Search results for: public order and security act
18064 Implementation of Geo-Crowdsourcing Mobile Applications in e-Government of V4 Countries: A State-of-the-Art Survey
Authors: Barbora Haltofová
Abstract:
In recent years, citizens have become an important source of geographic information and, therefore, geo-crowdsourcing, often known as volunteered geographic information, has provided an interesting alternative to traditional mapping practices which are becoming expensive, resource-intensive and unable to capture the dynamic nature of urban environments. In order to address a gap in research literature, this paper deals with a survey conducted to assess the current state of geo-crowdsourcing, a recent phenomenon popular with people who collect geographic information using their smartphones. This article points out that there is an increasing body of knowledge of geo-crowdsourcing mobile applications in the Visegrad countries marked by the ubiquitous Internet connection and the current massive proliferation of smartphones. This article shows how geo-crowdsourcing can be used as a complement, or in some cases a replacement, to traditionally generated sources of spatial data and information in public management. It discusses the new spaces of citizen participation constructed by these geo-crowdsourcing practices.Keywords: citizen participation, e-Government, geo-crowdsourcing, participatory mapping, mobile applications
Procedia PDF Downloads 33518063 Study on a Family of Optimal Fourth-Order Multiple-Root Solver
Authors: Young Hee Geum
Abstract:
In this paper,we develop the complex dynamics of a family of optimal fourth-order multiple-root solvers and plot their basins of attraction. Mobius conjugacy maps and extraneous fixed points applied to a prototype quadratic polynomial raised to the power of the known integer multiplicity m are investigated. A 300 x 300 uniform grid centered at the origin covering 3 x 3 square region is chosen to visualize the initial values on each basin of attraction in accordance with a coloring scheme based on their dynamical behavior. The illustrative basins of attractions applied to various test polynomials and the corresponding statistical data for convergence are shown to confirm the theoretical convergence.Keywords: basin of attraction, conjugacy, fourth-order, multiple-root finder
Procedia PDF Downloads 29618062 Analysis of Thermal Comfort in Educational Buildings Using Computer Simulation: A Case Study in Federal University of Parana, Brazil
Authors: Ana Julia C. Kfouri
Abstract:
A prerequisite of any building design is to provide security to the users, taking the climate and its physical and physical-geometrical variables into account. It is also important to highlight the relevance of the right material elements, which arise between the person and the agent, and must provide improved thermal comfort conditions and low environmental impact. Furthermore, technology is constantly advancing, as well as computational simulations for projects, and they should be used to develop sustainable building and to provide higher quality of life for its users. In relation to comfort, the more satisfied the building users are, the better their intellectual performance will be. Based on that, the study of thermal comfort in educational buildings is of relative relevance, since the thermal characteristics in these environments are of vital importance to all users. Moreover, educational buildings are large constructions and when they are poorly planned and executed they have negative impacts to the surrounding environment, as well as to the user satisfaction, throughout its whole life cycle. In this line of thought, to evaluate university classroom conditions, it was accomplished a detailed case study on the thermal comfort situation at Federal University of Parana (UFPR). The main goal of the study is to perform a thermal analysis in three classrooms at UFPR, in order to address the subjective and physical variables that influence thermal comfort inside the classroom. For the assessment of the subjective components, a questionnaire was applied in order to evaluate the reference for the local thermal conditions. Regarding the physical variables, it was carried out on-site measurements, which consist of performing measurements of air temperature and air humidity, both inside and outside the building, as well as meteorological variables, such as wind speed and direction, solar radiation and rainfall, collected from a weather station. Then, a computer simulation based on results from the EnergyPlus software to reproduce air temperature and air humidity values of the three classrooms studied was conducted. The EnergyPlus outputs were analyzed and compared with the on-site measurement results to be possible to come out with a conclusion related to the local thermal conditions. The methodological approach included in the study allowed a distinct perspective in an educational building to better understand the classroom thermal performance, as well as the reason of such behavior. Finally, the study induces a reflection about the importance of thermal comfort for educational buildings and propose thermal alternatives for future projects, as well as a discussion about the significant impact of using computer simulation on engineering solutions, in order to improve the thermal performance of UFPR’s buildings.Keywords: computer simulation, educational buildings, EnergyPlus, humidity, temperature, thermal comfort
Procedia PDF Downloads 39018061 Acceptance of Big Data Technologies and Its Influence towards Employee’s Perception on Job Performance
Authors: Jia Yi Yap, Angela S. H. Lee
Abstract:
With the use of big data technologies, organization can get result that they are interested in. Big data technologies simply load all the data that is useful for the organizations and provide organizations a better way of analysing data. The purpose of this research is to get employees’ opinion from films in Malaysia to explore the use of big data technologies in their organization in order to provide how it may affect the perception of the employees on job performance. Therefore, in order to identify will accepting big data technologies in the organization affect the perception of the employee, questionnaire will be distributed to different employee from different Small and medium-sized enterprises (SME) organization listed in Malaysia. The conceptual model proposed will test with other variables in order to see the relationship between variables.Keywords: big data technologies, employee, job performance, questionnaire
Procedia PDF Downloads 30418060 The Medieval Byzantine Churches at Trebizond (Trabzon): Promotion of Local Awareness and Conservation through Interpretation and Presentation
Authors: Esra Ceren Kara, Ufuk Seri̇n
Abstract:
The Byzantine Empire, which persisted from the 4th to 15th centuries, covered a significant period in history and bequeathed a significant cultural heritage throughout its territories, including Turkey. However, despite its historical and cultural importance, the approach of the political authorities, which emphasizes the Seljuk and Ottoman heritage, to Byzantium in Turkey is reluctant and problematic. Byzantine history and culture have long been neglected and attained negative connotations. This has led to a lack of awareness and understanding of Byzantine heritage among the public and inadequate conservation efforts. This research aims to address this problem by proposing a reinterpretation and presentation of Byzantine heritage in Turkey that emphasizes its cultural value and presents it to the public as a part of a common cultural heritage in order to accomplish effective conservation, raise awareness and provide a better understanding of the Byzantium. In this article, the ways to interpret, present and integrate the Medieval Byzantine heritage into today’s world are analyzed through the selected case study of Trebizond (Trabzon) with a holistic approach by putting emphasis on the Byzantine religious edifices, churches, chapels and monasteries. Although the vestiges of this period are still intact and in use today, their past is unknown to many of their users. This situation is even more evident in the case of the converted churches, which are now used as mosques or mosque-museums. In the city center of Trebizond, 9 out of 12 religious edifices that are still in use were built during the Medieval Byzantine period and converted into mosques under Ottoman and Turkish rule. Currently, these monuments serve as mosques and mosque-museums. However, with the exception of Hagia Sophia and Girls Monastery, their Byzantine past is obscure to many locals. Thus, the promotion of local awareness and conservation of the Medieval Byzantine heritage in the city is required. With this premise, this research will investigate the values and opportunities offered by the Byzantine cultural heritage in Trebizond and the threats to its conservation, and it will offer proposals for a more effective interpretation and presentation so as to foster local awareness and integration of the Medieval Byzantine heritage.Keywords: Byzantium/Byzantine, Trebizond, cultural heritage, interpretation and presentation, conservation, religious architecture, converted churches interpretation and presentation
Procedia PDF Downloads 8118059 The Development of Fiscal Policy in Light of Economic Systems
Authors: Djehich Mohamed Yousri
Abstract:
This research tries to highlight the different stages and developments of financial policy which has evolved significantly in its means and mechanism, goals as well, according to the successful developments of the society, in addition to that, the role of the country has been developed from custody to intervening country, that evolution does not impact only on financial science but it was reflected on financial system concepts, that helped fr transport it from neutral financial policy to intervening policy, since each stage was characterized by a set of characteristics, financial policy considers like reflective mirror to the role of state in all times, when the state has been absent as an organized authority to society, the role of financial policy was weakened and has been limited under the impact of ideology which exists at all time, financial role has was limited until the state intervened in all aspects of life, the state role is also influential in economic, social, and political life, this study highlighting the most important developments of financial policy under successful economic systems.Keywords: public expenditure, government spending, taxes, revenues public, economics
Procedia PDF Downloads 12418058 Norm Evolution through Contestation: Role of Legality from Humanitarian Intervention to Responsibility to Protect
Authors: Nazlı Üstünes Demirhan
Abstract:
International norms are subject to pressures of change through contestation during the course of their lifetimes. The nature of the contestation is one of the factors that are likely to have a determinative role in the direction of this change towards a stronger or weaker norm. This paper aims to understand the relation between the legality of contestation and the direction of change in norm strength. Based on a multidimensional norm strength conceptualization, it is hypothesized that use of legal logic and rhetoric of argumentation would have a positive influence for norm strength, whereas non-legal nature of contestation would lack this and weaken the norm. In order to show this, the evolution of the human protection norm between 1999 and 2018 will be examined with reference to two major contestation periods; Kosovo intervention of 1999, which led to the development of R2P doctrine, and Libya intervention of 2011, which is followed by the demise of the norm. The comparative analysis will be conducted through process tracing method with a document analysis on the Security Council meeting minutes, resolutions, and press releases. This study aims to contribute to the norm contestation literature with the introduction of legal process analysis. It also relates to further questions in IR/IL nexus, relating to the value added of norm legality as well as the politics of legalization.Keywords: humanitarian intervention, legality, norm contestation, norm dynamics, norm strength, responsibility to protect
Procedia PDF Downloads 16218057 Measuring Strategic Management Maturity: An Empirical Study in Turkish Public and Private Sector Organizations
Authors: F. Demir
Abstract:
Strategic Management is highly critical for all types of organizations. This paper examines maturity level of strategic management practices of public and private sector organizations in Turkey, and presents a conceptual model for assessing the maturity of strategic management in any organization. This research focuses on R&D intensive organizations (RDO) because it is claimed that such organizations are more innovative and innovation is a critical part of the model. The Strategic management maturity model (S-3M) is basically composed of six maturity levels with five different dimensions. Based on 63 organizations, the findings reveal that the average maturity of all organizations in the sample group is three out of five. It corresponds to the stage of ‘performed’. Results simply show that the majority of organizations from various industries and sectors implement strategic management activities; however, they experience multiple challenges to optimize strategic management processes and integrate organizational components with business strategies. Briefly, they struggle to become an innovative organization.Keywords: strategic management maturity, innovation, developing countries, research and development
Procedia PDF Downloads 29118056 Organizational Socialization Levels in Nurses
Authors: Manar Aslan, Ayfer Karaaslan, Serap Selçuk
Abstract:
The research was conducted in order to determine the organizational socialization levels of nurses working in hospitals in the form of a descriptive study. The research population was composed of nurses employed in public and private sector hospitals in the province of Konya with 0-3 years of professional experience in the hospitals (N=1200); and the sample was composed of 495 nurses that accepted to take part in the study voluntarily. Organizational Socialization Scale which was developed by Haueter, Macan and Winter (2003) and whose validity-reliability in Turkish was analyzed by Ataman (2012) was used. Statistical evaluation of data was conducted in SPSS.16 software. The results of the study revealed that the total score taken by nurses at the organizational socialization scale was 262.95; and this was close to the maximum score. Particularly the departmental socialization sub-dimension proved to be higher in comparison to the other two dimensions (organization socialization and task socialization). Statistically meaningful differences were found in the levels of organization socialization in relation to the status of organizational orientation training, level of education and age group.Keywords: nurses, newcomers, organizational socialization, total score
Procedia PDF Downloads 35318055 Data Security and Privacy Challenges in Cloud Computing
Authors: Amir Rashid
Abstract:
Cloud Computing frameworks empower organizations to cut expenses by outsourcing computation resources on-request. As of now, customers of Cloud service providers have no methods for confirming the privacy and ownership of their information and data. To address this issue we propose the platform of a trusted cloud computing program (TCCP). TCCP empowers Infrastructure as a Service (IaaS) suppliers, for example, Amazon EC2 to give a shout box execution condition that ensures secret execution of visitor virtual machines. Also, it permits clients to bear witness to the IaaS supplier and decide if the administration is secure before they dispatch their virtual machines. This paper proposes a Trusted Cloud Computing Platform (TCCP) for guaranteeing the privacy and trustworthiness of computed data that are outsourced to IaaS service providers. The TCCP gives the deliberation of a shut box execution condition for a client's VM, ensuring that no cloud supplier's authorized manager can examine or mess up with its data. Furthermore, before launching the VM, the TCCP permits a client to dependably and remotely acknowledge that the provider at backend is running a confided in TCCP. This capacity extends the verification of whole administration, and hence permits a client to confirm the data operation in secure mode.Keywords: cloud security, IaaS, cloud data privacy and integrity, hybrid cloud
Procedia PDF Downloads 30118054 Searchable Encryption in Cloud Storage
Authors: Ren Junn Hwang, Chung-Chien Lu, Jain-Shing Wu
Abstract:
Cloud outsource storage is one of important services in cloud computing. Cloud users upload data to cloud servers to reduce the cost of managing data and maintaining hardware and software. To ensure data confidentiality, users can encrypt their files before uploading them to a cloud system. However, retrieving the target file from the encrypted files exactly is difficult for cloud server. This study proposes a protocol for performing multikeyword searches for encrypted cloud data by applying k-nearest neighbor technology. The protocol ranks the relevance scores of encrypted files and keywords, and prevents cloud servers from learning search keywords submitted by a cloud user. To reduce the costs of file transfer communication, the cloud server returns encrypted files in order of relevance. Moreover, when a cloud user inputs an incorrect keyword and the number of wrong alphabet does not exceed a given threshold; the user still can retrieve the target files from cloud server. In addition, the proposed scheme satisfies security requirements for outsourced data storage.Keywords: fault-tolerance search, multi-keywords search, outsource storage, ranked search, searchable encryption
Procedia PDF Downloads 38518053 Deep Learning and Accurate Performance Measure Processes for Cyber Attack Detection among Web Logs
Authors: Noureddine Mohtaram, Jeremy Patrix, Jerome Verny
Abstract:
As an enormous number of online services have been developed into web applications, security problems based on web applications are becoming more serious now. Most intrusion detection systems rely on each request to find the cyber-attack rather than on user behavior, and these systems can only protect web applications against known vulnerabilities rather than certain zero-day attacks. In order to detect new attacks, we analyze the HTTP protocols of web servers to divide them into two categories: normal attacks and malicious attacks. On the other hand, the quality of the results obtained by deep learning (DL) in various areas of big data has given an important motivation to apply it to cybersecurity. Deep learning for attack detection in cybersecurity has the potential to be a robust tool from small transformations to new attacks due to its capability to extract more high-level features. This research aims to take a new approach, deep learning to cybersecurity, to classify these two categories to eliminate attacks and protect web servers of the defense sector which encounters different web traffic compared to other sectors (such as e-commerce, web app, etc.). The result shows that by using a machine learning method, a higher accuracy rate, and a lower false alarm detection rate can be achieved.Keywords: anomaly detection, HTTP protocol, logs, cyber attack, deep learning
Procedia PDF Downloads 21618052 Introduction of a Medicinal Plants Garden to Revitalize a Botany Curriculum for Non-Science Majors
Authors: Rosa M. Gambier, Jennifer L. Carlson
Abstract:
In order to revitalize the science curriculum for botany courses for non-science majors, we have introduced the use of the medicinal plants into a first-year botany course. We have connected the use of scientific method, scientific inquiry and active learning in the classroom with the study of Western Traditional Medical Botany. The students have researched models of Botanical medicine and have designed a sustainable medicinal plants garden using native medicinal plants from the northeast. Through the semester, the students have researched their chosen species, planted seeds in the college greenhouse, collected germination ratios, growth ratios and have successfully produced a beginners medicinal plant garden. Phase II of the project will be to tie in SCCCs community outreach goals by involving the public in the expanded development of the garden as a way of sharing learning about medicinal plants and traditional medicine outside the classroom.Keywords: medicinal plant garden, botany curriculum, active learning, community outreach
Procedia PDF Downloads 31118051 Implications of Fulani Herders/Farmers Conflict on the Socio-Economic Development of Nigeria (2000-2018)
Authors: Larry E. Udu, Joseph N. Edeh
Abstract:
Unarguably, the land is an indispensable factor of production and has been instrumental to numerous conflicts between crop farmers and herders in Nigeria. The conflicts pose a grave challenge to life and property, food security and ultimately to sustainable socio-economic development of the nation. The paper examines the causes of the Fulani herders/farmers conflicts, particularly in the Middle Belt; numerity of occurrences and extent of damage and their socio-economic implications. Content Analytical Approach was adopted as methodology wherein data was extensively drawn from the secondary source. Findings reveal that major causes of the conflict are attributable to violation of tradition and laws, trespass and cultural factors. Consequently, the numerity of attacks and level of fatality coupled with displacement of farmers, destruction of private and public facilities impacted negatively on farmers output with their attendant socio-economic implications on sustainable livelihood of the people and the nation at large. For instance, Mercy Corps (a Global Humanitarian Organization) in its research, 2013-2016 asserts that a loss of $14billion within 3 years was incurred and if the conflict were resolved, the average affected household could see increase income by at least 64 percent and potentially 210 percent or higher and that states affected by the conflicts lost an average of 47 percent taxes/IGR. The paper therefore recommends strict adherence to grazing laws; platform for dialogue bothering on compromises where necessary and encouragement of cattle farmers to build ranches for their cattle according to international standards.Keywords: conflict, farmers, herders, Nigeria, socio-economic implications
Procedia PDF Downloads 21118050 Building Information Management in Context of Urban Spaces, Analysis of Current Use and Possibilities
Authors: Lucie Jirotková, Daniel Macek, Andrea Palazzo, Veronika Malinová
Abstract:
Currently, the implementation of 3D models in the construction industry is gaining popularity. Countries around the world are developing their own modelling standards and implement the use of 3D models into their individual permitting processes. Another theme that needs to be addressed are public building spaces and their subsequent maintenance, where the usage of BIM methodology is directly offered. The significant benefit of the implementation of Building Information Management is the information transfer. The 3D model contains not only the spatial representation of the item shapes but also various parameters that are assigned to the individual elements, which are easily traceable, mainly because they are all stored in one place in the BIM model. However, it is important to keep the data in the models up to date to achieve useability of the model throughout the life cycle of the building. It is now becoming standard practice to use BIM models in the construction of buildings, however, the building environment is very often neglected. Especially in large-scale development projects, the public space of buildings is often forwarded to municipalities, which obtains the ownership and are in charge of its maintenance. A 3D model of the building surroundings would include both the above-ground visible elements of the development as well as the underground parts, such as the technological facilities of water features, electricity lines for public lighting, etc. The paper shows the possibilities of a model in the field of information for the handover of premises, the following maintenance and decision making. The attributes and spatial representation of the individual elements make the model a reliable foundation for the creation of "Smart Cities". The paper analyses the current use of the BIM methodology and presents the state-of-the-art possibilities of development.Keywords: BIM model, urban space, BIM methodology, facility management
Procedia PDF Downloads 12618049 Ownership and Shareholder Schemes Effects on Airport Corporate Strategy in Europe
Authors: Dimitrios Dimitriou, Maria Sartzetaki
Abstract:
In the early days of the of civil aviation, airports are totally state-owned companies under the control of national authorities or regional governmental bodies. From that time the picture has totally changed and airports privatisation and airport business commercialisation are key success factors to stimulate air transport demand, generate revenues and attract investors, linked to reliable and resilience of air transport system. Nowadays, airport's corporate strategy deals with policies and actions, affecting essential the business plans, the financial targets and the economic footprint in a regional economy they serving. Therefore, exploring airport corporate strategy is essential to support the decision in business planning, management efficiency, sustainable development and investment attractiveness on one hand; and define policies towards traffic development, revenues generation, capacity expansion, cost efficiency and corporate social responsibility. This paper explores key outputs in airport corporate strategy for different ownership schemes. The airport corporations are grouped in three major schemes: (a) Public, in which the public airport operator acts as part of the government administration or as a corporised public operator; (b) Mixed scheme, in which the majority of the shares and the corporate strategy is driven by the private or the public sector; and (c) Private, in which the airport strategy is driven by the key aspects of globalisation and liberalisation of the aviation sector. By a systemic approach, the key drivers in corporate strategy for modern airport business structures are defined. Key objectives are to define the key strategic opportunities and challenges and assess the corporate goals and risks towards sustainable business development for each scheme. The analysis based on an extensive cross-sectional dataset for a sample of busy European airports providing results on corporate strategy key priorities, risks and business models. The conventional wisdom is to highlight key messages to authorities, institutes and professionals on airport corporate strategy trends and directions.Keywords: airport corporate strategy, airport ownership, airports business models, corporate risks
Procedia PDF Downloads 30818048 A Review of Critical Factors in Budgetary Financing of Public Infrastructure in Nigeria
Authors: Akintayo Opawole, Godwin O. Jagboro
Abstract:
Research efforts on infrastructure development in Nigeria had not provided adequate assessment of issues essential for policy response by the government to address infrastructure deficiency. One major gap existing in previous studies is the assessment of challenges facing the budgetary financing model. Based on a case study of Osun State in Southwestern Nigeria, factors affecting budgetary financing of public infrastructure were identified from literature and brainstorming. Respondents were: 6 architects, 4 quantity surveyors, 6 town planners, 5 estate surveyors, 4 builders, 21 engineers and 26 economists/accountants ranging from principal to director who have been involved in policy making process with respect to infrastructure development in the public service of Osun state. The identified variables were subjected to factor analysis. The Kaiser-Meyer-Olkin measure of sampling adequacy tests carried out (KMO, 0.785) showed that the data collected were adequate for the analysis and the Bartlett’s test of sphericity (0.000) showed the data upon which the analysis was carried out was reliable. Results showed that factors such as poor collaboration between the state and local government establishments, absence of credible database system and inadequate funding of maintenance were the most significant to infrastructure development in the State. Policy responses to address challenges of infrastructure development in the state were identified to focus on creation of legal framework for liberation policy, enforcement of ‘due process’ in the procurement and establishment of monitoring system for project delivery.Keywords: development, infrastructure, financing, procurement
Procedia PDF Downloads 41518047 A Real Time Monitoring System of the Supply Chain Conditions, Products and Means of Transport
Authors: Dimitris E. Kontaxis, George Litainas, Dimitris P. Ptochos
Abstract:
Real-time monitoring of the supply chain conditions and procedures is a critical element for the optimal coordination and safety of the deliveries, as well as for the minimization of the delivery time and cost. Real-time monitoring requires IoT data streams, which are related to the conditions of the products and the means of transport (e.g., location, temperature/humidity conditions, kinematic state, ambient light conditions, etc.). These streams are generated by battery-based IoT tracking devices, equipped with appropriate sensors, and are transmitted to a cloud-based back-end system. Proper handling and processing of the IoT data streams, using predictive and artificial intelligence algorithms, can provide significant and useful results, which can be exploited by the supply chain stakeholders in order to enhance their financial benefits, as well as the efficiency, security, transparency, coordination, and sustainability of the supply chain procedures. The technology, the features, and the characteristics of a complete, proprietary system, including hardware, firmware, and software tools -developed in the context of a co-funded R&D programme- are addressed and presented in this paper.Keywords: IoT embedded electronics, real-time monitoring, tracking device, sensor platform
Procedia PDF Downloads 18218046 Identity Management in Virtual Worlds Based on Biometrics Watermarking
Authors: S. Bader, N. Essoukri Ben Amara
Abstract:
With the technological development and rise of virtual worlds, these spaces are becoming more and more attractive for cybercriminals, hidden behind avatars and fictitious identities. Since access to these spaces is not restricted or controlled, some impostors take advantage of gaining unauthorized access and practicing cyber criminality. This paper proposes an identity management approach for securing access to virtual worlds. The major purpose of the suggested solution is to install a strong security mechanism to protect virtual identities represented by avatars. Thus, only legitimate users, through their corresponding avatars, are allowed to access the platform resources. Access is controlled by integrating an authentication process based on biometrics. In the request process for registration, a user fingerprint is enrolled and then encrypted into a watermark utilizing a cancelable and non-invertible algorithm for its protection. After a user personalizes their representative character, the biometric mark is embedded into the avatar through a watermarking procedure. The authenticity of the avatar identity is verified when it requests authorization for access. We have evaluated the proposed approach on a dataset of avatars from various virtual worlds, and we have registered promising performance results in terms of authentication accuracy, acceptation and rejection rates.Keywords: identity management, security, biometrics authentication and authorization, avatar, virtual world
Procedia PDF Downloads 26718045 Computer Assisted Learning in a Less Resource Region
Authors: Hamidullah Sokout, Samiullah Paracha, Abdul Rashid Ahmadi
Abstract:
Passing the entrance exam to a university is a major step in one's life. University entrance exam commonly known as Kankor is the nationwide entrance exam in Afghanistan. This examination is prerequisite for all public and private higher education institutions at undergraduate level. It is usually taken by students who are graduated from high schools. In this paper, we reflect the major educational school graduates issues and propose ICT-based test preparation environment, known as ‘Online Kankor Exam Prep System’ to give students the tools to help them pass the university entrance exam on the first try. The system is based on Intelligent Tutoring System (ITS), which introduced an essential package of educational technology for learners that features: (i) exam-focused questions and content; (ii) self-assessment environment; and (iii) test preparation strategies in order to help students to acquire the necessary skills in their carrier and keep them up-to-date with instruction.Keywords: web-based test prep systems, learner-centered design, e-learning, intelligent tutoring system
Procedia PDF Downloads 37518044 An Immune-Inspired Web Defense Architecture
Authors: Islam Khalil, Amr El-Kadi
Abstract:
With the increased use of web technologies, microservices, and Application Programming Interface (API) for integration between systems, and with the development of containerization of services on the operating system level as a method of isolating system execution and for easing the deployment and scaling of systems, there is a growing need as well as opportunities for providing platforms that improve the security of such services. In our work, we propose an architecture for a containerization platform that utilizes various concepts derived from the human immune system. The goal of the proposed containerization platform is to introduce the concept of slowing down or throttling suspected malicious digital pathogens (intrusions) to reduce their damage footprint while providing more opportunities for forensic inspection of suspected pathogens in addition to the ability to snapshot, rollback, and recover from possible damage. The proposed platform also leverages existing intrusion detection algorithms by integrating and orchestrating their cooperative operation for more effective intrusion detection. We show how this model reduces the damage footprint of intrusions and gives a greater time window for forensic investigation. Moreover, during our experiments, our proposed platform was able to uncover unintentional system design flaws that resulted in internal DDoS-like attacks by submodules of the system itself rather than external intrusions.Keywords: containers, human immunity, intrusion detection, security, web services
Procedia PDF Downloads 9918043 Influence of Spelling Errors on English Language Performance among Learners with Dysgraphia in Public Primary Schools in Embu County, Kenya
Authors: Madrine King'endo
Abstract:
This study dealt with the influence of spelling errors on English language performance among learners with dysgraphia in public primary schools in West Embu, Embu County, Kenya. The study purposed to investigate the influence of spelling errors on the English language performance among the class three pupils with dysgraphia in public primary schools. The objectives of the study were to identify the spelling errors that learners with dysgraphia make when writing English words and classify the spelling errors they make. Further, the study will establish how the spelling errors affect the performance of the language among the study participants, and suggest the remediation strategies that teachers could use to address the errors. The study could provide the stakeholders with relevant information in writing skills that could help in developing a responsive curriculum to accommodate the teaching and learning needs of learners with dysgraphia, and probably ensure training of teachers in teacher training colleges is tailored within the writing needs of the pupils with dysgraphia. The study was carried out in Embu county because the researcher did not find any study in related literature review concerning the influence of spelling errors on English language performance among learners with dysgraphia in public primary schools done in the area. Moreover, besides being relatively populated enough for a sample population of the study, the area was fairly cosmopolitan to allow a generalization of the study findings. The study assumed the sampled schools will had class three pupils with dysgraphia who exhibited written spelling errors. The study was guided by two spelling approaches: the connectionist stimulation of spelling process and orthographic autonomy hypothesis with a view to explain how participants with learning disabilities spell written words. Data were collected through interviews, pupils’ exercise books, and progress records, and a spelling test made by the researcher based on the spelling scope set for class three pupils by the ministry of education in the primary education syllabus. The study relied on random sampling techniques in identifying general and specific participants. Since the study used children in schools as participants, voluntary consent was sought from themselves, their teachers and the school head teachers who were their caretakers in a school setting.Keywords: dysgraphia, writing, language, performance
Procedia PDF Downloads 15618042 Enhancing the Effectiveness of Air Defense Systems through Simulation Analysis
Authors: F. Felipe
Abstract:
Air Defense Systems contain high-value assets that are expected to fulfill their mission for several years - in many cases, even decades - while operating in a fast-changing, technology-driven environment. Thus, it is paramount that decision-makers can assess how effective an Air Defense System is in the face of new developing threats, as well as to identify the bottlenecks that could jeopardize the security of the airspace of a country. Given the broad extent of activities and the great variety of assets necessary to achieve the strategic objectives, a systems approach was taken in order to delineate the core requirements and the physical architecture of an Air Defense System. Then, value-focused thinking helped in the definition of the measures of effectiveness. Furthermore, analytical methods were applied to create a formal structure that preliminarily assesses such measures. To validate the proposed methodology, a powerful simulation was also used to determine the measures of effectiveness, now in more complex environments that incorporate both uncertainty and multiple interactions of the entities. The results regarding the validity of this methodology suggest that the approach can support decisions aimed at enhancing the capabilities of Air Defense Systems. In conclusion, this paper sheds some light on how consolidated approaches of Systems Engineering and Operations Research can be used as valid techniques for solving problems regarding a complex and yet vital matter.Keywords: air defense, effectiveness, system, simulation, decision-support
Procedia PDF Downloads 16018041 The Effect of Climatic and Cultural Conditions in Increasing the Sense of Community in Residential Complexes (Case Study: Saedyeh Residential Complex)
Authors: Razieh Esfandiarisedgh
Abstract:
Community architecture has been proposed as an alternative approach in architecture, with three political, sociological, and psychological approaches. In community architecture, the psychological approach, as the only approach related to community design, has an important index called a sense of community. Changes in today's modern society, such as the shrinking of families, cause a decrease in the sense of community and unwillingness of people. It has become a residential complex to be present in public spaces. This issue can be increased by creating motivation with the help of design for the presence and participation of people in public spaces and taking advantage of the facilities and quality of these spaces. This research used the qualitative research method, studied and collected information, and used observation and interviews in the selected sample. Through targeted sampling and matching it with the extracted design table, it was concluded that climate and culture are known as two important factors in the collective view of housing in Hamedan.Keywords: community architecture, sense of community, environmental psychology, architecture
Procedia PDF Downloads 7018040 Health Hazards Among Health Care Workers and Associated Factors in Public Hospitals, Sana'a-Yemen
Authors: Makkia Ahmad Ali Al-Falahi, Abdullah Abdelaziz Muharram
Abstract:
Background: Healthcare workers (HCWs) in Yemen are exposed to a myriad of occupational health hazards, including biological, physical, ergonomic, chemical and psychosocial hazards. HCWs operate in an environment that is considered to be one of the most hazardous occupational settings. Objective: To assess the prevalence of occupational health hazards among healthcare workers and associated risk factors in public hospitals in Sana'a City, Yemen. Method: Descriptive cross-sectional design was utilized; out of 5443 totals of HCWs 396 were selected by multistage sampling technique was carried out in the public hospitals in Sana'a city, Yemen. Results: More the half (60.6%) of HCWs aged between 20-30 years, (50.8%) were males, (56.3%) were married, and (45.5%) had a diploma qualification, while (65.2%) of HCWs had less than 6 years of experience. The result showed that the highest prevalence of occupational hazards was (99%), (ergonomic hazards (93.4%), biological hazards (87.6%), psychosocial (86.65%), physical hazards (83.3%), and chemical hazards (73.5%). There were no statistically significant differences between demographic characteristics and the prevalence of occupational hazards (p >0.05). Conclusion and recommendations: The study showed the highest prevalence of occupational hazards; regarding the prevalence of biological hazards exposure to sharp-related injury, the most prevalent physical hazards were slip/trip/and fall. Ergonomic hazards had back or neck pain during work. Chemical hazards were allergic to medical gloves powder. On psychosocial hazards was suffered from verbal and physical harassment. The study concluded by raising awareness among HCWs by conducting training courses to prevent occupational hazards.Keywords: health workers, occupational hazards, risk factors, the prevalence
Procedia PDF Downloads 8518039 As a Secure Bridge Country about Oil and Gas Sources Transfer after Arab Spring: Turkey
Authors: Fatih Ercin Guney, Hami Karagol
Abstract:
Day by day, humanity's energy needs increase, to facilitate access to energy sources by energy importing countries is of great importance in terms of issues both in terms of economic security and political security. The geographical location of the oil exporting countries in the Middle East (Iran, Iraq, Kuwait, Libya, Saudi Arabia, United Arab Emirates, Qatar) today, it is observed that evaluated by emerging Arab Spring(from Tunisia to Egypt) and freedom battles(in Syria) with security issues arise sourced from terrorist activities(ISIS). Progresses related with limited natural resources, energy and it's transportation issues which worries the developing countries, the energy in the region is considered to how to transfer safely. North Region of the Black Sea , the beginning of the conflict in the regional nature formed between Russia and Ukraine (2010), followed by the relevant regions of the power transmission line (From Russia to Europe) the discovery is considered to be the east's hand began to strengthen in terms of both the economical and political sides. With the growing need for safe access to the west of the new energy transmission lines are followed by Turkey, re-interest is considered to be shifted to the Mediterranean and the Middle East by West. Also, Russia, Iran and China (three axis of east) are generally performing as carry out parallel policies about energy , economical side and security in both United Nations Security Council (Two of Five Permanent Members are Russia and China) and Shanghai Cooperation Organization. In addition, Eastern Mediterranean Region Tension are rapidly increasing about research new oil and natural gas sources by Israel, Egypt, Cyprus, Lebanon. This paper provides, new energy corridor(s) are needed to transfer sources (Oil&Natural Gas) by Europe from East to West. So The West needs either safe bridge country to transfer natural sources to Europe in region or is needed to discovery new natural sources in extraterritorial waters of Eastern Mediterranean Region. But in two opportunities are evaluated with secure transfer corridors form region to Europe in safely. Even if the natural sources can be discovered, they are considered to transfer in safe manner. This paper involved, Turkey’s importance as a leader country in region over both of political and safe energy transfer sides as bridge country between south and north of Turkey why natural sources shall be transferred over Turkey, Even if diplomatic issues-For Example; Cyprus membership in European Union, Turkey membership candidate duration, Israel-Cyprus- Egypt-Lebanon researches about new natural sources in Mediterranean - occurred. But politic balance in Middle-East is changing quickly because of lack of democratic governments in region. So it is evaluated that the alliance of natural sources researches may not be long-time relations due to share sources after discoveries. After evaluating over causes and reasons, aim to reach finding foresight about future of region for energy transfer periods in secure manner.Keywords: Middle East, natural gas, oil, Turkey
Procedia PDF Downloads 30218038 Bayesian Prospective Detection of Small Area Health Anomalies Using Kullback Leibler Divergence
Authors: Chawarat Rotejanaprasert, Andrew Lawson
Abstract:
Early detection of unusual health events depends on the ability to detect rapidly any substantial changes in disease, thus facilitating timely public health interventions. To assist public health practitioners to make decisions, statistical methods are adopted to assess unusual events in real time. We introduce a surveillance Kullback-Leibler (SKL) measure for timely detection of disease outbreaks for small area health data. The detection methods are compared with the surveillance conditional predictive ordinate (SCPO) within the framework of Bayesian hierarchical Poisson modeling and applied to a case study of a group of respiratory system diseases observed weekly in South Carolina counties. Properties of the proposed surveillance techniques including timeliness and detection precision are investigated using a simulation study.Keywords: Bayesian, spatial, temporal, surveillance, prospective
Procedia PDF Downloads 31518037 Health Challenges of Unmarried Women over Thirty in Pakistan: A Public Health Perspective on Nutrition and Well-being
Authors: Anum Obaid, Iman Fatima, Wanisha Feroz, Haleema Imran, Hammad Tariq
Abstract:
In Pakistan, the health of unmarried women over thirty is an emerging public health concern due to its increasing prevalence. Achieving the Sustainable Development Goals (SDGs) requires addressing nutrition and public health issues. This research investigates these goals through the lens of nutrition and public health, specifically examining the challenges faced by unmarried women over thirty in Faisalabad, Pakistan. According to a recent United Nations report, there are 10 million unmarried women over the age of 35 in Pakistan. The United Nations defines health as "a state of complete physical, mental, and social well-being, and not merely the absence of disease or infirmity." Being unmarried and under constant societal pressure profoundly influences the dietary behaviors and nutritional status of these women, affecting their overall health, including physical, mental, and social well-being. A qualitative research approach was employed, involving interviews with both unmarried and married women over thirty. This research examines how marital status influences dietary practices, nutritional status, mental and social health, and their subsequent impacts. Factors such as physical health, mental and emotional status, societal pressure, social health, economic independence, and decision-making power were analyzed to understand the effect of singleness on overall wellness. Findings indicated that marital status significantly affects the dietary patterns and nutritional practices among women in Faisalabad. It was also revealed that unmarried women experienced more stress and had a less optimistic mindset compared to married women, due to loneliness or the absence of a spouse in their lives. Nutritional knowledge varied across marital status, impacting the overall health triangle, including physical, mental, and social health. Understanding these dynamics is crucial for developing targeted interventions to improve nutritional outcomes and overall health among unmarried women in Faisalabad. This study highlights the importance of fostering supportive environments and raising awareness about the health needs of unmarried women over thirty to enhance their overall well-being.Keywords: health triangle, unmarried woman over thirty, socio-cultural barriers, women’s health
Procedia PDF Downloads 3918036 Social Perception of the Benefits of Using a Solar Dryer to Conserve Fruits and Vegetables in Rural Communities in Manica - Mozambique
Authors: Constâncio Augusto Machanguana, Luís Miguel Estevão Cristóvão
Abstract:
In Mozambique, over 80% of the rural population relies on agriculture, livestock, and silviculture for their livelihoods. Unfortunately, these communities face persistent food shortages, which are exacerbated by natural disasters and post-harvest losses due to inadequate storage facilities. Addressing post-harvest loss is critical not only for ensuring food security but also for preventing financial hardships faced by farmers. The study delves into the perceptions of beneficiary communities regarding the construction of three food dryer models made from metal, wood, and clay brick. These solar dryers are part of the project titled ‘Solar Dryer Integrated with Natural Rocks as Energy Storage for Drying Fruits and Vegetables in Mozambique.’ The overarching goal is to enhance food availability beyond the typical growing season, particularly for fruits and vegetables, while simultaneously combating hunger. Given the context of climate change impacts on agriculture, this project becomes even more relevant. Structured interviews conducted with 45 members of beneficiary associations in Manica Province—primarily female heads of households—revealed that rural communities are aware of various food drying alternatives. However, reliance on traditional methods often comes at a cost: compromised product quality and reduced shelf life. To address these challenges, the project implemented energy storage solutions like rock-based thermal energy storage for food drying. This result underscores the urgent need to foster innovation and extend these sustainable practices —such as solar dryers integrated with thermal energy-storage systems made of locally abundant and affordable materials— to more local communities, especially those with significant agricultural potential within the country. By taking these actions, we can improve food security and alleviate hunger.Keywords: solar dryer, food security, rural community, small technology
Procedia PDF Downloads 3818035 Participation of Students and Lecturers in Social Networking for Teaching and Learning in Public Universities in Rivers State, Nigeria
Authors: Nkeiruka Queendarline Nwaizugbu
Abstract:
The use of social media and mobile devices has become acceptable in virtually all areas of today’s world. Hence, this study is a survey that was carried out to find out if students and lecturers in public universities in Rivers State use social networking for educational purposes. The sample of the study comprised of 240 students and 99 lecturers from the University of Port Harcourt and the Rivers State University of science and Technology. The study had five research questions, two hypotheses and the instrument for data collection was a 4-point Likert-type rating scale questionnaire. The data was analysed using mean, standard deviation and z-test. The findings gotten from the analysed data shows that students participate in social networking using different types of web applications but they hardly use them for educational purposes. Some recommendations were also made.Keywords: internet access, mobile learning, participation, social media, social networking, technology
Procedia PDF Downloads 426