Search results for: landscape architecture curriculum
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 3662

Search results for: landscape architecture curriculum

1802 A Common Automated Programming Platform for Knowledge Based Software Engineering

Authors: Ivan Stanev, Maria Koleva

Abstract:

A common platform for automated programming (CPAP) is defined in details. Two versions of CPAP are described: Cloud-based (including the set of components for classic programming, and the set of components for combined programming) and KBASE based (including the set of components for automated programming, and the set of components for ontology programming). Four KBASE products (module for automated programming of robots, intelligent product manual, intelligent document display, and intelligent form generator) are analyzed and CPAP contributions to automated programming are presented.

Keywords: automated programming, cloud computing, knowledge based software engineering, service oriented architecture

Procedia PDF Downloads 324
1801 Cultural Routes: A Study of Anatolian Seljuks Madrasahs

Authors: Zeynep İnan Ocak, Gülsün Tanyeli

Abstract:

One of the most important architectural types of Islamic architecture is madrasah used as educational institutions, hospital or observatory. This type of buildings has one or two storeys, central open or closed courtyards, four iwans and students cells located among the iwans. The main characteristic of the designs featured in the portals. The Islamic art features and adornments are seen well on these buildings made of stone. The earliest examples date to late 12th century in Anatolia after the Battle of Manzikert. Under the Seljuks rule over the one thousand facilities were built in 12th and 13th centuries and there are one hundred thirty five madrasah in total list. But today no all of them are conserved only forty percent are remained. The Seljuks madrasah located in many Anatolian were registered as immovable cultural property in several times by Turkish Culture and Tourism Ministry. The first Turkish buildings inscribed on the World Heritage List are the Great Mosque and Hospital of Divriği in 1985. Also the nominated site named as Anatolian Seljuks Madrasah is in the tentative list of UNESCO World Heritage in 2014. The property is composed some of notable madrasah such as İnce Minareli Madrasah and Karatay Madrasah in Konya; Çifte Madrasah and Sahibiye Madrasah in Kayseri; Buruciye Madrasah, Çifte Minareli Madrasah and Gök Madrasah in Sivas; Çifte Minareli Madrasah and Yakutiye Madrasah in Erzurum; Cacabey Madrasah in Kirşehir. Certainly the advantage of tourism is important for conducting the preservation of heritage. It offers much kind of cultural heritage products by means of visiting monuments. In spite of advantage of tourism, it can be the negative effects of tourism on sites and places of cultural significance. While assisting and guiding the conservation works of madrasah, it should be get reference to international charters and other doctrinal texts about the relation between heritage and tourism. Thereby the monuments will be conserved in good condition promoting by tourism. It should be plan a project about the correlation of visitors and heritage to focus on theme of Seljuks architecture. This study aims to set out the principles about the conservation of madrasah as world heritage taking advantages of tourism. The madrasah as a heritage should be evaluated not only a monument but also cultural route. So the cultural route for madrasah is determined by means of a journey through space and time, how the heritage of the different Anatolian cities. Also the cultural route is created visiting both the madrasah and the other medieval structures. In this study, the route, the principles, relation of tourism are represented considering the conservation of Seljuks madrasah.

Keywords: architectural heritage, cultural routes, Seljuks madrasah, Anatolia

Procedia PDF Downloads 261
1800 Stock Movement Prediction Using Price Factor and Deep Learning

Authors: Hy Dang, Bo Mei

Abstract:

The development of machine learning methods and techniques has opened doors for investigation in many areas such as medicines, economics, finance, etc. One active research area involving machine learning is stock market prediction. This research paper tries to consider multiple techniques and methods for stock movement prediction using historical price or price factors. The paper explores the effectiveness of some deep learning frameworks for forecasting stock. Moreover, an architecture (TimeStock) is proposed which takes the representation of time into account apart from the price information itself. Our model achieves a promising result that shows a potential approach for the stock movement prediction problem.

Keywords: classification, machine learning, time representation, stock prediction

Procedia PDF Downloads 124
1799 Gymnastics Under Special Surveillance. The Impact Of Western Sanctions On Russian Sport

Authors: Aleksandra Majewska

Abstract:

The article analyses the impact of Western sanctions on Russian rhythmic gymnastics since the outbreak of war in Ukraine. The chronological presentation of events shows how international political tensions and economic sanctions have affected the organisation of competitions, training and the careers of athletes. The article outlines the key moments and decisions that have changed the landscape of Russian sport, including the decision to change the citizenship made by some gymnasts in order to continue competing in international competitions. Russia strongly opposes participation in competitions without its flag and anthem while maintaining the view that Russian gymnasts are crucial to the prestige of rhythmic gymnastics in the world. In response to the sanctions, Russia created its own rules for rhythmic gymnastics, according to which they now compete domestically. Furthermore, this sport in Russia is strongly linked to politics, which further emphasises its importance in the national and international context. The information collected derives from numerous interviews with Russian athletes, coaches and other people, which are available only in the Russian language. The findings highlight the significant difficulties Russian athletes have faced due to their isolation in the international arena and the adaptive strategies adopted by Russia in the face of these challenges. The article makes an important contribution to understanding the consequences of global politics on the world of sport and the fate of individual athletes.

Keywords: sport, gymnastics, war in Ukraine, sanctions

Procedia PDF Downloads 16
1798 A Multi-Scale Approach to Space Use: Habitat Disturbance Alters Behavior, Movement and Energy Budgets in Sloths (Bradypus variegatus)

Authors: Heather E. Ewart, Keith Jensen, Rebecca N. Cliffe

Abstract:

Fragmentation and changes in the structural composition of tropical forests – as a result of intensifying anthropogenic disturbance – are increasing pressures on local biodiversity. Species with low dispersal abilities have some of the highest extinction risks in response to environmental change, as even small-scale environmental variation can substantially impact their space use and energetic balance. Understanding the implications of forest disturbance is therefore essential, ultimately allowing for more effective and targeted conservation initiatives. Here, the impact of different levels of forest disturbance on the space use, energetics, movement and behavior of 18 brown-throated sloths (Bradypus variegatus) were assessed in the South Caribbean of Costa Rica. A multi-scale framework was used to measure forest disturbance, including large-scale (landscape-level classifications) and fine-scale (within and surrounding individual home ranges) forest composition. Three landscape-level classifications were identified: primary forests (undisturbed), secondary forests (some disturbance, regenerating) and urban forests (high levels of disturbance and fragmentation). Finer-scale forest composition was determined using measurements of habitat structure and quality within and surrounding individual home ranges for each sloth (home range estimates were calculated using autocorrelated kernel density estimation [AKDE]). Measurements of forest quality included tree connectivity, density, diameter and height, species richness, and percentage of canopy cover. To determine space use, energetics, movement and behavior, six sloths in urban forests, seven sloths in secondary forests and five sloths in primary forests were tracked using a combination of Very High Frequency (VHF) radio transmitters and Global Positioning System (GPS) technology over an average period of 120 days. All sloths were also fitted with micro data-loggers (containing tri-axial accelerometers and pressure loggers) for an average of 30 days to allow for behavior-specific movement analyses (data analysis ongoing for data-loggers and primary forest sloths). Data-loggers included determination of activity budgets, circadian rhythms of activity and energy expenditure (using the vector of the dynamic body acceleration [VeDBA] as a proxy). Analyses to date indicate that home range size significantly increased with the level of forest disturbance. Female sloths inhabiting secondary forests averaged 0.67-hectare home ranges, while female sloths inhabiting urban forests averaged 1.93-hectare home ranges (estimates are represented by median values to account for the individual variation in home range size in sloths). Likewise, home range estimates for male sloths were 2.35 hectares in secondary forests and 4.83 in urban forests. Sloths in urban forests also used nearly double (median = 22.5) the number of trees as sloths in the secondary forest (median = 12). These preliminary data indicate that forest disturbance likely heightens the energetic requirements of sloths, a species already critically limited by low dispersal ability and rates of energy acquisition. Energetic and behavioral analyses from the data-loggers will be considered in the context of fine-scale forest composition measurements (i.e., habitat quality and structure) and are expected to reflect the observed home range and movement constraints. The implications of these results are far-reaching, presenting an opportunity to define a critical index of habitat connectivity for low dispersal species such as sloths.

Keywords: biodiversity conservation, forest disturbance, movement ecology, sloths

Procedia PDF Downloads 89
1797 Gaia (Earth) Education Philosophy – A Journey Back to the Future

Authors: Darius Singh

Abstract:

This study adopts a research, develop, and deploy methodology to create a state-of-the-art forest preschool environment using technology and the Gaia (Earth) Education Philosophy as design support. The new philosophy adopts an ancient Greek terminology, “Gaia,” meaning “Mother Earth”, and it take its principle to model everything with the oldest living and breathing entity that it know – Earth. This includes using nature and biomimicry-based principles in building design, environments, curricula, teaching, learning, values and outcomes for children. The study highlights the potential effectiveness of the Gaia (Earth) Education Philosophy as a means of designing Earth-inspired environments for children’s learning. The discuss the strengths of biomimicry-based design principles and propose a curriculum that emphasizes natural outcomes for early childhood learning. Theoretical implications of the study are that the Gaia (Earth) Education Philosophy could serve as a strong foundation for educating young learners.it present a unique approach that promotes connections with Earth-principles and lessons that can contribute to the development of social and environmental consciousness among children and help educate generations to come into a stable and balanced future.

Keywords: earth science, nature education, sustainability, gaia, forest school, nature, inspirational teaching and learning

Procedia PDF Downloads 48
1796 Media Literacy: Information and Communication Technology Impact on Teaching and Learning Methods in Albanian Education System

Authors: Loreta Axhami

Abstract:

Media literacy in the digital age emerges not only as a set of skills to generate true knowledge and information but also as a pedagogy methodology, as a kind of educational philosophy. In addition to such innovations as information integration and communication technologies, media infrastructures, and web usage in the educational system, media literacy enables the change in the learning methods, pedagogy, teaching programs, and school curriculum itself. In this framework, this study focuses on ICT's impact on teaching and learning methods and the degree they are reflected in the Albanian education system. The study is based on a combination of quantitative and qualitative methods of scientific research. Referring to the study findings, it results that student’s limited access to the internet in school, focus on the hardcopy textbooks and the role of the teacher as the only or main source of knowledge and information are some of the main factors contributing to the implementation of authoritarian pedagogical methods in the Albanian education system. In these circumstances, the implementation of media literacy is recommended as an apt educational process for the 21st century, which requires a reconceptualization of textbooks as well as the application of modern teaching and learning methods by integrating information and communication technologies.

Keywords: authoritarian pedagogic model, education system, ICT, media literacy

Procedia PDF Downloads 118
1795 A Three Tier Secure KQML Interface with Novel Performatives

Authors: Dimple Juneja, Aarti Singh, Renu Hooda

Abstract:

Knowledge Query Manipulation Language (KQML) and FIPA ACL are two prime communication languages existing in multi agent systems (MAS). Both languages are more or less similar in terms of semantics (based on speech act theory) and offer cutting edge competition while establishing agent communication across Internet. In contrast to the fact that software agents operating on the internet are required to be more safeguarded from their counter-peer, both protocols lack security performatives. The paper proposes a three tier security interface with few novel security related performatives enhancing the basic architecture of KQML. The three levels are attestation, certification and trust establishment which enforces a tight security and hence reduces the security breeches.

Keywords: multiagent systems, KQML, FIPA ACL, performatives

Procedia PDF Downloads 396
1794 Social Media as a Source of Radicalization; A Case Study of Pakistan

Authors: Manam Hanfi

Abstract:

Pakistan is a victim of terrorism since 9/11 attacks. Since then it is a home for violence and extremism. One of the major reasons behind rising violence and extremism in Pakistan is radicalization. Pakistan has seen and suffered from the modification of terrorism from old to new. In new terrorism, the terrorist organizations incorporated internet to disseminate propaganda, to recruit and train people. The study focuses on the relationship between Pakistan and new terrorism and examines how the internet is being used by terrorist organizations. The study investigates radicalization through social media by terrorist organizations in Pakistan with the help of case studies. The study suggests five ways to counter radicalization, including, counter narrative on social media, content analysis of the data on the internet, curriculum and madrassa reforms, teaching peace education in the educational institutions and use of technical software such as eGLYPH to quickly remove violent data from social media. Lastly, the research attempted to contribute in counter-radicalization by combining the media dependency model and ideas for counter-radicalization. The dependency model elaborates the impact of mass media content on the audience. If media dependency is high, it will cause cognitive, affective and behavioral changes. In order to counter radicalization through social media, it is important to make cognitive, affective and behavioral changes with the help of counter-radicalization suggestions.

Keywords: counter radicalization, extremism, social media, terrorism

Procedia PDF Downloads 137
1793 Facial Emotion Recognition Using Deep Learning

Authors: Ashutosh Mishra, Nikhil Goyal

Abstract:

A 3D facial emotion recognition model based on deep learning is proposed in this paper. Two convolution layers and a pooling layer are employed in the deep learning architecture. After the convolution process, the pooling is finished. The probabilities for various classes of human faces are calculated using the sigmoid activation function. To verify the efficiency of deep learning-based systems, a set of faces. The Kaggle dataset is used to verify the accuracy of a deep learning-based face recognition model. The model's accuracy is about 65 percent, which is lower than that of other facial expression recognition techniques. Despite significant gains in representation precision due to the nonlinearity of profound image representations.

Keywords: facial recognition, computational intelligence, convolutional neural network, depth map

Procedia PDF Downloads 206
1792 Living Heritage(s) And Decoloniality: A Situational Analysis of the Great Zimbabwe World Heritage Site

Authors: Revai Boterere

Abstract:

The study explores the decolonial theory in the context of engaging with living heritages in the formally colonised through the case of the Great Zimbabwe World Heritage Site. It followed a qualitative research paradigm in the form of a situational analysis, with both primary and secondary data sources examined to enable an analysis focusing on the decolonial discourse and practice at Great Zimbabwe. Unlike the dominant model (in terms of interpretation) used at Great Zimbabwe, that of Thomas Huffman, which views the site as ruins, new literature (Ashton Sinamai, 2017, 2020; Webber Ndoro, 1994, 2005; ShadreckChirikure 2008, etal 2016; Njabulo Chipanguraetal 2019) on zimbabwe culture, Great Zimbabwe World Heritage Site is a living site, a shrine, and a cultural landscape. it argue that the new literature, perhaps decolonial, remain in the hands of academics and not synthesised down to the interpreters. This is a problem, and it needs to be addressed. There is need of a pragmatic thrust to decolonisation at the Great Zimbabwe World Heritage Site. Though there are efforts to involve local communities at Great Zimbabwe as a decolonial approach, there is need to reorder the current system of producing knowledge in place. This paper will unpack these debates of decoloniality between what Huffman’s propositions of the interpretation of Great Zimbabwe vis-a-vis the new decolonial school of thought by local researchers.

Keywords: cultural tourism, decoloniality, living heritage, local community

Procedia PDF Downloads 89
1791 Challenges of Implementing Zero Trust Security Based on NIST SP 800-207

Authors: Mazhar Hamayun

Abstract:

Organizations need to take a holistic approach to their Zero Trust strategic and tactical security needs. This includes using a framework-agnostic model that will ensure all enterprise resources are being accessed securely, regardless of their location. Such can be achieved through the implementation of a security posture, monitoring the posture, and adjusting the posture through the Identify, Detect, Protect, Respond, and Recover Methods, The target audience of this document includes those involved in the management and operational functions of risk, information security, and information technology. This audience consists of the chief information security officer, chief information officer, chief technology officer, and those leading digital transformation initiatives where Zero Trust methods can help protect an organization’s data assets.

Keywords: ZTNA, zerotrust architecture, microsegmentation, NIST SP 800-207

Procedia PDF Downloads 63
1790 Survey of Methods for Solutions of Spatial Covariance Structures and Their Limitations

Authors: Joseph Thomas Eghwerido, Julian I. Mbegbu

Abstract:

In modelling environment processes, we apply multidisciplinary knowledge to explain, explore and predict the Earth's response to natural human-induced environmental changes. Thus, the analysis of spatial-time ecological and environmental studies, the spatial parameters of interest are always heterogeneous. This often negates the assumption of stationarity. Hence, the dispersion of the transportation of atmospheric pollutants, landscape or topographic effect, weather patterns depends on a good estimate of spatial covariance. The generalized linear mixed model, although linear in the expected value parameters, its likelihood varies nonlinearly as a function of the covariance parameters. As a consequence, computing estimates for a linear mixed model requires the iterative solution of a system of simultaneous nonlinear equations. In other to predict the variables at unsampled locations, we need to know the estimate of the present sampled variables. The geostatistical methods for solving this spatial problem assume covariance stationarity (locally defined covariance) and uniform in space; which is not apparently valid because spatial processes often exhibit nonstationary covariance. Hence, they have globally defined covariance. We shall consider different existing methods of solutions of spatial covariance of a space-time processes at unsampled locations. This stationary covariance changes with locations for multiple time set with some asymptotic properties.

Keywords: parametric, nonstationary, Kernel, Kriging

Procedia PDF Downloads 237
1789 The Effect of Teaching Science Strategies Curriculum and Evaluating on Developing the Efficiency of Academic Self in Science and the Teaching Motivation for the Student Teachers of the Primary Years

Authors: Amani M. Al-Hussan

Abstract:

The current study aimed to explore the effects of science teaching strategies course (CURR422) on developing academic self efficacy and motivation towards teaching it in female primary classroom teachers in College of Education in Princess Nora Bint AbdulRahman University. The study sample consisted (48) female student teachers. To achieve the study aims, the researcher designed two instruments: Academic Self Efficacy Scale & Motivation towards Teaching Science Scale while maintaining the validity and reliability of these instruments.. Several statistical procedures were conducted i.e. Independent Sample T-test, Eta Square, Cohen D effect size. The results reveal that there were statistically significant differences between means of pre and post test for the sample in favor of post test. For academic self efficacy scale, Eta square was 0.99 and the effect size was 27.26. While for the motivation towards teaching science scale, Eta was 0.99 and the effect size was 51.72. These results indicated high effects of independent variable on the dependent variable.

Keywords: academic self efficiency, achievement, motivation, primary classroom teacher, science teaching strategies course, evaluation

Procedia PDF Downloads 481
1788 Community and School Partnerships: Raising Student Outcomes through Shared Goals and Values Using Integrated Learning as a Change Model

Authors: Sheila Santharamohana, Susan Bennett

Abstract:

Historically, the attrition rates in secondary schools of Indigenous people or Orang Asli of Malaysia have been a cause for nationwide concern. Efforts to increase student engagement focusing on curriculum re-design and aid have not had the targeted impact. The scope of the research explored a change model incorporating project-based learning and wrap-around support through school-community partnerships to increase Orang Asli engagement, student outcomes and improve cultural connectedness. The evaluation methodology was mixed-method comprising a student questionnaire, interviews, and document analysis. Data and evidence were gathered from school staff, community, the Orang Asli governmental authority (JAKOA) and external agencies. Findings from the year-long research suggests shared values and goals in school-community partnerships foster responsive leadership and is key to safeguarding vulnerable Orang Asli, resulting in improved student outcomes. The research highlighted the barriers to the recognition and distinct needs and unique values of the Orang Asli that impact their educational equity and outcomes.

Keywords: Indigenous Education, Cultural Connectedness, School-Community Partnership, Student Outcomes

Procedia PDF Downloads 118
1787 E-Service and the Nigerian Banking Sector: A Review of ATM Architecture and Operations

Authors: Bashir Aliyu Yauri, Rufai Aliyu Yauri

Abstract:

With the introduction of cash-less society policy by the Central Bank of Nigeria, the concept of e-banking services has experienced a significant improvement over the years. Today quite a number of people are embracing e-banking activities especially ATM, thereby moving away from the conventional banking system. This paper presents a review of the underlying Architectural Layout of Intra-Bank and Inter-Bank ATM connectivity in Nigeria. The paper further investigates and discusses factors affecting the Intra-Bank and Inter-Bank ATM connectivity in Nigeria. And as well possible solutions to these factors affecting ATM Connectivity and Operations are proposed.

Keywords: architectural layout, automated teller machine, e-services, postilion

Procedia PDF Downloads 610
1786 Emerging Positive Education Interventions for Clean Sport Behavior: A Pilot Study

Authors: Zeinab Zaremohzzabieh, Syasya Firzana Azmi, Haslinda Abdullah, Soh Kim Geok, Aini Azeqa Ma'rof, Hayrol Azril Mohammed Shaffril

Abstract:

The escalating prevalence of doping in sports, casting a shadow over both high-performance and recreational settings, has emerged as a formidable concern, particularly within the realm of young athletes. Doping, characterized by the surreptitious use of prohibited substances to gain a competitive edge, underscores the pressing need for comprehensive and efficacious preventive measures. This study aims to address a crucial void in current research by unraveling the motivations that drive clean adolescent athletes to steadfastly abstain from performance-enhancing substances. In navigating this intricate landscape, the study adopts a positive psychology perspective, investigating into the conditions and processes that contribute to the holistic well-being of individuals and communities. At the heart of this exploration lies the application of the PERMA model, a comprehensive positive psychology framework encapsulating positive emotion, engagement, relationships, meaning, and accomplishments. This model functions as a distinctive lens, dissecting intervention results to offer nuanced insights into the complex dynamics of clean sport behavior. The research is poised to usher in a paradigm shift from conventional anti-doping strategies, predominantly fixated on identifying deficits, towards an innovative approach firmly rooted in positive psychology. The objective of this study is to evaluate the efficacy of a positive education intervention program tailored to promote clean sport behavior among Malaysian adolescent athletes. Representing unexplored terrain within the landscape of anti-doping efforts, this initiative endeavors to reshape the focus from deficiencies to strengths. The meticulously crafted pilot study engages thirty adolescent athletes, divided into a control group of 15 and an experimental group of 15. The pilot study serves as the crucible to assess the effectiveness of the prepared intervention package, providing indispensable insights that will meticulously guide the finalization of an all-encompassing intervention program for the main study. The main study adopts a pioneering two-arm randomized control trial methodology, actively involving adolescent athletes from diverse Malaysian high schools. This approach aims to address critical lacunae in anti-doping strategies, specifically calibrated to resonate with the unique context of Malaysian schools. The study, cognizant of the imperative to develop preventive measures harmonizing with the cultural and educational milieu of Malaysian adolescent athletes, aspires to cultivate a culture of clean sport. In conclusion, this research aspires to contribute unprecedented insights into the efficacy of positive education interventions firmly rooted in the PERMA model. By unraveling the intricacies of clean sport behavior, particularly within the context of Malaysian adolescent athletes, the study seeks to introduce transformative preventive methods. The adoption of positive psychology as an avant-garde anti-doping tool represents an innovative and promising approach, bridging a conspicuous gap in scholarly research and offering potential panaceas for the sporting community. As this study unfurls its chapters, it carries the promise not only to enrich our understanding of clean sport behavior but also to pave the way for positive metamorphosis within the realm of adolescent sports in Malaysia.

Keywords: positive education interventions, a pilot study, clean sport behavior, adolescent athletes, Malaysia

Procedia PDF Downloads 37
1785 Complex Event Processing System Based on the Extended ECA Rule

Authors: Kwan Hee Han, Jun Woo Lee, Sung Moon Bae, Twae Kyung Park

Abstract:

ECA (Event-Condition-Action) languages are largely adopted for event processing since they are an intuitive and powerful paradigm for programming reactive systems. However, there are some limitations about ECA rules for processing of complex events such as coupling of event producer and consumer. The objective of this paper is to propose an ECA rule pattern to improve the current limitations of ECA rule, and to develop a prototype system. In this paper, conventional ECA rule is separated into 3 parts and each part is extended to meet the requirements of CEP. Finally, event processing logic is established by combining the relevant elements of 3 parts. The usability of proposed extended ECA rule is validated by a test scenario in this study.

Keywords: complex event processing, ECA rule, Event processing system, event-driven architecture, internet of things

Procedia PDF Downloads 516
1784 Security Issues in Long Term Evolution-Based Vehicle-To-Everything Communication Networks

Authors: Mujahid Muhammad, Paul Kearney, Adel Aneiba

Abstract:

The ability for vehicles to communicate with other vehicles (V2V), the physical (V2I) and network (V2N) infrastructures, pedestrians (V2P), etc. – collectively known as V2X (Vehicle to Everything) – will enable a broad and growing set of applications and services within the intelligent transport domain for improving road safety, alleviate traffic congestion and support autonomous driving. The telecommunication research and industry communities and standardization bodies (notably 3GPP) has finally approved in Release 14, cellular communications connectivity to support V2X communication (known as LTE – V2X). LTE – V2X system will combine simultaneous connectivity across existing LTE network infrastructures via LTE-Uu interface and direct device-to-device (D2D) communications. In order for V2X services to function effectively, a robust security mechanism is needed to ensure legal and safe interaction among authenticated V2X entities in the LTE-based V2X architecture. The characteristics of vehicular networks, and the nature of most V2X applications, which involve human safety makes it significant to protect V2X messages from attacks that can result in catastrophically wrong decisions/actions include ones affecting road safety. Attack vectors include impersonation attacks, modification, masquerading, replay, MiM attacks, and Sybil attacks. In this paper, we focus our attention on LTE-based V2X security and access control mechanisms. The current LTE-A security framework provides its own access authentication scheme, the AKA protocol for mutual authentication and other essential cryptographic operations between UEs and the network. V2N systems can leverage this protocol to achieve mutual authentication between vehicles and the mobile core network. However, this protocol experiences technical challenges, such as high signaling overhead, lack of synchronization, handover delay and potential control plane signaling overloads, as well as privacy preservation issues, which cannot satisfy the adequate security requirements for majority of LTE-based V2X services. This paper examines these challenges and points to possible ways by which they can be addressed. One possible solution, is the implementation of the distributed peer-to-peer LTE security mechanism based on the Bitcoin/Namecoin framework, to allow for security operations with minimal overhead cost, which is desirable for V2X services. The proposed architecture can ensure fast, secure and robust V2X services under LTE network while meeting V2X security requirements.

Keywords: authentication, long term evolution, security, vehicle-to-everything

Procedia PDF Downloads 154
1783 Specification of Requirements to Ensure Proper Implementation of Security Policies in Cloud-Based Multi-Tenant Systems

Authors: Rebecca Zahra, Joseph G. Vella, Ernest Cachia

Abstract:

The notion of cloud computing is rapidly gaining ground in the IT industry and is appealing mostly due to making computing more adaptable and expedient whilst diminishing the total cost of ownership. This paper focuses on the software as a service (SaaS) architecture of cloud computing which is used for the outsourcing of databases with their associated business processes. One approach for offering SaaS is basing the system’s architecture on multi-tenancy. Multi-tenancy allows multiple tenants (users) to make use of the same single application instance. Their requests and configurations might then differ according to specific requirements met through tenant customisation through the software. Despite the known advantages, companies still feel uneasy to opt for the multi-tenancy with data security being a principle concern. The fact that multiple tenants, possibly competitors, would have their data located on the same server process and share the same database tables heighten the fear of unauthorised access. Security is a vital aspect which needs to be considered by application developers, database administrators, data owners and end users. This is further complicated in cloud-based multi-tenant system where boundaries must be established between tenants and additional access control models must be in place to prevent unauthorised cross-tenant access to data. Moreover, when altering the database state, the transactions need to strictly adhere to the tenant’s known business processes. This paper focuses on the fact that security in cloud databases should not be considered as an isolated issue. Rather it should be included in the initial phases of the database design and monitored continuously throughout the whole development process. This paper aims to identify a number of the most common security risks and threats specifically in the area of multi-tenant cloud systems. Issues and bottlenecks relating to security risks in cloud databases are surveyed. Some techniques which might be utilised to overcome them are then listed and evaluated. After a description and evaluation of the main security threats, this paper produces a list of software requirements to ensure that proper security policies are implemented by a software development team when designing and implementing a multi-tenant based SaaS. This would then assist the cloud service providers to define, implement, and manage security policies as per tenant customisation requirements whilst assuring security for the customers’ data.

Keywords: cloud computing, data management, multi-tenancy, requirements, security

Procedia PDF Downloads 137
1782 Evaluation Practices in Colombia: Between Beliefs and National Exams

Authors: Danilsa Lorduy, Liliana Valle

Abstract:

Assessment and evaluation are inextricable parts of the teaching learning process. Evaluation practices concerns are gaining popularity among curriculum developers an educational researchers, particularly in Colombian regions where English language is taught as a foreign language EFL. This study addressed one of those issues, which are the unbalanced in –services’ evaluation practices perceived in school classes. They present predominance on the written test among the procedures they use to evaluate; therefore, the purpose of this case study was to explore in-service teachers’ evaluation practices, their beliefs about evaluation and to establish an eventual connection between practices and beliefs. To this end, classroom observations, questionnaires, and a semi structured interview were applied to three in-service English teachers from different schools in a city in Colombia. The findings suggested that teachers’ beliefs indicate a formative inclination and they actually are using a variety of procedures different from test but they seem to have some issues regarding their appropriateness for application Moreover, it was found that teachers’ practices are being influenced by external factors such as school requirements and national policies. It could be concluded that the predominance in using tests is not only elicited by teachers’ beliefs but also by national test results 'Pruebas Saber' and law 115 demanding. It was also suggested that further quantitative research is needed to demonstrate connections between overuse of testing procedures and 'Pruebas Saber' national test.

Keywords: beliefs, evaluation, external factors, national test

Procedia PDF Downloads 155
1781 Managing Cognitive Load in Accounting: An Analysis of Three Instructional Designs in Financial Accounting

Authors: Seedwell Sithole

Abstract:

One of the persistent problems in accounting education is how to effectively support students’ learning. A promising technique to this issue is to investigate the extent that learning is determined by the design of instructional material. This study examines the academic performance of students using three instructional designs in financial accounting. Student’s performance scores and reported mental effort ratings were used to determine the instructional effectiveness. The findings of this study show that accounting students prefer graph and text designs that are integrated. The results suggest that spatially separated graph and text presentations in accounting should be reorganized to align with the requirements of human cognitive architecture.

Keywords: accounting, cognitive load, education, instructional preferences, students

Procedia PDF Downloads 122
1780 An Informative Marketing Platform: Methodology and Architecture

Authors: Martina Marinelli, Samanta Vellante, Francesco Pilotti, Daniele Di Valerio, Gaetanino Paolone

Abstract:

Any development in web marketing technology requires changes in information engineering to identify instruments and techniques suitable for the production of software applications for informative marketing. Moreover, for large web solutions, designing an interface that enables human interactions is a complex process that must bridge between informative marketing requirements and the developed solution. A user-friendly interface in web marketing applications is crucial for a successful business. The paper introduces mkInfo - a software platform that implements informative marketing. Informative marketing is a new interpretation of marketing which places the information at the center of every marketing action. The creative team includes software engineering researchers who have recently authored an article on automatic code generation. The authors have created the mkInfo software platform to generate informative marketing web applications. For each web application, it is possible to automatically implement an opt in page, a landing page, a sales page, and a thank you page: one only needs to insert the content. mkInfo implements an autoresponder to send mail according to a predetermined schedule. The mkInfo platform also includes e-commerce for a product or service. The stakeholder can access any opt-in page and get basic information about a product or service. If he wants to know more, he will need to provide an e-mail address to access a landing page that will generate an e-mail sequence. It will provide him with complete information about the product or the service. From this point on, the stakeholder becomes a user and is now able to purchase the product or related services through the mkInfo platform. This paper suggests a possible definition for Informative Marketing, illustrates its basic principles, and finally details the mkInfo platform that implements it. This paper also offers some Informative Marketing models, which are implemented in the mkInfo platform. Informative marketing can be applied to products or services. It is necessary to realize a web application for each product or service. The mkInfo platform enables the product or the service producer to send information concerning a specific product or service to all stakeholders. In conclusion, the technical contributions of this paper are: a different interpretation of marketing based on information; a modular architecture for web applications, particularly for one with standard features such as information storage, exchange, and delivery; multiple models to implement informative marketing; a software platform enabling the implementation of such models in a web application. Future research aims to enable stakeholders to provide information about a product or a service so that the information gathered about a product or a service includes both the producer’s and the stakeholders' point of view. The purpose is to create an all-inclusive management system of the knowledge regarding a specific product or service: a system that includes everything about the product or service and is able to address even unexpected questions.

Keywords: informative marketing, opt in page, software platform, web application

Procedia PDF Downloads 112
1779 The History of the Birth of Tunisian Higher Accounting Education

Authors: Rim Khemiri, Mariam Dammak

Abstract:

The aim of this study is to trace the historical evolution of Tunisian higher accounting education and to understand and highlight the circumstances of its birth and its development. A documentary study (archival documents, official documents, public speeches, etc.), as well as semi-directive interviews with key actors, were carried out as part of this research work. These interviews aim to fill a lack of information on this subject and to confirm events addressed by other sources, but for which it lacks the elements necessary for a good understanding. After having put forward the specificities of the Tunisian context, we will, first of all, proceed to a review of the literature related to our theme in various contexts of the world. Then, we will present the evolution of the accounting curriculum by highlighting the circumstances of its birth and those of the successive reforms led by the Tunisian government. The study of higher accounting education in Tunisia and its evolution has several interests. The first lies in understanding the circumstances of its birth and its evolution in relation to the historical, socio-economic, and political context of the country. The second is to propose a reading grid that allows an understanding of the reforms that led to the university accountancy accounting course as we know it today. And, the third, aims to complete the literature on the processes of evolution of higher education accounting, by treating a different context, in order to provide additional knowledge necessary to compare experiences in this area around the world.

Keywords: accounting history, higher accounting education, socio-economic and political context, Tunisian context

Procedia PDF Downloads 112
1778 Multi-Temporal Remote Sensing of landscape Dynamics and Pattern Changes in Dire District, Southern Oromia, Ethiopia

Authors: K. Berhanu

Abstract:

Improper land use results in land degradation and decline in agricultural productivity. Hence, in order to get maximum benefits out of land, proper utilization of its resources is inevitable. The present study was aimed at identifying the landcover changes in the study area in the last 25 years and determines the extent and direction of change that has occurred. The study made use of Landsat TM 1986 and 2011 Remote Sensing Satellite Image for analysis to determine the extent and pattern of rangeland change. The results of the landuse/landcover change detection showed that in the last 25 years, 3 major changes were observed, grassland and open shrub-land resource significantly decreased at a rate of 17.1km2/year and 12 km2/year/, respectively. On the other hand in 25 years dense bushland, open bush land, dense shrubland and cultivated land has shown increment in size at a rate of 0.23km2/year,13.5 km2/year, 6.3 km2/year and 0.2 km2/year, respectively within 25 years. The expansion of unpalatable woody species significantly reduced the rangeland size and availability of grasses. The consequence of the decrease in herbaceous biomass production might result in high risk of food insecurity in the area unless proper interventions are made in time.

Keywords: GIS and remote sensing, Dire District, land use/land cover, land sat TM

Procedia PDF Downloads 278
1777 The Use of Indicators to Evaluate Minor Heritage Areas in a City

Authors: J. L. Oliver, T. Agryzkov, L. Tortosa, J. F. Vicent, J. Santacruz

Abstract:

This paper aims to demonstrate how a system of indicators can be used in order to evaluate some heritage areas which can be understood as minor ones. We mean by that those urban areas with high heritage interest from an academical point of view, but never properly valued. The reasons for this situation may be diverse, either they are not old enough, or they may show the modest architecture, the fact is these areas have not been considered deserving of protection, as the historical ones. As a result of this reality, they usually show now a very degraded urban space, which in addition contribute to accelerate a process of deterioration. Using a technic well known in urban design, we propose here a system of indicators for patrimonial purposes, as a tool to identify and quantify the heritage value of these kinds of areas. As a case study, we apply this system in some part of the City of Quito (El Ecuador).

Keywords: heritage cities, indicators, spatial analysis, historic sites

Procedia PDF Downloads 228
1776 Bilingual Creative Education: Empirical Findings

Authors: Anatoliy Kharkhurin

Abstract:

This presentation picks up on a widely discussed topic in both multilingualism and creativity research that comes from pedagogical considerations. The research conducted by the author over last 10 years has delivered a solid argument that speaking more than one language facilitates an individual’s creative capacities. The author has expanded the scope of his research and implemented these findings in education. After reviewing the empirical evidence concerning a relationship between multilingual practice and creative behavior, he proposes a new program that includes teaching strategies from both fields, a unified Bilingual Creative Education program. The program is grounded in several conceptual premises. Specifically, it aims at facilitation of the overall linguistic, intellectual and creative competences of young children regardless of their intellectual and creative predispositions thereby meeting the recommendations of a number of governmental policies. It is designed for both migrants who speak their native language and attempt to acquire the language of the migration country and autochthones who want to acquire a foreign language simultaneously with their mother tongue. The purpose of the program is to introduce students to a school curriculum in two languages and to foster four defining aspects of creativity, novelty, utility, aesthetics and authenticity. To accomplish this goal, the program utilizes the holistic approach which combines cognitive, personal and environmental factors in education. The presentation discusses the empirical findings for the implementation of the program.

Keywords: bilingualism, creativity, education, autochthones

Procedia PDF Downloads 396
1775 Making Political Leaders Responsible Leaders in an Effort to Reduce Corruption

Authors: Maria Krambia-Kapardis, Andreas Kapardis

Abstract:

The relevant literature has been inundated with arguments for ethics, moral values, honesty, resilience, trust in leadership as well as responsible leadership. In many countries around the globe, and as shown by some recent reports, many political leaders are not role models and do not show best practices by being ethical, responsible, compassionate, and resilient. Journalists, whistleblowers, WikiLeaks, Al Jazeera, and the International Consortium of Investigative Journalists (ICIJ) have been brought out from the shadow of political leaders who lack the virtues/attributes outlined above by the UN Global Compact. A number of political leaders who lack ethical and responsible leadership skills will continue to find loopholes to enrich themselves and their close friends and relatives. Some researchers use the Millon Inventory of Diagnostic; however, this test, while it provides helpful and useful insights into the personality of a person who leads or inspire his/her people but does not show if that person is ethical, motivating, and empowers his people with trust and honesty. Thus, it is recommended that political leaders ought to undergo training that encompasses Aristotelian Ethics by embedding the appropriate values and behaviours in their strategies, policies, and decisions, enhancing the change factors that will help in the implementation of a more sustainable development model. Finally, there is a need to develop a pedagogy and a curriculum which enables the development of responsible political leaders.

Keywords: political leaders, corruption, anti-corruption, political corruption

Procedia PDF Downloads 59
1774 Use of Mobile Phone Applications in Teaching Precalculus

Authors: Jay-R. Hosana Leonidas, Jayson A. Lucilo

Abstract:

The K-12 Curriculum in the Philippines shed light to mathematics education as it recognizes the use of smartphones/mobile phones as appropriate tools necessary in teaching mathematics. However, there were limited pieces of evidence on the use of these devices in teaching and learning process. This descriptive study developed lessons integrating the use of mobile phone applications with basis on low-level competencies of students in Precalculus and determined its effects on students’ conceptual understanding, procedural skills, and attitudes towards Precalculus. Employing Bring Your Own Device (BYOD) scheme in the study, lessons developed were conducted among Grade 11 Science, Technology, Engineering, and Mathematics (STEM) students at Central Bicol State University of Agriculture for the academic year 2018-2019. This study found that there is a significant difference between the competency levels of students along conceptual understanding and procedural skills prior to and after the conduct of lessons developed. Also, it disclosed that the use of mobile phone applications had positive effects on students’ attitudes towards Precalculus. Thus, the use of mobile phone applications in teaching Precalculus can enrich students’ understanding of concepts and procedural skills (solving and graphing skills) and can increase students’ motivation, self-confidence, and enjoyment in dealing with Precalculus.

Keywords: bring your own device, mathematics education, mobile phone applications, senior high school

Procedia PDF Downloads 142
1773 Investigating the Relationship between Bank and Cloud Provider

Authors: Hatim Elhag

Abstract:

Banking and Financial Service Institutions are possibly the most advanced in terms of technology adoption and use it as a key differentiator. With high levels of business process automation, maturity in the functional portfolio, straight through processing and proven technology outsourcing benefits, Banking sector stand to benefit significantly from Cloud computing capabilities. Additionally, with complex Compliance and Regulatory policies, combined with expansive products and geography coverage, the business impact is even greater. While the benefits are exponential, there are also significant challenges in adopting this model– including Legal, Security, Performance, Reliability, Transformation complexity, Operating control and Governance and most importantly proof for the promised cost benefits. However, new architecture designed should be implemented to align this approach.

Keywords: security, cloud, banking sector, cloud computing

Procedia PDF Downloads 484