Search results for: personal data
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 26651

Search results for: personal data

25961 The Study of Security Techniques on Information System for Decision Making

Authors: Tejinder Singh

Abstract:

Information system is the flow of data from different levels to different directions for decision making and data operations in information system (IS). Data can be violated by different manner like manual or technical errors, data tampering or loss of integrity. Security system called firewall of IS is effected by such type of violations. The flow of data among various levels of Information System is done by networking system. The flow of data on network is in form of packets or frames. To protect these packets from unauthorized access, virus attacks, and to maintain the integrity level, network security is an important factor. To protect the data to get pirated, various security techniques are used. This paper represents the various security techniques and signifies different harmful attacks with the help of detailed data analysis. This paper will be beneficial for the organizations to make the system more secure, effective, and beneficial for future decisions making.

Keywords: information systems, data integrity, TCP/IP network, vulnerability, decision, data

Procedia PDF Downloads 311
25960 Data Integration with Geographic Information System Tools for Rural Environmental Monitoring

Authors: Tamas Jancso, Andrea Podor, Eva Nagyne Hajnal, Peter Udvardy, Gabor Nagy, Attila Varga, Meng Qingyan

Abstract:

The paper deals with the conditions and circumstances of integration of remotely sensed data for rural environmental monitoring purposes. The main task is to make decisions during the integration process when we have data sources with different resolution, location, spectral channels, and dimension. In order to have exact knowledge about the integration and data fusion possibilities, it is necessary to know the properties (metadata) that characterize the data. The paper explains the joining of these data sources using their attribute data through a sample project. The resulted product will be used for rural environmental analysis.

Keywords: remote sensing, GIS, metadata, integration, environmental analysis

Procedia PDF Downloads 125
25959 Online vs. in vivo Workshops in a Masters’ Degree Course in Mental Health Nursing: Students’ Views and Opinions

Authors: Evmorfia Koukia, Polyxeni Mangoulia

Abstract:

Workshops tend to be a vivid and productive way as an in vivo teaching method. Due to the pandemic, COVID-19 university courses were conducted through the internet. Method It was tried for the first time to integrate online art therapy workshops in a core course named “Special Themes of Mental Health Nursing” in a MSc Program in Mental Health. The duration of the course is 3-hours per week for 11 weeks in a single semester. The course has a main instructor, a professor of psychiatric nursing experienced in arts therapies workshops and visiting art therapists. All art therapists were given a certain topic to cover. Students were encouraged to keep a logbook that was evaluated at the end of the semester and was submitted as a part of the examination process of the course. An interview of 10 minutes was conducted with each student at the end of the course from an independent investigator (an assistant professor) Participants The students (sample) of the program were: nurses, psychologists, and social workers Results: All students who participated in the courses found that the learning process was vivid, encouraging participation and self-motivation, and there were no main differences from in vivo learning. The students identified their personal needs, and they felt a personal connection with the learning experience. The result of the personalized learning was that students discovered their strengths and weaknesses and developed skills like critical thinking. All students admitted that the workshops were the optimal way for them to comprehend the courses’ content, their capability to become therapists, as well as their obstacles and weaknesses while working with patients in mental health. Conclusion: There were no important differences between the views of students in online and in vivo teaching method of the workshops. The result has shown that workshops in mental health can contribute equally in the learning experience.

Keywords: mental health, workshops, students, nursing

Procedia PDF Downloads 212
25958 Analysis of Genomics Big Data in Cloud Computing Using Fuzzy Logic

Authors: Mohammad Vahed, Ana Sadeghitohidi, Majid Vahed, Hiroki Takahashi

Abstract:

In the genomics field, the huge amounts of data have produced by the next-generation sequencers (NGS). Data volumes are very rapidly growing, as it is postulated that more than one billion bases will be produced per year in 2020. The growth rate of produced data is much faster than Moore's law in computer technology. This makes it more difficult to deal with genomics data, such as storing data, searching information, and finding the hidden information. It is required to develop the analysis platform for genomics big data. Cloud computing newly developed enables us to deal with big data more efficiently. Hadoop is one of the frameworks distributed computing and relies upon the core of a Big Data as a Service (BDaaS). Although many services have adopted this technology, e.g. amazon, there are a few applications in the biology field. Here, we propose a new algorithm to more efficiently deal with the genomics big data, e.g. sequencing data. Our algorithm consists of two parts: First is that BDaaS is applied for handling the data more efficiently. Second is that the hybrid method of MapReduce and Fuzzy logic is applied for data processing. This step can be parallelized in implementation. Our algorithm has great potential in computational analysis of genomics big data, e.g. de novo genome assembly and sequence similarity search. We will discuss our algorithm and its feasibility.

Keywords: big data, fuzzy logic, MapReduce, Hadoop, cloud computing

Procedia PDF Downloads 303
25957 Forthcoming Big Data on Smart Buildings and Cities: An Experimental Study on Correlations among Urban Data

Authors: Yu-Mi Song, Sung-Ah Kim, Dongyoun Shin

Abstract:

Cities are complex systems of diverse and inter-tangled activities. These activities and their complex interrelationships create diverse urban phenomena. And such urban phenomena have considerable influences on the lives of citizens. This research aimed to develop a method to reveal the causes and effects among diverse urban elements in order to enable better understanding of urban activities and, therefrom, to make better urban planning strategies. Specifically, this study was conducted to solve a data-recommendation problem found on a Korean public data homepage. First, a correlation analysis was conducted to find the correlations among random urban data. Then, based on the results of that correlation analysis, the weighted data network of each urban data was provided to people. It is expected that the weights of urban data thereby obtained will provide us with insights into cities and show us how diverse urban activities influence each other and induce feedback.

Keywords: big data, machine learning, ontology model, urban data model

Procedia PDF Downloads 424
25956 Biosignal Recognition for Personal Identification

Authors: Hadri Hussain, M.Nasir Ibrahim, Chee-Ming Ting, Mariani Idroas, Fuad Numan, Alias Mohd Noor

Abstract:

A biometric security system has become an important application in client identification and verification system. A conventional biometric system is normally based on unimodal biometric that depends on either behavioural or physiological information for authentication purposes. The behavioural biometric depends on human body biometric signal (such as speech) and biosignal biometric (such as electrocardiogram (ECG) and phonocardiogram or heart sound (HS)). The speech signal is commonly used in a recognition system in biometric, while the ECG and the HS have been used to identify a person’s diseases uniquely related to its cluster. However, the conventional biometric system is liable to spoof attack that will affect the performance of the system. Therefore, a multimodal biometric security system is developed, which is based on biometric signal of ECG, HS, and speech. The biosignal data involved in the biometric system is initially segmented, with each segment Mel Frequency Cepstral Coefficients (MFCC) method is exploited for extracting the feature. The Hidden Markov Model (HMM) is used to model the client and to classify the unknown input with respect to the modal. The recognition system involved training and testing session that is known as client identification (CID). In this project, twenty clients are tested with the developed system. The best overall performance at 44 kHz was 93.92% for ECG and the worst overall performance was ECG at 88.47%. The results were compared to the best overall performance at 44 kHz for (20clients) to increment of clients, which was 90.00% for HS and the worst overall performance falls at ECG at 79.91%. It can be concluded that the difference multimodal biometric has a substantial effect on performance of the biometric system and with the increment of data, even with higher frequency sampling, the performance still decreased slightly as predicted.

Keywords: electrocardiogram, phonocardiogram, hidden markov model, mel frequency cepstral coeffiecients, client identification

Procedia PDF Downloads 283
25955 E-Pharmacy: An e-Commerce Approach for Buying Medicine Online in Saudi Arabia

Authors: Syed Asif Hassan, Tabrej Khan, Ibrahim Manssor Al Najar, Mohammed Nasser

Abstract:

The incredible accomplishment achieved by e-commerce in consumer durable area encouraged us to implement the online e-commerce model to tap the business benefits of electronic pharmacy in Saudi Arabia. The Kingdom of Saudi Arabia is famous for traditional herbal medicine. The rich heritage of traditional medicine has helped the mushrooming of regional pharmaceutical industries manufacturing drugs and other therapeutic against various diseases. However, the implementation of e-commerce in pharmacy has not been employed in the Kingdom of Saudi Arabia. The electronic pharmacy (E-Pharm) is an important sector that is flourishing across the globe and providing benefits of E-Pharm to the customers and suppliers all around the world. In this context, our web-based application of electronic pharmacy is the one of its kind in the Kingdom of Saudi Arabia. Surveys and personal interviews were used to identify key objectives of the proposed web-based portal. As per the findings of the surveys and personal interviews, following key objectives were identified: (a) The online platform will be used for ordering of prescription based medications for consumers. (b) The e-portal will provide space for pharmaceutical retailers who do not have an electronic platform to upload and sell their therapeutic products in an organized way. (c) The web portal will provide a tracking system to track the customer’s behavior like choice, offer, order, shipment, payment, etc. The web-based e-pharmacy portal will be developed using MySQL and PHP. The development of e-pharmacy web portal and e-prescription practices will not only improve the growth of electronic pharmacy but would also decrease the possibility of prescription alteration thus providing safety and improving the quality of service provided to the patient or consumers.

Keywords: e-commerce, E-Pharm, MySQL, PHP

Procedia PDF Downloads 402
25954 Virtual Life: Fashion, Expression, and Identity in the Digital World

Authors: Elizabeth Bourgeois

Abstract:

During social distancing, fashion and self-expression have been pushed further into virtual environments. In VR spaces, identities can be curated easily, untethered from the necessities of life and work. Personal styles reach a wider audience and follow new rules. Digital platforms leave some, but not all, 'real world' clothing constraints behind. Virtual aesthetics are set by the user and the software. Gen Z is a native user, applying face filters on Instagram and Snapchat and styling outfits and skins in apps like Gacha Life, Roblox, and Fortnite. These games cultivate space for community and personal style. Loosely tied to human forms, each app has physical aesthetics, with clear vernacular dress defining it. There are ecosystems of makers, consumers, and critics. Designer-modelers create original assets, brands, and luxury items. Fashion and beauty are ephemeral but always reflect the idealization of form and self. Online communities have already established new beauty ideals that impact live fashion trends. Fashion houses develop AR filters, gaming hairstyles challenge real-world colorists, and musicians perform virtual concerts in their avatar forms. In these times, social media and gaming communities promote the expression of public identity. The online dress is no longer tied to 'real' bodies or cloth. In virtual worlds, there are still tribes, status symbols, gender identities, and roles, but free of fabric, form, and static social structure, there is room for fantastic invention.

Keywords: virtual reality, fashion, Gen Z, social media, gaming

Procedia PDF Downloads 140
25953 Data-driven Decision-Making in Digital Entrepreneurship

Authors: Abeba Nigussie Turi, Xiangming Samuel Li

Abstract:

Data-driven business models are more typical for established businesses than early-stage startups that strive to penetrate a market. This paper provided an extensive discussion on the principles of data analytics for early-stage digital entrepreneurial businesses. Here, we developed data-driven decision-making (DDDM) framework that applies to startups prone to multifaceted barriers in the form of poor data access, technical and financial constraints, to state some. The startup DDDM framework proposed in this paper is novel in its form encompassing startup data analytics enablers and metrics aligning with startups' business models ranging from customer-centric product development to servitization which is the future of modern digital entrepreneurship.

Keywords: startup data analytics, data-driven decision-making, data acquisition, data generation, digital entrepreneurship

Procedia PDF Downloads 332
25952 Adolescents Psychological Well Being in Relation to Bullying/CB Victimization: The Mediating Effect of Resilience and Self-Concept

Authors: Dorit Olenik-Shemesh, Tali Heiman

Abstract:

Aggressive peer behaviors, particularly bullying and cyberbullying (CB) victimization during adolescence, are strongly and consistently linked to decreased levels of subjective well-being, potentially hindering a healthy and consistent developmental process. These negative effects might be expressed in emotional, physical, and behavioral difficulties. Adolescents victims of bullying/CB present more depressive moods, more loneliness, and more suicidal thoughts, while adolescents who had never been victims of bullying and CB acts present higher levels of well-being. These difficulties in their lives may be both a consequence of and a partial explanation for bullying/CB victimization. Interpersonal behavior styles and psychosocial factors may interact to create a vicious cycle in which adolescents place themselves at risk, which might explain the reduced well-being reported among victims. Yet, to the best of our knowledge, almost no study has examined the effect of two key variables in adolescents' lives, resilience and self-concept, in the relationship between bullying/CB victimization and low levels of psychological well-being among adolescents. Resilience is defined as the individual's capacity of maintaining stable functioning and make adjustments in the face of adversity; a capacity that promotes efficiently coping with environmental stressors and protects from psycho-social difficulties when facing various challenges. Self-concept relates to the way we perceive ourselves, influenced by many forces, including our interactions with the surroundings; a collection of beliefs about oneself. Accordingly, the current study has examined the possible mediating effect of these two main positive personal variables, resilience, and self-concept, through a mediation model analysis. 507 middle school students aged 11–16 (53% boys, 47% girls) completed questionnaires regarding bullying and CB behaviors, psychological well-being, resilience, and self-concept. A mediation model analysis was performed, whereas the hypothesized mediation model was accepted in full. More specifically, it was found that both self-concept and resilience mediated the relationship between bullying/CB victimization and a sense of well-being. High levels of both variables might buffer against a potential decrease in well-being associated with youth bullying/CB victimization. No gender differences were found, except a small stronger effect of resilience on well-being for boys. The study results suggest focusing on specific personal positive variables when developing youth intervention programs, creating an infrastructure for new programs that address increasing resilience and self-concept in schools and family-school contexts. Such revamped programs could diminish bullying/CB acts and the harmful negative implications for youth well-being. Future studies that will incorporate longitudinal data may further deepen the understanding of these examined relationships.

Keywords: adolescents, well being, bullying/CB victimization, resilience, self-concept

Procedia PDF Downloads 17
25951 Political Leadership: Bane of African Development

Authors: Samaila Liman Gamba

Abstract:

This paper discussed the importance of good governance and its impact on the socio-economic and political development of African countries and, conversely, its underdevelopment and consequent stagnation. The study employed the use of quantitative and descriptive methods of collecting secondary data. The system analysis approach was also adopted as the theoretical framework. It is a global system, but it is also used to analyze the place of regions and single states within it. The study showed that political leadership in Africa based on empirical observation and documented evidence since the hard-won political independence from colonial Europe has become one of Africa’s sources of problems confronting the states and their resources became the primary purpose of political contestation and the establishment of a political culture based on ethnicity and authoritarian pattern of governance. The solution is for African leaders to learn and imbibe the leadership qualities of the late Nelson Mandela, Nyerere and Kwame Nkrumah, who carried their citizens along and were devoid of ethnicity and personal aggrandizement. They sacrificed their lives for their countrymen and fought against imperialism and are counted as patriots.

Keywords: political leadership, African development, constitutional democracy, power and resource control

Procedia PDF Downloads 65
25950 A Study of Challenges Faced and Support Systems Available for Emirati Student Mothers Post-Childbirth

Authors: Martina Dickson, Lilly Tennant

Abstract:

The young Emirati female university students of today are the first generation of women in the UAE for whom higher education as become not only a possibility, but almost an expectation. Young women in the UAE today make up around 77% of students in higher education institutes in the country. However, the societal expectations placed upon these women in terms of early marriage, child-bearing and rearing are similar to those placed upon their mothers and grandmothers in a time where women were not expected to go to university. A large proportion of female university students in the UAE are mothers of young children, or become mothers whilst at the university. This creates a challenging situation for young student mothers, where two weeks’ maternity leave is typical across institutions. The context of this study is in one such institution in the UAE. We have employed a mixed method approach to gathering interview data from twenty mothers, and survey data from over one hundred mothers. The main findings indicate that mothers have strong desires for their institution to support them more, for example by the provision of nursery facilities and resting areas for new mothers, and giving them greater flexibility over course selections and schedules including the provision of online learning. However, the majority felt supported on a personal level by their tutors. The major challenges which they identified in returning to college after only two weeks’ leave included the inevitable health and lack of sleep issues when caring for a newborn, struggling to catch up with missed college work and handling their course load. We also explored the women's’ home support systems which were provided from a variety of extended family, spouses and paid domestic help.

Keywords: student mothers, challenges, supports, United Arab Emirates

Procedia PDF Downloads 222
25949 Sharing Tacit Knowledge: The Essence of Knowledge Management

Authors: Ayesha Khatun

Abstract:

In 21st century where markets are unstable, technologies rapidly proliferate, competitors multiply, products and services become obsolete almost overnight and customers demand low cost high value product, leveraging and harnessing knowledge is not just a potential source of competitive advantage rather a necessity in technology based and information intensive industries. Knowledge management focuses on leveraging the available knowledge and sharing the same among the individuals in the organization so that the employees can make best use of it towards achieving the organizational goals. Knowledge is not a discrete object. It is embedded in people and so difficult to transfer outside the immediate context that it becomes a major competitive advantage. However, internal transfer of knowledge among the employees is essential to maximize the use of knowledge available in the organization in an unstructured manner. But as knowledge is the source of competitive advantage for the organization it is also the source of competitive advantage for the individuals. People think that knowledge is power and sharing the same may lead to lose the competitive position. Moreover, the very nature of tacit knowledge poses many difficulties in sharing the same. But sharing tacit knowledge is the vital part of knowledge management process because it is the tacit knowledge which is inimitable. Knowledge management has been made synonymous with the use of software and technology leading to the management of explicit knowledge only ignoring personal interaction and forming of informal networks which are considered as the most successful means of sharing tacit knowledge. Factors responsible for effective sharing of tacit knowledge are grouped into –individual, organizational and technological factors. Different factors under each category have been identified. Creating a positive organizational culture, encouraging personal interaction, practicing reward system are some of the strategies that can help to overcome many of the barriers to effective sharing of tacit knowledge. Methodology applied here is completely secondary. Extensive review of relevant literature has been undertaken for the purpose.

Keywords: knowledge, tacit knowledge, knowledge management, sustainable competitive advantage, organization, knowledge sharing

Procedia PDF Downloads 403
25948 The Investigation of Work Stress and Burnout in Nurse Anesthetists: A Cross-Sectional Study

Authors: Yen Ling Liu, Shu-Fen Wu, Chen-Fuh Lam, I-Ling Tsai, Chia-Yu Chen

Abstract:

Purpose: Nurse anesthetists are confronting extraordinarily high job stress in their daily practice, deriving from the fast-track anesthesia care, risk of perioperative complications, routine rotating shifts, teaching programs and interactions with the surgical team in the operating room. This study investigated the influence of work stress on the burnout and turnover intention of nurse anesthetists in a regional general hospital in Southern Taiwan. Methods: This was a descriptive correlational study carried out in 66 full-time nurse anesthetists. Data was collected from March 2017 to June 2017 by in-person interview, and a self-administered structured questionnaire was completed by the interviewee. Outcome measurements included the Practice Environment Scale of the Nursing Work Index (PES-NWI), Maslach Burnout Inventory (MBI) and nursing staff turnover intention. Numerical data were analyzed by descriptive statistics, independent t test, or one-way ANOVA. Categorical data were compared using the chi-square test (x²). Datasets were computed with Pearson product-moment correlation and linear regression. Data were analyzed by using SPSS 20.0 software. Results: The average score for job burnout was 68.7916.67 (out of 100). The three major components of burnout, including emotional depletion (mean score of 26.32), depersonalization (mean score of 13.65), and personal(mean score of 24.48). These average scores suggested that these nurse anesthetists were at high risk of burnout and inversely correlated with turnover intention (t = -4.048, P < 0.05). Using linear regression model, emotional exhaustion and depersonalization were the two independent factors that predicted turnover intention in the nurse anesthetists (19.1% in total variance). Conclusion/Implications for Practice: The study identifies that the high risk of job burnout in the nurse anesthetists is not simply derived from physical overload, but most likely resulted from the additional emotional and psychological stress. The occurrence of job burnout may affect the quality of nursing work, and also influence family harmony, in turn, may increase the turnover rate. Multimodal approach is warranted to reduce work stress and job burnout in nurse anesthetists to enhance their willingness to contribute in anesthesia care.

Keywords: anesthesia nurses, burnout, job, turnover intention

Procedia PDF Downloads 300
25947 A Learning Package on Medical Cannabis for Nurses

Authors: Kulveer Sandhu

Abstract:

Background: In 1999, the Government of Canada legalized the use of cannabis for the therapeutic purpose (CTP); however, its users remain highly vulnerable to stigma and are judged by care providers and nonusers of cannabis. Findings from a literature review suggest health care providers (HCPs), including nurses in palliative care settings, lack knowledge about medical cannabis. For this reason, it is important to enhance HCPs’awarenessand knowledge of medical cannabis. Significance of the Project: Nurses are the first point of contact and spend more time with patients than other care providers; it is, therefore, important for them to be informed about CTPto provide quality and equitable care for medical cannabis users. Although nurses and other HCPs want information on CTP, the topic is rarely included in their educational curriculum. The purpose of this project is to create an evidence informed Package designed to increase knowledge among palliative care nurses about CTP. The information package will empower palliative nurses to help palliative patients make informed decisions about their treatment plan. Method: The information package will include a basic overview of the endocannabinoid system, common cannabis plants and products, and methods of consumption, as well as information to help nurses better understand consumption and harm reduction. The package will also include a set of cannabis fact sheets for nurses. Each fact sheet will comprise a high-level overview with graphics followed by a description of medical cannabis with links and references. At the end of the learning package, there are five self-reflection questions that allow nurses to examine their personal values, attitudes, and practices regarding medical cannabis. These questions will help each nurse understand their personal approach towards CTP and its users.

Keywords: medical cannabis, improve knowledge, cannabis for therapeutic purpose (CTP), patient experience, palliative care

Procedia PDF Downloads 226
25946 Reimagining Writing as a Healing Art: A Case Study on Emotional Intelligence

Authors: Shawnrece Campbell

Abstract:

Emotional intelligence as an essential job skill is growing in popularity among human resource professionals and hiring managers. Companies value those who have high emotional intelligence because of their personal competences (self-awareness, self-regulation, motivation) and social competences (empathy, social skills). In implementing any training system to teach emotional intelligence, the best methodologies for acquiring and/or improving these competences should be taken into consideration. This study focuses on how students perceived the art of writing as a tool for self-improvement. During this session, participants will engage in a brief activity designed to help students develop emotional intelligence. As a part of the discussion, participants will learn the results of a junior-level literary seminar conducted to better understand students’ thoughts and views about the effectiveness of writing as a tool for emotional healing. An analysis of qualitative textual data is presented. The outcomes indicated that students found using writing as a tool for emotional intelligence development as highly effective. The findings also revealed that students have positive perceptions of using writing as a self-healing art that leads to increased emotional intelligence and believe that writing courses of this nature enhance students’ appreciation of the value of the liberal arts.

Keywords: emotional intelligence quotient, healing, soft skills, writing

Procedia PDF Downloads 210
25945 Emotional Intelligence and Age in Open Distance Learning

Authors: Naila Naseer

Abstract:

Emotional Intelligence (EI) concept is not new yet unique and interesting. EI is a person’s ability to be aware of his/her own emotions and to manage, handle and communicate emotions with others effectively. The present study was conducted to assess the relationship between emotional intelligence and age of graduate level students at Allama Iqbal Open University (AIOU). Population consisted of Allama Iqbal Open University students (B.Ed 3rd Semester, Autumn 2007) from Rawalpindi and Islamabad regions. Total number of sample consisted of 469 participants was randomly drawn out by using table of random numbers. Bar-On EQ-i was administered on the participants through personal contact. The instrument was also validated through pilot study on a random sample of 50 participants (B.Ed students Spring 2006), who had completed their B.Ed degree successfully. Data was analyzed and tabulated in percentages, frequencies, mean, standard deviation, correlation, and scatter gram in SPSS (version 16.0 for windows). The results revealed that students with higher age group had scored low on the scale (Bar-On EQ-i). Moreover, the students in low age groups exhibited higher levels of EI as compared with old age students.

Keywords: emotional intelligence, age level, learning, emotion-related feelings

Procedia PDF Downloads 336
25944 A Hill Cipher Based on the Kish-Sethuraman Protocol

Authors: Kondwani Magamba

Abstract:

In the idealized Kish-Sethuraman (KS) protocol,messages are sent between Alice and Bob each using a secret personal key. This protocol is said to be perfectly secure because both Bob and Alice keep their keys undisclosed so that at all times the message is encrypted by at least one key, thus no information is leaked or shared. In this paper, we propose a realization of the KS protocol through the use of the Hill Cipher.

Keywords: Kish-Sethuraman Protocol, Hill Cipher, MDS Matrices, encryption

Procedia PDF Downloads 361
25943 Reception Class Practitioners' Understandings on the Role of Teaching Assistants, in Particular Supporting Children in Mathematics

Authors: Nursel Bektas

Abstract:

The purpose of this study is to investigate the roles of teaching assistants (TAs) working in reception classes through practitioners’ perspectives. The study has two major purposes; firstly to explore the general roles of TAs, and secondly to identify their roles in supporting children for mathematics. A small-scale case study approach was adopted for this study. The research was carried out in two reception classes within a primary school in London. The qualitative data were gathered through observations and semi-structured interviews with four reception class practitioners, comprising two teachers and two TAs. The results show that TAs consider their role to be more like a teacher, whereas classroom teachers do not corroborate this and they generally believe that the role of TAs depends on their personal characteristics and skills. In regard to the general role of TAs, the study suggests that reception class TAs are deployed both at the classroom level to provide academic support for children’s learning and development, and at the school level they are deployed as support staff such as Midday Meal Supervisor or assistants. In terms of the pedagogical roles of TAs, it was found that TAs have a strong teaching role in literacy development, with notable autonomy if conducting their own phonics sessions without teacher direction, but a negligible influence in numeracy/ math’s. In addition, the results show that the TA role is perceived to be quite limited in planning and assessment processes. Linked to their limited roles in such processes, all participants agree that all the responsibility regarding the children’s learning and development, planning and assessment lies with the teacher. Therefore, data suggest that TAs’ roles in these areas depend on TAs’ their own initiatives.

Keywords: early years education, reception classes, roles, teaching assistants

Procedia PDF Downloads 193
25942 Cryptographic Protocol for Secure Cloud Storage

Authors: Luvisa Kusuma, Panji Yudha Prakasa

Abstract:

Cloud storage, as a subservice of infrastructure as a service (IaaS) in Cloud Computing, is the model of nerworked storage where data can be stored in server. In this paper, we propose a secure cloud storage system consisting of two main components; client as a user who uses the cloud storage service and server who provides the cloud storage service. In this system, we propose the protocol schemes to guarantee against security attacks in the data transmission. The protocols are login protocol, upload data protocol, download protocol, and push data protocol, which implement hybrid cryptographic mechanism based on data encryption before it is sent to the cloud, so cloud storage provider does not know the user's data and cannot analysis user’s data, because there is no correspondence between data and user.

Keywords: cloud storage, security, cryptographic protocol, artificial intelligence

Procedia PDF Downloads 361
25941 Decentralized Data Marketplace Framework Using Blockchain-Based Smart Contract

Authors: Meshari Aljohani, Stephan Olariu, Ravi Mukkamala

Abstract:

Data is essential for enhancing the quality of life. Its value creates chances for users to profit from data sales and purchases. Users in data marketplaces, however, must share and trade data in a secure and trusted environment while maintaining their privacy. The first main contribution of this paper is to identify enabling technologies and challenges facing the development of decentralized data marketplaces. The second main contribution is to propose a decentralized data marketplace framework based on blockchain technology. The proposed framework enables sellers and buyers to transact with more confidence. Using a security deposit, the system implements a unique approach for enforcing honesty in data exchange among anonymous individuals. Before the transaction is considered complete, the system has a time frame. As a result, users can submit disputes to the arbitrators which will review them and respond with their decision. Use cases are presented to demonstrate how these technologies help data marketplaces handle issues and challenges.

Keywords: blockchain, data, data marketplace, smart contract, reputation system

Procedia PDF Downloads 161
25940 Income Inequality among Selected Entrepreneurs in Ondo State, Nigeria

Authors: O.O. Ehinmowo, A.I. Fatuase, D.F. Oke

Abstract:

Nigeria is endowed with resources that could boost the economy as well as generate income and provide jobs to the teaming populace. One of the keys of attaining this is by making the environment conducive for the entrepreneurs to excel in their respective enterprises so that more income could be accrued to the entrepreneurs. This study therefore examines income inequality among selected entrepreneurs in Ondo State, Nigeria using primary data. A multistage sampling technique was used to select 200 respondents for the study with the aid of structured questionnaire and personal interview. The data collected were subjected to descriptive statistics, Lorenz curve, Gini coefficient and Double - Log regression model. Results revealed that majority of the entrepreneurs (63%) were males and 90% were married with an average age of 44 years. About 40% of the respondents spent at most 12 years in school with 81% of the respondents had 4-6 members per household, while hair dressing (43.5%) and fashion designing (31.5%) were the most common enterprises among the sampled respondents. The findings also showed that majority of the entrepreneurs in hairdressing, fashion designing and laundry service earned below N200,000 per annum while the majority of those in restaurant and food vending earned between N400,000 – N600,000 followed by the entrepreneurs in pure water enterprise where majority earned N800,000 and above per annum. The result of the Gini coefficient (0.58) indicated that there was presence of inequality among the entrepreneurs which was also affirmed by the Lorenz curve. The Regression results showed that gender, household size and number of employees significantly affected the income of the entrepreneurs in the study area. Therefore, more female households should be encouraged into entrepreneurial businesses and government should give incentive cum conductive environment that could bridge the disparity in the income of the entrepreneurs in their various enterprises.

Keywords: entrepreneurs, Gini coefficient, income inequality, Lorenz curve

Procedia PDF Downloads 355
25939 Research Design for Developing and Validating Ice-Hockey Team Diagnostics Scale

Authors: Gergely Geczi

Abstract:

In the modern world, ice hockey (and, in a broader sense, team sports) is becoming an increasingly popular field of entertainment. Although the main element is most likely perceived as the show itself, winning is an inevitable part of the successful operation of any sports team. In this paper, the author creates a research design allowing him to develop and validate an ice-hockey team-focused diagnostics scale, which enables researchers and practitioners to identify the problems associated with underperforming teams. The construction of the scale starts with personal interviews with experts of the field, carefully chosen from the sector of Hungarian ice hockey. Based on the interviews, the author is shown to be in the position to create the categories and the relevant items for the scale. When constructed, the next step is the validation process on a Hungarian sample. Data for validation are acquired through reaching the licensed database of the Hungarian Ice-Hockey Federation involving Hungarian ice-hockey coaches and players. The Ice-Hockey Team Diagnostics Scale is to be created to orient practitioners in understanding both effective and underperforming teamwork.

Keywords: diagnostics scale, effective versus underperforming team work, ice-hockey, research design

Procedia PDF Downloads 135
25938 Exploring the Situational Approach to Decision Making: User eConsent on a Health Social Network

Authors: W. Rowan, Y. O’Connor, L. Lynch, C. Heavin

Abstract:

Situation Awareness can offer the potential for conscious dynamic reflection. In an era of online health data sharing, it is becoming increasingly important that users of health social networks (HSNs) have the information necessary to make informed decisions as part of the registration process and in the provision of eConsent. This research aims to leverage an adapted Situation Awareness (SA) model to explore users’ decision making processes in the provision of eConsent. A HSN platform was used to investigate these behaviours. A mixed methods approach was taken. This involved the observation of registration behaviours followed by a questionnaire and focus group/s. Early results suggest that users are apt to automatically accept eConsent, and only later consider the long-term implications of sharing their personal health information. Further steps are required to continue developing knowledge and understanding of this important eConsent process. The next step in this research will be to develop a set of guidelines for the improved presentation of eConsent on the HSN platform.

Keywords: eConsent, health social network, mixed methods, situation awareness

Procedia PDF Downloads 298
25937 Data Mining Approach for Commercial Data Classification and Migration in Hybrid Storage Systems

Authors: Mais Haj Qasem, Maen M. Al Assaf, Ali Rodan

Abstract:

Parallel hybrid storage systems consist of a hierarchy of different storage devices that vary in terms of data reading speed performance. As we ascend in the hierarchy, data reading speed becomes faster. Thus, migrating the application’ important data that will be accessed in the near future to the uppermost level will reduce the application I/O waiting time; hence, reducing its execution elapsed time. In this research, we implement trace-driven two-levels parallel hybrid storage system prototype that consists of HDDs and SSDs. The prototype uses data mining techniques to classify application’ data in order to determine its near future data accesses in parallel with the its on-demand request. The important data (i.e. the data that the application will access in the near future) are continuously migrated to the uppermost level of the hierarchy. Our simulation results show that our data migration approach integrated with data mining techniques reduces the application execution elapsed time when using variety of traces in at least to 22%.

Keywords: hybrid storage system, data mining, recurrent neural network, support vector machine

Procedia PDF Downloads 311
25936 Discussion on Big Data and One of Its Early Training Application

Authors: Fulya Gokalp Yavuz, Mark Daniel Ward

Abstract:

This study focuses on a contemporary and inevitable topic of Data Science and its exemplary application for early career building: Big Data and Leaving Learning Community (LLC). ‘Academia’ and ‘Industry’ have a common sense on the importance of Big Data. However, both of them are in a threat of missing the training on this interdisciplinary area. Some traditional teaching doctrines are far away being effective on Data Science. Practitioners needs some intuition and real-life examples how to apply new methods to data in size of terabytes. We simply explain the scope of Data Science training and exemplified its early stage application with LLC, which is a National Science Foundation (NSF) founded project under the supervision of Prof. Ward since 2014. Essentially, we aim to give some intuition for professors, researchers and practitioners to combine data science tools for comprehensive real-life examples with the guides of mentees’ feedback. As a result of discussing mentoring methods and computational challenges of Big Data, we intend to underline its potential with some more realization.

Keywords: Big Data, computation, mentoring, training

Procedia PDF Downloads 366
25935 Assessing Missouri State Park Employee Perceptions of Vulnerability and Resilience to Extreme Weather Events

Authors: Ojetunde Ojewola, Mark Morgan, Sonja Wilhelm-Stanis

Abstract:

State parks and historic sites are vulnerable to extreme weather events which can affect visitor experiences, management priorities, and legislative requests for disaster relief funds. Recently, global attention has been focused on the perceptions of global warming and how the presence of extreme weather events might impact protected areas, both now and in the future. The effects of climate change are not equally distributed across the United States, leading to varied perceptions based on personal experience with extreme weather events. This study describes employee perceptions of vulnerability and resilience in Missouri State Parks & Historic Sites due to extreme weather events that occur across the state but grouped according to physiographic provinces. Using a four-point rating scale, perceptions of vulnerability and resilience were divided into high and low sub-groups, thus allowing researchers to construct a two by two typology of employee responses. Subsequently, this data was used to develop a three-point continuum of environmental concern (higher scores meant more concern). Employee scores were then compared against a statewide assessment which combined social, economic, infrastructural and environmental indicators of vulnerability and resilience. State park employees thought the system was less vulnerable and more resilient to climate change than data found in statewide assessment This result was also consistent in three out of five physiographic regions across Missouri. Implications suggest that Missouri state park should develop a climate change adaptation strategy for emergency preparedness.

Keywords: extreme weather events, resilience, state parks, vulnerability

Procedia PDF Downloads 127
25934 Towards a Secure Storage in Cloud Computing

Authors: Mohamed Elkholy, Ahmed Elfatatry

Abstract:

Cloud computing has emerged as a flexible computing paradigm that reshaped the Information Technology map. However, cloud computing brought about a number of security challenges as a result of the physical distribution of computational resources and the limited control that users have over the physical storage. This situation raises many security challenges for data integrity and confidentiality as well as authentication and access control. This work proposes a security mechanism for data integrity that allows a data owner to be aware of any modification that takes place to his data. The data integrity mechanism is integrated with an extended Kerberos authentication that ensures authorized access control. The proposed mechanism protects data confidentiality even if data are stored on an untrusted storage. The proposed mechanism has been evaluated against different types of attacks and proved its efficiency to protect cloud data storage from different malicious attacks.

Keywords: access control, data integrity, data confidentiality, Kerberos authentication, cloud security

Procedia PDF Downloads 336
25933 Estimating the Ladder Angle and the Camera Position From a 2D Photograph Based on Applications of Projective Geometry and Matrix Analysis

Authors: Inigo Beckett

Abstract:

In forensic investigations, it is often the case that the most potentially useful recorded evidence derives from coincidental imagery, recorded immediately before or during an incident, and that during the incident (e.g. a ‘failure’ or fire event), the evidence is changed or destroyed. To an image analysis expert involved in photogrammetric analysis for Civil or Criminal Proceedings, traditional computer vision methods involving calibrated cameras is often not appropriate because image metadata cannot be relied upon. This paper presents an approach for resolving this problem, considering in particular and by way of a case study, the angle of a simple ladder shown in a photograph. The UK Health and Safety Executive (HSE) guidance document published in 2014 (INDG455) advises that a leaning ladder should be erected at 75 degrees to the horizontal axis. Personal injury cases can arise in the construction industry because a ladder is too steep or too shallow. Ad-hoc photographs of such ladders in their incident position provide a basis for analysis of their angle. This paper presents a direct approach for ascertaining the position of the camera and the angle of the ladder simultaneously from the photograph(s) by way of a workflow that encompasses a novel application of projective geometry and matrix analysis. Mathematical analysis shows that for a given pixel ratio of directly measured collinear points (i.e. features that lie on the same line segment) from the 2D digital photograph with respect to a given viewing point, we can constrain the 3D camera position to a surface of a sphere in the scene. Depending on what we know about the ladder, we can enforce another independent constraint on the possible camera positions which enables us to constrain the possible positions even further. Experiments were conducted using synthetic and real-world data. The synthetic data modeled a vertical plane with a ladder on a horizontally flat plane resting against a vertical wall. The real-world data was captured using an Apple iPhone 13 Pro and 3D laser scan survey data whereby a ladder was placed in a known location and angle to the vertical axis. For each case, we calculated camera positions and the ladder angles using this method and cross-compared them against their respective ‘true’ values.

Keywords: image analysis, projective geometry, homography, photogrammetry, ladders, Forensics, Mathematical modeling, planar geometry, matrix analysis, collinear, cameras, photographs

Procedia PDF Downloads 55
25932 Tracking Subjectivity in Political Socialization: University Students' Perceptions of Citizenship Learning Experiences in Chinese Higher Education

Authors: Chong Zhang

Abstract:

There is widespread debate about the nationalistic top-down approach to citizenship education. Employing the notion of cultural citizenship as a useful theoretical lens, citizenship education research tends to focus on the process of subjectivity construction among students’ citizenship learning process. As the Communist Party of China (CPC) plays a dominant role in cultivating citizens through ideological and political education (IaPE) in Chinese universities, the research problem herein focuses on the dynamics and complexity of how Chinese university students construct their subjectivities regarding citizenship learning through IaPE, mediated by the interaction between the state and university teachers. Drawing on questionnaire data from 212 students and interview data from 25 students in one university in China, this paper examines the ways in which students understand and respond to dominant discourses. Its findings reveal there is a deficit of citizenship learning in IaPE, and that students feel ideologically pressurized. From its analysis of social contexts’ influence, the article suggests Chinese higher education students act as either mild changemakers or active self-motivators to enact complex subjectivities, in that they must involve themselves in IaPE for personal academic and career development, yet adopt covert strategies to realise their self-conscious citizenship learning expectations. These strategies take the form of passive and active freedoms, ranging from obediently completing basic curriculum requirements and distancing themselves by studying abroad, to actively searching for learning opportunities from other courses and social media. This paper contributes to the research on citizenship education by recognizing the complexities of how subjectivities are formed in formal university settings.

Keywords: university students, citizenship learning, cultural citizenship, subjectivity, Chinese higher education

Procedia PDF Downloads 129