Search results for: private security
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 4462

Search results for: private security

1882 The Effect of Self and Peer Assessment Activities in Second Language Writing: A Washback Effect Study on the Writing Growth during the Revision Phase in the Writing Process: Learners’ Perspective

Authors: Musbah Abdussayed

Abstract:

The washback effect refers to the influence of assessment on teaching and learning, and this washback effect can either be positive or negative. This study implemented, sequentially, self-assessment (SA) and peer assessment (PA) and examined the washback effect of self and peer assessment (SPA) activities on the writing growth during the revision phase in the writing process. Twenty advanced Arabic as a second language learners from a private school in the USA participated in the study. The participants composed and then revised a short Arabic story as a part of a midterm grade. Qualitative data was collected, analyzed, and synthesized from ten interviews with the learners and from the twenty learners’ post-reflective journals. The findings indicate positive washback effects on the learners’ writing growth. The PA activity enhanced descriptions and meaning, promoted creativity, and improved textual coherence, whereas the SA activity led to detecting editing issues. Furthermore, both SPA activities had washback effects in common, including helping the learners meet the writing genre conventions and developing metacognitive awareness. However, the findings also demonstrate negative washback effects on the learners’ attitudes during the revision phase in the writing process, including bias toward self-evaluation during the SA activity and reluctance to rate peers’ writing performance during the PA activity. The findings suggest that self-and peer assessment activities are essential teaching and learning tools that can be utilized sequentially to help learners tackle multiple writing areas during the revision phase in the writing process.

Keywords: self assessment, peer assessment, washback effect, second language writing, writing process

Procedia PDF Downloads 72
1881 Design and Development of a Computerized Medical Record System for Hospitals in Remote Areas

Authors: Grace Omowunmi Soyebi

Abstract:

A computerized medical record system is a collection of medical information about a person that is stored on a computer. One principal problem of most hospitals in rural areas is using the file management system for keeping records. A lot of time is wasted when a patient visits the hospital, probably in an emergency, and the nurse or attendant has to search through voluminous files before the patient's file can be retrieved; this may cause an unexpected to happen to the patient. This data mining application is to be designed using a structured system analysis and design method which will help in a well-articulated analysis of the existing file management system, feasibility study, and proper documentation of the design and implementation of a computerized medical record system. This computerized system will replace the file management system and help to quickly retrieve a patient's record with increased data security, access clinical records for decision-making, and reduce the time range at which a patient gets attended to.

Keywords: programming, data, software development, innovation

Procedia PDF Downloads 90
1880 Architectural Design Strategies: Enhance Train Station Performance as the Catalyst of Transit Oriented Development in Jakarta, Case Study of Beos Commuter Line Station

Authors: Shinta Ardiana Sari, Dini Puti Angelia

Abstract:

A high number of urban population in Jakarta has been a substantial issue for mobility strategy. Transit Oriented Development (TOD) becomes one of the strategies to improve community livability based on the design of transit place and the system of its context. TOD principle is trying to win over pedestrian motorization habit, makes people would rather transit and travel more than using private vehicle. Train station takes the main role as the catalyst to emerge TOD, in Jakarta this role will be taken by Commuter line and the future MRT. For advancing its development, architectural design perspective is needed to perform evaluation while seeking for the strategies between accessibility transportation modes with convenience and safety for increasing human behavioral intention. This paper discovers design strategy for transit place that appropriates with Jakarta condition use the basic theories of liminal space and transit-oriented development goal. This paper use evidence-based approach with typology method to analyze the present condition of Commuter Line station in Jakarta and precedent of Asian Cities, Tokyo and Seoul, as the secondary sources, and also with numbers of valid questionnaires. Furthermore, the result of this paper aims to the emerging of a transit-oriented community by giving design requirements and suggestion transportation policies preparing for the operational of MRT in the future Jakarta and other similar cities.

Keywords: station design, transit place, transit-oriented development, urban

Procedia PDF Downloads 220
1879 Achieving Quality of Life and Sustainability in Mexican Cities, the Case of the Housing Complex “Villa del Campo”, Tijuana, Mexico

Authors: María de los Ángeles Zárate López, Juan Antonio Pitones Rubio

Abstract:

Quality of life and sustainability in cities are among the most important challenges faced by designers, city planners and urban managers. The Mexican city of Tijuana has a particular dynamic in its demographics which has been accelerated by its border city condition, putting to the test the ability from authorities to provide the population with the necessary services to aspire for a deserving quality of life. In the recent story of Tijuana, we found that the housing policy and the solutions presented by private housing developers have not met the best living conditions for end users by far, thereby adding issues to current social problems which impact the whole metropolitan area, including damage to the natural environment. Therefore this research presents the case study about the situation of a suburban housing development near Tijuana named “Villa del Campo” and exposes the problems of this specific project (originally labelled as a “sustainable” proposal) demonstrating that, once built, the place does not reflect the quality of life that it promised as a project. Currently, this housing development has a number of problematic issues such as the faulty operating conditions of public utilities and serious cases of crime inside the neighborhood. There is no intention to only expose the negative side of this case study, but to explore some alternatives which could help solving the most serious problems at the place, considering possible architectural and landscape interventions within the housing complex to help achieve the optimal conditions of livability and sustainability required by their inhabitants.

Keywords: suburban, housing, quality of life, sustainability, Tijuana, demographics

Procedia PDF Downloads 385
1878 Natural Hazards and Their Costs in Albanian Part of Ohrid Graben

Authors: Mentor Sulollari

Abstract:

Albania, according to (UNU-EHS) United Nations University, Institute for Environment and Human Security studies for 2015, is listed as the number one country in Europe for the possibility to be caught by natural catastrophes. This is conditioned by unstudied human activity, which has seriously damaged the environment. Albanian part of Ohrid graben that lies in Southeast of Albania, is endangered by landslides and floods, as a result of uncontrolled urban development and low level of investment in infrastructure, rugged terrain in its western part and capricious climate caused by global warming. To be dealt with natural disasters, which cause casualties and material damage, it is important to study them in order to anticipate and reduce damages in future. As part of this study is the construction of natural hazards map, which show us where they are distributed, and which are the vulnerable areas. This article will also be dealing with socio-economic and environmental costs of those events and what are the measures to be taken to reduce them.

Keywords: flooding, landslides, natural catastrophes mapping, Pogradec, lake Ohrid, Albanian part of Ohrid graben

Procedia PDF Downloads 298
1877 Mindfulness, Acceptance and Meaning in Life for Adults with Cancer

Authors: Fernanda F. Zimmermann, Beverley Burrell, Jennifer Jordan

Abstract:

Introduction: Supportive care for people affected by cancer is recognised as a priority for research but yet there is little solid evidence of the effectiveness of psychological treatments for those with advanced cancer. The literature suggests that mindfulness-based interventions may be acceptable and beneficial for this population. This study aims to develop a mindfulness intervention to provide emotional support for advanced cancer population. The treatment package includes mindfulness meditation, developing an acceptance attitude and reflections on meaning in life. Methods: This study design is a one-group pre-post test with a mixed methods approach. Participants are recruited through public and private hospitals in Christchurch, NZ. Quantitative measures are the Acceptance and Action Questionnaire-II, Mindful Coping Scale and, the Meaning in Life Questionnaire. Qualitative semi-structured interviews enquire about emotional support before and after the diagnosis, participants’ thoughts about meaning in life, expectations and reflections on the mindfulness training. Qualitative data will be analysed using thematic analysis. Treatment consists of one to one 30 minutes session weekly for 4 weeks using a pre-recorded CD/podcast of the mindfulness training. This research is part of the presenter’s PhD study. Findings: This project is currently underway. The presenter will provide preliminary data on the acceptability of the mindfulness training package being delivered to participants along with the recruitment strategies. We anticipate that this novel treatment used as a self-management tool will reduce psychological distress and enable better coping for patients with advanced cancer.

Keywords: acceptance, cancer, meaning in life, mindfulness

Procedia PDF Downloads 357
1876 Survey on Malware Detection

Authors: Doaa Wael, Naswa Abdelbaky

Abstract:

Malware is malicious software that is built to cause destructive actions and damage information systems and networks. Malware infections increase rapidly, and types of malware have become more sophisticated, which makes the malware detection process more difficult. On the other side, the Internet of Things IoT technology is vulnerable to malware attacks. These IoT devices are always connected to the internet and lack security. This makes them easy for hackers to access. These malware attacks are becoming the go-to attack for hackers. Thus, in order to deal with this challenge, new malware detection techniques are needed. Currently, building a blockchain solution that allows IoT devices to download any file from the internet and to verify/approve whether it is malicious or not is the need of the hour. In recent years, blockchain technology has stood as a solution to everything due to its features like decentralization, persistence, and anonymity. Moreover, using blockchain technology overcomes some difficulties in malware detection and improves the malware detection ratio over-than the techniques that do not utilize blockchain technology. In this paper, we study malware detection models which are based on blockchain technology. Furthermore, we elaborate on the effect of blockchain technology in malware detection, especially in the android environment.

Keywords: malware analysis, blockchain, malware attacks, malware detection approaches

Procedia PDF Downloads 88
1875 A Qualitative Study Examining the Process of EFL Course Design from the Perspectives of Teachers

Authors: Iman Al Khalidi

Abstract:

Recently, English has become the language of globalization and technology. In turn, this has resulted in a seemingly bewildering array of influences and trends in the domain of TESOL curriculum. In light of these changes, higher education has to provide a new and more powerful kind of education. It should prepare students to be more engaged citizens, more capable to solve complex problems at work, and well prepared to lead meaningful life. In response to this, universities, colleges, schools, and departments have to work out in light of the requirements and challenges of the global and technological era. Consequently they have to focus on the adoption of contemporary curriculum which goes in line with the pedagogical shifts from teaching –centered approach to learning centered approach. Ideally, there has been noticeable emphasis on the crucial importance of developing and professionalizing teachers in order to engage them in the process of curriculum development and action research. This is a qualitative study that aims at understanding and exploring the process of designing EFL courses by teachers at the tertiary level from the perspectives of the participants in a professional context in TESOL, Department of English, a private college in Oman. It is a case study that stands on the philosophy of the qualitative approach. It employs multi methods for collecting qualitative data: semi-structured interviews with teachers, focus group discussions with students, and document analysis. The collected data have been analyzed qualitatively by adopting Miles and Huberman's Approach using procedures of reduction, coding, displaying and conclusion drawing and verification.

Keywords: course design, components of course design, case study, data analysis

Procedia PDF Downloads 547
1874 A Qualitative Study Examining the Process of Course Design from the Perspectives of Teachers

Authors: Iman Al Khalidi

Abstract:

Recently, English has become the language of globalization and technology. In turn, this has resulted in a seemingly bewildering array of influences and trends in the domain of TESOL curriculum. In light of these changes, higher education has to provide a new and more powerful kind of education. It should prepare students to be more engaged citizens, more capable to solve complex problems at work, and well prepared to lead a meaningful life. In response to this, universities, colleges, schools, and departments have to work out in light of the requirements and challenges of the global and technological era. Consequently, they have to focus on the adoption of contemporary curriculum which goes in line with the pedagogical shifts from teaching –centered approach to learning centered approach. Ideally, there has been noticeable emphasis on the crucial importance of developing and professionalizing teachers in order to engage them in the process of curriculum development and action research. This is a qualitative study that aims at understanding and exploring the process of designing EFL courses by teachers at the tertiary level from the perspectives of the participants in a professional context in TESOL, Department of English, a private college in Oman. It is a case study that stands on the philosophy of the qualitative approach. It employs multi-methods for collecting qualitative data: semi-structured interviews with teachers, focus group discussions with students, and document analysis. The collected data have been analyzed qualitatively by adopting Miles and Huberman's Approach using procedures of reduction, coding, displaying, and conclusion drawing and verification.

Keywords: course design, components of course design, case study, data analysis

Procedia PDF Downloads 443
1873 Integration of Wireless Sensor Networks and Radio Frequency Identification (RFID): An Assesment

Authors: Arslan Murtaza

Abstract:

RFID (Radio Frequency Identification) and WSN (Wireless sensor network) are two significant wireless technologies that have extensive diversity of applications and provide limitless forthcoming potentials. RFID is used to identify existence and location of objects whereas WSN is used to intellect and monitor the environment. Incorporating RFID with WSN not only provides identity and location of an object but also provides information regarding the condition of the object carrying the sensors enabled RFID tag. It can be widely used in stock management, asset tracking, asset counting, security, military, environmental monitoring and forecasting, healthcare, intelligent home, intelligent transport vehicles, warehouse management, and precision agriculture. This assessment presents a brief introduction of RFID, WSN, and integration of WSN and RFID, and then applications related to both RFID and WSN. This assessment also deliberates status of the projects on RFID technology carried out in different computing group projects to be taken on WSN and RFID technology.

Keywords: wireless sensor network, RFID, embedded sensor, Wi-Fi, Bluetooth, integration, time saving, cost efficient

Procedia PDF Downloads 335
1872 Easily Memorable Strong Password Generation and Retrieval

Authors: Shatadru Das, Natarajan Vijayarangan

Abstract:

In this paper, a system and method for generating and recovering an authorization code has been designed and analyzed. The system creates an authorization code by accepting a base-sentence from a user. Based on the characters present in this base-sentence, the system computes a base-sentence matrix. The system also generates a plurality of patterns. The user can either select the pattern from the multiple patterns suggested by the system or can create his/her own pattern. The system then performs multiplications between the base-sentence matrix and the selected pattern matrix at different stages in the path forward, for obtaining a strong authorization code. In case the user forgets the base sentence, the system has a provision to manage and retrieve 'forgotten authorization code'. This is done by fragmenting the base sentence into different matrices and storing the fragmented matrices into a repository after computing matrix multiplication with a security question-answer approach and with a secret key provided by the user.

Keywords: easy authentication, key retrieval, memorable passwords, strong password generation

Procedia PDF Downloads 402
1871 Organization Culture: Mediator of Information Technology Competence and IT Governance Effectiveness

Authors: Sonny Nyeko, Moses Niwe

Abstract:

Purpose: This research paper examined the mediation effect of organization culture in the relationship between information technology (IT) competence and IT governance effectiveness in Ugandan public universities. The purpose of the research paper is to examine the role of organizational culture in the relationship between IT competence and IT governance effectiveness. Design/methodology/approach: The paper adopted the MedGraph program, Sobel tests and Kenny and Baron Approach for testing the mediation effects. Findings: It is impeccable that IT competence and organization culture are true drivers of IT governance effectiveness in Ugandan public universities. However, organizational culture reveals partial mediation in the IT competence and IT governance effectiveness relationship. Research limitations/implications: The empirical investigation in this research depends profoundly on public universities. Future research in Ugandan private universities could be undertaken to compare results. Practical implications: To effectively achieve IT governance effectiveness, it means senior management requires IT knowledge which is a vital ingredient of IT competence. Moreover, organizations today ought to adopt cultures that are intended to have them competitive in their businesses, with IT operations not in isolation. Originality/value: Spending thousands of dollars on IT resources in advanced institutes of learning necessitates IT control. Preliminary studies in Ugandan public universities have revealed the ineffective utilization of IT resources. Besides, IT governance issues with IT competence and organization culture remain outstanding. Thus, it’s a new study testing the mediating outcome of organization culture in the association between IT competence and IT governance effectiveness in the Ugandan universities.

Keywords: organization culture, IT competence, IT governance, effectiveness, mediating effect, universities, Uganda

Procedia PDF Downloads 141
1870 Travel Delay and Modal Split Analysis: A Case Study

Authors: H. S. Sathish, H. S. Jagadeesh, Skanda Kumar

Abstract:

Journey time and delay study is used to evaluate the quality of service, the travel time and study can also be used to evaluate the quality of traffic movement along the route and to determine the location types and extent of traffic delays. Components of delay are boarding and alighting, issue of tickets, other causes and distance between each stops. This study investigates the total journey time required to travel along the stretch and the influence the delays. The route starts from Kempegowda Bus Station to Yelahanka Satellite Station of Bangalore City. The length of the stretch is 16.5 km. Modal split analysis has been done for this stretch. This stretch has elevated highway connecting to Bangalore International Airport and the extension of metro transit stretch. From the regression analysis of total journey time it is affected by delay due to boarding and alighting moderately, Delay due to issue of tickets affects the journey time to a higher extent. Some of the delay factors affecting significantly the journey time are evident from F-test at 10 percent level of confidence. Along this stretch work trips are more prevalent as indicated by O-D study. Modal shift analysis indicates about 70 percent of commuters are ready to shift from current system to Metro Rail System. Metro Rail System carries maximum number of trips compared to private mode. Hence Metro is a highly viable choice of mode for Bangalore Metropolitan City.

Keywords: delay, journey time, modal choice, regression analysis

Procedia PDF Downloads 498
1869 Integration of Smart Grid Technologies with Smart Phones for Energy Monitoring and Management

Authors: Arjmand Khaliq, Pemra Sohaib

Abstract:

There is increasing trend of use of smart devices in the present age. The growth of computing techniques and advancement in hardware has also brought the use of sensors and smart devices to a high degree during the course of time. So use of smart devices for control, management communication and optimization has become very popular. This paper gives proposed methodology which involves sensing and switching unite for load, two way communications between utility company and smart phones of consumers using cellular techniques and price signaling resulting active participation of user in energy management .The goal of this proposed control methodology is active participation of user in energy management with accommodation of renewable energy resource. This will provide load adjustment according to consumer’s choice, increased security and reliability for consumer, switching of load according to consumer need and monitoring and management of energy.

Keywords: cellular networks, energy management, renewable energy source, smart grid technology

Procedia PDF Downloads 414
1868 Promoting Biofuels in India: Assessing Land Use Shifts Using Econometric Acreage Response Models

Authors: Y. Bhatt, N. Ghosh, N. Tiwari

Abstract:

Acreage response function are modeled taking account of expected harvest prices, weather related variables and other non-price variables allowing for partial adjustment possibility. At the outset, based on the literature on price expectation formation, we explored suitable formulations for estimating the farmer’s expected prices. Assuming that farmers form expectations rationally, the prices of food and biofuel crops are modeled using time-series methods for possible ARCH/GARCH effects to account for volatility. The prices projected on the basis of the models are then inserted to proxy for the expected prices in the acreage response functions. Food crop acreages in different growing states are found sensitive to their prices relative to those of one or more of the biofuel crops considered. The required percentage improvement in food crop yields is worked to offset the acreage loss.

Keywords: acreage response function, biofuel, food security, sustainable development

Procedia PDF Downloads 303
1867 Leave or Remain Silent: A Study of Parents’ Views on Social-Emotional Learning in Chinese Schools

Authors: Pei Wang

Abstract:

The concept of social-emotional learning (SEL) is becoming increasingly popular in both research and practical applications worldwide. However, there is a lack of empirical studies and implementation of SEL in China, particularly from the perspective of parents. This qualitative study examined how Chinese parents perceived SEL, how their views on SEL were shaped, and how these views affected their decisions regarding their children’s education programs. Using the Collaborative for Academic Social and Emotional Learning Interactive Wheel framework and Bronfenbrenner's bioecological theory, the study conducted interviews with eight parents whose children attended public, international, and private schools in China. All collected data were conducted a thematic analysis involving three coding phases. The findings revealed that interviewees perceived SEL as significant to children’s development but held diverse understandings and perspectives on SEL at school depending on the amount and the quality of SEL resources available in their children’s schools. Additionally, parents’ attitudes towards the exam-oriented education system and Chinese culture influenced their views on SEL in school. Nevertheless, their socioeconomic status (SES) was the most significant factor in their perspectives on SEL, which significantly impacted their choices in their children's educational programs. High-SES families had more options to pursue SEL resources by sending their children to international schools or Western countries, while lower middle-class SES families had limited SEL resources in public schools. This highlighted educational inequality in China and emphasized the need for greater attention and investment in SEL programs in Chinese public schools.

Keywords: Chinese, inequality, parent, school, social-emotional learning

Procedia PDF Downloads 67
1866 Localization of Near Field Radio Controlled Unintended Emitting Sources

Authors: Nurbanu Guzey, S. Jagannathan

Abstract:

Locating radio controlled (RC) devices using their unintended emissions has a great interest considering security concerns. Weak nature of these emissions requires near field localization approach since it is hard to detect these signals in far field region of array. Instead of only angle estimation, near field localization also requires range estimation of the source which makes this method more complicated than far field models. Challenges of locating such devices in a near field region and real time environment are analyzed in this paper. An ESPRIT like near field localization scheme is utilized for both angle and range estimation. 1-D search with symmetric subarrays is provided. Two 7 element uniform linear antenna arrays (ULA) are employed for locating RC source. Experiment results of location estimation for one unintended emitting walkie-talkie for different positions are given.

Keywords: localization, angle of arrival (AoA), range estimation, array signal processing, ESPRIT, Uniform Linear Array (ULA)

Procedia PDF Downloads 526
1865 Efficacy of Technology for Successful Learning Experience; Technology Supported Model for Distance Learning: Case Study of Botho University, Botswana

Authors: Ivy Rose Mathew

Abstract:

The purpose of this study is to outline the efficacy of technology and the opportunities it can bring to implement a successful delivery model in Distance Learning. Distance Learning has proliferated over the past few years across the world. Some of the current challenges faced by current students of distance education include lack of motivation, a sense of isolation and a need for greater and improved communication. Hence the author proposes a creative technology supported model for distance learning exactly mirrored on the traditional face to face learning that can be adopted by distance learning providers. This model suggests the usage of a range of technologies and social networking facilities, with the aim of creating a more engaging and sustaining learning environment to help overcome the isolation often noted by distance learners. While discussing the possibilities, the author also highlights the complexity and practical challenges of implementing such a model. Design/methodology/approach: Theoretical issues from previous research related to successful models for distance learning providers will be considered. And also the analysis of a case study from one of the largest private tertiary institution in Botswana, Botho University will be included. This case study illustrates important aspects of the distance learning delivery model and provides insights on how curriculum development is planned, quality assurance is done, and learner support is assured for successful distance learning experience. Research limitations/implications: While some of the aspects of this study may not be applicable to other contexts, a number of new providers of distance learning can adapt the key principles of this delivery model.

Keywords: distance learning, efficacy, learning experience, technology supported model

Procedia PDF Downloads 248
1864 Enhancing Financial Security: Real-Time Anomaly Detection in Financial Transactions Using Machine Learning

Authors: Ali Kazemi

Abstract:

The digital evolution of financial services, while offering unprecedented convenience and accessibility, has also escalated the vulnerabilities to fraudulent activities. In this study, we introduce a distinct approach to real-time anomaly detection in financial transactions, aiming to fortify the defenses of banking and financial institutions against such threats. Utilizing unsupervised machine learning algorithms, specifically autoencoders and isolation forests, our research focuses on identifying irregular patterns indicative of fraud within transactional data, thus enabling immediate action to prevent financial loss. The data we used in this study included the monetary value of each transaction. This is a crucial feature as fraudulent transactions may have distributions of different amounts than legitimate ones, such as timestamps indicating when transactions occurred. Analyzing transactions' temporal patterns can reveal anomalies (e.g., unusual activity in the middle of the night). Also, the sector or category of the merchant where the transaction occurred, such as retail, groceries, online services, etc. Specific categories may be more prone to fraud. Moreover, the type of payment used (e.g., credit, debit, online payment systems). Different payment methods have varying risk levels associated with fraud. This dataset, anonymized to ensure privacy, reflects a wide array of transactions typical of a global banking institution, ranging from small-scale retail purchases to large wire transfers, embodying the diverse nature of potentially fraudulent activities. By engineering features that capture the essence of transactions, including normalized amounts and encoded categorical variables, we tailor our data to enhance model sensitivity to anomalies. The autoencoder model leverages its reconstruction error mechanism to flag transactions that deviate significantly from the learned normal pattern, while the isolation forest identifies anomalies based on their susceptibility to isolation from the dataset's majority. Our experimental results, validated through techniques such as k-fold cross-validation, are evaluated using precision, recall, and the F1 score alongside the area under the receiver operating characteristic (ROC) curve. Our models achieved an F1 score of 0.85 and a ROC AUC of 0.93, indicating high accuracy in detecting fraudulent transactions without excessive false positives. This study contributes to the academic discourse on financial fraud detection and provides a practical framework for banking institutions seeking to implement real-time anomaly detection systems. By demonstrating the effectiveness of unsupervised learning techniques in a real-world context, our research offers a pathway to significantly reduce the incidence of financial fraud, thereby enhancing the security and trustworthiness of digital financial services.

Keywords: anomaly detection, financial fraud, machine learning, autoencoders, isolation forest, transactional data analysis

Procedia PDF Downloads 59
1863 A Model for Adaptive Online Quiz: QCitra

Authors: Rosilah Hassan, Karam Dhafer Mayoof, Norngainy Mohd Tawil, Shamshubaridah Ramlee

Abstract:

Application of adaptive online quiz system and a design are performed in this paper. The purpose of adaptive quiz system is to establish different questions automatically for each student and measure their competence on a definite area of discipline. This model determines students competencies in cases like distant-learning which experience challenges frequently. Questions are specialized to allow clear deductions about student gains; they are able to identify student competencies more effectively. Also, negative effects of questions requiring higher knowledge than competency over student’s morale and self-confidence are dismissed. The advantage of the system in the quiz management requires less total time for measuring and is more flexible. Self sufficiency of the system in terms of repeating, planning and assessment of the measurement process allows itself to be used in the individual education sets. Adaptive quiz technique prevents students from distraction and motivation loss, which is led by the questions with quite lower hardness level than student’s competency.

Keywords: e-learning, adaptive system, security, quiz database

Procedia PDF Downloads 454
1862 The Politicization of Foreign Aid and Its Effect on Afghanistan, 2001-2016

Authors: Narender Banwala

Abstract:

The study critically evaluates that the politics of foreign aid and its effect on Afghanistan. The study argues that dynamics of foreign aid to Afghanistan are not driven solely by the Afghan political, social, and economic realities but much more by the ephemeral political goals of international donor countries. The objective of this paper is to find out the political reality of foreign aid given to Afghanistan in a post 9/11 era. The study analyses the gap between the donor countries' interests and the Afghan government's priorities in aid coordination and management. The aid given to Afghanistan has been accompanied by the political interests of the major powers and therefore violated the core principles of humanitarianism, i.e., humanity, impartiality, neutrality, and independence. This research attempts to explain the areas which are of high priority, extremely vulnerable, and have been a neglected part since 2001. The study focuses on how as a result of politicization, foreign aid could not yield the expected results even after prolong presence of international donors in Afghanistan. Methodologically, the study includes both qualitative and quantitative data, which are collected by interviews with government officials and other government documents.

Keywords: Afganistan, aid, politics, security

Procedia PDF Downloads 127
1861 Optimization of Our Eyes Cooperation as the Counter-Terrorism Strategy in Association of South East Asian Nations

Authors: Chastiti Mediafira Wulolo

Abstract:

Our Eyes is a cooperation pact in the field of intelligence information exchanges initiated by the Indonesian Ministry of Defense, which has been signed by Indonesia, Philippines, Malaysia, Brunei Darussalam, Thailand, and Singapore. This cooperation mostly engages the military acts as a central role, but this pact still requires the involvement of various parties such as police and other linear institution. This paper will use a qualitative content analysis method by doing some deep analyzing the pattern of cooperation itself. As the implementation of translantic counter-terrorism cooperation, this research will address how the role of Our Eyes can be optimized as a form of government’s response towards the contemporary threat in the Dynamics of Strategic Environmental Security in the Asia Pacific Region. Optimizing the role of this cooperation will also acquire from the previous counter-terrorism cooperation in ASEAN region, so it expects that Our Eyes collaboration can be the most effective cooperation in overcoming terrorism issues in ASEAN, eventually in Asia Pacific.

Keywords: our eyes, Defense Ministry of Indonesia, ASEAN, counter-terrorism

Procedia PDF Downloads 186
1860 Human Motion Capture: New Innovations in the Field of Computer Vision

Authors: Najm Alotaibi

Abstract:

Human motion capture has become one of the major area of interest in the field of computer vision. Some of the major application areas that have been rapidly evolving include the advanced human interfaces, virtual reality and security/surveillance systems. This study provides a brief overview of the techniques and applications used for the markerless human motion capture, which deals with analyzing the human motion in the form of mathematical formulations. The major contribution of this research is that it classifies the computer vision based techniques of human motion capture based on the taxonomy, and then breaks its down into four systematically different categories of tracking, initialization, pose estimation and recognition. The detailed descriptions and the relationships descriptions are given for the techniques of tracking and pose estimation. The subcategories of each process are further described. Various hypotheses have been used by the researchers in this domain are surveyed and the evolution of these techniques have been explained. It has been concluded in the survey that most researchers have focused on using the mathematical body models for the markerless motion capture.

Keywords: human motion capture, computer vision, vision-based, tracking

Procedia PDF Downloads 322
1859 The Study of Customer Satisfaction towards the Services of Baan Bueng Resort in Nongprue Subdistrict, Baanlamung District, Chonburi Province

Authors: Witthaya Mekhum, Jinjutha Srihera

Abstract:

This research aims to study customer satisfaction towards the services of Baan Bueng Resort in Nongprue Subdistrict, Baanlamung District, Chonburi Province. 108 sample were drawn by random sampling from Thai and foreign tourists at Baan Bueng Resort. Questionnaires were distributed. Data were analyzed using frequency, percentage, mean (X) and standard deviation (S.D.). The tool used in this research was questionnaire on satisfaction towards the services of Baan Bueng Resort in Nongprue Subdistrict, Baanlamung District, Chonburi Province. The questionnaire can be divided into 3 parts; i.e. Part 1: General information i.e. gender, age, educational level, occupation, income, and nationality, Part 2: Customer satisfaction towards the services of Baan Bueng Resort; and Part 3: Suggestions of respondents. It can be concluded that most of the respondents are male, aged between 25 – 35 years old with bachelor degree. Most of them are private company employees with income 10,000–20,000 Baht per month. The majority of customers are satisfied with the services at Baan Beung Resort. Overall satisfaction is at good level. Considering each item, the item with the highest satisfaction level is personality and manner of employees and promptness and accuracy of cashier staff. Overall satisfaction towards the cleanliness of the rooms is at very good level. When considering each item, the item with the highest satisfaction level is that the guest room is cleaned everyday, while the satisfaction towards the quality of food and beverages at Baan Bueng Resort in Nongprue Subdistrict, Baanlamung District, Chonburi Province is at very good level. The item with the highest satisfaction is hotel facilities.

Keywords: satisfaction study, service, hotel, customer

Procedia PDF Downloads 332
1858 Impact of Teacher’s Behavior in Class Room on Socialization and Mental Health of School Children: A Student’s Perspective

Authors: Umaiza Bashir, Ushna Farukh

Abstract:

The present study examined the perspective of school students regarding teacher’s behavioral pattern during a teaching in classroom and its influence on the students’ socialization particularly forming peer relationships with the development of emotional, behavioral problems in school children. To study these dimension of teacher-student classroom relationship, 210 school children (105 girls and 105 boys) within the age range of 14 to 18 years were taken from the government, private schools. The cross-sectional research design was used in which stratified random sampling was done. Teacher-student interaction scale was used to assess the teacher-student relationship in the classroom, which had two factors such as positive and negative interaction. Peer relationship scale was administered to investigate the socialization of students, and School Children Problem Scale was also given to the participants to explore their emotional, behavioral issues. The analysis of Pearson correlation showed that there is a significant positive relationship between negative teacher-student interaction and student’s emotional-behavioral as well as social problems. Another analysis of t-test revealed that boys perceived more positive interaction with teachers than girls (p < 0.01). Girls showed more emotional behavioral problems than boys (p < 0.001) Linear regression explained that age, gender, negative teacher’s interaction with students and victimization in social gathering predicts mental health problems in school children. This study suggests and highlights the need for the school counselors for the better mental health of students and teachers.

Keywords: teacher-student interaction, school psychology, student’s emotional behavioral problems

Procedia PDF Downloads 171
1857 Depression and Associated Factors among Adolescent Females in Riyadh, Kingdom of Saudi Arabia: A Cross‑Sectional Study

Authors: Hafsa Raheel

Abstract:

Background: Adolescents who suffer from depression early in life, have an increase in suicidal tendency, anxiety, conduct disorders, substance abuse, and continue to be depressed, later on in life. This study was conducted to identify the prevalence and correlates of depression among adolescent girls in Riyadh city in order to carry out early intervention. Methods: A cross‑sectional, school‑based survey was conducted among 1028 adolescent girls aged 15–19 years in secondary schools of Riyadh city. Riyadh was divided into clusters and within each cluster, both public and private schools were enrolled. From the selected schools students from grade 10–12 were surveyed. Survey was conducted using a structured questionnaire including the beck depression inventory‑II, and questions exploring the correlates of depression. Results: About 30% of participants were found to be depressed. Depression was more prevalent among female adolescents whose household income was inferior to 12,000 Saudi Riyal/month (odds ratio [OR] 2.17, confidence interval [CI] 0.97–6.84), did not have a good relationship with peers and family members (OR 4.63, CI 2.56–8.41), lived with single parent or alone (OR 1.77, CI 0.97–3.23), had been emotionally abused (OR 3.45, CI 2.56–8.41), and those who had been subjected to physical violence at least once (OR 3.34, CI 1.89–5.91). Conclusions: Strategies need to be developed to identify early signs and symptoms of depression among Saudi female adolescents. Training can be given to groups of students to help their peers, and also to the teachers to identify, and help students identify early signs of depression and provide them with better‑coping strategies to combat progression of depression and anxiety among such adolescents.

Keywords: adolescents, depression, Saudi Arabia, mental health

Procedia PDF Downloads 304
1856 Assessing of Social Comfort of the Russian Population with Big Data

Authors: Marina Shakleina, Konstantin Shaklein, Stanislav Yakiro

Abstract:

The digitalization of modern human life over the last decade has facilitated the acquisition, storage, and processing of data, which are used to detect changes in consumer preferences and to improve the internal efficiency of the production process. This emerging trend has attracted academic interest in the use of big data in research. The study focuses on modeling the social comfort of the Russian population for the period 2010-2021 using big data. Big data provides enormous opportunities for understanding human interactions at the scale of society with plenty of space and time dynamics. One of the most popular big data sources is Google Trends. The methodology for assessing social comfort using big data involves several steps: 1. 574 words were selected based on the Harvard IV-4 Dictionary adjusted to fit the reality of everyday Russian life. The set of keywords was further cleansed by excluding queries consisting of verbs and words with several lexical meanings. 2. Search queries were processed to ensure comparability of results: the transformation of data to a 10-point scale, elimination of popularity peaks, detrending, and deseasoning. The proposed methodology for keyword search and Google Trends processing was implemented in the form of a script in the Python programming language. 3. Block and summary integral indicators of social comfort were constructed using the first modified principal component resulting in weighting coefficients values of block components. According to the study, social comfort is described by 12 blocks: ‘health’, ‘education’, ‘social support’, ‘financial situation’, ‘employment’, ‘housing’, ‘ethical norms’, ‘security’, ‘political stability’, ‘leisure’, ‘environment’, ‘infrastructure’. According to the model, the summary integral indicator increased by 54% and was 4.631 points; the average annual rate was 3.6%, which is higher than the rate of economic growth by 2.7 p.p. The value of the indicator describing social comfort in Russia is determined by 26% by ‘social support’, 24% by ‘education’, 12% by ‘infrastructure’, 10% by ‘leisure’, and the remaining 28% by others. Among 25% of the most popular searches, 85% are of negative nature and are mainly related to the blocks ‘security’, ‘political stability’, ‘health’, for example, ‘crime rate’, ‘vulnerability’. Among the 25% most unpopular queries, 99% of the queries were positive and mostly related to the blocks ‘ethical norms’, ‘education’, ‘employment’, for example, ‘social package’, ‘recycling’. In conclusion, the introduction of the latent category ‘social comfort’ into the scientific vocabulary deepens the theory of the quality of life of the population in terms of the study of the involvement of an individual in the society and expanding the subjective aspect of the measurements of various indicators. Integral assessment of social comfort demonstrates the overall picture of the development of the phenomenon over time and space and quantitatively evaluates ongoing socio-economic policy. The application of big data in the assessment of latent categories gives stable results, which opens up possibilities for their practical implementation.

Keywords: big data, Google trends, integral indicator, social comfort

Procedia PDF Downloads 203
1855 Improving Cyber Resilience in Mobile Field Hospitals: Towards an Assessment Model

Authors: Nasir Baba Ahmed, Nicolas Daclin, Marc Olivaux, Gilles Dusserre

Abstract:

The Mobile field hospital is critical in terms of managing emergencies in crisis. It is a sub-section of the main hospitals and the health sector, tasked with delivering responsive, immediate, and efficient medical services during a crisis. With the aim to prevent further crisis, the assessment of the cyber assets follows different methods, to distinguish its strengths and weaknesses, and in turn achieve cyber resiliency. The work focuses on assessments of cyber resilience in field hospitals with trends growing in both the field hospital and the health sector in general. This creates opportunities for the adverse attackers and the response improvement objectives for attaining cyber resilience, as the assessments allow users and stakeholders to know the level of risks with regards to its cyber assets. Thus, the purpose is to show the possible threat vectors which open up opportunities, with contrast to current trends in the assessment of the mobile field hospitals’ cyber assets.

Keywords: assessment framework, cyber resilience, cyber security, mobile field hospital

Procedia PDF Downloads 161
1854 Nutrition and Food Safety as Strategic Assets

Authors: Daniel C. S. Lim, W. Y. Tan

Abstract:

The world is facing a growing food crisis. The concerns of food nutritional value, food safety and food security are becoming increasingly real. There is also a direct relationship to the risk of diseases, particularly chronic diseases, to the food we consume. So, there are increasing concerns about the modern day food ecosystem creating foods that can provide the nutritional components for organ function sustenance, as well as, taking a serious view on diet-related diseases. This paper addresses some of the above concerns and gives an overview of the current global situation relating to food nutrition and safety. The paper reviews nutritional aspects of food today compared to those of the last century, compares whole foods found in supermarkets versus those organically grown, as well as population behaviour towards food choices. It provides scientific insights into the effects of some of the global trends such as climate change and other changes environmental changes, and presents what individuals and corporations are doing to use the latest nutritional technologies as strategic assets. Finally, it briefly highlights some of the innovative solutions that are being applied to address several of the above concerns.

Keywords: food crisis, food safety, global trends, nutritional aspects

Procedia PDF Downloads 389
1853 An Attack on the Lucas Based El-Gamal Cryptosystem in the Elliptic Curve Group Over Finite Field Using Greater Common Divisor

Authors: Lee Feng Koo, Tze Jin Wong, Pang Hung Yiu, Nik Mohd Asri Nik Long

Abstract:

Greater common divisor (GCD) attack is an attack that relies on the polynomial structure of the cryptosystem. This attack required two plaintexts differ from a fixed number and encrypted under same modulus. This paper reports a security reaction of Lucas Based El-Gamal Cryptosystem in the Elliptic Curve group over finite field under GCD attack. Lucas Based El-Gamal Cryptosystem in the Elliptic Curve group over finite field was exposed mathematically to the GCD attack using GCD and Dickson polynomial. The result shows that the cryptanalyst is able to get the plaintext without decryption by using GCD attack. Thus, the study concluded that it is highly perilous when two plaintexts have a slight difference from a fixed number in the same Elliptic curve group over finite field.

Keywords: decryption, encryption, elliptic curve, greater common divisor

Procedia PDF Downloads 256