Search results for: IoT security challenges
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 7924

Search results for: IoT security challenges

6334 A Real-World Roadmap and Exploration of Quantum Computers Capacity to Trivialise Internet Security

Authors: James Andrew Fitzjohn

Abstract:

This paper intends to discuss and explore the practical aspects of cracking encrypted messages with quantum computers. The theory of this process has been shown and well described both in academic papers and headline-grabbing news articles, but with all theory and hyperbole, we must be careful to assess the practicalities of these claims. Therefore, we will use real-world devices and proof of concept code to prove or disprove the notion that quantum computers will render the encryption technologies used by many websites unfit for purpose. It is time to discuss and implement the practical aspects of the process as many advances in quantum computing hardware/software have recently been made. This paper will set expectations regarding the useful lifespan of RSA and cipher lengths and propose alternative encryption technologies. We will set out comprehensive roadmaps describing when and how encryption schemes can be used, including when they can no longer be trusted. The cost will also be factored into our investigation; for example, it would make little financial sense to spend millions of dollars on a quantum computer to factor a private key in seconds when a commodity GPU could perform the same task in hours. It is hoped that the real-world results depicted in this paper will help influence the owners of websites who can take appropriate actions to improve the security of their provisions.

Keywords: quantum computing, encryption, RSA, roadmap, real world

Procedia PDF Downloads 121
6333 Political Transition in Nepal: Challenges and Limitations to Post-Conflict Peace-Building

Authors: Sourina Bej

Abstract:

Since the process of decolonization in 1940, several countries in South Asia have witnessed intra-state conflicts owing to ineffective political governance. The conflicts have remained protracted as the countries have failed to make a holistic transition to a democratic state. Nepal is one such South Asian country facing a turmultous journey from monarchy to republicanism. The paper aims to focus on the democratic transition in the context of Nepal’s political, legal and economic institutions. The presence of autocratic feudalistic and centralised state structure with entrenched socio-economic inequalities has resulted in mass uprising only to see the country slip back to the old order. Even a violent civil war led by the Maoists could not overhaul the political relations or stabilize the democratic space. The paper aims to analyse the multiple political, institutional and operational challenges in the implementation of the peace agreement with the Maoist. Looking at the historical background, the paper will examine the problematic nation-building that lies at the heart of fragile peace process in Nepal. Regional dynamics have played a big role in convoluting the peace-building. The new constitution aimed at conflict resolution brought to the open, deep seated hatred among different ethnic groups in Nepal. Apart from studying the challenges to the peace process and the role of external players like India and China in the political reconstruction, the paper will debate on a viable federal solution to the ethnic conflict in Nepal. If the current government fails to pass a constitution accepted by most ethnic groups, Nepal will remain on the brink of new conflict outbreaks.

Keywords: democratisation, ethnic conflict, Nepal, peace process

Procedia PDF Downloads 271
6332 An Approach of Computer Modalities for Exploration of Hieroglyphics Substantial in an Investigation

Authors: Aditi Chauhan, Neethu S. Mohan

Abstract:

In the modern era, the advancement and digitalization in technology have taken place during an investigation of crime scene. The rapid enhancement and investigative techniques have changed the mean of identification of suspect. Identification of the person is one of the significant aspects, and personal authentication is the key of security and reliability in society. Since early 90 s, people have relied on comparing handwriting through its class and individual characteristics. But in today’s 21st century we need more reliable means to identify individual through handwriting. An approach employing computer modalities have lately proved itself auspicious enough in exploration of hieroglyphics substantial in investigating the case. Various software’s such as FISH, WRITEON, and PIKASO, CEDAR-FOX SYSTEM identify and verify the associated quantitative measure of the similarity between two samples. The research till date has been confined to identify the authorship of the concerned samples. But prospects associated with the use of computational modalities might help to identify disguised writing, forged handwriting or say altered or modified writing. Considering the applications of such modal, similar work is sure to attract plethora of research in immediate future. It has a promising role in national security too. Documents exchanged among terrorist can also be brought under the radar of surveillance, bringing forth their source of existence.

Keywords: documents, identity, computational system, suspect

Procedia PDF Downloads 173
6331 Standard Resource Parameter Based Trust Model in Cloud Computing

Authors: Shyamlal Kumawat

Abstract:

Cloud computing is shifting the approach IT capital are utilized. Cloud computing dynamically delivers convenient, on-demand access to shared pools of software resources, platform and hardware as a service through internet. The cloud computing model—made promising by sophisticated automation, provisioning and virtualization technologies. Users want the ability to access these services including infrastructure resources, how and when they choose. To accommodate this shift in the consumption model technology has to deal with the security, compatibility and trust issues associated with delivering that convenience to application business owners, developers and users. Absent of these issues, trust has attracted extensive attention in Cloud computing as a solution to enhance the security. This paper proposes a trusted computing technology through Standard Resource parameter Based Trust Model in Cloud Computing to select the appropriate cloud service providers. The direct trust of cloud entities is computed on basis of the interaction evidences in past and sustained on its present performances. Various SLA parameters between consumer and provider are considered in trust computation and compliance process. The simulations are performed using CloudSim framework and experimental results show that the proposed model is effective and extensible.

Keywords: cloud, Iaas, Saas, Paas

Procedia PDF Downloads 328
6330 Crowdfunding for Saudi Arabia Green Projects

Authors: Saleh Komies, Mona Alharbi, Razan Alhayyani, Mozah Almulhim, Roseanne Khawaja, Ahmed Alradhi

Abstract:

One of the proposed solutions that faces some challenges is encouraging sustainable energy consumption across Saudi Arabia through crowdfunding platforms. To address these challenges, we need to determine the level of awareness of crowdfunding and green projects, as well as the preferences and willingness of Saudis to utilize crowdfunding as an alternative funding source for green projects in Saudi Arabia. In this study, we aim to determine the influence of environmental awareness and concern on the propensity to crowdfund green projects. The survey is being conducted as part of environmental initiatives to assess public perceptions and opinions on crowdfunding green projects in Saudi Arabia. A total of 450 responses to an online questionnaire distributed via convenience and snowball sampling were utilized for data analysis. The survey reveals that Saudis have a low understanding of crowdfunding concepts and a relatively high understanding of implementing green projects. The public is interested in crowdfunding green projects if there is a return on investment.

Keywords: crowdfunding, green projects, awareness, Saudi Arabia, energy, solar, wind

Procedia PDF Downloads 90
6329 The Agri-Environmental Instruments in Agricultural Policy to Reduce Nitrogen Pollution

Authors: Flavio Gazzani

Abstract:

Nitrogen is an important agricultural input that is critical for the production. However, the introduction of large amounts of nitrogen into the environment has a number of undesirable impacts such as: the loss of biodiversity, eutrophication of waters and soils, drinking water pollution, acidification, greenhouse gas emissions, human health risks. It is a challenge to sustain or increase food production and at the same time reduce losses of reactive nitrogen to the environment, but there are many potential benefits associated with improving nitrogen use efficiency. Reducing nutrient losses from agriculture is crucial to the successful implementation of agricultural policy. Traditional regulatory instruments applied to implement environmental policies to reduce environmental impacts from nitrogen fertilizers, despite some successes, failed to address many environmental challenges and imposed high costs on the society to achieve environmental quality objectives. As a result, economic instruments started to be recognized for their flexibility and cost-effectiveness. The objective of the research project is to analyze the potential for increased use of market-based instruments in nitrogen control policy. The report reviews existing knowledge, bringing different studies together to assess the global nitrogen situation and the most relevant environmental management policy that aims to reduce pollution in a sustainable way without affect negatively agriculture production and food price. This analysis provides some guidance on how different market based instruments might be orchestrated in an overall policy framework to the development and assessment of sustainable nitrogen management from the economics, environmental and food security point of view.

Keywords: nitrogen emissions, chemical fertilizers, eutrophication, non-point of source pollution, dairy farm

Procedia PDF Downloads 326
6328 Social Enterprises in India: Conceptualization and Challenges

Authors: Prajakta Khare

Abstract:

There is a huge number of social enterprises operating in India, across all enterprise sizes and forms addressing diverse social issues. Some cases such as such as Aravind eye care, Narayana Hridalaya, SEWA have been studied extensively in management literature and are known cases in social entrepreneurship. But there are several smaller social enterprises in India that are not called so per se due to the lack of understanding of the concept. There is a lack of academic research on social entrepreneurship in India and the term ‘social entrepreneurship’ is not yet widely known in the country, even by people working in this field as was found by this study. The present study aims to identify the most prominent form of social enterprises in India, the profile of the entrepreneurs, challenges faced, the lessons (theory and practices) emerging from their functioning and finally the factors contributing to the enterprises’ success. This is a preliminary exploratory study using primary data from 30 social enterprises in India. The study used snow ball sampling and a qualitative analysis. Data was collected from founders of social enterprises through written structured questionnaires, open-ended interviews and field visits to enterprises. The sample covered enterprises across sectors such as environment, affordable education, children’s rights, rain water harvesting, women empowerment etc. The interview questions focused on founder’s background and motivation, qualifications, funding, challenges, founder’s understanding and perspectives on social entrepreneurship, government support, linkages with other organizations etc. apart from several others. The interviews were conducted across 3 languages - Hindi, Marathi, English and were then translated and transcribed. 50% of founders were women and 65% of the total founders were highly qualified with a MBA, PhD or MBBS. The most important challenge faced by these entrepreneurs is recruiting skilled people. When asked about their understanding of the term, founders had diverse perspectives. Also, their understandings about the term social enterprise and social entrepreneur were extremely varied. Some founders identified the terms with doing something good for the society, some thought that every business can be called a social enterprise. 35% of the founders were not aware of the term social entrepreneur/ social entrepreneurship. They said that they could identify themselves as social entrepreneurs after discussions with the researcher. The general perception in India is that ‘NGOs are corrupt’- fighting against this perception to secure funds is also another problem as pointed out by some founders. There are unique challenges that social entrepreneurs in India face, as the political, social, economic environment around them is rapidly changing; and getting adequate support from the government is a problem. The research in its subsequent stages aims to clarify existing, missing and new definitions of the term to provide deeper insights in the terminology and issues relating to Social Entrepreneurship in India.

Keywords: challenges, India, social entrepreneurship, social entrepreneurs

Procedia PDF Downloads 465
6327 The Promoting of Early Childhood Development in Local Government Child Center

Authors: Vorapoj Promasatayaprot, Sumattana Glangkarn

Abstract:

Background: Early childhood, the first five years of life, is a time of rapid cognitive, linguistic, social, emotional and motor development. This study was descriptive research which the main purpose of this research was to study early childhood development in Child Center of Local Government in order to emphasize the public citizen and communities participate in the Child Development Center. Method: The study designed was Action Research and divided into four steps consisted of (1) Planning (2) Acting (3) Observing and (4) Reflecting. This study was employed the areas and the subjects consisted of 10 committees of the Child Center in Thakhonyang municipality, Kantharawichai District, Maha Sarakham Province, Thailand and 50 representative parents by using the purposive sampling technique. The instrument used in this study were questionnaires. The data were analyzed using descriptive statistic; percentage, mean, standard deviation, maximum value, minimum, median. Qualitative data was collected using the observation and interview and was analysed by content analysis. Results: The results of this research were as follows: The promoting of early childhood development in child center at Thakhonyang Municipality, Kantharawichai District, Maha Sarakham Province, Thailand were 6 procedures ; (1) workshop participation (2) workshop in action plan (3) performing in action plan (4) following supervision (5) self – assessment (6) knowledge sharing seminar. The service model of the Local Fund Health Security in Thailand was passed the qualifications of local fund health security by 6 procedures to be the high potential local fund health security. Conclusion: The key success is that the commission will have to respond the performance at all process of plan to address the issue in the future. Factor of success is to community participate with transparent procedure. Coordination committee should manipulate the child center benefits among stake holders.

Keywords: child center, develop, early childhood development, local government, promote

Procedia PDF Downloads 184
6326 Real Time Detection of Application Layer DDos Attack Using Log Based Collaborative Intrusion Detection System

Authors: Farheen Tabassum, Shoab Ahmed Khan

Abstract:

The brutality of attacks on networks and decisive infrastructures are on the climb over recent years and appears to continue to do so. Distributed Denial of service attack is the most prevalent and easy attack on the availability of a service due to the easy availability of large botnet computers at cheap price and the general lack of protection against these attacks. Application layer DDoS attack is DDoS attack that is targeted on wed server, application server or database server. These types of attacks are much more sophisticated and challenging as they get around most conventional network security devices because attack traffic often impersonate normal traffic and cannot be recognized by network layer anomalies. Conventional techniques of single-hosted security systems are becoming gradually less effective in the face of such complicated and synchronized multi-front attacks. In order to protect from such attacks and intrusion, corporation among all network devices is essential. To overcome this issue, a collaborative intrusion detection system (CIDS) is proposed in which multiple network devices share valuable information to identify attacks, as a single device might not be capable to sense any malevolent action on its own. So it helps us to take decision after analyzing the information collected from different sources. This novel attack detection technique helps to detect seemingly benign packets that target the availability of the critical infrastructure, and the proposed solution methodology shall enable the incident response teams to detect and react to DDoS attacks at the earliest stage to ensure that the uptime of the service remain unaffected. Experimental evaluation shows that the proposed collaborative detection approach is much more effective and efficient than the previous approaches.

Keywords: Distributed Denial-of-Service (DDoS), Collaborative Intrusion Detection System (CIDS), Slowloris, OSSIM (Open Source Security Information Management tool), OSSEC HIDS

Procedia PDF Downloads 350
6325 A Comparative Study of the Challenges of E-Learning in Nigerian Universities

Authors: J. N. Anene, A. A. Bello, C. C. Anene

Abstract:

The paper carried out a comparative study of the challenges of e-learning in Nigerian universities. The purpose of the study was to determine if there was a significant difference in the challenges faced by students in e-learning in Nigerian Universities. A total of two hundred and twenty-eight students from nine universities constituted the sample for the study. A simple random sampling technique was employed in selecting thirty–two students from one of each university in the six geo-political zones of Nigeria. The questionnaire based on 'yes or no' and column charts constituted the instrument employed in the study. Percentages were used to analyse 'yes or no' while column charts were used to compare responds of the students. The finding of the study revealed that majority of students in all the universities under study claimed that their universities lacked appropriate software, that good quality educational content online was lacking, they also agreed that sustainability of e-learning was not prioritized, that they had no access to appropriate content for ICT-enhanced learning and training and that they had access to affordable and reliable computers. For lecturers, the computer certification should be the first on the list of promotion requirements. The finding of the study revealed that students from seven out of nine universities confirmed that their universities lack of appropriate software whereas the other two claimed that they have appropriate software. Also, out of nine universities, two disagreed to the fact that good quality educational content online lacked, whereas seven agreed that they lacked good quality educational content online. The finding of the study also revealed that most of the respondents in almost all the university under study agreed that sustainability of e-learning was not prioritized. The study recommended among other that the Nigerian Government should make concerted effort to provide the enablement for all lecturers and students to become computer literate. This should be done within a time frame, and at the end of the computer course, certificates should be issued, and no student should graduate in his or her field of study without passing the computer course.

Keywords: e-learning, developing countries, computer literacy, ICT

Procedia PDF Downloads 330
6324 Improving Efficiency and Effectiveness of FMEA Studies

Authors: Joshua Loiselle

Abstract:

This paper discusses the challenges engineering teams face in conducting Failure Modes and Effects Analysis (FMEA) studies. This paper focuses on the specific topic of improving the efficiency and effectiveness of FMEA studies. Modern economic needs and increased business competition require engineers to constantly develop newer and better solutions within shorter timeframes and tighter margins. In addition, documentation requirements for meeting standards/regulatory compliance and customer needs are becoming increasingly complex and verbose. Managing open actions and continuous improvement activities across all projects, product variations, and processes in addition to daily engineering tasks is cumbersome, time consuming, and is susceptible to errors, omissions, and non-conformances. FMEA studies are proven methods for improving products and processes while subsequently reducing engineering workload and improving machine and resource availability through a pre-emptive, systematic approach of identifying, analyzing, and improving high-risk components. If implemented correctly, FMEA studies significantly reduce costs and improve productivity. However, the value of an effective FMEA is often shrouded by a lack of clarity and structure, misconceptions, and previous experiences and, as such, FMEA studies are frequently grouped with the other required information and documented retrospectively in preparation of customer requirements or audits. Performing studies in this way only adds cost to a project and perpetuates the misnomer that FMEA studies are not value-added activities. This paper discusses the benefits of effective FMEA studies, the challenges related to conducting FMEA studies, best practices for efficiently overcoming challenges via structure and automation, and the benefits of implementing those practices.

Keywords: FMEA, quality, APQP, PPAP

Procedia PDF Downloads 301
6323 Integrated Modeling of Transformation of Electricity and Transportation Sectors: A Case Study of Australia

Authors: T. Aboumahboub, R. Brecha, H. B. Shrestha, U. F. Hutfilter, A. Geiges, W. Hare, M. Schaeffer, L. Welder, M. Gidden

Abstract:

The proposed stringent mitigation targets require an immediate start for a drastic transformation of the whole energy system. The current Australian energy system is mainly centralized and fossil fuel-based in most states with coal and gas-fired plants dominating the total produced electricity over the recent past. On the other hand, the country is characterized by a huge, untapped renewable potential, where wind and solar energy could play a key role in the decarbonization of the Australia’s future energy system. However, integrating high shares of such variable renewable energy sources (VRES) challenges the power system considerably due to their temporal fluctuations and geographical dispersion. This raises the concerns about flexibility gap in the system to ensure the security of supply with increasing shares of such intermittent sources. One main flexibility dimension to facilitate system integration of high shares of VRES is to increase the cross-sectoral integration through coupling of electricity to other energy sectors alongside the decarbonization of the power sector and reinforcement of the transmission grid. This paper applies a multi-sectoral energy system optimization model for Australia. We investigate the cost-optimal configuration of a renewable-based Australian energy system and its transformation pathway in line with the ambitious range of proposed climate change mitigation targets. We particularly analyse the implications of linking the electricity and transport sectors in a prospective, highly renewable Australian energy system.

Keywords: decarbonization, energy system modelling, renewable energy, sector coupling

Procedia PDF Downloads 127
6322 Learners' Perception of Digitalization of Medical Education in a Low Middle-Income Country – A Case Study of the Lecturio Platform

Authors: Naomi Nathan

Abstract:

Introduction Digitalization of medical education can revolutionize how medical students learn and interact with the medical curriculum across contexts. With the increasing availability of the internet and mobile connectivity in LMICs, online medical education platforms and digital learning tools are becoming more widely available, providing new opportunities for learners to access high-quality medical education and training. However, the adoption and integration of digital technologies in medical education in LMICs is a complex process influenced by various factors, including learners' perceptions and attitudes toward digital learning. In Ethiopia, the adoption of digital platforms for medical education has been slow, with traditional face-to-face teaching methods still being the norm. However, as access to technology improves and more universities adopt digital platforms, it is crucial to understand how medical students perceive this shift. Methodology This study investigated medical students' perception of the digitalization of medical education in relation to their access to the Lecturio Digital Medical Education Platform through a capacity-building project. 740 medical students from over 20 medical universities participated in the study. The students were surveyed using a questionnaire that included their attitudes toward the digitalization of medical education, their frequency of use of the digital platform, and their perceived benefits and challenges. Results The study results showed that most medical students had a positive attitude toward digitalizing medical education. The most commonly cited benefit was the convenience and flexibility of accessing course material/curriculum online. Many students also reported that they found the platform more interactive and engaging, leading to a more meaningful learning experience. The study also identified several challenges medical students faced when using the platform. The most commonly reported challenge was the need for more reliable internet access, which made it difficult for students to access content consistently. Overall, the results of this study suggest that medical students in Ethiopia have a positive perception of the digitalization of medical education. Over 97% of students continuously expressed a need for access to the Lecturio platform throughout their studies. Conclusion Significant challenges still need to be addressed to fully realize the Lecturio digital platform's benefits. Universities, relevant ministries, and various stakeholders must work together to address these challenges to ensure that medical students fully participate in and benefit from digitalized medical education - sustainably and effectively.

Keywords: digital medical education, EdTech, LMICs, e-learning

Procedia PDF Downloads 86
6321 Postgraduate Supervision Relationship: Practices, Challenges, and Strategies of Stakeholders in the Côte d’Ivoire University System

Authors: Akuélé Radha Kondo, Kathrin Heitz-Tokpa, Bassirou Bonfoh, Francis Akindes

Abstract:

Postgraduate supervision contributes significantly to a student’s academic career, a supervisor’s promotion, and a university’s reputation. Despite this, the length of graduation in the Côte d’Ivoire University system is beyond the normal duration, two years for a master's and three years for a PhD. The paper analyses supervision practices regarding the challenges and strategies mobilised by students, supervisors, and administration staff to manage various relationships. Using a qualitative research design, this study was conducted at three public universities in Côte d’Ivoire. Data were generated from thirty-two postgraduate students, seventeen supervisors, and four administration staff through semi-structured interviews. Data were analysed using content analysis and presented thematically. Findings revealed delegated supervision and co-supervision, two types of supervision relationship practices. Students pointed out that feedback is often delayed from their supervisors in delegation supervision. However, they acknowledged receiving input and scientific guidance. All students believed that their role is to be proactive, not to wait to receive everything from the supervisor, and need to be more autonomous and hardworking. They developed strategies related to these qualities. Supervisors were considered to guide, give advice, control, motivate, provide critical feedback, and validate the work. The administration was rather absent in monitoring supervision delays. Major challenges were related to the supervision relationships and access to the research funds. The study showed that more engagement of the main supervisor, administration monitoring, and secured funding would reduce the time and increase the completion rate.

Keywords: Côte d’Ivoire, postgraduate supervision, practices, strategies

Procedia PDF Downloads 90
6320 The Link between Money Market and Economic Growth in Nigeria: Vector Error Correction Model Approach

Authors: Uyi Kizito Ehigiamusoe

Abstract:

The paper examines the impact of money market on economic growth in Nigeria using data for the period 1980-2012. Econometrics techniques such as Ordinary Least Squares Method, Johanson’s Co-integration Test and Vector Error Correction Model were used to examine both the long-run and short-run relationship. Evidence from the study suggest that though a long-run relationship exists between money market and economic growth, but the present state of the Nigerian money market is significantly and negatively related to economic growth. The link between the money market and the real sector of the economy remains very weak. This implies that the market is not yet developed enough to produce the needed growth that will propel the Nigerian economy because of several challenges. It was therefore recommended that government should create the appropriate macroeconomic policies, legal framework and sustain the present reforms with a view to developing the market so as to promote productive activities, investments, and ultimately economic growth.

Keywords: economic growth, investments, money market, money market challenges, money market instruments

Procedia PDF Downloads 338
6319 In Search of a Safe Haven-Sexual Violence Leading to a Change of Sexual Orientation

Authors: Medagedara Kaushalya Sewwandi Supun Gunarathne

Abstract:

This research explores the underlying motivations and consequences of individuals changing their sexual orientation as a response to sexual violence. The primary objective of the study is to unravel the psychological, emotional, and social factors that drive individuals, akin to Celie in Alice Walker’s ‘The Color Purple’, to contemplate and undergo changes in their sexual orientation following the trauma of sexual violence. Through an analytical and qualitative approach, the study employs in-depth textual and thematic analyses to scrutinize the complex interplay between sexual orientation and violence within the selected text. Through a close examination of Celie’s journey and experiences, the study reveals that her decision to switch sexual orientation arises from a desire for a more favorable and benevolent relationship driven by the absence of safety and refuge in her previous relationships. By establishing this bond between sexual orientation and violence, the research underscores how sexual violence can lead individuals to opt for a change in their sexual orientation. The findings highlight Celie’s transformation as a means to seek solace and security, thus concluding that sexual violence can prompt individuals to alter their sexual orientation. The ensuing discussion explores the implications of these findings, encompassing psychological, emotional, and social consequences, as well as the societal and cultural factors influencing the perception of sexual orientation. Additionally, it sheds light on the challenges and stigma faced by those who undergo such transformations. By comprehending the complex relationship between sexual violence and the decision to change sexual orientation, as exemplified by Celie in ‘The Color Purple’, a deeper understanding of the experiences of survivors who seek a safe haven through altering their sexual orientation can be attained.

Keywords: sexual violence, sexual orientation, refuge, transition

Procedia PDF Downloads 74
6318 Net Zero Energy Schools: The Starting Block for the Canadian Energy Neutral K-12 Schools

Authors: Hamed Hakim, Roderic Archambault, Charles J. Kibert, Maryam Mirhadi Fard

Abstract:

Changes in the patterns of life in the late 20th and early 21st century have created new challenges for educational systems. Greening the physical environment of school buildings has emerged as a response to some of those challenges and led to the design of energy efficient K-12 school buildings. With the advancement in knowledge and technology, the successful construction of Net Zero Energy Schools, such as the Lady Bird Johnson Middle School demonstrates a cutting edge generation of sustainable schools, and solves the former challenge of attaining energy self-sufficient educational facilities. There are approximately twenty net zero energy K-12 schools in the U.S. of which about six are located in Climate Zone 5 and 6 based on ASHRAE climate zone classification. This paper aims to describe and analyze the current status of energy efficient and NZE schools in Canada. An attempt is made to study existing U.S. energy neutral strategies closest to the climate zones in Canada (zones 5 and 6) and identify the best practices for Canadian schools.

Keywords: Canada K-12 schools, green school, energy efficient, net-zero energy schools

Procedia PDF Downloads 394
6317 Growing Acts of Terrorism in Local Conflicts: A Dire Need for International Attention

Authors: Yusuf Abubakar Mamud

Abstract:

Highlighting the imperatives of local conflicts considering the dangerous dimensions of terrorism they are assuming in Africa has not attracted serious academic and political attention. The discourse about conflict in Africa was discussed within five identified conflict zones in the continent. The threats from these local conflicts are diverse and complex and the acts of terrorism in these local conflicts are driven by certain attitudes and behaviours linked to the African leadership. The paper examined and noted that the current conflict resolution model of the African Union (AU) was robust with requisite institutions to address the trends in local conflicts. However, it was observed that the AU peace and security framework lacked the requisite structural and technical capabilities to proactively address the drivers of local conflicts in Africa. It was found that the persistence of local conflicts in the African region may deny her the opportunities of achievement of the targets envisioned in the Sustainable Development Goals (SDGs). Consequently, the paper called on the international community to support Africa through provision of capacity. It urged the African leaders themselves to develop the political will to ensure that all issues concerning peace and security in the continent were guided by the provisions of the AU Constitutive Act. The need to strengthen the APRM in the light of the current trends in local conflicts was also highlighted.

Keywords: conflicts, local conflicts, terrorism, sustainable development

Procedia PDF Downloads 269
6316 A General Overview on Izadis Children's Right Situation in Iraqi Kurdistan

Authors: Shabnam Dadparvar, Laijin Shen

Abstract:

Undoubtedly, children are one of the biggest assets of any society and it is the duty of all officials to have a systematic plan to educate the next generation and make a better life for children so that they can progress and be effective for their communities. In an effort, Kurdistan Regional Government (KRG) has adopted standards to improve the condition for Izadis children; however, there are challenges that remain; such as: Izadis child abuse, Izadis child labor, Izadis children right’s law, orphans, Izadis street children and etc. In this paper, by a descriptive-analytical method the authors try to discuss the general situation of Izadis children in today s Iraqi Kurdistan and the issues such as drug abuse, Izadis child labor, orphans and Izadis street children. The questions are: How is the situation of Izadis children in Iraqi Kurdistan and what are their challenges? Also, what is the KRG’s strategy and through which ways, they can make a better life for minority children and change their current status? The authors believe that nowadays, the KRG is trying to crack down on problems against Izadis children; however, their effort is not adequate and some other activities should be performed; one of which is passing the Izadis children s law against violence.

Keywords: children right, Iraqi Kurdistan, Izadis children, Kurdistan Regional Government

Procedia PDF Downloads 252
6315 Reduce, Reuse and Recycle: Grand Challenges in Construction Recovery Process

Authors: Abioye A. Oyenuga, Rao Bhamidiarri

Abstract:

Hurling a successful Construction and Demolition Waste (C&DW) recycling operation around the globe is a challenge today, predominantly because secondary materials markets are yet to be integrated. Reducing, Reusing and recycling of (C&DW) have been employed over the years, and various techniques have been investigated. However, the economic and environmental viability of its application seems limited. This paper discusses the costs and benefits in using secondary materials and focus on investigating reuse and recycling process for five major types of construction materials: concrete, metal, wood, cardboard/paper, and plasterboard. Data obtained from demolition specialist and contractors are considered and evaluated. With the date source, the research paper found that construction material recovery process fully incorporate the 3R’s process and shows how energy recovery by means of 3R's principles can be evaluated. This scrutiny leads to the empathy of grand challenges in construction material recovery process. Recommendations to deepen material recovery process are also discussed.

Keywords: construction and demolition waste (C&DW), 3R concept, recycling, reuse, waste management, UK

Procedia PDF Downloads 419
6314 Regulating Issues concerning Data Protection in Cloud Computing: Developing a Saudi Approach

Authors: Jumana Majdi Qutub

Abstract:

Rationale: Cloud computing has rapidly developed the past few years. Because of the importance of providing protection for personal data used in cloud computing, the role of data protection in promoting trust and confidence in users’ data has become an important policy priority. This research examines key regulatory challenges rose by the growing use and importance of cloud computing with focusing on protection of individuals personal data. Methodology: Describing and analyzing governance challenges facing policymakers and industry in Saudi Arabia, with an account of anticipated governance responses. The aim of the research is to describe and define the regulatory challenges on cloud computing for policy making in Saudi Arabia and comparing it with potential complied issues rose in respect of transported data to EU member state. In addition, it discusses information privacy issues. Finally, the research proposes policy recommendation that would resolve concerns surrounds the privacy and effectiveness of clouds computing frameworks for data protection. Results: There are still no clear regulation in Saudi Arabia specialized in legalizing cloud computing and specialty regulations in transferring data internationally and locally. Decision makers need to review the applicable law in Saudi Arabia that protect information in cloud computing. This should be from an international and a local view in order to identify all requirements surrounding this area. It is important to educate cloud computing users about their information value and rights before putting it in the cloud to avoid further legal complications, such as making an educational program to prevent giving personal information to a bank employee. Therefore, with many kinds of cloud computing services, it is important to have it covered by the law in all aspects.

Keywords: cloud computing, cyber crime, data protection, privacy

Procedia PDF Downloads 254
6313 Experiences of Family Carers of People Intellectual Disabilities During the COVID-19 Pandemic

Authors: Mark Linden, Michael Brown, Lynne Marsh, Maria Truesdale, Stuart Todd, Nathan Hughes, Trisha Forbes, Rachel Leonard

Abstract:

Background: The COVID-19 pandemic exacerbated the already significant strain placed on family carers of people with profound and multiple intellectual disabilities (PMID), given the withdrawal of many services during lockdown. The aim of this study was to explore the experiences of family carers of people with PMID during the COVID-19 pandemic. Methods: Online focus groups were conducted with family carers (n=126) from across the UK and the Republic of Ireland. Participants were asked about their experiences of the COVID-19 pandemic, coping strategies, and challenges faced. Focus groups were audio recorded, transcribed verbatim and analyzed through thematic analysis. Findings: Three themes emerged from our analysis of the data: (i) COVID-19 as a double-edged sword, (ii) The struggle for support (iii) the Constant nature of caring. These included 11 subthemes: (i) ‘COVID-19 as a catalyst for change’, ‘Challenges during COVID-19: dealing with change’, ‘Challenges during COVID-19: fear of COVID-19’, ‘The online environment: the new normal’ (ii) ‘Invisibility of male carers’, ‘Carers supporting carers’, ‘The only service you get is lip service: non-existent services’, ‘Knowing your rights’ (iii) ‘Emotional response to the caring role: Feeling devalued’, ‘Emotional response to the caring role: Desperation of caring’, ‘Multiple demands of the caring role.’ Conclusions: Poor or inconsistent access to services and support has been an ongoing difficulty for many family carers. The COVID-19 pandemic has only further intensified these difficulties, increasing family carers' stress. There is an urgent need to design services, such as online support programs, in partnership with family carers that adequately address their needs.

Keywords: intellectual disabilities, family carer, COVID-19, disability

Procedia PDF Downloads 66
6312 Exploring Non-Native English Language Teachers' Understandings and Attitudes towards the Integration of Intercultural Competence

Authors: Simin Sasani

Abstract:

This study will explore a group of English language teachers’ understanding of intercultural competence to find out if they are aware of the concept and how important it is for them. It will investigate how much they are concerned about the challenges that the learners might face in their intercultural communications and to what extent they can help the learners to overcome the barriers to increase students’ insight into cultural differences. In addition, it will explore how a group of non-native English language teachers define culture in relation to their English language teaching practices. More specifically, the research tries to take the how and why of inclusion of intercultural competence into consideration and how non-native teachers think they can improve their learners’ knowledge and skills in this domain. The study will be conducted in the UK and the participants are eight non-native English language teachers who are currently teaching general English language courses for foreigners. A pilot study have been conducted for this research which its results show three non-native English teachers are aware of the notion although they have not had any formal education about intercultural competence. Their challenges and limitation were also highlighted through interviews and observations.

Keywords: English, English language teachers, intercultural communications, intercultural competence, non-natives

Procedia PDF Downloads 461
6311 Moving Target Defense against Various Attack Models in Time Sensitive Networks

Authors: Johannes Günther

Abstract:

Time Sensitive Networking (TSN), standardized in the IEEE 802.1 standard, has been lent increasing attention in the context of mission critical systems. Such mission critical systems, e.g., in the automotive domain, aviation, industrial, and smart factory domain, are responsible for coordinating complex functionalities in real time. In many of these contexts, a reliable data exchange fulfilling hard time constraints and quality of service (QoS) conditions is of critical importance. TSN standards are able to provide guarantees for deterministic communication behaviour, which is in contrast to common best-effort approaches. Therefore, the superior QoS guarantees of TSN may aid in the development of new technologies, which rely on low latencies and specific bandwidth demands being fulfilled. TSN extends existing Ethernet protocols with numerous standards, providing means for synchronization, management, and overall real-time focussed capabilities. These additional QoS guarantees, as well as management mechanisms, lead to an increased attack surface for potential malicious attackers. As TSN guarantees certain deadlines for priority traffic, an attacker may degrade the QoS by delaying a packet beyond its deadline or even execute a denial of service (DoS) attack if the delays lead to packets being dropped. However, thus far, security concerns have not played a major role in the design of such standards. Thus, while TSN does provide valuable additional characteristics to existing common Ethernet protocols, it leads to new attack vectors on networks and allows for a range of potential attacks. One answer to these security risks is to deploy defense mechanisms according to a moving target defense (MTD) strategy. The core idea relies on the reduction of the attackers' knowledge about the network. Typically, mission-critical systems suffer from an asymmetric disadvantage. DoS or QoS-degradation attacks may be preceded by long periods of reconnaissance, during which the attacker may learn about the network topology, its characteristics, traffic patterns, priorities, bandwidth demands, periodic characteristics on links and switches, and so on. Here, we implemented and tested several MTD-like defense strategies against different attacker models of varying capabilities and budgets, as well as collaborative attacks of multiple attackers within a network, all within the context of TSN networks. We modelled the networks and tested our defense strategies on an OMNET++ testbench, with networks of different sizes and topologies, ranging from a couple dozen hosts and switches to significantly larger set-ups.

Keywords: network security, time sensitive networking, moving target defense, cyber security

Procedia PDF Downloads 68
6310 Exploring the Underlying Factors of Student Dropout in Makawanpur Multiple Campus: A Comprehensive Analysis

Authors: Uttam Aryal, Shekhar Thapaliya

Abstract:

This research paper presents a comprehensive analysis of the factors contributing to student dropout at Makawanpur Multiple Campus, utilizing primary data collected directly from dropped out as well as regular students and academic staff. Employing a mixed-method approach, combining qualitative and quantitative methods, this study examines into the complicated issue of student dropout. Data collection methods included surveys, interviews, and a thorough examination of academic records covering multiple academic years. The study focused on students who left their programs prematurely, as well as current students and academic staff, providing a well-rounded perspective on the issue. The analysis reveals a shaded understanding of the factors influencing student dropout, encompassing both academic and non-academic dimensions. These factors include academic challenges, personal choices, socioeconomic barriers, peer influences, and institutional-related issues. Importantly, the study highlights the most influential factors for dropout, such as the pursuit of education abroad, financial restrictions, and employment opportunities, shedding light on the complex web of circumstances that lead students to discontinue their education. The insights derived from this study offer actionable recommendations for campus administrators, policymakers, and educators to develop targeted interventions aimed at reducing dropout rates and improving student retention. The study underscores the importance of addressing the diverse needs and challenges faced by students, with the ultimate goal of fostering a supportive academic environment that encourages student success and program completion.

Keywords: drop out, students, factors, opportunities, challenges

Procedia PDF Downloads 59
6309 Hierarchical Filtering Method of Threat Alerts Based on Correlation Analysis

Authors: Xudong He, Jian Wang, Jiqiang Liu, Lei Han, Yang Yu, Shaohua Lv

Abstract:

Nowadays, the threats of the internet are enormous and increasing; however, the classification of huge alert messages generated in this environment is relatively monotonous. It affects the accuracy of the network situation assessment, and also brings inconvenience to the security managers to deal with the emergency. In order to deal with potential network threats effectively and provide more effective data to improve the network situation awareness. It is essential to build a hierarchical filtering method to prevent the threats. In this paper, it establishes a model for data monitoring, which can filter systematically from the original data to get the grade of threats and be stored for using again. Firstly, it filters the vulnerable resources, open ports of host devices and services. Then use the entropy theory to calculate the performance changes of the host devices at the time of the threat occurring and filter again. At last, sort the changes of the performance value at the time of threat occurring. Use the alerts and performance data collected in the real network environment to evaluate and analyze. The comparative experimental analysis shows that the threat filtering method can effectively filter the threat alerts effectively.

Keywords: correlation analysis, hierarchical filtering, multisource data, network security

Procedia PDF Downloads 196
6308 Implementing Effective Strategies to Improve Teaching and Learning in Higher Education: Balancing the Engagement Acts between Lecturers And Students

Authors: Jeffrey Siphiwe Mkhize

Abstract:

Twelve years of schooling for most South African children, particularly those children from disadvantaged past, are confronted with numerous and diverse challenges. These challenges range from infrastructural limitations, language of teaching, poor resources and varying family backgrounds. Likewise, schools are categorized to signify schools’ geographic location, poverty lines, societal class and type of students that the school are likely to enroll. Such categorization perpetuates particular lines of identities that are indirectly reinforced by the same system that seeks to redress. South African universities prefer point systems to determine students’ suitability to gain access to their programmes. Once students are admitted based on the qualifying points there is an assumed equity in the manner in which they receive tuition. They are assumed as equal; noting the widened access to South African universities as means to redress past inequalities. Given the challenges, inequalities, it is necessary to view higher education as a site for knowledge construction that is accessible to all students. Epistemological access is key to all students irrespective of their socio-economic status. This paper seeks to contribute to the discourse of student engagement using lecturer-student relationship as a lens to understand this phenomenon. Data were generated using South African Survey of Student Engagement, focus group interviews, semi-structured one-on-one-interviews as well as document analysis. The focus was on students registered for the first year of a Bachelor of Education degree as well as lecturers that teach high risk modules in this qualification at the same level. The findings suggest that lecturers are challenged by overcrowded classrooms and over-enrolled modules; this challenge hampers their good intentions to become more efficient and innovative in their teaching. Students lack confidence in approaching lecturers for assistance. Collaborative learning has stronger results and students believe in self-support to deal with their challenges based on their individual strengths. Collaborative learning is key to student academic performance.

Keywords: collaborative learning, consultations, student engagement, student performance

Procedia PDF Downloads 102
6307 The Impact of Illegal Firearms Possession, Limited Security Staff and Porosity of Border on Human Security in Ipokia Local Government Area, Ogun State

Authors: Ogunmefun Folorunsho Muyideen, Aluko Tolulope Evelyn

Abstract:

One of the trending menaces faced in the world today is centered on the porosity of borders and proliferation of illegal weapons among the state members without the state authorizations. The proliferation of weapons along porous borders remains a germane and unsolvable question among developed and developing nations due to crisis degenerated from the menace (loss of lives, properties, traumatization, civil unrest and retrogressive economic development). A mixed method was adopted while the survey method was used for communities’ selection (Oke-Odan, Ajilete, Illaise, Lanlate) at Ipokia Local Government as a sample frame. Multi-stage sampling was employed to break down the site into wards, streets, and different house numbers before randomizing administration of the questionnaires using face to face method, while purposive sampling was used for collecting verbal information through an in-depth interviews method. The population size for the site is 150.398, while 399 was the sample size derived from the use of Yamane sample size formula. After retrieval of structured questionnaires, 346 were found useful, while 10 percent (399) of the quantitative instruments was summed to 30 participants that were interviewed using the in-depth interviews technique. The result of the first hypothesis shows a composite relationship between the variables tested (independents and dependent). The result indicated that the porosity of the border, illegal possession of guns, and limited security staff jointly predispose insecurity among the residents of the selected study site. The result of the second hypothesis deciphers that the illegal gun possession (independent) variable predict business outcome among the residents of the study site because sporadic gun shoot will regress the business activities in the study area. The result of third result indicated that the independent (porosity of borders) variable predict social bonding network because a high level of insecurity will destroy the level of trust in the communication among the residents of the study area. The last questions give comprehensive meaning to one of the recommendations derived using content systematic analysis, which explains that out of 30 participants interviewed, 18 submitted individual involvement in monitoring communities will solve the problem, 7 out of 30 opines that governmental agents are to be trained for effective combat, 3 participants out 30 submits that the fight is for both government and the citizens while 2 participants out of 30 claimed that there must be an agreement between Nigerian and neighbouring countries on border security. International donors must totally control the sales of weapons to unauthorized personalities. Criminal cases must be treated with deterrence measures and target hardened procedures through decoying and blending, stakeout, and sting tactics.

Keywords: human security, illegal weapons, porous borders, development

Procedia PDF Downloads 165
6306 [Keynote Talk]: Software Reliability Assessment and Fault Tolerance: Issues and Challenges

Authors: T. Gayen

Abstract:

Although, there are several software reliability models existing today there does not exist any versatile model even today which can be used for the reliability assessment of software. Complex software has a large number of states (unlike the hardware) so it becomes practically difficult to completely test the software. Irrespective of the amount of testing one does, sometimes it becomes extremely difficult to assure that the final software product is fault free. The Black Box Software Reliability models are found be quite uncertain for the reliability assessment of various systems. As mission critical applications need to be highly reliable and since it is not always possible to ensure the development of highly reliable system. Hence, in order to achieve fault-free operation of software one develops some mechanism to handle faults remaining in the system even after the development. Although, several such techniques are currently in use to achieve fault tolerance, yet these mechanisms may not always be very suitable for various systems. Hence, this discussion is focused on analyzing the issues and challenges faced with the existing techniques for reliability assessment and fault tolerance of various software systems.

Keywords: black box, fault tolerance, failure, software reliability

Procedia PDF Downloads 422
6305 The Impact of Social Media on Urban E-planning: A Review of the Literature

Authors: Farnoosh Faal

Abstract:

The rapid growth of social media has brought significant changes to the field of urban e-planning. This study aims to review the existing literature on the impact of social media on urban e-planning processes. The study begins with a discussion of the evolution of social media and its role in urban e-planning. The review covers research on the use of social media for public engagement, citizen participation, stakeholder communication, decision-making, and monitoring and evaluation of urban e-planning initiatives. The findings suggest that social media has the potential to enhance public participation and improve decision-making in urban e-planning processes. Social media platforms such as Facebook, Twitter, and Instagram can provide a platform for citizens to engage with planners and policymakers, express their opinions, and provide feedback on planning proposals. Social media can also facilitate the collection and analysis of data, including real-time data, to inform urban e-planning decision-making. However, the literature also highlights some challenges associated with the use of social media in urban e-planning. These challenges include issues related to the representativeness of social media users, the quality of information obtained from social media, the potential for bias and manipulation of social media content, and the need for effective data management and analysis. The study concludes with recommendations for future research on the use of social media in urban e-planning. The recommendations include the need for further research on the impact of social media on equity and social justice in planning processes, the need for more research on effective strategies for engaging underrepresented groups, and the development of guidelines for the use of social media in urban e-planning processes. Overall, the study suggests that social media has the potential to transform urban e-planning processes but that careful consideration of the opportunities and challenges associated with its use is essential for effective and ethical planning practice.

Keywords: social media, Urban e-planning, public participation, citizen engagement

Procedia PDF Downloads 228