Search results for: research data sharing
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 39944

Search results for: research data sharing

38654 Sustainable Framework Integration for Construction Project Management: A Multi-Dimensional Analysis

Authors: Tharaki S. Hettiarachchi

Abstract:

Sustainable construction has gained massive attention in the present world as the construction industry is highly responsible for carbon emissions and other types of unsustainable practices. Yet, the construction industry has not been able to completely attain sustainable goals. Therefore, the present study aims to identify the extent to which sustainability has been considered within the scope of construction project management and to analyze the challenges, gaps, and constraints associated. Accordingly, this study develops a sustainable framework to integrate in construction project management. In accomplishing the research aim, this research integrates a qualitative approach while relying on secondary data sources. The data shall be then analyzed with the use of a systematic literature review (SLR) method while following the PRISMA (2020) guideline and represented in a statistical form. The outcomes of this study may become highly significant in identifying the nature of the existing sustainable frameworks associated with construction project management scopes and to develop a new framework to integrate in order to enhance the effectiveness of sustainable applications in construction management. The outcomes of this research may benefit present and future construction professionals and academicians to organize sustainable construction-related knowledge in a useful way to apply in practical implementation for effective project management. Overall, this study directs present and future construction professionals toward an advanced construction project management mechanism.

Keywords: construction, framework development, project management, sustainability

Procedia PDF Downloads 41
38653 Barriers to Teachers' Use of Technology in Nigeria and Its Implications in the Academic Performance of Students of Higher Learning: A Case Study of Adeniran Ogunsanya College of Education, Lagos

Authors: Iyabo Aremu

Abstract:

The role of the teacher in stirring a qualitative and distinctive knowledge-driven and value-laden environment with modern teaching practices cannot be over accentuated. In spite of the myriad advantages the use of Information and Communication Technology (ICT) promises, many teachers are still at the rear of this archetypical transition. These teachers; notable forces needed to elicit positive academic performances of students of higher learning are ill-equipped for the task. In view of this, the research work sought to assess how teachers have been able to effectively apply ICT tools to improve students’ academic performance in the higher institution and to evaluate the challenges faced by teachers in using these tools. Thus, the research adopted descriptive survey research design and involved a sample of 25 lecturers from five schools in the study area: Adeniran Ogunsanya College of Education (AOCOED). The barrier to Teachers’ Use of ICT Questionnaire (BTUICTQ) was used to gather data from these respondents. The data gathered was tested with chi-square at 0.05 level of significance. The results revealed that the perception and attitude of teachers towards the use of ICT is not favourable. It was also discovered that teachers suffer from gaps in ICT knowledge and skills. Finally, the research showed that lack of training and inadequate support is a major challenge teacher contend with. The study recommended that teachers should be given adequate training and support and that teachers’ unrestricted access to ICT gadgets should be ensured by schools.

Keywords: ICT, teachers, AOCOED, academic performance

Procedia PDF Downloads 142
38652 Researching Apache Hama: A Pure BSP Computing Framework

Authors: Kamran Siddique, Yangwoo Kim, Zahid Akhtar

Abstract:

In recent years, the technological advancements have led to a deluge of data from distinctive domains and the need for development of solutions based on parallel and distributed computing has still long way to go. That is why, the research and development of massive computing frameworks is continuously growing. At this particular stage, highlighting a potential research area along with key insights could be an asset for researchers in the field. Therefore, this paper explores one of the emerging distributed computing frameworks, Apache Hama. It is a Top Level Project under the Apache Software Foundation, based on Bulk Synchronous Processing (BSP). We present an unbiased and critical interrogation session about Apache Hama and conclude research directions in order to assist interested researchers.

Keywords: apache hama, bulk synchronous parallel, BSP, distributed computing

Procedia PDF Downloads 231
38651 A Privacy Protection Scheme Supporting Fuzzy Search for NDN Routing Cache Data Name

Authors: Feng Tao, Ma Jing, Guo Xian, Wang Jing

Abstract:

Named Data Networking (NDN) replaces IP address of traditional network with data name, and adopts dynamic cache mechanism. In the existing mechanism, however, only one-to-one search can be achieved because every data has a unique name corresponding to it. There is a certain mapping relationship between data content and data name, so if the data name is intercepted by an adversary, the privacy of the data content and user’s interest can hardly be guaranteed. In order to solve this problem, this paper proposes a one-to-many fuzzy search scheme based on order-preserving encryption to reduce the query overhead by optimizing the caching strategy. In this scheme, we use hash value to ensure the user’s query safe from each node in the process of search, so does the privacy of the requiring data content.

Keywords: NDN, order-preserving encryption, fuzzy search, privacy

Procedia PDF Downloads 467
38650 Factors Affecting Consumers’ Willingness to Pay for Chicken Meat from Biosecure Farms

Authors: Veronica Sri Lestari, Asmuddin Natsir, Hasmida Karim, Ian Patrick

Abstract:

The research aimed at investigating the factors affecting consumers’ willingness to pay for chicken meat from biosecure farms. The research was conducted in Makassar City, South Sulawesi Province, Indonesia. Samples were taken using random sampling technique in two supermarkets namely Lotte Mart and Gelael. Total samples were 50 respondents which comprised the chicken meat consumers. To find out the consumers’ willingness to pay for chicken meat from the biosecure farms, the contingent valuation method was utilized. Data were collected through interviews and questionnaires. Probit Logistic was estimated to examine the factors affecting the consumers’ willingness to pay for at the premium price for chicken meat from the biosecure farms. The research indicates that the education and income affect significantly the consumers’ willingness to pay for chicken meat from the biosecure farms (P < 0.05). The results of the study will be beneficial for the policy makers, producers, consumers and those conducting research.

Keywords: biosecure, chicken, farms, consumer, willingness-to-pay

Procedia PDF Downloads 262
38649 Spectrum Allocation Using Cognitive Radio in Wireless Mesh Networks

Authors: Ayoub Alsarhan, Ahmed Otoom, Yousef Kilani, Abdel-Rahman al-GHuwairi

Abstract:

Wireless mesh networks (WMNs) have emerged recently to improve internet access and other networking services. WMNs provide network access to the clients and other networking functions such as routing, and packet forwarding. Spectrum scarcity is the main challenge that limits the performance of WMNs. Cognitive radio is proposed to solve spectrum scarcity problem. In this paper, we consider a cognitive wireless mesh network where unlicensed users (secondary users, SUs) can access free spectrum that is allocated to spectrum owners (primary users, PUs). Although considerable research has been conducted on spectrum allocation, spectrum assignment is still considered an important challenging problem. This problem can be solved using cognitive radio technology that allows SUs to intelligently locate free bands and access them without interfering with PUs. Our scheme considers several heuristics for spectrum allocation. These heuristics include: channel error rate, PUs activities, channel capacity and channel switching time. Performance evaluation of the proposed scheme shows that the scheme is able to allocate the unused spectrum for SUs efficiently.

Keywords: cognitive radio, dynamic spectrum access, spectrum management, spectrum sharing, wireless mesh networks

Procedia PDF Downloads 511
38648 Building Biodiversity Conservation Plans Robust to Human Land Use Uncertainty

Authors: Yingxiao Ye, Christopher Doehring, Angelos Georghiou, Hugh Robinson, Phebe Vayanos

Abstract:

Human development is a threat to biodiversity, and conservation organizations (COs) are purchasing land to protect areas for biodiversity preservation. However, COs have limited budgets and thus face hard prioritization decisions that are confounded by uncertainty in future human land use. This research proposes a data-driven sequential planning model to help COs choose land parcels that minimize the uncertain human impact on biodiversity. The proposed model is robust to uncertain development, and the sequential decision-making process is adaptive, allowing land purchase decisions to adapt to human land use as it unfolds. The cellular automata model is leveraged to simulate land use development based on climate data, land characteristics, and development threat index from NASA Socioeconomic Data and Applications Center. This simulation is used to model uncertainty in the problem. This research leverages state-of-the-art techniques in the robust optimization literature to propose a computationally tractable reformulation of the model, which can be solved routinely by off-the-shelf solvers like Gurobi or CPLEX. Numerical results based on real data from the Jaguar in Central and South America show that the proposed method reduces conservation loss by 19.46% on average compared to standard approaches such as MARXAN used in practice for biodiversity conservation. Our method may better help guide the decision process in land acquisition and thereby allow conservation organizations to maximize the impact of limited resources.

Keywords: data-driven robust optimization, biodiversity conservation, uncertainty simulation, adaptive sequential planning

Procedia PDF Downloads 188
38647 Predicting National Football League (NFL) Match with Score-Based System

Authors: Marcho Setiawan Handok, Samuel S. Lemma, Abdoulaye Fofana, Naseef Mansoor

Abstract:

This paper is proposing a method to predict the outcome of the National Football League match with data from 2019 to 2022 and compare it with other popular models. The model uses open-source statistical data of each team, such as passing yards, rushing yards, fumbles lost, and scoring. Each statistical data has offensive and defensive. For instance, a data set of anticipated values for a specific matchup is created by comparing the offensive passing yards obtained by one team to the defensive passing yards given by the opposition. We evaluated the model’s performance by contrasting its result with those of established prediction algorithms. This research is using a neural network to predict the score of a National Football League match and then predict the winner of the game.

Keywords: game prediction, NFL, football, artificial neural network

Procedia PDF Downloads 65
38646 The Influence of Audio-Visual Resources in Teaching Business Subjects in Selected Secondary Schools in Ifako Ijaiye Local Government Area of Lagos State, Nigeria

Authors: Oluwole Victor Falobi, Lawrence Olusola Ige

Abstract:

The cardinal drawing force of this study is to examine the influence of audio-visual resources in teaching business subjects in selected secondary schools in IfakoIjaiye Local Government Area of Lagos State, Nigeria. A descriptive survey research design was employed for the study. By using a quantitative research approach and a sample size of 120 students were randomly selected from four public schools. Three research questions with one hypothesis guided the study. Data collected were analysed using frequency, the mean and standard deviation for the research questions, and Pearson Product Moment Correlation PPMC were used to analysed the inferential statistic. Findings from the study revealed that the Influence of audio-visual resources in teaching business subjects in selected secondary schools in IfakoIjaiye Local Government Area of Lagos State is low. It further revealed data the knowledge of teachers on the use of audio-visual resources is high in Ifako Local Government Area. It was recommended that government should create a timely monitoring system in other to check secondary school laboratories and classrooms to replace outdated facilities and also purchase needed facilities for effective teaching and learning to take place.

Keywords: audio-visual resources, business subjects, school, teaching

Procedia PDF Downloads 77
38645 Enhancing Student Learning Outcomes Using Engineering Design Process: Case Study in Physics Course

Authors: Thien Van Ngo

Abstract:

The engineering design process is a systematic approach to solving problems. It involves identifying a problem, brainstorming solutions, prototyping and testing solutions, and evaluating the results. The engineering design process can be used to teach students how to solve problems in a creative and innovative way. The research aim of this study was to investigate the effectiveness of using the engineering design process to enhance student learning outcomes in a physics course. A mixed research method was used in this study. The quantitative data were collected using a pretest-posttest control group design. The qualitative data were collected using semi-structured interviews. The sample was 150 first-year students in the Department of Mechanical Engineering Technology at Cao Thang Technical College in Vietnam in the 2022-2023 school year. The quantitative data were collected using a pretest-posttest control group design. The pretest was administered to both groups at the beginning of the study. The posttest was administered to both groups at the end of the study. The qualitative data were collected using semi-structured interviews with a sample of eight students in the experimental group. The interviews were conducted after the posttest. The quantitative data were analyzed using independent sample T-tests. The qualitative data were analyzed using thematic analysis. The quantitative data showed that students in the experimental group, who were taught using the engineering design process, had significantly higher post-test scores on physics problem-solving than students in the control group, who were taught using the conventional method. The qualitative data showed that students in the experimental group were more motivated and engaged in the learning process than students in the control group. Students in the experimental group also reported that they found the engineering design process to be a more effective way of learning physics. The findings of this study suggest that the engineering design process can be an effective way of enhancing student learning outcomes in physics courses. The engineering design process engages students in the learning process and helps them to develop problem-solving skills.

Keywords: engineering design process, problem-solving, learning outcome of physics, students’ physics competencies, deep learning

Procedia PDF Downloads 57
38644 Community Resilience to Violent Extremism: A Case Study of Swat in the Wake of Operation Rah-E-Raast

Authors: Khushboo Ejaz

Abstract:

Community Resilience to Violent Extremism gain importance in the post 9/11 scenario. Resilience is a word that came from the engineering domain. Prior to 9/11, this word community resilience has been used in disasters and natural hazards. The literature on Community Resilience has been published in different multiethnic and multi-religious communities. There is less data and research done on Pakistan’s Community resilience experience. This research is a case study; how local community showed resilience against violent extremism of Tehrik-e-Taliban Swat in the wake of Operation Rah-e- Raast. Qualitative research based on interviews and focus group discussions from male and female groups of different Tehsils of Swat has been carried out to highlight the Community Resilience to Violent Extremism of Tehrik- e- Taliban and Tehrik- e- Nifaz- e -Shariat- e-Muhamadi (TNSM) .NVivo software has been used for data analysis and highlighting all factors of Community Resilience to Violent extremism (CRVE) in Swat . Recommendations has been made in the end to suggest Civil Society Organizations, NGOs and government departments in order to facilitate and enhance community resilience of tribal and rural areas affected by violent elements in Pakistan. This study will fill the gap in literature related to CRVE policies in Pakistani context.

Keywords: community resilience, operation Rah -e Raast, counter extremism, swat, Pakistan

Procedia PDF Downloads 128
38643 Healthcare Big Data Analytics Using Hadoop

Authors: Chellammal Surianarayanan

Abstract:

Healthcare industry is generating large amounts of data driven by various needs such as record keeping, physician’s prescription, medical imaging, sensor data, Electronic Patient Record(EPR), laboratory, pharmacy, etc. Healthcare data is so big and complex that they cannot be managed by conventional hardware and software. The complexity of healthcare big data arises from large volume of data, the velocity with which the data is accumulated and different varieties such as structured, semi-structured and unstructured nature of data. Despite the complexity of big data, if the trends and patterns that exist within the big data are uncovered and analyzed, higher quality healthcare at lower cost can be provided. Hadoop is an open source software framework for distributed processing of large data sets across clusters of commodity hardware using a simple programming model. The core components of Hadoop include Hadoop Distributed File System which offers way to store large amount of data across multiple machines and MapReduce which offers way to process large data sets with a parallel, distributed algorithm on a cluster. Hadoop ecosystem also includes various other tools such as Hive (a SQL-like query language), Pig (a higher level query language for MapReduce), Hbase(a columnar data store), etc. In this paper an analysis has been done as how healthcare big data can be processed and analyzed using Hadoop ecosystem.

Keywords: big data analytics, Hadoop, healthcare data, towards quality healthcare

Procedia PDF Downloads 389
38642 Exploring Women’S Leadership in China’S Sport National Governing Bodies

Authors: Han Zheng

Abstract:

This research is being conducted to explore women's leadership in China's National Governing Bodies ( in order to identify the barriers to women's leadership and provide feasible solutions. Extensive research has been undertaken internationally, which has identified and acknowledged the underrepresentation of women in leadership positions across multiple industries and global contexts. According to these studies, leadership specifically within the sports industry was both historically and is still currently male-dominated. Within China, the underrepresentation of women in leadership positions is also evident, which women only occupy 16% of the leadership in business enterprises and 5.6% in scientific and technological research institutions, yet there is limited research that has looked to examine why this is the case regarding women's leadership in China, especially within in sports industry. Therefore, this research gap drives the purpose, which aims to explore the current situation of women's leadership in sports National Governing Bodies (NGBs) in China. By using both questionnaires and interviews, data from NGBs in China will be collected. This research will achieve the following three goals: 1, determine the representation level of women's leadership in the target organizations. 2, identify barriers to women's leadership and their causes. 3, provide feasible solutions. Based on the multi-level framework, this study develops a "barrier matrix" framework: according to the analysis of the previous literature, it concludes that there are eight main barriers that hinder the development of women's leadership. The research combines qualitative and quantitative analysis, using questionnaires and interviews. Key findings according to the analysis of the primary data collected: 1. The average proportion of female occupational leadership in China's sports NGBs is less than 17.5%. 2. 50.8% of China's sports NGBs have no equal employment opportunity policy. 3. According to the preliminary qualitative analysis of the interviews, it is found that the core barriers affecting women's leadership development are mainly in the following areas: male-dominated culture and gender stereotyping (macro-level), biased organizational policies and procedures (meso-level), work-family conflicts and self-limiting behaviors (micro-level).

Keywords: women leadership, sport management, gender equality, sport leadership, sport NGBs

Procedia PDF Downloads 164
38641 Green Intellectual Capital and Green Supply Chain Performance

Authors: Mohammed Ibrahim Bu Haya, Abdelmoneim Bahyeldin Mohamed Metwally

Abstract:

This paper examines the impact of Green Intellectual Capital (GIC) on Green Supply Chain Performance (GSCP). Further, the study examines the moderating role of external pressures (EP) on the relationship between GIC and GSCP. Data were collected from employees working in Egyptian hotels and tourism companies (N= 366). The collected data were analyzed using smart partial least squares (Smart-PLS) software. The current research indicated that there is a positive and significant impact of all GIC components on GSCP. The results also revealed that EP were found to moderate the relationship between GIC and GSCP. The study model was able to explain 63.1% of the variance in GSCP. The findings of this study serve as a pivotal yardstick for guiding corporate policy formulation, offering valuable insights to drive continuous improvements in supply chain management and performance. Furthermore, the research holds substantial implications for managerial strategies by shedding light on the potential of GIC and EP to elevate GSCP. Positioned as one of the initial studies to delve into the moderating role of EP in the relationship between GIC and GSCP, this research offers insights within an emerging market context.

Keywords: green intellectual capital, green supply chain, supply chain performance, external pressures, emerging economy, Egypt

Procedia PDF Downloads 41
38640 Examining Language as a Crucial Factor in Determining Academic Performance: A Case of Business Education in Hong Kong

Authors: Chau So Ling

Abstract:

I.INTRODUCTION: Educators have always been interested in exploring factors that contribute to students’ academic success. It is beyond question that language, as a medium of instruction, will affect student learning. This paper tries to investigate whether language is a crucial factor in determining students’ achievement in their studies. II. BACKGROUND AND SIGNIFICANCE OF STUDY: The issue of using English as a medium of instruction in Hong Kong is a special topic because Hong Kong is a post-colonial and international city which a British colony. In such a specific language environment, researchers in the education field have always been interested in investigating students’ language proficiency and its relation to academic achievement and other related educational indicators such as motivation to learn, self-esteem, learning effectiveness, self-efficacy, etc. Along this line of thought, this study specifically focused on business education. III. METHODOLOGY: The methodology in this study involved two sequential stages, namely, a focus group interview and a data analysis. The whole study was directed towards both qualitative and quantitative aspects. The subjects of the study were divided into two groups. For the first group participating in the interview, a total of ten high school students were invited. They studied Business Studies, and their English standard was varied. The theme of the discussion was “Does English affect your learning and examination results of Business Studies?” The students were facilitated to discuss the extent to which English standard affected their learning of Business subjects and requested to rate the correlation between English and performance of Business Studies on a five-point scale. The second stage of the study involved another group of students. They were high school graduates who had taken the public examination for entering universities. A database containing their public examination results for different subjects has been obtained for the purpose of statistical analysis. Hypotheses were tested and evidence was obtained from the focus group interview to triangulate the findings. V. MAJOR FINDINGS AND CONCLUSION: By sharing of personal experience, the discussion of focus group interviews indicated that higher English standards could help the students achieve better learning and examination performance. In order to end the interview, the students were asked to indicate the correlation between English proficiency and performance of Business Studies on a five-point scale. With point one meant least correlated, ninety percent of the students gave point four for the correlation. The preliminary results illustrated that English plays an important role in students’ learning of Business Studies, or at least this was what the students perceived, which set the hypotheses for the study. After conducting the focus group interview, further evidence had to be gathered to support the hypotheses. The data analysis part tried to find out the relationship by correlating the students’ public examination results of Business Studies and levels of English standard. The results indicated a positive correlation between their English standard and Business Studies examination performance. In order to highlight the importance of the English language to the study of Business Studies, the correlation between the public examination results of other non-business subjects was also tested. Statistical results showed that language does play a role in affecting students’ performance in studying Business subjects than the other subjects. The explanation includes the dynamic subject nature, examination format and study requirements, the specialist language used, etc. Unlike Science and Geography, students in their learning process might find it more difficult to relate business concepts or terminologies to their own experience, and there are not many obvious physical or practical activities or visual aids to serve as evidence or experiments. It is well-researched in Hong Kong that English proficiency is a determinant of academic success. Other research studies verified such a notion. For example, research revealed that the more enriched the language experience, the better the cognitive performance in conceptual tasks. The ability to perform this kind of task is particularly important to students taking Business subjects. Another research was carried out in the UK, which was geared towards identifying and analyzing the reasons for underachievement across a cohort of GCSE students taking Business Studies. Results showed that weak language ability was the main barrier to raising students’ performance levels. It seemed that the interview result was successfully triangulated with data findings. Although education failure cannot be restricted to linguistic failure and language is just one of the variables to play in determining academic achievement, it is generally accepted that language does affect students’ academic performance. It is just a matter of extent. This paper provides recommendations for business educators on students’ language training and sheds light on more research possibilities in this area.

Keywords: academic performance, language, learning, medium of instruction

Procedia PDF Downloads 98
38639 Insights into the Assessment of Intercultural Competence of Female University Students in the KSA

Authors: Agnes Havril

Abstract:

The aim of this paper is to introduce some partial findings of an ongoing research project which is investigating the improvement of intercultural competence of Saudi female university students in English as a Second Language academic environment at the multicultural Jazan University. Since previous research results support the idea that this university generation has the desire to become interculturally or globally competent university students, the present-day investigation is focusing on the assessment of Saudi-specific cultural terms and intercultural competence components in comparison with the Anglo-Saxon oriented western perspective of intercultural competence theories and models. On this stage of the research quantitative research methodology is applied and a survey is being conducted among the female university students in different academic specializations. This paper discusses some empirical data with the aim of identifying and evaluating certain supplementary aspects of intercultural dimensions and components of the intercultural competence construct. The research results also highlight several gender issues in the gender separated higher education in the Kingdom of Saudi Arabia.

Keywords: gender separation, globally competent university student, intercultural competence, intercultural competence construct, higher education

Procedia PDF Downloads 325
38638 A Fuzzy TOPSIS Based Model for Safety Risk Assessment of Operational Flight Data

Authors: N. Borjalilu, P. Rabiei, A. Enjoo

Abstract:

Flight Data Monitoring (FDM) program assists an operator in aviation industries to identify, quantify, assess and address operational safety risks, in order to improve safety of flight operations. FDM is a powerful tool for an aircraft operator integrated into the operator’s Safety Management System (SMS), allowing to detect, confirm, and assess safety issues and to check the effectiveness of corrective actions, associated with human errors. This article proposes a model for safety risk assessment level of flight data in a different aspect of event focus based on fuzzy set values. It permits to evaluate the operational safety level from the point of view of flight activities. The main advantages of this method are proposed qualitative safety analysis of flight data. This research applies the opinions of the aviation experts through a number of questionnaires Related to flight data in four categories of occurrence that can take place during an accident or an incident such as: Runway Excursions (RE), Controlled Flight Into Terrain (CFIT), Mid-Air Collision (MAC), Loss of Control in Flight (LOC-I). By weighting each one (by F-TOPSIS) and applying it to the number of risks of the event, the safety risk of each related events can be obtained.

Keywords: F-topsis, fuzzy set, flight data monitoring (FDM), flight safety

Procedia PDF Downloads 151
38637 The Role of Social Media in Growing Small and Medium Enterprises: An Empirical Study in Jordan

Authors: Hanady Al-Zagheer

Abstract:

The purpose of this paper research is to introduce the role of the social media (face book) in growing small and medium enterprises in Jordan, Today’s developments of information technologies are dazzling. Using information technologies results in having advantages in competition, decreasing costs, gaining time, and getting and sharing information. Now it is possible to state that there are different types of usage within the information technologies. Small and medium enterprises have been grown rapidly in recent years and continue to grow. Jordanian females have played a large role in the growth of entrepreneurship and have made an impact on household economics. Virtual storefronts have allowed these women to balance roles assigned by tradition and culture while becoming successful providers. If you have a small business with a limited public relations and advertising budget, Facebook can be a cost effective way to promote your services because opening an account is free. However, this can work against you if you do not maintain the page. A Face book page without frequent updates can destroy your brand value and image. According to a 2009 Computerworld article by Lisa Hoover, having a Facebook page that looks abandoned is worse than having no page at all. You might need to hire someone or pay an employee to update your business’s Facebook page.

Keywords: social media, social media small, medium enterprises, Jordan

Procedia PDF Downloads 303
38636 Cybersecurity Challenges and Solutions in ICT Management at the Federal Polytechnic, Ado-Ekiti: A Quantitative Study

Authors: Innocent Uzougbo Onwuegbuzie, Siene Elizabeth Eke

Abstract:

This study investigates cybersecurity challenges and solutions in managing Information and Communication Technology (ICT) at the Federal Polytechnic, Ado-Ekiti, South-West Nigeria. The rapid evolution of ICT has revolutionized organizational operations and impacted various sectors, including education, healthcare, and finance. While ICT advancements facilitate seamless communication, complex data analytics, and strategic decision-making, they also introduce significant cybersecurity risks such as data breaches, ransomware, and other malicious attacks. These threats jeopardize the confidentiality, integrity, and availability of information systems, necessitating robust cybersecurity measures. The primary aim of this research is to identify prevalent cybersecurity challenges in ICT management, evaluate their impact on the institution's operations, and assess the effectiveness of current cybersecurity solutions. Adopting a quantitative research approach, data was collected through surveys and structured questionnaires from students, staff, and IT professionals at the Federal Polytechnic, Ado-Ekiti. The findings underscore the critical need for continuous investment in cybersecurity technologies, employee and student training, and regulatory compliance to mitigate evolving cyber threats. This research contributes to bridging the knowledge gap in cybersecurity management and provides valuable insights into effective strategies and technologies for safeguarding ICT systems in educational institutions. The study's objectives are to enhance the security posture of the Federal Polytechnic, Ado-Ekiti, in an increasingly digital world by identifying and addressing the cybersecurity challenges faced by its ICT management.

Keywords: cybersecurity challenges, cyber threat mitigation, federal polytechnic Ado-Ekiti, ICT management

Procedia PDF Downloads 8
38635 Forensic Analysis of Signal Messenger on Android

Authors: Ward Bakker, Shadi Alhakimi

Abstract:

The amount of people moving towards more privacy focused instant messaging applications has grown significantly. Signal is one of these instant messaging applications, which makes Signal interesting for digital investigators. In this research, we evaluate the artifacts that are generated by the Signal messenger for Android. This evaluation was done by using the features that Signal provides to create artifacts, whereafter, we made an image of the internal storage and the process memory. This image was analysed manually. The manual analysis revealed the content that Signal stores in different locations during its operation. From our research, we were able to identify the artifacts and interpret how they were used. We also examined the source code of Signal. Using our obtain knowledge from the source code, we developed a tool that decrypts some of the artifacts using the key stored in the Android Keystore. In general, we found that most artifacts are encrypted and encoded, even after decrypting some of the artifacts. During data visualization, some artifacts were found, such as that Signal does not use relationships between the data. In this research, two interesting groups of artifacts were identified, those related to the database and those stored in the process memory dump. In the database, we found plaintext private- and group chats, and in the memory dump, we were able to retrieve the plaintext access code to the application. Nevertheless, we conclude that Signal contains a wealth of artifacts that could be very valuable to a digital forensic investigation.

Keywords: forensic, signal, Android, digital

Procedia PDF Downloads 67
38634 Big Data and Analytics in Higher Education: An Assessment of Its Status, Relevance and Future in the Republic of the Philippines

Authors: Byron Joseph A. Hallar, Annjeannette Alain D. Galang, Maria Visitacion N. Gumabay

Abstract:

One of the unique challenges provided by the twenty-first century to Philippine higher education is the utilization of Big Data. The higher education system in the Philippines is generating burgeoning amounts of data that contains relevant data that can be used to generate the information and knowledge needed for accurate data-driven decision making. This study examines the status, relevance and future of Big Data and Analytics in Philippine higher education. The insights gained from the study may be relevant to other developing nations similarly situated as the Philippines.

Keywords: big data, data analytics, higher education, republic of the philippines, assessment

Procedia PDF Downloads 323
38633 A Comparative Evaluation on the Quality of Products and Quality of Services of the Five Selected Fast Food Restaurants in Manila

Authors: M. Pagasa Nanette Rotairo

Abstract:

The research focuses on the effectiveness, responsiveness, adequacy, and appropriateness of customer service of selected fast food restaurant using William Dunn’s four evaluation criteria tantamount to the focus of the research. Due to efficiency the fast food restaurants offer and the increasing demand for acquiring its services, the researcher conducted a study on the effectiveness of customer service of five popular restaurants in Metro Manila. Using descriptive method, the research is furthered in par with evaluation and implementation of different instruments effective for data gathering to further scientific judgment. Results of this research indicate that consumers consider the quality service as the major reason in patronizing fast food restaurants while they consider cleanliness and customer satisfaction as their least concern. Details of this study provided support on how the proposed operational model can further improve the services of fast food restaurants.

Keywords: customer satisfaction, customer service, restaurant management, business operations

Procedia PDF Downloads 192
38632 Extracting Terrain Points from Airborne Laser Scanning Data in Densely Forested Areas

Authors: Ziad Abdeldayem, Jakub Markiewicz, Kunal Kansara, Laura Edwards

Abstract:

Airborne Laser Scanning (ALS) is one of the main technologies for generating high-resolution digital terrain models (DTMs). DTMs are crucial to several applications, such as topographic mapping, flood zone delineation, geographic information systems (GIS), hydrological modelling, spatial analysis, etc. Laser scanning system generates irregularly spaced three-dimensional cloud of points. Raw ALS data are mainly ground points (that represent the bare earth) and non-ground points (that represent buildings, trees, cars, etc.). Removing all the non-ground points from the raw data is referred to as filtering. Filtering heavily forested areas is considered a difficult and challenging task as the canopy stops laser pulses from reaching the terrain surface. This research presents an approach for removing non-ground points from raw ALS data in densely forested areas. Smoothing splines are exploited to interpolate and fit the noisy ALS data. The presented filter utilizes a weight function to allocate weights for each point of the data. Furthermore, unlike most of the methods, the presented filtering algorithm is designed to be automatic. Three different forested areas in the United Kingdom are used to assess the performance of the algorithm. The results show that the generated DTMs from the filtered data are accurate (when compared against reference terrain data) and the performance of the method is stable for all the heavily forested data samples. The average root mean square error (RMSE) value is 0.35 m.

Keywords: airborne laser scanning, digital terrain models, filtering, forested areas

Procedia PDF Downloads 127
38631 Overcoming Urban Challenges through Culture and Social Sustainability in Caracas’ Barrios

Authors: Gabriela Quintana Vigiola

Abstract:

Social sustainability is an issue scarcely addressed by different authors, being one of its key factors the psychosocial processes of sense of place, sense of community and appropriation. In Caracas’s barrios (Venezuela) these were developed through sharing the construction of the place and different struggles that brought the neighbours together. However, one of the main problems they face is criminal violence, hence being its social sustainability threatened and affected by it. This matter can be addressed by acknowledging communities’ sense of place and engaging in cultural events.

Keywords: Caracas’ barrios, cultural engagement, developing countries, social sustainability

Procedia PDF Downloads 447
38630 Distance Training Packages on Providing for Learner with Special Needs

Authors: Jareeluk Ratanaphan

Abstract:

The purposed of this research were; 1.To survey the teacher’s needs on knowledge about special education management for special needs learner 2.To development of distance training packages on providing for learner with special needs. 3. To study the effects of using the packages on trainee’s achievement. 4. To study the effects of using the packages on trainee’s opinion on the distance training packages. The design of the experiment was research and development. The research sample for survey were 86 teachers, and 22 teachers for study the effects of using the packages on achievement and opinion. The research instrument comprised: 1) training packages on special education management for special needs learner 2) achievement test 3) questionnaire. Mean, percentage, standard deviation, t-test and content analysis were used for data analysis. The findings of the research were as follows: 1. The teacher’s needs on knowledge about teaching for learner with learning disability, mental retardation, autism, physical and health impairment and research in special education. 2. The package composed of special education management for special needs student document and manual of distance training packages. The efficiency of packages was established at 79.50/81.35. 3. The results of using the packages were the posttest average scores of trainee’s achievement were higher than pretest. 4. The trainee’s opinion on the package was at the highest level.

Keywords: distance training, training package, teacher, learner with special needs

Procedia PDF Downloads 321
38629 Protocol for Consumer Research in Academia for Community Marketing Campaigns

Authors: Agnes J. Otjen, Sarah Keller

Abstract:

A Montana university has used applied consumer research in experiential learning with non-profit clients for over a decade. Through trial and error, a successful protocol has been established from problem statement through formative research to integrated marketing campaign execution. In this paper, we describe the protocol and its applications. Analysis was completed to determine the effectiveness of the campaigns and the results of how pre- and post-consumer research mark societal change because of media.

Keywords: consumer, research, marketing, communications

Procedia PDF Downloads 114
38628 Japanese and Europe Legal Frameworks on Data Protection and Cybersecurity: Asymmetries from a Comparative Perspective

Authors: S. Fantin

Abstract:

This study is the result of the legal research on cybersecurity and data protection within the EUNITY (Cybersecurity and Privacy Dialogue between Europe and Japan) project, aimed at fostering the dialogue between the European Union and Japan. Based on the research undertaken therein, the author offers an outline of the main asymmetries in the laws governing such fields in the two regions. The research is a comparative analysis of the two legal frameworks, taking into account specific provisions, ratio legis and policy initiatives. Recent doctrine was taken into account, too, as well as empirical interviews with EU and Japanese stakeholders and project partners. With respect to the protection of personal data, the European Union has recently reformed its legal framework with a package which includes a regulation (General Data Protection Regulation), and a directive (Directive 680 on personal data processing in the law enforcement domain). In turn, the Japanese law under scrutiny for this study has been the Act on Protection of Personal Information. Based on a comparative analysis, some asymmetries arise. The main ones refer to the definition of personal information and the scope of the two frameworks. Furthermore, the rights of the data subjects are differently articulated in the two regions, while the nature of sanctions take two opposite approaches. Regarding the cybersecurity framework, the situation looks similarly misaligned. Japan’s main text of reference is the Basic Cybersecurity Act, while the European Union has a more fragmented legal structure (to name a few, Network and Information Security Directive, Critical Infrastructure Directive and Directive on the Attacks at Information Systems). On an relevant note, unlike a more industry-oriented European approach, the concept of cyber hygiene seems to be neatly embedded in the Japanese legal framework, with a number of provisions that alleviate operators’ liability by turning such a burden into a set of recommendations to be primarily observed by citizens. With respect to the reasons to fill such normative gaps, these are mostly grounded on three basis. Firstly, the cross-border nature of cybercrime brings to consider both magnitude of the issue and its regulatory stance globally. Secondly, empirical findings from the EUNITY project showed how recent data breaches and cyber-attacks had shared implications between Europe and Japan. Thirdly, the geopolitical context is currently going through the direction of bringing the two regions to significant agreements from a trade standpoint, but also from a data protection perspective (with an imminent signature by both parts of a so-called ‘Adequacy Decision’). The research conducted in this study reveals two asymmetric legal frameworks on cyber security and data protection. With a view to the future challenges presented by the strengthening of the collaboration between the two regions and the trans-national fashion of cybercrime, it is urged that solutions are found to fill in such gaps, in order to allow European Union and Japan to wisely increment their partnership.

Keywords: cybersecurity, data protection, European Union, Japan

Procedia PDF Downloads 110
38627 Investigating the Chemical Structure of Drinking Water in Domestic Areas of Kuwait by Appling GIS Technology

Authors: H. Al-Jabli

Abstract:

The research on the presence of heavy metals and bromate in drinking water is of immense scientific significance due to the potential risks these substances pose to public health. These contaminants are subject to regulatory limits outlined by the National Primary Drinking Water Regulations. Through a comprehensive analysis involving the compilation of existing data and the collection of new data via water sampling in residential areas of Kuwait, the aim is to create detailed maps illustrating the spatial distribution of these substances. Furthermore, the investigation will utilize GRAPHER software to explore correlations among different chemical parameters. By implementing rigorous scientific methodologies, the research will provide valuable insights for the Ministry of Electricity and Water and the Ministry of Health. These insights can inform evidence-based decision-making, facilitate the implementation of corrective measures, and support strategic planning for future infrastructure activities.

Keywords: heavy metals, bromate, ozonation, GIS

Procedia PDF Downloads 52
38626 Data Management and Analytics for Intelligent Grid

Authors: G. Julius P. Roy, Prateek Saxena, Sanjeev Singh

Abstract:

Power distribution utilities two decades ago would collect data from its customers not later than a period of at least one month. The origin of SmartGrid and AMI has subsequently increased the sampling frequency leading to 1000 to 10000 fold increase in data quantity. This increase is notable and this steered to coin the tern Big Data in utilities. Power distribution industry is one of the largest to handle huge and complex data for keeping history and also to turn the data in to significance. Majority of the utilities around the globe are adopting SmartGrid technologies as a mass implementation and are primarily focusing on strategic interdependence and synergies of the big data coming from new information sources like AMI and intelligent SCADA, there is a rising need for new models of data management and resurrected focus on analytics to dissect data into descriptive, predictive and dictatorial subsets. The goal of this paper is to is to bring load disaggregation into smart energy toolkit for commercial usage.

Keywords: data management, analytics, energy data analytics, smart grid, smart utilities

Procedia PDF Downloads 764
38625 Understanding the Basics of Information Security: An Act of Defense

Authors: Sharon Q. Yang, Robert J. Congleton

Abstract:

Information security is a broad concept that covers any issues and concerns about the proper access and use of information on the Internet, including measures and procedures to protect intellectual property and private data from illegal access and online theft; the act of hacking; and any defensive technologies that contest such cybercrimes. As more research and commercial activities are conducted online, cybercrimes have increased significantly, putting sensitive information at risk. Information security has become critically important for organizations and private citizens alike. Hackers scan for network vulnerabilities on the Internet and steal data whenever they can. Cybercrimes disrupt our daily life, cause financial losses, and instigate fear in the public. Since the start of the pandemic, most data related cybercrimes targets have been either financial or health information from companies and organizations. Libraries also should have a high interest in understanding and adopting information security methods to protect their patron data and copyrighted materials. But according to information security professionals, higher education and cultural organizations, including their libraries, are the least prepared entities for cyberattacks. One recent example is that of Steven’s Institute of Technology in New Jersey in the US, which had its network hacked in 2020, with the hackers demanding a ransom. As a result, the network of the college was down for two months, causing serious financial loss. There are other cases where libraries, colleges, and universities have been targeted for data breaches. In order to build an effective defense, we need to understand the most common types of cybercrimes, including phishing, whaling, social engineering, distributed denial of service (DDoS) attacks, malware and ransomware, and hacker profiles. Our research will focus on each hacking technique and related defense measures; and the social background and reasons/purpose of hacker and hacking. Our research shows that hacking techniques will continue to evolve as new applications, housing information, and data on the Internet continue to be developed. Some cybercrimes can be stopped with effective measures, while others present challenges. It is vital that people understand what they face and the consequences when not prepared.

Keywords: cybercrimes, hacking technologies, higher education, information security, libraries

Procedia PDF Downloads 115