Search results for: online threats
2038 Combined Safety and Cybersecurity Risk Assessment for Intelligent Distributed Grids
Authors: Anders Thorsén, Behrooz Sangchoolie, Peter Folkesson, Ted Strandberg
Abstract:
As more parts of the power grid become connected to the internet, the risk of cyberattacks increases. To identify the cybersecurity threats and subsequently reduce vulnerabilities, the common practice is to carry out a cybersecurity risk assessment. For safety classified systems and products, there is also a need for safety risk assessments in addition to the cybersecurity risk assessment in order to identify and reduce safety risks. These two risk assessments are usually done separately, but since cybersecurity and functional safety are often related, a more comprehensive method covering both aspects is needed. Some work addressing this has been done for specific domains like the automotive domain, but more general methods suitable for, e.g., intelligent distributed grids, are still missing. One such method from the automotive domain is the Security-Aware Hazard Analysis and Risk Assessment (SAHARA) method that combines safety and cybersecurity risk assessments. This paper presents an approach where the SAHARA method has been modified in order to be more suitable for larger distributed systems. The adapted SAHARA method has a more general risk assessment approach than the original SAHARA. The proposed method has been successfully applied on two use cases of an intelligent distributed grid.Keywords: intelligent distribution grids, threat analysis, risk assessment, safety, cybersecurity
Procedia PDF Downloads 1512037 Blended Learning through Google Classroom
Authors: Lee Bih Ni
Abstract:
This paper discusses that good learning involves all academic groups in the school. Blended learning is learning outside the classroom. Google Classroom is a free service learning app for schools, non-profit organizations and anyone with a personal Google account. Facilities accessed through computers and mobile phones are very useful for school teachers and students. Blended learning classrooms using both traditional and technology-based methods for teaching have become the norm for many educators. Using Google Classroom gives students access to online learning. Even if the teacher is not in the classroom, the teacher can provide learning. This is the supervision of the form of the teacher when the student is outside the school.Keywords: blended learning, learning app, google classroom, schools
Procedia PDF Downloads 1442036 Moroccan Human Ecological Behavior: Grounded Theory Approach
Authors: Dalal Tarfaoui, Salah Zkim
Abstract:
Today, environmental sustainability is everyone’s concern as it contributes in many aspects to a country's development. Morocco is also aware of the increasing threats to its natural resources. Accordingly, many projects and research have been discussed pointing mainly to water security, pollution, desertification, and land degradation, but few studies bothered to dig into the human demeanor to disclose its ecological behavior. Human behavior is accountable for environment deterioration in the first place, but we keep fighting the symptoms instead of limiting the root causes. In the conceptual framework highlighted in the present article, semi-structured interviews have been conducted using a grounded theory approach. Initially this study will serve as a pilot study and a cornerstone to approve a bigger project now in progress. Beyond the existing general ecological measures (GEM), this study has chosen the grounded theory approach to bring out firsthand insights, and probe to which extent an ecological dimension exists in Morocco as a developing country. The discourse of the ecological behavior within the Moroccan context is seen in more realist, social, and community philosophy. The study has revealed an appreciative ecological behavior that is unfortunately repressed by variables beyond people’s control, which would prevent the people’s environmental good intentions to be translated into real ecological actions.Keywords: ecological behavior, ecological dimension, variables beyond people’s control, Morocco
Procedia PDF Downloads 4932035 Students Perception of a Gamified Student Engagement Platform as Supportive Technology in Learning
Authors: Pinn Tsin Isabel Yee
Abstract:
Students are increasingly turning towards online learning materials to supplement their education. One such approach would be the gamified student engagement platforms (GSEPs) to instill a new learning culture. Data was collected from closed-ended questions via content analysis techniques. About 81.8% of college students from the Monash University Foundation Year agreed that GSEPs (Quizizz) was an effective tool for learning. Approximately 85.5% of students disagreed that games were a waste of time. GSEPs were highly effective among students to facilitate the learning process.Keywords: engagement, gamified, Quizizz, technology
Procedia PDF Downloads 1072034 Little Girls and Big Stories: A Thematic Analysis of Gender Representations in Selected Asian Room to Read Storybooks
Authors: Cheeno Marlo Sayuno
Abstract:
Room to Read is an international nonprofit organization aimed at empowering young readers through literature and literacy education. In particular, the organization is focused on girls’ education in schools and bettering their social status through crafting stories and making sure that these stories are accessible to them. In 2019, Room to Read visited the Philippines and partnered with Philippine children’s literature publishers Adarna House, Lampara Books, Anvil Publishing, and OMF-Hiyas with the goal of producing contextualized stories that Filipino children can read. The result is a set of 20 storybooks developed by Filipino writers and illustrators, the author of this paper included. The project led to narratives of experiences in storybook production from conceptualization to publication, towards translations and reimagining in online repository, storytelling, and audiobook formats. During the production process, we were particularly reminded of gender representations, child’s rights, and telling stories that can empower the children in vulnerable communities, who are the beneficiaries of the project. The storybooks, along with many others produced in Asia and the world, are available online through the literacycloud.org website of Room to Read. In this study, the goal is to survey the stories produced in Asia and look at how gender is represented in the storybooks. By analyzing both the texts and the illustrations of the storybooks produced across Asian countries, themes of portrayals of young boys and girls, their characteristics and narratives, and how they are empowered in the stories are identified, with the goal of mapping how Room to Read is able to address the problem of access to literacy among young girls and ensuring them that they can do anything, the way they are portrayed in the stories. The paper hopes to determine how gender is represented in Asian storybooks produced by the international nonprofit organization Room to Read. Thematic textual analysis was used as methodology, where the storybooks are analyzed qualitatively to identify arising themes of gender representation. This study will shed light on the importance of responsible portrayal of gender in storybooks and how it can impact and empower children. The results of the study can also aid writers and illustrators in developing gender-sensitive storybooks.Keywords: room to read, asian storybooks, young girls, thematic analysis, child empowerment, literacy, education
Procedia PDF Downloads 782033 Information Technology and Occupational Safety and Health
Authors: Muhammad Afiq Anaqi Bin Baharudin, Muhammad Izamuddin Bin Mohd Nasir, Syarifuddin Bin Sujuanda, Muhammad Syahmi Rusyaidi Bin Sham Suddin, Danish Hakimi Bin Kamaruzaman, Muhammad Haqimi Nazim Bin Hasmanizam, Mohammad Akmal Zakwan Bin Amran, Muhammad Alparizi Bin Latif
Abstract:
By improving efficiency and production, information technology (IT) has transformed working environments, but it has also created new threats to occupational safety and health (OSH). This study evaluates the literature that has already been written on the subject of IT and OSH, identifies major findings and discussion points, and highlights gaps in the material that call for additional research. The study's findings, which look at how IT affects OSH in a sizable multinational organization, are also presented in the report. According to the report, IT poses a number of OSH problems, such as ergonomic dangers, eye strain, dangers related to cybersecurity, and psychological hazards. The report suggests using tactics like providing comfortable workstations, encouraging a healthy balance between work and life, and putting strong cybersecurity safeguards in place to reduce these dangers. The implications of these findings for OSH and IT are discussed in the paper's conclusion, and it emphasizes the need for more study and action to address these dangers and promote healthy and secure working environments in the age of digitization.Keywords: information technology, occupational safety and health (OSH), ergonomic, hazards, workplace.
Procedia PDF Downloads 1262032 Simon Says: What Should I Study?
Authors: Fonteyne Lot
Abstract:
SIMON (Study capacities and Interest Monitor is a freely accessible online self-assessment tool that allows secondary education pupils to evaluate their interests and capacities in order to choose a post-secondary major that maximally suits their potential. The tool consists of two broad domains that correspond with two general questions pupils ask: 'What study fields interest me?' and 'Am I capable to succeed in this field of study?'. The first question is addressed by a RIASEC-type interest inventory that links personal interests to post-secondary majors. Pupils are provided with a personal profile and an overview of majors with their degree of congruence. The output is dynamic: respondents can manipulate their score and they can compare their results to the profile of all fields of study. That way they are stimulated to explore the broad range of majors. To answer whether pupils are capable of succeeding in a preferred major, a battery of tests is provided. This battery comprises a range of factors that are predictive of academic success. Traditional predictors such as (educational) background and cognitive variables (mathematical and verbal skills) are included. Moreover, non-cognitive predictors of academic success (such as 'motivation', 'test anxiety', 'academic self-efficacy' and 'study skills') are assessed. These non-cognitive factors are generally not included in admission decisions although research shows they are incrementally predictive of success and are less discriminating. These tests inform pupils on potential causes of success and failure. More important, pupils receive their personal chances of success per major. These differential probabilities are validated through the underlying research on academic success of students. For example, the research has shown that we can identify 22 % of the failing students in psychology and educational sciences. In this group, our prediction is 95% accurate. SIMON leads more students to a suitable major which in turn alleviates student success and retention. Apart from these benefits, the instrument grants insight into risk factors of academic failure. It also supports and fosters the development of evidence-based remedial interventions and therefore gives way to a more efficient use of means.Keywords: academic success, online self-assessment, student retention, vocational choice
Procedia PDF Downloads 4012031 The Effectiveness of E-Training on the Attitude and Skill Competencies of Vocational High School Teachers during Covid-19 Pandemic in Indonesia
Authors: Sabli, Eddy Rismunandar, Akhirudin, Nana Halim, Zulfikar, Nining Dwirosanti, Wila Ningsih, Pipih Siti Sofiah, Danik Dania Asadayanti, Dewi Eka Arini Algozi, Gita Mahardika Pamuji, Ajun, Mangasa Aritonang, Nanang Rukmana, Arief Rachman Wonodhipo, Victor Imanuel Nahumury, Lili Husada, Wawan Saepul Irwan, Al Mukhlas Fikri
Abstract:
Covid-19 pandemic has widely impacted the lives. An adaptive strategy must be quickly formulated to maintain the quality of education, especially by vocational school which technical skill competencies are highly needed. This study aimed to evaluate the effectiveness of e-training on the attitude and skill competencies of vocational high school teachers in Indonesia. A total of 720 Indonesian vocational high school teachers with various programs, including hospitality, administration, online business and marketing, culinary arts, fashion, cashier, tourism, haircut, and accounting participated e-training for a month. The training used electronic learning management system to provide materials (modules, presentation slides, and tutorial videos), tasks, and evaluations. Tutorial class was carried out by video conference meeting. Attitude and skill competencies were evaluated before and after the training. Meanwhile, the teachers also gave satisfactory feedback on the quality of the organizer and tutors. Data analysis used paired sample t-test and Anova with Tukey’s post hoc test. The results showed that e-training significantly increased the score of attitude and skill competencies of the teachers (p <0,05). Moreover, the remarkable increase was found among hospitality (57,5%), cashier (50,1%), and online business and marketing (48,7%) teachers. However, the effect among fashion, tourism and haircut teachers was less obvious. In addition, the satisfactory score on the quality of the organizer and tutors were 88,9 (very good), and 93,5 (excellence), respectively. The study concludes that a well-organized e-training could increase the attitude and skill competencies of Indonesian vocational high school teachers during Covid-19 pandemic.Keywords: E-training, skill, teacher, vocational high school
Procedia PDF Downloads 1462030 Higher Language Education in Australia: Uncovering Language Positioning
Authors: Mobina Sahraee Juybari
Abstract:
There are around 300 languages spoken in Australia, and more than one-fifth of the population speaks a language other than English at home. The presence of international students in schools raises this number still further. Although the multilingual and multicultural status of Australia has been acknowledged by the government in education policy, the strong focus on English in institutional settings threatens the maintenance and learning of other languages. This is particularly true of universities’ language provisions. To cope with the financial impact of Covid-19, the government has cut funding for a number of Asian languages, such as Indonesian, Japanese and Chinese. This issue threats the maintenance of other languages in Australia and leaves students unprepared for the future job market. By taking account of the current reality of Australia’s diverse cultural and lingual makeup, this research intends to uncover the positioning of languages by having a historical look at Australia’s language policy and examining the value of languages and the probable impact of Covid-19 on the place of languages taught in Australian universities. A qualitative study will be adopted with language program tutors and course coordinators, with semi-structured interviews and government language policy analysis. This research hopes to provide insights into both the maintenance and learning of international language programs in tertiary language education in Australia and more widely.Keywords: Australia, COVID-19, higher education sector, language maintenance, language and culture diversity
Procedia PDF Downloads 1022029 An Analysis of Brand-Building Characteristics in the Iran Airline Websites
Authors: Pedram Behyar, Zahra Bayat
Abstract:
The internet and web are changing ways of “far reaching scope and potential for transformation of the marketing functions”. The web is developing in a faster rate than any previous new communication medium. The website of destination has become a crucial branding channel, that is why all businesses are changing their way to communicate with their customers to encounter their needs and wants in better ways. Website provides numerous opportunities for businesses to strengthen their relationship with their customers. One of these opportunities is website component that enables internet users to make two-way communication with the businesses.Keywords: marketing communication, brand image, usability, privacy and security, personalization and customization, responsiveness, customer online web experience
Procedia PDF Downloads 5002028 Baseline Study on Human Trafficking Crimes: A Case Study of Mapping Human Trafficking Crimes in East Java Province, Indonesia
Authors: Ni Komang Desy Arya Pinatih
Abstract:
Transnational crime is a crime with 'unique' feature because the activities benefit the lack of state monitoring on the borders so dealing with it cannot be based on conventional engagement but also need joint operation with other countries. On the other hand with the flow of globalization and the growth of information technology and transportation, states become more vulnerable to transnational crime threats especially human trafficking. This paper would examine transnational crime activities, especially human trafficking in Indonesia. With the case study on the mapping of human trafficking crime in East Java province, Indonesia, this paper would try to analyze how the difference in human trafficking crime trends at the national and sub-national levels. The findings of this research were first, there is difference in human trafficking crime trends whereas at the national level the trend is rising, while at sub-national (province) level the trend is declining. Second, regarding the decline of human trafficking number, it’s interesting to see how the method to decrease human trafficking crime in East Jawa Province in order to reduce transnational crime accounts in the region. These things are hopefully becoming a model for transnational crimes engagement in other regions to reduce human trafficking numbers as much as possible.Keywords: transnational crime, human trafficking, southeast Asia, anticipation model on transnational crimes
Procedia PDF Downloads 3032027 The Increasing of Perception of Consumers’ Awareness about Sustainability Brands during Pandemic: A Multi Mediation Model
Authors: Silvia Platania, Martina Morando, Giuseppe Santisi
Abstract:
Introduction: In the last thirty years, there is constant talk of sustainable consumption and a "transition" of consumer lifestyles towards greater awareness of consumer choices (United Nation, 1992). The 2019 coronavirus (COVID-19) epidemic that has hit the world population since 2020 has had significant consequences in all areas of people's lives; individuals have been forced to change their behaviors, to redefine their owngoals, priorities, practices, and lifestyles, to rebuild themselves in the new situation dictated by the pandemic. Method(Participants and procedure ): The data were collected through an online survey; moreover, we used convenience sampling from the general population. The participants were 669 Italians consumers (Female= 514, 76.8%; Male=155, 23.2%) that choice sustainability brands, aged between 18 and 65 years (Mₐ𝓰ₑ = 35.45; Standard Deviation, SD = 9.51).(Measure ): The following measures were used: The Muncy–Vitell Consumer Ethics Scale; Attitude Toward Business Scale; Perceived Consumer Effectiveness Scale; Consumers Perception on Sustainable Brand Attitudes. Results: Preliminary analyses were conducted to test our model. Pearson's bivariate correlation between variables shows that all variables of our model correlate significantly and positively, PCE with CPSBA (r = .56, p <.001). Furthermore, a CFA, according to Harman's single-factor test, was used to diagnose the extent to which common-method variance was a problem. A comparison between the hypothesised model and a model with one factor (with all items loading on a unique factor) revealed that the former provided a better fit for the data in all the CFA fit measures [χ² [6, n = 669] = 7.228, p = 0.024, χ² / df = 1.20, RMSEA = 0.07 (CI = 0.051-0.067), CFI = 0.95, GFI = 0.95, SRMR = 0.04, AIC = 66.501; BIC = 132,150). Next, amulti mediation was conducted to test our hypotheses. The results show that there is a direct effect of PCE on ethical consumption behavior (β = .38) and on ATB (β = .23); furthermore, there is a direct effect on the CPSBA outcome (β = .34). In addition, there is a mediating effect by ATB (C.I. =. 022-.119, 95% interval confidence) and by CES (C.I. =. 136-.328, 95% interval confidence). Conclusion: The spread of the COVID-19 pandemic has affected consumer consumption styles and has led to an increase in online shopping and purchases of sustainable products. Several theoretical and practical considerations emerge from the results of the study.Keywords: decision making, sustainability, pandemic, multimediation model
Procedia PDF Downloads 1082026 A Two-Step Framework for Unsupervised Speaker Segmentation Using BIC and Artificial Neural Network
Authors: Ahmad Alwosheel, Ahmed Alqaraawi
Abstract:
This work proposes a new speaker segmentation approach for two speakers. It is an online approach that does not require a prior information about speaker models. It has two phases, a conventional approach such as unsupervised BIC-based is utilized in the first phase to detect speaker changes and train a Neural Network, while in the second phase, the output trained parameters from the Neural Network are used to predict next incoming audio stream. Using this approach, a comparable accuracy to similar BIC-based approaches is achieved with a significant improvement in terms of computation time.Keywords: artificial neural network, diarization, speaker indexing, speaker segmentation
Procedia PDF Downloads 4992025 Let’s talk about it! Increasing Advance Directives and End-of-Life Planning Awareness & Acceptance in Multi-Cultural Population with Low Health Literacy in a Faith-Based Setting
Authors: Tonya P. Bowers
Abstract:
Background: The community/patient-focused quality improvement (QI) project has resolved a clinical problem using a quantitative design evaluating behavior change practices in a convenience sample from a multi-cultural congregation in a faith-based setting. AD is a legal document that speaks for the patient when they are unable to speak for themselves. The AD provides detailed information regarding critical medical decisions on behalf of the patient if they’re unable to make decisions themselves. The goal of an AD is to improve EOL care renderings that align with the patient’s desires. The AD diminishes anxiety and stress associated with making difficult EOL care decisions for patients and their families. Method: The project has two intervention strategies: pre-intervention and post-intervention formative surveys and a final summative survey. Most of the data collection takes place during implementation. The Let’s Talk About It Program utilized an online meeting platform for presentation. Participants were asked to complete informed consent and surveys via an online portal. Education included slide presentation, Advance Directive demonstration, video clips, discussions and 1:1 assistance with AD completion with a project manager. Results: Considering the overwhelming likelihood responses where 87.5% identified they “definitely would” hold an End-Of-Life conversation with their healthcare provider or family, and 81.25% indicated their likelihood that they “definitely would” complete an advance directive. In addition, the final summative post-intervention survey (n-14) also demonstrated an overwhelming 93% positive response. Which undoubtedly demonstrates favorable outcomes for the project. Conclusion: the Let’s Talk About It Program demonstrated effectiveness in improving participants' attitudes and acceptance towards Advance Directives and expanding End-of-Life care discussions. Emphasis on program sustainment within the church is imperative in fostering continued awareness and improved health outcomes for the local community with low health literacy.Keywords: advance directive, end of life, advance care planning, palliative care, low health literacy, faith-based
Procedia PDF Downloads 2092024 Bhumastra “Unmanned Ground Vehicle”
Authors: Vivek Krishna, Nikhil Jain, A. Mary Posonia A., Albert Mayan J
Abstract:
Terrorism and insurgency are significant global issues that require constant attention and effort from governments and scientists worldwide. To combat these threats, nations invest billions of dollars in developing new defensive technologies to protect civilians. Breakthroughs in vehicle automation have led to the use of sophisticated machines for many dangerous and critical anti-terrorist activities. Our concept of an "Unmanned Ground Vehicle" can carry out tasks such as border security, surveillance, mine detection, and active combat independently or in tandem with human control. The robot's movement can be wirelessly controlled by a person in a distant location or can travel to a pre-programmed destination autonomously in situations where personal control is not feasible. Our defence system comprises two units: the control unit that regulates mobility and the motion tracking unit. The remote operator robot uses the camera's live visual feed to manually operate both units, and the rover can automatically detect movement. The rover is operated by manpower who controls it using a joystick or mouse, and a wireless modem enables a soldier in a combat zone to control the rover via an additional controller feature.Keywords: robotics, computer vision, Machine learning, Artificial intelligence, future of AI
Procedia PDF Downloads 1212023 Development of Monitoring Blood Bank Center Based PIC Microcontroller Using CAN Communication
Authors: Kaiwan S. Ismael, Ergun Ercelebi, Majeed Nader
Abstract:
This paper describes the design and implementation of a hardware setup for online monitoring of 24 refrigerators inside blood bank center using the microcontroller and CAN bus for communications between each node. Due to the security of locations in the blood bank hall and difficulty of monitoring of each refrigerator separately, this work proposes a solution to monitor all the blood bank refrigerators in one location. CAN-bus system is used because it has many applications and advantages, especially for this system due to easy in use, low cost, providing a reduction in wiring, fast to repair and easily expanding the project without a problem.Keywords: control area network (CAN), monitoring blood bank center, PIC microcontroller, MPLAB IDE
Procedia PDF Downloads 4822022 Entrepreneurship under the Effect of Information Technology
Authors: Mohammad Hadi Khorashadi Zadeh
Abstract:
An entrepreneur is a manager or the owner of the commercial company that creates resources and money by risking and initiative. The Netpreneur is the capability to run an online business. It needs only the Connectivity. An Entrepreneur, as long as he has a service which the market demands can set up a feasible and viable trade with his Intellectual Capital as the principle input and the Connectivity Infrastructure as the only physical input. The internet is possibly the most significant revolution in science and technology that our generation could fantasize or imagine. It has introduced in various benefits to the society, culture, economics and politics. The entrepreneur is a premium member in the community. She/he provides services to the society and community including employment.Keywords: entrepreneur, Netpreneur, intellectual capital, infrastructure
Procedia PDF Downloads 3242021 Understanding the Basics of Information Security: An Act of Defense
Authors: Sharon Q. Yang, Robert J. Congleton
Abstract:
Information security is a broad concept that covers any issues and concerns about the proper access and use of information on the Internet, including measures and procedures to protect intellectual property and private data from illegal access and online theft; the act of hacking; and any defensive technologies that contest such cybercrimes. As more research and commercial activities are conducted online, cybercrimes have increased significantly, putting sensitive information at risk. Information security has become critically important for organizations and private citizens alike. Hackers scan for network vulnerabilities on the Internet and steal data whenever they can. Cybercrimes disrupt our daily life, cause financial losses, and instigate fear in the public. Since the start of the pandemic, most data related cybercrimes targets have been either financial or health information from companies and organizations. Libraries also should have a high interest in understanding and adopting information security methods to protect their patron data and copyrighted materials. But according to information security professionals, higher education and cultural organizations, including their libraries, are the least prepared entities for cyberattacks. One recent example is that of Steven’s Institute of Technology in New Jersey in the US, which had its network hacked in 2020, with the hackers demanding a ransom. As a result, the network of the college was down for two months, causing serious financial loss. There are other cases where libraries, colleges, and universities have been targeted for data breaches. In order to build an effective defense, we need to understand the most common types of cybercrimes, including phishing, whaling, social engineering, distributed denial of service (DDoS) attacks, malware and ransomware, and hacker profiles. Our research will focus on each hacking technique and related defense measures; and the social background and reasons/purpose of hacker and hacking. Our research shows that hacking techniques will continue to evolve as new applications, housing information, and data on the Internet continue to be developed. Some cybercrimes can be stopped with effective measures, while others present challenges. It is vital that people understand what they face and the consequences when not prepared.Keywords: cybercrimes, hacking technologies, higher education, information security, libraries
Procedia PDF Downloads 1332020 Learners' Perception of Digitalization of Medical Education in a Low Middle-Income Country – A Case Study of the Lecturio Platform
Authors: Naomi Nathan
Abstract:
Introduction Digitalization of medical education can revolutionize how medical students learn and interact with the medical curriculum across contexts. With the increasing availability of the internet and mobile connectivity in LMICs, online medical education platforms and digital learning tools are becoming more widely available, providing new opportunities for learners to access high-quality medical education and training. However, the adoption and integration of digital technologies in medical education in LMICs is a complex process influenced by various factors, including learners' perceptions and attitudes toward digital learning. In Ethiopia, the adoption of digital platforms for medical education has been slow, with traditional face-to-face teaching methods still being the norm. However, as access to technology improves and more universities adopt digital platforms, it is crucial to understand how medical students perceive this shift. Methodology This study investigated medical students' perception of the digitalization of medical education in relation to their access to the Lecturio Digital Medical Education Platform through a capacity-building project. 740 medical students from over 20 medical universities participated in the study. The students were surveyed using a questionnaire that included their attitudes toward the digitalization of medical education, their frequency of use of the digital platform, and their perceived benefits and challenges. Results The study results showed that most medical students had a positive attitude toward digitalizing medical education. The most commonly cited benefit was the convenience and flexibility of accessing course material/curriculum online. Many students also reported that they found the platform more interactive and engaging, leading to a more meaningful learning experience. The study also identified several challenges medical students faced when using the platform. The most commonly reported challenge was the need for more reliable internet access, which made it difficult for students to access content consistently. Overall, the results of this study suggest that medical students in Ethiopia have a positive perception of the digitalization of medical education. Over 97% of students continuously expressed a need for access to the Lecturio platform throughout their studies. Conclusion Significant challenges still need to be addressed to fully realize the Lecturio digital platform's benefits. Universities, relevant ministries, and various stakeholders must work together to address these challenges to ensure that medical students fully participate in and benefit from digitalized medical education - sustainably and effectively.Keywords: digital medical education, EdTech, LMICs, e-learning
Procedia PDF Downloads 892019 The Effectiveness of Cathodic Protection on Microbiologically Influenced Corrosion Control
Authors: S. Taghavi Kalajahi, A. Koerdt, T. Lund Skovhus
Abstract:
Cathodic protection (CP) is an electrochemical method to control and manage corrosion in different industries and environments. CP which is widely used, especially in buried and sub-merged environments, which both environments are susceptible to microbiologically influenced corrosion (MIC). Most of the standards recommend performing CP using -800 mV, however, if MIC threats are high or sulfate reducing bacteria (SRB) is present, the recommendation is to use more negative potentials for adequate protection of the metal. Due to the lack of knowledge and research on the effectiveness of CP on MIC, to the author’s best knowledge, there is no information about what MIC threat is and how much more negative potentials should be used enabling adequate protection and not overprotection (due to hydrogen embrittlement risk). Recently, the development and cheaper price of molecular microbial methods (MMMs) open the door for more effective investigations on the corrosion in the presence of microorganisms, along with other electrochemical methods and surface analysis. In this work, using MMMs, the gene expression of SRB biofilm under different potentials of CP will be investigated. The specific genes, such as pH buffering, metal oxidizing, etc., will be compared at different potentials, enabling to determine the precise potential that protect the metal effectively from SRB. This work is the initial step to be able to standardize the recommended potential under MIC condition, resulting better protection for the infrastructures.Keywords: cathodic protection, microbiologically influenced corrosion, molecular microbial methods, sulfate reducing bacteria
Procedia PDF Downloads 902018 Educational System in Developing Countries and E-learning Evaluation in the Face of COVID Pandemic
Authors: Timothy Wale Olaosebikan
Abstract:
The adverse effect of the Covid-19 outbreak and lock-downs on the world economy has coursed a major disrupt in mostly all sectors. The educational sector is not exempted from this disruption as it is one of the most affected sectors in the world. Similarly, most developing countries are still struggling to adopt/ adapt with the 21st-century advancement of technology, which includes e-learning/ e-education. Furthermore, one is left to wonder of the possibility of these countries surviving this disruption on their various educational systems that may no longer be business as usual after the Covid Pandemic era. This study evaluates the e-learning process of educational systems, especially in developing countries. The collection of data for the study was effected through the use of questionnaires with sampling drawn by stratified random sampling. The data was analyzed using descriptive and inferential statistics. The findings of the study show that about 30% of developing countries have fully adopted the e-learning system, about 45% of these countries are still struggling to upgrade while about 25% of these countries are yet to adopt the e-learning system of education. The study concludes that the sudden closure of educational institutions around the world during the Covid Pandemic period should facilitate a teaching pedagogy of e-learning and virtual delivery of courses and programmes in these developing countries. If this approach can be fully adopted, schools might have to grapple with the initial teething problems, given the sudden transition just in order to preserve the welfare of students. While progress should be made to transit as the case may be, lectures and seminars can be delivered through the web conferencing site-zoom. Interestingly, this can be done on a mobile phone. The demands of this approach would equally allow lecturers to make major changes to their work habits, uploading their teaching materials online, and get to grips with what online lecturing entails. Consequently, the study recommends that leaders of developing countries, regulatory authorities, and heads of educational institutions must adopt e-learning into their educational system. Also, e-learning should be adopted into the educational curriculum of students, especially from elementary school up to tertiary level. Total compliance to the e-learning system must be ensured on the part of both the institutions, stake holders, lecturers, tutors, and students. Finally, collaborations with developed countries and effective funding for e-learning integration must form the heart of their cardinal mission.Keywords: Covid pandemic, developing countries, educational system, e-learning
Procedia PDF Downloads 1002017 Convergence and Stability in Federated Learning with Adaptive Differential Privacy Preservation
Authors: Rizwan Rizwan
Abstract:
This paper provides an overview of Federated Learning (FL) and its application in enhancing data security, privacy, and efficiency. FL utilizes three distinct architectures to ensure privacy is never compromised. It involves training individual edge devices and aggregating their models on a server without sharing raw data. This approach not only provides secure models without data sharing but also offers a highly efficient privacy--preserving solution with improved security and data access. Also we discusses various frameworks used in FL and its integration with machine learning, deep learning, and data mining. In order to address the challenges of multi--party collaborative modeling scenarios, a brief review FL scheme combined with an adaptive gradient descent strategy and differential privacy mechanism. The adaptive learning rate algorithm adjusts the gradient descent process to avoid issues such as model overfitting and fluctuations, thereby enhancing modeling efficiency and performance in multi-party computation scenarios. Additionally, to cater to ultra-large-scale distributed secure computing, the research introduces a differential privacy mechanism that defends against various background knowledge attacks.Keywords: federated learning, differential privacy, gradient descent strategy, convergence, stability, threats
Procedia PDF Downloads 292016 Comparison between RILM, JSTOR, and WorldCat Used to Search for Secondary Literature
Authors: Stacy Jarvis
Abstract:
Databases such as JSTOR, RILM and WorldCat have been the main source and storage of literature in the music orb. The Reference Index to Music Literature is a bibliographic database of over 2.6 million citations to writings about music from over 70 countries. The Research Institute produces RILM for the Study of Music at the University of Buffalo. JSTOR is an e-library of academic journals, books, and primary sources. Database JSTOR helps scholars find, utilise, and build upon a vast range of literature through a powerful teaching and research platform. Another database, WorldCat, is the world's biggest library catalogue, assisting scholars in finding library materials online. An evaluation of these databases in the music sphere is conducted by looking into the description and intended use and finding similarities and differences among them. Through comparison, it is found that these aim to serve different purposes, though they have the same goal of providing and storing literature. Also, since each database has different parts of literature that it majors on, the intended use of the three databases is evaluated. This can be found in the description, scope, and intended uses section. These areas are crucial to the research as it addresses the functional or literature differences among the three databases. It is also found that these databases have different quantitative potentials. This is determined by addressing the year each database began collecting literature and the number of articles, periodicals, albums, conference proceedings, music, dissertations, digital media, essays collections, journal articles, monographs, online resources, reviews, and reference materials that can be found in each one of them. This can be found in the sections- description, scope and intended uses and the importance of the database in identifying literature on different topics. To compare the delivery of services to the users, the importance of databases in identifying literature on different topics is also addressed in the section -the importance of databases in identifying literature on different topics. Even though these databases are used in research, they all have disadvantages and advantages. This is addressed in the sections on advantages and disadvantages. This will be significant in determining which of the three is the best. Also, it will help address how the shortcomings of one database can be addressed by utilising two databases together while conducting research. It is addressed in the section- a combination of RILM and JSTOR. All this information revolves around the idea that a huge amount of quantitative and qualitative data can be found in the presented databases on music and digital content; however, each of the given databases has a different construction and material features contributing to the musical scholarship in its way.Keywords: RILM, JSTOR, WorldCat, database, literature, research
Procedia PDF Downloads 812015 Research on Quality Assurance in African Higher Education: A Bibliometric Mapping from 1999 to 2019
Authors: Luís M. João, Patrício Langa
Abstract:
The article reviews the literature on quality assurance (QA) in African higher education studies (HES) conducted through a bibliometric mapping of published papers between 1999 and 2019. Specifically, the article highlights the nuances of knowledge production in four scientific databases: Scopus, Web of Science (WoS), African Journal Online (AJOL), and Google Scholar. The analysis included 531 papers, of which 127 are from Scopus, 30 are from Web of Science, 85 are from African Journal Online, and 259 are from Google Scholar. In essence, 284 authors wrote these papers from 231 institutions and 69 different countries (i.e., Africa=54 and outside Africa=15). Results indicate the existing knowledge. This analysis allows the readers to understand the growth and development of the field during the two-decade period, identify key contributors, and observe potential trends or gaps in the research. The paper employs bibliometric mapping as its primary analytical lens. By utilizing this method, the study quantitatively assesses the publications related to QA in African HES, helping to identify patterns, collaboration networks, and disparities in research output. The bibliometric approach allows for a systematic and objective analysis of large datasets, offering a comprehensive view of the knowledge production in the field. Furthermore, the study highlights the lack of shared resources available to enhance quality in higher education institutions (HEIs) in Africa. This finding underscores the importance of promoting collaborative research efforts, knowledge exchange, and capacity building within the region to improve the overall quality of higher education. The paper argues that despite the growing quantity of QA research in African higher education, there are challenges related to citation impact and access to high-impact publication avenues for African researchers. It emphasises the need to promote collaborative research and resource-sharing to enhance the quality of HEIs in Africa. The analytical lenses of bibliometric mapping and the examination of publication players' scenarios contribute to a comprehensive understanding of the field and its implications for African higher education.Keywords: Africa, bibliometric research, higher education studies, quality assurance, scientific database, systematic review
Procedia PDF Downloads 412014 Microbial Diversity Assessment in Household Point-of-Use Water Sources Using Spectroscopic Approach
Authors: Syahidah N. Zulkifli, Herlina A. Rahim, Nurul A. M. Subha
Abstract:
Sustaining water quality is critical in order to avoid any harmful health consequences for end-user consumers. The detection of microbial impurities at the household level is the foundation of water security. Water quality is now monitored only at water utilities or infrastructure, such as water treatment facilities or reservoirs. This research provides a first-hand scientific understanding of microbial composition presence in Malaysia’s household point-of-use (POUs) water supply influenced by seasonal fluctuations, standstill periods, and flow dynamics by using the NIR-Raman spectroscopic technique. According to the findings, 20% of water samples were contaminated by pathogenic bacteria, which are Legionella and Salmonella cells. A comparison of the spectra reveals significant signature peaks (420 cm⁻¹ to 1800 cm⁻¹), including species-specific bands. This demonstrates the importance of regularly monitoring POUs water quality to provide a safe and clean water supply to homeowners. Conventional Raman spectroscopy, up-to-date, is no longer suited for real-time monitoring. Therefore, this study introduced an alternative micro-spectrometer to give a rapid and sustainable way of monitoring POUs water quality. Assessing microbiological threats in water supply becomes more reliable and efficient by leveraging IoT protocol.Keywords: microbial contaminants, water quality, water monitoring, Raman spectroscopy
Procedia PDF Downloads 1082013 Regulation on the Protection of Personal Data Versus Quality Data Assurance in the Healthcare System Case Report
Authors: Elizabeta Krstić Vukelja
Abstract:
Digitization of personal data is a consequence of the development of information and communication technologies that create a new work environment with many advantages and challenges, but also potential threats to privacy and personal data protection. Regulation (EU) 2016/679 of the European Parliament and of the Council is becoming a law and obligation that should address the issues of personal data protection and information security. The existence of the Regulation leads to the conclusion that national legislation in the field of virtual environment, protection of the rights of EU citizens and processing of their personal data is insufficiently effective. In the health system, special emphasis is placed on the processing of special categories of personal data, such as health data. The healthcare industry is recognized as a particularly sensitive area in which a large amount of medical data is processed, the digitization of which enables quick access and quick identification of the health insured. The protection of the individual requires quality IT solutions that guarantee the technical protection of personal categories. However, the real problems are the technical and human nature and the spatial limitations of the application of the Regulation. Some conclusions will be drawn by analyzing the implementation of the basic principles of the Regulation on the example of the Croatian health care system and comparing it with similar activities in other EU member states.Keywords: regulation, healthcare system, personal dana protection, quality data assurance
Procedia PDF Downloads 372012 An Informetrics Analysis of Research on Phishing in Scopus and Web of Science Databases from 2012 to 2021
Authors: Nkosingiphile Mbusozayo Zungu
Abstract:
The purpose of the current study is to adopt informetrics methods to analyse the research on phishing from 2012 to 2021 in three selected databases in order to contribute to global cybersecurity through impactful research. The study follows a quantitative research methodology. We opted for the positivist epistemology and objectivist ontology. The analysis focuses on: (i) the productivity of individual authors, institutions, and countries; (ii) the research contributions, using co-authorship as a measure of collaboration; (iii) the altmetrics of selected research contributions; (iv) the citation patterns and research impact of research on phishing; and (v) research contributions by keywords, to discover the concepts that are related to phishing. The preliminary findings favour developed countries in terms of quantity and quality of research in the domain. There are unique research trends and patterns in the developing countries, including those in Africa, that provide opportunities for research development in the domain in the region. This study explores an important research domain by using unexplored method in the region. The study supports the SDG Agenda 2030, such as ending abuse, exploitation, trafficking, and all other forms of violence and torture of children through the use of cyberspace (SDG 16). Further, the results from this study can inform research, teaching, and learning largely in Africa. Invariably, the study contributes to cybersecurity awareness that will mitigate cybersecurity threats against vulnerable communities.Keywords: phishing, cybersecurity, informetrics, information security
Procedia PDF Downloads 1112011 Investigation of the Psychological and Sociological Consequences of Facebook Usage towards Saudi Arabia University Students
Authors: Abdullah Alassiri
Abstract:
Prompted by the widespread saturation of Facebook usage in Saudi Arabia, among university students to socialize with online members, this study investigated the usage, self-presentation, psychological and sociological consequences of the Facebook social networking site among undergraduate students in Saudi Arabia. The problem statement of this study was addressed by answering the following questions: 1) What motivation do undergraduate students have for joining Facebook? 2) How do undergraduate students consume Facebook? 3) In what condition do undergraduate students need Facebook? 4) How do undergraduate students manage their self-presentation via Facebook? 5) What are the experiences obtained by the undergraduate students from Facebook psychologically? 6) What are the experiences obtained by the undergraduate students from Facebook sociologically? 7) How have Facebook activities affected the lifestyle of the undergraduate students?. These questions were answered by analyzing in-depth interview data collected from twenty male undergraduate students between the ages of 18 and 24 years selected from King Saud University (KSU) and King Khalid University (KKU) Saudi Arabia. Using thematic analysis, informants data were coded ‘R1 to R20’, validated and was transcribed to minimize error from translating into the study items from Arabic back to the English Language. Using purposive sampling method, informant perspective within the research context were explored. Data collection was confined to students’ motivations for engaging in online activities, self-presentation, psychological and sociological consequences to their everyday life was investigated based on the theoretical and philosophical perspective underpinnings media and gratification paradigm and social influence theory. The findings contributed to the development of important study themes that supported the development of a new research framework. Based on the analysis, all the study questions were answered. The findings of this study showed that the students use Facebook for the purpose of interacting with others, getting information and as knowledge sources. In terms of self-presentation, this study revealed that the students portray themselves in the real and not fake image while socializing with others. Psychological and sociological consequences from the usage of Facebook are recorded ranging from cheerful to stress and from loneliness to having many friends. As a conclusion, this study conclusively drew that Facebook is a very persuasive medium of communication among the University students in Saudi Arabia that bridges across socio-cultural boundaries and unite students to interact as a community.Keywords: Saudi Arabia, Facebook, undergraduate students, social network
Procedia PDF Downloads 1652010 Impact of Global Climate Change on Economy of Pakistan: How to Ensure Sustainable Food and Energy Production
Authors: Sabahat Zahra
Abstract:
The purpose of this research is to present the changing global environment and its potential impacts on sustainable food and energy production at global level, particularly in Pakistan. The food and energy related-economic sector has been subjected to negative consequences due to recent extreme changes in weather conditions, particularly in developing countries. Besides continuous modifications in weather, population is also increasing by time, therefore it is necessary to take special steps and start effective initiatives to cope with the challenges of food and energy security to fight hunger and for economic stability of country. Severe increase in temperature and heat waves has also negative impacts on food production as well as energy sustainability. Energy (in terms of electricity) consumption has grown up than the production potential of the country as a consequence of increasing warm weather. Ultimately prices gone up when there is more consumption than production. Therefore, all these aspects of climate change are interrelated with socio-economic issues. There is a need to develop long-term policies on regional and national levels for maintainable economic growth. This research presents a framework-plan and recommendations for implementation needed to mitigate the potential threats due to global climate change sustainable food and energy production under climate change in the country.Keywords: climate changes, energy security, food security, global climate change
Procedia PDF Downloads 3482009 Africa as Endemically a War Continent: Explaining the Changing Pattern of Armed Conflicts in Africa
Authors: Kenneth Azaigba
Abstract:
The history of post-colonial African States has been dubbed a history of endemic warfare in existing literature. Indeed, Africa political environment is characterized by a multiplicity of threats to peace and security. Africa's leading drivers of conflict include abundant (especially mineral) resources, personal rule and attendant political authoritarianism, manipulation of identity politics across ethnicity, marginalization of communities, as well as electoral mal-practices resulting in contested legitimacy and resultant violence. However, the character of armed conflicts in Africa is changing. This paper attempts to reconstruct the trajectory of armed conflicts in Africa and explain the changing pattern of armed conflict. The paper contends that large scale political violence in Africa is on the decline rendering the endemic thesis an inappropriate paradigm in explaining political conflicts in Africa. The paper also posits that though small scale conflicts are springing up and exhibiting trans-border dimensions, these patterns of armed conflicts are not peculiar to Africa but emerging waves of global conflicts. The paper explains that the shift in the scale of warfare in Africa is a function of a multiplicity of post-cold war global contradictions. Inclusive governance, social justice and economic security are articulated as workable panaceas for mitigating warfare in Africa.Keywords: Africa, conflicts, pattern, war
Procedia PDF Downloads 385