Threshold Adjustment of Clear Channel Assessment in LAA Down Link

Authors: Yu Li, Dongyao Wang, Xiaobao Sun, Wei Ni

Abstract:

In long-term evolution (LTE), the carriers around 5GHz are planned to be utilized without licenses to further enlarge system capacity. This feature is termed licensed assisted access (LAA). The channel sensing (clean channel assessment, CCA) is required before any transmission on these unlicensed carriers, in order to make sure the harmonious co-existence of LAA with other radio access technology in the unlicensed band. Obviously, the CCA threshold is very critical, which decides whether the transmission right following CCA is delivered in time and without collisions. An improper CCA threshold may cause buffer overflow of some eNodeBs if the eNodeBs are heavily loaded with the traffic. Thus, to solve these problems, we propose an adaptive threshold adjustment method for CCA in the LAA downlink. Both the load and transmission opportunities are concerned. The trend of the LAA throughput as the threshold varies is obtained, which guides the threshold adjustment. The co-existing between LAA and Wi-Fi is particularly tested. The results from system-level simulation confirm the merits of our design, especially in heavy traffic cases.

Keywords: LTE, LAA, CCA, threshold adjustment

Procedia PDF Downloads 130
3582 Qualitative Inquiry on Existential Concerns and Well-Being among the Youth of Higher Education Institutions in Ethiopia: Case Study of Addis Ababa University

Authors: Ezgiamn Abraha Hagos

Abstract:

Higher education is important for college students to develop their authentic identity by means of getting exposure to diverse ideas and experiences. However, current college students are not successfully achieving a satisfying sense of meaning and purpose in their lives, which often places them in a state of existential vacuum. Thus, this study uncovers the existential concerns of youth in higher education by means of assessing their view on meaningful life and integration of it as a guide into their lives and challenges faced in doing so. Data were procured from thirty undergraduate students of Addis Ababa University, Ethiopia via interview, naïve sketch method, and content analysis of selected magazines and newspapers. Data were analyzed using organization, immersion, generating themes, coding, offering interpretation as well as checking the data. Relationship, education, and belief were found to be main sources of meaning. But, many of the study participants failed to articulate their meaning in life explicitly and identified to be in a state of drifting. Moreover, hopelessness, economic problems and quality of training impinge their sense of meaning in life negatively. The content analysis principally embodied the youth in higher education as a group of people confronted with rafts of challenges such as debauchery, moral crisis, self-destructive behaviors and hankering for support and direction. Thus, crafting the asset-based approach and counseling services that will prepare the youth for the future and develop holistically in terms of body and mind are tremendously vital.

Keywords: higher education institutions; meaning in life; youth

Procedia PDF Downloads 96
3581 Synthetic Access to Complex Metal Carbonates and Hydroxycarbonates via Sol-Gel Chemistry

Authors: Schirin Hanf, Carlos Lizandara-Pueyo, Timmo P. Emmert, Ivana Jevtovikj, Roger Gläser, Stephan A. Schunk

Abstract:

Metal alkoxides are very versatile precursors for a broad array of complex functional materials. However, metal alkoxides, especially transition metal alkoxides, tend to form oligomeric structures due to the very strong M–O–M binding motif. This fact hinders their facile application in sol-gel-processes and complicates access to complex carbonate or oxidic compounds after hydrolysis of the precursors. Therefore, the development of a synthetic alternative with the aim to grant access to carbonates and hydroxycarbonates from simple metal alkoxide precursors via hydrolysis is key to this project. Our approach involves the reaction of metal alkoxides with unsaturated isoelectronic molecules, such as carbon dioxide. Subsequently, a stoichiometric insertion of the CO₂ into the alkoxide M–O bond takes place and leads to the formation of soluble metal alkyl carbonates. This strategy is a very elegant approach to solubilize metal alkoxide precursors to make them accessible for sol-gel chemistry. After hydrolysis of the metal alkyl carbonates, crystalline metal carbonates, and hydroxycarbonates can be obtained, which were then utilized for the synthesis of Cu/Zn based bulk catalysts for methanol synthesis. Using these catalysts, a comparable catalytic activity to commercially available MeOH catalysts could be reached. Based on these results, a complement for traditional precipitation techniques, which are usually utilized for the synthesis of bulk methanol catalysts, have been found based on an alternative solubilization strategy.

Keywords: metal alkoxides, metal carbonates, metal hydroxycarbonates, CO₂ insertion, solubilization

Procedia PDF Downloads 175
3580 Exploring Critical Thinking Skill Development in the 21st Century College Classroom: A Multi-Case Study

Authors: Kimberlyn Greene

Abstract:

Employers today expect college graduates to not only develop and demonstrate content-specific knowledge but also 21st century skillsets such as critical thinking. International assessments suggest students enrolled in United States (U.S.) educational institutions are underperforming in comparison to their global peers in areas such as critical thinking and technology. This multi-case study examined how undergraduate digital literacy courses at a four-year university in the U.S., as implemented by instructors, fostered students’ development of critical thinking skills. The conceptual framework for this study presumed that as students engaged in complex thinking within the context of a digital literacy course, their ability to deploy critical thinking was contingent upon whether the course was designed with the expectation for students to use critical thinking skills as well as the instructor’s approach to implementing the course. Qualitative data collected from instructor interviews, classroom observations, and course documents were analyzed with an emphasis on exploring the course design and instructional methods that provided opportunities to foster critical thinking skill development. Findings from the cross-case analysis revealed that although the digital literacy courses were designed and implemented with the expectation students would deploy critical thinking; there was no explicit support for students to develop these skills. The absence of intentional skill development resulted in inequitable opportunities for all students to engage in complex thinking. The implications of this study suggest that if critical thinking is to remain a priority, then universities must expand their support of pedagogical and instructional training for faculty regarding how to support students’ critical thinking skill development.

Keywords: critical thinking skill development, curriculum design, digital literacy, pedagogy

Procedia PDF Downloads 282
3579 A Review of Farmer Participation in Information and Communication Technology through Mobile Banking and Mobile Marketing in Rural Agricultural Systems

Authors: J. Cadby, K. Miyazawa

Abstract:

Information and Communication Technology (ICT) has been widely adopted into the agricultural landscape with advancements of mobile connectivity and data accessibility. In developed nations, mobile-technology is well integrated into marketing transactions, and also plays a crucial role in making data-driven decisions on-farm. In developing nations, mobile banking and access to agricultural extension services allow for informed decision-making and smoother transactions. In addition, the availability of updated and readily available market and climate data provides a negotiation platform, reducing economic risks for farmers worldwide. The total usage of mobile technology has risen over the past 20 years, and almost three-quarters of the world’s population subscribes to mobile technology. This study reviewed mobile technology integration into agricultural systems in developing and developed nations. Data from secondary sources were collected and investigated. The objectives of the study include a review of the success of mobile banking transactions in developing nations, and a review of application and SMS based services for direct marketing in both developed and developing nations. Rural farmers in developing countries with access to diverse m-banking options experienced increased access to farm investment resources with the use of mobile banking technology. Rural farmers involved in perishable crop production were also more likely to benefit from mobile platform sales participation. ICT programs reached through mobile application and SMS increased access to agricultural extension materials and marketing tools for demographics that faced literacy-challenges and isolated markets. As mobile technology becomes more ubiquitous in the global agricultural system, training and market opportunities to facilitate mobile usage in developing agricultural systems are necessary. Digital skills training programs are necessary in order to improve equal global adoption of ICT in agriculture.

Keywords: market participation, mobile banking, mobile technology, rural farming

Procedia PDF Downloads 238
3578 The Women Entrepreneur Support Fund in Bangladesh: Challenges and Prospects

Authors: Chowdhury Dilruba Shoma

Abstract:

Gender is about equal rights that both males and females having access to responsibilities and opportunities in decision making is a fundamental human right. It is also a precondition for, and a mark of, sustainable people-oriented development. In Bangladesh, women have fewer opportunities than men do to access credit from banks and financial institutions. Entrenched patriarchal attitudes, unequal inheritance rights, and male-dominated hierarchies in the financial system, plus high interest rates and a lack of security/collateral, make it harder for women to obtain bank loans. Limited access to institutional credit is a serious restraint on the productivity and income of women entrepreneurs, (and the wider economy). These gender-biased and structural barriers inhibit women’s access to fundamental economic rights. Using a liberal feminist theoretical lens, this study provides some useful insights into the relationship between gender inequality and entrepreneurship, leading to a better understanding of women’s entrepreneurship development in Bangladesh. Recently, the Bangladesh Government, the United Nations Capital Development Fund, and Bangladesh Bank opened up the Women Entrepreneur Support Fund (WESF) ‒ Credit Guarantee Scheme (CGS) pilot project to cover collateral shortfalls for women entrepreneurs in the small and medium enterprise sector. The aim is to improve gender equality and advance women’s rights in relation to receiving credit. This article examines the challenges and prospects of the WESF-CGS, and suggests that implementation of measures in WESF-CGS policymaking, coupled with a combination of legislatory and regulatory reforms that implement the fundamental tenets of liberal feminism, can lead to a comprehensive and effective credit policy to boost women’s agency and economic empowerment. This may ultimately lead to more sustainable development in Bangladesh.

Keywords: Bangladesh, credit guarantee scheme, liberal feminist theory, women entrepreneur support fund

Procedia PDF Downloads 128
3577 Self-Reliant Peer Learning for Nursing Students

Authors: U.-B. Schaer, M. Wehr, R. Hodler

Abstract:

Background: Most nursing students require more training time for necessary nursing skills than defined by nursing schools curriculum to acquire basic nursing skills. Given skills training lessons are too brief to enable effective student learning, meaning in-depth skills practice and repetition various learning steps. This increases stress levels and the pressure to succeed for a nursing student with slower learning capabilities. Another possible consequence is that nursing students are less prepared in the required skills for future clinical practice. Intervention: The Bern College of Higher Education of Nursing, Switzerland, started the independent peer practice learning program in 2012. A concept was developed which defines specific aims and content as well as student’s rights and obligations. Students enlist beforehand and order the required materials. They organize themselves and train in small groups in allocated training location in the area of Learning Training and Transfer (LTT). During the peer practice, skills and knowledge can be repeatedly trained and reflected in the peer groups without the presence of a tutor. All invasive skills are practiced only on teaching dummies. This allows students to use all their potential. The students may access learning materials as literature and their own student notes. This allows nursing students to practice their skills and to deepen their knowledge on corresponding with their own learning rate. Results: Peer group discussions during the independent peer practice learning support the students in gaining certainty and confidence in their knowledge and skills. This may improve patient safety in future daily care practice. Descriptive statics show that the number of students who take advantage of the independent peer practice learning increased continuously (2012-2018). It has to be mentioned that in 2012, solely students of the first semester attended the independent peer practice learning program, while in 2018 over one-third of the participating students were in their fifth semester and final study year. It is clearly visible that the demand for independent peer practice learning is increasing. This has to be considered in the development of future teaching curricula.

Keywords: learning program, nursing students, peer learning, skill training

Procedia PDF Downloads 109
3576 Latinx Adult ELLs: Exploring English Instructors’ Perceptions of Classroom Diversity and Culturally Diverse Teaching Strategies

Authors: Sharon Diaz Ruiz

Abstract:

This qualitative study addresses college English instructors’ perceptions of classroom diversity and culturally diverse teaching strategies within the adult English language learning classroom environment. Every year, English college instructors face numerous challenges as the adult Latinx population keeps rising. To better understand the Latinx adult learners and the language classroom dynamics, research should focus on the experiences, pedagogical methods, and teaching insights of full-time and adjunct minority professors at degree-granting postsecondary institutions. Culturally responsive teaching is used as the framework to understand and explore the perceptions of English instructors on the realities and needs of Latinx adult emergent bilinguals enrolled in developmental English courses. Snowball sampling allows the researcher to locate members who meet these specific criteria: adjunct and part-time English instructors of adult Latinx language learners. Participants answered a demographic questionnaire and then contributed to 45-minute in-depth interviews to explore their perceptions of culturally responsive practices in the Latinx adult emergent bilinguals’ basic and intermediate developmental English courses. The interviews shed light on topics such as teaching biases, educators’ cultural experiences, and resources and strategies faculty recommend for effective culturally responsive teaching strategies. The result of this investigation will shed light on the gap in the literature documenting the application of culturally responsive pedagogy to Latino adult language learners.

Keywords: Latinx, English language learners, English faculty, adult learners, critical theory, culturally responsive theory

Procedia PDF Downloads 53
3575 The Report of Co-Construction into a Trans-National Education Teaching Team

Authors: Juliette MacDonald, Jun Li, Wenji Xiang, Mingwei Zhao

Abstract:

Shanghai International College of Fashion and Innovation (SCF) was created as a result of a collaborative partnership agreement between the University of Edinburgh and Donghua University. The College provides two programmes: Fashion Innovation and Fashion Interior Design and the overarching curriculum has the intention of developing innovation and creativity within an international learning, teaching, knowledge exchange and research context. The research problem presented here focuses on the multi-national/cultural faculty in the team, the challenges arising from difficulties in communication and the associated limitations of management frameworks. The teaching faculty at SCF are drawn from China, Finland, Korea, Singapore and the UK with input from Flying Faculty from Fashion and Interior Design, Edinburgh College of Art (ECA), for 5 weeks each semester. Rather than fully replicating the administrative and pedagogical style of one or other of the institutions within this joint partnership the aim from the outset was to create a third way which acknowledges the quality assurance requirements of both Donghua and Edinburgh, the academic and technical needs of the students and provides relevant development and support for all the SCF-based staff and Flying Academics. It has been well acknowledged by those who are involved in teaching across cultures that there is often a culture shock associated with transnational education but that the experience of being involved in the delivery of a curriculum at a Joint Institution can also be very rewarding for staff and students. It became clear at SCF that if a third way might be achieved which encourages innovative approaches to fashion education whilst balancing the expectations of Chinese and western concepts of education and the aims of two institutions, then it was going to be necessary to construct a framework which developed close working relationships for the entire teaching team, so not only between academics and students but also between technicians and administrators at ECA and SCF. The attempts at co-construction and integration are built on the sharing of cultural and educational experiences and knowledge as well as provision of opportunities for reflection on the pedagogical purpose of the curriculum and its delivery. Methods on evaluating the effectiveness of these aims include a series of surveys and interviews and analysis of data drawn from teaching projects delivered to the students along with graduate successes from the last five years, since SCF first opened its doors. This paper will provide examples of best practice developed by SCF which have helped guide the faculty and embed common core values and aims of co-construction regulations and management, whilst building a pro-active TNE (Trans-National Education) team which enhances the learning experience for staff and students alike.

Keywords: cultural co-construction, educational team management, multi-cultural challenges, TNE integration for teaching teams

Procedia PDF Downloads 111
3574 Deploying a Platform as a Service Cloud Solution to Support Student Learning

Authors: Jiangping Wang

Abstract:

This presentation describes the design and implementation of PaaS (platform as a service) cloud-based labs that are used in database-related courses to teach students practical skills. Traditionally, all labs are implemented in a desktop-based environment where students have to install heavy client software to access database servers. In order to release students from that burden, we have successfully deployed the cloud-based solution to support database-related courses, from which students and teachers can practice and learn database topics in various database courses via cloud access. With its development environment, execution runtime, web server, database server, and collaboration capability, it offers a shared pool of configurable computing resources and comprehensive environment that supports students’ needs without the complexity of maintaining the infrastructure.

Keywords: PaaS, database environment, e-learning, web server

Procedia PDF Downloads 256
3573 Examining the Market Challenges That Constrain the Proper Sales of Farming Produces Amongst the Small-Scale Farms

Authors: Simiso Fisokuhle Nyandeni

Abstract:

Climate change has turned out to be a pandemic that has drawn the attention of many countries’ households around the globe, especially those whose livelihood and economic status depend on agricultural productivity. Hence, the agricultural sector is regarded as the sector that is most dependent on climate conditions for its productivity/harvest, yet in recent years this sector has been experiencing drought. However, adaptation seems to be a tool that every farmer looks upon as a solution to their challenges as their productivity keeps on being vulnerable to climate effects. Thus, exposure/access to the market seems to be a major challenge that faces especially small-scale farmers. We, therefore, examine the small-scale farmers’ constraints or challenges towards getting access to the market for them to get proper sales of their farming products. As a result, the adaptation capacity of every farm household varies on the financial status.

Keywords: climate change, small-scale farming, agriculture sector, adaptation

Procedia PDF Downloads 73
3572 Efficient Position Based Operation Code Authentication

Authors: Hashim Ali, Sheheryar Khan

Abstract:

Security for applications is always been a keen issue of concern. In general, security is to allow access of grant to legal user or to deny non-authorized access to the system. Shoulder surfing is an observation technique to hack an account or to enter into a system. When a malicious observer is capturing or recording the fingers of a user while he is entering sensitive inputs (PIN, Passwords etc.) and may be able to observe user’s password credential. It is very rigorous for a novice user to prevent himself from shoulder surfing or unaided observer in a public place while accessing his account. In order to secure the user account, there are five factors of authentication; they are: “(i) something you have, (ii) something you are, (iii) something you know, (iv) somebody you know, (v) something you process”. A technique has been developed of fifth-factor authentication “something you process” to provide novel approach to the user. In this paper, we have applied position based operational code authentication in such a way to more easy and user friendly to the user.

Keywords: shoulder surfing, malicious observer, sensitive inputs, authentication

Procedia PDF Downloads 257
3571 MMSE-Based Beamforming for Chip Interleaved CDMA in Aeronautical Mobile Radio Channel

Authors: Sherif K. El Dyasti, Esam A. Hagras, Adel E. El-Hennawy

Abstract:

This paper addresses the performance of antenna array beam-forming on Chip-Interleaved Code Division Multiple Access (CI_CDMA) system based on Minimum Mean Square Error (MMSE) detector in aeronautical mobile radio channel. Multipath fading, Doppler shifts caused by the speed of the aircraft, and Multiple Access Interference (MAI) are the most important reasons that affect and reduce the performance of aeronautical system. In this paper, we suggested the CI-CDMA with antenna array to combat this fading and improve the bit error rate (BER) performance. We further evaluate the performance of the proposed system in the four standard scenarios in aeronautical mobile radio channel.

Keywords: aeronautical channel, CI-CDMA, beamforming, communication, information

Procedia PDF Downloads 406
3570 A Practice of Zero Trust Architecture in Financial Transactions

Authors: Liwen Wang, Yuting Chen, Tong Wu, Shaolei Hu

Abstract:

In order to enhance the security of critical financial infrastructure, this study carries out a transformation of the architecture of a financial trading terminal to a zero trust architecture (ZTA), constructs an active defense system for cybersecurity, improves the security level of trading services in the Internet environment, enhances the ability to prevent network attacks and unknown risks, and reduces the industry and security risks brought about by cybersecurity risks. This study introduces the SDP technology of ZTA, adapts and applies it to a financial trading terminal to achieve security optimization and fine-grained business grading control. The upgraded architecture of the trading terminal moves security protection forward to the user access layer, replaces VPN to optimize remote access, and significantly improves the security protection capability of Internet transactions. The study achieves 1. deep integration with the access control architecture of the transaction system; 2. no impact on the performance of terminals and gateways, and no perception of application system upgrades; 3. customized checklist and policy configuration; 4. introduction of industry-leading security technology such as single-packet authorization (SPA) and secondary authentication. This study carries out a successful application of ZTA in the field of financial trading and provides transformation ideas for other similar systems while improving the security level of financial transaction services in the Internet environment.

Keywords: zero trust, trading terminal, architecture, network security, cybersecurity

Procedia PDF Downloads 146
3569 How to Ensure Environmental Sustainability and Food Security through the Use of Payments for Environmental Services in Developing Countries

Authors: Carlos Alves

Abstract:

This research paper demonstrates how payments for environmental services (PES) can be an effective mechanism to combat food insecurity and reduce environmental degradation in developing countries. The paper begins by discussing how environmental services affect each one of the pillars of food security: availability, access, and utilization of food. However, due to numerous global environmental challenges, a new pillar of food security based on environmental sustainability is proposed and discussed. An argument is then made that PES can usefully combat food insecurity. It can provide an extra income to those who take on environmental service and help them to have a better access to food. In order to be successful in addressing food insecurity, PES schemes should target on the poor and redress issues that can prevent their effectiveness. Finally, the research presents a case study that discusses how several developing countries addressed problems and successfully developed PES programs.

Keywords: environmental sustainability, food security, nutrition, payments for environmental services

Procedia PDF Downloads 379
3568 Remote Monitoring and Control System of Potentiostat Based on the Internet of Things

Authors: Liang Zhao, Guangwen Wang, Guichang Liu

Abstract:

Constant potometer is an important component of pipeline anti-corrosion systems in the chemical industry. Based on Internet of Things (IoT) technology, Programmable Logic Controller (PLC) technology and database technology, this paper developed a set of a constant potometer remote monitoring management system. The remote monitoring and remote adjustment of the working status of the constant potometer are realized. The system has real-time data display, historical data query, alarm push management, user permission management, and supporting Web access and mobile client application (APP) access. The actual engineering project test results show the stability of the system, which can be widely used in cathodic protection systems.

Keywords: internet of things, pipe corrosion protection, potentiostat, remote monitoring

Procedia PDF Downloads 132
3567 A Case Study: Beginning Teacher's Experiences of Mentoring in Secondary Education

Authors: Abdul Rofiq Badril Rizal M. Z.

Abstract:

This case study examines the experiences of four beginning teachers currently working in New South Wales secondary schools. Data were collected from semi-structured interviews conducted one on one over the period of one month. The data were coded with findings reported through key areas of discovery, which linked to the research presented in the literature review. The participants involved in the case study all reported positive experiences with mentoring, though none were given the opportunity to take part in a formal mentoring program, and all the mentors offered their time voluntarily. The mentoring took different forms, but the support most valued by the participants was the emotional and curriculum related supported received. All participants wished they had greater access to mentoring and felt it would have benefits for most beginning teachers. The study highlights ongoing issues around the lack of access to mentoring, which could be due to factors such as funding, time and training.

Keywords: mentor, mentee, pre-service teacher, beginning teacher

Procedia PDF Downloads 99
3566 Digital Renaissance of African Heritage: Navigating Ownership, Representation, and Equitable Access in the Virtual Realm

Authors: Okechukwu Joshua Mba

Abstract:

The increased worldwide spending on digital transformation has changed the way audiences engage with cultural heritage. Technological capabilities are encouraging institutions and practitioners to prioritize the digitization of cultural heritage assets. Museums and educational institutions, among others, are creating engaging and sustainable digitization solutions that foster their historical legacies. However, in Africa, there are impediments to these digitization efforts. The advent of digital technologies presents unprecedented opportunities for the preservation and dissemination of African heritage, yet it also raises critical questions about ownership, representation, and access. Disputed ownership rights of cultural artifacts, inability to achieve the right representation in the digitization process, and lack of accessibility hamper the digitization of cultural heritage assets. Therefore, this study examines the ethical dimensions of digital custodianship of African heritage to ensure Indigenous rights are upheld. The representation of African heritage is scrutinized through a decolonial lens to rectify historical misrepresentations. Furthermore, we propose innovative solutions to bridge the digital divide and facilitate inclusive global engagement with digitized heritage. To advance the digital renaissance of African heritage, it is crucial to develop ethical digitization practices, foster collaboration between international and local stakeholders, and create frameworks that guarantee both the preservation of cultural integrity and broad accessibility.

Keywords: digital transformation, cultural heritage, digitization, African heritage, ownership, representation, equitable access. historical misrepresentations, inclusive engagement, local communities

Procedia PDF Downloads 12
3565 Women's Challenges in Access to Urban Spaces and Infrastructures: A Comparative Study of the Urban Infrastructures Conforming to Women's Needs in Tehran and Istanbul

Authors: Parastoo Kazemiyan

Abstract:

Over the past 80 years, in compliance with the advent of modernity in Iran and Turkey, the presence of women in economic and social arenas has creates serious challenges in the capacity of urban spaces to respond to their presence and transport because urban spaces up until then were based on masculine criteria and therefore, women could use such spaces in the company of their fathers or husbands. However, as modernity expanded by Reza Shah and Ataturk, women found the opportunity to work and be present in urban spaces alongside men and their presence in economic and social domains resulted in their presence in these spaces in the early and late hours of the day. Therefore, the city had to be transformed in structural, social, and environmental terms to accommodate women's activities and presence in various urban arenas, which was a huge step in transition from a masculine man-based culture to an all-inclusive human-based culture in these two countries. However, the optimization of urban space was subject to political changes in the two countries, leading to significant differences in designing urban spaces in Tehran and Istanbul. What shows the importance and novelty of the present study lie in the differences in urban planning and optimization in the two capital cities, which gave rise to different outcomes in desirability and quality of living in these two capital cities. Due to the importance of the topic, one of the most significant factors in desirability and acceptability of urban space for women was examined using a descriptive-analytic method based on qualitative methodology in Tehran and Istanbul. The results showed that the infrastructural factors in Istanbul, including safety of access, variety, and number of public transport modes, transparency, and supervision over public spaces have provided women with a safer and more constant presence compared to Tehran. It seems that challenges involved in providing access to urban spaces in Tehran in terms of infrastructure and function have made Tehran unable to respond to the most basic needs of its female citizens.

Keywords: gender differences, urban space security, access to transportation systems, women's challenges

Procedia PDF Downloads 113
3564 Information Communication Technology (ICT) Using Management in Nursing College under the Praboromarajchanok Institute

Authors: Suphaphon Udomluck, Pannathorn Chachvarat

Abstract:

Information Communication Technology (ICT) using management is essential for effective decision making in organization. The Concerns Based Adoption Model (CBAM) was employed as the conceptual framework. The purposes of the study were to assess the situation of Information Communication Technology (ICT) using management in College of Nursing under the Praboromarajchanok Institute. The samples were multi – stage sampling of 10 colleges of nursing that participated include directors, vice directors, head of learning groups, teachers, system administrator and responsible for ICT. The total participants were 280; the instrument used were questionnaires that include 4 parts, general information, Information Communication Technology (ICT) using management, the Stage of concern Questionnaires (SoC), and the Levels of Use (LoU) ICT Questionnaires respectively. Reliability coefficients were tested; alpha coefficients were 0.967for Information Communication Technology (ICT) using management, 0.884 for SoC and 0.945 for LoU. The data were analyzed by frequency, percentage, mean, standard deviation, Pearson Product Moment Correlation and Multiple Regression. They were founded as follows: The high level overall score of Information Communication Technology (ICT) using management and issue were administration, hardware, software, and people. The overall score of the Stage of concern (SoC)ICTis at high level and the overall score of the Levels of Use (LoU) ICTis at moderate. The Information Communication Technology (ICT) using management had the positive relationship with the Stage of concern (SoC)ICTand the Levels of Use (LoU) ICT(p < .01). The results of Multiple Regression revealed that administration hardwear, software and people ware could predict SoC of ICT (18.5%) and LoU of ICT (20.8%).The factors that were significantly influenced by SoCs were people ware. The factors that were significantly influenced by LoU of ICT were administration hardware and people ware.

Keywords: information communication technology (ICT), management, the concerns-based adoption model (CBAM), stage of concern(SoC), the levels of use(LoU)

Procedia PDF Downloads 300
3563 Performance Evaluation of One and Two Dimensional Prime Codes for Optical Code Division Multiple Access Systems

Authors: Gurjit Kaur, Neena Gupta

Abstract:

In this paper, we have analyzed and compared the performance of various coding schemes. The basic ID prime sequence codes are unique in only dimension, i.e. time slots, whereas 2D coding techniques are not unique by their time slots but with their wavelengths also. In this research, we have evaluated and compared the performance of 1D and 2D coding techniques constructed using prime sequence coding pattern for Optical Code Division Multiple Access (OCDMA) system on a single platform. Analysis shows that 2D prime code supports lesser number of active users than 1D codes, but they are having large code family and are the most secure codes compared to other codes. The performance of all these codes is analyzed on basis of number of active users supported at a Bit Error Rate (BER) of 10-9.

Keywords: CDMA, OCDMA, BER, OOC, PC, EPC, MPC, 2-D PC/PC, λc, λa

Procedia PDF Downloads 326
3562 A Knowledge-As-A-Service Support Framework for Ambient Learning in Kenya

Authors: Lucy W. Mburu, Richard Karanja, Simon N. Mwendia

Abstract:

Over recent years, learners have experienced a constant need to access on demand knowledge that is fully aligned with the paradigm of cloud computing. As motivated by the global sustainable development goal to ensure inclusive and equitable learning opportunities, this research has developed a framework hinged on the knowledge-as-a-service architecture that utilizes knowledge from ambient learning systems. Through statistical analysis and decision tree modeling, the study discovers influential variables for ambient learning among university students. The main aim is to generate a platform for disseminating and exploiting the available knowledge to aid the learning process and, thus, to improve educational support on the ambient learning system. The research further explores how collaborative effort can be used to form a knowledge network that allows access to heterogeneous sources of knowledge, which benefits knowledge consumers, such as the developers of ambient learning systems.

Keywords: actionable knowledge, ambient learning, cloud computing, decision trees, knowledge as a service

Procedia PDF Downloads 145
3561 Teaching English to Rural Students: A Case Study of a Select Batch at SSN College of Engineering, Chennai

Authors: Martha Karunakar

Abstract:

There exists a wide divide between the urban and the rural students in a vast country like India. This dichotomy is seen in the resources available to them, like the learning facilities, the infra-structure, the learning ambience and meeting of their basic needs of food, clothing and shelter. This paper discusses the effect of English language teaching as a Bridge course on a select batch of rural students at an Engineering college in Chennai, one of the four Metros of India. The study aims to understand how the teacher input and the teacher- peer-student interaction facilitates the acquisition of the basic structures of the English language to a group that is minimally exposed to the language. The objective in conducting the Bridge Course is to integrate these rural students into the mainstream and empower them in terms of English speaking ability; to enable them to comprehend their respective engineering classes where the medium of instruction is English and also to be able to interact with their urban peers. This program is conducted prior to the start of a regular academic session to equip them face the rigors of engineering education. The study is placed within the framework of Interaction theory in second language acquisition. The study evaluates the impact of linking theory and practice by implementing meaningful interaction not only within classrooms but also in the common areas. By providing intensive comprehensible input, it is anticipated that participant’s level of English language improves. The teaching methods and classroom activities included individual and group participation, encompassing all the four skills of listening, speaking, reading and writing (LSRW). The diagnostic tests that were administered before the commencement of the course and the exit test after the completion were used to record the impact of the training.

Keywords: comprehensible input, interaction, rural students, teaching English

Procedia PDF Downloads 370
3560 Teacher Training in Saudi Arabia: A Blend of Old and New

Authors: Ivan Kuzio

Abstract:

The GIZ/TTC project is the first of its kind in the Middle East, which allows the development of a teaching training programme to degree level based on modern methodologies. The graduates from this college are part of the Saudization programme and will, over the next four years be part of and eventually run the new Colleges of Excellence. The new Colleges of Excellence are being developed to create a local vocationally trained workforce and will run initially alongside the current Colleges of Technology.

Keywords: blended learning, pedagogy, training, key competencies, social skills, cognitive development

Procedia PDF Downloads 298
3559 Gender-Based Violence in Pakistan: Addressing the Root Causes

Authors: Hafiz Awais Ahmad

Abstract:

This paper aims to examine the root causes of gender-based violence (GBV) in Pakistan and proposes strategies to address this issue. Using a qualitative approach, this study analyzed data from various sources, including interviews with survivors of GBV and experts in the field. The findings revealed that GBV in Pakistan is deeply rooted in patriarchal attitudes and practices, economic insecurity, lack of education, and limited access to justice. The study recommends a multi-faceted approach to address GBV, including legislative reforms, awareness-raising campaigns, economic empowerment, and improved access to justice for survivors. Furthermore, the study highlights the importance of engaging men and boys in efforts to address GBV and promote gender equality. The findings of this study have important implications for policy-makers, practitioners, and researchers working towards ending GBV in Pakistan.

Keywords: gender-based violence, Pakistan, legislative reforms, advocacy

Procedia PDF Downloads 132
3558 Comparative Learning Challenges Experienced by Students in Universities of Developing Nations in Sub-Saharan Africa

Authors: Chinaza Uleanya, Martin Duma, Bongani Gamede

Abstract:

The study investigated learning challenges experienced by students in universities situated in developing sub-Saharan African countries using selected universities in South Africa and Nigeria. Questionnaires were administered to 2,335 randomly selected students from selected universities in South Africa and Nigeria. The outcome of the study shows that six common learning challenges are visible in developing sub-Sahara African universities. The causes of these learning challenges cut across the failure in responsibilities of the various stakeholders in the field of education and the effects are monumental both to the students and society. This paper suggests recommendations to university administrators, education policy makers and implementers on the need to take education more seriously, to review and implement appropriate policies, and to ensure provision of quality education through the supply of adequate amenities and other motivating factors.

Keywords: learning, challenges, learning challenges, access with success, participatory access

Procedia PDF Downloads 284
3557 Co-Design of Accessible Speech Recognition for Users with Dysarthric Speech

Authors: Elizabeth Howarth, Dawn Green, Sean Connolly, Geena Vabulas, Sara Smolley

Abstract:

Through the EU Horizon 2020 Nuvoic Project, the project team recruited 70 individuals in the UK and Ireland to test the Voiceitt speech recognition app and provide user feedback to developers. The app is designed for people with dysarthric speech, to support communication with unfamiliar people and access to speech-driven technologies such as smart home equipment and smart assistants. Participants with atypical speech, due to a range of conditions such as cerebral palsy, acquired brain injury, Down syndrome, stroke and hearing impairment, were recruited, primarily through organisations supporting disabled people. Most had physical or learning disabilities in addition to dysarthric speech. The project team worked with individuals, their families and local support teams, to provide access to the app, including through additional assistive technologies where needed. Testing was user-led, with participants asked to identify and test use cases most relevant to their daily lives over a period of three months or more. Ongoing technical support and training were provided remotely and in-person throughout the testing period. Structured interviews were used to collect feedback on users' experiences, with delivery adapted to individuals' needs and preferences. Informal feedback was collected through ongoing contact between participants, their families and support teams and the project team. Focus groups were held to collect feedback on specific design proposals. User feedback shared with developers has led to improvements to the user interface and functionality, including faster voice training, simplified navigation, the introduction of gamification elements and of switch access as an alternative to touchscreen access, with other feature requests from users still in development. This work offers a case-study in successful and inclusive co-design with the disabled community.

Keywords: co-design, assistive technology, dysarthria, inclusive speech recognition

Procedia PDF Downloads 91
3556 Variance-Aware Routing and Authentication Scheme for Harvesting Data in Cloud-Centric Wireless Sensor Networks

Authors: Olakanmi Oladayo Olufemi, Bamifewe Olusegun James, Badmus Yaya Opeyemi, Adegoke Kayode

Abstract:

The wireless sensor network (WSN) has made a significant contribution to the emergence of various intelligent services or cloud-based applications. Most of the time, these data are stored on a cloud platform for efficient management and sharing among different services or users. However, the sensitivity of the data makes them prone to various confidentiality and performance-related attacks during and after harvesting. Various security schemes have been developed to ensure the integrity and confidentiality of the WSNs' data. However, their specificity towards particular attacks and the resource constraint and heterogeneity of WSNs make most of these schemes imperfect. In this paper, we propose a secure variance-aware routing and authentication scheme with two-tier verification to collect, share, and manage WSN data. The scheme is capable of classifying WSN into different subnets, detecting any attempt of wormhole and black hole attack during harvesting, and enforcing access control on the harvested data stored in the cloud. The results of the analysis showed that the proposed scheme has more security functionalities than other related schemes, solves most of the WSNs and cloud security issues, prevents wormhole and black hole attacks, identifies the attackers during data harvesting, and enforces access control on the harvested data stored in the cloud at low computational, storage, and communication overheads.

Keywords: data block, heterogeneous IoT network, data harvesting, wormhole attack, blackhole attack access control

Procedia PDF Downloads 59