Doubtlessly, the term "human rights" has become a world language in the 21st century. China has written "The state respects and protects human rights" into its constitution, thus opening up a new period of constit...Doubtlessly, the term "human rights" has become a world language in the 21st century. China has written "The state respects and protects human rights" into its constitution, thus opening up a new period of constitutional construction and human rights cause. This great term "human rights" does not only contain specific rights that can be put into practice but also carry dignity, equality, freedom and other value systems and moral requirements.展开更多
In most developing countries, governments attempt to enforce the movement from analogue to digital for all their sectors, from public to private. These technological advancements have been noted to bring necessary and...In most developing countries, governments attempt to enforce the movement from analogue to digital for all their sectors, from public to private. These technological advancements have been noted to bring necessary and unavoidable changes to businesses and learning environments. Higher learning institutions have adopted various e-learning systems to support learning, research, and publication activities to stay competitive in global academic systems. However, most public higher learning institutions in Tanzania lag behind in the adoption of these systems. Thus, research shows a failure of these institutions in utilising the full benefit that today’s Information and Communication Technology (ICT) can offer in learning environments. Thus, this study examines factors affecting the adoption of such a system in developing countries like Tanzania, taking the Institute of Accountancy Arusha (IAA) as a case study. The study used a mixed methodology where thematic and descriptive analysis was used to analyse both qualitative and quantitative research data. The study population was 187 teaching staff, a sample size of 126 was obtained, and 157 study participants were involved in the study. The study found that factors affecting the adoption of e-learning systems in public higher learning institutions in Tanzania include lack of ICT infrastructure, lack of technical and managerial support and lack of computers and e-learning knowledge among facilitators. Thus, the study recommended investments in adequate and reliable ICT facilities, high intermate speed and bandwidth, and policies that support e-learning and training programs about e-learning knowledge and use. Also, this study recommends the use of the Multi-Factors Adoption Model (MFAM11) for the successful adoption of an e-learning system in public higher learning institutions in Tanzania.展开更多
With the great changes in China's economic mechanism, the present running modes of equipment management at most institutions of higher learning are becoming less and less effective and efficient. Being fully aware...With the great changes in China's economic mechanism, the present running modes of equipment management at most institutions of higher learning are becoming less and less effective and efficient. Being fully aware of the common problems and their characteristics, this paper proposes a new running mode which aims at these problems' permanent resolution. It involves (1) Systems such as renting, competition and paid services are to be introduced to the campus, in order to effectively associate duty with interest. (2) The present managerial pattern is to be replaced by a new running network, in which all the links cooperate with as well as restrain each other. Such a mode focuses on the “two mechanisms and four patterns,”that is, to rely on the stimulative mechanism and restraint mechanism, and to enforce such patterns as centralized management and application centralized management and common application, opening to public use, and renting and borrowing. Through persistent exploration of the inner potential of the institutions, the ratio of investment and economic efficiency will accordingly be elevated.展开更多
With the continuous development of national‘reforms and opening-up’policy and development of economic globalization,learning and application of foreign languages are becoming increasingly important.Society needs a l...With the continuous development of national‘reforms and opening-up’policy and development of economic globalization,learning and application of foreign languages are becoming increasingly important.Society needs a large number of professional linguistic workers.Therefore,there are higher requirements for new era higher learning institutes which serve as training base for cultivating linguistic talents.Linguistic talents must possess very strong overall quality and skill to meet these requirements.In this context,this study carried out an in-depth analysis and research on translation method commonly used in German language teaching,and communicative method which is increasingly popular in recent years,to contribute to cultivation of German linguistic talents in higher learning institutes of China.展开更多
Libraries in China's higher education institutions have been developing in keeping pace with the flourishing development of China's higher education. This article aims to make an introduction to the constructi...Libraries in China's higher education institutions have been developing in keeping pace with the flourishing development of China's higher education. This article aims to make an introduction to the construction of China's higher education libraries, especially the recent three decades' achievements since China's reform and opening-up in 1978. In this article, the authors draw a general picture of the development of libraries in China's higher education institutions, covering such eight aspects as management, types and positioning,organizational structure and personnel, expenditure and buildings, reader service, building and sharing of resources as well as automation system.展开更多
In the wake of increased cybercrime against insufficient cybersecurity professionals, there is an urgent need to bridge the skill-gap. The demand for skilled and experienced (approximately 40,000 to 50,000) cybersecur...In the wake of increased cybercrime against insufficient cybersecurity professionals, there is an urgent need to bridge the skill-gap. The demand for skilled and experienced (approximately 40,000 to 50,000) cybersecurity professionals in Kenya is soaring all-time high. This demand is against the available 1700 certified professionals. Therefore, this paper seeks to bring to fore interventions put in place to address the skill gap through curriculum interventions. In order to get a clear understanding, the paper sought to determine the status of cybersecurity skill gap in Kenya and what universities are doing to address the gap. The paper also sought to propose the way forward to close the skill gap. This is a seminal review paper in the field of cybersecurity in Kenya focusing on institutions of higher learning and the interventions to address the cybersecurity skill gap. This research is significant to the general institutions of higher learning in both private and public universities. Results show that the cybersecurity skill gap is very high in Kenya. Interventions being offered by universities include partnerships with private cybersecurity organizations, offering cybersecurity certification training hackathons, and degree programs. However, it was established that only 13.2% of registered universities that offer cybersecurity degree programs in Kenya. The paper therefore strongly recommends launch of cybersecurity programs at the levels of undergraduate and graduate in many universities. This can therefore be augmented with other interventions such as certifications, hackathons and partnerships. Further research can be conducted to establish factors affecting the launch of cybersecurity programs in institutions of higher learning in Kenya. A further research can also be conducted to determine the effect of supplementary cybersecurity trainings such as hackathons and certifications.展开更多
As higher education institutions(HEIs)go online,several benefits are attained,and also it is vulnerable to several kinds of attacks.To accomplish security,this paper presents artificial intelligence based cybersecurit...As higher education institutions(HEIs)go online,several benefits are attained,and also it is vulnerable to several kinds of attacks.To accomplish security,this paper presents artificial intelligence based cybersecurity intrusion detection models to accomplish security.The incorporation of the strategies into business is a tendency among several distinct industries,comprising education,have recognized as game changer.Consequently,the HEIs are highly related to the requirement and knowledge of the learner,making the education procedure highly effective.Thus,artificial intelligence(AI)and machine learning(ML)models have shown significant interest in HEIs.This study designs a novel Artificial Intelligence based Cybersecurity Intrusion Detection Model for Higher Education Institutions named AICIDHEI technique.The goal of the AICID-HEI technique is to determine the occurrence of distinct kinds of intrusions in higher education institutes.The AICID-HEI technique encompassesmin-max normalization approach to preprocess the data.Besides,the AICID-HEI technique involves the design of improved differential evolution algorithm based feature selection(IDEA-FS)technique is applied to choose the feature subsets.Moreover,the bidirectional long short-term memory(BiLSTM)model is utilized for the detection and classification of intrusions in the network.Furthermore,the Adam optimizer is applied for hyperparameter tuning to properly adjust the hyperparameters in higher educational institutions.In order to validate the experimental results of the proposed AICID-HEI technique,the simulation results of the AICIDHEI technique take place by the use of benchmark dataset.The experimental results reported the betterment of the AICID-HEI technique over the other methods interms of different measures.展开更多
Education 4.0 is being authorized more and more by the design of artificial intelligence(AI)techniques.Higher education institutions(HEI)have started to utilize Internet technologies to improve the quality of the serv...Education 4.0 is being authorized more and more by the design of artificial intelligence(AI)techniques.Higher education institutions(HEI)have started to utilize Internet technologies to improve the quality of the service and boost knowledge.Due to the unavailability of information technology(IT)infrastructures,HEI is vulnerable to cyberattacks.Biometric authentication can be used to authenticate a person based on biological features such as face,fingerprint,iris,and so on.This study designs a novel search and rescue optimization with deep learning based learning authentication technique for cybersecurity in higher education institutions,named SRODLLAC technique.The proposed SRODL-LAC technique aims to authenticate the learner/student in HEI using fingerprint biometrics.Besides,the SRODLLACtechnique designs a median filtering(MF)based preprocessing approach to improving the quality of the image.In addition,the Densely Connected Networks(DenseNet-77)model is applied for the extraction of features.Moreover,search and rescue optimization(SRO)algorithm with deep neural network(DNN)model is utilized for the classification process.Lastly,template matching process is done for fingerprint identification.A wide range of simulation analyses is carried out and the results are inspected under several aspects.The experimental results reported the effective performance of the SRODL-LAC technique over the other methodologies.展开更多
Education acts as an important part of economic growth and improvement in human welfare.The educational sectors have transformed a lot in recent days,and Information and Communication Technology(ICT)is an effective pa...Education acts as an important part of economic growth and improvement in human welfare.The educational sectors have transformed a lot in recent days,and Information and Communication Technology(ICT)is an effective part of the education field.Almost every action in university and college,right from the process fromcounselling to admissions and fee deposits has been automated.Attendance records,quiz,evaluation,mark,and grade submissions involved the utilization of the ICT.Therefore,security is essential to accomplish cybersecurity in higher security institutions(HEIs).In this view,this study develops an Automated Outlier Detection for CyberSecurity in Higher Education Institutions(AOD-CSHEI)technique.The AOD-CSHEI technique intends to determine the presence of intrusions or attacks in the HEIs.The AOD-CSHEI technique initially performs data pre-processing in two stages namely data conversion and class labelling.In addition,the Adaptive Synthetic(ADASYN)technique is exploited for the removal of outliers in the data.Besides,the sparrow search algorithm(SSA)with deep neural network(DNN)model is used for the classification of data into the existence or absence of intrusions in the HEIs network.Finally,the SSA is utilized to effectually adjust the hyper parameters of the DNN approach.In order to showcase the enhanced performance of the AOD-CSHEI technique,a set of simulations take place on three benchmark datasets and the results reported the enhanced efficiency of the AOD-CSHEI technique over its compared methods with higher accuracy of 0.9997.展开更多
文摘Doubtlessly, the term "human rights" has become a world language in the 21st century. China has written "The state respects and protects human rights" into its constitution, thus opening up a new period of constitutional construction and human rights cause. This great term "human rights" does not only contain specific rights that can be put into practice but also carry dignity, equality, freedom and other value systems and moral requirements.
文摘In most developing countries, governments attempt to enforce the movement from analogue to digital for all their sectors, from public to private. These technological advancements have been noted to bring necessary and unavoidable changes to businesses and learning environments. Higher learning institutions have adopted various e-learning systems to support learning, research, and publication activities to stay competitive in global academic systems. However, most public higher learning institutions in Tanzania lag behind in the adoption of these systems. Thus, research shows a failure of these institutions in utilising the full benefit that today’s Information and Communication Technology (ICT) can offer in learning environments. Thus, this study examines factors affecting the adoption of such a system in developing countries like Tanzania, taking the Institute of Accountancy Arusha (IAA) as a case study. The study used a mixed methodology where thematic and descriptive analysis was used to analyse both qualitative and quantitative research data. The study population was 187 teaching staff, a sample size of 126 was obtained, and 157 study participants were involved in the study. The study found that factors affecting the adoption of e-learning systems in public higher learning institutions in Tanzania include lack of ICT infrastructure, lack of technical and managerial support and lack of computers and e-learning knowledge among facilitators. Thus, the study recommended investments in adequate and reliable ICT facilities, high intermate speed and bandwidth, and policies that support e-learning and training programs about e-learning knowledge and use. Also, this study recommends the use of the Multi-Factors Adoption Model (MFAM11) for the successful adoption of an e-learning system in public higher learning institutions in Tanzania.
文摘With the great changes in China's economic mechanism, the present running modes of equipment management at most institutions of higher learning are becoming less and less effective and efficient. Being fully aware of the common problems and their characteristics, this paper proposes a new running mode which aims at these problems' permanent resolution. It involves (1) Systems such as renting, competition and paid services are to be introduced to the campus, in order to effectively associate duty with interest. (2) The present managerial pattern is to be replaced by a new running network, in which all the links cooperate with as well as restrain each other. Such a mode focuses on the “two mechanisms and four patterns,”that is, to rely on the stimulative mechanism and restraint mechanism, and to enforce such patterns as centralized management and application centralized management and common application, opening to public use, and renting and borrowing. Through persistent exploration of the inner potential of the institutions, the ratio of investment and economic efficiency will accordingly be elevated.
文摘With the continuous development of national‘reforms and opening-up’policy and development of economic globalization,learning and application of foreign languages are becoming increasingly important.Society needs a large number of professional linguistic workers.Therefore,there are higher requirements for new era higher learning institutes which serve as training base for cultivating linguistic talents.Linguistic talents must possess very strong overall quality and skill to meet these requirements.In this context,this study carried out an in-depth analysis and research on translation method commonly used in German language teaching,and communicative method which is increasingly popular in recent years,to contribute to cultivation of German linguistic talents in higher learning institutes of China.
基金supported by the National Planning Office of Philosophy and Social Science(Grant No.04BTQ002)
文摘Libraries in China's higher education institutions have been developing in keeping pace with the flourishing development of China's higher education. This article aims to make an introduction to the construction of China's higher education libraries, especially the recent three decades' achievements since China's reform and opening-up in 1978. In this article, the authors draw a general picture of the development of libraries in China's higher education institutions, covering such eight aspects as management, types and positioning,organizational structure and personnel, expenditure and buildings, reader service, building and sharing of resources as well as automation system.
文摘In the wake of increased cybercrime against insufficient cybersecurity professionals, there is an urgent need to bridge the skill-gap. The demand for skilled and experienced (approximately 40,000 to 50,000) cybersecurity professionals in Kenya is soaring all-time high. This demand is against the available 1700 certified professionals. Therefore, this paper seeks to bring to fore interventions put in place to address the skill gap through curriculum interventions. In order to get a clear understanding, the paper sought to determine the status of cybersecurity skill gap in Kenya and what universities are doing to address the gap. The paper also sought to propose the way forward to close the skill gap. This is a seminal review paper in the field of cybersecurity in Kenya focusing on institutions of higher learning and the interventions to address the cybersecurity skill gap. This research is significant to the general institutions of higher learning in both private and public universities. Results show that the cybersecurity skill gap is very high in Kenya. Interventions being offered by universities include partnerships with private cybersecurity organizations, offering cybersecurity certification training hackathons, and degree programs. However, it was established that only 13.2% of registered universities that offer cybersecurity degree programs in Kenya. The paper therefore strongly recommends launch of cybersecurity programs at the levels of undergraduate and graduate in many universities. This can therefore be augmented with other interventions such as certifications, hackathons and partnerships. Further research can be conducted to establish factors affecting the launch of cybersecurity programs in institutions of higher learning in Kenya. A further research can also be conducted to determine the effect of supplementary cybersecurity trainings such as hackathons and certifications.
基金The authors extend their appreciation to the Deputyship for Research&Innovation,Ministry of Education in Saudi Arabia for funding this research work through the Project Number(IFPRC-154-611-2020)and King Abdulaziz University,DSR,Jeddah,Saudi Arabia.
文摘As higher education institutions(HEIs)go online,several benefits are attained,and also it is vulnerable to several kinds of attacks.To accomplish security,this paper presents artificial intelligence based cybersecurity intrusion detection models to accomplish security.The incorporation of the strategies into business is a tendency among several distinct industries,comprising education,have recognized as game changer.Consequently,the HEIs are highly related to the requirement and knowledge of the learner,making the education procedure highly effective.Thus,artificial intelligence(AI)and machine learning(ML)models have shown significant interest in HEIs.This study designs a novel Artificial Intelligence based Cybersecurity Intrusion Detection Model for Higher Education Institutions named AICIDHEI technique.The goal of the AICID-HEI technique is to determine the occurrence of distinct kinds of intrusions in higher education institutes.The AICID-HEI technique encompassesmin-max normalization approach to preprocess the data.Besides,the AICID-HEI technique involves the design of improved differential evolution algorithm based feature selection(IDEA-FS)technique is applied to choose the feature subsets.Moreover,the bidirectional long short-term memory(BiLSTM)model is utilized for the detection and classification of intrusions in the network.Furthermore,the Adam optimizer is applied for hyperparameter tuning to properly adjust the hyperparameters in higher educational institutions.In order to validate the experimental results of the proposed AICID-HEI technique,the simulation results of the AICIDHEI technique take place by the use of benchmark dataset.The experimental results reported the betterment of the AICID-HEI technique over the other methods interms of different measures.
基金The authors extend their appreciation to the Deputyship for Research&Innovation,Ministry of Education in Saudi Arabia for funding this research work through the project number(IFPRC-154-611-2020)and King Abdulaziz University,DSR,Jeddah,Saudi Arabia.
文摘Education 4.0 is being authorized more and more by the design of artificial intelligence(AI)techniques.Higher education institutions(HEI)have started to utilize Internet technologies to improve the quality of the service and boost knowledge.Due to the unavailability of information technology(IT)infrastructures,HEI is vulnerable to cyberattacks.Biometric authentication can be used to authenticate a person based on biological features such as face,fingerprint,iris,and so on.This study designs a novel search and rescue optimization with deep learning based learning authentication technique for cybersecurity in higher education institutions,named SRODLLAC technique.The proposed SRODL-LAC technique aims to authenticate the learner/student in HEI using fingerprint biometrics.Besides,the SRODLLACtechnique designs a median filtering(MF)based preprocessing approach to improving the quality of the image.In addition,the Densely Connected Networks(DenseNet-77)model is applied for the extraction of features.Moreover,search and rescue optimization(SRO)algorithm with deep neural network(DNN)model is utilized for the classification process.Lastly,template matching process is done for fingerprint identification.A wide range of simulation analyses is carried out and the results are inspected under several aspects.The experimental results reported the effective performance of the SRODL-LAC technique over the other methodologies.
基金The authors extend their appreciation to the Deputyship for Research&Innovation,Ministry of Education in Saudi Arabia for funding this research work through the project number(IFPRC-154-611-2020)and King Abdulaziz University,DSR,Jeddah,Saudi Arabia.
文摘Education acts as an important part of economic growth and improvement in human welfare.The educational sectors have transformed a lot in recent days,and Information and Communication Technology(ICT)is an effective part of the education field.Almost every action in university and college,right from the process fromcounselling to admissions and fee deposits has been automated.Attendance records,quiz,evaluation,mark,and grade submissions involved the utilization of the ICT.Therefore,security is essential to accomplish cybersecurity in higher security institutions(HEIs).In this view,this study develops an Automated Outlier Detection for CyberSecurity in Higher Education Institutions(AOD-CSHEI)technique.The AOD-CSHEI technique intends to determine the presence of intrusions or attacks in the HEIs.The AOD-CSHEI technique initially performs data pre-processing in two stages namely data conversion and class labelling.In addition,the Adaptive Synthetic(ADASYN)technique is exploited for the removal of outliers in the data.Besides,the sparrow search algorithm(SSA)with deep neural network(DNN)model is used for the classification of data into the existence or absence of intrusions in the HEIs network.Finally,the SSA is utilized to effectually adjust the hyper parameters of the DNN approach.In order to showcase the enhanced performance of the AOD-CSHEI technique,a set of simulations take place on three benchmark datasets and the results reported the enhanced efficiency of the AOD-CSHEI technique over its compared methods with higher accuracy of 0.9997.