Search results for: NFC data exchange format
25173 Exploring the Use of Universal Design for Learning to Support The Deaf Learners in Lesotho Secondary Schools: English Teachers Voice
Authors: Ntloyalefu Justinah, Fumane Khanare
Abstract:
English learning has been found as one of the prevalent areas of difficulty for Deaf learners. However, studies conducted indicated that this challenge experienced by Deaf learners is an upsetting concern globally as is blamed and hampered by various reasons such as the way English is taught at schools, lack of teachers ' skills and knowledge, therefore, impact negatively on their academic performance. Despite any difficulty in English learning, this language is considered nowadays as the key tool to an educational and occupational career especially in Lesotho. This paper, therefore, intends to contribute to the existing literature by providing the views of Lesotho English teachers, which focuses on how effectively Universal design for learning can be implemented to enhance the academic performance of Deaf learners in context of the English language classroom. The purpose of this study sought to explore the use of universal design for learning (UDL) to support Deaf learners in Lesotho Secondary schools. The present study is informed by interpretative paradigm and situated within a qualitative research approach. Ten participating English teachers from two inclusive schools were purposefully selected and telephonically interviewed to generate data for this study. The data were thematically analysed. The findings indicated that even though UDL is identified as highly proficient and promotes flexibility in teaching methods teachers reflect limited knowledge of the UDL approach. The findings further showed that UDL ensures education for all learners, including marginalised groups, such as learners with disabilities through different teaching strategies. This means that the findings signify the effective use of UDL for the better performance of the English language by Deaf learners (DLs). This aligns with literature that shows mobilizing English teachers as assets help DLs to be engaged and have control in their communities by defining and solving problems using their resources and connections to other networks for asset and exchange. The study, therefore, concludes that teachers acknowledge that even though they assume to be knowledgeable about the definition of UDL, they have a limited practice of the approach, thus they need to be equipped with some techniques and skills to apply for supporting the performance of DLs by using UDL approach in their English teaching. The researchers recommend the awareness of UDL principles by the ministry of Education and Training and teachers training Universities, as well as teachers training colleges, for them to include it in their curricula so that teachers could be properly trained on how to apply it in their teaching effectivelyKeywords: deaf learners, Lesotho, support learning, universal design for learning
Procedia PDF Downloads 11325172 The Effect That the Data Assimilation of Qinghai-Tibet Plateau Has on a Precipitation Forecast
Authors: Ruixia Liu
Abstract:
Qinghai-Tibet Plateau has an important influence on the precipitation of its lower reaches. Data from remote sensing has itself advantage and numerical prediction model which assimilates RS data will be better than other. We got the assimilation data of MHS and terrestrial and sounding from GSI, and introduced the result into WRF, then got the result of RH and precipitation forecast. We found that assimilating MHS and terrestrial and sounding made the forecast on precipitation, area and the center of the precipitation more accurate by comparing the result of 1h,6h,12h, and 24h. Analyzing the difference of the initial field, we knew that the data assimilating about Qinghai-Tibet Plateau influence its lower reaches forecast by affecting on initial temperature and RH.Keywords: Qinghai-Tibet Plateau, precipitation, data assimilation, GSI
Procedia PDF Downloads 23425171 Positive Affect, Negative Affect, Organizational and Motivational Factor on the Acceptance of Big Data Technologies
Authors: Sook Ching Yee, Angela Siew Hoong Lee
Abstract:
Big data technologies have become a trend to exploit business opportunities and provide valuable business insights through the analysis of big data. However, there are still many organizations that have yet to adopt big data technologies especially small and medium organizations (SME). This study uses the technology acceptance model (TAM) to look into several constructs in the TAM and other additional constructs which are positive affect, negative affect, organizational factor and motivational factor. The conceptual model proposed in the study will be tested on the relationship and influence of positive affect, negative affect, organizational factor and motivational factor towards the intention to use big data technologies to produce an outcome. Empirical research is used in this study by conducting a survey to collect data.Keywords: big data technologies, motivational factor, negative affect, organizational factor, positive affect, technology acceptance model (TAM)
Procedia PDF Downloads 36225170 Big Data Analysis with Rhipe
Authors: Byung Ho Jung, Ji Eun Shin, Dong Hoon Lim
Abstract:
Rhipe that integrates R and Hadoop environment made it possible to process and analyze massive amounts of data using a distributed processing environment. In this paper, we implemented multiple regression analysis using Rhipe with various data sizes of actual data. Experimental results for comparing the performance of our Rhipe with stats and biglm packages available on bigmemory, showed that our Rhipe was more fast than other packages owing to paralleling processing with increasing the number of map tasks as the size of data increases. We also compared the computing speeds of pseudo-distributed and fully-distributed modes for configuring Hadoop cluster. The results showed that fully-distributed mode was faster than pseudo-distributed mode, and computing speeds of fully-distributed mode were faster as the number of data nodes increases.Keywords: big data, Hadoop, Parallel regression analysis, R, Rhipe
Procedia PDF Downloads 49725169 Security in Resource Constraints Network Light Weight Encryption for Z-MAC
Authors: Mona Almansoori, Ahmed Mustafa, Ahmad Elshamy
Abstract:
Wireless sensor network was formed by a combination of nodes, systematically it transmitting the data to their base stations, this transmission data can be easily compromised if the limited processing power and the data consistency from these nodes are kept in mind; there is always a discussion to address the secure data transfer or transmission in actual time. This will present a mechanism to securely transmit the data over a chain of sensor nodes without compromising the throughput of the network by utilizing available battery resources available in the sensor node. Our methodology takes many different advantages of Z-MAC protocol for its efficiency, and it provides a unique key by sharing the mechanism using neighbor node MAC address. We present a light weighted data integrity layer which is embedded in the Z-MAC protocol to prove that our protocol performs well than Z-MAC when we introduce the different attack scenarios.Keywords: hybrid MAC protocol, data integrity, lightweight encryption, neighbor based key sharing, sensor node dataprocessing, Z-MAC
Procedia PDF Downloads 14425168 Modeling of Physico-Chemical Characteristics of Concrete for Filling Trenches in Radioactive Waste Management
Authors: Ilija Plecas, Dalibor Arbutina
Abstract:
The leaching rate of 60Co from spent mix bead (anion and cation) exchange resins in a cement-bentonite matrix has been studied. Transport phenomena involved in the leaching of a radioactive material from a cement-bentonite matrix are investigated using three methods based on theoretical equations. These are: the diffusion equation for a plane source, an equation for diffusion coupled to a first order equation and an empirical method employing a polynomial equation. The results presented in this paper are from a 25-year mortar and concrete testing project that will influence the design choices for radioactive waste packaging for a future Serbian radioactive waste disposal center.Keywords: cement, concrete, immobilization, leaching, permeability, radioactivity, waste
Procedia PDF Downloads 32325167 Corporate Social Responsibility, Earnings, and Tax Avoidance: Evidence from Indonesia
Authors: Cahyaningsih Cahyaningsih, Fu'ad Rakhman
Abstract:
This study examines empirically the association between corporate social responsibility (CSR) and tax avoidance. This study also investigates the effect of earnings on the relation between CSR and tax avoidance. Effective tax rate (ETR) and cash effective tax rate (CETR) were used to measure tax avoidance. Corporate social responsibility fund (CSRF) and corporate social responsibility disclosure (CSRD) were used as proxies for CSR. Test was conducted for public firms which were listed in the Indonesia Stock Exchange during the period of 2011-2014. Based on slack resource theory, this study finds that the relation between CSR and tax avoidance is moderated by earnings.Keywords: corporate social responsibility disclosure, corporate social responsibility fund, earnings, tax avoidance
Procedia PDF Downloads 27925166 Lexico-semantic and Morphosyntactic Analyses of Student-generated Paraphrased Academic Texts
Authors: Hazel P. Atilano
Abstract:
In this age of AI-assisted teaching and learning, there seems to be a dearth of research literature on the linguistic analysis of English as a Second Language (ESL) student-generated paraphrased academic texts. This study sought to examine the lexico-semantic, morphosyntactic features of paraphrased academic texts generated by ESL students. Employing a descriptive qualitative design, specifically linguistic analysis, the study involved a total of 85 students from senior high school, college, and graduate school enrolled in research courses. Data collection consisted of a 60-minute real-time, on-site paraphrasing practice exercise using excerpts from discipline-specific literature reviews of 150 to 200 words. A focus group discussion (FGD) was conducted to probe into the challenges experienced by the participants. The writing exercise yielded a total of 516 paraphrase pairs. A total of 176 paraphrase units (PUs) and 340 non-paraphrase pairs (NPPs) were detected. Findings from the linguistic analysis of PUs reveal that the modifications made to the original texts are predominantly syntax-based (Diathesis Alterations and Coordination Changes) and a combination of Miscellaneous Changes (Change of Order, Change of Format, and Addition/Deletion). Results of the analysis of paraphrase extremes (PE) show that Identical Structures resulting from the use of synonymous substitutions, with no significant change in the structural features of the original, is the most frequently occurring instance of PE. The analysis of paraphrase errors reveals that synonymous substitutions resulting in identical structures are the most frequently occurring error that leads to PE. Another type of paraphrasing error involves semantic and content loss resulting from the deletion or addition of meaning-altering content. Three major themes emerged from the FGD: (1) The Challenge of Preserving Semantic Content and Fidelity; (2) The Best Words in the Best Order: Grappling with the Lexico-semantic and Morphosyntactic Demands of Paraphrasing; and (3) Contending with Limited Vocabulary, Poor Comprehension, and Lack of Practice. A pedagogical paradigm was designed based on the major findings of the study for a sustainable instructional intervention.Keywords: academic text, lexico-semantic analysis, linguistic analysis, morphosyntactic analysis, paraphrasing
Procedia PDF Downloads 6725165 Survival Data with Incomplete Missing Categorical Covariates
Authors: Madaki Umar Yusuf, Mohd Rizam B. Abubakar
Abstract:
The survival censored data with incomplete covariate data is a common occurrence in many studies in which the outcome is survival time. With model when the missing covariates are categorical, a useful technique for obtaining parameter estimates is the EM by the method of weights. The survival outcome for the class of generalized linear model is applied and this method requires the estimation of the parameters of the distribution of the covariates. In this paper, we propose some clinical trials with ve covariates, four of which have some missing values which clearly show that they were fully censored data.Keywords: EM algorithm, incomplete categorical covariates, ignorable missing data, missing at random (MAR), Weibull Distribution
Procedia PDF Downloads 40525164 A Study of Blockchain Oracles
Authors: Abdeljalil Beniiche
Abstract:
The limitation with smart contracts is that they cannot access external data that might be required to control the execution of business logic. Oracles can be used to provide external data to smart contracts. An oracle is an interface that delivers data from external data outside the blockchain to a smart contract to consume. Oracle can deliver different types of data depending on the industry and requirements. In this paper, we study and describe the widely used blockchain oracles. Then, we elaborate on his potential role, technical architecture, and design patterns. Finally, we discuss the human oracle and its key role in solving the truth problem by reaching a consensus about a certain inquiry and tasks.Keywords: blockchain, oracles, oracles design, human oracles
Procedia PDF Downloads 13625163 Perspectives of Pre-service Teachers on Vocational Pedagogy in Technical and Vocational Education and Training Teaching
Authors: Siphokazi Vimbelo
Abstract:
Abstract - TVET colleges were established to equip students with the necessary skills for careers in a variety of fields such as business, tourism, engineering, and hospitality. TVET teachers are responsible for preparing students and for ensuring that students acquire these necessary skills. This calls for the pedagogies currently utilized in the TVET classroom. Occupational programmes that are being introduced in TVET colleges in South Africa will necessitate vocational pedagogy, which focuses on how individuals learn effectively in skill-oriented knowledge areas. Furthermore, limited research exists on the obstacles encountered by pre-service TVET educators as they develop vocational pedagogy-based lessons. Hence, this research will specifically examine the difficulties encountered by pre-service teachers in creating lesson plans rooted in vocational teaching methods. The preservice teachers are the students in the first year of the Advanced Diploma in Technical and Vocational Teaching (ADTVT). After brainstorming vocational pedagogy, the preservice teachers will develop lessons rooted in vocational pedagogy. Following that, the preservice teachers will participate in interviews to reflect on their lesson preparation process and discuss the challenges they encountered during the preparation. Thematic analysis will be used to analyse the data. It would be fascinating to discover the obstacles and exchange thoughts with academics from other Higher Education Institutions (HEIs) that also provide the same course, since it is a new program. Furthermore, the results will assist Cape Peninsula University of Technology (CPUT) academics in partnering with other academics to create various strategies for tackling challenges and determining priorities in implementing vocational education for a new student population.Keywords: preservice teachers, TVET, TVET teaching, vocational pedagogy
Procedia PDF Downloads 7225162 The Effectiveness of Blended Learning in Pre-Registration Nurse Education: A Mixed Methods Systematic Review and Met Analysis
Authors: Albert Amagyei, Julia Carroll, Amanda R. Amorim Adegboye, Laura Strumidlo, Rosie Kneafsey
Abstract:
Introduction: Classroom-based learning has persisted as the mainstream model of pre-registration nurse education. This model is often rigid, teacher-centered, and unable to support active learning and the practical learning needs of nursing students. Health Education England (HEE), a public body of the Department of Health and Social Care, hypothesises that blended learning (BL) programmes may address health system and nursing profession challenges, such as nursing shortages and lack of digital expertise, by exploring opportunities for providing predominantly online, remote-access study which may increase nursing student recruitment, offering alternate pathways to nursing other than the traditional classroom route. This study will provide evidence for blended learning strategies adopted in nursing education as well as examine nursing student learning experiences concerning the challenges and opportunities related to using blended learning within nursing education. Objective: This review will explore the challenges and opportunities of BL within pre-registration nurse education from the student's perspective. Methods: The search was completed within five databases. Eligible studies were appraised independently by four reviewers. The JBI-convergent segregated approach for mixed methods review was used to assess and synthesize the data. The study’s protocol has been registered with the International Register of Systematic Reviews with registration number// PROSPERO (CRD42023423532). Results: Twenty-seven (27) studies (21 quantitative and 6 qualitative) were included in the review. The study confirmed that BL positively impacts nursing students' learning outcomes, as demonstrated by the findings of the meta-analysis and meta-synthesis. Conclusion: The review compared BL to traditional learning, simulation, laboratory, and online learning on nursing students’ learning and programme outcomes as well as learning behaviour and experience. The results show that BL could effectively improve nursing students’ knowledge, academic achievement, critical skills, and clinical performance as well as enhance learner satisfaction and programme retention. The review findings outline that students’ background characteristics, BL design, and format significantly impact the success of the BL nursing programme.Keywords: nursing student, blended learning, pre-registration nurse education, online learning
Procedia PDF Downloads 5025161 Multi Data Management Systems in a Cluster Randomized Trial in Poor Resource Setting: The Pneumococcal Vaccine Schedules Trial
Authors: Abdoullah Nyassi, Golam Sarwar, Sarra Baldeh, Mamadou S. K. Jallow, Bai Lamin Dondeh, Isaac Osei, Grant A. Mackenzie
Abstract:
A randomized controlled trial is the "gold standard" for evaluating the efficacy of an intervention. Large-scale, cluster-randomized trials are expensive and difficult to conduct, though. To guarantee the validity and generalizability of findings, high-quality, dependable, and accurate data management systems are necessary. Robust data management systems are crucial for optimizing and validating the quality, accuracy, and dependability of trial data. Regarding the difficulties of data gathering in clinical trials in low-resource areas, there is a scarcity of literature on this subject, which may raise concerns. Effective data management systems and implementation goals should be part of trial procedures. Publicizing the creative clinical data management techniques used in clinical trials should boost public confidence in the study's conclusions and encourage further replication. In the ongoing pneumococcal vaccine schedule study in rural Gambia, this report details the development and deployment of multi-data management systems and methodologies. We implemented six different data management, synchronization, and reporting systems using Microsoft Access, RedCap, SQL, Visual Basic, Ruby, and ASP.NET. Additionally, data synchronization tools were developed to integrate data from these systems into the central server for reporting systems. Clinician, lab, and field data validation systems and methodologies are the main topics of this report. Our process development efforts across all domains were driven by the complexity of research project data collected in real-time data, online reporting, data synchronization, and ways for cleaning and verifying data. Consequently, we effectively used multi-data management systems, demonstrating the value of creative approaches in enhancing the consistency, accuracy, and reporting of trial data in a poor resource setting.Keywords: data management, data collection, data cleaning, cluster-randomized trial
Procedia PDF Downloads 2725160 Fostering Ties and Trusts through Social Interaction within Community Gardening
Authors: Shahida Mohd Sharif, Norsidah Ujang
Abstract:
Recent research has shown that many of the urban population in Kuala Lumpur, especially from the lower-income group, suffer from socio-psychological problems. They are reported as experiencing anxiety, depression, and stress, which is made worst by the recent COVID-19 pandemic. Much of the population was forced to observe the Movement Control Order (MCO), which is part of pandemic mitigation measures, pushing them to live in isolation as the new normal. The study finds the need to strategize for a better approach to help these people coping with the socio-psychological condition, especially the population from the lower-income group. In Kuala Lumpur, as part of the Local Agenda 21 programme, the Kuala Lumpur City Hall has introduced Green Initiative: Urban Farming, which among the approaches is the community garden. The local authority promotes the engagement to be capable of improving the social environment of the participants. Research has demonstrated that social interaction within community gardens can help the members improve their socio-psychological conditions. Therefore, the study explores the residents’ experience from low-cost flats participating in the community gardening initiative from a social attachment perspective. The study will utilise semi-structured interviews to collect the participants’ experience with community gardening and how the social interaction exchange between the members' forms and develop their ties and trust. For a context, the low-cost flats are part of the government social housing program (Program Perumahan Rakyat dan Perumahan Awam). Meanwhile, the community gardening initiative (Projek Kebun Kejiranan Bandar LA21 KL) is part of the local authority initiative to address the participants’ social, environmental, and economic issues. The study will conduct thematic analysis on the collected data and use the ATLAS.ti software for data organization and management purposes. The findings could help other researchers and stakeholders understand the social interaction experience within community gardens and its relation to ties and trusts. The findings could shed some light on how the participants could improve their social environment, and its report could provide the local authority with evidence-based documentation.Keywords: community gardening participation, lower-income population, social attachment, social interaction
Procedia PDF Downloads 13725159 Research on Coordination Strategies for Coordinating Supply Chain Based on Auction Mechanisms
Authors: Changtong Wang, Lingyun Wei
Abstract:
The combination of auctions and supply chains is of great significance in improving the supply chain management system and enhancing the efficiency of economic and social operations. To address the gap in research on supply chain strategies under the auction mechanism, a model is developed for the 1-N auction model in a complete information environment, and it is concluded that the two-part contract auction model for retailers in this model can achieve supply chain coordination. The model is validated by substituting the model into the scenario of a fresh-cut flower industry flower auction in exchange for arithmetic examples to further prove the validity of the conclusions.Keywords: auction mechanism, supply chain coordination strategy, fresh cut flowers industry, supply chain management
Procedia PDF Downloads 12325158 Finding Bicluster on Gene Expression Data of Lymphoma Based on Singular Value Decomposition and Hierarchical Clustering
Authors: Alhadi Bustaman, Soeganda Formalidin, Titin Siswantining
Abstract:
DNA microarray technology is used to analyze thousand gene expression data simultaneously and a very important task for drug development and test, function annotation, and cancer diagnosis. Various clustering methods have been used for analyzing gene expression data. However, when analyzing very large and heterogeneous collections of gene expression data, conventional clustering methods often cannot produce a satisfactory solution. Biclustering algorithm has been used as an alternative approach to identifying structures from gene expression data. In this paper, we introduce a transform technique based on singular value decomposition to identify normalized matrix of gene expression data followed by Mixed-Clustering algorithm and the Lift algorithm, inspired in the node-deletion and node-addition phases proposed by Cheng and Church based on Agglomerative Hierarchical Clustering (AHC). Experimental study on standard datasets demonstrated the effectiveness of the algorithm in gene expression data.Keywords: agglomerative hierarchical clustering (AHC), biclustering, gene expression data, lymphoma, singular value decomposition (SVD)
Procedia PDF Downloads 27825157 Investigating Student Behavior in Adopting Online Formative Assessment Feedback
Authors: Peter Clutterbuck, Terry Rowlands, Owen Seamons
Abstract:
In this paper we describe one critical research program within a complex, ongoing multi-year project (2010 to 2014 inclusive) with the overall goal to improve the learning outcomes for first year undergraduate commerce/business students within an Information Systems (IS) subject with very large enrolment. The single research program described in this paper is the analysis of student attitudes and decision making in relation to the availability of formative assessment feedback via Web-based real time conferencing and document exchange software (Adobe Connect). The formative assessment feedback between teaching staff and students is in respect of an authentic problem-based, team-completed assignment. The analysis of student attitudes and decision making is investigated via both qualitative (firstly) and quantitative (secondly) application of the Theory of Planned Behavior (TPB) with a two statistically-significant and separate trial samples of the enrolled students. The initial qualitative TPB investigation revealed that perceived self-efficacy, improved time-management, and lecturer-student relationship building were the major factors in shaping an overall favorable student attitude to online feedback, whilst some students expressed valid concerns with perceived control limitations identified within the online feedback protocols. The subsequent quantitative TPB investigation then confirmed that attitude towards usage, subjective norms surrounding usage, and perceived behavioral control of usage were all significant in shaping student intention to use the online feedback protocol, with these three variables explaining 63 percent of the variance in the behavioral intention to use the online feedback protocol. The identification in this research of perceived behavioral control as a significant determinant in student usage of a specific technology component within a virtual learning environment (VLE) suggests that VLEs could now be viewed not as a single, atomic entity, but as a spectrum of technology offerings ranging from the mature and simple (e.g., email, Web downloads) to the cutting-edge and challenging (e.g., Web conferencing and real-time document exchange). That is, that all VLEs should not be considered the same. The results of this research suggest that tertiary students have the technological sophistication to assess a VLE in this more selective manner.Keywords: formative assessment feedback, virtual learning environment, theory of planned behavior, perceived behavioral control
Procedia PDF Downloads 39825156 A Multi-Criteria Decision Making Approach for Disassembly-To-Order Systems under Uncertainty
Authors: Ammar Y. Alqahtani
Abstract:
In order to minimize the negative impact on the environment, it is essential to manage the waste that generated from the premature disposal of end-of-life (EOL) products properly. Consequently, government and international organizations introduced new policies and regulations to minimize the amount of waste being sent to landfills. Moreover, the consumers’ awareness regards environment has forced original equipment manufacturers to consider being more environmentally conscious. Therefore, manufacturers have thought of different ways to deal with waste generated from EOL products viz., remanufacturing, reusing, recycling, or disposing of EOL products. The rate of depletion of virgin natural resources and their dependency on the natural resources can be reduced by manufacturers when EOL products are treated as remanufactured, reused, or recycled, as well as this will cut on the amount of harmful waste sent to landfills. However, disposal of EOL products contributes to the problem and therefore is used as a last option. Number of EOL need to be estimated in order to fulfill the components demand. Then, disassembly process needs to be performed to extract individual components and subassemblies. Smart products, built with sensors embedded and network connectivity to enable the collection and exchange of data, utilize sensors that are implanted into products during production. These sensors are used for remanufacturers to predict an optimal warranty policy and time period that should be offered to customers who purchase remanufactured components and products. Sensor-provided data can help to evaluate the overall condition of a product, as well as the remaining lives of product components, prior to perform a disassembly process. In this paper, a multi-period disassembly-to-order (DTO) model is developed that takes into consideration the different system uncertainties. The DTO model is solved using Nonlinear Programming (NLP) in multiple periods. A DTO system is considered where a variety of EOL products are purchased for disassembly. The model’s main objective is to determine the best combination of EOL products to be purchased from every supplier in each period which maximized the total profit of the system while satisfying the demand. This paper also addressed the impact of sensor embedded products on the cost of warranties. Lastly, this paper presented and analyzed a case study involving various simulation conditions to illustrate the applicability of the model.Keywords: closed-loop supply chains, environmentally conscious manufacturing, product recovery, reverse logistics
Procedia PDF Downloads 13725155 An Efficient Traceability Mechanism in the Audited Cloud Data Storage
Authors: Ramya P, Lino Abraham Varghese, S. Bose
Abstract:
By cloud storage services, the data can be stored in the cloud, and can be shared across multiple users. Due to the unexpected hardware/software failures and human errors, which make the data stored in the cloud be lost or corrupted easily it affected the integrity of data in cloud. Some mechanisms have been designed to allow both data owners and public verifiers to efficiently audit cloud data integrity without retrieving the entire data from the cloud server. But public auditing on the integrity of shared data with the existing mechanisms will unavoidably reveal confidential information such as identity of the person, to public verifiers. Here a privacy-preserving mechanism is proposed to support public auditing on shared data stored in the cloud. It uses group signatures to compute verification metadata needed to audit the correctness of shared data. The identity of the signer on each block in shared data is kept confidential from public verifiers, who are easily verifying shared data integrity without retrieving the entire file. But on demand, the signer of the each block is reveal to the owner alone. Group private key is generated once by the owner in the static group, where as in the dynamic group, the group private key is change when the users revoke from the group. When the users leave from the group the already signed blocks are resigned by cloud service provider instead of owner is efficiently handled by efficient proxy re-signature scheme.Keywords: data integrity, dynamic group, group signature, public auditing
Procedia PDF Downloads 39225154 Securing Health Monitoring in Internet of Things with Blockchain-Based Proxy Re-Encryption
Authors: Jerlin George, R. Chitra
Abstract:
The devices with sensors that can monitor your temperature, heart rate, and other vital signs and link to the internet, known as the Internet of Things (IoT), have completely transformed the way we control health. Providing real-time health data, these sensors improve diagnostics and treatment outcomes. Security and privacy matters when IoT comes into play in healthcare. Cyberattacks on centralized database systems are also a problem. To solve these challenges, the study uses blockchain technology coupled with proxy re-encryption to secure health data. ThingSpeak IoT cloud analyzes the collected data and turns them into blockchain transactions which are safely kept on the DriveHQ cloud. Transparency and data integrity are ensured by blockchain, and secure data sharing among authorized users is made possible by proxy re-encryption. This results in a health monitoring system that preserves the accuracy and confidentiality of data while reducing the safety risks of IoT-driven healthcare applications.Keywords: internet of things, healthcare, sensors, electronic health records, blockchain, proxy re-encryption, data privacy, data security
Procedia PDF Downloads 1625153 Rodriguez Diego, Del Valle Martin, Hargreaves Matias, Riveros Jose Luis
Authors: Nathainail Bashir, Neil Anderson
Abstract:
The objective of this study site was to investigate the current state of the practice with regards to karst detection methods and recommend the best method and pattern of arrays to acquire the desire results. Proper site investigation in karst prone regions is extremely valuable in determining the location of possible voids. Two geophysical techniques were employed: multichannel analysis of surface waves (MASW) and electric resistivity tomography (ERT).The MASW data was acquired at each test location using different array lengths and different array orientations (to increase the probability of getting interpretable data in karst terrain). The ERT data were acquired using a dipole-dipole array consisting of 168 electrodes. The MASW data was interpreted (re: estimated depth to physical top of rock) and used to constrain and verify the interpretation of the ERT data. The ERT data indicates poorer quality MASW data were acquired in areas where there was significant local variation in the depth to top of rock.Keywords: dipole-dipole, ERT, Karst terrains, MASW
Procedia PDF Downloads 31525152 Experimental Investigation of Performance Anode Side of PEM Fuel Cell with Spin Method Coated with YSZ+SDC
Authors: Gürol Önal, Kevser Dinçer, Salih Yayla
Abstract:
In this study, performance of proton exchange membrane PEM fuel cell was experimentally investigated. Coating on the anode side of the PEM fuel cell was accomplished with the spin method by using YSZ+SDC. A solution having 0,1 gr YttriaStabilized Zirconia (YSZ) + 0,1 Samarium-Doped Ceria (SDC) + 10 mL methanol was prepared. This solution was taken out and filled into a micro-pipette. Then the anode side of PEM fuel cell was coated with YSZ+ SDC by using spin method. In the experimental study, current, voltage and power performances before and after coating were recorded and then compared to each other. It was found that the efficiency of PEM fuel cell increases after the coating with YSZ+SDC.Keywords: fuel cell, Polymer Electrolyte Membrane (PEM), membrane, spin method
Procedia PDF Downloads 56225151 Data Science in Military Decision-Making: A Semi-Systematic Literature Review
Authors: H. W. Meerveld, R. H. A. Lindelauf
Abstract:
In contemporary warfare, data science is crucial for the military in achieving information superiority. Yet, to the authors’ knowledge, no extensive literature survey on data science in military decision-making has been conducted so far. In this study, 156 peer-reviewed articles were analysed through an integrative, semi-systematic literature review to gain an overview of the topic. The study examined to what extent literature is focussed on the opportunities or risks of data science in military decision-making, differentiated per level of war (i.e. strategic, operational, and tactical level). A relatively large focus on the risks of data science was observed in social science literature, implying that political and military policymakers are disproportionally influenced by a pessimistic view on the application of data science in the military domain. The perceived risks of data science are, however, hardly addressed in formal science literature. This means that the concerns on the military application of data science are not addressed to the audience that can actually develop and enhance data science models and algorithms. Cross-disciplinary research on both the opportunities and risks of military data science can address the observed research gaps. Considering the levels of war, relatively low attention for the operational level compared to the other two levels was observed, suggesting a research gap with reference to military operational data science. Opportunities for military data science mostly arise at the tactical level. On the contrary, studies examining strategic issues mostly emphasise the risks of military data science. Consequently, domain-specific requirements for military strategic data science applications are hardly expressed. Lacking such applications may ultimately lead to a suboptimal strategic decision in today’s warfare.Keywords: data science, decision-making, information superiority, literature review, military
Procedia PDF Downloads 16725150 Electronic, Magnetic and Optic Properties in Halide Perovskites CsPbX3 (X= F, Cl, I)
Authors: B. Bouadjemi, S. Bentata, T. Lantri, Souidi Amel, W.Bensaali, A. Zitouni, Z. Aziz
Abstract:
We performed first-principle calculations, the full-potential linearized augmented plane wave (FP-LAPW) method is used to calculate structural, optoelectronic and magnetic properties of cubic halide perovskites CsPbX3 (X= F,I). We employed for this study the GGA approach and for exchange is modeled using the modified Becke-Johnson (mBJ) potential to predicting the accurate band gap of these materials. The optical properties (namely: the real and imaginary parts of dielectric functions, optical conductivities and absorption coefficient absorption make this halide perovskites promising materials for solar cells applications.Keywords: halide perovskites, mBJ, solar cells, FP-LAPW, optoelectronic properties, absorption coefficient
Procedia PDF Downloads 32225149 Comprehensive Review of Adversarial Machine Learning in PDF Malware
Authors: Preston Nabors, Nasseh Tabrizi
Abstract:
Portable Document Format (PDF) files have gained significant popularity for sharing and distributing documents due to their universal compatibility. However, the widespread use of PDF files has made them attractive targets for cybercriminals, who exploit vulnerabilities to deliver malware and compromise the security of end-user systems. This paper reviews notable contributions in PDF malware detection, including static, dynamic, signature-based, and hybrid analysis. It presents a comprehensive examination of PDF malware detection techniques, focusing on the emerging threat of adversarial sampling and the need for robust defense mechanisms. The paper highlights the vulnerability of machine learning classifiers to evasion attacks. It explores adversarial sampling techniques in PDF malware detection to produce mimicry and reverse mimicry evasion attacks, which aim to bypass detection systems. Improvements for future research are identified, including accessible methods, applying adversarial sampling techniques to malicious payloads, evaluating other models, evaluating the importance of features to malware, implementing adversarial defense techniques, and conducting comprehensive examination across various scenarios. By addressing these opportunities, researchers can enhance PDF malware detection and develop more resilient defense mechanisms against adversarial attacks.Keywords: adversarial attacks, adversarial defense, adversarial machine learning, intrusion detection, PDF malware, malware detection, malware detection evasion
Procedia PDF Downloads 3925148 Legal Regulation of Personal Information Data Transmission Risk Assessment: A Case Study of the EU’s DPIA
Authors: Cai Qianyi
Abstract:
In the midst of global digital revolution, the flow of data poses security threats that call China's existing legislative framework for protecting personal information into question. As a preliminary procedure for risk analysis and prevention, the risk assessment of personal data transmission lacks detailed guidelines for support. Existing provisions reveal unclear responsibilities for network operators and weakened rights for data subjects. Furthermore, the regulatory system's weak operability and a lack of industry self-regulation heighten data transmission hazards. This paper aims to compare the regulatory pathways for data information transmission risks between China and Europe from a legal framework and content perspective. It draws on the “Data Protection Impact Assessment Guidelines” to empower multiple stakeholders, including data processors, controllers, and subjects, while also defining obligations. In conclusion, this paper intends to solve China's digital security shortcomings by developing a more mature regulatory framework and industry self-regulation mechanisms, resulting in a win-win situation for personal data protection and the development of the digital economy.Keywords: personal information data transmission, risk assessment, DPIA, internet service provider, personal information data transimission, risk assessment
Procedia PDF Downloads 6125147 Empirical Examination of High Performance Work System, Organizational Commitment and Organizational Citizen Behavior: A Mediation of Model of Vietnam Organizations
Authors: Giang Vu, Duong Nguyen, Yuan-Ling Chen
Abstract:
Vietnam is a fast developing country with highly economic growth, and Vietnam organizations strive to utilize high performance work system (HPWS) in reinforcing employee in-role performance. HPWS, a bundle of human resource (HR) practices, are composed of eight sets of HR practices, namely selective staffing, extensive training, internal mobility, employment security, clear job description, result-oriented appraisal, incentive reward, and participation. However, whether HPWS stimulate employee extra-role behaviors remains understudied in a booming economic context. In this study, we aim to investigate organizational citizenship behavior (OCB) in a Vietnam context and, as a central issue, disentangle how HPWS elicits in employee OCB. On the other hand, recently, a deliberation of so-called 'black-box' HPWS issue has explored the role of employee commitment, suggesting that organizational commitment is a compelling source of employee OCB. We draw upon social exchange theory to predict that when employees perceive the organizational investment, like HPWS, in heightening their abilities, knowledge, and motivation, they are more likely to pay back with commitment; consequently, they will take initiatives in OCB. Hence, we hypothesize an individual level framework, in which organizational commitment mediates the positive relationship between HPWS and OCB. We collected data on HPWS, organizational commitment, OCB, and demographic variables, all at line managers of Vietnamese firms in Hanoi and Hochiminh. We conclude with research findings, implications, and future research suggestions.Keywords: high performance work system, organizational citizenship behavior, organizational commitment, Vietnam
Procedia PDF Downloads 31025146 Wavelets Contribution on Textual Data Analysis
Authors: Habiba Ben Abdessalem
Abstract:
The emergence of giant set of textual data was the push that has encouraged researchers to invest in this field. The purpose of textual data analysis methods is to facilitate access to such type of data by providing various graphic visualizations. Applying these methods requires a corpus pretreatment step, whose standards are set according to the objective of the problem studied. This step determines the forms list contained in contingency table by keeping only those information carriers. This step may, however, lead to noisy contingency tables, so the use of wavelet denoising function. The validity of the proposed approach is tested on a text database that offers economic and political events in Tunisia for a well definite period.Keywords: textual data, wavelet, denoising, contingency table
Procedia PDF Downloads 27725145 Magnetic Properties of Layered Rare-Earth Oxy-Carbonates Ln2O2CO3 (Ln = Nd, Sm, and Dy)
Authors: U. Arjun, K. Brinda, M. Padmanabhan, R. Nath
Abstract:
Polycrystalline samples of rare-earth oxy-carbonates Ln2O2CO3 (Ln = Nd, Sm, and Dy) are synthesized, and their structural and magnetic properties are investigated. All of them crystallize in a hexagonal structure with space group P6_3/mmc. They form a double layered structure with frustrated triangular arrangement of rare-earth magnetic ions. An antiferromagnetic transition is observed at TN ≈ 1.25 K, 0.61 K, and 1.21 K for Nd2O2CO3, Sm2O2CO3, and Dy2O2CO3, respectively. From the analysis of magnetic susceptibility, the value of the Curie-Weiss temperature θ_CW is obtained to be ≈ 21.7 K, 18 K, and 10.6 K for Nd2O2CO3, Sm2O2CO3, and Dy2O2CO3, respectively. The magnetic frustration parameter f ( = |θ_CW|/T_N) is calculated to be ≈ 17.4, 31, and 8.8 for Nd2O2CO3, Sm2O2CO3, and Dy2O2CO3, respectively which indicates that Sm2O2CO3 is strongly frustrated compared to its Nd and Dy analogues.Keywords: chemical synthesis, exchange and superexchange, heat capacity, magnetically ordered materials
Procedia PDF Downloads 35525144 An Investigation into Fraud Detection in Financial Reporting Using Sugeno Fuzzy Classification
Authors: Mohammad Sarchami, Mohsen Zeinalkhani
Abstract:
Always, financial reporting system faces some problems to win public ear. The increase in the number of fraud and representation, often combined with the bankruptcy of large companies, has raised concerns about the quality of financial statements. So, investors, legislators, managers, and auditors have focused on significant fraud detection or prevention in financial statements. This article aims to investigate the Sugeno fuzzy classification to consider fraud detection in financial reporting of accepted firms by Tehran stock exchange. The hypothesis is: Sugeno fuzzy classification may detect fraud in financial reporting by financial ratio. Hypothesis was tested using Matlab software. Accuracy average was 81/80 in Sugeno fuzzy classification; so the hypothesis was confirmed.Keywords: fraud, financial reporting, Sugeno fuzzy classification, firm
Procedia PDF Downloads 248