Search results for: information security awareness
13345 Impact of Network Workload between Virtualization Solutions on a Testbed Environment for Cybersecurity Learning
Authors: Kevin Fernagut, Olivier Flauzac, Erick M. G. Robledo, Florent Nolot
Abstract:
The adoption of modern lightweight virtualization often comes with new threats and network vulnerabilities. This paper seeks to assess this with a different approach studying the behavior of a testbed built with tools such as Kernel-Based Virtual Machine (KVM), Linux Containers (LXC) and Docker, by performing stress tests within a platform where students experiment simultaneously with cyber-attacks, and thus observe the impact on the campus network and also find the best solution for cyber-security learning. Interesting outcomes can be found in the literature comparing these technologies. It is, however, difficult to find results of the effects on the global network where experiments are carried out. Our work shows that other physical hosts and the faculty network were impacted while performing these trials. The problems found are discussed, as well as security solutions and the adoption of new network policies.Keywords: containerization, containers, cybersecurity, cyberattacks, isolation, performance, virtualization, virtual machines
Procedia PDF Downloads 14913344 Enabling Gender Equality in Leadership: An Exploration of Leadership and Self-Awareness, Using Community Participatory Action Research Methods
Authors: Robyn Jackaman
Abstract:
This research explores the characterization of leadership, self-awareness, and gender identity within a higher educational institution. This is in response to the widely researched area of gender in relation to senior management levels and the contemporary reflection of this issue in leadership, where gender diversity is lacking. Through organizational platforms, the University has self-identified issues relating to gender, equality, and representation. With equality being central to the core of the project, a Community Participatory Action Research approach was implemented. This approach was chosen as it is recognized for facilitating change within community contexts which complements the University Campus culture. Seventeen semi-structured interviews gave qualitative insight into working habitus (from both professional and academic services), leadership attributions and qualities and gender significance within the workplace. The research team (cross-disciplinary) used framework analysis to code and categorized the data. Key findings presented categories in gender significance to personal/work identity, organizational change and positive reflections on leadership characteristics and roles. This research has helped support the creation of tools to better assist the organization in gender equality, inclusion, and leadership development.Keywords: gendered work, gender equality, leadership, university organization
Procedia PDF Downloads 17313343 Reducing Flood Risk through Value Capture and Risk Communication: A Case Study in Cocody-Abidjan
Authors: Dedjo Yao Simon, Takahiro Saito, Norikazu Inuzuka, Ikuo Sugiyama
Abstract:
Abidjan city (Republic of Ivory Coast) is an emerging megacity and an urban coastal area where the number of floods reported is on a rapid increase due to climate change and unplanned urbanization. However, comprehensive disaster mitigation plans, policies, and financial resources are still lacking as the population ignores the extent and location of the flood zones; making them unprepared to mitigate the damages. Considering the existing condition, this paper aims to discuss an approach for flood risk reduction in Cocody Commune through value capture strategy and flood risk communication. Using geospatial techniques and hydrological simulation, we start our study by delineating flood zones and depths under several return periods in the study area. Then, through a questionnaire a field survey is conducted in order to validate the flood maps, to estimate the flood risk and to collect some sample of the opinion of residents on how the flood risk information disclosure could affect the values of property located inside and outside the flood zones. The results indicate that the study area is highly vulnerable to 5-year floods and more, which can cause serious harm to human lives and to properties as demonstrated by the extent of the 5-year flood of 2014. Also, it is revealed there is a high probability that the values of property located within flood zones could decline, and the values of surrounding property in the safe area could increase when risk information disclosure commences. However in order to raise public awareness of flood disaster and to prevent future housing promotion in high-risk prospective areas, flood risk information should be disseminated through the establishment of an early warning system. In order to reduce the effect of risk information disclosure and to protect the values of property within the high-risk zone, we propose that property tax increments in flood free zones should be captured and be utilized for infrastructure development and to maintain the early warning system that will benefit people living in flood prone areas. Through this case study, it is shown that combination of value capture strategy and risk communication could be an effective tool to educate citizen and to invest in flood risk reduction in emerging countries.Keywords: Cocody-Abidjan, flood, geospatial techniques, risk communication, value capture
Procedia PDF Downloads 27613342 Secure Bio Semantic Computing Scheme
Authors: Hiroshi Yamaguchi, Phillip C. Y. Sheu, Ryo Fujita, Shigeo Tsujii
Abstract:
In this paper, the secure BioSemantic Scheme is presented to bridge biological/biomedical research problems and computational solutions via semantic computing. Due to the diversity of problems in various research fields, the semantic capability description language (SCDL) plays and important role as a common language and generic form for problem formalization. SCDL is expected the essential for future semantic and logical computing in Biosemantic field. We show several example to Biomedical problems in this paper. Moreover, in the coming age of cloud computing, the security problem is considered to be crucial issue and we presented a practical scheme to cope with this problem.Keywords: biomedical applications, private information retrieval (PIR), semantic capability description language (SCDL), semantic computing
Procedia PDF Downloads 39013341 ARCS Model for Enhancing Intrinsic Motivation in Learning Biodiversity Subjects: A Case Study of Tertiary Level Students in Malaysia
Authors: Nadia Nisha Musa, Nur Atirah Hasmi, Hasnun Nita Ismail, Zulfadli Mahfodz
Abstract:
In Malaysian Education System, subject related to biodiversity has started in the curriculum from Foundation Study until tertiary education. Biodiversity become the focus of attention due to awareness on global warming which potentially leads to a loss of biodiversity. A loss in biodiversity means a loss in medicinal discoveries and reduces food supply. It is of great important to ensure that young generations become aware of biodiversity conservation. The more interactive approaches are needed to build society with a high awareness for biodiversity conservation. To address this challenge, the goal of this study is to enhance intrinsic motivation of biological students via ARCS model of instruction. Self-access learning materials such as tutorial, module and fieldwork were designed with ARCS elements to a sample size of 70 university students from the beginning of the semester. Both paper and online surveys were used to collect data from the respondents. The results showed that elements of attention, relevance, confidence and satisfaction have a positive impact on intrinsic motivation of students and their academic performance.Keywords: intrinsic motivation, ARCS model of instruction, biodiversity, self-access learning
Procedia PDF Downloads 22213340 Community Based Tourism and Development in Third World Countries: The Case of the Bamileke Region of Cameroon
Authors: Ngono Mindzeng Terencia
Abstract:
Community based tourism, as a sustainable tourism approach, has been adopted as a tool for development among local communities in third world countries with income generation as the main driver. However, an analysis of community based tourism and development brings to light another driving force which is paramount to development strategies in the difficult conditions of third world countries: this driving force is “place revitalization”. This paper seeks to assess the relevance of “place revitalization” to the enhancement of development within the challenging context of developing countries. The research provides a community based tourism model to development in third world countries through a three step process based on awareness, mentoring and empowerment at the local level. It also tries to examine how effectively this model can address the development problems faced by the local communities of third world countries. The case study for this research is the Bamiléké region of Cameroon, the breeding ground of community based tourism initiatives and a region facing the difficulties of third world countries that are great impediments to community based tourism.Keywords: awareness, empowerment, local communities, mentoring, place revitalization, third world countries
Procedia PDF Downloads 31813339 A Review on the Challenge and Need of Goat Semen Production and Artificial Insemination in Nepal
Authors: Pankaj K. Jha, Ajeet K. Jha, Pravin Mishra
Abstract:
Goat raising is a popular livestock sub-commodity of mixed farming system in Nepal. Besides food and nutritional security, it has an important role in the economy of many peoples. Goat breeding through AI is commonly practiced worldwide. It is a very basic tool to speed up genetic improvement and increase productivity. For the goat genetic improvement program, the government of Nepal has imported some specialized exotic goat breeds and semen. Some progress has been made in the initiation of selective breeding within the local breeds and practice of AI with imported semen. Importance of AI in goats has drawn more attention among goat farmers. However, importing semen is not a permanent solution at national level; rather, it is more important to develop and establish its own frozen semen production technique. Semen quality and its relationship with fertility are said to be a major concern in animal production, hence accurate measurement of semen fertilizing potential is of great importance. The survivability of sperm cells depends on semen quality. Survivability of sperm cells is assessed through visual and microscopic evaluation of spermatozoal progressive motility and morphology. In Nepal, there is lack of scientific information on seminal attributes of buck semen, its dilution, cooling and freezing technique under management conditions of Nepal. Therefore, the objective of this review was to provide brief information about breeding system, semen production and artificial insemination in Nepalese goat.Keywords: artificial insemination, goat, Nepal, semen
Procedia PDF Downloads 21213338 Usability and Biometric Authentication of Electronic Voting System
Authors: Nighat Ayub, Masood Ahmad
Abstract:
In this paper, a new voting system is developed and its usability is evaluated. The main feature of this system is the biometric verification of the voter and then a few easy steps to cast a vote. As compared to existing systems available, e.g dual vote, the new system requires no training in advance. The security is achieved via multiple key concept (another part of this project). More than 100 student voters were participated in the election from University of Malakanad, Chakdara, PK. To achieve the reliability, the voters cast their votes in two ways, i.e. paper based and electronic based voting using our new system. The results of paper based and electronic voting system are compared and it is concluded that the voters cast their votes for the intended candidates on the electronic voting system. The voters were requested to fill a questionnaire and the results of the questionnaire are carefully analyzed. The results show that the new system proposed in this paper is more secure and usable than other systems.Keywords: e-voting, security, usability, authentication
Procedia PDF Downloads 39213337 Fundamentals and Techniques of Organic Agriculture in Egypt
Authors: Moustafa Odah
Abstract:
Organic Agriculture is a new and sustainable agricultural system that depends on the use of organic materials from within the farm resulting from crop residues and animal husbandry and the cultivation of leguminous crops, away from the use of chemicals in fertilization or pest resistance, which leads to the production of safe, clean and healthy food products with nutritional value high and free of chemicals enhance food security; it is also an agricultural model preserve natural resources by improving the fertility and soil characteristics, and enhance biodiversity and biological cycles; additionally, they preserve the environment from pollution, which makes it play an important role in providing food needs of the present generations and the preservation of the rights of the coming generations to achieve sustainable development.Keywords: organic agriculture, food security and achieving sustainable development, fertilization or pest resistance, crop residues and animal husbandry and the cultivation of leguminous crops
Procedia PDF Downloads 8313336 Similarities and Differences in Values of Young Women and Their Parents: The Effect of Value Transmission and Value Change
Authors: J. Fryt, K. Pietras, T. Smolen
Abstract:
Intergenerational similarities in values may be effect of value transmission within families or socio-cultural trends prevailing at a specific point in time. According to salience hypothesis, salient family values may be transmitted more frequently. On the other hand, many value studies reveal that generational shift from social values (conservation and self-transcendence) to more individualistic values (openness to change and self-enhancement) suggest that value transmission and value change are two different processes. The first aim of our study was to describe similarities and differences in values of young women and their parents. The second aim was to determine which value similarities may be due to transmission within families. Ninety seven Polish women aged 19-25 and both their mothers and fathers filled in the Portrait Value Questionaire. Intergenerational similarities in values between women were found in strong preference for benevolence, universalism and self-direction as well as low preference for power. Similarities between younger women and older men were found in strong preference for universalism and hedonism as well as lower preference for security and tradition. Young women differed from older generation in strong preference for stimulation and achievement as well as low preference for conformity. To identify the origin of intergenerational similarities (whether they are the effect of value transmission within families or not), we used the comparison between correlations of values in family dyads (mother-daughter, father-daughter) and distribution of correlations in random intergenerational dyads (random mother-daughter, random father-daughter) as well as peer dyads (random daughter-daughter). Values representing conservation (security, tradition and conformity) as well as benevolence and power were transmitted in families between women. Achievement, power and security were transmitted between fathers and daughters. Similarities in openness to change (self-direction, stimulation and hedonism) and universalism were not stronger within families than in random intergenerational and peer dyads. Taken together, our findings suggest that despite noticeable generation shift from social to more individualistic values, we can observe transmission of parents’ salient values such as security, tradition, benevolence and achievement.Keywords: value transmission, value change, intergenerational similarities, differences in values
Procedia PDF Downloads 42913335 Cognitive Linguistic Features Underlying Spelling Development in a Second Language: A Case Study of L2 Spellers in South Africa
Authors: A. Van Staden, A. Tolmie, E. Vorster
Abstract:
Research confirms the multifaceted nature of spelling development and underscores the importance of both cognitive and linguistic skills that affect sound spelling development such as working and long-term memory, phonological and orthographic awareness, mental orthographic images, semantic knowledge and morphological awareness. This has clear implications for many South African English second language spellers (L2) who attempt to become proficient spellers. Since English has an opaque orthography, with irregular spelling patterns and insufficient sound/grapheme correspondences, L2 spellers can neither rely, nor draw on the phonological awareness skills of their first language (for example Sesotho and many other African languages), to assist them to spell the majority of English words. Epistemologically, this research is informed by social constructivism. In addition the researchers also hypothesized that the principles of the Overlapping Waves Theory was an appropriate lens through which to investigate whether L2 spellers could significantly improve their spelling skills via the implementation of an alternative route to spelling development, namely the orthographic route, and more specifically via the application of visual imagery. Post-test results confirmed the results of previous research that argues for the interactive nature of different cognitive and linguistic systems such as working memory and its subsystems and long-term memory, as learners were systematically guided to store visual orthographic images of words in their long-term lexicons. Moreover, the results have shown that L2 spellers in the experimental group (n = 9) significantly outperformed L2 spellers (n = 9) in the control group whose intervention involved phonological awareness (and coding) including the teaching of spelling rules. Consequently, L2 learners in the experimental group significantly improved in all the post-test measures included in this investigation, namely the four sub-tests of short-term memory; as well as two spelling measures (i.e. diagnostic and standardized measures). Against this background, the findings of this study look promising and have shown that, within a social-constructivist learning environment, learners can be systematically guided to apply higher-order thinking processes such as visual imagery to successfully store and retrieve mental images of spelling words from their output lexicons. Moreover, results from the present study could play an important role in directing research into this under-researched aspect of L2 literacy development within the South African education context.Keywords: English second language spellers, phonological and orthographic coding, social constructivism, visual imagery as spelling strategy
Procedia PDF Downloads 35913334 The Role of Moroccan Salafist Radicalism in Creating Threat to Spain’s Security
Authors: Stanislaw Kosmynka
Abstract:
Although the genesis of the activity of fighting salafist radicalism in Spain dates back to the 80’s, the development of extremism of this kind manifested itself only in the next decade. Its first permanently functioning structures in this country in the second half of 90’s of 20th century came from Algieria and Syria. At the same time it should be emphasized that this distinction is in many dimensions conventional, the more so because they consisted also of immigrants from other coutries of Islam, particularly from Morocco. The paper seeks to understand the radical salafist challenge for Spain in the context of some terrorist networks consisted of immigrants from Morocco. On the eve of the new millennium Moroccan jihadists played an increasingly important role. Although the activity of these groups had for many years mainly logistical and propaganda character, the bomb attack carried out on 11 March 2004 in Madrid constituted an expression of open forms of terrorism, directed against the authorities and society of Spain and reflected the narration of representatives of the trend of the global jihad. The people involved in carrying out that act of violence were to a large extent Moroccan immigrants; also in the following years among the cells of radicals in Spain Moroccans stood out many times. That is why the forms and directions of activity of these extremists in Spain, also after 11th March 2004 and in the actual context of the impact of Islamic State, are worth presenting. The paper is focused on threats to the security of Spain and the region and remains connected with the issues of mutual relations of the society of a host country with immigrant communities which to a large degree come from this part of Maghreb.Keywords: jihadi terrorism, Morocco, radical salafism, security, Spain, terrorist cells, threat
Procedia PDF Downloads 52513333 Awareness about HIV-Infection among HIV-Infected Individuals Attending Medical Moscow Center, Russia
Authors: Marina Nosik, Irina Rymanova, Sergei Sevostyanihin, Natalya Sergeeva, Alexander Sobkin
Abstract:
This paper presents results of the survey regarding the awareness about HIV/AIDS among HIV-infected individuals. A questionnaire covering various aspects of HIV-infection was conducted among 110 HIV-infected individuals who attended the G.A. Zaharyan Moscow Tuberculosis Clinic, Department for the treatment of TB patients with HIV. The questionnaire included questions about modes of HIV transmission and preventive measures against HIV/AIDS, as well as questions about age, gender, education, and employment status. The survey revealed that the respondents in the whole had a good knowledge regarding modes of HIV transmission and preventive measures against HIV/AIDS: about 83,6% male respondents and 85,7% female respondents gave accurate answers regarding the HIV-infection. However, the overwhelming majority of the study participants, that is, 88,5% men and 98% women, was quite ignorant about the risk of acquiring HIV through saliva and toothbrush of HIV-infected individual. Though that risk is rather insignificant, it is still biologically possible. And this gap in knowledge needs to be filled. As the study showed another point of concern was the fact, that despite the knowledge of HIV transmission risk through unprotected sex about 40% percent of HIV-positive men and 25% of HIV-positive women did not insist on using condoms with their sexual partners. These findings indicate that there are still some aspects about HIV-infection which needed to be clarified and explained through more detailed and specific educational programmes.Keywords: AIDS, HIV transmission risks, HIV misconceptions, risk behavior
Procedia PDF Downloads 33413332 IT and Security Experts' Innovation and Investment Front for IT-Entrepreneurship in Pakistan
Authors: Ahmed Mateen, Zhu Qingsheng, Muhammad Awais, Muhammad Yahya Saeed
Abstract:
This paper targets the rising factor of entrepreneurship innovation, which lacks in Pakistan as compared to the other countries or the regions like China, India, and Malaysia, etc. This is an exploratory and explanatory study. Major aspects have identified as the direction for the policymakers while highlighting the issues in true spirit. IT needs to be considered not only as a technology but also as itself growing as a new community. IT management processes are complex and broad, so generally requires extensive attention to the collective aspects of human variables, capital and technology. In addition, projects tend to have a special set of critical success factors, and if these are processed and given attention, it will improve the chances of successful implementation. This is only possible with state of the art intelligent decision support systems and accumulating IT staff to some extent in decision processes. This paper explores this issue carefully and discusses six issues to observe the implemented strength and possible enhancement.Keywords: security and defense forces, IT-incentives, big IT-players, IT-entrepreneurial-culture
Procedia PDF Downloads 22013331 Health Information Needs and Utilization of Information and Communication Technologies by Medical Professionals in a Northern City of India
Authors: Sonika Raj, Amarjeet Singh, Vijay Lakshmi Sharma
Abstract:
Introduction: In 21st century, due to revolution in Information and Communication Technologies (ICTs), there has been phenomenal development in quality and quantity of knowledge in the field of medical science. So, the access to relevant information to physicians is critical to the delivery of effective healthcare services to patients. The study was conducted to assess the information needs and attitudes of the medical professionals; to determine the sources and channels of information used by them; to ascertain the current usage of ICTs and the barriers faced by them in utilization of ICTs in health information access. Methodology: This descriptive cross-sectional study was carried in 2015 on hundred medical professionals working in public and private sectors of Chandigarh. The study used both quantitative and qualitative method for data collection. A semi structured questionnaire and interview schedule was used to collect data on information seeking needs, access to ICTs and barriers to healthcare information access. Five Data analysis was done using SPSS-16 and qualitative data was analyzed using thematic approach. Results: The most preferred sources to access healthcare information were internet (85%), trainings (61%) and communication with colleagues (57%). They wanted information on new drug therapy and latest developments in respective fields. All had access to computer with but almost half assessed their computer knowledge as average and only 3% had received training regarding usage. Educational status (p=0.004), place of work (p=0.004), number of years in job (p=0.004) and sector of job (p=0.04) of doctors were found to be significantly associated with their active search for information. The major themes that emerged from in-views were need; types and sources of healthcare information; exchange of information among different levels of healthcare providers; usage of ICTs to obtain and share information; barriers to access of healthcare information and quality of health information materials and involvement in their development process Conclusion and Recommendations: The medical professionals need information in their in their due course of work. However, information needs of medical professionals were not being adequately met. There should be training of professional regarding internet skills and the course on bioinformatics should be incorporated in the curricula of medical students. The policy framework must be formulated that will encourage and promote the use of ICTs as tools for health information access and dissemination.Keywords: health information, ICTs, medical professionals, qualitative
Procedia PDF Downloads 34913330 Public Space, Environmental Violence and Female Vulnerability in Radwa Ashour’s Specters and Betool Khadiri’s Absent
Authors: Jihan Zakarriya
Abstract:
This paper aims at examining the concepts of gender vulnerability, militarized spaces and environmental degradation in Egyptian novelist Radwa Ashour’s Specters (1999) and Iraqi novelist Betool Khadiri’s Absent (2005). Although the socio-economic, environmental and political conditions in the 1990s- Egypt and Iraq are different, this paper argues that Ashour’s Specters and Khadiri’s Absent show the two societies as sharing a concern with the politics of public participation, individual freedom and political violence. For example, while Specters exposes the planned processes of economic-political and cultural violence towards Egyptian environment and people that undermine concepts of justice, equality and democracy, Absent shows the destructive effects of the systematic, successive waves of (international) militarized interferences and socio-economic sanctions imposed on Iraq following the Gulf War that hinder efforts of social development and kindle ethnic-religious violence and polarization in the country. This paper investigates and relates issues of gender, environmental and political violence and repression in Ashour’s Specters and Khadiri’s Absent in relation to the concepts of public space and security in the two countries. The paper argues that the selected novels articulate a particular awareness of the political-international conflicts and difficulties in the 1990s-Egypt and Iraq, with the aim both to emphasize the issue of gender as a tool of oppression and power hierarchy worldwide and to figure out new notions of public participation and change.Keywords: gender violence, public space, environment, change
Procedia PDF Downloads 14213329 The Limits of Charity: Advancing a Rights-based Justice Model to Remedy Poverty and Hunger
Authors: Tracy Smith-Carrier
Abstract:
In 1995, the World Health Organization declared that poverty was the biggest killer and the greatest cause of suffering in the world. Income is certainly a key social determinant of health, the lack of which causes innumerable health and mental health conditions. In seeking to provide relief from financial hardship for residents within their populace, states in the Global North have largely turned to the non-profit and charitable sector. The stigma and shame of accessing charity is a significant barrier for many, but what is more problematic is that the embrace of the charitable model has let governments off the hook from responding to their international human rights obligations. Although states are signatories to various human rights treaties and conventions internationally, many of these laws have not been implemented domestically. This presentation explores the limits of the charitable model in addressing poverty in countries of the Global North. Unlike in the ages passed, when poverty was thought to be an individual problem, we now know that poverty is largely systemic in nature. In this presentation, we will identify the structural determinants of poverty, outline why people are reticent to access charitable programs and services and how income security is reproduced through the charitable model, and discuss evidence-informed solutions, such as a basic income guarantee, to move beyond the charitable model in favour of a rights-based justice model. To move beyond charity, we must demand that governments recognize our fundamental human rights and address poverty and hunger using a justice model based on substantive human rights.Keywords: basic income, charity, poverty, income security, hunger, food security, social justice, human rights
Procedia PDF Downloads 11713328 Information Technologies in Human Resources Management - Selected Examples
Authors: A. Karasek
Abstract:
Rapid growth of Information Technologies (IT) has had huge influence on enterprises, and it has contributed to its promotion and increasingly extensive use in enterprises. Information Technologies have to a large extent determined the processes taking place in a enterprise; what is more, IT development has brought the need to adopt a brand new approach to human resources management in an enterprise. The use of IT in Human Resource Management (HRM) is of high importance due to the growing role of information and information technologies. The aim of this paper is to evaluate the use of information technologies in human resources management in enterprises. These practices will be presented in the following areas: Recruitment and selection, development and training, employee assessment, motivation, talent management, personnel service. Results of conducted survey show diversity of solutions applied in particular areas of human resource management. In the future, further development in this area should be expected, as well as integration of individual HRM areas, growing mobile-enabled HR processes and their transfer into the cloud. Presented IT solutions applied in HRM are highly innovative, which is of great significance due to their possible implementation in other enterprises.Keywords: e-HR, human resources management, HRM practices, HRMS, information technologies
Procedia PDF Downloads 35113327 Innovative Communication for Promoting Tourism in Southern Thailand
Authors: Pitimanus Bunlue
Abstract:
This research aim (1) to determine the content of communication, social capital and cultural capital to promote tourism in the province to create awareness, motivation and desire to tourists visiting Thailand (2) to evaluate the performance of innovation communication social capital and cultural capital to promote tourism southern of Thailand. This research is a qualitative research. A research synthesis projects on social capital and cultural capital by use focus group discussions with media professionals and academics to communicate using a random sample specific. The result show that (1) Innovative communication, social capital and cultural capital and effective communication innovations after everyone wants to travel to Ranong province is the very highest level. (2) Information and experience about Ranong at a high level. (3) The data shows the strengths of each of the attractions at a high level. (4) The data shows a lifestyle that is unique to the province is moderate.Keywords: innovative communication, promoting tourism, southern of Thailand, social capital
Procedia PDF Downloads 27513326 Investigation of Preschool Children's Mathematics Concept Acquisition in Terms of Different Variables
Authors: Hilal Karakuş, Berrin Akman
Abstract:
Preschool years are considered as critical years because of shaping the future lives of individuals. All of the knowledge, skills, and concepts are acquired during this period. Also, basis of academic skills is based on this period. As all of the developmental areas are the fastest in that period, the basis of mathematics education should be given in this period, too. Mathematics is seen as a difficult and abstract course by the most people. Therefore, the enjoyable side of mathematics should be presented in a concrete way in this period to avoid any bias of children for mathematics. This study is conducted to examine mathematics concept acquisition of children in terms of different variables. Screening model is used in this study which is carried out in a quantity way. The study group of this research consists of total 300 children, selected from each class randomly in groups of five, who are from public and private preschools in Çankaya, which is district of Ankara, in 2014-2015 academic year and attending children in the nursery classes and preschool institutions are connected to the Ministry of National Education. The study group of the research was determined by stage sampling method. The schools, which formed study group, are chosen by easy sampling method and the children are chosen by simple random method. Research data were collected with Bracken Basic Concept Scale–Revised Form and Child’s Personal Information Form generated by the researcher in order to get information about children and their families. Bracken Basic Concept Scale-Revised Form consists of 11 sub-dimensions (color, letter, number, size, shape, comparison, direction-location, and quantity, individual and social awareness, building- material) and 307 items. Subtests related to the mathematics were used in this research. In the “Child Individual Information Form” there are items containing demographic information as followings: age of children, gender of children, attending preschools educational intuitions for children, school attendance, mother’s and father’s education levels. At the result of the study, while it was found that children’s mathematics skills differ from age, state of attending any preschool educational intuitions , time of attending any preschool educational intuitions, level of education of their mothers and their fathers; it was found that it does not differ by the gender and type of school they attend.Keywords: preschool education, preschool period children, mathematics education, mathematics concept acquisitions
Procedia PDF Downloads 35013325 Using Information Theory to Observe Natural Intelligence and Artificial Intelligence
Authors: Lipeng Zhang, Limei Li, Yanming Pearl Zhang
Abstract:
This paper takes a philosophical view as axiom, and reveals the relationship between information theory and Natural Intelligence and Artificial Intelligence under real world conditions. This paper also derives the relationship between natural intelligence and nature. According to communication principle of information theory, Natural Intelligence can be divided into real part and virtual part. Based on information theory principle that Information does not increase, the restriction mechanism of Natural Intelligence creativity is conducted. The restriction mechanism of creativity reveals the limit of natural intelligence and artificial intelligence. The paper provides a new angle to observe natural intelligence and artificial intelligence.Keywords: natural intelligence, artificial intelligence, creativity, information theory, restriction of creativity
Procedia PDF Downloads 38613324 Human Behavior Modeling in Video Surveillance of Conference Halls
Authors: Nour Charara, Hussein Charara, Omar Abou Khaled, Hani Abdallah, Elena Mugellini
Abstract:
In this paper, we present a human behavior modeling approach in videos scenes. This approach is used to model the normal behaviors in the conference halls. We exploited the Probabilistic Latent Semantic Analysis technique (PLSA), using the 'Bag-of-Terms' paradigm, as a tool for exploring video data to learn the model by grouping similar activities. Our term vocabulary consists of 3D spatio-temporal patch groups assigned by the direction of motion. Our video representation ensures the spatial information, the object trajectory, and the motion. The main importance of this approach is that it can be adapted to detect abnormal behaviors in order to ensure and enhance human security.Keywords: activity modeling, clustering, PLSA, video representation
Procedia PDF Downloads 39413323 An Analysis of Younger Consumers’ Perceptions, Purchasing Decisions, and Pro-Environmental Behavior: A Market Experiment on Green Advertising
Authors: Mokhlisur Rahman
Abstract:
Consumers have developed a sense of responsibility in the past decade, reflecting on their purchasing behavior after viewing an advertisement. Consumers tend to buy ideal products that enable them to be judged by their close network in the opinion world. In such value considerations, any information that feeds consumers' desire for social status helps, which becomes capital for educating consumers on the importance of purchasing green products for manufacturing companies. Companies' effort in manufacturing green products to get high conversion demands a good deal of promotion with quality information and engaging representation. Additionally, converting people from traditional to eco-friendly products requires innovative alternatives to replace the existing product. Considering consumers' understanding of products and their purchasing behavior, it becomes essential for the brands to know the extent to which consumers' level of awareness of the ecosystem is to make them more responsive to green products. Another is brand image plays a vital role in consumers' perception regarding the credibility of the claim regarding the product. Brand image is a significant positive influence on the younger generation, and younger generations tend to engage more in pro-environmental behavior, including purchasing sustainable products. For example, Adidas senses the necessity of satisfying consumers with something that brings more profits and serves the planet. Several of their eco-friendly products are already in the market, and one is UltraBOOST DNA parley, made from 3D-printed recycled ocean waste. As a big brand image, Adidas has leveraged an interest among the younger generation by incorporating sustainability into its advertising. Therefore, influential brands' effort in the sustainable revolution through engaging advertisement makes it more prominent by educating consumers about the reason behind launching the product. This study investigates younger consumers' attitudes toward sustainability, brand recognition, exposure to green advertising, willingness to receive more green advertising, purchasing green products, and motivation. The study conducts a market experiment by creating two video advertisements: a sustainable product video advertisement and a non-sustainable product video advertisement. Both the videos have similar content design and the same length of 2 minutes, but the messages are different based on the identical product type college bags. The first video advertisement promotes eco-friendly college bags made from biodegradable raw materials, and the second promotes non-sustainable college bags made from plastics. After viewing the videos, consumers make purchasing decisions and complete an online survey to collect their attitudes toward sustainable products. The study finds the importance of a sense of responsibility to the consumers for climate change issues. Also, it empowers people to take a step, even small, and increases environmental awareness. This study provides companies with the knowledge to participate in sustainable product launches by collecting consumers' perceptions and attitudes toward green products. Also, it shows how important it is to build a brand's image for the younger generation.Keywords: brand-image, environment, green-advertising, sustainability, younger-consumer
Procedia PDF Downloads 6813322 Cloud Monitoring and Performance Optimization Ensuring High Availability and Security
Authors: Inayat Ur Rehman, Georgia Sakellari
Abstract:
Cloud computing has evolved into a vital technology for businesses, offering scalability, flexibility, and cost-effectiveness. However, maintaining high availability and optimal performance in the cloud is crucial for reliable services. This paper explores the significance of cloud monitoring and performance optimization in sustaining the high availability of cloud-based systems. It discusses diverse monitoring tools, techniques, and best practices for continually assessing the health and performance of cloud resources. The paper also delves into performance optimization strategies, including resource allocation, load balancing, and auto-scaling, to ensure efficient resource utilization and responsiveness. Addressing potential challenges in cloud monitoring and optimization, the paper offers insights into data security and privacy considerations. Through this thorough analysis, the paper aims to underscore the importance of cloud monitoring and performance optimization for ensuring a seamless and highly available cloud computing environment.Keywords: cloud computing, cloud monitoring, performance optimization, high availability
Procedia PDF Downloads 6513321 LiDAR Based Real Time Multiple Vehicle Detection and Tracking
Authors: Zhongzhen Luo, Saeid Habibi, Martin v. Mohrenschildt
Abstract:
Self-driving vehicle require a high level of situational awareness in order to maneuver safely when driving in real world condition. This paper presents a LiDAR based real time perception system that is able to process sensor raw data for multiple target detection and tracking in dynamic environment. The proposed algorithm is nonparametric and deterministic that is no assumptions and priori knowledge are needed from the input data and no initializations are required. Additionally, the proposed method is working on the three-dimensional data directly generated by LiDAR while not scarifying the rich information contained in the domain of 3D. Moreover, a fast and efficient for real time clustering algorithm is applied based on a radially bounded nearest neighbor (RBNN). Hungarian algorithm procedure and adaptive Kalman filtering are used for data association and tracking algorithm. The proposed algorithm is able to run in real time with average run time of 70ms per frame.Keywords: lidar, segmentation, clustering, tracking
Procedia PDF Downloads 42313320 Artificial Intelligence and Governance in Relevance to Satellites in Space
Authors: Anwesha Pathak
Abstract:
With the increasing number of satellites and space debris, space traffic management (STM) becomes crucial. AI can aid in STM by predicting and preventing potential collisions, optimizing satellite trajectories, and managing orbital slots. Governance frameworks need to address the integration of AI algorithms in STM to ensure safe and sustainable satellite activities. AI and governance play significant roles in the context of satellite activities in space. Artificial intelligence (AI) technologies, such as machine learning and computer vision, can be utilized to process vast amounts of data received from satellites. AI algorithms can analyse satellite imagery, detect patterns, and extract valuable information for applications like weather forecasting, urban planning, agriculture, disaster management, and environmental monitoring. AI can assist in automating and optimizing satellite operations. Autonomous decision-making systems can be developed using AI to handle routine tasks like orbit control, collision avoidance, and antenna pointing. These systems can improve efficiency, reduce human error, and enable real-time responsiveness in satellite operations. AI technologies can be leveraged to enhance the security of satellite systems. AI algorithms can analyze satellite telemetry data to detect anomalies, identify potential cyber threats, and mitigate vulnerabilities. Governance frameworks should encompass regulations and standards for securing satellite systems against cyberattacks and ensuring data privacy. AI can optimize resource allocation and utilization in satellite constellations. By analyzing user demands, traffic patterns, and satellite performance data, AI algorithms can dynamically adjust the deployment and routing of satellites to maximize coverage and minimize latency. Governance frameworks need to address fair and efficient resource allocation among satellite operators to avoid monopolistic practices. Satellite activities involve multiple countries and organizations. Governance frameworks should encourage international cooperation, information sharing, and standardization to address common challenges, ensure interoperability, and prevent conflicts. AI can facilitate cross-border collaborations by providing data analytics and decision support tools for shared satellite missions and data sharing initiatives. AI and governance are critical aspects of satellite activities in space. They enable efficient and secure operations, ensure responsible and ethical use of AI technologies, and promote international cooperation for the benefit of all stakeholders involved in the satellite industry.Keywords: satellite, space debris, traffic, threats, cyber security.
Procedia PDF Downloads 7613319 Limiting Freedom of Expression to Fight Radicalization: The 'Silencing' of Terrorists Does Not Always Allow Rights to 'Speak Loudly'
Authors: Arianna Vedaschi
Abstract:
This paper addresses the relationship between freedom of expression, national security and radicalization. Is it still possible to talk about a balance between the first two elements? Or, due to the intrusion of the third, is it more appropriate to consider freedom of expression as “permanently disfigured” by securitarian concerns? In this study, both the legislative and the judicial level are taken into account and the comparative method is employed in order to provide the reader with a complete framework of relevant issues and a workable set of solutions. The analysis moves from the finding according to which the tension between free speech and national security has become a major issue in democratic countries, whose very essence is continuously endangered by the ever-changing and multi-faceted threat of international terrorism. In particular, a change in terrorist groups’ recruiting pattern, attracting more and more people by way of a cutting-edge communicative strategy, often employing sophisticated technology as a radicalization tool, has called on law-makers to modify their approach to dangerous speech. While traditional constitutional and criminal law used to punish speech only if it explicitly and directly incited the commission of a criminal action (“cause-effect” model), so-called glorification offences – punishing mere ideological support for terrorism, often on the web – are becoming commonplace in the comparative scenario. Although this is direct, and even somehow understandable, consequence of the impending terrorist menace, this research shows many problematic issues connected to such a preventive approach. First, from a predominantly theoretical point of view, this trend negatively impacts on the already blurred line between permissible and prohibited speech. Second, from a pragmatic point of view, such legislative tools are not always suitable to keep up with ongoing developments of both terrorist groups and their use of technology. In other words, there is a risk that such measures become outdated even before their application. Indeed, it seems hard to still talk about a proper balance: what was previously clearly perceived as a balancing of values (freedom of speech v. public security) has turned, in many cases, into a hierarchy with security at its apex. In light of these findings, this paper concludes that such a complex issue would perhaps be better dealt with through a combination of policies: not only criminalizing ‘terrorist speech,’ which should be relegated to a last resort tool, but acting at an even earlier stage, i.e., trying to prevent dangerous speech itself. This might be done by promoting social cohesion and the inclusion of minorities, so as to reduce the probability of people considering terrorist groups as a “viable option” to deal with the lack of identification within their social contexts.Keywords: radicalization, free speech, international terrorism, national security
Procedia PDF Downloads 19713318 An Exploration of the Provision of Government-Subsidised Housing without Title Deeds: A Recipient’s Interpretation of Security of Tenure
Authors: Maléne Maria Magdalena Campbell, Jeremiah Mholo
Abstract:
Low-income households earning less than 3,500 ZAR (about 175 GBP) per month can apply to the South African government, through the National Housing Subsidy, for fully subsidised houses. An objective of this subsidy is to enable low-income households’ participation in the formal housing market; however, the beneficiaries received houses without title deeds. As such, if the beneficiaries did not have a secured tenure at the time of their death then surviving family may face possible eviction. Therefore, an aim of this research was to determine how these beneficiaries interpret tenure security. The research focused on government subsidised housing in the Dithlake settlement of a rural hamlet named Koffiefontein, in the Letsemeng Local Municipality of South Africa. Quantitative data on the beneficiaries were collected from the local municipality, while qualitative data were collected from a sample of 45 beneficiaries.Keywords: low-income families, subsidised housing, titling, housing market
Procedia PDF Downloads 40713317 Introduction to Multi-Agent Deep Deterministic Policy Gradient
Authors: Xu Jie
Abstract:
As a key network security method, cryptographic services must fully cope with problems such as the wide variety of cryptographic algorithms, high concurrency requirements, random job crossovers, and instantaneous surges in workloads. Its complexity and dynamics also make it difficult for traditional static security policies to cope with the ever-changing situation. Cyber Threats and Environment. Traditional resource scheduling algorithms are inadequate when facing complex decisionmaking problems in dynamic environments. A network cryptographic resource allocation algorithm based on reinforcement learning is proposed, aiming to optimize task energy consumption, migration cost, and fitness of differentiated services (including user, data, and task security). By modeling the multi-job collaborative cryptographic service scheduling problem as a multiobjective optimized job flow scheduling problem, and using a multi-agent reinforcement learning method, efficient scheduling and optimal configuration of cryptographic service resources are achieved. By introducing reinforcement learning, resource allocation strategies can be adjusted in real time in a dynamic environment, improving resource utilization and achieving load balancing. Experimental results show that this algorithm has significant advantages in path planning length, system delay and network load balancing, and effectively solves the problem of complex resource scheduling in cryptographic services.Keywords: multi-agent reinforcement learning, non-stationary dynamics, multi-agent systems, cooperative and competitive agents
Procedia PDF Downloads 2413316 Machine Learning Approach for Anomaly Detection in the Simulated Iec-60870-5-104 Traffic
Authors: Stepan Grebeniuk, Ersi Hodo, Henri Ruotsalainen, Paul Tavolato
Abstract:
Substation security plays an important role in the power delivery system. During the past years, there has been an increase in number of attacks on automation networks of the substations. In spite of that, there hasn’t been enough focus dedicated to the protection of such networks. Aiming to design a specialized anomaly detection system based on machine learning, in this paper we will discuss the IEC 60870-5-104 protocol that is used for communication between substation and control station and focus on the simulation of the substation traffic. Firstly, we will simulate the communication between substation slave and server. Secondly, we will compare the system's normal behavior and its behavior under the attack, in order to extract the right features which will be needed for building an anomaly detection system. Lastly, based on the features we will suggest the anomaly detection system for the asynchronous protocol IEC 60870-5-104.Keywords: Anomaly detection, IEC-60870-5-104, Machine learning, Man-in-the-Middle attacks, Substation security
Procedia PDF Downloads 368