Search results for: relational messages
517 Customer Experiences and Perspectives on Mobile Money Service Fraud: A Case Study of the University of Education, Winneba
Authors: Mavis Ofosuah Asante, Abena Abokoma Asemanyi, Belinda Osei-mensah, Stephen Osei Akyiaw
Abstract:
The study examined mobile money service fraud experiences and perspectives on control practices at University of Education, Winneba. The objectives of the study included to examine the forms of MoMo fraud strategies experienced by customers of MoMo on UEW Campus, to examine and classify the main perpetrators of the MoMo fraud among UEW students as well as the framework for fraud detection put together by the Telco’s and consumers on UEW Campus. The study adopted the case study research design. The purposive sampling technique was used to select the UEW Campus. Using the convenience sampling technique, five respondents were sampled for the study. The outcome of the in-depth interviews conducted revealed Mobile money fraud was committed in various forms, such as anonymous calls and text messages from scammers, fraudsters calling to deceive subscribers that they are to deliver goods from abroad or from a close relative under false pretexts. Finally, fraudsters sending false cash-out messages to merchants for authorization of which the physical cash is issued by the merchant to the fraudster without the equivalent e-cash. Mobile money fraud has been perpetuated in diverse forms such as mobile money network systems fraud, false promotion fraud, and reversal of erroneous transactions, fortuitous scams, and mobile money agents' fraud. Finally, the frameworks that have been used to detect mobile money fraud include the display of national identifies cards for the transaction, digital identification systems, the use of firewall to protect mobile money accounts, effective information technology architecture for mobile money services, reporting of mobile money fraud to telecoms and the sanctioning of mobile money fraudsters. The study suggested there should be public education and awareness creation on the activities of mobile money fraudsters in Ghana by telecommunication companies in conjunction with the National Communications Authority and the Bank of Ghana. The study, therefore, concluded that the menace of mobile money fraud threatens the integrity of the mobile money financial services.Keywords: mobile money, fraud, telecommunication, merchant
Procedia PDF Downloads 80516 Parallel Multisplitting Methods for DAE’s
Authors: Ahmed Machmoum, Malika El Kyal
Abstract:
We consider iterative parallel multi-splitting method for differential algebraic equations. The main feature of the proposed idea is to use the asynchronous form. We prove that the multi-splitting technique can effectively accelerate the convergent performance of the iterative process. The main characteristic of an asynchronous mode is that the local algorithm not have to wait at predetermined messages to become available. We allow some processors to communicate more frequently than others, and we allow the communication delays tobe substantial and unpredictable. Note that synchronous algorithms in the computer science sense are particular cases of our formulation of asynchronous one.Keywords: computer, multi-splitting methods, asynchronous mode, differential algebraic systems
Procedia PDF Downloads 549515 Biofilm Text Classifiers Developed Using Natural Language Processing and Unsupervised Learning Approach
Authors: Kanika Gupta, Ashok Kumar
Abstract:
Biofilms are dense, highly hydrated cell clusters that are irreversibly attached to a substratum, to an interface or to each other, and are embedded in a self-produced gelatinous matrix composed of extracellular polymeric substances. Research in biofilm field has become very significant, as biofilm has shown high mechanical resilience and resistance to antibiotic treatment and constituted as a significant problem in both healthcare and other industry related to microorganisms. The massive information both stated and hidden in the biofilm literature are growing exponentially therefore it is not possible for researchers and practitioners to automatically extract and relate information from different written resources. So, the current work proposes and discusses the use of text mining techniques for the extraction of information from biofilm literature corpora containing 34306 documents. It is very difficult and expensive to obtain annotated material for biomedical literature as the literature is unstructured i.e. free-text. Therefore, we considered unsupervised approach, where no annotated training is necessary and using this approach we developed a system that will classify the text on the basis of growth and development, drug effects, radiation effects, classification and physiology of biofilms. For this, a two-step structure was used where the first step is to extract keywords from the biofilm literature using a metathesaurus and standard natural language processing tools like Rapid Miner_v5.3 and the second step is to discover relations between the genes extracted from the whole set of biofilm literature using pubmed.mineR_v1.0.11. We used unsupervised approach, which is the machine learning task of inferring a function to describe hidden structure from 'unlabeled' data, in the above-extracted datasets to develop classifiers using WinPython-64 bit_v3.5.4.0Qt5 and R studio_v0.99.467 packages which will automatically classify the text by using the mentioned sets. The developed classifiers were tested on a large data set of biofilm literature which showed that the unsupervised approach proposed is promising as well as suited for a semi-automatic labeling of the extracted relations. The entire information was stored in the relational database which was hosted locally on the server. The generated biofilm vocabulary and genes relations will be significant for researchers dealing with biofilm research, making their search easy and efficient as the keywords and genes could be directly mapped with the documents used for database development.Keywords: biofilms literature, classifiers development, text mining, unsupervised learning approach, unstructured data, relational database
Procedia PDF Downloads 172514 Competitiveness and Pricing Policy Assessment for Resilience Surface Access System at Airports
Authors: Dimitrios J. Dimitriou
Abstract:
Considering a worldwide tendency, air transports are growing very fast and many changes have taken place in planning, management and decision making process. Given the complexity of airport operation, the best use of existing capacity is the key driver of efficiency and productivity. This paper deals with the evaluation framework for the ground access at airports, by using a set of mode choice indicators providing key messages towards airport’s ground access performance. The application presents results for a sample of 12 European airports, illustrating recommendations to define policy and improve service for the air transport access chain.Keywords: airport ground access, air transport chain, airport access performance, airport policy
Procedia PDF Downloads 371513 Implementing a Database from a Requirement Specification
Abstract:
Creating a database scheme is essentially a manual process. From a requirement specification, the information contained within has to be analyzed and reduced into a set of tables, attributes and relationships. This is a time-consuming process that has to go through several stages before an acceptable database schema is achieved. The purpose of this paper is to implement a Natural Language Processing (NLP) based tool to produce a from a requirement specification. The Stanford CoreNLP version 3.3.1 and the Java programming were used to implement the proposed model. The outcome of this study indicates that the first draft of a relational database schema can be extracted from a requirement specification by using NLP tools and techniques with minimum user intervention. Therefore, this method is a step forward in finding a solution that requires little or no user intervention.Keywords: information extraction, natural language processing, relation extraction
Procedia PDF Downloads 262512 Understanding the Strategies Underpinning the Marketing of E-Cigarettes: A Content Analysis of Video Advertisements
Authors: Laura Struik, Sarah Dow-Fleisner, Robert Janke
Abstract:
Introduction: The use of e-cigarettes, also known as vaping, has risen exponentially among North American youth and young adults (YYA) in recent years and has become a critical public health concern. The marketing strategies used by e-cigarette companies have been associated with the uptick in use among YYA, with video advertisements on TV and other electronic platforms being the most pervasive strategy. It is unknown if or how these advertisements capitalize on the recently documented multi-faceted influences that contribute to the initiation of vaping among this demographic (e.g., stress, anxiety, gender, peers, etc.), which is examined in this study. Methods: This content analysis is phase one of a two-phased research project that aims to inform meaningful approaches to anti-vaping messaging and campaigns. As part of this first phase, a scoping review has been conducted to identify various influences (environmental, cognitive, contextual, social, and emotional) on e-cigarette uptake among YYA. The results of this scoping review will inform the development of a coding framework to analyze the multiple influences present in vaping advertisements, as seen on two popular television channels (Discovery and AMC). In addition, advertisement characteristics will be incorporated into the coding framework (e.g., the number of people present, demographic details, context, and setting, etc.), and analyzed. Findings: Findings will reveal the types of influences being leveraged in vaping advertisements, and identify the underlying messages that may be particularly attractive to YYA. This will contribute to a more nuanced understanding of how e-cigarette companies market their products and to whom. The results will also inform the next phase of this research project, which will encompass an analysis of anti-vaping advertisements and how the underpinning strategies align with those of the pro-vaping advertisements. Conclusions: Findings of this will study bring forward important implications for developing effective anti-vaping messages, and assist public health professionals in providing more comprehensive prevention and cessation support as it relates to e-cigarette use. Understanding which marketing strategies e-cigarette companies use is vital to our understanding of how to combat them. Findings will inform recommendations for public health efforts aimed at curbing e-cigarette use among YYA, and ultimately contribute to the health and well-being of YYA.Keywords: e-cigarettes, youth and young adults, advertisements, public health
Procedia PDF Downloads 122511 On Early Verb Acquisition in Chinese-Speaking Children
Authors: Yating Mu
Abstract:
Young children acquire native language with amazing rapidity. After noticing this interesting phenomenon, lots of linguistics, as well as psychologists, devote themselves to exploring the best explanations. Thus researches on first language acquisition emerged. Early lexical development is an important branch of children’s FLA (first language acquisition). Verb, the most significant class of lexicon, the most grammatically complex syntactic category or word type, is not only the core of exploring syntactic structures of language but also plays a key role in analyzing semantic features. Obviously, early verb development must have great impacts on children’s early lexical acquisition. Most scholars conclude that verbs, in general, are very difficult to learn because the problem in verb learning might be more about mapping a specific verb onto an action or event than about learning the underlying relational concepts that the verb or relational term encodes. However, the previous researches on early verb development mainly focus on the argument about whether there is a noun-bias or verb-bias in children’s early productive vocabulary. There are few researches on general characteristics of children’s early verbs concerning both semantic and syntactic aspects, not mentioning a general survey on Chinese-speaking children’s verb acquisition. Therefore, the author attempts to examine the general conditions and characteristics of Chinese-speaking children’s early productive verbs, based on data from a longitudinal study on three Chinese-speaking children. In order to present an overall picture of Chinese verb development, both semantic and syntactic aspects will be focused in the present study. As for semantic analysis, a classification method is adopted first. Verb category is a sophisticated class in Mandarin, so it is quite necessary to divide it into small sub-types, thus making the research much easier. By making a reasonable classification of eight verb classes on basis of semantic features, the research aims at finding out whether there exist any universal rules in Chinese-speaking children’s verb development. With regard to the syntactic aspect of verb category, a debate between nativist account and usage-based approach has lasted for quite a long time. By analyzing the longitudinal Mandarin data, the author attempts to find out whether the usage-based theory can fully explain characteristics in Chinese verb development. To sum up, this thesis attempts to apply the descriptive research method to investigate the acquisition and the usage of Chinese-speaking children’s early verbs, on purpose of providing a new perspective in investigating semantic and syntactic features of early verb acquisition.Keywords: Chinese-speaking children, early verb acquisition, verb classes, verb grammatical structures
Procedia PDF Downloads 367510 Parallel Asynchronous Multi-Splitting Methods for Differential Algebraic Systems
Authors: Malika Elkyal
Abstract:
We consider an iterative parallel multi-splitting method for differential algebraic equations. The main feature of the proposed idea is to use the asynchronous form. We prove that the multi-splitting technique can effectively accelerate the convergent performance of the iterative process. The main characteristic of an asynchronous mode is that the local algorithm does not have to wait at predetermined messages to become available. We allow some processors to communicate more frequently than others, and we allow the communication delays to be substantial and unpredictable. Accordingly, we note that synchronous algorithms in the computer science sense are particular cases of our formulation of asynchronous one.Keywords: parallel methods, asynchronous mode, multisplitting, differential algebraic equations
Procedia PDF Downloads 560509 Application of Modulo-2 Arithmetic in Securing Communicated Messages throughout the Globe
Authors: Ejd Garba, Okike Benjamin
Abstract:
Today, the word encryption has become very popular even among non-computer professionals. There is no doubt that some works have been carried out in this area, but more works need to be done. Presently, most of the works on encryption is concentrated on the sender of the message without paying any attention to the message recipient. However, it is a good practice if any message sent to someone is received by the particular person whom the message is sent to. This work seeks to ensure that at the receiving end of the message, there is a security to ensure that the recipient computes a key that would enable the encrypted message to be accessed. This key would be in form of password. This would make it possible for a given message to be sent to several people at the same time. When this happens, it is only those people who computes the key correctly that would be given the opportunity to access even the encrypted message, which can in turn be decrypted using the appropriate key.Keywords: arithmetic, cyber space, modulo-2, information security
Procedia PDF Downloads 321508 Transitivity Analysis in Reading Passage of English Text Book for Senior High School
Authors: Elitaria Bestri Agustina Siregar, Boni Fasius Siregar
Abstract:
The paper concerned with the transitivity in the reading passage of English textbook for Senior High School. The six types of process were occurred in the passages with percentage as follows: Material Process is 166 (42%), Relational Process is 155 (39%), Mental Process is 39 (10%), Verbal Process is 21 (5%), Existential Process is 13 (3), and Behavioral Process is 5 (1%). The material processes were found to be the most frequently used process type in the samples in our corpus (41,60 %). This indicates that the twenty reading passages are centrally concerned with action and events. Related to developmental psychology theory, this book fits the needs of students of this age.Keywords: transitivity, types of processes, reading passages, developmental psycholoy
Procedia PDF Downloads 417507 Mural Exhibition as a Promotive Strategy to Proper Hygiene and Sanitation Practices among Children: A Case Study from Urban Slum Schools in Nairobi, Kenya
Authors: Abdulaziz Kikanga, Kellen Muchira, Styvers Kathuni, Paul Saitoti
Abstract:
Background: Provision of adequate levels of water, sanitation, and hygiene in schools is a strategic objective in achieving universal primary education among children in low and middle-income countries. However, lack of proper sanitation and hygiene practices in schools, especially those in informal settlement has resulted to an increased rate of school absenteeism thereby affecting the education and health outcomes of the children in those setting. Intervention or Response: Catholic Relief Services in Kenya supports five schools in informal settlements of Nairobi by painting of key hygiene messages on school walls to promote proper hygiene and sanitation practices among the school children. The mural exhibitions depict the essence of proper hygiene practices, proper latrine use, and hand washing after visiting the latrine. The artwork is context specific and its aimed at improving the uptake of proper hygiene and sanitation practices among the school children. Review of project related documents was conducted including interviews with the school children. Thematic analysis was used to interpret the qualitative information generated. Results and Lessons Learnt: 12 school children have interviewed on proper hygiene and sanitation practices and the exercise revealed that painted murals were the best communication platforms for creating awareness on proper sanitation on issues relating to water, sanitation, and hygiene in schools. The painting mural provided a strong knowledge base for the formation of healthy habits in both the school and informal settlement. In addition, these sanitation messages on the school walls empower the children to share these practices with their siblings, parents, and other family members thereby acting as agents of change to proper hygiene and sanitation in those informal settlements. The findings revealed that by adopting proper sanitation and hygiene practices, there has been a reduction of school absenteeism due to a decrease in disease related to inadequate sanitation and hygiene in schools. Conclusion: The adoption of proper sanitation in schools entails more than just a painted mural wall. Insights revealed that to have a lasting sanitation and hygiene intervention, there is a need to invest in effective hygiene educational programming that encourages the formation of proper hygiene habits and promotes changes in behavior.Keywords: education outcomes, informal settlement, mural exhibition, school hygiene and sanitation
Procedia PDF Downloads 256506 Secure Texting Used in a Post-Acute Pediatric Skilled Nursing Inpatient Setting: A Multidisciplinary Care Team Driven Communication System with Alarm and Alert Notification Management
Authors: Bency Ann Massinello, Nancy Day, Janet Fellini
Abstract:
Background: The use of an appropriate mode of communication among the multidisciplinary care team members regarding coordination of care is an extremely complicated yet important patient safety initiative. Effective communication among the team members(nursing staff, medical staff, respiratory therapists, rehabilitation therapists, patient-family services team…) become essential to develop a culture of trust and collaboration to deliver the highest quality care to patients are their families. The inpatient post-acute pediatrics, where children and their caregivers come for continuity of care, is no exceptions to the increasing use of text messages as a means to communication among clinicians. One such platform is the Vocera Communications (Vocera Smart Mobile App called Vocera Edge) allows the teams to use the application and share sensitive patient information through an encrypted platform using IOS company provided shared and assigned mobile devices. Objective: This paper discusses the quality initiative of implementing the transition from Vocera Smartbage to Vocera Edge Mobile App, technology advantage, use case expansion, and lessons learned about a secure alternative modality that allows sending and receiving secure text messages in a pediatric post-acute setting using an IOS device. This implementation process included all direct care staff, ancillary teams, and administrative teams on the clinical units. Methods: Our institution launched this transition from voice prompted hands-free Vocera Smartbage to Vocera Edge mobile based app for secure care team texting using a big bang approach during the first PDSA cycle. The pre and post implementation data was gathered using a qualitative survey of about 500 multidisciplinary team members to determine the ease of use of the application and its efficiency in care coordination. The technology was further expanded in its use by implementing clinical alerts and alarms notification using middleware integration with patient monitoring (Masimo) and life safety (Nurse call) systems. Additional use of the smart mobile iPhone use include pushing out apps like Lexicomp and Up to Date to have it readily available for users for evident-based practice in medication and disease management. Results: Successful implementation of the communication system in a shared and assigned model with all of the multidisciplinary teams in our pediatric post-acute setting. In just a 3-monthperiod post implementation, we noticed a 14% increase from 7,993 messages in 6 days in December 2020 to 9,116messages in March 2021. This confirmed that all clinical and non-clinical teams were using this mode of communication for coordinating the care for their patients. System generated data analytics used in addition to the pre and post implementation staff survey for process evaluation. Conclusion: A secure texting option using a mobile device is a safe and efficient mode for care team communication and collaboration using technology in real time. This allows for the settings like post-acute pediatric care areas to be in line with the widespread use of mobile apps and technology in our mainstream healthcare.Keywords: nursing informatics, mobile secure texting, multidisciplinary communication, pediatrics post acute care
Procedia PDF Downloads 196505 Block Mining: Block Chain Enabled Process Mining Database
Authors: James Newman
Abstract:
Process mining is an emerging technology that looks to serialize enterprise data in time series data. It has been used by many companies and has been the subject of a variety of research papers. However, the majority of current efforts have looked at how to best create process mining from standard relational databases. This paper is the first pass at outlining a database custom-built for the minimal viable product of process mining. We present Block Miner, a blockchain protocol to store process mining data across a distributed network. We demonstrate the feasibility of storing process mining data on the blockchain. We present a proof of concept and show how the intersection of these two technologies helps to solve a variety of issues, including but not limited to ransomware attacks, tax documentation, and conflict resolution.Keywords: blockchain, process mining, memory optimization, protocol
Procedia PDF Downloads 104504 Integrating the Modbus SCADA Communication Protocol with Elliptic Curve Cryptography
Authors: Despoina Chochtoula, Aristidis Ilias, Yannis Stamatiou
Abstract:
Modbus is a protocol that enables the communication among devices which are connected to the same network. This protocol is, often, deployed in connecting sensor and monitoring units to central supervisory servers in Supervisory Control and Data Acquisition, or SCADA, systems. These systems monitor critical infrastructures, such as factories, power generation stations, nuclear power reactors etc. in order to detect malfunctions and ignite alerts and corrective actions. However, due to their criticality, SCADA systems are vulnerable to attacks that range from simple eavesdropping on operation parameters, exchanged messages, and valuable infrastructure information to malicious modification of vital infrastructure data towards infliction of damage. Thus, the SCADA research community has been active over strengthening SCADA systems with suitable data protection mechanisms based, to a large extend, on cryptographic methods for data encryption, device authentication, and message integrity protection. However, due to the limited computation power of many SCADA sensor and embedded devices, the usual public key cryptographic methods are not appropriate due to their high computational requirements. As an alternative, Elliptic Curve Cryptography has been proposed, which requires smaller key sizes and, thus, less demanding cryptographic operations. Until now, however, no such implementation has been proposed in the SCADA literature, to the best of our knowledge. In order to fill this gap, our methodology was focused on integrating Modbus, a frequently used SCADA communication protocol, with Elliptic Curve based cryptography and develop a server/client application to demonstrate the proof of concept. For the implementation we deployed two C language libraries, which were suitably modify in order to be successfully integrated: libmodbus (https://github.com/stephane/libmodbus) and ecc-lib https://www.ceid.upatras.gr/webpages/faculty/zaro/software/ecc-lib/). The first library provides a C implementation of the Modbus/TCP protocol while the second one offers the functionality to develop cryptographic protocols based on Elliptic Curve Cryptography. These two libraries were combined, after suitable modifications and enhancements, in order to give a modified version of the Modbus/TCP protocol focusing on the security of the data exchanged among the devices and the supervisory servers. The mechanisms we implemented include key generation, key exchange/sharing, message authentication, data integrity check, and encryption/decryption of data. The key generation and key exchange protocols were implemented with the use of Elliptic Curve Cryptography primitives. The keys established by each device are saved in their local memory and are retained during the whole communication session and are used in encrypting and decrypting exchanged messages as well as certifying entities and the integrity of the messages. Finally, the modified library was compiled for the Android environment in order to run the server application as an Android app. The client program runs on a regular computer. The communication between these two entities is an example of the successful establishment of an Elliptic Curve Cryptography based, secure Modbus wireless communication session between a portable device acting as a supervisor station and a monitoring computer. Our first performance measurements are, also, very promising and demonstrate the feasibility of embedding Elliptic Curve Cryptography into SCADA systems, filling in a gap in the relevant scientific literature.Keywords: elliptic curve cryptography, ICT security, modbus protocol, SCADA, TCP/IP protocol
Procedia PDF Downloads 276503 Smart Trust Management for Vehicular Networks
Authors: Amel Ltifi, Ahmed Zouinkhi, Med Salim Bouhlel
Abstract:
Spontaneous networks such as VANET are in general deployed in an open and thus easily accessible environment. Therefore, they are vulnerable to attacks. Trust management is one of a set of security solutions dedicated to this type of networks. Moreover, the strong mobility of the nodes (in the case of VANET) makes the establishment of a trust management system complex. In this paper, we present a concept of ‘Active Vehicle’ which means an autonomous vehicle that is able to make decision about trustworthiness of alert messages transmitted about road accidents. The behavior of an “Active Vehicle” is modeled using Petri Nets.Keywords: active vehicle, cooperation, petri nets, trust management, VANET
Procedia PDF Downloads 407502 Analysis of Teachers' Self Efficacy in Terms of Emotional Intelligence
Authors: Ercan Yilmaz, Ali Murat Sünbül
Abstract:
The aim of the study is to investigate teachers’ self-efficacy with regards to their emotional intelligence. The relational model was used in the study. The participant of the study included 194 teachers from secondary schools in Konya, Turkey. In order to assess teachers’ emotional intelligence, “Trait Emotional Intelligence Questionnaire-short Form was implemented. For teachers’ self-efficacy, “Teachers’ Sense of Self-Efficacy Scale” was used. As a result of the study, a significant relationship is available between teachers’ sense of self-efficacy and their emotional intelligence. Teachers’ emotional intelligence enucleates approximate eighteen percent of the variable in dimension named teachers’ self-efficacy for the students’ involvement. About nineteen percent of the variable in dimension “self-efficacy for teaching strategies is represented through emotional intelligence. Teachers’ emotional intelligence demonstrates about seventeen percent of variable aimed at classroom management.Keywords: teachers, self-efficacy, emotional intelligence, education
Procedia PDF Downloads 457501 Refining Sexual Assault Treatment: Recovered Survivors and Expert Therapists Concur on Effective Therapy Components
Authors: Avigail Moor, Michal Otmazgin, Hagar Tsiddon, Avivit Mahazri
Abstract:
The goal of the present study was to refine sexual assault therapy through the examination of the level of agreement between survivor and therapist assessments of key recovery-promoting therapeutic interventions. This is the first study to explore the level of agreement between those who partake in the treatment process from either position. Semi structured interviews were conducted in this qualitative study with 10 survivors and 10 experienced therapists. The results document considerable concurrence between them regarding relational and trauma processing treatment components alike. Together, these reports outline key effective interventions, both common and specific in nature, concomitantly supported by both groups.Keywords: sexual assault, rape treatment, therapist training, psychotherapy
Procedia PDF Downloads 59500 Blockchain Security in MANETs
Authors: Nada Mouchfiq, Ahmed Habbani, Chaimae Benjbara
Abstract:
The security aspect of the IoT occupies a place of great importance especially after the evolution that has known this field lastly because it must take into account the transformations and the new applications .Blockchain is a new technology dedicated to the data sharing. However, this does not work the same way in the different systems with different operating principles. This article will discuss network security using the Blockchain to facilitate the sending of messages and information, enabling the use of new processes and enabling autonomous coordination of devices. To do this, we will discuss proposed solutions to ensure a high level of security in these networks in the work of other researchers. Finally, our article will propose a method of security more adapted to our needs as a team working in the ad hoc networks, this method is based on the principle of the Blockchain and that we named ”MPR Blockchain”.Keywords: Ad hocs networks, blockchain, MPR, security
Procedia PDF Downloads 187499 Teacher’s Self-Efficacy and Self-Perception of Teaching Professional Competences
Authors: V. Biasi, A. M. Ciraci, G. Domenici, N. Patrizi
Abstract:
We present two studies centered on the teacher’s perception of self-efficacy and professional competences. The first study aims to evaluate the levels of self-efficacy as attitude in 200 teachers of primary and secondary schools. Teacher self-efficacy is related to many educational outcomes: such as teachers’ persistence, enthusiasm, commitment and instructional behavior. High level of teacher self-efficacy beliefs enhance student motivation and pupil’s learning level. On this theoretical and empirical basis we are planning a second study oriented to assess teacher self-perception of competences that are linked to teacher self-efficacy. With the CDVR Questionnaire, 287 teachers graduated in Education Sciences in e-learning mode, showed an increase in their self-perception of didactic-evaluation and relational competences and an increased confidence also in their own professionalism.Keywords: teacher competence, teacher self-efficacy, selfperception, self-report evaluation
Procedia PDF Downloads 523498 Policy for Implementing Decolonial Practices, Equity, Inclusivity, and Diversity into Radical Democratic Informal Art Gallery Education
Authors: Kaida Kobylka
Abstract:
Museum education policy can be developed through the lens of radical democracy and radically democratic relational aesthetics to provoke a more wholistic, agonistic, and utopian educational experiences that expand a viewer’s experiences and knowledge of artwork in a museum’s permanent collection to encourage a deeper understanding of art and the community of a museum’s connections to equity, diversity, inclusion, and decolonization. Practices used by the museum will create cohesive and engaging informal education that utilizes community-based, alternative knowledge and create dignity-safe spaces for viewers to engage critically with the visual objects.Keywords: museum education, radical democracy, Canadian policy, community-based knowledge
Procedia PDF Downloads 72497 An Analysis of Privacy and Security for Internet of Things Applications
Authors: Dhananjay Singh, M. Abdullah-Al-Wadud
Abstract:
The Internet of Things is a concept of a large scale ecosystem of wireless actuators. The actuators are defined as things in the IoT, those which contribute or produces some data to the ecosystem. However, ubiquitous data collection, data security, privacy preserving, large volume data processing, and intelligent analytics are some of the key challenges into the IoT technologies. In order to solve the security requirements, challenges and threats in the IoT, we have discussed a message authentication mechanism for IoT applications. Finally, we have discussed data encryption mechanism for messages authentication before propagating into IoT networks.Keywords: Internet of Things (IoT), message authentication, privacy, security
Procedia PDF Downloads 384496 Addressing Organizational Burnout in Higher Education: A Systemic Approach to Faculty Well-Being and Institutional Resilience
Authors: Liza L. S. Choi
Abstract:
Organizational burnout in higher education presents a critical challenge, undermining faculty well-being and institutional effectiveness. This study adopts a systemic perspective, addressing burnout through evidence-based strategies beyond individual coping mechanisms. Utilizing a meta-synthesis of existing literature, the author examines the underlying causes of burnout through the lenses of relational leadership, interpretivist theory, nudge theory, and the ADKAR model. The methodology synthesizes secondary data from peer-reviewed research, comprehensively analyzing key contributors to burnout, including excessive workloads, inadequate leadership, insufficient resources, and the absence of psychological safety. Key findings reveal that addressing burnout requires multi-faceted interventions. Effective implementation begins with leadership training programs grounded in relational leadership principles. These programs empower leaders to build trust by acknowledging and addressing faculty's unique challenges, such as workload inequities and insufficient support. For example, leaders can utilize interpretivist approaches to collect qualitative feedback through focus groups or anonymous surveys, providing actionable insights into the lived experiences of faculty. Institutions should establish policies encouraging open communication and normalizing feedback mechanisms to promote psychological safety. These initiatives include regular town halls, anonymous feedback portals, and structured team-building activities. They create environments where faculty feel supported and valued, reducing the stigma of voicing concerns. Drawing inspiration from successful practices in the healthcare sector, the author advocates for adopting an Associate Vice President (AVP) of Wellness role to lead organizational well-being initiatives. This role would centralize efforts to address faculty burnout and job satisfaction, ensuring alignment across departments and breaking down silos of operation. By fostering cross-departmental collaboration, this approach can lead to more integrated and efficient solutions, maximizing resource utilization and enhancing institutional resilience. The ADKAR model offers a structured framework for managing organizational change, emphasizing Awareness, Desire, Knowledge, Ability, and Reinforcement. Specific applications include facilitating workshops to raise awareness of burnout's impact, providing professional development programs that enhance faculty time management skills, and embedding well-being practices—such as flexible scheduling and equitable resource distribution—into institutional policies. Nudge theory further supports these efforts by employing subtle cues, such as reminders and default options, to encourage healthier work habits and foster collaboration. Finally, institutions should regularly evaluate the effectiveness of these interventions by implementing metrics such as faculty engagement scores, turnover rates, and utilization of wellness resources. By adopting a holistic and scalable framework that includes the AVP Wellness role and eliminates operational silos, this study provides academic institutions with practical tools to enhance morale, foster collaboration, and build resilience, ultimately addressing organizational burnout and creating a supportive educational environment.Keywords: higher education, organizational burnout, relational leadership, culture of well-being and engagement
Procedia PDF Downloads 9495 System Detecting Border Gateway Protocol Anomalies Using Local and Remote Data
Authors: Alicja Starczewska, Aleksander Nawrat, Krzysztof Daniec, Jarosław Homa, Kacper Hołda
Abstract:
Border Gateway Protocol is the main routing protocol that enables routing establishment between all autonomous systems, which are the basic administrative units of the internet. Due to the poor protection of BGP, it is important to use additional BGP security systems. Many solutions to this problem have been proposed over the years, but none of them have been implemented on a global scale. This article describes a system capable of building images of real-time BGP network topology in order to detect BGP anomalies. Our proposal performs a detailed analysis of BGP messages that come into local network cards supplemented by information collected by remote collectors in different localizations.Keywords: BGP, BGP hijacking, cybersecurity, detection
Procedia PDF Downloads 79494 Analyzing Strategic Alliances of Museums: The Case of Girona (Spain)
Authors: Raquel Camprubí
Abstract:
Cultural tourism has been postulated as relevant motivation for tourist over the world during the last decades. In this context, museums are the main attraction for cultural tourists who are seeking to connect with the history and culture of the visited place. From the point of view of an urban destination, museums and other cultural resources are essential to have a strong tourist supply at the destination, in order to be capable of catching attention and interest of cultural tourists. In particular, museums’ challenge is to be prepared to offer the best experience to their visitors without to forget their mission-based mainly on protection of its collection and other social goals. Thus, museums individually want to be competitive and have good positioning to achieve their strategic goals. The life cycle of the destination and the level of maturity of its tourism product influence the need of tourism agents to cooperate and collaborate among them, in order to rejuvenate their product and become more competitive as a destination. Additionally, prior studies have considered an approach of different models of a public and private partnership, and collaborative and cooperative relations developed among the agents of a tourism destination. However, there are no studies that pay special attention to museums and the strategic alliances developed to obtain mutual benefits. Considering this background, the purpose of this study is to analyze in what extent museums of a given urban destination have established strategic links and relations among them, in order to improve their competitive position at both individual and destination level. In order to achieve the aim of this study, the city of Girona (Spain) and the museums located in this city are taken as a case study. Data collection was conducted using in-depth interviews, in order to collect all the qualitative data related to nature, strengthen and purpose of the relational ties established among the museums of the city or other relevant tourism agents of the city. To conduct data analysis, a Social Network Analysis (SNA) approach was taken using UCINET software. Position of the agents in the network and structure of the network was analyzed, and qualitative data from interviews were used to interpret SNA results. Finding reveals the existence of strong ties among some of the museums of the city, particularly to create and promote joint products. Nevertheless, there were detected outsiders who have an individual strategy, without collaboration and cooperation with other museums or agents of the city. Results also show that some relational ties have an institutional origin, while others are the result of a long process of cooperation with common projects. Conclusions put in evidence that collaboration and cooperation of museums had been positive to increase the attractiveness of the museum and the city as a cultural destination. Future research and managerial implications are also mentioned.Keywords: cultural tourism, competitiveness, museums, Social Network analysis
Procedia PDF Downloads 118493 Anajaa-Visual Substitution System: A Navigation Assistive Device for the Visually Impaired
Authors: Juan Pablo Botero Torres, Alba Avila, Luis Felipe Giraldo
Abstract:
Independent navigation and mobility through unknown spaces pose a challenge for the autonomy of visually impaired people (VIP), who have relied on the use of traditional assistive tools like the white cane and trained dogs. However, emerging visually assistive technologies (VAT) have proposed several human-machine interfaces (HMIs) that could improve VIP’s ability for self-guidance. Hereby, we introduce the design and implementation of a visually assistive device, Anajaa – Visual Substitution System (AVSS). This system integrates ultrasonic sensors with custom electronics, and computer vision models (convolutional neural networks), in order to achieve a robust system that acquires information of the surrounding space and transmits it to the user in an intuitive and efficient manner. AVSS consists of two modules: the sensing and the actuation module, which are fitted to a chest mount and belt that communicate via Bluetooth. The sensing module was designed for the acquisition and processing of proximity signals provided by an array of ultrasonic sensors. The distribution of these within the chest mount allows an accurate representation of the surrounding space, discretized in three different levels of proximity, ranging from 0 to 6 meters. Additionally, this module is fitted with an RGB-D camera used to detect potentially threatening obstacles, like staircases, using a convolutional neural network specifically trained for this purpose. Posteriorly, the depth data is used to estimate the distance between the stairs and the user. The information gathered from this module is then sent to the actuation module that creates an HMI, by the means of a 3x2 array of vibration motors that make up the tactile display and allow the system to deliver haptic feedback. The actuation module uses vibrational messages (tactones); changing both in amplitude and frequency to deliver different awareness levels according to the proximity of the obstacle. This enables the system to deliver an intuitive interface. Both modules were tested under lab conditions, and the HMI was additionally tested with a focal group of VIP. The lab testing was conducted in order to establish the processing speed of the computer vision algorithms. This experimentation determined that the model can process 0.59 frames per second (FPS); this is considered as an adequate processing speed taking into account that the walking speed of VIP is 1.439 m/s. In order to test the HMI, we conducted a focal group composed of two females and two males between the ages of 35-65 years. The subject selection was aided by the Colombian Cooperative of Work and Services for the Sightless (COOTRASIN). We analyzed the learning process of the haptic messages throughout five experimentation sessions using two metrics: message discrimination and localization success. These correspond to the ability of the subjects to recognize different tactones and locate them within the tactile display. Both were calculated as the mean across all subjects. Results show that the focal group achieved message discrimination of 70% and a localization success of 80%, demonstrating how the proposed HMI leads to the appropriation and understanding of the feedback messages, enabling the user’s awareness of its surrounding space.Keywords: computer vision on embedded systems, electronic trave aids, human-machine interface, haptic feedback, visual assistive technologies, vision substitution systems
Procedia PDF Downloads 83492 Phone Number Spoofing Attack in VoLTE 4G
Authors: Joo-Hyung Oh
Abstract:
The number of service users of 4G VoLTE (voice over LTE) using LTE data networks is rapidly growing. VoLTE based on all-IP network enables clearer and higher-quality voice calls than 3G. It does, however, pose new challenges; a voice call through IP networks makes it vulnerable to security threats such as wiretapping and forged or falsified information. And in particular, stealing other users’ phone numbers and forging or falsifying call request messages from outgoing voice calls within VoLTE result in considerable losses that include user billing and voice phishing to acquaintances. This paper focuses on the threats of caller phone number spoofing in the VoLTE and countermeasure technology as safety measures for mobile communication networks.Keywords: LTE, 4G, VoLTE, phone number spoofing
Procedia PDF Downloads 433491 Educating through Design: Eco-Architecture as a Form of Public Awareness
Authors: Carmela Cucuzzella, Jean-Pierre Chupin
Abstract:
Eco-architecture today is being assessed and judged increasingly on the basis of its environmental performance and its dedication to urgent stakes of sustainability. Architects have responded to environmental imperatives in novel ways since the 1960s. In the last two decades, however, different forms of eco-architecture practices have emerged that seem to be as dedicated to the issues of sustainability, as to their ability to 'communicate' their ecological features. The hypothesis is that some contemporary eco-architecture has been developing a characteristic 'explanatory discourse', of which it is possible to identify in buildings around the world. Some eco-architecture practices do not simply demonstrate their alignment with pressing ecological issues, rather, these buildings seem to be also driven by the urgent need to explain their ‘greenness’. The design aims specifically to teach visitors of the eco-qualities. These types of architectural practices are referred to in this paper as eco-didactic. The aim of this paper is to identify and assess this distinctive form of environmental architecture practice that aims to teach. These buildings constitute an entirely new form of design practice that places eco-messages squarely in the public realm. These eco-messages appear to have a variety of purposes: (i) to raise awareness of unsustainable quotidian habits, (ii) to become means of behavioral change, (iii) to publicly announce their responsibility through the designed eco-features, or (iv) to engage the patrons of the building into some form of sustainable interaction. To do this, a comprehensive review of Canadian eco-architecture is conducted since 1998. Their potential eco-didactic aspects are analysed through a lens of three vectors: (1) cognitive visitor experience: between the desire to inform and the poetics of form (are parts of the design dedicated to inform the visitors of the environmental aspects?); (2) formal architectural qualities: between the visibility and the invisibility of environmental features (are these eco-features clearly visible by the visitors?); and (3) communicative method for delivering eco-message: this transmission of knowledge is accomplished somewhere between consensus and dissensus as a method for disseminating the eco-message (do visitors question the eco-features or are they accepted by visitors as features that are environmental?). These architectural forms distinguish themselves in their crossing of disciplines, specifically, architecture, environmental design, and art. They also differ from other architectural practices in terms of how they aim to mobilize different publics within various urban landscapes The diversity of such buildings, from how and what they aim to communicate, to the audience they wish to engage, are all key parameters to better understand their means of knowledge transfer. Cases from the major cities across Canada are analysed, aiming to illustrate this increasing worldwide phenomenon.Keywords: eco-architecture, public awareness, community engagement, didacticism, communication
Procedia PDF Downloads 128490 A Qualitative Look at Mental Health Stressors in Response to COVID-19
Authors: Gabriel G. Gaft, Xayvinay Xiong, Amanda Sunday
Abstract:
The emergent pandemic from COVID-19 virus has forced people to adjust to major changes. These changes include all elements of family and work life and required people to engage in novel behaviors. For many people, the social norms to which they have been accustomed no longer prevail. Not surprisingly, such enormous changes in daily life have been associated with greater problems in mental health; and research regarding ways in which mental health professionals can support people is more necessary than ever before. It is often useful to assess people’s reactions through surveys and utilize quantitative data to answer questions about coping strategies etc. It is also likely, however, that a host of individual factors are going to contribute to what might be considered 'good' or 'bad' coping mechanisms to a worldwide pandemic. To this end, qualitative studies—where the individual’s subjective experience is highlighted—are likely to provide more vital information for mental health professionals interested in supporting the particular person in front of them. This study reports on qualitative data, where X participants were asked questions about social distancing, coping strategies, and general attitudes towards social changes resulting from the COVID-19 pandemic. Informal interviews were conducted during the months of June-July 2020. Data were analyzed using Interpretative Phenomenological Analyses. Themes were identified first for each participant and then compared across different individual participants. Several findings emerged. First, all participants understood major health messages being imparted by governing bodies such as the CDC and WHO. The researchers feel this finding is important as it suggests health messages are at least being effectively communicated. Second, there was a clear trend for themes which highlighted the conflicting emotions participants felt about the changes they were expected to endure: positive and negative elements were identified, although a participant who had pre-existing conditions placed greater emphasis on the negative elements. One participant who was particularly interested in impression management also exclusively emphasized negative emotions. Third, participants who were able to reevaluate priorities—what Lazarus might call secondary appraisals—experienced social distancing as a positive rather than negative phenomenon. Finally, participants who were able to develop specific strategies—such as boundaries for work and self-care—reported themes of adjustment and contentment. Taken together, these findings suggest mental health practitioners can assist people to adjust more positively through specific techniques focusing on re-evaluation of life priorities and strategic coping skills.Keywords: COVID-19, pandemic, phenomenology, virus
Procedia PDF Downloads 122489 A Sustainable Society and Its Order Principles: Implications of Common Grace and the Man as the Image of God
Authors: Wenfu Zheng, Guanghe Zheng
Abstract:
The discussion on the social sustainability in existing literature is limited to two-dimension epistemology space with only two elements: the human and nature. Using the revelation of the Bible God, the paper adds a moral component to the two-dimension space. With the new variable being introduced, the authors formulate a to three-dimension epistemology space and discuss its implications. Based on the space, the authors explore the hierarchical structure of order principles for a sustainable society. The social order principle system hierarchically consists of three principles: moral, relational, and rational. The justification of every principle is analyzed briefly. The paper concluded that all these order principles are necessary assurance of building a sustainable society.Keywords: common grace, saving grace, sustainable society, the image of God
Procedia PDF Downloads 193488 Phone Number Spoofing Attack in VoLTE
Authors: Joo-Hyung Oh, Sekwon Kim, Myoungsun Noh, Chaetae Im
Abstract:
The number of service users of 4G VoLTE (voice over LTE) using LTE data networks is rapidly growing. VoLTE based on All-IP network enables clearer and higher-quality voice calls than 3G. It does, however, pose new challenges; a voice call through IP networks makes it vulnerable to security threats such as wiretapping and forged or falsified information. Moreover, in particular, stealing other users’ phone numbers and forging or falsifying call request messages from outgoing voice calls within VoLTE result in considerable losses that include user billing and voice phishing to acquaintances. This paper focuses on the threats of caller phone number spoofing in the VoLTE and countermeasure technology as safety measures for mobile communication networks.Keywords: LTE, 4G, VoLTE, phone number spoofing
Procedia PDF Downloads 524