Search results for: third-level digital divide
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 2955

Search results for: third-level digital divide

1245 Sentence vs. Keyword Content Analysis in Intellectual Capital Disclosures Study

Authors: Martin Surya Mulyadi, Yunita Anwar, Rosinta Ria Panggabean

Abstract:

Major transformations in economic activity from an agricultural economy to knowledge economy have led to an increasing focus on intellectual capital (IC) that has been characterized by continuous innovation, the spread of digital and communication technologies, intangible and human factors. IC is defined as the possession of knowledge and experience, professional knowledge and skill, proper relationships and technological capacities, which when applied will give organizations a competitive advantage. All of IC report/disclosure could be captured from the corporate annual report as it is a communication device that allows a corporation to connect with various external and internal stakeholders. This study was conducted using sentence-content analysis of IC disclosure in the annual report. This research aims to analyze whether the keyword-content analysis is reliable research methodology for IC disclosure related research.

Keywords: intellectual capital, intellectual capital disclosure, content analysis, annual report, sentence analysis, keyword analysis

Procedia PDF Downloads 367
1244 Status of Vocational Education and Training in India: Policies and Practices

Authors: Vineeta Sirohi

Abstract:

The development of critical skills and competencies becomes imperative for young people to cope with the unpredicted challenges of the time and prepare for work and life. Recognizing that education has a critical role in reaching sustainability goals as emphasized by 2030 agenda for sustainability development, educating youth in global competence, meta-cognitive competencies, and skills from the initial stages of formal education are vital. Further, educating for global competence would help in developing work readiness and boost employability. Vocational education and training in India as envisaged in various policy documents remain marginalized in practice as compared to general education. The country is still far away from the national policy goal of tracking 25% of the secondary students at grade eleven and twelve under the vocational stream. In recent years, the importance of skill development has been recognized in the present context of globalization and change in the demographic structure of the Indian population. As a result, it has become a national policy priority and taken up with renewed focus by the government, which has set the target of skilling 500 million people by 2022. This paper provides an overview of the policies, practices, and current status of vocational education and training in India supported by statistics from the National Sample Survey, the official statistics of India. The national policy documents and annual reports of the organizations actively involved in vocational education and training have also been examined to capture relevant data and information. It has also highlighted major initiatives taken by the government to promote skill development. The data indicates that in the age group 15-59 years, only 2.2 percent reported having received formal vocational training, and 8.6 percent have received non-formal vocational training, whereas 88.3 percent did not receive any vocational training. At present, the coverage of vocational education is abysmal as less than 5 percent of the students are covered by the vocational education programme. Besides, launching various schemes to address the mismatch of skills supply and demand, the government through its National Policy on Skill Development and Entrepreneurship 2015 proposes to bring about inclusivity by bridging the gender, social and sectoral divide, ensuring that the skilling needs of socially disadvantaged and marginalized groups are appropriately addressed. It is fundamental that the curriculum is aligned with the demands of the labor market, incorporating more of the entrepreneur skills. Creating nonfarm employment opportunities for educated youth will be a challenge for the country in the near future. Hence, there is a need to formulate specific skill development programs for this sector and also programs for upgrading their skills to enhance their employability. There is a need to promote female participation in work and in non-traditional courses. Moreover, rigorous research and development of a robust information base for skills are required to inform policy decisions on vocational education and training.

Keywords: policy, skill, training, vocational education

Procedia PDF Downloads 152
1243 The Case for Strategic Participation: How Facilitated Engagement Can Be Shown to Reduce Resistance and Improve Outcomes Through the Use of Strategic Models

Authors: Tony Mann

Abstract:

This paper sets out the case for involving and engaging employees/workers/stakeholders/staff in any significant change that is being considered by the senior executives of the organization. It establishes the rationale, the approach, the methodology of engagement and the benefits of a participative approach. It challenges the new norm of imposing change for fear of resistance and instead suggests that involving people has better outcomes and a longer-lasting impact. Various strategic models are introduced and illustrated to explain how the process can be most effective. The paper highlights one model in particular (the Process Iceberg® Organizational Change model) that has proven to be instrumental in developing effective change. Its use is demonstrated in its various forms and explains why so much change fails to address the key elements and how we can be more productive in managing change. ‘Participation’ in change is too often seen as negative, expensive and unwieldy. The paper aims to show that another model: UIA=O+E, can offset the difficulties and, in fact, produce much more positive and effective change.

Keywords: facilitation, stakeholders, buy-in, digital workshops

Procedia PDF Downloads 108
1242 Selfie: Redefining Culture of Narcissism

Authors: Junali Deka

Abstract:

“Pictures speak more than a thousand words”. It is the power of image which can have multiple meanings the way it is read by the viewers. This research article is an outcome of the extensive study of the phenomenon of‘selfie culture’ and dire need of self-constructed virtual identity among youths. In the recent times, there has been a revolutionary change in the concept of photography in terms of both techniques and applications. The popularity of ‘self-portraits’ mainly depend on the temporal space and time created on social networking sites like Facebook, Instagram. With reference to Stuart’s Hall encoding and decoding process, the article studies the behavior of the users who post photographs online. The photographic messages (Roland Barthes) are interpreted differently by different viewers. The notion of ‘self’, ‘self-love and practice of looking (Marita Sturken) and ways of seeing (John Berger) got new definition and dimensional together. After Oscars Night, show host Ellen DeGeneres’s selfie created the most buzz and hype in the social media. The term was judged the word of 2013, and has earned its place in the dictionary. “In November 2013, the word "selfie" was announced as being the "word of the year" by the Oxford English Dictionary. By the end of 2012, Time magazine considered selfie one of the "top 10 buzzwords" of that year; although selfies had existed long before, it was in 2012 that the term "really hit the big time an Australian origin. The present study was carried to understand the concept of ‘selfie-bug’ and the phenomenon it has created among youth (especially students) at large in developing a pseudo-image of its own. The topic was relevant and gave a platform to discuss about the cultural, psychological and sociological implications of selfie in the age of digital technology. At the first level, content analysis of the primary and secondary sources including newspapers articles and online resources was carried out followed by a small online survey conducted with the help of questionnaire to find out the student’s view on selfie and its social and psychological effects. The newspapers reports and online resources confirmed that selfie is a new trend in the digital media and it has redefined the notion of beauty and self-love. The Facebook and Instagram are the major platforms used to express one-self and creation of virtual identity. The findings clearly reflected the active participation of female students in comparison to male students. The study of the photographs of few selected respondents revealed the difference of attitude and image building among male and female users. The study underlines some basic questions about the desire of reconstruction of identity among young generation, such as - are they becoming culturally narcissist; responsible factors for cultural, social and moral changes in the society, psychological and technological effects caused by Smartphone as well, culminating into a big question mark whether the selfie is a social signifier of identity construction.

Keywords: Culture, Narcissist, Photographs, Selfie

Procedia PDF Downloads 407
1241 Core Number Optimization Based Scheduler to Order/Mapp Simulink Application

Authors: Asma Rebaya, Imen Amari, Kaouther Gasmi, Salem Hasnaoui

Abstract:

Over these last years, the number of cores witnessed a spectacular increase in digital signal and general use processors. Concurrently, significant researches are done to get benefit from the high degree of parallelism. Indeed, these researches are focused to provide an efficient scheduling from hardware/software systems to multicores architecture. The scheduling process consists on statically choose one core to execute one task and to specify an execution order for the application tasks. In this paper, we describe an efficient scheduler that calculates the optimal number of cores required to schedule an application, gives a heuristic scheduling solution and evaluates its cost. Our proposal results are evaluated and compared with Preesm scheduler results and we prove that ours allows better scheduling in terms of latency, computation time and number of cores.

Keywords: computation time, hardware/software system, latency, optimization, multi-cores platform, scheduling

Procedia PDF Downloads 283
1240 Smart Airport: Application of Internet of Things for Confronting Airport Challenges

Authors: Ali Safaeianpour, Nima Shamandi

Abstract:

As air traffic expands, many airports have evolved into transit centers for people, information, and commerce, and technology implementation is an absolute part of airport development. Several challenges are in the way of implementing technology in an airport. Airport 4.0 proposes the "Smart Airport" concept, which focuses on using modern technologies such as Big Data, the Internet of Things (IoT), advanced biometric systems, blockchain, and cloud computing to alter and enhance passengers' journeys. Several common IoT concrete topics as partial keys to smart airports are discussed and introduced, ranging from automated check-in systems to exterior tracking processes, with the goal of enlightening more and more insightful ideas and proposals about smart airport solutions. IoT will dramatically alter people's lives by infusing intelligence, boosting the quality of life, and assembling it smarter. This paper reviews the approaches to transforming an airport into a smart airport and describes several enabling components of IoT and challenges that can hinder the implementation of a smart airport's function, which require to be addressed.

Keywords: airport 4.0, digital airport, smart airport, IoT

Procedia PDF Downloads 113
1239 Freedom with Limitations: The Nature of Free Expression in the European Case-Law

Authors: Laszlo Vari

Abstract:

In the digital age, the spread of the mobile world and the nature of the cyberspace, offers many new opportunities for the prevalence of the fundamental right to free expression, and therefore, for free speech and freedom of the press; however, these new information communication technologies carry many new challenges. Defamation, censorship, fake news, misleading information, hate speech, breach of copyright etc., are only some of the violations, all of which can be derived from the harmful exercise of freedom of expression, all which become more salient in the internet. Here raises the question: how can we eliminate these problems, and practice our fundamental freedom rightfully? To answer this question, we should understand the elements and the characteristic of the nature of freedom of expression, and the role of the actors whose duties and responsibilities are crucial in the prevalence of this fundamental freedom. To achieve this goal, this paper will explore the European practice to understand instructions found in the case-law of the European Court of Human rights for the rightful exercise of freedom of expression.

Keywords: collision of rights, European case-law, freedom opinion and expression, media law, freedom of information, online expression

Procedia PDF Downloads 139
1238 Exploring the Carer Gender Support Gap: Results from Freedom of Information Requests to Adult Social Services in England

Authors: Stephen Bahooshy

Abstract:

Our understanding of gender inequality has advanced in recent years. Differences in pay and societal gendered behaviour expectations have been emphasized. It is acknowledged globally that gender shapes everyone’s experiences of health and social care, including access to care, use of services and products, and the interaction with care providers. NHS Digital in England collects data from local authorities on the number of carers and people with support needs and the services they access. This data does not provide a gender breakdown. Caring can have many positive and negative impacts on carers’ health and wellbeing. For example, caring can improve physical health, provide a sense of pride and purpose, and reduced stress levels for those who undertake a caring role by choice. Negatives of caring include financial concerns, social isolation, a reduction in earnings, and not being recognized as a carer or involved and consulted by health and social care professionals. Treating male and female carers differently is by definition unequitable and precludes one gender from receiving the benefits of caring whilst potentially overburdening the other with the negatives of caring. In order to explore the issue on a preliminary basis, five local authorities who provide statutory adult social care services in England were sent Freedom of Information requests in 2019. The authorities were selected to include county councils and London boroughs. The authorities were asked to provide data on the amount of money spent on care at home packages to people over 65 years, broken down by gender and carer gender for each financial year between 2013 and 2019. Results indicated that in each financial year, female carers supporting someone over 65 years received less financial support for care at home support packages than male carers. Over the six-year period, this difference equated to a £9.5k deficit in financial support received on average per female carer when compared to male carers. An example of a London borough with the highest disparity presented an average weekly spend on care at home for people over 65 with a carer of £261.35 for male carers and £165.46 for female carers. Consequently, female carers in this borough received on average £95.89 less per week in care at home support than male carers. This highlights a real and potentially detrimental disparity in the care support received to female carers in order to support them to continue to care in parts of England. More research should be undertaken in this area to better explore this issue and to understand if these findings are unique to these social care providers or part of a wider phenomenon. NHS Digital should request local authorities collect data on gender in the same way that large employers in the United Kingdom are required by law to provide data on staff salaries by gender. People who allocate social care packages of support should consider the impact of gender when allocating support packages to people with support needs and who have carers to reduce any potential impact of gender bias on their decision-making.

Keywords: caregivers, carers, gender equality, social care

Procedia PDF Downloads 165
1237 Networked Radar System to Increase Safety of Urban Railroad Crossing

Authors: Sergio Saponara, Luca Fanucci, Riccardo Cassettari, Ruggero Piernicola, Marco Righetto

Abstract:

The paper presents an innovative networked radar system for detection of obstacles in a railway level crossing scenario. This Monitoring System (MS) is able to detect moving or still obstacles within the railway level crossing area automatically, avoiding the need of human presence for surveillance. The MS is also connected to the National Railway Information and Signaling System to communicate in real-time the level crossing status. The architecture is compliant with the highest Safety Integrity Level (SIL4) of the CENELEC standard. The number of radar sensors used is configurable at set-up time and depends on how large the level crossing area can be. At least two sensors are expected and up four can be used for larger areas. The whole processing chain that elaborates the output sensor signals, as well as the communication interface, is fully-digital, was designed in VHDL code and implemented onto a Xilinx Virtex 6.

Keywords: radar for safe mobility, railroad crossing, railway, transport safety

Procedia PDF Downloads 480
1236 Analysing the Benefit of Real-Time Digital Translation for ESL Learners in a Post-secondary Canadian Classroom

Authors: Jordan Shuler

Abstract:

The goal of this study is to determine whether real-time language translation benefits ESL learners by contributing to overall equity in the classroom. Equity will be measured quantitatively through assessment performance and qualitatively through student survey. Two separate sections of students studying the same course will receive identical curriculum: one group, the control, will be taught in English and the other group in English with real-time translation into the students' first languages. The professor will use Microsoft Translator during lectures, in-class discussions, and Q&A time. The college is committed to finding new ways of teaching and learning, as outlined in Strategy 2022. If this research finds a positive relationship between language translation and student academic success, the technology will surely be encouraged for adoption by all George Brown College faculty. With greater acceptance, this technology could influence equity and pedagogy in the larger educational community.

Keywords: ESL learners, equity, innovative teaching strategies, language translation

Procedia PDF Downloads 120
1235 Communicating Safety: A Digital Ethnography Investigating Social Media Use for Workplace Safety

Authors: Kelly Jaunzems

Abstract:

Social media is a powerful instrument of communication, enabling the presentation of information in multiple forms and modes, amplifying the interactions between people, organisations, and stakeholders, and increasing the range of communication channels available. Younger generations are highly engaged with social media and more likely to use this channel than any other to seek information. Given this, it may appear extraordinary that occupational safety and health professionals have yet to seriously engage with social media for communicating safety messages to younger audiences who, in many industries, might be statistically more likely to encounter more workplace harm or injury. Millennials, defined as those born between 1981-2000, have distinctive characteristics that also impact their interaction patterns rendering many traditional occupational safety and health communication channels sub-optimal or near obsolete. Used to immediate responses, 280-character communication, shares, likes, and visual imagery, millennials struggle to take seriously the low-tech, top-down communication channels such as safety noticeboards, toolbox meetings, and passive tick-box online inductions favoured by traditional OSH professionals. This paper draws upon well-established communication findings, which argue that it is important to know a target audience and reach them using their preferred communication pathways, particularly if the aim is to impact attitudes and behaviours. Health practitioners have adopted social media as a communication channel with great success, yet safety practitioners have failed to follow this lead. Using a digital ethnography approach, this paper examines seven organisations’ Facebook posts from two one-month periods one year apart, one in 2018 and one in 2019. Each of the years informs organisation-based case studies. Comparing, contrasting, and drawing upon these case studies, the paper discusses and evaluates the (non) use of social media communication of safety information in terms of user engagement, shareability, and overall appeal. The success of health practitioners’ use of social media provides a compelling template for the implementation of social media into organisations’ safety communication strategies. Highly visible content such as that found on social media allows an organization to become more responsive and engage in two-way conversations with their audience, creating more engaged and participatory conversations around safety. Further, using social media to address younger audiences with a range of tonal qualities (for example, the use of humour) can achieve cut through in a way that grim statistics fail to do. On the basis of 18 months of interviews, filed work, and data analysis, the paper concludes with recommendations for communicating safety information via social media. It proposes exploration of the social media communication formula that, when utilised by safety practitioners, may create an effective social media presence. It is anticipated that such social media use will increase engagement, expand the number of followers and reduce the likelihood and severity of safety-related incidents. The tools offered may provide a path for safety practitioners to reach a disengaged generation of workers to build a cohesive and inclusive conversation around ways to keep people safe at work.

Keywords: social media, workplace safety, communication strategies, young workers

Procedia PDF Downloads 116
1234 Women's Perceptions of Zika Virus Prevention Recommendations: A Tale of Two Cities within Fortaleza, Brazil

Authors: Jeni Stolow, Lina Moses, Carl Kendall

Abstract:

Zika virus (ZIKV) reemerged as a global threat in 2015 with Brazil at its epicenter. Brazilians have a long history of combatting Aedes aegypti mosquitos as it is a common vector for dengue, chikungunya, and yellow fever. As a response to the epidemic, public health authorities promoted ZIKV prevention behaviors such as mosquito bite prevention, reproductive counseling for women who are pregnant or contemplating pregnancy, pregnancy avoidance, and condom use. Most prevention efforts from Brazil focused on the mosquito vector- utilizing recycled dengue approaches without acknowledging the context in which women were able to adhere to these prevention messages. This study used qualitative methods to explore how women in Fortaleza, Brazil perceive ZIKV, the Brazilian authorities’ ZIKV prevention recommendations, and the feasibility of adhering to these recommendations. A core study aim was to look at how women perceive their physical, social, and natural environment as it impacts women’s ability to adhere to ZIKV prevention behaviors. A Rapid Anthropological Assessment (RAA) containing observations, informational interviews, and semi-structured in-depth interviews were utilized for data collection. The study utilized Grounded Theory as the systematic inductive method of analyzing the data collected. Interviews were conducted with 35 women of reproductive age (15-39 years old), who primarily utilize the public health system. It was found that women’s self-identified economic class was associated with how strongly women felt they could prevent ZIKV. All women interviewed technically belong to the C-class, the middle economic class. Although all members of the same economic class, there was a divide amongst participants as to who perceived themselves as higher C-class versus lower C-class. How women saw their economic status was dictated by how they perceived their physical, social, and natural environment. Women further associated their environment and their economic class to their likelihood of contracting ZIKV, their options for preventing ZIKV, their ability to prevent ZIKV, and their willingness to attempt to prevent ZIKV. Women’s perceived economic status was found to relate to their structural environment (housing quality, sewage, and locations to supplies), social environment (family and peer norms), and natural environment (wetland areas, natural mosquito breeding sites, and cyclical nature of vectors). Findings from this study suggest that women’s perceived environment and economic status impact their perceived feasibility and desire to attempt behaviors to prevent ZIKV. Although ZIKV has depleted from epidemic to endemic status, it is suggested that the virus will return as cyclical outbreaks like that seen with similar arboviruses such as dengue and chikungunya. As the next ZIKV epidemic approaches it is essential to understand how women perceive themselves, their abilities, and their environments to best aid the prevention of ZIKV.

Keywords: Aedes aegypti, environment, prevention, qualitative, zika

Procedia PDF Downloads 133
1233 The Digital Transformation of Life Insurance Sales in Iran With the Emergence of Personal Financial Planning Robots; Opportunities and Challenges

Authors: Pedram Saadati, Zahra Nazari

Abstract:

Anticipating and identifying future opportunities and challenges facing industry activists for the emergence and entry of new knowledge and technologies of personal financial planning, and providing practical solutions is one of the goals of this research. For this purpose, a future research tool based on receiving opinions from the main players of the insurance industry has been used. The research method in this study was in 4 stages; including 1- a survey of the specialist salesforce of life insurance in order to identify the variables 2- the ranking of the variables by experts selected by a researcher-made questionnaire 3- holding a panel of experts with the aim of understanding the mutual effects of the variables and 4- statistical analyzes of the mutual effects matrix in Mick Mac software is done. The integrated analysis of influencing variables in the future has been done with the method of Structural Analysis, which is one of the efficient and innovative methods of future research. A list of opportunities and challenges was identified through a survey of best-selling life insurance representatives who were selected by snowball sampling. In order to prioritize and identify the most important issues, all the issues raised were sent to selected experts who were selected theoretically through a researcher-made questionnaire. The respondents determined the importance of 36 variables through scoring, so that the prioritization of opportunity and challenge variables can be determined. 8 of the variables identified in the first stage were removed by selected experts, and finally, the number of variables that could be examined in the third stage became 28 variables, which, in order to facilitate the examination, were divided into 6 categories, respectively, 11 variables of organization and management. Marketing and sales 7 cases, social and cultural 6 cases, technological 2 cases, rebranding 1 case and insurance 1 case were divided. The reliability of the researcher-made questionnaire was confirmed with the Cronbach's alpha test value of 0.96. In the third stage, by forming a panel consisting of 5 insurance industry experts, the consensus of their opinions about the influence of factors on each other and the ranking of variables was entered into the matrix. The matrix included the interrelationships of 28 variables, which were investigated using the structural analysis method. By analyzing the data obtained from the matrix by Mic Mac software, the findings of the research indicate that the categories of "correct training in the use of the software, the weakness of the technology of insurance companies in personalizing products, using the approach of equipping the customer, and honesty in declaring no need Customer to Insurance", the most important challenges of the influencer and the categories of "salesforce equipping approach, product personalization based on customer needs assessment, customer's pleasant experience of being consulted with consulting robots, business improvement of the insurance company due to the use of these tools, increasing the efficiency of the issuance process and optimal customer purchase" were identified as the most important opportunities for influence.

Keywords: personal financial planning, wealth management, advisor robots, life insurance, digital transformation

Procedia PDF Downloads 46
1232 Estimating Lost Digital Video Frames Using Unidirectional and Bidirectional Estimation Based on Autoregressive Time Model

Authors: Navid Daryasafar, Nima Farshidfar

Abstract:

In this article, we make attempt to hide error in video with an emphasis on the time-wise use of autoregressive (AR) models. To resolve this problem, we assume that all information in one or more video frames is lost. Then, lost frames are estimated using analogous Pixels time information in successive frames. Accordingly, after presenting autoregressive models and how they are applied to estimate lost frames, two general methods are presented for using these models. The first method which is the same standard method of autoregressive models estimates lost frame in unidirectional form. Usually, in such condition, previous frames information is used for estimating lost frame. Yet, in the second method, information from the previous and next frames is used for estimating the lost frame. As a result, this method is known as bidirectional estimation. Then, carrying out a series of tests, performance of each method is assessed in different modes. And, results are compared.

Keywords: error steganography, unidirectional estimation, bidirectional estimation, AR linear estimation

Procedia PDF Downloads 539
1231 Geospatial Data Complexity in Electronic Airport Layout Plan

Authors: Shyam Parhi

Abstract:

Airports GIS program collects Airports data, validate and verify it, and stores it in specific database. Airports GIS allows authorized users to submit changes to airport data. The verified data is used to develop several engineering applications. One of these applications is electronic Airport Layout Plan (eALP) whose primary aim is to move from paper to digital form of ALP. The first phase of development of eALP was completed recently and it was tested for a few pilot program airports across different regions. We conducted gap analysis and noticed that a lot of development work is needed to fine tune at least six mandatory sheets of eALP. It is important to note that significant amount of programming is needed to move from out-of-box ArcGIS to a much customized ArcGIS which will be discussed. The ArcGIS viewer capability to display essential features like runway or taxiway or the perpendicular distance between them will be discussed. An enterprise level workflow which incorporates coordination process among different lines of business will be highlighted.

Keywords: geospatial data, geology, geographic information systems, aviation

Procedia PDF Downloads 416
1230 Analysis of the Attitude of Students in the Use of Simulation in Physics Teaching

Authors: Ricardo Merlo

Abstract:

The use of simulation as a digital didactic tool allowed students to reproduce the laws of Physics in order to improve their academic performance. The didactic resource of simulation also favored the motivation of most of the young people, depending on the subject of Physics to be developed in the classroom and in that sense, it was significant to know the favorable or unfavorable attitude that the students presented about the use of simulation resources to maximize the anchorage of the contents planned for the different classes developed in the classroom. The different real-time simulation applications that were offered free of charge through the Internet were not presented as a specific resource that could be used in a didactic model, and in that framework, the teachers of Physics at the university level did not apply these resources in a systematic way with the knowledge of the favorable or unfavorable attitude of the students towards these didactic resources. For this reason, this work proposed the design and application of attitude questionnaires to enhance the use of those simulation resources that allowed for improving the quality of the class and the academic performance of the students.

Keywords: physics teaching, attitude, motivation, didactic resources

Procedia PDF Downloads 71
1229 Chaos Cryptography in Cloud Architectures with Lower Latency

Authors: Mohammad A. Alia

Abstract:

With the rapid evolution of the internet applications, cloud computing becomes one of today’s hottest research areas due to its ability to reduce costs associated with computing. Cloud is, therefore, increasing flexibility and scalability for computing services in the internet. Cloud computing is Internet based computing due to shared resources and information which are dynamically delivered to consumers. As cloud computing share resources via the open network, hence cloud outsourcing is vulnerable to attack. Therefore, this paper will explore data security of cloud computing by implementing chaotic cryptography. The proposal scenario develops a problem transformation technique that enables customers to secretly transform their information. This work proposes the chaotic cryptographic algorithms have been applied to enhance the security of the cloud computing accessibility. However, the proposed scenario is secure, easy and straightforward process. The chaotic encryption and digital signature systems ensure the security of the proposed scenario. Though, the choice of the key size becomes crucial to prevent a brute force attack.

Keywords: chaos, cloud computing, security, cryptography

Procedia PDF Downloads 345
1228 Sustainability Model for Rural Telecenter Using Business Intelligence Technique

Authors: Razak Rahmat, Azizah Ahmad, Rafidah Razak, Roshidi Din, Azizi Abas

Abstract:

Telecenter is a place where communities can access computers, the Internet, and other digital technologies to enable them to gather information, create, learn, and communicate with others. However, previous studies found that sustainability issues related to economic, political and institutional, social and technology is one of the major problem faced by the telecenter. Based on that problem, this research is planning to design a possible solution on rural telecenters sustainability with the support of business intelligence (BI). The empirical study will be conducted through the qualitative and quantitative method including interviews and observations with a range of stakeholders including ministry officers, telecenters managers and operators. Result from the data collection will be analyze using the causal modeling approach of SEM SmartPLS for the validity. The expected finding from this research is the Business Intelligent Requirement Model as a guild for sustainability of the rural telecenters.

Keywords: Rural ICT Telecenter(RICTT), business intelligence, sustainability, requirement analysis modal

Procedia PDF Downloads 483
1227 Exploring Artificial Intelligence as a Transformative Tool for Urban Management

Authors: R. R. Govind

Abstract:

In the digital age, artificial intelligence (AI) is having a significant impact on the rapid changes that cities are experiencing. This study explores the profound impact of AI on urban morphology, especially with regard to promoting friendly design choices. It addresses a significant research gap by examining the real-world effects of integrating AI into urban design and management. The main objective is to outline a framework for integrating AI to transform urban settings. The study employs an urban design framework to effectively navigate complicated urban environments, emphasize the need for urban management, and provide efficient planning and design strategies. Taking Gangtok's informal settlements as a focal point, the study employs AI methodologies such as machine learning, predictive analytics, and generative AI to tackle issues of 'urban informality'. The insights garnered not only offer valuable perspectives but also unveil AI's transformative potential in addressing contemporary urban challenges.

Keywords: urban design, artificial intelligence, urban challenges, machine learning, urban informality

Procedia PDF Downloads 61
1226 Main Chaos-Based Image Encryption Algorithm

Authors: Ibtissem Talbi

Abstract:

During the last decade, a variety of chaos-based cryptosystems have been investigated. Most of them are based on the structure of Fridrich, which is based on the traditional confusion-diffusion architecture proposed by Shannon. Compared with traditional cryptosystems (DES, 3DES, AES, etc.), the chaos-based cryptosystems are more flexible, more modular and easier to be implemented, which make them suitable for large scale-data encyption, such as images and videos. The heart of any chaos-based cryptosystem is the chaotic generator and so, a part of the efficiency (robustness, speed) of the system depends greatly on it. In this talk, we give an overview of the state of the art of chaos-based block ciphers and we describe some of our schemes already proposed. Also we will focus on the essential characteristics of the digital chaotic generator, The needed performance of a chaos-based block cipher in terms of security level and speed of calculus depends on the considered application. There is a compromise between the security and the speed of the calculation. The security of these block block ciphers will be analyzed.

Keywords: chaos-based cryptosystems, chaotic generator, security analysis, structure of Fridrich

Procedia PDF Downloads 684
1225 Investigated Optimization of Davidson Path Loss Model for Digital Terrestrial Television (DTTV) Propagation in Urban Area

Authors: Pitak Keawbunsong, Sathaporn Promwong

Abstract:

This paper presents an investigation on the efficiency of the optimized Davison path loss model in order to look for a suitable path loss model to design and planning DTTV propagation for small and medium urban areas in southern Thailand. Hadyai City in Songkla Province is chosen as the case study to collect the analytical data on the electric field strength. The optimization is conducted through the least square method while the efficiency index is through the statistical value of relative error (RE). The result of the least square method is the offset and slop of the frequency to be used in the optimized process. The statistical result shows that RE of the old Davidson model is at the least when being compared with the optimized Davison and the Hata models. Thus, the old Davison path loss model is the most accurate that further becomes the most optimized for the plan on the propagation network design.

Keywords: DTTV propagation, path loss model, Davidson model, least square method

Procedia PDF Downloads 338
1224 Fighting the Crisis with 4.0 Competences: Higher Education Projects in the Times of Pandemic

Authors: Jadwiga Fila, Mateusz Jezowski, Pawel Poszytek

Abstract:

The outbreak of the global COVID-19 pandemic started the times of crisis full of uncertainty, especially in the field of transnational cooperation projects based on the international mobility of their participants. This is notably the case of Erasmus+ Program for higher education, which is the flagship European initiative boosting cooperation between educational institutions, businesses, and other actors, enabling students and staff mobility, as well as strategic partnerships between different parties. The aim of this abstract is to study whether competences 4.0 are able to empower Erasmus+ project leaders in sustaining their international cooperation in times of global crisis, widespread online learning, and common project disruption or cancellation. The concept of competences 4.0 emerged from the notion of the industry 4.0, and it relates to skills that are fundamental for the current labor market. For the aim of the study presented in this abstract, four main 4.0 competences were distinguished: digital, managerial, social, and cognitive competence. The hypothesis for the study stipulated that the above-mentioned highly-developed competences may act as a protective shield against the pandemic challenges in terms of projects’ sustainability and continuation. The objective of the research was to assess to what extent individual competences are useful in managing projects in times of crisis. For this purpose, the study was conducted, involving, among others, 141 Polish higher education project leaders who were running their cooperation projects during the peak of the COVID-19 pandemic (Mar-Nov 2020). The research explored the self-perception of the above-mentioned competences among Erasmus+ project leaders and the contextual data regarding the sustainability of the projects. The quantitative character of data permitted validation of scales (Cronbach’s Alfa measure), and the use of factor analysis made it possible to create a distinctive variable for each competence and its dimensions. Finally, logistic regression was used to examine the association of competences and other factors on project status. The study shows that the project leaders’ competence profile attributed the highest score to digital competence (4.36 on the 1-5 scale). Slightly lower values were obtained for cognitive competence (3.96) and managerial competence (3.82). The lowest score was accorded to one specific dimension of social competence: adaptability and ability to manage stress (1.74), which proves that the pandemic was a real challenge which had to be faced by project coordinators. For higher education projects, 10% were suspended or prolonged because of the COVID-19 pandemic, whereas 90% were undisrupted (continued or already successfully finished). The quantitative analysis showed a positive relationship between the leaders’ levels of competences and the projects status. In the case of all competences, the scores were higher for project leaders who finished projects successfully than for leaders who suspended or prolonged their projects. The research demonstrated that, in the demanding times of the COVID-19 pandemic, competences 4.0, to a certain extent, do play a significant role in the successful management of Erasmus+ projects. The implementation and sustainability of international educational projects, despite mobility and sanitary obstacles, depended, among other factors, on the level of leaders’ competences.

Keywords: Competences 4.0, COVID-19 pandemic, Erasmus+ Program, international education, project sustainability

Procedia PDF Downloads 92
1223 The Power of Earned Media: Exploring the Key Success of Love Destiny, Thai Smash Hit Television Drama

Authors: Wilaiwan Jongwilaikasaem, Phatteera Sarakornborrirak

Abstract:

While Thai television producers feel anxious about digital disruption, Love Destiny, Thai television period drama became smash hit in Thailand in 2018. Audience throughout the country not only watched the drama both offline and online but also spread the content of the drama on social media and followed cultural trends from the protagonist. Thus, the main purpose of this article is to examine the secret behind the success of Love Destiny. Data were collected from content analysis and in-depth interview. The result shows that the key success of the drama is from earned media phenomenon from the audience and marketers’ engagement. As Love Destiny has full-flavored content with traditional challenged plot, delicate production, and presentation of Thainess in a positive and tangible way; audience and marketers are enthusiastic about building up the popular trend of Love Destiny on social media and also coming back home to watch televisions when the drama was on the air.

Keywords: Thai drama, earned media, Love Destiny, television

Procedia PDF Downloads 177
1222 Enhancing Financial Security: Real-Time Anomaly Detection in Financial Transactions Using Machine Learning

Authors: Ali Kazemi

Abstract:

The digital evolution of financial services, while offering unprecedented convenience and accessibility, has also escalated the vulnerabilities to fraudulent activities. In this study, we introduce a distinct approach to real-time anomaly detection in financial transactions, aiming to fortify the defenses of banking and financial institutions against such threats. Utilizing unsupervised machine learning algorithms, specifically autoencoders and isolation forests, our research focuses on identifying irregular patterns indicative of fraud within transactional data, thus enabling immediate action to prevent financial loss. The data we used in this study included the monetary value of each transaction. This is a crucial feature as fraudulent transactions may have distributions of different amounts than legitimate ones, such as timestamps indicating when transactions occurred. Analyzing transactions' temporal patterns can reveal anomalies (e.g., unusual activity in the middle of the night). Also, the sector or category of the merchant where the transaction occurred, such as retail, groceries, online services, etc. Specific categories may be more prone to fraud. Moreover, the type of payment used (e.g., credit, debit, online payment systems). Different payment methods have varying risk levels associated with fraud. This dataset, anonymized to ensure privacy, reflects a wide array of transactions typical of a global banking institution, ranging from small-scale retail purchases to large wire transfers, embodying the diverse nature of potentially fraudulent activities. By engineering features that capture the essence of transactions, including normalized amounts and encoded categorical variables, we tailor our data to enhance model sensitivity to anomalies. The autoencoder model leverages its reconstruction error mechanism to flag transactions that deviate significantly from the learned normal pattern, while the isolation forest identifies anomalies based on their susceptibility to isolation from the dataset's majority. Our experimental results, validated through techniques such as k-fold cross-validation, are evaluated using precision, recall, and the F1 score alongside the area under the receiver operating characteristic (ROC) curve. Our models achieved an F1 score of 0.85 and a ROC AUC of 0.93, indicating high accuracy in detecting fraudulent transactions without excessive false positives. This study contributes to the academic discourse on financial fraud detection and provides a practical framework for banking institutions seeking to implement real-time anomaly detection systems. By demonstrating the effectiveness of unsupervised learning techniques in a real-world context, our research offers a pathway to significantly reduce the incidence of financial fraud, thereby enhancing the security and trustworthiness of digital financial services.

Keywords: anomaly detection, financial fraud, machine learning, autoencoders, isolation forest, transactional data analysis

Procedia PDF Downloads 57
1221 Computer Aided Classification of Architectural Distortion in Mammograms Using Texture Features

Authors: Birmohan Singh, V.K.Jain

Abstract:

Computer aided diagnosis systems provide vital opinion to radiologists in the detection of early signs of breast cancer from mammogram images. Masses and microcalcifications, architectural distortions are the major abnormalities. In this paper, a computer aided diagnosis system has been proposed for distinguishing abnormal mammograms with architectural distortion from normal mammogram. Four types of texture features GLCM texture, GLRLM texture, fractal texture and spectral texture features for the regions of suspicion are extracted. Support Vector Machine has been used as classifier in this study. The proposed system yielded an overall sensitivity of 96.47% and accuracy of 96% for the detection of abnormalities with mammogram images collected from Digital Database for Screening Mammography (DDSM) database.

Keywords: architecture distortion, mammograms, GLCM texture features, GLRLM texture features, support vector machine classifier

Procedia PDF Downloads 491
1220 Video Shot Detection and Key Frame Extraction Using Faber-Shauder DWT and SVD

Authors: Assma Azeroual, Karim Afdel, Mohamed El Hajji, Hassan Douzi

Abstract:

Key frame extraction methods select the most representative frames of a video, which can be used in different areas of video processing such as video retrieval, video summary, and video indexing. In this paper we present a novel approach for extracting key frames from video sequences. The frame is characterized uniquely by his contours which are represented by the dominant blocks. These dominant blocks are located on the contours and its near textures. When the video frames have a noticeable changement, its dominant blocks changed, then we can extracte a key frame. The dominant blocks of every frame is computed, and then feature vectors are extracted from the dominant blocks image of each frame and arranged in a feature matrix. Singular Value Decomposition is used to calculate sliding windows ranks of those matrices. Finally the computed ranks are traced and then we are able to extract key frames of a video. Experimental results show that the proposed approach is robust against a large range of digital effects used during shot transition.

Keywords: FSDWT, key frame extraction, shot detection, singular value decomposition

Procedia PDF Downloads 397
1219 Examining Media Literacy Strategies through Questionnaires and Analyzing the Behavioral Patterns of Middle-Aged and Elderly Persons

Authors: Chia Yen Li, Wen Huei Chou, Mieko Ohsuga, Tsuyoshi Inoue

Abstract:

The evolution of the digital age has led to people’s lives being pervaded by both facts and misinformation, challenging media literacy (ML). Middle-aged and elderly persons (MEPs) are prone to disseminating large amounts of misinformation, which often endangers their lives due to erroneously believing such information. At present, several countries have actively established fact-checking platforms to combat misinformation, but they are unable to keep pace with the rapid proliferation of such information on social media. In this study, the questionnaire survey method was used to collect data on MEPs’ behavior, cognition, attitudes, and concepts of social media when using a mobile instant messaging app called LINE; analyze their behavioral patterns and reasons for sharing misinformation; and summarize design strategies for improving their ML. The findings can serve as a reference in future related research.

Keywords: media literacy, middle-aged and elderly persons, social media, misinformation

Procedia PDF Downloads 112
1218 The Effects of an Online Career Intervention on University Students’ Levels of Career Adaptability

Authors: Anna Veres

Abstract:

People’s ability to adapt to a constantly changing environment is essential. Career adaptability is central to Career Construction Theory, where proper adaptation to new situations, changing environments, and jobs require adequate career development. Based on current career theories and the possibilities offered by digital technology, the primary goal of this study is to develop career adaptability through an online tool. Its secondary goal is to apply for an online career intervention program and explore its developmental possibilities. A total of 132 university students from the bachelor program took part in the study, from which 65 students received a four-week online career intervention, while 67 participants formed the control group. Based on the results, it can state that career adaptability can be developed, and there is a great demand and interest from university students to use career-related programs on online platforms. Career interventions should be performed online as well if there is suitable software and a well-constructed program. Limitations and further implications are discussed.

Keywords: career adaptability, career development, online career intervention, university students

Procedia PDF Downloads 140
1217 A Neuro-Automata Decision Support System for the Control of Late Blight in Tomato Crops

Authors: Gizelle K. Vianna, Gustavo S. Oliveira, Gabriel V. Cunha

Abstract:

The use of decision support systems in agriculture may help monitoring large fields of crops by automatically detecting the symptoms of foliage diseases. In our work, we designed and implemented a decision support system for small tomatoes producers. This work investigates ways to recognize the late blight disease from the analysis of digital images of tomatoes, using a pair of multilayer perceptron neural networks. The networks outputs are used to generate repainted tomato images in which the injuries on the plant are highlighted, and to calculate the damage level of each plant. Those levels are then used to construct a situation map of a farm where a cellular automata simulates the outbreak evolution over the fields. The simulator can test different pesticides actions, helping in the decision on when to start the spraying and in the analysis of losses and gains of each choice of action.

Keywords: artificial neural networks, cellular automata, decision support system, pattern recognition

Procedia PDF Downloads 455
1216 Students' Willingness to Accept Virtual Lecturing Systems: An Empirical Study by Extending the UTAUT Model

Authors: Ahmed Shuhaiber

Abstract:

The explosion of the World Wide Web and the electronic trend of university teaching have transformed the learning style to become more learner-centred, Which has popularized the digital delivery of mediated lectures as an alternative or an adjunct to traditional lectures. Despite its potential and popularity, virtual lectures have not been adopted yet in Jordanian universities. This research aimed to fill this gap by studying the factors that influence student’s willingness to accept virtual lectures in one Jordanian University. A quantitative approach was followed by obtaining 216 survey responses and statistically applying the UTAUT model with some modifications. Results revealed that performance expectancy, effort expectancy, social influences and self-efficacy could significantly influence student’s attitudes towards virtual lectures. Additionally, facilitating conditions and attitudes towards virtual lectures were found with significant influence on student’s intention to take virtual lectures. Research implications and future work were specified afterwards.

Keywords: E-learning, student willingness, UTAUT, virtual Lectures, web-based learning systems

Procedia PDF Downloads 291