Search results for: maritime security intelligence
4207 The Application of the Security Audit Method on the Selected Objects of Critical Infrastructure
Authors: Michaela Vašková
Abstract:
The paper is focused on the application of the security audit method on the selected objects of the critical infrastructure. The emphasis is put on security audit method to find gaps in the critical infrastructure security. The theoretical part describes objects of the critical infrastructure. The practical part describes using the security audit method. The main emphasis was put on the protection of the critical infrastructure in the Czech Republic.Keywords: crisis management, critical infrastructure, object of critical infrastructure, security audit, extraordinary event
Procedia PDF Downloads 4314206 Redefining State Security Using Gender: Case Study of the United States of America Post-Cold War
Authors: E. K. Linsenmayer
Abstract:
Traditional international relations theorists define state security, the principal national interest, as a state’s military force. However, many political theorists argue the current definition of security is not comprehensive and therefore, problematic. This paper argues that women’s physical security is not only linked but also necessary to achieve state security. In today’s unipolar political international system, the United States continues to accredit national security to its military. However, in one of the most militarized countries, women remain insecure. Through a case study method of the United States, this paper illuminates a necessary political prescription: the empowerment of women through an inside-out, feminist theoretical approach that makes state security attainable. The research through empirical testing, drawing from several databases, shows the positive effects of women’s physical security on state security. Women’s physical security is defined in terms of equal legal practices, health, education, and female representation in the government. State security is measured by the relative peace of a state, its involvement in conflict and a state’s relations with neighboring states. This paper shows that empowering women, 50% of the world’s population, is necessary for ending the current vicious circle of militarization, war, and insecurity. Without undoing gender power dynamics at the individual and societal level, security at all levels remains unattainable.Keywords: gender inequality, politics, state security, women's security
Procedia PDF Downloads 2074205 The Evolution of Strike and Intelligence Functions in Special Operations Forces
Authors: John Hardy
Abstract:
The expansion of special operations forces (SOF) in the twenty-first century is often discussed in terms of the size and disposition of SOF units. Research regarding the number SOF personnel, the equipment SOF units procure, and the variety of roles and mission that SOF fulfill in contemporary conflicts paints a fascinating picture of changing expectations for the use of force. A strong indicator of the changing nature of SOF in contemporary conflicts is the fusion of strike and intelligence functions in the SOF in many countries. What were once more distinct roles on the kind of battlefield generally associated with the concept of conventional warfare have become intermingled in the era of persistent conflict which SOF face. This study presents a historical analysis of the co-evolution of the intelligence and direct action functions carried out by SOF in counterterrorism, counterinsurgency, and training and mentoring missions between 2004 and 2016. The study focuses primarily on innovation in the US military and the diffusion of key concepts to US allies first, and then more broadly afterward. The findings show that there were three key phases of evolution throughout the period of study, each coinciding with a process of innovation and doctrinal adaptation. The first phase was characterized by the fusion of intelligence at the tactical and operational levels. The second phase was characterized by the industrial counterterrorism campaigns used by US SOF against irregular enemies in Iraq and Afghanistan. The third phase was characterized by increasing forward collection of actionable intelligence by SOF force elements in the course of direct action raids. The evolution of strike and intelligence functions in SOF operations between 2004 and 2016 was significantly influenced by reciprocity. Intelligence fusion led to more effective targeting, which then increased intelligence collection. Strike and intelligence functions were then enhanced by greater emphasis on intelligence exploitation during operations, which further increased the effectiveness of both strike and intelligence operations.Keywords: counterinsurgency, counterterrorism, intelligence, irregular warfare, military operations, special operations forces
Procedia PDF Downloads 2684204 Business Intelligence Proposal to Improve Decision Making in Companies Using Google Cloud Platform and Microsoft Power BI
Authors: Joel Vilca Tarazona, Igor Aguilar-Alonso
Abstract:
The problem of this research related to business intelligence is the lack of a tool that supports automated and efficient financial analysis for decision-making and allows an evaluation of the financial statements, which is why the availability of the information is difficult. Relevant information to managers and users as an instrument in decision making financial, and administrative. For them, a business intelligence solution is proposed that will reduce information access time, personnel costs, and process automation, proposing a 4-layer architecture based on what was reviewed by the research methodology.Keywords: decision making, business intelligence, Google Cloud, Microsoft Power BI
Procedia PDF Downloads 994203 The Relationship of Emotional Intelligence, Perceived Stress, Religious Coping with Psychological Distress among Afghan Students
Authors: Mustafa Jahanara
Abstract:
The aim of present research was to study of the relationship between emotional intelligence, perceived stress, positive religious coping with psychological distress to in a sample of undergraduate students in Polytechnic University in Kabul. One hundred and fifty-tow students (102 male, 50 female) were included in this study. All participants completed the Emotional Intelligence Scale (EIS), General Health Questionnaire (GHQ 12), Perceived Stress Scale (PSS-10), and the Brief RCOPE. The results revealed that EI was negatively associated with perceived stress and psychological distress. Also emotional intelligence was positively correlated with positive religious coping. Perceived stress was positive related with psychological distress and negatively correlated with positive religious coping. Eventually positive religious coping was significantly and negatively correlated with psychological distress. However, emotional intelligence and positive religious coping could influence on mental health.Keywords: emotional intelligence, perceived stress, positive religious coping, psychological distress
Procedia PDF Downloads 5174202 Skills Needed Amongst Secondary School Students for Artificial Intelligence Development in Southeast Nigeria
Authors: Chukwuma Mgboji
Abstract:
Since the advent of Artificial Intelligence, robots have become a major stay in developing societies. Robots are deployed in Education, Health, Food and in other spheres of life. Nigeria a country in West Africa has a very low profile in the advancement of Artificial Intelligence especially in the grass roots. The benefits of Artificial intelligence are not fully maximised and harnessed. Advances in artificial intelligence are perceived as impossible or observed as irrelevant. This study seeks to ascertain the needed skills for the development of artificialintelligence amongst secondary schools in Nigeria. The study focused on South East Nigeria with Five states namely Imo, Abia, Ebonyi, Anambra and Enugu. The sample size is 1000 students drawn from Five Government owned Universities offering Computer Science, Computer Education, Electronics Engineering across the Five South East states. Survey method was used to solicit responses from respondents. The findings from the study identified mathematical skills, analytical skills, problem solving skills, computing skills, programming skills, algorithm skills amongst others. The result of this study to the best of the author’s knowledge will be highly beneficial to all stakeholders involved in the advancements and development of artificial intelligence.Keywords: artificial intelligence, secondary school, robotics, skills
Procedia PDF Downloads 1524201 English Title Adaptive Comparison of Outdoor and Indoor Social Security in Damaged Area and New Residential Complex with Two-Way Anova Case Study: Qasr-Al-Dasht and Moalem District in Shiraz
Authors: Homa Parmoon, Narges Hamzeh
Abstract:
Since today's urban spaces are disposed towards behavioral disorders and lack of security, both qualitative and quantitative aspects of security especially social and physical security are considered as basic necessities in urban planning. This research focused on the variable of place of living, examined social security in the old and new textures, and investigated the amount of residents’ social security in Shiraz including safety, financial, emotional and moral security. To this end, two neighborhoods in region 1 of Shiraz- Qasr-Al-Dasht (old texture) and Moalem (new texture)- were examined through a comparative study of 60 samples lived in two neighborhoods. Data were gathered through two-way ANOVA between the variables of residential context and internal and external security. This analysis represents the significance or insignificance of the model as well as the individual effects of each independent variable on the dependent variable. It was tested by ANCOVA and F-test. Research findings indicated place of living has a significant effect on families’ social security. The safety, financial, emotional, and moral security also represented a great impact on social security. As a result, it can be concluded that social security changes with the changing in place of living.Keywords: social security, damaged area, two-way ANOVA, Shiraz
Procedia PDF Downloads 1394200 Reform of the Law Relating to Personal Property Security
Authors: Ji Lian Yap
Abstract:
This paper will critically consider developments in 2014 in relation to the law relating to security over personal property in Hong Kong. The rules governing the registration of charges under the Hong Kong Companies Ordinance will be examined. Case law relating to personal property security will also be discussed. The transplantation of the floating charge into China’s Property Law will also be considered.Keywords: personal property, security law, reform of the law, law
Procedia PDF Downloads 4254199 Artificial Intelligence for All: Artificial Intelligence Education for K-12
Authors: Yiqiao Yin
Abstract:
Many scholars and educators have dedicated their lives in K12 education system and there has been an exploding amount of attention to implement technical foundations for Artificial Intelligence Education for high school and precollege level students. This paper focuses on the development and use of resources to support K-12 education in Artificial Intelligence (AI). The author and his team have more than three years of experience coaching students from pre-college level age from 15 to 18. This paper is a culmination of the experience and proposed online tools, software demos, and structured activities for high school students. The paper also addresses a portfolio of AI concepts as well as the expected learning outcomes. All resources are provided with online videos and Github repositories for immediate use.Keywords: K12 education, AI4ALL, pre-college education, pre-college AI
Procedia PDF Downloads 1334198 Safety-Security Co-Engineering of Control Systems
Authors: Elena A. Troubitsyna
Abstract:
Designers of modern safety-critical control systems are increasingly relying on networking to provide the systems with advanced functionality and satisfy customer’s needs. However, networking nature of modern control systems also brings new technological challenges associated with ensuring system safety in the presence of openness and hence, potential security threats. In this paper, we propose a methodology that relies on systems-theoretic analysis to enable an integrated analysis of safety and security requirements of controlling software. We demonstrate how to create a safety case – a structured argument about system safety – with explicit representation of both safety and security goals. Our approach provides the designers with a systematic approach to analysing safety and security interdependencies while designing safety-critical control systems.Keywords: controlling software, integrated analysis, security, safety-security co-engineering
Procedia PDF Downloads 4974197 Cyber Security in Russia: Offense, Defense and Strategy in Cyberspace
Authors: Da Eun Sung
Abstract:
In today’s world, cyber security has become an important international agenda. As the information age has arrived, the need for cyber defense against cyber attacks is mounting, and the significance of cyber cooperation in the international community is drawing attention. Through the course, international society has agreed that the institutionalization of international norms dealing with cyber space and cyber security is crucial ever. Nevertheless, the West, led by the United States of America, and 'the East', composed of Russia and China, have shown conflicting views on forming international norms and principles which would regulate and ward off the possible threats in cyber space. Thus, the international community hasn’t yet to reach an agreement on cyber security. In other words, the difference between both sides on the approach and understanding of principles, objects, and the definition has rendered such. Firstly, this dissertation will cover the Russia’s perception, strategy, and definition on cyber security through analyzing primary source. Then, it will delve into the two contrasting cyber security strategy between Russia and the US by comparing them. And in the conclusion, it will seek the possible solution for the cooperation in the field of cyber security. It is quite worthwhile to look into Russia’s views, which is the main counterpart to the US in this field, especially when the efforts to institutionalize cyber security by the US-led international community have met with their boundaries, and when the legitimacy of them have been challenged.Keywords: cyber security, cyber security strategic, international relation in cyberspace, Russia
Procedia PDF Downloads 3194196 Influence of Intelligence and Failure Mindsets on Parent's Failure Feedback
Authors: Sarah Kalaouze, Maxine Iannucelli, Kristen Dunfield
Abstract:
Children’s implicit beliefs regarding intelligence (i.e., intelligence mindsets) influence their motivation, perseverance, and success. Previous research suggests that the way parents perceive failure influences the development of their child’s intelligence mindsets. We invited 151 children-parent dyads (Age= 5–6 years) to complete a series of difficult puzzles over zoom. We assessed parents’ intelligence and failure mindsets using questionnaires and recorded parents’ person/performance-oriented (e.g., “you are smart” or "you were almost able to complete that one) and process-oriented (e.g., “you are trying really hard” or "maybe if you place the bigger pieces first") failure feedback. We were interested in observing the relation between parental mindsets and the type of feedback provided. We found that parents’ intelligence mindsets were not predictive of the feedback they provided children. Failure mindsets, on the other hand, were predictive of failure feedback. Parents who view failure-as-debilitating provided more person-oriented feedback, focusing on performance and personal ability. Whereas parents who view failure-as-enhancing provided process-oriented feedback, focusing on effort and strategies. Taken all together, our results allow us to determine that although parents might already have a growth intelligence mindset, they don’t necessarily have a failure-as-enhancing mindset. Parents adopting a failure-as-enhancing mindset would influence their children to view failure as a learning opportunity, further promoting practice, effort, and perseverance during challenging tasks. The focus placed on a child’s learning, rather than their performance, encourages them to perceive intelligence as malleable (growth mindset) rather than fix (fixed mindset). This implies that parents should not only hold a growth mindset but thoroughly understand their role in the transmission of intelligence beliefs.Keywords: mindset(s), failure, intelligence, parental feedback, parents
Procedia PDF Downloads 1394195 Resource Allocation Modeling and Simulation in Border Security Application
Authors: Kai Jin, Hua Li, Qing Song
Abstract:
Homeland security and border safety is an issue for any country. This paper takes the border security of US as an example to discuss the usage and efficiency of simulation tools in the homeland security application. In this study, available resources and different illegal infiltration parameters are defined, including their individual behavior and objective, in order to develop a model that describes border patrol system. A simulation model is created in Arena. This simulation model is used to study the dynamic activities in the border security. Possible factors that may affect the effectiveness of the border patrol system are proposed. Individual and factorial analysis of these factors is conducted and some suggestions are made.Keywords: resource optimization, simulation, modeling, border security
Procedia PDF Downloads 5164194 Is There Relationship between Cyberchondria and Emotional Intelligence among Omani University Students? A Descriptive Correlational Study
Authors: Mohammed Qutishat, Khaldoun Aldiabat, Khaled Bader, Mohammad Al Qadire
Abstract:
Cyberchondria refers to the irrational increase of distress about the condition of one's health as a consequence of the World Wide Web quest for medical details. The aim of this study was to examine the relationship between emotional intelligence and cyberchondria among Omani university students. A descriptive correlational design was used to collect data from eligible 370 participants using the Emotional Intelligence Questionnaire, and the short-form version of the Cyberchondria Severity Scale (CSS-12) between January and May 2020 at XX University-Oman. The participants’ age ranged between 18 and 37 years (M = 20.28). The majority of the participants were female, 59.7% (n = 221), single 99.5% (368), in their second academic year, 29.2% (n =108). The mean score of cyberchondria experiences was 32.51, and the mean score of emotional intelligence was 34.91. Linear regression indicated a strong association between cyberchondria and emotional intelligence [F (34.639) = 5.885, P=.000], with a .086 R². In conclusion, the exchange of expertise and peer networking for health-related details utilizing the Internet can benefit students with and without having health problems. Further research and methods should be developed to help students track the online medical tools effectively for the right purposes.Keywords: emotional intelligence, cyberchondria, smartphone addiction, social media
Procedia PDF Downloads 2504193 Impact of Mindfulness on Life Satisfaction among Chinese and Pakistani Students: The Mediating Roles of Resilience and Emotional Intelligence
Authors: Maaza Saeed
Abstract:
The current study examined the mediating roles of emotional intelligence (EI) and resilience in the relationship between mindfulness and life satisfaction among Chinese and Pakistani samples. 450 participants completed the mindful attention awareness scale, resilience scale, wong law emotional intelligence scale, and satisfaction with life scale from both cultures. Path analysis revealed that both emotional intelligence (EI) and resilience fully mediated the relationship between mindfulness and life satisfaction among participants of both cultures. Besides, a multi-group evaluation suggests that Chinese participants with significant EI scores are more likely to sustain greater life satisfaction than their Pakistani counterparts. Insinuation for prospective researches and current study pitfalls are discussed.Keywords: mindfulness, life satisfaction, resilience, emotional intelligence
Procedia PDF Downloads 814192 The Synopsis of the AI-Powered Therapy Web Platform ‘Free AI Therapist'
Authors: Arwa Alnowaiser, Hala Shoukri
Abstract:
The ‘FreeAITherapist’ is an artificial intelligence application that uses the power of AI to offer advice and mental health counseling to its users through its chatbot services. The AI therapist is designed to understand users' issues, concerns, and problems and respond appropriately; it provides empathy and guidance and uses evidence-based therapeutic techniques. With its user-friendly platform, it ensures accessibility for individuals in need, regardless of their geographical location. This website was created in direct response to the growing demand for mental health support, aiming to provide a cost-effective and confidential solution. Through promising confidentiality, it considers user privacy and data security. The ‘FreeAITherapist’ strives to bridge the gap in mental health services, offering a reliable resource for individuals seeking guidance and counseling to improve their overall well-being.Keywords: artificial intelligence, mental health, AI therapist, website, counseling
Procedia PDF Downloads 444191 Exploring Enabling Effects of Organizational Climate on Academicians’ Emotional Intelligence and Learning Outcomes: A Case from Chinese Higher Education
Authors: Zahid Shafait, Jiayu Huang
Abstract:
Purpose: This study is based on a trait-based theory of emotional intelligence. This study intends to explore the enabling effect of organizational climate, i.e., affiliation, innovation, and fairness, on the emotional intelligence of teachers in Chinese higher education institutes. This study, additionally, intends to investigate the direct impact of teachers’ emotional intelligence on their learning outcomes, i.e., cognitive, social, self-growth outcomes and satisfaction with the university experience. Design/methodology/approach: This study utilized quantitative research techniques to scrutinize the data. Moreover, partial least squares structural equation modeling, i.e., PLS-SEM, was used to assess the hypothetical relationships to conclude their statistical significance. Findings: Results confirmed the supposed associations, i.e., the organizational climate has an enabling effect on emotional intelligence. Likewise, emotional intelligence was concluded to have a direct and positive association with learning outcomes in higher education. Practical implications: This study has investigated abandoned research that is enabling the effects of organizational climate on teachers’ emotional intelligence in Chinese higher education. Organizational climate enables emotionally intelligent teachers to learn efficiently and, at the same time, augments their satisfaction and productivity within an institution. Originality/value: This study investigated the enabling effects of organizational climate on teachers’ emotional intelligence in Chinese higher education that is original in investigated country and sector.Keywords: organizational climate, emotional intelligence, learning outcomes, higher education
Procedia PDF Downloads 744190 SeCloudBPMN: A Lightweight Extension for BPMN Considering Security Threats in the Cloud
Authors: Somayeh Sobati Moghadam
Abstract:
Business processes are crucial for organizations and help businesses to evaluate and optimize their performance and processes against current and future-state business goals. Outsourcing business processes to the cloud becomes popular due to a wide varsity of benefits and cost-saving. However, cloud outsourcing raises enterprise data security concerns, which must be incorporated in Business Process Model and Notation (BPMN). This paper, presents SeCloudBPMN, a lightweight extension for BPMN which extends the BPMN to explicitly support the security threats in the cloud as an outsourcing environment. SeCloudBPMN helps business’s security experts to outsource business processes to the cloud considering different threats from inside and outside the cloud. In this way, appropriate security countermeasures could be considered to preserve data security in business processes outsourcing to the cloud.Keywords: BPMN, security threats, cloud computing, business processes outsourcing, privacy
Procedia PDF Downloads 2694189 Understanding Tacit Knowledge and DIKW
Authors: Bahadir Aydin
Abstract:
Today it is difficult to reach accurate knowledge because of mass data. This huge data makes the environment more and more caotic. Data is a main piller of intelligence. There is a close tie between knowledge and intelligence. Information gathered from different sources can be modified, interpreted and classified by using knowledge development process. This process is applied in order to attain intelligence. Within this process the effect of knowledge is crucial. Knowledge is classified as explicit and tacit knowledge. Tacit knowledge can be seen as "only the tip of the iceberg”. This tacit knowledge accounts for much more than we guess in all intelligence cycle. If the concept of intelligence scrutinized, it can be seen that it contains risks, threats as well as success. The main purpose for all organization is to be succesful by eliminating risks and threats. Therefore, there is a need to connect or fuse existing information and the processes which can be used to develop it. By the help of process the decision-maker can be presented with a clear holistic understanding, as early as possible in the decision making process. Planning, execution and assessments are the key functions that connects to information to knowledge. Altering from the current traditional reactive approach to a proactive knowledge development approach would reduce extensive duplication of work in the organization. By new approach to this process, knowledge can be used more effectively.Keywords: knowledge, intelligence cycle, tacit knowledge, KIDW
Procedia PDF Downloads 5194188 Business Intelligence for Profiling of Telecommunication Customer
Authors: Rokhmatul Insani, Hira Laksmiwati Soemitro
Abstract:
Business Intelligence is a methodology that exploits the data to produce information and knowledge systematically, business intelligence can support the decision-making process. Some methods in business intelligence are data warehouse and data mining. A data warehouse can store historical data from transactional data. For data modelling in data warehouse, we apply dimensional modelling by Kimball. While data mining is used to extracting patterns from the data and get insight from the data. Data mining has many techniques, one of which is segmentation. For profiling of telecommunication customer, we use customer segmentation according to customer’s usage of services, customer invoice and customer payment. Customers can be grouped according to their characteristics and can be identified the profitable customers. We apply K-Means Clustering Algorithm for segmentation. The input variable for that algorithm we use RFM (Recency, Frequency and Monetary) model. All process in data mining, we use tools IBM SPSS modeller.Keywords: business intelligence, customer segmentation, data warehouse, data mining
Procedia PDF Downloads 4834187 Exploring the Feasibility of Utilizing Blockchain in Cloud Computing and AI-Enabled BIM for Enhancing Data Exchange in Construction Supply Chain Management
Authors: Tran Duong Nguyen, Marwan Shagar, Qinghao Zeng, Aras Maqsoodi, Pardis Pishdad, Eunhwa Yang
Abstract:
Construction supply chain management (CSCM) involves the collaboration of many disciplines and actors, which generates vast amounts of data. However, inefficient, fragmented, and non-standardized data storage often hinders this data exchange. The industry has adopted building information modeling (BIM) -a digital representation of a facility's physical and functional characteristics to improve collaboration, enhance transmission security, and provide a common data exchange platform. Still, the volume and complexity of data require tailored information categorization, aligning with stakeholders' preferences and demands. To address this, artificial intelligence (AI) can be integrated to handle this data’s magnitude and complexities. This research aims to develop an integrated and efficient approach for data exchange in CSCM by utilizing AI. The paper covers five main objectives: (1) Investigate existing framework and BIM adoption; (2) Identify challenges in data exchange; (3) Propose an integrated framework; (4) Enhance data transmission security; and (5) Develop data exchange in CSCM. The proposed framework demonstrates how integrating BIM and other technologies, such as cloud computing, blockchain, and AI applications, can significantly improve the efficiency and accuracy of data exchange in CSCM.Keywords: construction supply chain management, BIM, data exchange, artificial intelligence
Procedia PDF Downloads 264186 The Effect of Relationship Marketing on Service Quality and Customer Satisfaction without Service Providers' Emotional Intelligence: The Case of the Insurance Industry in Ghana
Authors: Frank Frimpong Opuni, Michael Mba Allan, Kwame Adu-Gyamfi, Michael Sarkodie Baffoe
Abstract:
This paper assesses the effect of relationship marketing on service quality and customer satisfaction from the perspective of the moderating role of emotional intelligence in the insurance industry in Ghana. A descriptive quantitative research technique was employed. A random sample of 384 each of customers and service providers in 3 insurance firms in Accra were used as the source of data. According to findings, emotional intelligence makes a strong positive effect on relationship marketing at 5% significance level, r (283) = .817, p = .000. Though relationship marketing makes a strong positive effect on service quality (r = .767, p < .05) and customer satisfaction (r = .647, p < .05), this effect becomes insignificant (p > .05) when the effect of emotional intelligence on relationship marketing is controlled for. It is therefore recommended that insurance firms give priority to equipping their relationship employees with emotional intelligence to maximise service quality and customer satisfaction.Keywords: relationship marketing, service quality, customer satisfaction, emotional intelligence
Procedia PDF Downloads 4814185 Digital Transformation in Education: Artificial Intelligence Awareness of Preschool Teachers
Authors: Cansu Bozer, Saadet İrem Turgut
Abstract:
Artificial intelligence (AI) has become one of the most important technologies of the digital age and is transforming many sectors, including education. The advantages offered by AI, such as automation, personalised learning, and data analytics, create new opportunities for both teachers and students in education systems. Preschool education plays a fundamental role in the cognitive, social, and emotional development of children. In this period, the foundations of children's creative thinking, problem-solving, and critical thinking skills are laid. Educational technologies, especially artificial intelligence-based applications, are thought to contribute to the development of these skills. For example, artificial intelligence-supported digital learning tools can support learning processes by offering activities that can be customised according to the individual needs of each child. However, the successful use of artificial intelligence-based applications in preschool education can be realised under the guidance of teachers who have the right knowledge about this technology. Therefore, it is of great importance to measure preschool teachers' awareness levels of artificial intelligence and to understand which variables affect this awareness. The aim of this study is to measure preschool teachers' awareness levels of artificial intelligence and to determine which factors are related to this awareness. In line with this purpose, teachers' level of knowledge about artificial intelligence, their thoughts about the role of artificial intelligence in education, and their attitudes towards artificial intelligence will be evaluated. The study will be conducted with 100 teachers working in Turkey using a descriptive survey model. In this context, ‘Artificial Intelligence Awareness Level Scale for Teachers’ developed by Ferikoğlu and Akgün (2022) will be used. The collected data will be analysed using SPSS (Statistical Package for the Social Sciences) software. Descriptive statistics (frequency, percentage, mean, standard deviation) and relationship analyses (correlation and regression analyses) will be used in data analysis. As a result of the study, the level of artificial intelligence awareness of preschool teachers will be determined, and the factors affecting this awareness will be identified. The findings obtained will contribute to the determination of studies that can be done to increase artificial intelligence awareness in preschool education.Keywords: education, child development, artificial intelligence, preschool teachers
Procedia PDF Downloads 194184 Psychological Security and Its Relationship with Self-Esteem among Adolescent with Mild Intellectual Disability
Authors: Muneera Abdul Haleem Bukhari, Maryam I. Alshirawi, Elsayed S. Elkhamisi
Abstract:
This study aimed at understanding the relationship between psychological security and self-esteem among Adolescent with Mild Intellectual Disability, exploring the levels of psychological security and self-esteem, as well as determining the differences between genders in psychological security and self-esteem. The sample of the study contained (60) Adolescent with Mild Intellectual Disability, (34) males and (26) females who are enrolled in the Vocational and Social Rehabilitation Center and Hope Institute in the Kingdom of Bahrain. Their ages are between (15-23) years old. The Psychological Security Scale and self-Esteem Scale (prepared by James Battle) were used by the researcher. Results showed that levels of psychological security and self-esteem among Adolescents with Mild Intellectual Disability was above average; results also showed the order of the psychological security dimensions in the following manner (future outlook – mood - family security – social security) and the order of the dimensions of self-esteem in the following manner (social self-esteem – personal self-esteem – general self-esteem) among Adolescent with Mild Intellectual Disability; as for the differences between genders, the study showed that there was an increased level of psychological security among males. However, there was no difference in self-esteem between both sexes.Keywords: psychological security, self-esteem, adolescent, intellectual disability, the Kingdom of Bahrain
Procedia PDF Downloads 3924183 Prospects of Iraq’s Maritime Openness and Their Effect on Its Economy
Authors: Mohanad Hammad
Abstract:
Port institutions serve as a link connecting the land areas that receive the goods and the areas from where ships sail. These areas hold great significance for the conversion of goods into commodities of economic value, capable of meeting the needs of the society. Development of ports constitutes a fundamental component of the comprehensive economic development process. Recognizing this fact, developing countries have always resorted to this infrastructural element to resolve the numerous problems they face, taking into account its contribution to the reformation of their economic conditions. Iraqi ports have played a major role in boosting the commercial movement in Iraq, as they are the starting point of its oil exports and a key constituent in fulfilling the consumer and production needs of the various economic sectors of Iraq. With the Gulf wars and the economic blockade, Iraqi ports have continued to deteriorate and become unable to perform their functions as first-generation ports, prompting Iraq to use the ports of neighboring countries such as Jordan's Aqaba commercial port. Meanwhile, Iraqi ports face strong competition from the ports of neighboring countries, which have achieved progress and advancement as opposed to the declining performance and efficiency of Iraqi ports. The great developments in the economic conditions of Iraq lay a too great burden on the Iraqi maritime transport and ports, which require development in order to be able to meet the challenges arising from the fierce international and regional competition in the markets. Therefore, it is necessary to find appropriate solutions in support of the role that can be played by Iraqi ports in serving Iraq's foreign trade transported by sea and in keeping up with the development of foreign trade. Thus, this research aims at tackling the current situation of the Iraqi ports and their commercial activity and studying the problems and obstacles they face. The research also studies the future prospects of these ports, the potentials of maritime openness to Iraq under the fierce competition of neighboring ports, and the possibility of enhancing Iraqi ports’ competitiveness. Among the results produced by this research is the future scenario it proposes for Iraqi ports, mainly represented in the establishment of Al-Faw Port, which will contribute to a greater openness of maritime transport in Iraq, and the rehabilitation and expansion of existing ports. This research seeks to develop solutions to Iraq ports so that they can be repositioned as a vital means of promoting economic development.Keywords: maritime transport, port, future prospects, regional integration
Procedia PDF Downloads 1474182 Batch Adsorption Studies for the Removal of Textile Dyes from Aqueous Solution on Three Different Pine Bark
Authors: B. Cheknane, F. Zermane
Abstract:
The main objective of the present study is the valorization of natural raw materials of plant origin for the treatment of textile industry wastewater. Selected bark was: maritime (MP), pinyon (PP) and Aleppo pine (AP) bark. The efficiency of these barks were tested for the removal of three dye; rhodamine B (RhB), Green Malachite (GM) and X Methyl Orange (MO). At the first time we focus to study the different parameters which can influence the adsorption processes such as: nature of the adsorbents, nature of the pollutants (dyes) and the effect of pH. Obtained results reveals that the speed adsorption is strongly influencing by the pH medium and the comparative study show that adsorption is favorable in the acidic medium with amount adsorbed of (Q=40mg/g) for rhodamine B and (Q=46mg/g) for orange methyl. Results of adsorption kinetics reveals that the molecules of GM are adsorbed better (Q=48mg/g) than the molecules of RhB (Q=46mg/g) and methyl orange (Q=18mg/g), with equilibrium time of 6 hours. The results of adsorption isotherms show clearly that the maritime pine bark is the most effective adsorbents with adsorbed amount of (QRhB=200mg/g) and (QMO=88mg/g) followed by pinyon pine (PP) with (QRhB=184mg/g) and (QMO=56mg/g) and finally Aleppo pine (AP) bark with (QRhB=131mg/g) and (QMO= 46mg/g). The different obtained isotherms were modeled using the Langmuir and Freundlich models and according to the adjustment coefficient values R2, the obtained isotherms are well represented by Freundlich model.Keywords: maritime pine bark (MP), pinyon pine bark (PP), Aleppo pine (AP) bark, adsorption, dyes
Procedia PDF Downloads 3194181 A Flagship Framework with Feet of Clay: Operational and Structural Challenges of the African Peace and Security Architecture
Authors: Wiriranai Brilliant Masara
Abstract:
The African Peace and Security Architecture is widely celebrated and revered as a paragon of the will to address peace and security challenges in Africa. However, like any other institution, it is embedded with operational and institutional challenges that prevent it from effectively carrying out its mandate and turning goals into achieved results. The article examines the fundamental flaws and weaknesses of the African Peace and Security Architecture by focusing on its institutions, norms, instruments, and its relationship to Africa’s Regional Economic Communities. Therefore, the article reviews the flaws of the five elements of the African Peace and Security Architecture which are the Peace and Security Council, Panel of the Wise, Continental Early Warning System, African Standby Force, and Peace Fund.Keywords: African Union, African Peace and Security Architecture, peace and security council, continental early warning system, African Standby Force, Panel of the Wise, Peace Fund
Procedia PDF Downloads 1404180 Emotional Intelligence and General Self-Efficacy as Predictors of Career Commitment of Secondary School Teachers in Nigeria
Authors: Moyosola Jude Akomolafe
Abstract:
Career commitment among employees is crucial to the success of any organization. However, career commitment has been reported to be very low among teachers in the public secondary schools in Nigeria. This study, therefore, examined the contributions of emotional intelligence and general self-efficacy to career commitment of among secondary school teachers in Nigeria. Descriptive research design of correlational type was adopted for the study. It made use of stratified random sampling technique was used in selecting two hundred and fifty (250) secondary schools teachers for the study. Three standardized instruments namely: The Big Five Inventory (BFI), Emotional Intelligence Scale (EIS), General Self-Efficacy Scale (GSES) and Career Commitment Scale (CCS) were adopted for the study. Three hypotheses were tested at 0.05 level of significance. Data collected were analyzed through Multiple Regression Analysis to investigate the predicting capacity of emotional intelligence and general self-efficacy on career commitment of secondary school teachers. The results showed that the variables when taken as a whole significantly predicted career commitment among secondary school teachers. The relative contribution of each variable revealed that emotional intelligence and general self-efficacy significantly predicted career commitment among secondary school teachers in Nigeria. The researcher recommended that secondary school teachers should be exposed to emotional intelligence and self-efficacy training to enhance their career commitment.Keywords: career commitment, emotional intelligence, general self-efficacy, secondary school teachers
Procedia PDF Downloads 3874179 Design and Implementation of a Cross-Network Security Management System
Authors: Zhiyong Shan, Preethi Santhanam, Vinod Namboodiri, Rajiv Bagai
Abstract:
In recent years, the emerging network worms and attacks have distributive characteristics, which can spread globally in a very short time. Security management crossing networks to co-defense network-wide attacks and improve the efficiency of security administration is urgently needed. We propose a hierarchical distributed network security management system (HD-NSMS), which can integrate security management across multiple networks. First, we describe the system in macrostructure and microstructure; then discuss three key problems when building HD-NSMS: device model, alert mechanism, and emergency response mechanism; lastly, we describe the implementation of HD-NSMS. The paper is valuable for implementing NSMS in that it derives from a practical network security management system (NSMS).Keywords: network security management, device organization, emergency response, cross-network
Procedia PDF Downloads 1684178 Cryptographic Protocol for Secure Cloud Storage
Authors: Luvisa Kusuma, Panji Yudha Prakasa
Abstract:
Cloud storage, as a subservice of infrastructure as a service (IaaS) in Cloud Computing, is the model of nerworked storage where data can be stored in server. In this paper, we propose a secure cloud storage system consisting of two main components; client as a user who uses the cloud storage service and server who provides the cloud storage service. In this system, we propose the protocol schemes to guarantee against security attacks in the data transmission. The protocols are login protocol, upload data protocol, download protocol, and push data protocol, which implement hybrid cryptographic mechanism based on data encryption before it is sent to the cloud, so cloud storage provider does not know the user's data and cannot analysis user’s data, because there is no correspondence between data and user.Keywords: cloud storage, security, cryptographic protocol, artificial intelligence
Procedia PDF Downloads 357