Search results for: identity based encryption
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 28593

Search results for: identity based encryption

28323 Bitplanes Image Encryption/Decryption Using Edge Map (SSPCE Method) and Arnold Transform

Authors: Ali A. Ukasha

Abstract:

Data security needed in data transmission, storage, and communication to ensure the security. The single step parallel contour extraction (SSPCE) method is used to create the edge map as a key image from the different Gray level/Binary image. Performing the X-OR operation between the key image and each bit plane of the original image for image pixel values change purpose. The Arnold transform used to changes the locations of image pixels as image scrambling process. Experiments have demonstrated that proposed algorithm can fully encrypt 2D Gary level image and completely reconstructed without any distortion. Also shown that the analyzed algorithm have extremely large security against some attacks like salt & pepper and JPEG compression. Its proof that the Gray level image can be protected with a higher security level. The presented method has easy hardware implementation and suitable for multimedia protection in real time applications such as wireless networks and mobile phone services.

Keywords: SSPCE method, image compression, salt and peppers attacks, bitplanes decomposition, Arnold transform, lossless image encryption

Procedia PDF Downloads 465
28322 Acculturation and Urban Related Identity of Turk and Kurd Internal Migrants

Authors: Melek Göregenli, Pelin Karakuş

Abstract:

This present study explored the acculturation strategies and urban related identity of Turk and Kurd internal migrants from different regions of Turkey who resettled in three big cities in the west. Besides we aimed at a comparative analysis of acculturation strategies and urban-related identity of voluntary and internally displaced Kurd migrants. Particularly we explored the role of migration type, satisfaction with migration decision, urban-related identity and several socio demographic variables as predictors of Kurds’ integration strategy preference. The sample consisted of 412 adult participants from Izmir (64 females, 86 males); Ankara (76 females, 75 males); and Istanbul (43 females, 64 males and four unreported). In terms of acculturation strategies, assimilation was found to be the most preferred acculturation attitude among Turks whereas separation was found to be most endorsed acculturation attitude among Kurds. The migrants in Izmir were found to prefer assimilation whereas the migrants in Ankara prefer separation. Concerning urban-related identity mean scores, Turks reported higher urban-related identity scores than Kurds. Furthermore the internal migrants in Izmir were found to score higher in urban-related identity than the migrants living in Istanbul and Ankara. The results of the regression analysis revealed that gender, length of residence and migration type were the significant predictors of integration preference of Kurds. Thus, whereas gender and migration type had significant negative associations; length of residence had positive significant associations with Kurds integration preference. Compared to female Kurds, male Kurds were found to be more integrated. Furthermore, voluntary Kurd migrants were more favour of integration than internally displaced Kurds. The findings supported the significant associations between acculturation strategies and urban-related identity with either group.

Keywords: acculturation, forced migration, internal displacement, internal migration, Turkey, urban-related identity

Procedia PDF Downloads 342
28321 The Investigation of Women Civil Engineers’ Identity Development through the Lens of Recognition Theory

Authors: Hasan Sungur, Evrim Baran, Benjamin Ahn, Aliye Karabulut Ilgu, Chris Rehmann, Cassandra Rutherford

Abstract:

Engineering identity contributes to the professional and educational persistence of women engineers. A crucial factor contributing to the development of the engineering identity is recognition. Those without adequate recognition often do not succeed in positively building their identities. This research draws on Honneth’s recognition theory to identify factors impacting women civil engineers’ feelings of recognition as civil engineers. A survey was composed and distributed to 330 female alumni who graduated from the Department of Civil, Construction, and Environmental Engineering at Iowa State University in the last ten years. The survey items include demographics, perceptions of the identity of civil engineering, and factors that influence the recognition of civil engineering identities, such as views of society and family. Descriptive analysis of the survey responses revealed that the perceptions of civil engineering varied widely. Participants’ definitions of civil engineering included the terms: construction, design, and infrastructure. Almost half of the participants reported that the major reason to study civil engineering was their interest in the subject matter, and most reported that they were proud to be civil engineers. Many study participants reported that their parents see them as civil engineers. Treatment of institutions and the workplace were also considered as having a significant impact on the recognition of women civil engineers. Almost half of the participants reported that they felt isolated or ignored at work because of their gender. This research emphasizes the importance of recognition for the development of the civil engineering identity of women

Keywords: civil engineering, gender, identity, recognition

Procedia PDF Downloads 222
28320 Identification of Author and Reviewer from Single and Double Blind Paper

Authors: Jatinderkumar R. Saini, Nikita. R. Sonthalia, Khushbu. A. Dodiya

Abstract:

Research leads to development of science and technology and hence to the betterment of humankind. Journals and conferences provide a platform to receive large number of research papers for publications and presentations before the expert and scientific community. In order to assure quality of such papers, they are also sent to reviewers for their comments. In order to maintain good ethical standards, the research papers are sent to reviewers in such a way that they do not know each other’s identity. This technique is called double-blind review process. It is called single-blind review process, if identity of any one party (generally authors) is disclosed to the other. This paper presents the techniques by which identity of author as well as reviewer could be made out even through double-blind review process. It is proposed that the characteristics and techniques presented here will help journals and conferences in assuring intentional or unintentional disclosure of identity revealing information by either party to the other.

Keywords: author, conference, double blind paper, journal, reviewer, single blind paper

Procedia PDF Downloads 332
28319 Secure Cryptographic Operations on SIM Card for Mobile Financial Services

Authors: Kerem Ok, Serafettin Senturk, Serdar Aktas, Cem Cevikbas

Abstract:

Mobile technology is very popular nowadays and it provides a digital world where users can experience many value-added services. Service Providers are also eager to offer diverse value-added services to users such as digital identity, mobile financial services and so on. In this context, the security of data storage in smartphones and the security of communication between the smartphone and service provider are critical for the success of these services. In order to provide the required security functions, the SIM card is one acceptable alternative. Since SIM cards include a Secure Element, they are able to store sensitive data, create cryptographically secure keys, encrypt and decrypt data. In this paper, we design and implement a SIM and a smartphone framework that uses a SIM card for secure key generation, key storage, data encryption, data decryption and digital signing for mobile financial services. Our frameworks show that the SIM card can be used as a controlled Secure Element to provide required security functions for popular e-services such as mobile financial services.

Keywords: SIM card, mobile financial services, cryptography, secure data storage

Procedia PDF Downloads 282
28318 Hui as Religious over Ethnic Identity: A Case Study of Muslim Ethnic Interaction in Central Northwest China

Authors: Hugh Battye

Abstract:

In recent years, Muslim identity in China has strengthened against the backdrop of a worldwide Islamic revival. One discussion arising from this has been focused around the Hui, an ethnicity created by the Communist government in the 1950s covering the Chinese speaking 'Sino-Muslims' as opposed to those with their own language. While the term Hui in Chinese has traditionally meant 'Muslim', the strengthening of Hui identity in recent decades has led to a debate among scholars as to whether this identity is primarily ethnically or religiously driven. This article looks at the case of a mixed ethnic community in rural Gansu Province, Central Northwest China, which not only contains the official Hui ethnicity but also members of the smaller Muslim Salar and Bonan minority groups. In analyzing the close interaction between these groups, the paper will argue that, despite government attempts to promote the Hui as an ethnicity within its modern ethnic paradigm, in rural Gansu and the general region, Hui is still essentially seen as a religious identity. Having provided an overview of the historical evolution of the Hui ethnonym in China and presented the views of some of the important scholars involved in the discussion, the paper will then offer its findings based on participant observation and survey work in Gansu. The results will show that, firstly, for the local Muslims, religious identity clearly dominates ethnic identity. On the ground, the term Hui continues to be used as a catch-all term for Muslims, whether they belong to the official 'Hui' nationality or not, and against this backdrop, the ethnic importance of being 'Hui', 'Bonan' or 'Salar' within the Muslim community itself is by contrast minimal. Secondly, however, this local Muslim solidarity is not at present pointing towards some kind of national pan-ethnic Islamic movement that could potentially set itself up in opposition to the Chinese government; rather it is better seen as part of an ongoing negotiation by local Muslims with the state in the context of its ascribed ethnic categories. The findings of this study in a region where many of the Muslims are more conservative in their beliefs is not necessarily replicated in other contexts, such as in urban areas and in eastern and southern China, and hence reification of the term Hui as one idea extending all across China should be avoided, whether in terms of a united religious 'ummah' or of a real or imagined 'ethnic group.' Rather, this localized case study seeks to demonstrate ways in which Muslims of rural Central Northwest China are 'being Hui,' as a contribution to the broader discussion on what it means to be Muslim and Chinese in the reform era.

Keywords: China, ethnicity, Hui, identity, Muslims

Procedia PDF Downloads 98
28317 A Cloud-Based Federated Identity Management in Europe

Authors: Jesus Carretero, Mario Vasile, Guillermo Izquierdo, Javier Garcia-Blas

Abstract:

Currently, there is a so called ‘identity crisis’ in cybersecurity caused by the substantial security, privacy and usability shortcomings encountered in existing systems for identity management. Federated Identity Management (FIM) could be solution for this crisis, as it is a method that facilitates management of identity processes and policies among collaborating entities without enforcing a global consistency, that is difficult to achieve when there are ID legacy systems. To cope with this problem, the Connecting Europe Facility (CEF) initiative proposed in 2014 a federated solution in anticipation of the adoption of the Regulation (EU) N°910/2014, the so-called eIDAS Regulation. At present, a network of eIDAS Nodes is being deployed at European level to allow that every citizen recognized by a member state is to be recognized within the trust network at European level, enabling the consumption of services in other member states that, until now were not allowed, or whose concession was tedious. This is a very ambitious approach, since it tends to enable cross-border authentication of Member States citizens without the need to unify the authentication method (eID Scheme) of the member state in question. However, this federation is currently managed by member states and it is initially applied only to citizens and public organizations. The goal of this paper is to present the results of a European Project, named eID@Cloud, that focuses on the integration of eID in 5 cloud platforms belonging to authentication service providers of different EU Member States to act as Service Providers (SP) for private entities. We propose an initiative based on a private eID Scheme both for natural and legal persons. The methodology followed in the eID@Cloud project is that each Identity Provider (IdP) is subscribed to an eIDAS Node Connector, requesting for authentication, that is subscribed to an eIDAS Node Proxy Service, issuing authentication assertions. To cope with high loads, load balancing is supported in the eIDAS Node. The eID@Cloud project is still going on, but we already have some important outcomes. First, we have deployed the federation identity nodes and tested it from the security and performance point of view. The pilot prototype has shown the feasibility of deploying this kind of systems, ensuring good performance due to the replication of the eIDAS nodes and the load balance mechanism. Second, our solution avoids the propagation of identity data out of the native domain of the user or entity being identified, which avoids problems well known in cybersecurity due to network interception, man in the middle attack, etc. Last, but not least, this system allows to connect any country or collectivity easily, providing incremental development of the network and avoiding difficult political negotiations to agree on a single authentication format (which would be a major stopper).

Keywords: cybersecurity, identity federation, trust, user authentication

Procedia PDF Downloads 145
28316 The Impact of Building Technologies on Local Identity of Urban Settlements

Authors: Eman Nagi Gowid Selim

Abstract:

Nowadays, the relevance of places to people has been questioned from different perspectives. This is attributed to the fact that many international concrete blocks were used to create multi-use public spaces in neighborhoods based on the techniques of mass-productions concepts that became one of the most effective ways in building construction, replacing the local and traditional built environment. During the last decades, the world has become increasingly globalized and citizen more mobilized, and thus, ignoring the social and environmental dimensions of the local identity. The main enquiries of the research are “How did building technologies affect urban settlement’s identity?” and “What are the impacts of technologies and globalization on local identities in urban spaces? “From this perspective, the research presents firstly, a historical review that shows how old civilizations enhance their local identities using the newly discovered building materials in each era in different urban settlement and fabrics without losing the identity. The second part of the research highlights the different approaches of building technologies and urban design to present a clear understanding of ways of applying and merging between different methodologies to achieve the most efficient urban space design. The third part aims at analyzing some international and national case studies where the form and structure of particular spaces are vital to identifying the morphological elements of urban settlements and the links existing between them. In addition, it determines how the building materials are used to enrich the vocabulary of the local identity. This part ends with the deduction of the guidelines for the integration of the environmental and social dimensions within the building technologies` approaches to enhance the sustainability of local identities and thus, ending up with redefining "Urban Identity" to guide future research in such cultural areas. Finally, the research uses the comparative methodology for applying the deduced guidelines on a national case study namely “Othman`s Towers” in corniche El Maadi, and then ends up by some results in the form of strategies for future researcher, that identifies how to ensure local identity in urban settlements using new building materials and technologies to achieve social and environmental comfort within the cultural areas.

Keywords: building technologies, cultural context, environmental approach, participatory design, social dimension, urban spaces

Procedia PDF Downloads 277
28315 Layers of Identities in Nahdliyyin Mosque Architecture and Some Related Socio-Political Context Within

Authors: Yulia Eka Putrie, Widjaja Martokusumo

Abstract:

The development of architecture today indicates that an architectural object often does not represent one single identity only. One architectural object could represents layers of multiple identities of an increasingly complex society. Mosque architecture for example, is mainly associated with one religious identity; that mosque architecture serves as the representation of Islamic identity. However, on many occasions, mosque architecture also serves as the representation of other motives, such as political, social, even individual identity. In normal circumstances, these layers of identities are not always seen or realized by common people outside the community. They are only represented implicitly in some symbolic forms, activities, and events. On the other hand, in specific circumstances, these kinds of identities were represented explicitly in mosque architecture. This paper is a part of an initial research on the representation of socio-political identities in Nahdliyyin mosques in East Java, Indonesia. Nahdliyyin mosques were chosen as the object of research because of its significance in Indonesian socio-political context, because majority of Indonesian muslims are culturally associated with Nahdlatul Ulama (NU) with its aswaja doctrine. Some frictions in mosque ownership and management between Nahdliyyin and other islamic school of thoughts, has resulted in preventive efforts, where some of the efforts are related to the representation of their identity in their mosque architecture. The research is a field research that took place in Malang, East Java. Malang is one of main cities in East Java; a cultural and regional basis of NU and Nahdliyyin people. Formal analysis were conducted in ten large Nahdliyyin mosques in Malang. Some structured and in-depth interviews were also held to explore the motives of identity representation in some architectural aspects of the mosques. The result of this initial study indicates that there are layers of identities which were manifested in the studied mosques. These layers of identities in Nahdliyyin mosques were based on the same main values, but represented through various formal expressions. Furthermore, the study also brings the deeper understanding on socio-political context of mosques in Nahdliyyin culture.

Keywords: Nahdliyyin mosque architecture, layers of identities, representation, Nahdlatul Ulama

Procedia PDF Downloads 493
28314 Multimodal Biometric Cryptography Based Authentication in Cloud Environment to Enhance Information Security

Authors: D. Pugazhenthi, B. Sree Vidya

Abstract:

Cloud computing is one of the emerging technologies that enables end users to use the services of cloud on ‘pay per usage’ strategy. This technology grows in a fast pace and so is its security threat. One among the various services provided by cloud is storage. In this service, security plays a vital factor for both authenticating legitimate users and protection of information. This paper brings in efficient ways of authenticating users as well as securing information on the cloud. Initial phase proposed in this paper deals with an authentication technique using multi-factor and multi-dimensional authentication system with multi-level security. Unique identification and slow intrusive formulates an advanced reliability on user-behaviour based biometrics than conventional means of password authentication. By biometric systems, the accounts are accessed only by a legitimate user and not by a nonentity. The biometric templates employed here do not include single trait but multiple, viz., iris and finger prints. The coordinating stage of the authentication system functions on Ensemble Support Vector Machine (SVM) and optimization by assembling weights of base SVMs for SVM ensemble after individual SVM of ensemble is trained by the Artificial Fish Swarm Algorithm (AFSA). Thus it helps in generating a user-specific secure cryptographic key of the multimodal biometric template by fusion process. Data security problem is averted and enhanced security architecture is proposed using encryption and decryption system with double key cryptography based on Fuzzy Neural Network (FNN) for data storing and retrieval in cloud computing . The proposing scheme aims to protect the records from hackers by arresting the breaking of cipher text to original text. This improves the authentication performance that the proposed double cryptographic key scheme is capable of providing better user authentication and better security which distinguish between the genuine and fake users. Thus, there are three important modules in this proposed work such as 1) Feature extraction, 2) Multimodal biometric template generation and 3) Cryptographic key generation. The extraction of the feature and texture properties from the respective fingerprint and iris images has been done initially. Finally, with the help of fuzzy neural network and symmetric cryptography algorithm, the technique of double key encryption technique has been developed. As the proposed approach is based on neural networks, it has the advantage of not being decrypted by the hacker even though the data were hacked already. The results prove that authentication process is optimal and stored information is secured.

Keywords: artificial fish swarm algorithm (AFSA), biometric authentication, decryption, encryption, fingerprint, fusion, fuzzy neural network (FNN), iris, multi-modal, support vector machine classification

Procedia PDF Downloads 234
28313 Contemporary Christian Mission in Nigeria, the Question of Identity and Self-Realization for Integral Development

Authors: Felix Ehimare Enegho

Abstract:

The issue of the Christian mission among various people in our world has become a subject of discussion for quite a while now considering the many challenges faced by people of different religions. The understanding of who we are and how we choose to live our life as a people is quite imperative in many societies. The Christian Church down through the ages attempted to define itself so as to become relevant in human society. In Africa, the question of identity and self-realization is quite imperative if Africans are to define themselves and place themselves in the proper perspective as Christians. With the high level of insecurity bedevilling the world and especially Nigerian society, there is the need for Christians in Nigeria to see themselves as one body belonging to the same family. It is however disheartening that for several years now, there is a high level of disunity, lack of trust, disharmony, and vices of all kinds even among Christians who are often too quick to segment themselves into denominations thereby making themselves weak, segmented ad powerless in the midst of great oppositions, as if the Christian church in Nigeria is a divided house. The significance of this paper is to explore the areas of conflict among Christians in Nigeria with a view to finding possible solutions that would lead to the integral formation and in the long run a common identity and invariably self-realization. This paper utilized the socio-historical method of research. Among the major findings in the work is the fact that it is only people that can truly be responsible and held accountable for how they define their identity and self-realization. This entails that Christianity’s identity and self-realization in Nigeria will not only lead to a better and more defined form of Christianity but would ultimately assist in the integral development of Christian mission in Nigeria, a kind of development that would lead to a better Nigerian society.

Keywords: contemporary, Christian, mission, Nigeria, identity, self-realization

Procedia PDF Downloads 58
28312 I Don’t Know How I Got Here and I Don’t Know How to Get out of It: Understanding Male Pre-service Early Child Education Teachers’ Construction of Professional Identity

Authors: Sabika Khalid, Endale Fantahun Tadesse

Abstract:

Unlike other professional sectors, a great deal of studies has addressed the overwhelming gender disparity phenomena in the early childhood education (ECE) workforce, which is acknowledged for the dominance of women over men teachers. The irony of ECE being a gendered working environment is not only observed in societies that are ruled by gender roles but also in Western countries that claim to margin the gender gap in several professions. The participation of male teachers in ECE across most countries ranged from 1% to 3% of the total preschool or kindergarten teachers. When it comes to a dynamic Chinese society tempered with a deep-rooted tradition and cultural ideology, the ECE has no less place for males, and males have a low place for ECE. According to the Ministry of Education of China (2020), there are over 5 million kindergarten teachers and staff members, while only 2.3% are accounted for male teachers. The traditional gender-based discourse asserts that giving care and guidance for young children related to nurturing ‘mothering’ labels the profession in ECE as women’s work derived from originated from their ‘naturality.’ Although a large volume of evidence sheds light on the cause for low male teachers, the perception of parents, female teachers working with male teachers, and the experience of male teachers working in ECE, less is known and understood before being a teacher. Hence, this study argues that the promotion of the involvement of male teachers in light of their masculinity identity asset in the children's learning environment is comprehended to understand the construction of male student teachers' (preservice) professional identity during early childhood teacher training that allows obtaining substantial evidence that provides a feasible and robust implication in the preparation of competent and professional male preschool teachers that understand, cherish, and bring harmony in Chinese ECE through professionalism socialization with the stakeholders. This study intended to reveal male ECE preservice teachers’ knowledge of their professional identity, i.e., how they perceive themselves as a teacher and what factors agents these perceptions towards their professional identity.

Keywords: male teachers, Early Childhood Education (ECE), self-identity, perception of stakeholders

Procedia PDF Downloads 13
28311 Qualitative Study of Pre-Service Teachers' Imagined Professional World vs. Real Experiences of In-Service Teachers

Authors: Masood Monjezi

Abstract:

The English teachers’ pedagogical identity construction is the way teachers go through the process of becoming teachers and how they maintain their teaching selves. The pedagogical identity of teachers is influenced by several factors within the individual and the society. The purpose of this study was to compare the imagined social world of the pre-service teachers with the real experiences the in-service teachers had in the context of Iran to see how prepared the pre-service teachers are with a view to their identity being. This study used a qualitative approach to collection and analysis of the data. Structured and semi-structured interviews, focus groups and process logs were used to collect the data. Then, using open coding, the data were analyzed. The findings showed that the imagined world of the pre-service teachers partly corresponded with the real world experiences of the in-service teachers leaving the pre-service teachers unprepared for their real world teaching profession. The findings suggest that the current approaches to English teacher training are in need of modification to better prepare the pre-service teachers for the future that expects them.

Keywords: imagined professional world, in-service teachers, pre-service teachers, real experiences, community of practice, identity

Procedia PDF Downloads 311
28310 Community, Identity, and Resistance in Minority Literature: Arab American Poets - Samuel Hazo, Nathalie Handal, and Naomi Shihab Nye

Authors: Reem Saad Alqahtani

Abstract:

Drawing on minority literature, this research highlights the role of three contemporary Arab American writers, considering the significance of the historical and cultural contexts of the brutal attacks of 9/11. The focus of the research is to draw attention to the poetry of Samuel Hazo, Nathalie Handal, and Naomi Shihab Nye as representatives of the identity crisis, whose experiences left them feeling marginalized and alienated in both societies, and reflected as one of the ethnic American minority groups, as demonstrated in their poetry, with a special focus on hybridity, resistance, identity, and empowerment. The study explores the writers’ post-9/11 experience, affected by the United States’ long history of marginalization and discrimination against people of colour, placing Arab American literature with that of other ethnic American groups who share the same experience and contribute to composing literature characterized by the aesthetics of cultural hybridity, cultural complexity, and the politics of minorities to promote solidarity and coalition building. Indeed, the three selected Arab American writers have found a link between their narration and the identity of the exiled by establishing an identity that is a kind of synthesis of diverse identities of Western reality and Eastern nostalgia. The approaches applied in this study will include historical/biographical, postcolonial, and discourse analysis. The first will be used to emphasize the influence of the biographical aspects related to the community, identity, and resistance of the three poets on their poetry. The second is used to investigate the effects of postcolonialism on the poets and their responses to it, while the third understand the sociocultural, political, and historical dimensions of the texts, establishing these poets as representative of the Arab American experience. This study is significant because it will help shed light on the importance of the Arabic hybrid identity in creating resistance to minority communities within American society.

Keywords: Arab American, identity, hybridity, post-9/11

Procedia PDF Downloads 143
28309 Language Use in Computer-Mediated Communication and Users’ Social Identity

Authors: Miramar Damanhouri

Abstract:

This study examines the relationship between language use in computer-mediated communication and the social identity of the user. The data were collected by surveying 298 Saudi bilingual speakers who are familiar with Arabizi, a blend of Latin characters and Arabic numerals to transliterate Arabic sounds, and then analyzed quantitatively by running tests for statistical confidence in order to determine differences in perceptions between young adults (ages 15-25 years) and middle-aged adults (ages 26-50 years). According to the findings of this study, English is the dominant language among most of the young adults surveyed, and when they do use Arabic, they use Arabizi because of its flexibility, compatibility with modern technology, and its acceptance among people of their age and sociocultural backgrounds. On the other hand, most middle-aged adults surveyed here tend to use Arabic, as they believe that they should show their loyalty to their origin. The results of the study demonstrate a mutual relationship between language use in computer-mediated communication and the user’s social identity, as language is used both to reflect and construct that identity.

Keywords: Arabizi, computer mediated communication, digital communication, language use

Procedia PDF Downloads 113
28308 Identitarian Speech in Exile by Representatives of Central Europe

Authors: Georgiana Ciobotaru

Abstract:

The experience of exile is a defining one for the mittleeuropean writers, which is also the generator of an identity discourse manifested in the plan of fiction. In exile, the authors often build their marginality in opposition to that deserted mundi center. The Polish Gombrowicz carried out his existence, for more than twenty-three years, in a geographical exile, distancing himself from his country, and, from a cultural point of view, the writing meant a possibility of escape, of plunge into a literary exile that often constituted a way of conditioning the practice of writers. He opted for one of the attitudes that a writer in exile may have, namely he preferred to continue speaking Polish, although he was far from his homeland, turning to the public in his homeland, his entire literary creation in exile being promoted through Kulturia, the Paris-based immigration magazine. The problem of exile must be constantly related to three essential aspects, namely: territory, identity and language. The exile, both the writer and his characters, displays a characteristic attitude towards the abandoned land, but also towards the adoptive, towards the mother tongue, but also towards the idiom encountered, thus proving an original manner in terms of how it asserts, de-builds or re-builds its identity. In these texts written after leaving Poland, a series of open works by Trans-Atlantic, Gombrowicz assumes and internalizes the inadequacy between his self and the reality outside to make it the principle of his perception of the world. The expression of marginality that characterized the texts developed when the writer was still in Poland seems to acquire a certain coherence against the background of a logic imposed on the new experience, namely that of exile. Texts created during his exile in Argentina appear in a different context, in other words, in a situation of inadequacy towards the world: ignorance of the language, poverty, isolation that characterizes especially the first years spent there. This study aims to highlight how the Polish author de-builds and reconstructs his Mittel-European identity profile through language.

Keywords: discourse, exile, identity, immigration

Procedia PDF Downloads 115
28307 Disidentification of Historical City Centers: A Comparative Study of the Old and New Settlements of Mardin, Turkey

Authors: Fatma Kürüm Varolgüneş, Fatih Canan

Abstract:

Mardin is one of the unique cities in Turkey with its rich cultural and historical heritage. Mardin’s traditional dwellings have been affected both by natural data such as climate and topography and by cultural data like lifestyle and belief. However, in the new settlements, housing is formed with modern approaches and unsuitable forms clashing with Mardin’s culture and environment. While the city is expanding, traditional textures are ignored. Thus, traditional settlements are losing their identity and are vanishing because of the rapid change and transformation. The main aim of this paper is to determine the physical and social data needed to define the characteristic features of Mardin’s old and new settlements. In this context, based on social and cultural data, old and new settlement formations of Mardin have been investigated from various aspects. During this research, the following methods have been utilized: observations, interviews, public surveys, literature review, as well as site examination via maps, photographs and questionnaire methodology. In conclusion, this paper focuses on how changes in the physical forms of cities affect the typology and the identity of cities, as in the case of Mardin.

Keywords: urban and local identity, historical city center, traditional settlements, Mardin

Procedia PDF Downloads 307
28306 Comparing Media-Based Strategies of Identity Formation in Chicanos and Cuban-Americans

Authors: Kwang Yeon Kim

Abstract:

This paper will explore the directly proportional relationship between the influence of Hispanophone media in U.S. markets and Hispanic population growth. Though this growth has origins across south and central America, in U.S. media markets Mexican and Cuban immigrants, have traditionally been considered the most influential. Having endured significant historical discrimination, disparagement, and ethnic framing from conventional Anglophone media, such groups have sought to form their own identities as media consuming and producing Americans of Latin American origin. Although immigrants to the U.S. have traditionally faced obstacles in access to education, children of Mexican-Americans (Chicanos) and Cuban-Americans have made significant progress in overcoming these obstacles, partly explaining their media dominance. This is particularly true in the case of Cuban-Americans, for whom such media presence is not predicted by share of population. By conducting comparative studies of Chicano media and Cuban-Americans media, common ground was found in strategies of reliance on media-driven identity formation. In contrast to the mainstream media portrayal of Latino/as with limiting, negative stereotypes, Spanish-language media’s goal is to form the identity of being Latino for those living in the United States. Providing both news from countries of origin and local news within the United States, Chicano and Cuban-American media performs rituals of recollection while rooting such populations in more proximate media paradigms.

Keywords: Chicano identity, Cuban-Americans, Hispanophone media, Latino/a community

Procedia PDF Downloads 184
28305 Shaabi in the City: On Modernizing Sounds and Exclusion in Egyptian Cities

Authors: Mariam Aref Mahmoud

Abstract:

After centuries of historical development, Egypt is no stranger to national identity frustrations. What may or may not be counted as this “national identity” becomes a source of contention. Today, after decades of neoliberal reform, Cairo has become the center of Egypt’s cultural debacle. At its heart, the Egyptian capital serves as Egypt’s extension into global capitalism, its flailing hope to become part of the modernized, cosmopolitan world. Yet, to converge into this image of cosmopolitanism, Cairo must silence the perceived un-modernized sounds, cultures, and spaces that arise from within its alleyways. Currently, the agitation surrounding shaabi music, particularly, that of mahraganat, places these contentions to the center of the modernization debates. This paper will discuss the process through which the conversations between modernization, space, and culture have taken place through a historical analysis of national identity formation under Egypt’s neoliberal regimes. Through this, the paper concludes that music becomes a spatial force through which public space, identity, and globalization must be contested. From these findings researchers can then analyze Cairo through not only its physical landscapes, but also its metaphysical features – such as the soundscape.

Keywords: music, space, globalization, Cairo

Procedia PDF Downloads 85
28304 Tourist’s Perception and Identification of Landscape Elements of Traditional Village

Authors: Mengxin Feng, Feng Xu, Zhiyong Lai

Abstract:

As a typical representative of the countryside, traditional Chinese villages are rich in cultural landscape resources and historical information, but they are still in continuous decline. The problems of people's weak protection awareness and low cultural recognition are still serious, and the protection of cultural heritage is imminent. At the same time, with the rapid development of rural tourism, its cultural value has been explored and paid attention to again. From the perspective of tourists, this study aimed to explore people's perception and identity of cultural landscape resources under the current cultural tourism development background. We selected eleven typical landscape elements of Lingshui Village, a traditional village in Beijing, as research objects and conducted a questionnaire survey with two scales of perception and identity to explore the characteristics of people's perception and identification of landscape elements. We found that there was a strong positive correlation between the perception and identity of each element and that geographical location influenced visitors' overall perception. The perception dimensions scored the highest in location, and the lowest in history and culture, and the identity dimensions scored the highest in meaning and lowest in emotion. We analyzed the impact of visitors' backgrounds on people's perception and identity characteristics and found that age and education were two important factors. The elderly had a higher degree of perceived identity, as the familiarity effect increased their attention. Highly educated tourists had more stringent criteria for perception and identification. The above findings suggest strategies for conserving and optimizing landscape elements in the traditional village to improve the acceptance and recognition of cultural information in traditional villages, which will inject new vitality into the development of traditional villages.

Keywords: traditional village, tourist perception, landscape elements, perception and identity

Procedia PDF Downloads 113
28303 Performance Analysis of Elliptic Curve Cryptography Using Onion Routing to Enhance the Privacy and Anonymity in Grid Computing

Authors: H. Parveen Begam, M. A. Maluk Mohamed

Abstract:

Grid computing is an environment that allows sharing and coordinated use of diverse resources in dynamic, heterogeneous and distributed environment using Virtual Organization (VO). Security is a critical issue due to the open nature of the wireless channels in the grid computing which requires three fundamental services: authentication, authorization, and encryption. The privacy and anonymity are considered as an important factor while communicating over publicly spanned network like web. To ensure a high level of security we explored an extension of onion routing, which has been used with dynamic token exchange along with protection of privacy and anonymity of individual identity. To improve the performance of encrypting the layers, the elliptic curve cryptography is used. Compared to traditional cryptosystems like RSA (Rivest-Shamir-Adelman), ECC (Elliptic Curve Cryptosystem) offers equivalent security with smaller key sizes which result in faster computations, lower power consumption, as well as memory and bandwidth savings. This paper presents the estimation of the performance improvements of onion routing using ECC as well as the comparison graph between performance level of RSA and ECC.

Keywords: grid computing, privacy, anonymity, onion routing, ECC, RSA

Procedia PDF Downloads 374
28302 Nation Branding: Guidelines for Identity Development and Image Perception of Thailand Brand in Health and Wellness Tourism

Authors: Jiraporn Prommaha

Abstract:

The purpose of this research is to study the development of Thailand Brand Identity and the perception of its image in order to find any guidelines for the identity development and the image perception of Thailand Brand in Health and Wellness Tourism. The paper is conducted through mixed methods research, both the qualitative and quantitative researches. The qualitative focuses on the in-depth interview of executive administrations from public and private sectors involved scholars and experts in identity and image issue, main 11 people. The quantitative research was done by the questionnaires to collect data from foreign tourists 800; Chinese tourists 400 and UK tourists 400. The technique used for this was the Exploratory Factor Analysis (EFA), this was to determine the relation between the structures of the variables by categorizing the variables into group by applying the Varimax rotation technique. This technique showed recognition the Thailand brand image related to the 2 countries, China and UK. The results found that guidelines for brand identity development and image perception of health and wellness tourism in Thailand; as following (1) Develop communication in order to understanding of the meaning of the word 'Health and beauty tourism' throughout the country, (2) Develop human resources as a national agenda, (3) Develop awareness rising in the conservation and preservation of natural resources of the country, (4) Develop the cooperation of all stakeholders in Health and Wellness Businesses, (5) Develop digital communication throughout the country and (6) Develop safety in Tourism.

Keywords: brand identity, image perception, nation branding, health and wellness tourism, mixed methods research

Procedia PDF Downloads 174
28301 The Religious Economic Behavior of People in Dusit Province

Authors: Sivilai Jayankura

Abstract:

This research aims to study the religious economic behavior that effect the lifestyle of the people in Dusit area. The result shows that religious identity salience makes people increase contributions to public goods. Most of the Buddhism decrease contributions to public goods, expect others to contribute less to public goods, and become less risk averse. We find no evidence of religious identity salience effects on disutility of work effort, discount rates or generosity in life spending. Mostly the people like to make merit in the temple during special day of religion. The atmosphere in the temple leads the people like to travel and merit at the temple near their home.

Keywords: Dusit province, identity, lifestyle, religious economic behavior

Procedia PDF Downloads 294
28300 The Political Biographies of Social Workers: A Qualitative Study of the Political Lives of Social Workers

Authors: Hefin Gwilym

Abstract:

This paper will explore the political biographies of social workers in a neoliberal era. The findings are based on a research project for a successfully completed professional doctorate in social work. The methodology deployed for the research is a combination of constructivist grounded theory and biographical inquiry. The paper will present findings from 14 biographical interviews and will focus on one case study of a participant whose life story is richly informed by political social work. The 14 participants reflect different genders, ethnic identities, cultural and linguistic identities, age and length of social work careers. The participants also reflect different forms of political engagement, such as, as political activists and members of political parties, including parliamentarians. The findings demonstrate how deeply ingrained the social work identity is amongst the participants and how their political identity has remained strongly social democratic in nature despite the many changes in the social work profession since the rise of neoliberalism as a thought collective and policy package. The individual case study will explore the early roots of political identity in the childhood and nurturing years and the interface with subsequent social work and political careers. It will also explore the evolution of the participant’s political identity in the social work career. The case study will also present findings on how the participant has contributed to the political field with policy involvement and initiatives. The presentation will conclude with a discussion on how this particular group of social workers can best contribute to the future direction of the social work profession.

Keywords: political social work, political biographies, neoliberal, grounded theory

Procedia PDF Downloads 257
28299 Identification of Three Strategies to Enhance University Students’ Professional Identity, Using Hierarchical Regression Analysis

Authors: Alba Barbara-i-Molinero, Rosalia Cascon-Pereira, Ana Beatriz Hernandez

Abstract:

Students’ transitions from high school to the university have been challenged by the lack of continuity between both contexts. This mismatch directly affects students by generating feelings of anxiety and uncertainty, which increases the dropout rates and reduces students’ academic success. This discontinuity emanates because ‘transitions concern a restructuring of what the person does and who the person perceives him or herself to be’. Hence, identity becomes essential in these transitions. Generally, identity is the answer to questions such as who am I? or who are we? This is integrated by personal identity, and as many social identities as groups, the individual feels he/she is a part. A case in point to construct a social identity is the identification with a profession. For this reason, a way to lighten the generated tension during transitions is applying strategies orientated to enhance students’ professional identity in their point of entry to the higher education institution. That would create a sense of continuity between high school and higher education contexts, increasing their Professional Identity Strength. To develop the strategies oriented to enhance students Professional Identity, it is important to analyze what influences it. There exist several influencing factors that influence Professional Identity (e.g., professional status, the recommendation of family and peers, the academic environment, or the chosen bachelor degree). There is a gap in the literature analyzing the impact of these factors on more than one bachelor degree. In this regards, our study takes an additional step with the aim of evaluating the influence of several factors on Professional Identity using a cohort of university students from multiple degrees between the ages of 17-19 years. To do so, we used hierarchical regression analyses to assess the impact of the following factors: External Motivation Conditionals (EMC), Educational Experience Conditionals (EEC) and Personal Motivational Conditional (PMP). After conducting the analyses, we found that the assessed factors influenced students’ professional identity differently according to their bachelor degree and discipline. For example, PMC and EMC positively affected science students, while architecture, law and economics and engineering students were just influenced by PMC. Basing on that influences, we proposed three different strategies aimed to enhance students’ professional identity, in the short and long term. These strategies are: to enhance students’ professional identity before the incorporation to university through campuses and icebreaker activities; to apply recruitment strategies aimed to provide realistic information of the bachelor degree; and to incorporate different activities, such as in-vitro, in situ and self-directed activities aimed to enhance longitudinally students’ professional identity from the university. From these results, theoretical contributions and practical implications arise. First, we contribute to the literature by identifying which factors influence students from different bachelor degrees since there is still no evidence. And, second, using as a benchmark the obtained results, we contribute from a practical perspective, by proposing several alternative strategies to increase students’ professional identity strength aiming to lighten their transition from high school to higher education.

Keywords: professional identity, higher education, educational strategies , students

Procedia PDF Downloads 119
28298 A Proposal to Tackle Security Challenges of Distributed Systems in the Healthcare Sector

Authors: Ang Chia Hong, Julian Khoo Xubin, Burra Venkata Durga Kumar

Abstract:

Distributed systems offer many benefits to the healthcare industry. From big data analysis to business intelligence, the increased computational power and efficiency from distributed systems serve as an invaluable resource in the healthcare sector to utilize. However, as the usage of these distributed systems increases, many issues arise. The main focus of this paper will be on security issues. Many security issues stem from distributed systems in the healthcare industry, particularly information security. The data of people is especially sensitive in the healthcare industry. If important information gets leaked (Eg. IC, credit card number, address, etc.), a person’s identity, financial status, and safety might get compromised. This results in the responsible organization losing a lot of money in compensating these people and even more resources expended trying to fix the fault. Therefore, a framework for a blockchain-based healthcare data management system for healthcare was proposed. In this framework, the usage of a blockchain network is explored to store the encryption key of the patient’s data. As for the actual data, it is encrypted and its encrypted data, called ciphertext, is stored in a cloud storage platform. Furthermore, there are some issues that have to be emphasized and tackled for future improvements, such as a multi-user scheme that could be proposed, authentication issues that have to be tackled or migrating the backend processes into the blockchain network. Due to the nature of blockchain technology, the data will be tamper-proof, and its read-only function can only be accessed by authorized users such as doctors and nurses. This guarantees the confidentiality and immutability of the patient’s data.

Keywords: distributed, healthcare, efficiency, security, blockchain, confidentiality and immutability

Procedia PDF Downloads 158
28297 An Efficient Encryption Scheme Using DWT and Arnold Transforms

Authors: Ali Abdrhman M. Ukasha

Abstract:

Data security needed in data transmission, storage, and communication to ensure the security. The color image is decomposed into red, green, and blue channels. The blue and green channels are compressed using 3-levels discrete wavelet transform. The Arnold transform uses to changes the locations of red image channel pixels as image scrambling process. Then all these channels are encrypted separately using a key image that has same original size and is generating using private keys and modulo operations. Performing the X-OR and modulo operations between the encrypted channels images for image pixel values change purpose. The extracted contours of color image recovery can be obtained with accepted level of distortion using Canny edge detector. Experiments have demonstrated that proposed algorithm can fully encrypt 2D color image and completely reconstructed without any distortion. It has shown that the color image can be protected with a higher security level. The presented method has easy hardware implementation and suitable for multimedia protection in real time applications such as wireless networks and mobile phone services.

Keywords: color image, wavelet transform, edge detector, Arnold transform, lossy image encryption

Procedia PDF Downloads 453
28296 The Perspective of British Politicians on English Identity: Qualitative Study of Parliamentary Debates, Blogs, and Interviews

Authors: Victoria Crynes

Abstract:

The question of England’s role in Britain is increasingly relevant due to the ongoing rise in citizens identifying as English. Furthermore, the Brexit Referendum was predominantly supported by constituents identifying as English. Few politicians appear to comprehend how Englishness is politically manifested. Politics and the media have depicted English identity as a negative and extremist problem - an inaccurate representation that ignores the breadth of English identifying citizens. This environment prompts the question, 'How are British Politicians Addressing the Modern English Identity Question?' Parliamentary debates, political blogs, and interviews are synthesized to establish a more coherent understanding of the current political attitudes towards English identity, the perceived nature of English identity, and the political manifestation of English representation and governance. Analyzed parliamentary debates addressed the democratic structure of English governance through topics such as English votes for English laws, devolution, and the union. The blogs examined include party-based, multi-author style blogs, and independently authored blogs by politicians, which provide a dynamic and up-to-date representation of party and politician viewpoints. Lastly, fourteen semi-structured interviews of British politicians provide a nuanced perspective on how politicians conceptualize Englishness. Interviewee selection was based on three criteria: (i) Members of Parliament (MP) known for discussing English identity politics, (ii) MPs of strongly English identifying constituencies, (iii) MPs with minimal English identity affiliation. Analysis of parliamentary debates reveals the discussion of English representation has gained little momentum. Many politicians fail to comprehend who the English are, why they desire greater representation and believe that increased recognition of the English would disrupt the unity of the UK. These debates highlight the disconnect of parliament from the disenfranchised English towns. A failure to recognize the legitimacy of English identity politics generates an inability for solution-focused debates to occur. Political blogs demonstrate cross-party recognition of growing English disenfranchisement. The dissatisfaction with British politics derives from multiple factors, including economic decline, shifting community structures, and the delay of Brexit. The left-behind communities have seen little response from Westminster, which is often contrasted to the devolved and louder voices of the other UK nations. Many blogs recognize the need for a political response to the English and lament the lack of party-level initiatives. In comparison, interviews depict an array of local-level initiatives reconnecting MPs to community members. Local efforts include town trips to Westminster, multi-cultural cooking classes, and English language courses. These efforts begin to rebuild positive, local narratives, promote engagement across community sectors, and acknowledge the English voices. These interviewees called for large-scale, political action. Meanwhile, several interviewees denied the saliency of English identity. For them, the term held only extremist narratives. The multi-level analysis reveals continued uncertainty on Englishness within British politics, contrasted with increased recognition of its saliency by politicians. It is paramount that politicians increase discussions on English identity politics to avoid increased alienation of English citizens and to rebuild trust in the abilities of Westminster.

Keywords: British politics, contemporary identity politics and its impacts, English identity, English nationalism, identity politics

Procedia PDF Downloads 93
28295 The Impact of Music on Social Identity Formation and Intergroup Relations in American-Born Korean Skaters in 2018 Winter Olympics

Authors: Sehwan Kim, Jepkorir Rose Chepyator Thomson

Abstract:

Music provides opportunities to affirm social identities and facilitate the internalization of one’s identity. The purpose of this study was to examine the role of music in breaking down boundaries between the in-group and out-of-group sport participants. Social identity theory was used to guide an understanding of two American-born South Korean skaters—Yura Min and Alexander Gamelin—who used a Korean representative traditional folk song, Arirang, at the 2018 Winter Olympics. This was an interpretive case study that focused on 2018 Winter Olympic participants whose performance and use of music was understood through the lenses of Koreans. Semi-structured interviews were conducted with 15 Korean audiences who watched two American-born South Korean skaters’ performances. Data analysis involved the determination of themes in the data collected. The findings of this study are as follows: First Koreans viewed the skaters as the out-group based on ethnic appearances and stereotypes. Second, Koreans’ inter-group bias against the skaters was meditated after Koreans watched the skaters as they used Arirang song in performance. Implications for this study include the importance of music as an instrument of unity across diverse populations, including intergroup relations. Music can also offer ways to understand people’s cultures and bridge gaps between age and gender across categories of naturalization.

Keywords: impact of music, intergroup relations, naturalized athletes, social identity theory

Procedia PDF Downloads 188
28294 Aluminum Factories, Values and Regeneration Option

Authors: Tereza Bartosikova

Abstract:

This paper describes the values of a specific type of industrial heritage-aluminum factories. It is an especially endangered kind of industrial heritage with only a little attention paid. The paper aims to highlight the uniqueness of these grounds and to specify several options for revitalizations. The research is based on complex aluminum factories mapping in Europe from archives and bibliographic sources and on site. There is analyzed gained information that could offer a new view on the aluminum grounds. Primarily, the data are described according to the works in Žiar nad Hronom, Slovakia. More than a half aluminum grounds have ended up the production, although they can go on further. They are closely connected with some areas identity and their presence has left striking footsteps in the environment. By saving them, the historical continuity, cultural identity of population and also the economic stability of region would be supported.

Keywords: aluminum, industrial heritage, regeneration, values

Procedia PDF Downloads 361