Search results for: transformation and security challenges
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 9156

Search results for: transformation and security challenges

8496 Semigroups of Linear Transformations with Fixed Subspaces: Green’s Relations and Ideals

Authors: Yanisa Chaiya, Jintana Sanwong

Abstract:

Let V be a vector space over a field and W a subspace of V. Let Fix(V,W) denote the set of all linear transformations on V with fix all elements in W. In this paper, we show that Fix(V,W) is a semigroup under the composition of maps and describe Green’s relations on this semigroup in terms of images, kernels and the dimensions of subspaces of the quotient space V/W where V/W = {v+W : v is an element in V} with v+W = {v+w : w is an element in W}. Let dim(U) denote the dimension of a vector space U and Vα = {vα : v is an element in V} where vα is an image of v under a linear transformation α. For any cardinal number a let a'= min{b : b > a}. We also show that the ideals of Fix(V,W) are precisely the sets. Fix(r) ={α ∊ Fix(V,W) : dim(Vα/W) < r} where 1 ≤ r ≤ a' and a = dim(V/W). Moreover, we prove that if V is a finite-dimensional vector space, then every ideal of Fix(V,W) is principle.

Keywords: Green’s relations, ideals, linear transformation semi-groups, principle ideals

Procedia PDF Downloads 286
8495 Technology Road Mapping in the Fourth Industrial Revolution: A Comprehensive Analysis and Strategic Framework

Authors: Abdul Rahman Hamdan

Abstract:

The Fourth Industrial Revolution (4IR) has brought unprecedented technological advancements that have disrupted many industries worldwide. In keeping up with the technological advances and rapid disruption by the introduction of many technological advancements brought forth by the 4IR, the use of technology road mapping has emerged as one of the critical tools for organizations to leverage. Technology road mapping can be used by many companies to guide them to become more adaptable and anticipate future transformation and innovation, and avoid being redundant or irrelevant due to the rapid changes in technological advancement. This research paper provides a comprehensive analysis of technology road mapping within the context of the 4IR. The objectives of the paper are to provide companies with practical insights and a strategic framework of technology road mapping for them to navigate the fast-changing nature of the 4IR. This study also contributes to the understanding and practice of technology road mapping in the 4IR and, at the same time, provides organizations with the necessary tools and critical insight to navigate the 4IR transformation by leveraging technology road mapping. Based on the literature review and case studies, the study analyses key principles, methodologies, and best practices in technology road mapping and integrates them with the unique characteristics and challenges of the 4IR. The research paper gives the background of the fourth industrial revolution. It explores the disruptive potential of technologies in the 4IR and the critical need for technology road mapping that consists of strategic planning and foresight to remain competitive and relevant in the 4IR era. It also highlights the importance of technology road mapping as an organisation’s proactive approach to align the organisation’s objectives and resources to their technology and product development in meeting the fast-evolving technological 4IR landscape. The paper also includes the theoretical foundations of technology road mapping and examines various methodological approaches, and identifies external stakeholders in the process, such as external experts, stakeholders, collaborative platforms, and cross-functional teams to ensure an integrated and robust technological roadmap for the organisation. Moreover, this study presents a comprehensive framework for technology road mapping in the 4IR by incorporating key elements and processes such as technology assessment, competitive intelligence, risk analysis, and resource allocation. It provides a framework for implementing technology road mapping from strategic planning, goal setting, and technology scanning to road mapping visualisation, implementation planning, monitoring, and evaluation. In addition, the study also addresses the challenges and limitations related to technology roadmapping in 4IR, including the gap analysis. In conclusion of the study, the study will propose a set of practical recommendations for organizations that intend to leverage technology road mapping as a strategic tool in the 4IR in driving innovation and becoming competitive in the current and future ecosystem.

Keywords: technology management, technology road mapping, technology transfer, technology planning

Procedia PDF Downloads 58
8494 Design of a New Architecture of IDS Called BiIDS (IDS Based on Two Principles of Detection)

Authors: Yousef Farhaoui

Abstract:

An IDS is a tool which is used to improve the level of security.In this paper we present different architectures of IDS. We will also discuss measures that define the effectiveness of IDS and the very recent works of standardization and homogenization of IDS. At the end, we propose a new model of IDS called BiIDS (IDS Based on the two principles of detection).

Keywords: intrusion detection, architectures, characteristic, tools, security

Procedia PDF Downloads 451
8493 Exploring Challenges Faced by Small Business Owners on Poverty Reduction in Rural Eastern Cape, South Africa

Authors: Akinwale Olusola Mokayode, Emaanuel Adu, Seriki Idowu Ibrahim

Abstract:

Small business can serve as a tool for poverty reduction in South Africa, but it requires adequate support and development for its continuous sustenance in spite of rigorous challenges, especially in the rural environment. This study explored the challenges faced by the small business owners in the rural Eastern Cape Province of South Africa. The objective of the study is to identify the challenges faced by small business owners in the case study area and to examine the effects of those challenges on poverty rate. Survey research design was adopted, with the distribution of structured questionnaire for data collection through a simple random sampling method. Descriptive and inferential statistics was used to analyse the data. Findings showed that small business owners face various challenges in their commercial operations. It was also made clearer that these challenges have effects on the poverty rate as well as crime rate. In conclusion, in other for small businesses to be effective instrument to tackle poverty, certain measure must be taken into considerations. This therefore necessitates recommendation from the researcher that potential and current business owners must seek valuable advice from the more experienced business tycoon and seek information about the business assistance programmes provided by government and private sectors.

Keywords: eastern cape, poverty, poverty reduction, rural, small business, sustainable livelihood

Procedia PDF Downloads 478
8492 Understanding the Thermal Transformation of Random Access Memory Cards: A Pathway to Their Efficient Recycling

Authors: Khushalini N. Ulman, Samane Maroufi, Veena H. Sahajwalla

Abstract:

Globally, electronic waste (e-waste) continues to grow at an alarming rate. Several technologies have been developed to recover valuable materials from e-waste, however, their efficiency can be increased with a better knowledge of the e-waste components. Random access memory cards (RAMs) are considered as high value scrap for the e-waste recyclers. Despite their high precious metal content, RAMs are still recycled in a conventional manner resulting in huge loss of resources. Our research work highlights the precious metal rich components of a RAM. Inductively coupled plasma (ICP) analysis of RAMs of six different generations have been carried out and the trends in their metal content have been investigated. Over the past decade, the copper content of RAMs has halved and their tin content has increased by 70 %. The stricter environmental laws have facilitated ~96 % drop in the lead content of RAMs. To comprehend the fundamentals of thermal transformation of RAMs, our research provides their detailed kinetic study. This can assist the e-waste recyclers in optimising their metal recovery processes. Thus, understanding the chemical and thermal behaviour of RAMs can open new avenues for efficient e-waste recycling.

Keywords: electronic waste, kinetic study, recycling, thermal transformation

Procedia PDF Downloads 137
8491 Effective Strategies Migrants Adopted to Improve Food Security in a Regional Area of Australia

Authors: Joanne Sin Wei Yeoh, Quynh Lê, Daniel R. Terry, Rosa Mc Manamey

Abstract:

Food security is a global issue and one of the concerns in Australia, particularly in regional and rural areas. Despite Australia’s current ability to produce enough food to feed more than its current population, evidence has been accumulating over the last decade to demonstrate many Australians struggle to feed themselves, including immigrants from cultural and linguistically diverse (CALD) backgrounds. This study aims to identify the acculturation strategies used by migrants to enhance their approach to food security in Tasmania. The study employed a mixed methods approach that used both questionnaires and semi-structured interviews with migrants living in Tasmania. Descriptive and inferential statistics was used to analyse data collected from questionnaire, whereas, thematic analysis was employed to analyse the interview data. Migrants (n=301) completed the questionnaire with a response rate of 50.2% and 33 follow-up interviews were conducted. We found that majority of the migrants (70.0%) replaced food ingredients and went without the food they could not buy from shops with similar ingredients. Support and advice from friends were effective ways to improve their food access. Additionally, length of stays in Tasmania and region of origin were significantly associated with the ways migrants dealing with food security. The interview results revealed that migrants managed to adapt to the new food culture by using different acculturation strategies, including access food ingredients from other country; adjusting or adapting; home gardening and access to technology. In addition, social and cultural capitals were also treated as vital roles in improving migrants’ food security. To summarize, migrants employed different strategies for food security while acculturating into the new environment. Our findings could become the guidelines for migrants and relevant government or private sectors that address food security.

Keywords: food security, migrants, strategies, inferential statistics

Procedia PDF Downloads 513
8490 Indicators of Radicalization in Prisons Facilities: Identification and Assessment

Authors: David Kramsky, Barbora Vegrichtova

Abstract:

The prison facility is generally considered as an environment having a corrective purpose. Besides the social sense of remedy, prison is also an environment that potentially determines and affects socially dangerous behavior. The authors, based on long-term empirical research, present the significant indicators that are directly related to the transformation of personality attitudes, motivations and behavior associating with a process of radicalization. One of the most significant symptoms of radicalization is a particular social moral decision making. Individuals in the radicalism process primarily prefer utilitarian manners of decision-making more than personal aspects like empathy for others. The authors will present the method of social moral profiling of the subject in radicalization process as an effective prevention system reducing security risks in society.

Keywords: indicators, moral decision, radicalism, social profile

Procedia PDF Downloads 212
8489 A Methodology for Characterising the Tail Behaviour of a Distribution

Authors: Serge Provost, Yishan Zang

Abstract:

Following a review of various approaches that are utilized for classifying the tail behavior of a distribution, an easily implementable methodology that relies on an arctangent transformation is presented. The classification criterion is actually based on the difference between two specific quantiles of the transformed distribution. The resulting categories enable one to classify distributional tails as distinctly short, short, nearly medium, medium, extended medium and somewhat long, providing that at least two moments exist. Distributions possessing a single moment are said to be long tailed while those failing to have any finite moments are classified as having an extremely long tail. Several illustrative examples will be presented.

Keywords: arctangent transformation, tail classification, heavy-tailed distributions, distributional moments

Procedia PDF Downloads 112
8488 Improving Digital Data Security Awareness among Teacher Candidates with Digital Storytelling Technique

Authors: Veysel Çelik, Aynur Aker, Ebru Güç

Abstract:

Developments in information and communication technologies have increased both the speed of producing information and the speed of accessing new information. Accordingly, the daily lives of individuals have started to change. New concepts such as e-mail, e-government, e-school, e-signature have emerged. For this reason, prospective teachers who will be future teachers or school administrators are expected to have a high awareness of digital data security. The aim of this study is to reveal the effect of the digital storytelling technique on the data security awareness of pre-service teachers of computer and instructional technology education departments. For this purpose, participants were selected based on the principle of volunteering among third-grade students studying at the Computer and Instructional Technologies Department of the Faculty of Education at Siirt University. In the research, the pretest/posttest half experimental research model, one of the experimental research models, was used. In this framework, a 6-week lesson plan on digital data security awareness was prepared in accordance with the digital narration technique. Students in the experimental group formed groups of 3-6 people among themselves. The groups were asked to prepare short videos or animations for digital data security awareness. The completed videos were watched and evaluated together with prospective teachers during the evaluation process, which lasted approximately 2 hours. In the research, both quantitative and qualitative data collection tools were used by using the digital data security awareness scale and the semi-structured interview form consisting of open-ended questions developed by the researchers. According to the data obtained, it was seen that the digital storytelling technique was effective in creating data security awareness and creating permanent behavior changes for computer and instructional technology students.

Keywords: digital storytelling, self-regulation, digital data security, teacher candidates, self-efficacy

Procedia PDF Downloads 117
8487 An Investigation of Entrepreneurial Intentions, Drivers, and Challenges among Final Year Students in Jigawa State Polytechnic, Nigeria

Authors: Muhammad Umar Usman

Abstract:

This study investigates the entrepreneurial intentions, drivers and challenges of starting a business among final year students in Jigawa State polytechnic. Nigeria. Final year students of Jigawa State Polytechnic from the department of accounting, business administration and management and public administration were used as a case study. The study became necessary due to the alarming rate of graduate unemployment in Nigeria. The study adopted a holistic case study approach involving a multiple methods of questionnaires involving (182) Higher National Diploma (HND) and National Diploma (ND) final year students and a telephone interview with two lecturers teaching entrepreneurship in the college. The findings clearly indicate that exposer to entrepreneurship education increases students’ entrepreneurial intentions. The result found that desire for independence, confidence and strong intention are the most important factors that influence students’ entrepreneurial intention. The study identified 3 key drivers of students’ entrepreneurial intentions. These are to earn a living, to seek job security and provision of employment. The result again identified 4 factors namely lack of support, finance, insecurity and erratic power supply as the major challenges in starting a business in Nigeria. It was also revealed that the current entrepreneurship education programme prepares students on how to open up a business not becoming an entrepreneur. The study concluded entrepreneurship helps students toward building and driving their intention to venture into business. However, the challenges of entrepreneurship in Nigeria need to be addressed in order to enable individuals to become an entrepreneur and create employment opportunities that will lead to the development of Nigerian economy. Thus, the government should provide adequate support particularly the issue of infrastructures. The Federal Government of Nigeria in collaboration with the National Board for Technical Education should fashion out the curriculum thereby making it more practically-oriented so that students may become more interested. Polytechnics should develop an internship programme for students to work in firms so as to put theory learnt in the class to practice. Students should try to align the theory learnt in college with the practical application in dynamic economic environment. Hence, this will help in building their capabilities toward entrepreneurship development in Nigeria.

Keywords: entrepreneurial intention, entrepreneurial drivers, challenges, entrepreneurial education

Procedia PDF Downloads 287
8486 Knowledge, Attitude, and Practice Related to Potential Application of Artificial Intelligence in Health Supply Chain

Authors: Biniam Bahiru Tufa, Hana Delil Tesfaye, Seife Demisse Legesse, Manaye Tamire

Abstract:

The healthcare industry is witnessing a digital transformation, with artificial intelligence (AI) offering potential solutions for challenges in health supply chain management (HSCM). However, the adoption of AI in this field remains limited. This research aimed to assess the knowledge, attitude, and practice of AI among students and employees in the health supply chain sector in Ethiopia. Using an explanatory case study research design with a concurrent mixed approach, quantitative and qualitative data were collected simultaneously. The study included 153 participants comprising students and employed health supply chain professionals working in various sectors. The majority had a pharmacy background, and one-third of the participants were male. Most respondents were under 35 years old, and around 68.6% had less than 10 years of experience. The findings revealed that 94.1% of participants had prior knowledge of AI, but only 35.3% were aware of its application in the supply chain. Moreover, the majority indicated that their training curriculum did not cover AI in health supply chain management. Participants generally held positive attitudes toward the necessity of AI for improving efficiency, effectiveness, and cost savings in the supply chain. However, many expressed concerns about its impact on job security and satisfaction, considering it as a burden Graduate students demonstrated higher knowledge of AI compared to employed staff, while graduate students also exhibited a more positive attitude toward AI. The study indicated low previous utilization and potential future utilization of AI in the health supply chain, suggesting untapped opportunities for improvement. Overall, while supply chain experts and graduate students lacked sufficient understanding of AI and its significance, they expressed favorable views regarding its implementation in the sector. The study recommends that the Ethiopian government and international organizations consider introducing AI in the undergraduate pharmacy curriculum and promote its integration into the health supply chain field.

Keywords: knowledge, attitude, practice, supply chain, articifial intellegence

Procedia PDF Downloads 76
8485 Problems and Challenges Facing Refugees and Internally Displaced Persons In Iraq

Authors: Rebin Kamal Hama Gharib

Abstract:

This research paper aims to identify the common and current problems and challenges faced by refugees and internally displaced persons (IDPs) in Iraq. The objective of this research is to highlight the urgent need for policy measures and support to address these issues. The research methodology includes a review of academic literature, government reports, and data collected by international organizations such as the United Nations High Commissioner for Refugees (UNHCR) and the International Organization for Migration (IOM). The main contribution of this research is to provide a comprehensive overview of the challenges faced by refugees and IDPs in Iraq, including their legal status, access to basic services, economic opportunities, and social integration.

Keywords: efugees, internally displaced persons, Iraq, challenges, policy measures

Procedia PDF Downloads 71
8484 From E-Government to Cloud-Government Challenges of Jordanian Citizens' Acceptance for Public Services

Authors: Abeer Alkhwaldi, Mumtaz Kamala

Abstract:

On the inception of the third millennium, there is much evidence that cloud technologies have become the strategic trend for many governments not only developed countries (e.g., UK, Japan, and USA), but also developing countries (e.g. Malaysia and the Middle East region), who have launched cloud computing movements for enhanced standardization of IT resources, cost reduction, and more efficient public services. Therefore, cloud-based e-government services considered as one of the high priorities for government agencies in Jordan. Although of their phenomenal evolution, government cloud-services still suffering from the adoption challenges of e-government initiatives (e.g. technological, human-aspects, social, and financial) which need to be considered carefully by governments contemplating its implementation. This paper presents a pilot study to investigate the citizens' perception of the extent in which these challenges affect the acceptance and use of cloud computing in Jordanian public sector. Based on the data analysis collected using online survey some important challenges were identified. The results can help to guide successful acceptance of cloud-based e-government services in Jordan.

Keywords: challenges, cloud computing, e-government, acceptance, Jordan

Procedia PDF Downloads 420
8483 A Flexible Pareto Distribution Using α-Power Transformation

Authors: Shumaila Ehtisham

Abstract:

In Statistical Distribution Theory, considering an additional parameter to classical distributions is a usual practice. In this study, a new distribution referred to as α-Power Pareto distribution is introduced by including an extra parameter. Several properties of the proposed distribution including explicit expressions for the moment generating function, mode, quantiles, entropies and order statistics are obtained. Unknown parameters have been estimated by using maximum likelihood estimation technique. Two real datasets have been considered to examine the usefulness of the proposed distribution. It has been observed that α-Power Pareto distribution outperforms while compared to different variants of Pareto distribution on the basis of model selection criteria.

Keywords: α-power transformation, maximum likelihood estimation, moment generating function, Pareto distribution

Procedia PDF Downloads 210
8482 A Systematic Snapshot of Software Outsourcing Challenges

Authors: Issam Jebreen, Eman Al-Qbelat

Abstract:

Outsourcing software development projects can be challenging, and there are several common challenges that organizations face. A study was conducted with a sample of 46 papers on outsourcing challenges, and the results show that there are several common challenges faced by organizations when outsourcing software development projects. Poor outsourcing relationship was identified as the most significant challenge, with 35% of the papers referencing it. Lack of quality was the second most significant challenge, with 33% of the papers referencing it. Language and cultural differences were the third most significant challenge, with 24% of the papers referencing it. Non-competitive price was another challenge faced by organizations, with 21% of the papers referencing it. Poor coordination and communication were also identified as a challenge, with 21% of the papers referencing it. Opportunistic behavior, lack of contract negotiation, inadequate user involvement, and constraints due to time zone were also challenges faced by organizations. Other challenges faced by organizations included poor project management, lack of technical capabilities, vendor employee high turnover, poor requirement specification, IPR issues, poor management of budget, schedule, and delay, geopolitical and country instability, the difference in development methodologies, failure to manage end-user expectations, and poor monitoring and control. In conclusion, outsourcing software development projects can be challenging, but organizations can mitigate these challenges by selecting the right outsourcing partner, having a well-defined contract and clear communication, having a clear understanding of the requirements, and implementing effective project management practices.

Keywords: software outsourcing, vendor, outsourcing challenges, quality model, continent, country, global outsourcing, IT workforce outsourcing.

Procedia PDF Downloads 79
8481 Attitude of Beef Cattle Farmers toward Biosecurity Practices

Authors: Veronica Sri Lestari, Sitti Nurani Sirajuddin, Kasmiyati Kasim

Abstract:

The purpose of this research was to know the attitude of beef cattle farmers toward bio security practices. This research was conducted in Barru regency, South Sulawesi province, Indonesia, in 2014. Thirty beef cattle farmers were selected through random sampling. Primary and secondary data were collected through report, observation and deep interview by using questionnaire. Bio security practices consisted of 35 questions. Every answer of the question was scored based on three categories: score 1 (not important), score 2 (important) and 3 (very important). The results of this research showed that the attitude of beef cattle farmers toward bio security practices was categorized as important.

Keywords: attitude, beef cattle, biosecurity, farmers

Procedia PDF Downloads 286
8480 Data Security and Privacy Challenges in Cloud Computing

Authors: Amir Rashid

Abstract:

Cloud Computing frameworks empower organizations to cut expenses by outsourcing computation resources on-request. As of now, customers of Cloud service providers have no methods for confirming the privacy and ownership of their information and data. To address this issue we propose the platform of a trusted cloud computing program (TCCP). TCCP empowers Infrastructure as a Service (IaaS) suppliers, for example, Amazon EC2 to give a shout box execution condition that ensures secret execution of visitor virtual machines. Also, it permits clients to bear witness to the IaaS supplier and decide if the administration is secure before they dispatch their virtual machines. This paper proposes a Trusted Cloud Computing Platform (TCCP) for guaranteeing the privacy and trustworthiness of computed data that are outsourced to IaaS service providers. The TCCP gives the deliberation of a shut box execution condition for a client's VM, ensuring that no cloud supplier's authorized manager can examine or mess up with its data. Furthermore, before launching the VM, the TCCP permits a client to dependably and remotely acknowledge that the provider at backend is running a confided in TCCP. This capacity extends the verification of whole administration, and hence permits a client to confirm the data operation in secure mode.

Keywords: cloud security, IaaS, cloud data privacy and integrity, hybrid cloud

Procedia PDF Downloads 290
8479 Public Policy Making Process in Developing Countries: Case Study of Turkish Health System

Authors: Hakan Akin

Abstract:

The aim of this study was to examine the policy making process in Turkish Health System. This policy making process will be examined through public policy change theories. Since political actors played in the formulation of public policies also explains the type of policy change, this actors will be inspected in the supranational and national basis. Also the transformation of public policy in the Turkish health care system will be analysed under the concepts of New right ideology, neo-liberalism, neo-conservatism and governance. And after this analyse, the outputs and outcomes of this transformation will be discussed in the context of developing countries.

Keywords: policy transfer, policy diffusion, policy convergence, new right, governance

Procedia PDF Downloads 467
8478 Analysis of the Probable Maximum Flood in Hydrologic Design Using Different Functions of Rainfall-Runoff Transformation

Authors: Evangelos Baltas, Elissavet Feloni, Dimitrios Karpouzos

Abstract:

A crucial issue in hydrologic design is the sizing of structures and flood-control works in areas with limited data. This research work highlights the significant variation in probable maximum flood (PMF) for a design hyetograph, using different theoretical functions of rainfall-runoff transformation. The analysis focuses on seven subbasins with different characteristics in the municipality of Florina, northern Greece. This area is a semi-agricultural one which hosts important activities, such as the operation of one of the greatest fields of lignite for power generation in Greece. Results illustrate the notable variation in estimations among the methodologies used for the examined subbasins.

Keywords: rainfall, runoff, hydrologic design, PMF

Procedia PDF Downloads 246
8477 The Transformation of Architecture through the Technological Developments in History: Future Architecture Scenario

Authors: Adel Gurel, Ozge Ceylin Yildirim

Abstract:

Nowadays, design and architecture are being affected and underwent change with the rapid advancements in technology, economics, politics, society and culture. Architecture has been transforming with the latest developments after the inclusion of computers into design. Integration of design into the computational environment has revolutionized the architecture and new perspectives in architecture have been gained. The history of architecture shows the various technological developments and changes in which the architecture has transformed with time. Therefore, the analysis of integration between technology and the history of the architectural process makes it possible to build a consensus on the idea of how architecture is to proceed. In this study, each period that occurs with the integration of technology into architecture is addressed within historical process. At the same time, changes in architecture via technology are identified as important milestones and predictions with regards to the future of architecture have been determined. Developments and changes in technology and the use of technology in architecture within years are analyzed in charts and graphs comparatively. The historical process of architecture and its transformation via technology are supported with detailed literature review and they are consolidated with the examination of focal points of 20th-century architecture under the titles; parametric design, genetic architecture, simulation, and biomimicry. It is concluded that with the historical research between past and present; the developments in architecture cannot keep up with the advancements in technology and recent developments in technology overshadow the architecture, even the technology decides the direction of architecture. As a result, a scenario is presented with regards to the reach of technology in the future of architecture and the role of the architect.

Keywords: computer technologies, future architecture, scientific developments, transformation

Procedia PDF Downloads 178
8476 The Importance of Intellectual Property for Universities of Technology in South Africa: Challenges Faced and Proposed Way Forward

Authors: Martha E. Ikome, John M. Ikome

Abstract:

Intellectual property should be a day-to-day business decision due to its value, but increasingly, a number of institution are still not aware of the importance. Intellectual Property (IP) and its value are often not adequately appreciated. In the increasingly knowledge-driven economy, IP is a key consideration in day-to-day business decisions because new ideas and products appear almost daily in the market, which results in continuous innovation and research. Therefore, this paper will focus on the importance of IP for universities of technology and also further demonstrates how IP can become an economic tool and the challenges faced by these universities in implementing an IP system.

Keywords: intellectual property, institutions, challenges, protection

Procedia PDF Downloads 362
8475 Enhancing Healthcare Data Protection and Security

Authors: Joseph Udofia, Isaac Olufadewa

Abstract:

Everyday, the size of Electronic Health Records data keeps increasing as new patients visit health practitioner and returning patients fulfil their appointments. As these data grow, so is their susceptibility to cyber-attacks from criminals waiting to exploit this data. In the US, the damages for cyberattacks were estimated at $8 billion (2018), $11.5 billion (2019) and $20 billion (2021). These attacks usually involve the exposure of PII. Health data is considered PII, and its exposure carry significant impact. To this end, an enhancement of Health Policy and Standards in relation to data security, especially among patients and their clinical providers, is critical to ensure ethical practices, confidentiality, and trust in the healthcare system. As Clinical accelerators and applications that contain user data are used, it is expedient to have a review and revamp of policies like the Payment Card Industry Data Security Standard (PCI DSS), the Health Insurance Portability and Accountability Act (HIPAA), the Fast Healthcare Interoperability Resources (FHIR), all aimed to ensure data protection and security in healthcare. FHIR caters for healthcare data interoperability, FHIR caters to healthcare data interoperability, as data is being shared across different systems from customers to health insurance and care providers. The astronomical cost of implementation has deterred players in the space from ensuring compliance, leading to susceptibility to data exfiltration and data loss on the security accuracy of protected health information (PHI). Though HIPAA hones in on the security accuracy of protected health information (PHI) and PCI DSS on the security of payment card data, they intersect with the shared goal of protecting sensitive information in line with industry standards. With advancements in tech and the emergence of new technology, it is necessary to revamp these policies to address the complexity and ambiguity, cost barrier, and ever-increasing threats in cyberspace. Healthcare data in the wrong hands is a recipe for disaster, and we must enhance its protection and security to protect the mental health of the current and future generations.

Keywords: cloud security, healthcare, cybersecurity, policy and standard

Procedia PDF Downloads 72
8474 Lattice Twinning and Detwinning Processes in Phase Transformation in Shape Memory Alloys

Authors: Osman Adiguzel

Abstract:

Shape memory effect is a peculiar property exhibited by certain alloy systems and based on martensitic transformation, and shape memory properties are closely related to the microstructures of the material. Shape memory effect is linked with martensitic transformation, which is a solid state phase transformation and occurs with the cooperative movement of atoms by means of lattice invariant shears on cooling from high-temperature parent phase. Lattice twinning and detwinning can be considered as elementary processes activated during the transformation. Thermally induced martensite occurs as martensite variants, in self-accommodating manner and consists of lattice twins. Also, this martensite is called the twinned martensite or multivariant martensite. Deformation of shape memory alloys in martensitic state proceeds through a martensite variant reorientation. The martensite variants turn into the reoriented single variants with deformation, and the reorientation process has great importance for the shape memory behavior. Copper based alloys exhibit this property in metastable β- phase region, which has DO3 –type ordered lattice in ternary case at high temperature, and these structures martensiticaly turn into the layered complex structures with lattice twinning mechanism, on cooling from high temperature parent phase region. The twinning occurs as martensite variants with lattice invariant shears in two opposite directions, <110 > -type directions on the {110}- type plane of austenite matrix. Lattice invariant shear is not uniform in copper based ternary alloys and gives rise to the formation of unusual layered structures, like 3R, 9R, or 18R depending on the stacking sequences on the close-packed planes of the ordered lattice. The unit cell and periodicity are completed through 18 atomic layers in case of 18R-structure. On the other hand, the deformed material recovers the original shape on heating above the austenite finish temperature. Meanwhile, the material returns to the twinned martensite structures (thermally induced martensite structure) in one way (irreversible) shape memory effect on cooling below the martensite finish temperature, whereas the material returns to the detwinned martensite structure (deformed martensite) in two-way (reversible) shape memory effect. Shortly one can say that the microstructural mechanisms, responsible for the shape memory effect are the twinning and detwinning processes as well as martensitic transformation. In the present contribution, x-ray diffraction, transmission electron microscopy (TEM) and differential scanning calorimetry (DSC) studies were carried out on two copper-based ternary alloys, CuZnAl, and CuAlMn.

Keywords: shape memory effect, martensitic transformation, twinning and detwinning, layered structures

Procedia PDF Downloads 422
8473 Impacts of E-Learning on Educational Policy: Policy of Sensitization and Training in E-Learning in Saudi Arabia

Authors: Layla Albdr

Abstract:

Saudi Arabia instituted the policy of Sensitizing and Training Stakeholders for E-learning and witnessed wide adoption in many institutions. However, it is at the infancy stage and needs time to develop to mirror the US and UK. The majority of the higher education institutions in Saudi Arabia have adopted E-learning as an alternative to traditional methods to advance education. Conversely, effective implementation of the policy of sensitization and training of stakeholders for E-learning implementation has not been attained because of various challenges. The objectives included determining the challenges and opportunities of the E-learning policy of sensitization and training of stakeholders in Saudi Arabia's higher education and examining if sensitization and training of stakeholder's policy will help promote the implementation of E-learning in institutions. The study employed a descriptive research design based on qualitative analysis. The researcher recruited 295 students and 60 academic staff from four Saudi Arabian universities to participate in the study. An online questionnaire was used to collect the data. The data was then analyzed and reported both quantitatively and qualitatively. The analysis provided an in-depth understanding of the opportunities and challenges of E-learning policy in Saudi Arabian universities. The main challenges identified as internal challenges were the lack of educators’ interest in adopting the policy, and external challenges entailed lack of ICT infrastructure and Internet connectivity. The study recommends encouraging, sensitizing, and training all stakeholders to address these challenges and adopt the policy.

Keywords: e-learning, educational policy, Saudi Arabia, policy of sensitization and training

Procedia PDF Downloads 146
8472 Implications of Internationalization for Management and Practice in Higher Education

Authors: Naziema Begum Jappie

Abstract:

The internationalization of higher education has become a focal point for academic institutions worldwide, including those in South Africa. This paper explores the multifaceted implications of internationalization on management and practice within the South African higher education landscape. Universities all over the world are increasingly recognizing the challenges of globalization and the pressures towards internationalization. Internationalization in higher education encompasses a range of activities, including academic exchange programs, research collaborations, joint degree programs, and the recruitment of international students and faculty. In South Africa, this process is driven by various factors, including the quest for global competitiveness, the pursuit of academic excellence, and the promotion of cultural diversity. However, while internationalization presents numerous opportunities, it also brings forth significant challenges that require careful consideration by management and practitioners in higher education institutions. Furthermore, the internationalization of higher education in South Africa has significant implications for teaching and learning practices. With an increasingly diverse student body, educators must employ innovative pedagogical approaches that cater to the needs and preferences of a multicultural cohort. This may involve the integration of global perspectives into the curriculum, the use of technology-enhanced learning platforms, and the promotion of intercultural competence among students and faculty. Additionally, the exchange of knowledge and ideas with international partners can enrich research activities and contribute to the advancement of knowledge in various fields. The internationalization of higher education in South Africa has profound implications for management and practice within academic institutions. While it offers opportunities for enhancing academic quality, promoting cultural exchange, and advancing research agendas, it also presents challenges that require strategic planning, resource allocation, and stakeholder engagement. By addressing these challenges proactively and leveraging the opportunities presented by internationalization, South African universities can position themselves as global leaders in higher education while contributing to the socio-economic development of the country and the continent at large. This paper draws together the international experience in South Africa to explore the emerging patterns of strategy and practice in internationalizing Higher Education and will highlight some critical notions of how the concepts of internationalization and globalization in the context of higher education are understood by those who lead universities and what new challenges are being created as universities seek to become more international. Institutions cannot simply have bullet points in the strategic plan for the recruitment of international students; there has to be a complete commitment to a national strategy of inclusivity. This paper will further examine the leadership styles that ensure transformation together with the goals set out for internationalization. Discussions around adding the international relations dimension to the curriculum. Addressing the issues relevant to cross-border delivery of higher education.

Keywords: challenges, higher education, internationalization, strategic focus

Procedia PDF Downloads 39
8471 AI as a Tool Hindering Digital Education

Authors: Justyna Żywiołek, Marek Matulewski

Abstract:

The article presents the results of a survey conducted among students from various European countries. The aim of the study was to understand how artificial intelligence (AI) affects educational processes in a digital environment. The survey covered a wide range of topics, including students' understanding and use of AI, its impact on motivation and engagement, interaction and support issues, accessibility and equity, and data security and privacy concerns. Most respondents admitted having difficulties comprehending the advanced functions of AI in educational tools. Many students believe that excessive use of AI in education can decrease their motivation for self-study and active participation in classes. Additionally, students reported that interaction with AI-based tools is often less satisfying compared to direct contact with teachers. Furthermore, the survey highlighted inequalities in access to advanced AI tools, which can widen the educational gap between students from different economic backgrounds. Students also expressed concerns about the security and privacy of their personal data collected and processed by AI systems. The findings suggest that while AI has the potential to support digital education, significant challenges need to be addressed to make these tools more effective and acceptable for students. Recommendations include increasing training for students and teachers on using AI, providing more interactive and engaging forms of education, and implementing stricter regulations on data protection.

Keywords: AI, digital education, education tools, motivation and engagement

Procedia PDF Downloads 14
8470 Women's Challenges in Access to Urban Spaces and Infrastructures: A Comparative Study of the Urban Infrastructures Conforming to Women's Needs in Tehran and Istanbul

Authors: Parastoo Kazemiyan

Abstract:

Over the past 80 years, in compliance with the advent of modernity in Iran and Turkey, the presence of women in economic and social arenas has creates serious challenges in the capacity of urban spaces to respond to their presence and transport because urban spaces up until then were based on masculine criteria and therefore, women could use such spaces in the company of their fathers or husbands. However, as modernity expanded by Reza Shah and Ataturk, women found the opportunity to work and be present in urban spaces alongside men and their presence in economic and social domains resulted in their presence in these spaces in the early and late hours of the day. Therefore, the city had to be transformed in structural, social, and environmental terms to accommodate women's activities and presence in various urban arenas, which was a huge step in transition from a masculine man-based culture to an all-inclusive human-based culture in these two countries. However, the optimization of urban space was subject to political changes in the two countries, leading to significant differences in designing urban spaces in Tehran and Istanbul. What shows the importance and novelty of the present study lie in the differences in urban planning and optimization in the two capital cities, which gave rise to different outcomes in desirability and quality of living in these two capital cities. Due to the importance of the topic, one of the most significant factors in desirability and acceptability of urban space for women was examined using a descriptive-analytic method based on qualitative methodology in Tehran and Istanbul. The results showed that the infrastructural factors in Istanbul, including safety of access, variety, and number of public transport modes, transparency, and supervision over public spaces have provided women with a safer and more constant presence compared to Tehran. It seems that challenges involved in providing access to urban spaces in Tehran in terms of infrastructure and function have made Tehran unable to respond to the most basic needs of its female citizens.

Keywords: gender differences, urban space security, access to transportation systems, women's challenges

Procedia PDF Downloads 114
8469 Study on Accurate Calculation Method of Model Attidude on Wind Tunnel Test

Authors: Jinjun Jiang, Lianzhong Chen, Rui Xu

Abstract:

The accurate of model attitude angel plays an important role on the aerodynamic test results in the wind tunnel test. The original method applies the spherical coordinate system transformation to obtain attitude angel calculation.The model attitude angel is obtained by coordinate transformation and spherical surface mapping applying the nominal attitude angel (the balance attitude angel in the wind tunnel coordinate system) indicated by the mechanism. First, the coordinate transformation of this method is not only complex but also difficult to establish the transformed relationship between the space coordinate systems especially after many steps of coordinate transformation, moreover it cannot realize the iterative calculation of the interference relationship between attitude angels; Second, during the calculate process to solve the problem the arc is approximately used to replace the straight line, the angel for the tangent value, and the inverse trigonometric function is applied. Therefore, in the calculation of attitude angel, the process is complex and inaccurate, which can be solved approximately when calculating small attack angel. However, with the advancing development of modern aerodynamic unsteady research, the aircraft tends to develop high or super large attack angel and unsteadyresearch field.According to engineering practice and vector theory, the concept of vector angel coordinate systemis proposed for the first time, and the vector angel coordinate system of attitude angel is established.With the iterative correction calculation and avoiding the problem of approximate and inverse trigonometric function solution, the model attitude calculation process is carried out in detail, which validates that the calculation accuracy and accuracy of model attitude angels are improved.Based on engineering and theoretical methods, a vector angel coordinate systemis established for the first time, which gives the transformation and angel definition relations between different flight attitude coordinate systems, that can accurately calculate the attitude angel of the corresponding coordinate systemand determine its direction, especially in the channel coupling calculation, the calculation of the attitude angel between the coordinate systems is only related to the angel, and has nothing to do with the change order s of the coordinate system, whichsimplifies the calculation process.

Keywords: attitude angel, angel vector coordinate system, iterative calculation, spherical coordinate system, wind tunnel test

Procedia PDF Downloads 120
8468 Pension Reform in Georgia: Challenges, International Practice and Opportunities for Development

Authors: Manana Lobzhanidze

Abstract:

Reforming the pension system is urgent in Georgia due to socio-economic problems. Replacing the current pension system with a new one requires, on the one hand, an assessment of the challenges in this field and, on the other hand, a study of the best practices of foreign experience. Objectives: The aim of the research is to identify challenges in the pension reform process in Georgia, to study international experience, and to develop recommendations for the implementation of an effective pension system. Methodologies: A desk study was conducted, and methods of analysis, comparison, grouping, matrix charts, and scenario analysis were used. Findings: The advantages of accumulative pension compared to the current pension system are identified. The main challenge is the non-targeting of the pension contributions and the ineffective investment policy; the public's attitude towards the cumulative pension system is determined.

Keywords: pension reform, challenges, international practice, opportunity for development

Procedia PDF Downloads 55
8467 Robust Diagnosability of PEMFC Based on Bond Graph LFT

Authors: Ould Bouamama, M. Bressel, D. Hissel, M. Hilairet

Abstract:

Fuel cell (FC) is one of the best alternatives of fossil energy. Recently, the research community of fuel cell has shown a considerable interest for diagnosis in view to ensure safety, security, and availability when faults occur in the process. The problematic for model based FC diagnosis consists in that the model is complex because of coupling of several kind of energies and the numerical values of parameters are not always known or are uncertain. The present paper deals with use of one tool: the Linear Fractional Transformation bond graph tool not only for uncertain modelling but also for monitorability (ability to detect and isolate faults) analysis and formal generation of robust fault indicators with respect to parameter uncertainties.The developed theory applied to a nonlinear FC system has proved its efficiency.

Keywords: bond graph, fuel cell, fault detection and isolation (FDI), robust diagnosis, structural analysis

Procedia PDF Downloads 354