Search results for: user perceptions
2954 Rural Education in Saudi Arabia School Leaders’ and Teachers’ Experiences and Perceptions
Authors: Emad Matar Alotaibi
Abstract:
In line with other Arabic countries, Saudi Arabia is currently undergoing large scale school reform in response to key factors brought about by globalization. While there is a growing body of research exploring these systemic changes in urban environments, there is very little published research regarding rural schools. In fact, rural schools are still under-examined globally comparing to their urban and suburban counterparts over a range of reform dimensions. In Saudi Arabia, there are around 1128 rural areas that contain about 3200 schools. Several challenges face rural schools, especially in relation to recruitment, retention, and professional development opportunities for teachers and school leaders. However, there is very little in depth research which explores these issues “on the ground”. The aim of this research is fill this knowledge gap and explore teachers’ and leaders’ perceptions and experiences of working in rural schools in KSA. In Saudi Arabia, there is a growing body of research into school leadership. However, there is very little published research specifically exploring rural schools. By using an in-depth case study approach and adopting an analytical framework based on the interlinking concepts of leadership practices, culture, and CPD, this study offers and significant and original contribution to knowledge in this area. This study also will adopt a qualitative multiple case studies, which is going to employ semi-structured interviews, focus groups, and documentary analysis.Keywords: leadership practice, school culture, continuing professional development, rural school
Procedia PDF Downloads 802953 An Experimental Study of Online Peer-to-Peer Language Learning
Authors: Abrar Al-Hasan
Abstract:
Web 2.0 has significantly increased the amount of information available to users not only about firms and their offerings, but also about the activities of other individuals in their networks and markets. It is widely acknowledged that this increased availability of ‘social’ information, particularly about other individuals, is likely to influence a user’s behavior and choices. However, there are very few systematic studies of how such increased information transparency on the behavior of other users in a focal users’ network influences a focal users’ behavior in the emerging marketplace of online language learning. This study seeks to examine the value and impact of ‘social activities’ – wherein, a user sees and interacts with the learning activities of her peers – on her language learning efficiency. An online experiment in a peer-to-peer language marketplace was conducted to compare the learning efficiency of users with ‘social’ information versus users with no ‘social’ information. The results of this study highlight the impact and importance of ‘social’ information within the language learning context. The study concludes by exploring how these insights may inspire new developments in online education.Keywords: e-Learning, language learning marketplace, peer-to-peer, social network
Procedia PDF Downloads 3842952 Building Scalable and Accurate Hybrid Kernel Mapping Recommender
Authors: Hina Iqbal, Mustansar Ali Ghazanfar, Sandor Szedmak
Abstract:
Recommender systems uses artificial intelligence practices for filtering obscure information and can predict if a user likes a specified item. Kernel mapping Recommender systems have been proposed which are accurate and state-of-the-art algorithms and resolve recommender system’s design objectives such as; long tail, cold-start, and sparsity. The aim of research is to propose hybrid framework that can efficiently integrate different versions— namely item-based and user-based KMR— of KMR algorithm. We have proposed various heuristic algorithms that integrate different versions of KMR (into a unified framework) resulting in improved accuracy and elimination of problems associated with conventional recommender system. We have tested our system on publically available movies dataset and benchmark with KMR. The results (in terms of accuracy, precision, recall, F1 measure and ROC metrics) reveal that the proposed algorithm is quite accurate especially under cold-start and sparse scenarios.Keywords: Kernel Mapping Recommender Systems, hybrid recommender systems, cold start, sparsity, long tail
Procedia PDF Downloads 3372951 The Impact of Recurring Events in Fake News Detection
Authors: Ali Raza, Shafiq Ur Rehman Khan, Raja Sher Afgun Usmani, Asif Raza, Basit Umair
Abstract:
Detection of Fake news and missing information is gaining popularity, especially after the advancement in social media and online news platforms. Social media platforms are the main and speediest source of fake news propagation, whereas online news websites contribute to fake news dissipation. In this study, we propose a framework to detect fake news using the temporal features of text and consider user feedback to identify whether the news is fake or not. In recent studies, the temporal features in text documents gain valuable consideration from Natural Language Processing and user feedback and only try to classify the textual data as fake or true. This research article indicates the impact of recurring and non-recurring events on fake and true news. We use two models BERT and Bi-LSTM to investigate, and it is concluded from BERT we get better results and 70% of true news are recurring and rest of 30% are non-recurring.Keywords: natural language processing, fake news detection, machine learning, Bi-LSTM
Procedia PDF Downloads 212950 Prototype Development of ARM-7 Based Embedded Controller for Packaging Machine
Authors: Jeelka Ray
Abstract:
Survey of the papers revealed that there is no practical design available for packaging machine based on Embedded system, so the need arose for the development of the prototype model. In this paper, author has worked on the development of an ARM7 based Embedded Controller for controlling the sequence of packaging machine. The unit is made user friendly with TFT and Touch Screen implementing human machine interface (HMI). The different system components are briefly discussed, followed by a description of the overall design. The major functions which involve bag forming, sealing temperature control, fault detection, alarm, animated view on the home screen when the machine is working as per different parameters set makes the machine performance more successful. LPC2478 ARM 7 Embedded Microcontroller controls the coordination of individual control function modules. In back gone days, these machines were manufactured with mechanical fittings. Later on, the electronic system replaced them. With the help of ongoing technologies, these mechanical systems were controlled electronically using Microprocessors. These became the backbone of the system which became a cause for the updating technologies in which the control was handed over to the Microcontrollers with Servo drives for accurate positioning of the material. This helped to maintain the quality of the products. Including all, RS 485 MODBUS Communication technology is used for synchronizing AC Drive & Servo Drive. These all concepts are operated either manually or through a Graphical User Interface. Automatic tuning of heaters, sealers and their temperature is controlled using Proportional, Integral and Derivation loops. In the upcoming latest technological world, the practical implementation of the above mentioned concepts is really important to be in the user friendly environment. Real time model is implemented and tested on the actual machine and received fruitful results.Keywords: packaging machine, embedded system, ARM 7, micro controller, HMI, TFT, touch screen, PID
Procedia PDF Downloads 2742949 A Comprehensive Framework to Ensure Data Security in Cloud Computing: Analysis, Solutions, and Approaches
Authors: Loh Fu Quan, Fong Zi Heng, Burra Venkata Durga Kumar
Abstract:
Cloud computing has completely transformed the way many businesses operate. Traditionally, confidential data of a business is stored in computers located within the premise of the business. Therefore, a lot of business capital is put towards maintaining computing resources and hiring IT teams to manage them. The advent of cloud computing changes everything. Instead of purchasing and managing their infrastructure, many businesses have started to shift towards working with the cloud with the help of a cloud service provider (CSP), leading to cost savings. However, it also introduces security risks. This research paper focuses on the security risks that arise during data migration and user authentication in cloud computing. To overcome this problem, this paper provides a comprehensive framework that includes Transport Layer Security (TLS), user authentication, security tokens and multi-level data encryption. This framework aims to prevent authorized access to cloud resources and data leakage, ensuring the confidentiality of sensitive information. This framework can be used by cloud service providers to strengthen the security of their cloud and instil confidence in their users.Keywords: Cloud computing, Cloud security, Cloud security issues, Cloud security framework
Procedia PDF Downloads 1152948 Digital Library Evaluation by SWARA-WASPAS Method
Authors: Mehmet Yörükoğlu, Serhat Aydın
Abstract:
Since the discovery of the manuscript, mechanical methods for storing, transferring and using the information have evolved into digital methods over the time. In this process, libraries that are the center of the information have also become digitized and become accessible from anywhere and at any time in the world by taking on a structure that has no physical boundaries. In this context, some criteria for information obtained from digital libraries have become more important for users. This paper evaluates the user criteria from different perspectives that make a digital library more useful. The Step-Wise Weight Assessment Ratio Analysis-Weighted Aggregated Sum Product Assessment (SWARA-WASPAS) method is used with flexibility and easy calculation steps for the evaluation of digital library criteria. Three different digital libraries are evaluated by information technology experts according to five conflicting main criteria, ‘interface design’, ‘effects on users’, ‘services’, ‘user engagement’ and ‘context’. Finally, alternatives are ranked in descending order.Keywords: digital library, multi criteria decision making, SWARA-WASPAS method
Procedia PDF Downloads 1502947 Knowledge, Attitudes, and Practices Regarding Treated Wastewater Reuse in Qatari Agriculture: A Validated Questionnaire Study
Authors: Hiba Naccache
Abstract:
This research investigates stakeholder perceptions and understanding of treated wastewater reuse in Qatari agriculture through a mixed-methods approach. Three questionnaires targeting educators, parents, and students underwent rigorous validation, including pilot testing and exploratory factor analysis, resulting in a refined 39-item instrument demonstrating high internal consistency reliability (Cronbach's alpha = 0.925). Inter-rater reliability among professional scorers was also assessed, ensuring data accuracy (kappa = 0.94). Preliminary findings reveal significant knowledge gaps and cultural barriers impeding widespread adoption. This paper explains the solid research method, gives key findings like awareness levels and problems that have been found, and suggests evidence-based ways to create targeted educational interventions and clear communication to support sustainable farming practices that are in line with Qatar's National Food Security Strategy and Vision 2030.Keywords: treated wastewater reuse, Qatar, agriculture, stakeholder perceptions, mixed-methods, questionnaire validation, knowledge gaps, cultural barriers, sustainable agriculture, national food security strategy, vision 2030, educational interventions, communication strategies
Procedia PDF Downloads 52946 A Novel Combined Finger Counting and Finite State Machine Technique for ASL Translation Using Kinect
Authors: Rania Ahmed Kadry Abdel Gawad Birry, Mohamed El-Habrouk
Abstract:
This paper presents a brief survey of the techniques used for sign language recognition along with the types of sensors used to perform the task. It presents a modified method for identification of an isolated sign language gesture using Microsoft Kinect with the OpenNI framework. It presents the way of extracting robust features from the depth image provided by Microsoft Kinect and the OpenNI interface and to use them in creating a robust and accurate gesture recognition system, for the purpose of ASL translation. The Prime Sense’s Natural Interaction Technology for End-user - NITE™ - was also used in the C++ implementation of the system. The algorithm presents a simple finger counting algorithm for static signs as well as directional Finite State Machine (FSM) description of the hand motion in order to help in translating a sign language gesture. This includes both letters and numbers performed by a user, which in-turn may be used as an input for voice pronunciation systems.Keywords: American sign language, finger counting, hand tracking, Microsoft Kinect
Procedia PDF Downloads 2942945 Local Residents' Perceptions of Economic Impacts of Urban Riverfront Development: Case of Sabarmati Riverfront Development
Authors: Smriti Mishra, Jaydip Barman, Shashi Kant Pandey
Abstract:
Many scholars suggest that waterfront development projects have an all round impact on cities. However, their research stops short of considering the perception of local residents, of what they think about the impact of such developments and the kind of waterfront development which they would prefer to support. Therefore, this paper attempts to address this imbalance in the literature by analysing a survey of residents' perceptions of such developments. The paper discusses the issue in the Indian context by considering Sabarmati Riverfront Development Project (SRFD) of Ahmadabad. It gives an overview of the project components of the SRFD; discusses its development issues and concerns associated with it. It further examines the structural relationship between socio-economic and demographic attributes of local residents and their attitudes and perception towards the economic impact of such developments. The study suggests that the economic component that riverfront development will attract more investment in their community and that riverfront development will increase real estate tax revenue emerged as strong components. While the economic component of substantial premiums to developers, land owners and local government and the other of cost of developing riverfront facilities are too much of a burden on government and public sector agencies appear to be weaker economic components of the perceived economic impacts of urban riverfront development. This paper also gives an overview of the urban waterfront development in the global scenario. It highlights the need to consider residents perception in the development of such projects.Keywords: urban waterfront development, riverfront, economic impact, resident perception, SRFD
Procedia PDF Downloads 5302944 Chinese Students’ Use of Corpus Tools in an English for Academic Purposes Writing Course: Influence on Learning Behaviour, Performance Outcomes and Perceptions
Authors: Jingwen Ou
Abstract:
Writing for academic purposes in a second or foreign language poses a significant challenge for non-native speakers, particularly at the tertiary level, where English academic writing for L2 students is often hindered by difficulties in academic discourse, including vocabulary, academic register, and organization. The past two decades have witnessed a rising popularity in the application of the data-driven learning (DDL) approach in EAP writing instruction. In light of such a trend, this study aims to enhance the integration of DDL into English for academic purposes (EAP) writing classrooms by investigating the perception of Chinese college students regarding the use of corpus tools for improving EAP writing. Additionally, the research explores their corpus consultation behaviors during training to provide insights into corpus-assisted EAP instruction for DDL practitioners. Given the uprising popularity of DDL, this research aims to investigate Chinese university students’ use of corpus tools with three main foci: 1) the influence of corpus tools on learning behaviours, 2) the influence of corpus tools on students’ academic writing performance outcomes, and 3) students’ perceptions and potential perceptional changes towards the use of such tools. Three corpus tools, CQPWeb, Sketch Engine, and LancsBox X, are selected for investigation due to the scarcity of empirical research on patterns of learners’ engagement with a combination of multiple corpora. The research adopts a pre-test / post-test design for the evaluation of students’ academic writing performance before and after the intervention. Twenty participants will be divided into two groups: an intervention and a non-intervention group. Three corpus training workshops will be delivered at the beginning, middle, and end of a semester. An online survey and three separate focus group interviews are designed to investigate students’ perceptions of the use of corpus tools for improving academic writing skills, particularly the rhetorical functions in different essay sections. Insights from students’ consultation sessions indicated difficulties with DDL practice, including insufficiency of time to complete all tasks, struggle with technical set-up, unfamiliarity with the DDL approach and difficulty with some advanced corpus functions. Findings from the main study aim to provide pedagogical insights and training resources for EAP practitioners and learners.Keywords: corpus linguistics, data-driven learning, English for academic purposes, tertiary education in China
Procedia PDF Downloads 572943 The Link between Childhood Maltreatment and Psychological Distress: The Mediation and Moderation Roles of Cognitive Distortion, Alexithymia, and Eudemonic Well-Being
Authors: Siqi Fang, Man Cheung Chung
Abstract:
This study examined the inter-relationship between childhood maltreatment, cognitive distortion, alexithymia, eudemonic well-being, and psychological distress. One hundred and eighty-two university students participated in the study and completed an online survey comprising the Childhood Trauma Questionnaire, Cognitive Distortion Scale, Toronto Alexithymia Scale, Psychological Well-Being Scale, and General Health Questionnaire-28. Hierarchical multiple regression analysis showed that child maltreatment, perceptions of hopelessness and helplessness, preoccupation with danger, personal growth, and purpose in life predicted psychological distress. However, alexithymia was not a significant predictor. Further analysis using the regression models with bootstrapping procedure showed that feeling hopeless, helpless and preoccupation with danger mediated the path between child maltreatment and psychological distress. Meanwhile, coping with beliefs in personal growth and life purpose moderated the mediation effects of distorted cognition on psychological distress. To conclude, childhood maltreatment is associated with psychological distress. This relationship is influenced by people’s perceptions of life being hopeless, helpless or dangerous. At the same time, the effect of hopelessness, helplessness, and feelings of danger also depends on the degree of using coping strategies of positive psychological functioning.Keywords: alexithymia, childhood maltreatment, cognitive distortion, eudemonic well-being, psychological distress
Procedia PDF Downloads 3432942 RS Based SCADA System for Longer Distance Powered Devices
Authors: Harkishen Singh, Gavin Mangeni
Abstract:
This project aims at building an efficient and automatic power monitoring SCADA system, which is capable of monitoring the electrical parameters of high voltage powered devices in real time for example RMS voltage and current, frequency, energy consumed, power factor etc. The system uses RS-485 serial communication interface to transfer data over longer distances. Embedded C programming is the platform used to develop two hardware modules namely: RTU and Master Station modules, which both use the CC2540 BLE 4.0 microcontroller configured in slave / master mode. The Si8900 galvanic ally isolated microchip is used to perform ADC externally. The hardware communicates via UART port and sends data to the user PC using the USB port. Labview software is used to design a user interface to display current state of the power loads being monitored as well as logs data to excel spreadsheet file. An understanding of the Si8900’s auto baud rate process is key to successful implementation of this project.Keywords: SCADA, RS485, CC2540, labview, Si8900
Procedia PDF Downloads 2992941 O.MG- It’s a Cyber-Enabled Fraud
Authors: Damola O. Lawal, David W. Gresty, Diane E. Gan, Louise Hewitt
Abstract:
This paper investigates the feasibility of using a programmable USB such as the O.MG Cable to perform a file tampering attack. Here, the O.MG Cable, an apparently harmless mobile device charger, is used in an unauthorized way to alter the content of a file (accounts record-January_Contributions.xlsx). The aim is to determine if a forensics analyst can reliably determine who has altered the target file; the O.MG Cable or the user of the machine. This work highlights some of the traces of the O.MG Cable left behind on the target computer itself, such as the Product ID (PID) and Vendor ID (ID). Also discussed is the O.MG Cable’s behavior during the experiments. We determine if a forensics analyst could identify if any evidence has been left behind by the programmable device on the target file once it has been removed from the computer to establish if the analyst would be able to link the traces left by the O.MG Cable to the file tampering. It was discovered that the forensic analyst might mistake the actions of the O.MG Cable for the computer users. Experiments carried out in this work could further the discussion as to whether an innocent user could be punished for the unauthorized changes made by a programmable device.Keywords: O.MG cable, programmable USB, file tampering attack, digital evidence credibility, miscarriage of justice, cyber fraud
Procedia PDF Downloads 1562940 A Novel Method for Face Detection
Authors: H. Abas Nejad, A. R. Teymoori
Abstract:
Facial expression recognition is one of the open problems in computer vision. Robust neutral face recognition in real time is a major challenge for various supervised learning based facial expression recognition methods. This is due to the fact that supervised methods cannot accommodate all appearance variability across the faces with respect to race, pose, lighting, facial biases, etc. in the limited amount of training data. Moreover, processing each and every frame to classify emotions is not required, as the user stays neutral for the majority of the time in usual applications like video chat or photo album/web browsing. Detecting neutral state at an early stage, thereby bypassing those frames from emotion classification would save the computational power. In this work, we propose a light-weight neutral vs. emotion classification engine, which acts as a preprocessor to the traditional supervised emotion classification approaches. It dynamically learns neutral appearance at Key Emotion (KE) points using a textural statistical model, constructed by a set of reference neutral frames for each user. The proposed method is made robust to various types of user head motions by accounting for affine distortions based on a textural statistical model. Robustness to dynamic shift of KE points is achieved by evaluating the similarities on a subset of neighborhood patches around each KE point using the prior information regarding the directionality of specific facial action units acting on the respective KE point. The proposed method, as a result, improves ER accuracy and simultaneously reduces the computational complexity of ER system, as validated on multiple databases.Keywords: neutral vs. emotion classification, Constrained Local Model, procrustes analysis, Local Binary Pattern Histogram, statistical model
Procedia PDF Downloads 3362939 Feature-Based Summarizing and Ranking from Customer Reviews
Authors: Dim En Nyaung, Thin Lai Lai Thein
Abstract:
Due to the rapid increase of Internet, web opinion sources dynamically emerge which is useful for both potential customers and product manufacturers for prediction and decision purposes. These are the user generated contents written in natural languages and are unstructured-free-texts scheme. Therefore, opinion mining techniques become popular to automatically process customer reviews for extracting product features and user opinions expressed over them. Since customer reviews may contain both opinionated and factual sentences, a supervised machine learning technique applies for subjectivity classification to improve the mining performance. In this paper, we dedicate our work is the task of opinion summarization. Therefore, product feature and opinion extraction is critical to opinion summarization, because its effectiveness significantly affects the identification of semantic relationships. The polarity and numeric score of all the features are determined by Senti-WordNet Lexicon. The problem of opinion summarization refers how to relate the opinion words with respect to a certain feature. Probabilistic based model of supervised learning will improve the result that is more flexible and effective.Keywords: opinion mining, opinion summarization, sentiment analysis, text mining
Procedia PDF Downloads 3302938 AI-Based Information System for Hygiene and Safety Management of Shared Kitchens
Authors: Jongtae Rhee, Sangkwon Han, Seungbin Ji, Junhyeong Park, Byeonghun Kim, Taekyung Kim, Byeonghyeon Jeon, Jiwoo Yang
Abstract:
The shared kitchen is a concept that transfers the value of the sharing economy to the kitchen. It is a type of kitchen equipped with cooking facilities that allows multiple companies or chefs to share time and space and use it jointly. These shared kitchens provide economic benefits and convenience, such as reduced investment costs and rent, but also increase the risk of safety management, such as cross-contamination of food ingredients. Therefore, to manage the safety of food ingredients and finished products in a shared kitchen where several entities jointly use the kitchen and handle various types of food ingredients, it is critical to manage followings: the freshness of food ingredients, user hygiene and safety and cross-contamination of cooking equipment and facilities. In this study, it propose a machine learning-based system for hygiene safety and cross-contamination management, which are highly difficult to manage. User clothing management and user access management, which are most relevant to the hygiene and safety of shared kitchens, are solved through machine learning-based methodology, and cutting board usage management, which is most relevant to cross-contamination management, is implemented as an integrated safety management system based on artificial intelligence. First, to prevent cross-contamination of food ingredients, we use images collected through a real-time camera to determine whether the food ingredients match a given cutting board based on a real-time object detection model, YOLO v7. To manage the hygiene of user clothing, we use a camera-based facial recognition model to recognize the user, and real-time object detection model to determine whether a sanitary hat and mask are worn. In addition, to manage access for users qualified to enter the shared kitchen, we utilize machine learning based signature recognition module. By comparing the pairwise distance between the contract signature and the signature at the time of entrance to the shared kitchen, access permission is determined through a pre-trained signature verification model. These machine learning-based safety management tasks are integrated into a single information system, and each result is managed in an integrated database. Through this, users are warned of safety dangers through the tablet PC installed in the shared kitchen, and managers can track the cause of the sanitary and safety accidents. As a result of system integration analysis, real-time safety management services can be continuously provided by artificial intelligence, and machine learning-based methodologies are used for integrated safety management of shared kitchens that allows dynamic contracts among various users. By solving this problem, we were able to secure the feasibility and safety of the shared kitchen business.Keywords: artificial intelligence, food safety, information system, safety management, shared kitchen
Procedia PDF Downloads 662937 RAPDAC: Role Centric Attribute Based Policy Driven Access Control Model
Authors: Jamil Ahmed
Abstract:
Access control models aim to decide whether a user should be denied or granted access to the user‟s requested activity. Various access control models have been established and proposed. The most prominent of these models include role-based, attribute-based, policy based access control models as well as role-centric attribute based access control model. In this paper, a novel access control model is presented called “Role centric Attribute based Policy Driven Access Control (RAPDAC) model”. RAPDAC incorporates the concept of “policy” in the “role centric attribute based access control model”. It leverages the concept of "policy‟ by precisely combining the evaluation of conditions, attributes, permissions and roles in order to allow authorization access. This approach allows capturing the "access control policy‟ of a real time application in a well defined manner. RAPDAC model allows making access decision at much finer granularity as illustrated by the case study of a real time library information system.Keywords: authorization, access control model, role based access control, attribute based access control
Procedia PDF Downloads 1562936 Programming Language Extension Using Structured Query Language for Database Access
Authors: Chapman Eze Nnadozie
Abstract:
Relational databases constitute a very vital tool for the effective management and administration of both personal and organizational data. Data access ranges from a single user database management software to a more complex distributed server system. This paper intends to appraise the use a programming language extension like structured query language (SQL) to establish links to a relational database (Microsoft Access 2013) using Visual C++ 9 programming language environment. The methodology used involves the creation of tables to form a database using Microsoft Access 2013, which is Object Linking and Embedding (OLE) database compliant. The SQL command is used to query the tables in the database for easy extraction of expected records inside the visual C++ environment. The findings of this paper reveal that records can easily be accessed and manipulated to filter exactly what the user wants, such as retrieval of records with specified criteria, updating of records, and deletion of part or the whole records in a table.Keywords: data access, database, database management system, OLE, programming language, records, relational database, software, SQL, table
Procedia PDF Downloads 1852935 Background Check System for Turkish IT Companies
Authors: Arzu Baloglu, Ugur Kaplancali
Abstract:
This paper focuses on Background Check Systems and Pre-Employment Screening. In our study, we attempted to make an online background checking site that will help employers when hiring employees. Our site has two types of users which are free and powered user. Free users are the employees and powered users are the employers which will hire employers. The database of the site will contain all the information about the employees and employers which are registered in the system so the employers can make a search based on their searching criteria to find the suitable employee for the job. The web site also has a comments and points system. The current employer can make comments to his/her employees and can also give them points. The comments will be shown on employee’s profile, so; when an employer searches for an employee he/she can check the points and comments of the employee to see whether he or she is capable of the job or not. The employers can also follow some employees if they desire. This paper has been designed and implemented with using ASP.NET, C# and JavaScript. The outputs have a user friendly interface. The interface also aimed to provide the useful information for Turkish Technology Companies.Keywords: background, checking, verification, human resources, online
Procedia PDF Downloads 1972934 An Efficient and Provably Secure Three-Factor Authentication Scheme with Key Agreement
Authors: Mohan Ramasundaram, Amutha Prabakar Muniyandi
Abstract:
Remote user authentication is one of the important tasks for any kind of remote server applications. Several remote authentication schemes are proposed by the researcher for Telecare Medicine Information System (TMIS). Most of the existing techniques have limitations, vulnerable to various kind attacks, lack of functionalities, information leakage, no perfect forward security and ineffectiveness. Authentication is a process of user verification mechanism for allows him to access the resources of a server. Nowadays, most of the remote authentication protocols are using two-factor authentications. We have made a survey of several remote authentication schemes using three factors and this survey shows that the most of the schemes are inefficient and subject to several attacks. We observed from the experimental evaluation; the proposed scheme is very secure against various known attacks that include replay attack, man-in-the-middle attack. Furthermore, the analysis based on the communication cost and computational cost estimation of the proposed scheme with related schemes shows that our proposed scheme is efficient.Keywords: Telecare Medicine Information System, elliptic curve cryptography, three-factor, biometric, random oracle
Procedia PDF Downloads 2172933 Recovery in Serious Mental Illness: Perception of Health Care Trainees in Morocco
Authors: Sophia El Ouazzani, Amer M. Burhan, Mary Wickenden
Abstract:
Background: Despite improvements in recent years, the Moroccan mental healthcare system still face disparity between available resources and the current population’sneeds. The societal stigma, and limited economic, political, and human resources are all factors in shaping the psychiatric system, exacerbating the discontinuity of services for users after discharged from the hospital. As a result, limited opportunities for social inclusion and meaningful community engagement undermines human rights and recovery potential for people with mental health problems, especially those with psychiatric disabilities from serious mental illness (SMI). Recovery-oriented practice, such as mental health rehabilitation, addresses the complex needs of patients with SMI and support their community inclusion. The cultural acceptability of recovery-oriented practice is an important notion to consider for a successful implementation. Exploring the extent to which recovery-oriented practices are used in Morocco is a necessary first step to assess the cultural relevance of such a practice model. Aims: This study aims to explore understanding and knowledge, perception, and perspective about core concepts in mental health rehabilitation, including psychiatric disability, recovery, and engagement in meaningful occupations for people with SMI in Morocco. Methods: A pilot qualitative study was undertaken. Data was collected via semi-structured interviews and focusgroup discussions with healthcare professional students. Questions were organised around the following themes: 1) students’ perceptions, understanding, and expectations around concepts such as SMI, mental health disability, and recovery, and 2) changes in their views and expectations after starting their professional training. Further analysis of students’ perspectives on the concept of ‘meaningful occupation’ and how is this viewed within the context of the research questions was done. The data was extracted using an inductive thematic analysis approach. This is a pilot stage of a doctoral project, further data will be collected and analysed until saturation is reached. Results: A total of eight students were included in this study which included occupational therapy and mental health nursing students receiving training in Morocco. The following themes emerged as influencing students’ perceptions and views around the main concepts: 1) Stigma and discrimination, 2) Fatalism and low expectations, 3) Gendered perceptions, 4) Religious causation, 5) Family involvement, 6) Professional background, 7) Inaccessibility of services and treatment. Discussion/Contribution: Preliminary analysis of the data suggests that students’ perceptions changed after gaining more clinical experiences and being exposed to people with psychiatric disabilities. Prior to their training, stigma shaped greatly how they viewed people with SMI. The fear, misunderstanding, and shame around SMI and their functional capacities may contribute to people with SMI being stigmatizedand marginalised from their family and their community. Religious causations associated to SMIsare understood as further deepening the social stigma around psychiatric disability. Perceptions are influenced by gender, with women being doubly discriminated against in relation to recovery opportunities. Therapeutic pessimism seems to persist amongst students and within the mental healthcare system in general and regarding the recovery potential and opportunities for people with SMI. The limited resources, fatalism, and stigma all contribute to the low expectations for recovery and community inclusion. Implications and future directions will be discussed.Keywords: disability, mental health rehabilitation, recovery, serious mental illness, transcultural psychiatry
Procedia PDF Downloads 1432932 The Investigation of Women Civil Engineers’ Identity Development through the Lens of Recognition Theory
Authors: Hasan Sungur, Evrim Baran, Benjamin Ahn, Aliye Karabulut Ilgu, Chris Rehmann, Cassandra Rutherford
Abstract:
Engineering identity contributes to the professional and educational persistence of women engineers. A crucial factor contributing to the development of the engineering identity is recognition. Those without adequate recognition often do not succeed in positively building their identities. This research draws on Honneth’s recognition theory to identify factors impacting women civil engineers’ feelings of recognition as civil engineers. A survey was composed and distributed to 330 female alumni who graduated from the Department of Civil, Construction, and Environmental Engineering at Iowa State University in the last ten years. The survey items include demographics, perceptions of the identity of civil engineering, and factors that influence the recognition of civil engineering identities, such as views of society and family. Descriptive analysis of the survey responses revealed that the perceptions of civil engineering varied widely. Participants’ definitions of civil engineering included the terms: construction, design, and infrastructure. Almost half of the participants reported that the major reason to study civil engineering was their interest in the subject matter, and most reported that they were proud to be civil engineers. Many study participants reported that their parents see them as civil engineers. Treatment of institutions and the workplace were also considered as having a significant impact on the recognition of women civil engineers. Almost half of the participants reported that they felt isolated or ignored at work because of their gender. This research emphasizes the importance of recognition for the development of the civil engineering identity of womenKeywords: civil engineering, gender, identity, recognition
Procedia PDF Downloads 2522931 Enhance Security in XML Databases: XLog File for Severity-Aware Trust-Based Access Control
Authors: A: Asmawi, L. S. Affendey, N. I. Udzir, R. Mahmod
Abstract:
The topic of enhancing security in XML databases is important as it includes protecting sensitive data and providing a secure environment to users. In order to improve security and provide dynamic access control for XML databases, we presented XLog file to calculate user trust values by recording users’ bad transaction, errors and query severities. Severity-aware trust-based access control for XML databases manages the access policy depending on users' trust values and prevents unauthorized processes, malicious transactions and insider threats. Privileges are automatically modified and adjusted over time depending on user behaviour and query severity. Logging in database is an important process and is used for recovery and security purposes. In this paper, the Xlog file is presented as a dynamic and temporary log file for XML databases to enhance the level of security.Keywords: XML database, trust-based access control, severity-aware, trust values, log file
Procedia PDF Downloads 2992930 Greener Minds: Understanding Students' Perceptions of Environmental Sustainability in Higher Education, Sultan Qaboos University
Authors: Aisha Alshdefat, Lina Shakman
Abstract:
Objective: With environmental sustainability (ES) emerging as a critical concern due to its global impact, higher education institutions play a vital role in promoting ES through curricula and campus operations. This study examines the perceptions, attitudes, and behaviors related to ES among students at Sultan Qaboos University, aiming to identify areas for improved integration of sustainability practices in higher education. Design: A descriptive cross-sectional survey was conducted with 300 students from Sultan Qaboos University using an online questionnaire as the primary data collection instrument. The survey assessed six key areas: awareness, concern, attitude, willingness to participate, current behaviors, and recommendations for enhancing campus sustainability initiatives. Data was analyzed using SPSS Version 23, employing Pearson’s correlation, chi-square, and Fisher's exact test to explore associations among key variables. Findings: Preliminary analysis reveals that 68% of participants are familiar with core ES concepts, including the Sustainable Development Goals (SDGs), with high levels of concern expressed regarding environmental issues. However, only 47% reported active involvement in campus-led ES initiatives, highlighting an engagement gap. Over 70% of respondents indicated that sustainability should be a university policy priority, and 62% expressed willingness to participate in additional ES-related programs. Despite this interest, 58% advocated for more courses on sustainability within their curriculum, suggesting that current offerings are insufficient. Statistical analysis identified a significant positive correlation between ES awareness levels and willingness to engage in sustainable practices (p < 0.05). These findings emphasize the need for enhanced institutional efforts, including targeted programs and curriculum integration, to foster a more sustainability-focused culture among students. Conclusion: The results underscore that while there is a strong foundational awareness of ES among students, greater institutional support is essential to translate this awareness into actionable engagement. Integrating sustainability more fully into academic programs and campus life could substantially advance students’ involvement and commitment to environmental stewardship.Keywords: environmental sustainability, higher education, students, perceptions, Sultan Qaboos University.
Procedia PDF Downloads 52929 Investigating Classroom Teachers' Perceptions of Assessing U.S. College Students' L2 Chinese Oral Performance
Authors: Guangyan Chen
Abstract:
This study examined Chinese teachers’ perceptions of assessing U.S. college students’ L2 (second language) Chinese oral performances at different levels. Ten oral performances were videotaped from which three were chosen as samples to represent three different proficiency levels based on professionals’ judgments according to the ACTFL proficiency guidelines. The three samples were shown to L2 Chinese teachers who completed questionnaires about their assessments for each speech sample. In total, 104 L2 Chinese teachers responded to each of the three samples. The Exploratory Factor Analyses (EFA) of the teachers’ responses revealed three similar rating criteria patterns for assessing the three levels of oral performances. The teachers’ responses to Samples 2 and 3 revealed five rating criteria: Global proficiency, Chinese conceptual framework, content richness, communication appropriateness, and communication clarity. The teachers’ responses to Sample 1 revealed four rating criteria: global proficiency, Chinese conceptual framework, communication appropriateness/content richness, and communication clarity. However, the analyses of variance (ANOVAs) revealed that the proficiency levels of the three oral performances differed significantly across all rating criteria. Therefore, the data suggests that L2 classroom teachers could use the similar rating criteria pattern to assess college-level L2 Chinese students’ oral performances at different proficiency levels.Keywords: language assessment, L2 Chinese, oral performance, rating criteria
Procedia PDF Downloads 5382928 Human Centred Design Approach for Public Transportation
Authors: Jo Kuys, Kirsten Day
Abstract:
Improving urban transportation systems requires an emphasis on users’ end-to-end journey experience, from the moment the user steps out of their home to when they arrive at their destination. In considering such end-to-end experiences, human centred design (HCD) must be integrated from the very beginning to generate viable outcomes for the public. An HCD approach will encourage innovative outcomes while acknowledging all factors that need to be understood along the journey. We provide evidence to show that when designing for public transportation, it is not just about the physical manifestation of a particular outcome; moreover, it’s about the context and human behaviours that need to be considered throughout the design process. Humans and their behavioural factors are vitally important to successful implementation of sustainable public transport systems. Through an in-depth literature review of HCD approaches for urban transportation systems, we provide a base to exploit the benefits and highlight the importance of including HCD in public transportation projects for greater patronage, resulting in more sustainable cities. An HCD approach is critical to all public transportation projects to understand different levels of transportation design, from the setting of transport policy to implementation to infrastructure, vehicle, and interface design.Keywords: human centred design, public transportation, urban planning, user experience
Procedia PDF Downloads 1862927 Walking the Talk? Thinking and Acting – Teachers' and Practitioners' Perceptions about Physical Activity, Health and Well-Being, Do They 'Walk the Talk' ?
Authors: Kristy Howells, Catherine Meehan
Abstract:
This position paper presents current research findings into the proposed gap between teachers’ and practitioners’ thinking and acting about physical activity health and well-being in childhood. Within the new Primary curriculum, there is a focus on sustained physical activity within a Physical Education and healthy lifestyles in Personal, Health, Social and Emotional lessons, but there is no curriculum guidance about what sustained physical activity is and how it is defined. The current health guidance on birth to five suggests that children should not be inactive for long periods and specify light and energetic activities, however there is the a suggested period of time per day for young children to achieve, but the guidance does not specify how this should be measured. The challenge therefore for teachers and practitioners is their own confidence and understanding of what “good / moderate intensity” physical activity and healthy living looks like for children and the children understanding what they are doing. There is limited research about children from birth to eight years and also the perceptions and attitudes of those who work with this age group of children, however it was found that children at times can identify different levels of activity and it has been found that children can identify healthy foods and good choices for healthy living at a basic level. Authors have also explored teachers’ beliefs about teaching and learning and found that teachers could act in accordance to their beliefs about their subject area only when their subject knowledge, understanding and confidence of that area is high. It has been proposed that confidence and competence of practitioners and teachers to integrate ‘well-being’ within the learning settings has been reported as being low. This may be due to them not having high subject knowledge. It has been suggested that children’s life chances are improved by focusing on well-being in their earliest years. This includes working with parents and families, and being aware of the environmental contexts that may impact on children’s wellbeing. The key is for practitioners and teachers to know how to implement these ideas effectively as these key workers have a profound effect on young children as role models and due to the time of waking hours spent with them. The position paper is part of a longitudinal study at Canterbury Christ Church University and currently we will share the research findings from the initial questionnaire (online, postal, and in person) that explored and evaluated the knowledge, competence and confidence levels of practitioners and teachers as to the structure and planning of sustained physical activity and healthy lifestyles and how this progresses with the children’s age.Keywords: health, perceptions, physical activity, well-being
Procedia PDF Downloads 4012926 Cyber Bullying, Online Risks and Parental Mediation: A Comparison between Adolescent Reports and Parent Perceptions in South Africa
Authors: Masa Popovac, Philip Fine
Abstract:
Information and Communication Technologies (ICTs) have altered our social environments, and young people in particular have immersed themselves in the digital age. Despite countless benefits, younger ICT users are being exposed to various online risks such as contact with strangers, viewing of risky content, sending or receiving sexually themed images or comments (i.e. ‘sexting’) as well as cyber bullying. Parents may not be fully aware of the online spaces their children inhabit and often struggle to implement effective mediation strategies. This quantitative study explored (i) three types of online risks (contact risks, content risks and conduct risks), (ii) cyber bullying victimization and perpetration, and (iii) parental mediation among a sample of 689 South African adolescents aged between 12-17 years. Survey data was also collected for 227 of their parents relating to their perceptions of their child’s online experiences. A comparison between adolescent behaviors and parental perceptions was examined on the three variables in the study. Findings reveal various online risk taking behaviors. In terms of contact risks, 56% of adolescents reported having contact with at least one online stranger, with many meeting these strangers in person. Content risks included exposure to harmful information such as websites promoting extreme diets or self-harm as well as inappropriate content: 84% of adolescents had seen violent content and 75% had seen sexual content online. Almost 60% of adolescents engaged in conduct risks such as sexting. Eight online victimization behaviors were examined in the study and 79% of adolescents had at least one of these negative experiences, with a third (34%) defining this experience as cyber bullying. A strong connection between victimization and perpetration was found, with 63% of adolescents being both a victim and perpetrator. Very little parental mediation of ICT use was reported. Inferential statistics revealed that parents consistently underestimated their child’s online risk taking behaviors as well as their cyber bullying victimization and perpetration. Parents also overestimated mediation strategies in the home. The generational gap in the knowledge and use of ICTs is a barrier to effective parental mediation and online safety, since many negative online experiences by adolescents go undetected and can continue for extended periods of time thereby exacerbating the potential psychological and emotional distress. The study highlights the importance of including parents in online safety efforts.Keywords: cyber bullying, online risk behaviors, parental mediation, South Africa
Procedia PDF Downloads 4792925 A Web-Based Self-Learning Grammar for Spoken Language Understanding
Authors: S. Biondi, V. Catania, R. Di Natale, A. R. Intilisano, D. Panno
Abstract:
One of the major goals of Spoken Dialog Systems (SDS) is to understand what the user utters. In the SDS domain, the Spoken Language Understanding (SLU) Module classifies user utterances by means of a pre-definite conceptual knowledge. The SLU module is able to recognize only the meaning previously included in its knowledge base. Due the vastity of that knowledge, the information storing is a very expensive process. Updating and managing the knowledge base are time-consuming and error-prone processes because of the rapidly growing number of entities like proper nouns and domain-specific nouns. This paper proposes a solution to the problem of Name Entity Recognition (NER) applied to a SDS domain. The proposed solution attempts to automatically recognize the meaning associated with an utterance by using the PANKOW (Pattern based Annotation through Knowledge On the Web) method at runtime. The method being proposed extracts information from the Web to increase the SLU knowledge module and reduces the development effort. In particular, the Google Search Engine is used to extract information from the Facebook social network.Keywords: spoken dialog system, spoken language understanding, web semantic, name entity recognition
Procedia PDF Downloads 337