Search results for: critical information infrastructure
15480 A Comprehensive Framework to Ensure Data Security in Cloud Computing: Analysis, Solutions, and Approaches
Authors: Loh Fu Quan, Fong Zi Heng, Burra Venkata Durga Kumar
Abstract:
Cloud computing has completely transformed the way many businesses operate. Traditionally, confidential data of a business is stored in computers located within the premise of the business. Therefore, a lot of business capital is put towards maintaining computing resources and hiring IT teams to manage them. The advent of cloud computing changes everything. Instead of purchasing and managing their infrastructure, many businesses have started to shift towards working with the cloud with the help of a cloud service provider (CSP), leading to cost savings. However, it also introduces security risks. This research paper focuses on the security risks that arise during data migration and user authentication in cloud computing. To overcome this problem, this paper provides a comprehensive framework that includes Transport Layer Security (TLS), user authentication, security tokens and multi-level data encryption. This framework aims to prevent authorized access to cloud resources and data leakage, ensuring the confidentiality of sensitive information. This framework can be used by cloud service providers to strengthen the security of their cloud and instil confidence in their users.Keywords: Cloud computing, Cloud security, Cloud security issues, Cloud security framework
Procedia PDF Downloads 11915479 An Attempt to Get Communication Design Students to Reflect: A Content Analysis of Students’ Learning Journals
Authors: C. K. Peter Chuah
Abstract:
Essentially, the intention of reflective journal is meant for students to develop higher-order thinking skills and to provide a 'space' to make their learning experience and thinking, making and feeling visible, i.e., it provides students an opportunity to evaluate their learning critically by focusing on the rationale behind their thinking, making and feeling. In addition, reflective journal also gets the students to focus on how could things be done differently—the possibility, alternative point of views, and opportunities for change. It is hoped that by getting communication design students to reflect at various intervals, they could move away from mere working on the design project and pay more attention to what they thought they have learned in relation to the development of their design ability. Unfortunately, a closer examination—through content analysis—of the learning journals submitted by a group of design students revealed that most of the reflections were descriptive and tended to be a summary of what occurred in the learning experience. While many students were able to describe what they did, very few were able to explain how they were able to do something critically. It can be concluded that to get design students to reflect is a fairly easy task, but to get them to reflect critically could be very challenging. To ensure that design students could benefit from the use of reflective journal as a tool to develop their critical thinking skills, a more systematic and structured approach to the introduction of critical thinking and reflective journal should be built into the design curriculum to provide as much practice and sufficient feedback as other studio subjects.Keywords: communication design education, critical thinking, reflection, reflective journal
Procedia PDF Downloads 28615478 The Penetration of Urban Mobility Multi-Modality Enablers in a Vehicle-Dependent City
Authors: Lama Yaseen, Nourah Al-Hosain
Abstract:
A Multi-modal system in urban mobility is an essential framework for an optimized urban transport network. Many cities are still heavily dependent on vehicle transportation, dominantly using conventional fuel-based cars for daily travel. With the reliance on motorized vehicles in large cities such as Riyadh, the capital city of Saudi Arabia, traffic congestion is eminent, which ultimately results in an increase in road emissions and loss of time. Saudi Arabia plans to undergo a massive transformation in mobility infrastructure and urban greening projects, including introducing public transport and other massive urban greening infrastructures that enable alternative mobility options. This paper uses a Geographic Information System (GIS) approach that analyzes the accessibility of current and planned public transport stations and how they intertwine with massive urban greening projects that may play a role as an enabler of micro-mobility and walk-ability options in the city.Keywords: urban development, urban mobility, sustainable mobility, Middle East
Procedia PDF Downloads 9815477 Social and Digital Transformation of the Saudi Education System: A Cyberconflict Analysis
Authors: Mai Alshareef
Abstract:
The Saudi government considers the modernisation of the education system as a critical component of the national development plan, Saudi Vision 2030; however, this sudden reform creates tension amongst Saudis. This study examines first the reflection of the social and digital education reform on stakeholders and the general Saudi public, and second, the influence of information and communication technologies (ICTs) on the ethnoreligious conflict in Saudi Arabia. This study employs Cyberconflict theory to examine conflicts in the real world and cyberspace. The findings are based on a qualitative case study methodology that uses netnography, an analysis of 3,750 Twitter posts and semi-structural interviews with 30 individuals, including key actors in the Saudi education sector and Twitter activists during 2019\2020. The methods utilised are guided by thematic analysis to map an understanding of factors that influence societal conflicts in Saudi Arabia, which in this case include religious, national, and gender identity. Elements of Cyberconflict theory are used to better understand how conflicting groups build their identities in connection to their ethnic/religious/cultural differences and competing national identities. The findings correspond to the ethnoreligious components of the Cyberconflict theory. Twitter became a battleground for liberals, conservatives, the Saudi public and elites, and it is used in a novel way to influence public opinion and to challenge the media monopoly. Opposing groups relied heavily on a discourse of exclusion and inclusion and showed ethnic and religious affiliations, national identity, and chauvinism. The findings add to existing knowledge in the cyberconflict field of study, and they also reveal outcomes that are critical to the Saudi Arabian national context.Keywords: education, cyberconflict, Twitter, national identity
Procedia PDF Downloads 17415476 Probabilistic Slope Stability Analysis of Excavation Induced Landslides Using Hermite Polynomial Chaos
Authors: Schadrack Mwizerwa
Abstract:
The characterization and prediction of landslides are crucial for assessing geological hazards and mitigating risks to infrastructure and communities. This research aims to develop a probabilistic framework for analyzing excavation-induced landslides, which is fundamental for assessing geological hazards and mitigating risks to infrastructure and communities. The study uses Hermite polynomial chaos, a non-stationary random process, to analyze the stability of a slope and characterize the failure probability of a real landslide induced by highway construction excavation. The correlation within the data is captured using the Karhunen-Loève (KL) expansion theory, and the finite element method is used to analyze the slope's stability. The research contributes to the field of landslide characterization by employing advanced random field approaches, providing valuable insights into the complex nature of landslide behavior and the effectiveness of advanced probabilistic models for risk assessment and management. The data collected from the Baiyuzui landslide, induced by highway construction, is used as an illustrative example. The findings highlight the importance of considering the probabilistic nature of landslides and provide valuable insights into the complex behavior of such hazards.Keywords: Hermite polynomial chaos, Karhunen-Loeve, slope stability, probabilistic analysis
Procedia PDF Downloads 7615475 Design of an Air and Land Multi-Element Expression Pattern of Navigation Electronic Map for Ground Vehicles under United Navigation Mechanism
Authors: Rui Liu, Pengyu Cui, Nan Jiang
Abstract:
At present, there is much research on the application of centralized management and cross-integration application of basic geographic information. However, the idea of information integration and sharing between land, sea, and air navigation targets is not deeply applied into the research of navigation information service, especially in the information expression. Targeting at this problem, the paper carries out works about the expression pattern of navigation electronic map for ground vehicles under air and land united navigation mechanism. At first, with the support from multi-source information fusion of GIS vector data, RS data, GPS data, etc., an air and land united information expression pattern is designed aiming at specific navigation task of emergency rescue in the earthquake. And then, the characteristics and specifications of the united expression of air and land navigation information under the constraints of map load are summarized and transferred into expression rules in the rule bank. At last, the related navigation experiment is implemented to evaluate the effect of the expression pattern. The experiment selects evaluation factors of the navigation task accomplishment time and the navigation error rate as the main index, and make comparisons with the traditional single information expression pattern. To sum up, the research improved the theory of navigation electronic map and laid a certain foundation for the design and realization of united navigation system in the aspect of real-time navigation information delivery.Keywords: navigation electronic map, united navigation, multi-element expression pattern, multi-source information fusion
Procedia PDF Downloads 19915474 An Experimental Study on the Influence of Mineral Admixtures on the Fire Resistance of High-Strength Concrete
Authors: Ki-seok Kwon, Dong-woo Ryu, Heung-Youl Kim
Abstract:
Although high-strength concrete has many advantages over generic concrete at normal temperatures (around 20℃), it undergoes spalling at high temperatures, which constitutes its structurally fatal drawback. In this study, fire resistance tests were conducted for 3 hours in accordance with ASTM E119 on bearing wall specimens which were 3,000mm x 3,000mm x 300mm in dimensions to investigate the influence the type of admixtures would exert on the fire resistance performance of high-strength concrete. Portland cement, blast furnace slag, fly ash and silica fume were used as admixtures, among which 2 or 3 components were combined to make 7 types of mixtures. In 56MPa specimens, the severity of spalling was in order of SF5 > F25 > S65SF5 > S50. Specimen S50 where an admixture consisting of 2 components was added did not undergo spalling. In 70MPa specimens, the severity of spalling was in order of SF5 > F25SF5 > S45SF5 and the result was similar to that observed in 56MPa specimens. Acknowledgements— This study was conducted by the support of the project, “Development of performance-based fire safety design of the building and improvement of fire safety” (18AUDP-B100356-04) which is under the management of Korea Agency for Infrastructure Technology Advancement as part of the urban architecture research project for the Ministry of Land, Infrastructure and Transport, for which we extend our deep thanks.Keywords: high strength concrete, mineral admixture, fire resistance, social disaster
Procedia PDF Downloads 14415473 Effect of Removing Hub Domain on Human CaMKII Isoforms Sensitivity to Calcium/Calmodulin
Authors: Ravid Inbar
Abstract:
CaMKII (calcium-calmodulin dependent protein kinase II) makes up 2% of the protein in our brain and has a critical role in memory formation and long-term potentiation of neurons. Despite this, research has yet to uncover the role of one of the domains on the activation of this kinase. The following proposes to express the protein without the hub domain in E. coli, leaving only the kinase and regulatory segment of the protein. Next, a series of kinase assays will be conducted to elucidate the role the hub domain plays on CaMKII sensitivity to calcium/calmodulin activation. The hub domain may be important for activation; however, it may also be a variety of domains working together to influence protein activation and not the hub alone. Characterization of a protein is critical to the future understanding of the protein's function, as well as for producing pharmacological targets in cases of patients with diseases.Keywords: CaMKII, hub domain, kinase assays, kinase + reg seg
Procedia PDF Downloads 8915472 Green Windows of Opportunity in Latin American Countries
Authors: Fabianna Bacil, Zenathan Hasannundin, Clovis Freire
Abstract:
The green transition opens green windows of opportunity – temporary moments in which there are lower barriers and shorter learning periods for developing countries to enter emerging technologies and catch-up. However, taking advantage of these windows requires capabilities in national sectoral systems to adopt and develop technologies linked to green sectors as well as strong responses to build the required knowledge, skills, and infrastructure and foster the growth of targeted sectors. This paper uses UNCTAD’s frontier technology readiness index to analyse the current position of Latin America and the Caribbean to use, adopt, and adapt frontier technologies, examining the preconditions in the region to take up windows of opportunity that arise with the green transition. The index highlights the inequality across countries in the region, as well as gaps in capabilities dimensions, especially in terms of R&D. Moving to responses, it highlights industrial policies implemented to foster the growth of green technologies, emphasising the essential role played by the state to build and strengthen capabilities and provide infant industry protection that enables the growth of these sectors. Overall, while there are exceptions, especially in the Brazilian case, countries in Latin America and the Caribbean should focus on strengthening their capabilities to be better positioned, especially in terms of knowledge creation, infrastructure, and financing availability.Keywords: Green technologies, Industrial policy, Latin America, windows of opportunity
Procedia PDF Downloads 6315471 Exploring the Critical Success Factors of Construction Stakeholders Team Effectiveness
Authors: Olusegun Akinsiku, Olukayode Oyediran, Koleola Odusami
Abstract:
A construction project is usually made up of a variety of stakeholders whose interests may positively or negatively impact on the outcome of the project execution. The variability of project stakeholders is apparent in their cultural differences, professional background and ethics, and differences in ideas. The need for the effectiveness of construction teams has been investigated as this is an important aspect to meeting client’s expectations in the construction industry. This study adopts a cross-sectional descriptive survey with the purpose of identifying the critical success factors (CSFs) associated with the team effectiveness of construction projects stakeholders, their relationship and the effects on construction project performance. The instrument for data collection was a designed questionnaire which was administered to construction professionals in the construction industry in Lagos State, Nigeria using proportionate stratified sampling. The highest ranked identified CSFs include “team trust”, “esprit de corps among members” and “team cohesiveness”. Using factor analysis and considering the effects of team cohesiveness on project performance, the identified CSFs were categorized into three groups namely cognitive attributes, behavior and processes attributes and affective attributes. All the three groups were observed to have a strong correlation with project performance. The findings of this study are useful in helping construction stakeholders benchmark the team effectiveness factors that will guarantee project success.Keywords: construction, critical success factors, performance, stakeholders, team effectiveness
Procedia PDF Downloads 12815470 Parameters Influencing Human Machine Interaction in Hospitals
Authors: Hind Bouami
Abstract:
Handling life-critical systems complexity requires to be equipped with appropriate technology and the right human agents’ functions such as knowledge, experience, and competence in problem’s prevention and solving. Human agents are involved in the management and control of human-machine system’s performance. Documenting human agent’s situation awareness is crucial to support human-machine designers’ decision-making. Knowledge about risks, critical parameters and factors that can impact and threaten automation system’s performance should be collected using preventive and retrospective approaches. This paper aims to document operators’ situation awareness through the analysis of automated organizations’ feedback. The analysis of automated hospital pharmacies feedbacks helps to identify and control critical parameters influencing human machine interaction in order to enhance system’s performance and security. Our human machine system evaluation approach has been deployed in Macon hospital center’s pharmacy which is equipped with automated drug dispensing systems since 2015. Automation’s specifications are related to technical aspects, human-machine interaction, and human aspects. The evaluation of drug delivery automation performance in Macon hospital center has shown that the performance of the automated activity depends on the performance of the automated solution chosen, and also on the control of systemic factors. In fact, 80.95% of automation specification related to the chosen Sinteco’s automated solution is met. The performance of the chosen automated solution is involved in 28.38% of automation specifications performance in Macon hospital center. The remaining systemic parameters involved in automation specifications performance need to be controlled.Keywords: life-critical systems, situation awareness, human-machine interaction, decision-making
Procedia PDF Downloads 18115469 A Tool to Provide Advanced Secure Exchange of Electronic Documents through Europe
Authors: Jesus Carretero, Mario Vasile, Javier Garcia-Blas, Felix Garcia-Carballeira
Abstract:
Supporting cross-border secure and reliable exchange of data and documents and to promote data interoperability is critical for Europe to enhance sector (like eFinance, eJustice and eHealth). This work presents the status and results of the European Project MADE, a Research Project funded by Connecting Europe facility Programme, to provide secure e-invoicing and e-document exchange systems among Europe countries in compliance with the eIDAS Regulation (Regulation EU 910/2014 on electronic identification and trust services). The main goal of MADE is to develop six new AS4 Access Points and SMP in Europe to provide secure document exchanges using the eDelivery DSI (Digital Service Infrastructure) amongst both private and public entities. Moreover, the project demonstrates the feasibility and interest of the solution provided by providing several months of interoperability among the providers of the six partners in different EU countries. To achieve those goals, we have followed a methodology setting first a common background for requirements in the partner countries and the European regulations. Then, the partners have implemented access points in each country, including their service metadata publisher (SMP), to allow the access to their clients to the pan-European network. Finally, we have setup interoperability tests with the other access points of the consortium. The tests will include the use of each entity production-ready Information Systems that process the data to confirm all steps of the data exchange. For the access points, we have chosen AS4 instead of other existing alternatives because it supports multiple payloads, native web services, pulling facilities, lightweight client implementations, modern crypto algorithms, and more authentication types, like username-password and X.509 authentication and SAML authentication. The main contribution of MADE project is to open the path for European companies to use eDelivery services with cross-border exchange of electronic documents following PEPPOL (Pan-European Public Procurement Online) based on the e-SENS AS4 Profile. It also includes the development/integration of new components, integration of new and existing logging and traceability solutions and maintenance tool support for PKI. Moreover, we have found that most companies are still not ready to support those profiles. Thus further efforts will be needed to promote this technology into the companies. The consortium includes the following 9 partners. From them, 2 are research institutions: University Carlos III of Madrid (Coordinator), and Universidad Politecnica de Valencia. The other 7 (EDICOM, BIZbrains, Officient, Aksesspunkt Norge, eConnect, LMT group, Unimaze) are private entities specialized in secure delivery of electronic documents and information integration brokerage in their respective countries. To achieve cross-border operativity, they will include AS4 and SMP services in their platforms according to the EU Core Service Platform. Made project is instrumental to test the feasibility of cross-border documents eDelivery in Europe. If successful, not only einvoices, but many other types of documents will be securely exchanged through Europe. It will be the base to extend the network to the whole Europe. This project has been funded under the Connecting Europe Facility Agreement number: INEA/CEF/ICT/A2016/1278042. Action No: 2016-EU-IA-0063.Keywords: security, e-delivery, e-invoicing, e-delivery, e-document exchange, trust
Procedia PDF Downloads 26515468 Emerging Challenges Related to Digital Pedagogy: A Practitioners’ Case
Authors: Petronella Jonck, Martin Chanza, Anna-Marie Pelser
Abstract:
Ascribed to the global pandemic most higher education institutions responded by relocating content presented by means of contact sessions to an online platform giving rise to digital pedagogy. The purpose of the research reported on was to explore emerging challenges linked to digital pedagogy from a practitioner stance. Digital pedagogy has emerged as a powerful tool to compliment traditional methods. However, stumbling blocks should be identified and addressed for future utilization. A qualitative research design was implemented by means of a semi-structured interview schedule distributed to practitioners during the COVID-19 pandemic. Results revealed that institutional type influenced the implementation of digital pedagogy. Other challenges relate to the increased cost of education, decreased access, limited knowledge about digital pedagogy, behavioral intent to adopt a multi-modal approach, lack of ICT infrastructure to mention a few. Higher education institutions should address challenges towards the optimal use of digital pedagogy in future.Keywords: COVID-19, digital pedagogy, higher education institutions, information communication technology
Procedia PDF Downloads 13015467 Assessment and Analysis of Literary Criticism and Consumer Research
Authors: Mohammad Mirzaei
Abstract:
This article proposes literary criticism as a source of insight into consumer behavior, provides an extensive overview of literary criticism, provides concrete illustrative analysis, and offers suggestions for further research. To do, a literary analysis of advertising copy identifies elements that provide additional information to consumer researchers and discusses the contribution of literary criticism to consumer research. Important post-war critical schools of thought are reviewed, and relevant theoretical concepts are summarized. Ivory Flakes' advertisements are analyzed using a variety of concepts drawn from literary schools, primarily sociocultural and reader responses. Suggestions for further research on content analysis, image analysis, and consumption history are presented.Keywords: consumer behaviour, consumer research, consumption history, criticism
Procedia PDF Downloads 10015466 Adoption of E-Governance: A Case Study of Higher Education Institutes in Pakistan
Authors: Shah Muhammad Butt
Abstract:
The study aimed to investigate the factors influencing the adoption of e-governance in Pakistan's public universities and how that adoption has affected organizational performance. An online Likert scale survey was utilized to gather information from 350 participants from different public universities in Pakistan. The data were examined using descriptive statistics and correlation analysis. The findings suggest that organizational culture, infrastructure, and leadership support are among the elements impacting the adoption of e-governance at Pakistan's public sector universities. A further finding of the study was that e-governance adoption benefited organizational performance, including effectiveness, efficiency, and customer satisfaction. The study emphasizes the significance of e-governance adoption at public sector universities and the demand for successful policies and strategies to support its implementation. To increase organisational performance and raise the standard of higher education in Pakistan, policymakers and university administrators should use the study's findings to develop and practice e-governance policies and initiatives.Keywords: e-governance, adoption, public sector universities, Pakistan, organizational performance, higher education, technology, ICT, factors, comparative analysis
Procedia PDF Downloads 9215465 Economics and Management Information Systems: Institute of Management and Technology Enugu a Case Study
Authors: Cletus Agbowo
Abstract:
Standard principles, rules, regulations, norms and guides are necessities in practice especially in the Economics and management information system Institute of management of and technology (IMT) Enugu a case sturdy as presented by the presenter. Without mincing words, the fundamental bottle neck of management is economics, how to select to engage merger productivity resources to achieve uncountable objectives without tears. Management information system inevitably become bound up in organizational politics because the influence access to a key resource – namely information. Economics and management information can effect who does what to whom, when, where and how in an organization. In great institutions like the Institute of Management and Technology (IMT) Enugu a case study many new information systems require changes in personnel, individual routines that can be painful for those involved and require retraining and additional effort may or may not be compensated. In a nut shell, because management information system potentially change an organization’s structure, culture, business processes, and strategy, there is often considerable resistance to them when they are introduced. The case study have many schools, departments, divisions and units which needs research on economics and management information systems. A system can be defined as a set of interrelated components and / or elements, which reacts with input to produce output. A department in an organization is a system. The researcher is faced to itemize the practical challenges encountered and solution adopted by the Institute Management and Enugu state government.Keywords: economics, information, management, productivity, regulations
Procedia PDF Downloads 38115464 Rethinking Riba in an Agency Theoretic Framework: Islamic Banking and Finance beyond Sophistry
Authors: Muhammad Arsalan
Abstract:
The efficiency of a financial intermediation system is assessed by its ability to achieve allocative efficiency, asset transformation, and the subsequent economic development. Islamic Banking and Finance (IBF) was conceived to serve as an alternate financial intermediation system adherent to the injunctions of Islam. A critical appraisal of the state of contemporary IBF reveals that it neither fulfills the aspirations of Islamic rhetoric nor is efficient in terms of asset transformation and economic development. This paper is an intuitive pursuit to explore the economic rationale of established principles of IBF, and the reasons of the persistent divergence of IBF being accused of ruses and sophistry. Disentangling the varying viewpoints, the underdevelopment of IBF has been attributed to misinterpretation of Riba, which has been explicated through a narrow fiqhi and legally deterministic approach. It presents a critical account of how incorrect conceptualization of the key injunction on Riba, steered flawed institutionalization of an Islamic Financial intermediation system. It also emphasizes on the wrong interpretation of the ontological and epistemological sources of Islamic Law (primarily Riba), that explains the perennial economic underdevelopment of the Muslim world. Deeming ‘a collaborative and dynamic Ijtihad’ as the elixir, this paper insists on the exigency of redefining Riba, i.e., a definition that incorporates the modern modes of economic cooperation and the contemporary financial intermediation ecosystem. Finally, Riba has been articulated in an agency theoretic framework to eschew expropriation of wealth, and assure protection of property rights, aimed at realizing the twin goals of a) Shari’ah adherence in true spirit, b) financial and economic development of the Muslim world.Keywords: agency theory, financial intermediation, Islamic banking and finance, ijtihad, economic development, Riba, information asymmetry
Procedia PDF Downloads 13915463 Design of Knowledge Management System with Geographic Information System
Authors: Angga Hidayah Ramadhan, Luciana Andrawina, M. Azani Hasibuan
Abstract:
Data will be as a core of the decision if it has a good treatment or process, which is process that data into information, and information into knowledge to make a wisdom or decision. Today, many companies have not realize it include XYZ University Admission Directorate as executor of National Admission called Seleksi Masuk Bersama (SMB) that during the time, the workers only uses their feeling to make a decision. Whereas if it done, then that company can analyze the data to make a right decision to get a pin sales from student candidate or registrant that follow SMB as many as possible. Therefore, needs Knowledge Management System (KMS) with Geographic Information System (GIS) use 5C4C that can process that company data becomes more useful and can help make decisions. This information system can process data into information based on the pin sold data with 5C (Contextualized, Categorize, Calculation, Correction, Condensed) and convert information into knowledge with 4C (Comparing, Consequence, Connection, Conversation) that has been several steps until these data can be useful to make easier to take a decision or wisdom, resolve problems, communicate, and quicker to learn to the employees have not experience and also for ease of viewing/visualization based on spatial data that equipped with GIS functionality that can be used to indicate events in each province with indicator that facilitate in this system. The system also have a function to save the tacit on the system then to be proceed into explicit in expert system based on the problems that will be found from the consequences of information. With the system each team can make a decision with same ways, structured, and the important is based on the actual event/data.Keywords: 5C4C, data, information, knowledge
Procedia PDF Downloads 46115462 Monitoring and Evaluation of the Distributed Agricultural Machinery of the Department of Agriculture Using a Web-Based Information System with a Short Messaging Service Technology
Authors: Jimmy L. Caldoza, Erlito M. Albina
Abstract:
Information Systems are increasingly being used to monitor and assess government projects as well as improve transparency and combat corruption. With reference to existing information systems relevant to monitoring and evaluation systems adopted by various government agencies from other countries, this research paper aims to help the Philippine government, particularly the Department of Agriculture, in assessing the impact of their programs and projects on their target beneficiaries through the development of the web-based Monitoring and Evaluation Information System with the application of a short messaging system (sms) technology.Keywords: monitoring and evaluation system, web-based information system, short messaging system technology, database structure and management
Procedia PDF Downloads 14715461 Kosovar Teachers' Understanding of Literacy Education
Authors: Anemonë Zeneli
Abstract:
Classrooms composed of students with varied linguistic repertoires, in combination with new technologies, have shifted what it means to be literate and how literacy is taught. At the same time, definitions of literacy matter greatly as they shape literacy education curricula, national literacy agendas, and pedagogical choices. Grounded in the theoretical frameworks of New Literacy Studies and Critical Literacy, this research investigates how Kosovar teachers make sense of literacy. The study employed a qualitative research design involving classroom observations, teacher interviews, and document analysis in a public school in the capital city of Kosovo, Prishtina. Data was collected from 5 Albanian language teachers. Classroom observations allowed for the documentation of how teachers applied literacy and language pedagogies to their teaching. Teacher interviews provided insights into teachers’ understanding of literacy education and the rationale behind their chosen pedagogies. Document analysis, more specifically, lesson plan analysis, further explained teachers’ content and instructional choices. The findings suggest that teachers understand literacy as standardized language instruction. They spoke to the challenges of language instruction in standardized Albanian in a Gheg (dialect) dominant society. Teachers’ narratives described the tension that students face in navigating standardized language expectations while being unable to use their home (Gheg) literacies. Teachers’ narratives were imbued with moral contestation as they explained the lack of an infrastructure that allows students to apply their home language and literacies in the classroom. Furthermore, teachers expressed their insistence on teaching “the words of the book.” While this viewpoint on language and literacy is generally aligned with normative and colonial expectations on language, at the same time, it reveals teachers’ intention to ‘equip’ their students with skills and practices that they will be tested on. Some of the teachers also articulated the need for a pedagogy of correction that the work of upholding the standardized language variation necessitates. Here, teachers also utilized discourses of neoliberalism when discussing students’ English repertoire and its value in “opening doors” and advancement opportunities in life while further framing students’ home literacies, the Gheg dialect, in a deficit manner. If educators and policymakers are to make informed decisions about efforts to improve schools, it is important to improve our knowledge of what informs teachers’ pedagogical choices in teaching literacy. This study contributes to and expands the current knowledge base on teachers’ understanding of literacy education and their role in shaping literacy education. As schools continue to navigate (growing) diverse forms of literacy, this study highlights the importance of equipping educators with the knowledge and tools to apply literacy pedagogies that reflect the ever-shifting definitions of literacy education.Keywords: literacy education, standardized language, critical narrative analysis, literacy teaching
Procedia PDF Downloads 1815460 Radiology Information System’s Mechanisms: HL7-MHS & HL7/DICOM Translation
Authors: Kulwinder Singh Mann
Abstract:
The innovative features of information system, known as Radiology Information System (RIS), for electronic medical records has shown a good impact in the hospital. The objective is to help and make their work easier; such as for a physician to access the patient’s data and for a patient to check their bill transparently. The interoperability of RIS with the other intra-hospital information systems it interacts with, dealing with the compatibility and open architecture issues, are accomplished by two novel mechanisms. The first one is the particular message handling system that is applied for the exchange of information, according to the Health Level Seven (HL7) protocol’s specifications and serves the transfer of medical and administrative data among the RIS applications and data store unit. The second one implements the translation of information between the formats that HL7 and Digital Imaging and Communication in Medicine (DICOM) protocols specify, providing the communication between RIS and Picture and Archive Communication System (PACS) which is used for the increasing incorporation of modern medical imaging equipment.Keywords: RIS, PACS, HIS, HL7, DICOM, messaging service, interoperability, digital images
Procedia PDF Downloads 30015459 The Politics of Land Grabbing in Ethiopia
Authors: Esayas Geleta
Abstract:
Within the last two decades in many sub-Saharan African countries, a large-scale acquisition (lease, concession, outright purchase) of extensive areas of farmland commonly labeled as ‘idle’ and ‘under-utilized’ has resulted in displacement and dispossession and dispossession without ‘compensation.’ This paper seeks to critically illustrate the processes and the consequences of the ‘land grabbing project’ in Ethiopia. Drawing on the theory of participatory development and empirical studies undertaken in Ethiopia, the paper elucidates the power dynamics that influence how and why dislocation and dispossession occur. The paper then demonstrates why the land-grabbing project, which was hugely supported by many international organizations, has largely failed in Ethiopia. Through a critical analysis of the process of ‘land grabbing’ in Ethiopia, the paper contributes to a more adequate and critical understanding of contemporary land deals and their social and environmental consequences.Keywords: land grabbing, human rights, dispossession, resistance, governance
Procedia PDF Downloads 8315458 Integrating Critical Stylistics and Visual Grammar: A Multimodal Stylistic Approach to the Analysis of Non-Literary Texts
Authors: Shatha Khuzaee
Abstract:
The study develops multimodal stylistic approach to analyse a number of BBC online news articles reporting some key events from the so called ‘Arab Uprisings’. Critical stylistics (CS) and visual grammar (VG) provide insightful arguments to the ways ideology is projected through different verbal and visual modes, yet they are mode specific because they examine how each mode projects its meaning separately and do not attempt to clarify what happens intersemiotically when the two modes co-occur. Therefore, it is the task undertaken in this research to propose multimodal stylistic approach that addresses the issue of ideology construction when the two modes co-occur. Informed by functional grammar and social semiotics, the analysis attempts to integrate three linguistic models developed in critical stylistics, namely, transitivity choices, prioritizing and hypothesizing along with their visual equivalents adopted from visual grammar to investigate the way ideology is constructed, in multimodal text, when text/image participate and interrelate in the process of meaning making on the textual level of analysis. The analysis provides comprehensive theoretical and analytical elaborations on the different points of integration between CS linguistic models and VG equivalents which operate on the textual level of analysis to better account for ideology construction in news as non-literary multimodal texts. It is argued that the analysis well thought out a plan that would remark the first step towards the integration between the well-established linguistic models of critical stylistics and that of visual analysis to analyse multimodal texts on the textual level. Both approaches are compatible to produce multimodal stylistic approach because they intend to analyse text and image depending on whatever textual evidence is available. This supports the analysis maintain the rigor and replicability needed for a stylistic analysis like the one undertaken in this study.Keywords: multimodality, stylistics, visual grammar, social semiotics, functional grammar
Procedia PDF Downloads 22015457 Enabling UDP Multicast in Cloud IaaS: An Enterprise Use Case
Authors: Patrick J. Kerpan, Ryan C. Koop, Margaret M. Walker, Chris P. Swan
Abstract:
The User Datagram Protocol (UDP) multicast is a vital part of data center networking that is being left out of major cloud computing providers' network infrastructure. Enterprise users rely on multicast, and particularly UDP multicast to create and connect vital business operations. For example, UPD makes a variety of business functions possible from simultaneous content media updates, High-Performance Computing (HPC) grids, and video call routing for massive open online courses (MOOCs). Essentially, UDP multicast's technological slight is causing a huge effect on whether companies choose to use (or not to use) public cloud infrastructure as a service (IaaS). Allowing the ‘chatty’ UDP multicast protocol inside a cloud network could have a serious impact on the performance of the cloud as a whole. Cloud IaaS providers solve the issue by disallowing all UDP multicast. But what about enterprise use cases for multicast applications in organizations that want to move to the cloud? To re-allow multicast traffic, enterprises can build a layer 3 - 7 network over the top of a data center, private cloud, or public cloud. An overlay network simply creates a private, sealed network on top of the existing network. Overlays give complete control of the network back to enterprise cloud users the freedom to manage their network beyond the control of the cloud provider’s firewall conditions. The same logic applies if for users who wish to use IPsec or BGP network protocols inside or connected into an overlay network in cloud IaaS.Keywords: cloud computing, protocols, UDP multicast, virtualization
Procedia PDF Downloads 59015456 The Provisional National Defense Council cum National Democratic Congress Government and Tourism Development in Ghana: A Reflection
Authors: Yobo Opare-Addo
Abstract:
Ghana came under a military and democratic rule of the same leadership from 1981-2000. These were the Provisional National Defense Council (PNDC), a military government and a democratic government, the National Democratic Congress (NDC) both under the leadership of Flt. Lt. J.J. Rawlings. Meanwhile the year 1985 marked a turning point in the development of the tourism industry in Ghana. Interest in tourism among African governments and for that matter the ‘PNDC cum NDC Government’ (PNDC/NDC) arose because of adverse developments in intangible exports and a corresponding decline in commodity export earnings. The ‘PNDC/NDC Government’ undertook measures and policies to improve the tourism industry and at the same time embarked on export diversification to reap the foreign exchange that the industry could generate in Ghana. The objective of this paper is to examine the measures and policies of the PNDC/NDC to improve the tourism industry in order to reap the foreign exchange. It specifically interrogates the role of the government as an agent of tourism development, through its deliberate creation of a conducive environment for tourism to flourish, the involvement of the private sector both foreign and local and the provision of tourism facilities and infrastructure and how these factors impacted on the tourism industry in Ghana. In the final analysis it evaluates the degree of success of the PNDC/NDC Government in this arena of Ghana’s socio-cultural and economic development. Introduction The Provisional National Defense Council (PNDC), a military government under the leadership of Flt. Lt J.J. Rawlings overthrew a constitutionally elected government of People’s National Party in 1981. In 1992, the National Democratic Congress (NDC) won the general election conducted in December. Flt. Lt. J.J. Rawlings, the party’s leader became the President of the Fourth Republic from January 1993 to December 2000. It was refreshing to see Ghanaians embrace democracy with renewed energy, zeal, and enthusiasm. This paper takes a critical look at the efforts of the PNDC cum NDC Government (PNDC/NDC) to develop tourism in Ghana during the period from 1981-2000 Methodology: Qualitative method of research was adopted for the study. Data was collected from both primary and secondary sources, and analysis was done using descriptive analysis because descriptive analysis made it possible to describe or summarize the statistical data in the research. To gather data from primary sources, questionnaires, oral interviews, and semi-structured discussions were conducted. Respondents included public officials from Ghana Tourist Board, Ministry of Tourism, Hoteliers, restaurant operators and travel and tour operators in Accra. Secondary data sources included articles in journals, reports, magazines, bulletins, and books. The major findings included statistical data for tourism arrivals and receipts during the period and the status of the industry by the year 2000. Conclusion: The paper contributes to knowledge on political and historical aspects of tourism development in Ghana, which is almost non-existent, attitudes of the PNDC cum NDC government towards tourism development and the debates on the generation of foreign exchange to Ghana and third world countries.Keywords: ghana, infrastructure, policies, privatization, tourism facilities
Procedia PDF Downloads 8515455 VANETs: Security Challenges and Future Directions
Authors: Jared Oluoch
Abstract:
Connected vehicles are equipped with wireless sensors that aid in Vehicle to Vehicle (V2V) and Vehicle to Infrastructure (V2I) communication. These vehicles will in the near future provide road safety, improve transport efficiency, and reduce traffic congestion. One of the challenges for connected vehicles is how to ensure that information sent across the network is secure. If security of the network is not guaranteed, several attacks can occur, thereby compromising the robustness, reliability, and efficiency of the network. This paper discusses existing security mechanisms and unique properties of connected vehicles. The methodology employed in this work is exploratory. The paper reviews existing security solutions for connected vehicles. More concretely, it discusses various cryptographic mechanisms available, and suggests areas of improvement. The study proposes a combination of symmetric key encryption and public key cryptography to improve security. The study further proposes message aggregation as a technique to overcome message redundancy. This paper offers a comprehensive overview of connected vehicles technology, its applications, its security mechanisms, open challenges, and potential areas of future research.Keywords: VANET, connected vehicles, 802.11p, WAVE, DSRC, trust, security, cryptography
Procedia PDF Downloads 31215454 Sfard’s Commognitive Framework as a Method of Discourse Analysis in Mathematics
Authors: Dong-Joong Kim, Sangho Choi, Woong Lim
Abstract:
This paper discusses Sfard’s commognitive approach and provides an empirical study as an example to illustrate the theory as method. Traditionally, research in mathematics education focused on the acquisition of mathematical knowledge and the didactic process of knowledge transfer. Through attending to a distinctive form of language in mathematics, as well as mathematics as a discursive subject, alternative views of making meaning in mathematics have emerged; these views are therefore “critical,” as in critical discourse analysis. The commognitive discourse analysis method has the potential to bring more clarity to our understanding of students’ mathematical thinking and the process through which students are socialized into school mathematics.Keywords: commognitive framework, discourse analysis, mathematical discourse, mathematics education
Procedia PDF Downloads 33315453 Groundwater Level Modelling by ARMA and PARMA Models (Case Study: Qorveh Aquifer)
Authors: Motalleb Byzedi, Seyedeh Chaman Naderi Korvandan
Abstract:
Regarding annual statistics of groundwater level resources about current piezometers at Qorveh plains, both ARMA & PARMA modeling methods were applied in this study by the using of SAMS software. Upon performing required tests, a model was used with minimum amount of Akaike information criteria and suitable model was selected for piezometers. Then it was possible to make necessary estimations by using these models for future fluctuations in each piezometer. According to the results, ARMA model had more facilities for modeling of aquifer. Also it was cleared that eastern parts of aquifer had more failures than other parts. Therefore it is necessary to prohibit critical parts along with more supervision on taking rates of wells.Keywords: qorveh plain, groundwater level, ARMA, PARMA
Procedia PDF Downloads 28615452 Merging Appeal to Ignorance, Composition, and Division Argument Schemes with Bayesian Networks
Authors: Kong Ngai Pei
Abstract:
The argument scheme approach to argumentation has two components. One is to identify the recurrent patterns of inferences used in everyday discourse. The second is to devise critical questions to evaluate the inferences in these patterns. Although this approach is intuitive and contains many insightful ideas, it has been noted to be not free of problems. One is that due to its disavowing the probability calculus, it cannot give the exact strength of an inference. In order to tackle this problem, thereby paving the way to a more complete normative account of argument strength, it has been proposed, the most promising way is to combine the scheme-based approach with Bayesian networks (BNs). This paper pursues this line of thought, attempting to combine three common schemes, Appeal to Ignorance, Composition, and Division, with BNs. In the first part, it is argued that most (if not all) formulations of the critical questions corresponding to these schemes in the current argumentation literature are incomplete and not very informative. To remedy these flaws, more thorough and precise formulations of these questions are provided. In the second part, how to use graphical idioms (e.g. measurement and synthesis idioms) to translate the schemes as well as their corresponding critical questions to graphical structure of BNs, and how to define probability tables of the nodes using functions of various sorts are shown. In the final part, it is argued that many misuses of these schemes, traditionally called fallacies with the same names as the schemes, can indeed be adequately accounted for by the BN models proposed in this paper.Keywords: appeal to ignorance, argument schemes, Bayesian networks, composition, division
Procedia PDF Downloads 28615451 Intrusion Detection in Cloud Computing Using Machine Learning
Authors: Faiza Babur Khan, Sohail Asghar
Abstract:
With an emergence of distributed environment, cloud computing is proving to be the most stimulating computing paradigm shift in computer technology, resulting in spectacular expansion in IT industry. Many companies have augmented their technical infrastructure by adopting cloud resource sharing architecture. Cloud computing has opened doors to unlimited opportunities from application to platform availability, expandable storage and provision of computing environment. However, from a security viewpoint, an added risk level is introduced from clouds, weakening the protection mechanisms, and hardening the availability of privacy, data security and on demand service. Issues of trust, confidentiality, and integrity are elevated due to multitenant resource sharing architecture of cloud. Trust or reliability of cloud refers to its capability of providing the needed services precisely and unfailingly. Confidentiality is the ability of the architecture to ensure authorization of the relevant party to access its private data. It also guarantees integrity to protect the data from being fabricated by an unauthorized user. So in order to assure provision of secured cloud, a roadmap or model is obligatory to analyze a security problem, design mitigation strategies, and evaluate solutions. The aim of the paper is twofold; first to enlighten the factors which make cloud security critical along with alleviation strategies and secondly to propose an intrusion detection model that identifies the attackers in a preventive way using machine learning Random Forest classifier with an accuracy of 99.8%. This model uses less number of features. A comparison with other classifiers is also presented.Keywords: cloud security, threats, machine learning, random forest, classification
Procedia PDF Downloads 320