Search results for: national security exception
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 7128

Search results for: national security exception

3888 Easily Memorable Strong Password Generation and Retrieval

Authors: Shatadru Das, Natarajan Vijayarangan

Abstract:

In this paper, a system and method for generating and recovering an authorization code has been designed and analyzed. The system creates an authorization code by accepting a base-sentence from a user. Based on the characters present in this base-sentence, the system computes a base-sentence matrix. The system also generates a plurality of patterns. The user can either select the pattern from the multiple patterns suggested by the system or can create his/her own pattern. The system then performs multiplications between the base-sentence matrix and the selected pattern matrix at different stages in the path forward, for obtaining a strong authorization code. In case the user forgets the base sentence, the system has a provision to manage and retrieve 'forgotten authorization code'. This is done by fragmenting the base sentence into different matrices and storing the fragmented matrices into a repository after computing matrix multiplication with a security question-answer approach and with a secret key provided by the user.

Keywords: easy authentication, key retrieval, memorable passwords, strong password generation

Procedia PDF Downloads 400
3887 Integration of Smart Grid Technologies with Smart Phones for Energy Monitoring and Management

Authors: Arjmand Khaliq, Pemra Sohaib

Abstract:

There is increasing trend of use of smart devices in the present age. The growth of computing techniques and advancement in hardware has also brought the use of sensors and smart devices to a high degree during the course of time. So use of smart devices for control, management communication and optimization has become very popular. This paper gives proposed methodology which involves sensing and switching unite for load, two way communications between utility company and smart phones of consumers using cellular techniques and price signaling resulting active participation of user in energy management .The goal of this proposed control methodology is active participation of user in energy management with accommodation of renewable energy resource. This will provide load adjustment according to consumer’s choice, increased security and reliability for consumer, switching of load according to consumer need and monitoring and management of energy.

Keywords: cellular networks, energy management, renewable energy source, smart grid technology

Procedia PDF Downloads 413
3886 Promoting Biofuels in India: Assessing Land Use Shifts Using Econometric Acreage Response Models

Authors: Y. Bhatt, N. Ghosh, N. Tiwari

Abstract:

Acreage response function are modeled taking account of expected harvest prices, weather related variables and other non-price variables allowing for partial adjustment possibility. At the outset, based on the literature on price expectation formation, we explored suitable formulations for estimating the farmer’s expected prices. Assuming that farmers form expectations rationally, the prices of food and biofuel crops are modeled using time-series methods for possible ARCH/GARCH effects to account for volatility. The prices projected on the basis of the models are then inserted to proxy for the expected prices in the acreage response functions. Food crop acreages in different growing states are found sensitive to their prices relative to those of one or more of the biofuel crops considered. The required percentage improvement in food crop yields is worked to offset the acreage loss.

Keywords: acreage response function, biofuel, food security, sustainable development

Procedia PDF Downloads 301
3885 An Emerging Trend of Wrong Plurals among Pakistani Bilinguals: A Sociolinguistic Perspective

Authors: Sikander Ali

Abstract:

English is being used as linguafranca in most of the formal and informal situations of Pakistan. This extensive use has been rapidly replacing the identity of national language of Pakistani.e. Urdu. The nature of syntactic representation has always been the matter of confusion among linguists. Being unaware of the correct plural forms the non-natives commit mistakes while making plurals. But the situation is reverse when non-natives of English irrespective of knowing the right plurals make wrong plurals usually talking in their native language. The observation method was opted to check this hypothesis. Along with it, a checklist has been made in which these certain occurrences have been mentioned, where this flouting of the norms is a normal routine. The result confirms that Pakistani commit this mistake, i.e. ‘tablian’ the plural of tables, ‘filain’ the plural of files, though this is done by them on unconscious level. This emerging trend of unconscious mistake is leading Pakistani bilinguals towards a diglossic situation where they are coining portmanteau.

Keywords: bilinguals, emerging trend, portmanteau, trends

Procedia PDF Downloads 176
3884 Localization of Near Field Radio Controlled Unintended Emitting Sources

Authors: Nurbanu Guzey, S. Jagannathan

Abstract:

Locating radio controlled (RC) devices using their unintended emissions has a great interest considering security concerns. Weak nature of these emissions requires near field localization approach since it is hard to detect these signals in far field region of array. Instead of only angle estimation, near field localization also requires range estimation of the source which makes this method more complicated than far field models. Challenges of locating such devices in a near field region and real time environment are analyzed in this paper. An ESPRIT like near field localization scheme is utilized for both angle and range estimation. 1-D search with symmetric subarrays is provided. Two 7 element uniform linear antenna arrays (ULA) are employed for locating RC source. Experiment results of location estimation for one unintended emitting walkie-talkie for different positions are given.

Keywords: localization, angle of arrival (AoA), range estimation, array signal processing, ESPRIT, Uniform Linear Array (ULA)

Procedia PDF Downloads 526
3883 Development of Student Invention Competences and Skills in Polytechnic University

Authors: D. S. Denchuk, O. M. Zamyatina, M. G. Minin, M. A. Soloviev, K. V. Bogrova

Abstract:

The article considers invention activity in Russia and worldwide, its modern state, and the impact of innovative engineering activity on the national economy of the considered countries. It also analyses the historical premises of modern engineer-ing invention. The authors explore the development of engineering invention at an engineer-ing university, the creation of particular environment for scientific and technical creativity of students on the example of Elite engineering education program at Tomsk Polytechnic University, Russia. It is revealed that for the successful de-velopment of engineering invention in a higher education institution it is neces-sary to apply a learning model that develops the creative potential of a student, which is, in its turn, inseparably connected with the ability to generate new ideas in engineering. Such academic environment can become a basis for revealing stu-dents' creativity.

Keywords: engineering invention, scientific and technical creativity, students, project-based approach

Procedia PDF Downloads 391
3882 Statistic Regression and Open Data Approach for Identifying Economic Indicators That Influence e-Commerce

Authors: Apollinaire Barme, Simon Tamayo, Arthur Gaudron

Abstract:

This paper presents a statistical approach to identify explanatory variables linearly related to e-commerce sales. The proposed methodology allows specifying a regression model in order to quantify the relevance between openly available data (economic and demographic) and national e-commerce sales. The proposed methodology consists in collecting data, preselecting input variables, performing regressions for choosing variables and models, testing and validating. The usefulness of the proposed approach is twofold: on the one hand, it allows identifying the variables that influence e- commerce sales with an accessible approach. And on the other hand, it can be used to model future sales from the input variables. Results show that e-commerce is linearly dependent on 11 economic and demographic indicators.

Keywords: e-commerce, statistical modeling, regression, empirical research

Procedia PDF Downloads 226
3881 Problems of Using Mobile Photovoltaic Installations

Authors: Ksenia Siadkowska, Łukasz Grabowski, Michał Gęca

Abstract:

The dynamic development of photovoltaics in the 21st century has resulted in more possibilities for using photovoltaic systems. In order to reduce emissions, a retrofitting of vehicles with photovoltaic modules has recently become increasingly popular. Preparing such an installation, however, requires professional knowledge and compliance with safety rules. The paper discusses the advantages and disadvantages of some types of flexible photovoltaic modules that can be applied to mobile installations, types and causes of damage to photovoltaic modules as well as the most frequent types of misinstallation. Our attention has been drawn to the risk of fire caused by misintallation or defective insulation and the need to closely monitor mobile installations, for example by a non-destructive testing with a thermal imaging camera. The paper also presents certain selected results of the research conducted at the Lublin University of Technology. This work has been financed by the Polish National Centre for Research and Development, under Grant Agreement No. PBS2/A6/16/2013.

Keywords: flexible PV module, mobile PV module, photovoltaic module, photovoltaic

Procedia PDF Downloads 252
3880 Facial Biometric Privacy Using Visual Cryptography: A Fundamental Approach to Enhance the Security of Facial Biometric Data

Authors: Devika Tanna

Abstract:

'Biometrics' means 'life measurement' but the term is usually associated with the use of unique physiological characteristics to identify an individual. It is important to secure the privacy of digital face image that is stored in central database. To impart privacy to such biometric face images, first, the digital face image is split into two host face images such that, each of it gives no idea of existence of the original face image and, then each cover image is stored in two different databases geographically apart. When both the cover images are simultaneously available then only we can access that original image. This can be achieved by using the XM2VTS and IMM face database, an adaptive algorithm for spatial greyscale. The algorithm helps to select the appropriate host images which are most likely to be compatible with the secret image stored in the central database based on its geometry and appearance. The encryption is done using GEVCS which results in a reconstructed image identical to the original private image.

Keywords: adaptive algorithm, database, host images, privacy, visual cryptography

Procedia PDF Downloads 130
3879 Enhancing Financial Security: Real-Time Anomaly Detection in Financial Transactions Using Machine Learning

Authors: Ali Kazemi

Abstract:

The digital evolution of financial services, while offering unprecedented convenience and accessibility, has also escalated the vulnerabilities to fraudulent activities. In this study, we introduce a distinct approach to real-time anomaly detection in financial transactions, aiming to fortify the defenses of banking and financial institutions against such threats. Utilizing unsupervised machine learning algorithms, specifically autoencoders and isolation forests, our research focuses on identifying irregular patterns indicative of fraud within transactional data, thus enabling immediate action to prevent financial loss. The data we used in this study included the monetary value of each transaction. This is a crucial feature as fraudulent transactions may have distributions of different amounts than legitimate ones, such as timestamps indicating when transactions occurred. Analyzing transactions' temporal patterns can reveal anomalies (e.g., unusual activity in the middle of the night). Also, the sector or category of the merchant where the transaction occurred, such as retail, groceries, online services, etc. Specific categories may be more prone to fraud. Moreover, the type of payment used (e.g., credit, debit, online payment systems). Different payment methods have varying risk levels associated with fraud. This dataset, anonymized to ensure privacy, reflects a wide array of transactions typical of a global banking institution, ranging from small-scale retail purchases to large wire transfers, embodying the diverse nature of potentially fraudulent activities. By engineering features that capture the essence of transactions, including normalized amounts and encoded categorical variables, we tailor our data to enhance model sensitivity to anomalies. The autoencoder model leverages its reconstruction error mechanism to flag transactions that deviate significantly from the learned normal pattern, while the isolation forest identifies anomalies based on their susceptibility to isolation from the dataset's majority. Our experimental results, validated through techniques such as k-fold cross-validation, are evaluated using precision, recall, and the F1 score alongside the area under the receiver operating characteristic (ROC) curve. Our models achieved an F1 score of 0.85 and a ROC AUC of 0.93, indicating high accuracy in detecting fraudulent transactions without excessive false positives. This study contributes to the academic discourse on financial fraud detection and provides a practical framework for banking institutions seeking to implement real-time anomaly detection systems. By demonstrating the effectiveness of unsupervised learning techniques in a real-world context, our research offers a pathway to significantly reduce the incidence of financial fraud, thereby enhancing the security and trustworthiness of digital financial services.

Keywords: anomaly detection, financial fraud, machine learning, autoencoders, isolation forest, transactional data analysis

Procedia PDF Downloads 57
3878 Rural-Urban Education Gap and Left-Behind Children Education in China

Authors: Jiawei Liang

Abstract:

Against the backdrop of China's burgeoning migration from rural to urban areas, a demographic group has emerged in China, which is called left-behind children. Due to many reasons, including the issue of the rural-urban education gap, the education of left-behind children has been below the national education average. In this situation, the issue has attracted the attention of researchers and policymakers. In order to gain a comprehensive understanding of this issue, this paper adopts an analytical approach to studying the rural-urban education gap and left-behind children in rural China. The paper first introduces the current situation of migration, the education gap, and left-behind children within China. Then, it further explores the causes of these two questions and barriers as well as the consequences for left-behind children. Finally, the study offers some suggestions to alleviate the urban-rural gap and the current situation of education for left-behind children in rural areas, which will hopefully shed light on the issue of left-behind children in China and the urban-rural education gap.

Keywords: left-behind children, rural China, education improvement, Hukou policy, rural-urban education gap

Procedia PDF Downloads 104
3877 Contribution of Urban Wetlands to Livelihood in Tanzania

Authors: Halima Kilungu, Munishi P. K. T., Happiness Jackson Nko

Abstract:

Wetlands contribute significantly to the national economy. Nevertheless, urban wetlands in Tanzania have been taken for granted; many have been converted into waste disposal areas and settlements despite their substantial role in climate-change flood attenuation and livelihood. This is due to the lacking informing assessments from a socio-economic perspective. This study assesses the contribution of urban wetlands to the livelihood of marginalised communities in Dar es Salaam City, Tanzania. Specifically, the study assesses the an extent and nature of change in wetlands in Dar es Salaam City for the past 30 years using the land-use land-cover change approach and the contribution of wetlands to livelihood using questionnaires. The results show that the loss of wetlands in Dar es Salaam is high to extent that will likely jeopardise their future contributions to livelihood. The results inform decision-makers on the importance of wise use of Urban Wetlands and conservation to improving livelihood for urban dwellers.

Keywords: wetlands, tanzania, dar es salaam, climate-change, and wetlands, livelihood

Procedia PDF Downloads 170
3876 Outcome Evaluation of a Blended-Learning Mental Health Training Course in South African Public Health Facilities

Authors: F. Slaven, M. Uys, Y. Erasmus

Abstract:

The South African National Mental Health Education Programme (SANMHEP) was a National Department of Health (NDoH) initiative to strengthen mental health services in South Africa in collaboration with the Foundation for Professional Development (FPD), SANOFI and the various provincial departments of health. The programme was implemented against the backdrop of a number of challenges in the management of mental health in the country related to staff shortages and infrastructure, the intersection of mental health with the growing burden of non-communicable diseases and various forms of violence, and challenges around substance abuse and its relationship with mental health. The Mental Health Care Act (No. 17 of 2002) prescribes that mental health should be integrated into general health services including primary, secondary and tertiary levels to improve access to services and reduce stigma associated with mental illness. In order for the provisions of the Act to become a reality, and for the journey of mental health patients through the system to improve, sufficient and skilled health care providers are critical. SANMHEP specifically targeted Medical Doctors and Professional Nurses working within the facilities that are listed to conduct 72-hour assessments, as well as District Hospitals. The aim of the programme was to improve the clinical diagnosis and management of mental disorders/conditions and the understanding of and compliance with the Mental Health Care Act and related Regulations and Guidelines in the care, treatment and rehabilitation of mental health care users. The course used a blended-learning approach and trained 1 120 health care providers through 36 workshops between February and November 2019. Of those trained, 689 (61.52%) were Professional Nurses, 337 (30.09%) were Medical Doctors, and 91 (8.13%) indicated their occupation as ‘other’ (of these more than half were psychologists). The pre- and post-evaluation of the face-to-face training sessions indicated a marked improvement in knowledge and confidence level scores (both clinical and legislative) in the care, treatment and rehabilitation of mental health care users by participants in all the training sessions. There was a marked improvement in the knowledge and confidence of participants in performing certain mental health activities (on average the ratings increased by 2.72; or 27%) and in managing certain mental health conditions (on average the ratings increased by 2.55; or 25%). The course also required that participants obtain 70% or higher in their formal assessments as part of the online component. The 337 participants who completed and passed the course scored 90% on average. This illustrates that when participants attempted and completed the course, they did very well. To further assess the effect of the course on the knowledge and behaviour of the trained mental health care practitioners a mixed-method outcome evaluation is currently underway consisting of a survey with participants three months after completion, follow-up interviews with participants, and key informant interviews with department of health officials and course facilitators. This will enable a more detailed assessment of the impact of the training on participants' perceived ability to manage and treat mental health patients.

Keywords: mental health, public health facilities, South Africa, training

Procedia PDF Downloads 119
3875 A Model for Adaptive Online Quiz: QCitra

Authors: Rosilah Hassan, Karam Dhafer Mayoof, Norngainy Mohd Tawil, Shamshubaridah Ramlee

Abstract:

Application of adaptive online quiz system and a design are performed in this paper. The purpose of adaptive quiz system is to establish different questions automatically for each student and measure their competence on a definite area of discipline. This model determines students competencies in cases like distant-learning which experience challenges frequently. Questions are specialized to allow clear deductions about student gains; they are able to identify student competencies more effectively. Also, negative effects of questions requiring higher knowledge than competency over student’s morale and self-confidence are dismissed. The advantage of the system in the quiz management requires less total time for measuring and is more flexible. Self sufficiency of the system in terms of repeating, planning and assessment of the measurement process allows itself to be used in the individual education sets. Adaptive quiz technique prevents students from distraction and motivation loss, which is led by the questions with quite lower hardness level than student’s competency.

Keywords: e-learning, adaptive system, security, quiz database

Procedia PDF Downloads 450
3874 The Politicization of Foreign Aid and Its Effect on Afghanistan, 2001-2016

Authors: Narender Banwala

Abstract:

The study critically evaluates that the politics of foreign aid and its effect on Afghanistan. The study argues that dynamics of foreign aid to Afghanistan are not driven solely by the Afghan political, social, and economic realities but much more by the ephemeral political goals of international donor countries. The objective of this paper is to find out the political reality of foreign aid given to Afghanistan in a post 9/11 era. The study analyses the gap between the donor countries' interests and the Afghan government's priorities in aid coordination and management. The aid given to Afghanistan has been accompanied by the political interests of the major powers and therefore violated the core principles of humanitarianism, i.e., humanity, impartiality, neutrality, and independence. This research attempts to explain the areas which are of high priority, extremely vulnerable, and have been a neglected part since 2001. The study focuses on how as a result of politicization, foreign aid could not yield the expected results even after prolong presence of international donors in Afghanistan. Methodologically, the study includes both qualitative and quantitative data, which are collected by interviews with government officials and other government documents.

Keywords: Afganistan, aid, politics, security

Procedia PDF Downloads 126
3873 Optimization of Our Eyes Cooperation as the Counter-Terrorism Strategy in Association of South East Asian Nations

Authors: Chastiti Mediafira Wulolo

Abstract:

Our Eyes is a cooperation pact in the field of intelligence information exchanges initiated by the Indonesian Ministry of Defense, which has been signed by Indonesia, Philippines, Malaysia, Brunei Darussalam, Thailand, and Singapore. This cooperation mostly engages the military acts as a central role, but this pact still requires the involvement of various parties such as police and other linear institution. This paper will use a qualitative content analysis method by doing some deep analyzing the pattern of cooperation itself. As the implementation of translantic counter-terrorism cooperation, this research will address how the role of Our Eyes can be optimized as a form of government’s response towards the contemporary threat in the Dynamics of Strategic Environmental Security in the Asia Pacific Region. Optimizing the role of this cooperation will also acquire from the previous counter-terrorism cooperation in ASEAN region, so it expects that Our Eyes collaboration can be the most effective cooperation in overcoming terrorism issues in ASEAN, eventually in Asia Pacific.

Keywords: our eyes, Defense Ministry of Indonesia, ASEAN, counter-terrorism

Procedia PDF Downloads 185
3872 Solar Technology: A Review of Government-Sponsored Green Energy

Authors: Christopher Battle

Abstract:

The pursuit of a sustainable future is dependent on the ability of governments from the national to municipal level. The politics of energy and the development of state-sponsored photovoltaic cell expansion can nebulize in several ways based on a state or nation's physical and human geography. This study conducts a comparative analysis of the energy and solar program of Turkey, Pennsylvania, and Philadelphia. The study aims to assess the city of Philadelphia's solar policies in contrast with both its political history and the photovoltaic programs of Turkey, a world leader in solar system development, and Pennsylvania's history of energy regulation. This comparative study found that after hundreds of bills and regulations over decades, sustainable energy development in affordable housing and new construction is the next phase of State-Sponsored Green energy for the city of Philadelphia.

Keywords: Turkey, solar power, Philadelphia, affordable energy development

Procedia PDF Downloads 94
3871 Framework for Government ICT Projects

Authors: Manal Rayes

Abstract:

In its efforts to utilize the information and communication technology to enhance the quality of public service delivery, national and local governments around the world are competing to introduce more ICT applications as tools to automate processes related to law enforcement or policy execution, increase citizen orientation, trust, and satisfaction, and create one-stop-shops for public services. In its implementation, e-Government ICTs need to maintain transparency, participation, and collaboration. Due to this diverse of mixed goals and requirements, e-Government systems need to be designed based on special design considerations in order to eliminate the risks of failure to compliance to government regulations, citizen dissatisfaction, or market repulsion. In this article we suggest a framework with guidelines for designing government information systems that takes into consideration the special requirements of the public sector. Then we introduce two case studies and show how applying those guidelines would result in a more solid system design.

Keywords: e-government, framework, guidelines, system design

Procedia PDF Downloads 366
3870 Investigating the Factors Affecting on One Time Passwords Technology Acceptance: A Case Study in Banking Environment

Authors: Sajad Shokohuyar, Mahsa Zomorrodi Anbaji, Saghar Pouyan Shad

Abstract:

According to fast technology growth, modern banking tries to decrease going to banks’ branches and increase customers’ consent. One of the problems which banks face is securing customer’s password. The banks’ solution is one time password creation system. In this research by adapting from acceptance of technology model theory, assesses factors that are effective on banking in Iran especially in using one time password machine by one of the private banks of Iran customers. The statistical population is all of this bank’s customers who use electronic banking service and one time password technology and the questionnaires were distributed among members of statistical population in 5 selected groups of north, south, center, east and west of Tehran. Findings show that confidential preservation, education, ease of utilization and advertising and informing has positive relations and distinct hardware and age has negative relations.

Keywords: security, electronic banking, one time password, information technology

Procedia PDF Downloads 453
3869 Human Motion Capture: New Innovations in the Field of Computer Vision

Authors: Najm Alotaibi

Abstract:

Human motion capture has become one of the major area of interest in the field of computer vision. Some of the major application areas that have been rapidly evolving include the advanced human interfaces, virtual reality and security/surveillance systems. This study provides a brief overview of the techniques and applications used for the markerless human motion capture, which deals with analyzing the human motion in the form of mathematical formulations. The major contribution of this research is that it classifies the computer vision based techniques of human motion capture based on the taxonomy, and then breaks its down into four systematically different categories of tracking, initialization, pose estimation and recognition. The detailed descriptions and the relationships descriptions are given for the techniques of tracking and pose estimation. The subcategories of each process are further described. Various hypotheses have been used by the researchers in this domain are surveyed and the evolution of these techniques have been explained. It has been concluded in the survey that most researchers have focused on using the mathematical body models for the markerless motion capture.

Keywords: human motion capture, computer vision, vision-based, tracking

Procedia PDF Downloads 320
3868 Life Cycle Assessment in Road Pavements: A Literature Review and the Potential Use in Brazil

Authors: B. V. Santos, M. T. M. Carvalho, J. H. S. Rêgo

Abstract:

The article presents a literature review on recent advances related to studies of the environmental impact of road pavements, with reference to the concepts of Life Cycle Assessment (LCA). An introduction with the main motivations for the development of the research is presented, with a current overview of the Brazilian transport infrastructure and the projections for the road mode for the coming years, and the possibility of using the referred methodology by the road sector in Brazil. The article explores the origin of LCA in road pavements and the details linked to its implementation from the perspective of the four main phases of the study (goal and scope definition, inventory analysis, impact assessment, and interpretation). Finally, the main advances and deficiencies observed in the selected studies are gathered, with the proposition of research fields that can be explored in future national or international studies of LCA of road pavements.

Keywords: Brazil, life cycle assessment, road pavements, sustainable

Procedia PDF Downloads 79
3867 Co-Factors of Hypertension and Decomposition of Inequalities in Its Prevalence in India: Evidence from NFHS-4

Authors: Ayantika Biswas

Abstract:

Hypertension still remains one of the most important preventable contributors to adult mortality and morbidity and a major public health challenge worldwide. Studying regional and rural-urban differences in prevalence and assessment of the contributions of different indicators is essential in determining the drivers of this condition. The 2015-16 National Family Health Survey data has been used for the study. Bivariate analysis, multinomial regression analysis, concentration indices and decomposition of concentration indices assessing contribution of factors has been undertaken in the present study. An overall concentration index of 0.003 has been found for hypertensive population, which shows its concentration among the richer wealth quintiles. The contribution of factors like age 45 to 49 years, years of schooling between 5 to 9 years are factors that are important contributors to inequality in hypertension occurrence. Studies should be conducted to find approaches to prevent or delay the onset of the condition.

Keywords: hypertension, decomposition, inequalities, India

Procedia PDF Downloads 139
3866 The Gender Criteria of Film Criticism: Creating the ‘Big’, Avoiding the Important

Authors: Eleni Karasavvidou

Abstract:

Social and anthropological research, parallel to Gender Studies, highlighted the relationship between social structures and symbolic forms as an important field of interaction and recording of 'social trends.' Since the study of representations can contribute to the understanding of the social functions and power relations, they encompass. This ‘mirage,’ however, has not only to do with the representations themselves but also with the ways they are received and the film or critical narratives that are established as dominant or alternative. Cinema and the criticism of its cultural products are no exception. Even in the rapidly changing media landscape of the 21st century, movies remain an integral and widespread part of popular culture, making films an extremely powerful means of 'legitimizing' or 'delegitimizing' visions of domination and commonsensical gender stereotypes throughout society. And yet it is film criticism, the 'language per se,' that legitimizes, reinforces, rewards and reproduces (or at least ignores) the stereotypical depictions of female roles that remain common in the realm of film images. This creates the need for this issue to have emerged (also) in academic research questioning gender criteria in film reviews as part of the effort for an inclusive art and society. Qualitative content analysis is used to examine female roles in selected Oscar-nominated films against their reviews from leading websites and newspapers. This method was chosen because of the complex nature of the depictions in the films and the narratives they evoke. The films were divided into basic scenes depicting social functions, such as love and work relationships, positions of power and their function, which were analyzed by content analysis, with borrowings from structuralism (Gennette) and the local/universal images of intercultural philology (Wierlacher). In addition to the measurement of the general ‘representation-time’ by gender, other qualitative characteristics were also analyzed, such as: speaking time, sayings or key actions, overall quality of the character's action in relation to the development of the scenario and social representations in general, as well as quantitatively (insufficient number of female lead roles, fewer key supporting roles, relatively few female directors and people in the production chain and how they might affect screen representations. The quantitative analysis in this study was used to complement the qualitative content analysis. Then the focus shifted to the criteria of film criticism and to the rhetorical narratives that exclude or highlight in relation to gender identities and functions. In the criteria and language of film criticism, stereotypes are often reproduced or allegedly overturned within the framework of apolitical "identity politics," which mainly addresses the surface of a self-referential cultural-consumer product without connecting it more deeply with the material and cultural life. One of the prime examples of this failure is the Bechtel Test, which tracks whether female characters speak in a film regardless of whether women's stories are represented or not in the films analyzed. If perceived unbiased male filmmakers still fail to tell truly feminist stories, the same is the case with the criteria of criticism and the related interventions.

Keywords: representations, context analysis, reviews, sexist stereotypes

Procedia PDF Downloads 84
3865 Engineering Graduates' Employability in the Eyes of Stakeholders: Based on the Survey to 6 Universities and 20 Enterprises in China

Authors: Cui Jun

Abstract:

By surveying 536 engineering graduates and 232 employers of 6 research-based universities and 20 enterprises in China, this research aims to reveal the perceptions and expectations of engineering curriculum and graduates’ employability by stakeholders. Variation was seen by university and sometimes by engineering major. Overall, however, the satisfaction with courses that promote employability is not high by graduates, and there is a gap between employers’ satisfaction and their expectation. Importantly, students’ satisfaction degree of the curricula enhancing employability and employers’ satisfaction degree of graduates’ employability are significantly lower than employers’ expectation value. Therefore, engineering curriculum reform must take the stakeholders’ demand into account and integrate employability into curricula. These findings provide the empirical basis for the curriculum reform of the National Excellent Engineers Education Program (NE3P) in China.

Keywords: engineering education, employability of graduates, stakeholders, survey

Procedia PDF Downloads 376
3864 Assessing of Social Comfort of the Russian Population with Big Data

Authors: Marina Shakleina, Konstantin Shaklein, Stanislav Yakiro

Abstract:

The digitalization of modern human life over the last decade has facilitated the acquisition, storage, and processing of data, which are used to detect changes in consumer preferences and to improve the internal efficiency of the production process. This emerging trend has attracted academic interest in the use of big data in research. The study focuses on modeling the social comfort of the Russian population for the period 2010-2021 using big data. Big data provides enormous opportunities for understanding human interactions at the scale of society with plenty of space and time dynamics. One of the most popular big data sources is Google Trends. The methodology for assessing social comfort using big data involves several steps: 1. 574 words were selected based on the Harvard IV-4 Dictionary adjusted to fit the reality of everyday Russian life. The set of keywords was further cleansed by excluding queries consisting of verbs and words with several lexical meanings. 2. Search queries were processed to ensure comparability of results: the transformation of data to a 10-point scale, elimination of popularity peaks, detrending, and deseasoning. The proposed methodology for keyword search and Google Trends processing was implemented in the form of a script in the Python programming language. 3. Block and summary integral indicators of social comfort were constructed using the first modified principal component resulting in weighting coefficients values of block components. According to the study, social comfort is described by 12 blocks: ‘health’, ‘education’, ‘social support’, ‘financial situation’, ‘employment’, ‘housing’, ‘ethical norms’, ‘security’, ‘political stability’, ‘leisure’, ‘environment’, ‘infrastructure’. According to the model, the summary integral indicator increased by 54% and was 4.631 points; the average annual rate was 3.6%, which is higher than the rate of economic growth by 2.7 p.p. The value of the indicator describing social comfort in Russia is determined by 26% by ‘social support’, 24% by ‘education’, 12% by ‘infrastructure’, 10% by ‘leisure’, and the remaining 28% by others. Among 25% of the most popular searches, 85% are of negative nature and are mainly related to the blocks ‘security’, ‘political stability’, ‘health’, for example, ‘crime rate’, ‘vulnerability’. Among the 25% most unpopular queries, 99% of the queries were positive and mostly related to the blocks ‘ethical norms’, ‘education’, ‘employment’, for example, ‘social package’, ‘recycling’. In conclusion, the introduction of the latent category ‘social comfort’ into the scientific vocabulary deepens the theory of the quality of life of the population in terms of the study of the involvement of an individual in the society and expanding the subjective aspect of the measurements of various indicators. Integral assessment of social comfort demonstrates the overall picture of the development of the phenomenon over time and space and quantitatively evaluates ongoing socio-economic policy. The application of big data in the assessment of latent categories gives stable results, which opens up possibilities for their practical implementation.

Keywords: big data, Google trends, integral indicator, social comfort

Procedia PDF Downloads 200
3863 Development of Under Water Autonomous Vertical Profiler: Unique Solution to Oceanographic Studies

Authors: I. K. Sharma

Abstract:

Over the years world over system are being developed by research labs continuously monitor under water parameters in the coastal waters of sea such as conductivity, salinity, pressure, temperature, chlorophyll and biological blooms at different levels of water column. The research institutions have developed profilers which are launched by ship connected through cable, glider type profilers following underwater trajectory, buoy any driven profilers, wire guided profilers etc. In all these years, the effect was to design autonomous profilers with no cable quality connection, simple operation and on line date transfer in terms accuracy, repeatability, reliability and consistency. Hence for the Ministry of Communication and Information Technology, India sponsored research project to National Institute of Oceanography, GOA, India to design and develop autonomous vertical profilers, it has taken system and AVP has been successfully developed and tested.

Keywords: oceanography, water column, autonomous profiler, buoyancy

Procedia PDF Downloads 399
3862 The Role of Access Control Techniques in Creating a Safe Cyberspace for Children

Authors: Sara Muslat Alsahali, Nout Mohammed Alqahtani

Abstract:

Digital technology has changed the world, and with the increasing number of children accessing the Internet, it has now become an integral part of children's lives from their early years. With the rapid development of digital technology, the risks children face on the internet also evolve from cyberbullying to misuse, sexual exploitation, and abuse of their private information over the Internet. Digital technology, with its advantages and disadvantages, is now a fact of our life. Therefore, knowledge of how to reduce its risks and maximize its benefits will help shape the growth and future of a new generation of digital citizens. This paper will discuss access control techniques that help to create secure cyberspace where children can be safe without depriving them of their rights and freedom to use the internet and preventing them from its benefits. Also, it sheds light on its challenges and problems by classifying the methods of parental controlling into two possibilities asynchronous and synchronous techniques and choosing YouTube as a case study of access control techniques.

Keywords: access control, cyber security, kids, parental monitoring

Procedia PDF Downloads 137
3861 Improving Cyber Resilience in Mobile Field Hospitals: Towards an Assessment Model

Authors: Nasir Baba Ahmed, Nicolas Daclin, Marc Olivaux, Gilles Dusserre

Abstract:

The Mobile field hospital is critical in terms of managing emergencies in crisis. It is a sub-section of the main hospitals and the health sector, tasked with delivering responsive, immediate, and efficient medical services during a crisis. With the aim to prevent further crisis, the assessment of the cyber assets follows different methods, to distinguish its strengths and weaknesses, and in turn achieve cyber resiliency. The work focuses on assessments of cyber resilience in field hospitals with trends growing in both the field hospital and the health sector in general. This creates opportunities for the adverse attackers and the response improvement objectives for attaining cyber resilience, as the assessments allow users and stakeholders to know the level of risks with regards to its cyber assets. Thus, the purpose is to show the possible threat vectors which open up opportunities, with contrast to current trends in the assessment of the mobile field hospitals’ cyber assets.

Keywords: assessment framework, cyber resilience, cyber security, mobile field hospital

Procedia PDF Downloads 158
3860 Nutrition and Food Safety as Strategic Assets

Authors: Daniel C. S. Lim, W. Y. Tan

Abstract:

The world is facing a growing food crisis. The concerns of food nutritional value, food safety and food security are becoming increasingly real. There is also a direct relationship to the risk of diseases, particularly chronic diseases, to the food we consume. So, there are increasing concerns about the modern day food ecosystem creating foods that can provide the nutritional components for organ function sustenance, as well as, taking a serious view on diet-related diseases. This paper addresses some of the above concerns and gives an overview of the current global situation relating to food nutrition and safety. The paper reviews nutritional aspects of food today compared to those of the last century, compares whole foods found in supermarkets versus those organically grown, as well as population behaviour towards food choices. It provides scientific insights into the effects of some of the global trends such as climate change and other changes environmental changes, and presents what individuals and corporations are doing to use the latest nutritional technologies as strategic assets. Finally, it briefly highlights some of the innovative solutions that are being applied to address several of the above concerns.

Keywords: food crisis, food safety, global trends, nutritional aspects

Procedia PDF Downloads 388
3859 New Media and the Personal Vote in General Elections: A Comparison of Constituency Level Candidates in the United Kingdom and Japan

Authors: Sean Vincent

Abstract:

Within the academic community, there is a consensus that political parties in established liberal democracies are facing a myriad of organisational challenges as a result of falling membership, weakening links to grass-roots support and rising voter apathy. During the same period of party decline and growing public disengagement political parties have become increasingly professionalised. The professionalisation of political parties owes much to changes in technology, with television becoming the dominant medium for political communication. In recent years, however, it has become clear that a new medium of communication is becoming utilised by political parties and candidates – New Media. New Media, a term hard to define but related to internet based communication, offers a potential revolution in political communication. It can be utilised by anyone with access to the internet and its most widely used platforms of communication such as Facebook and Twitter, are free to use. The advent of Web 2.0 has dramatically changed what can be done with the Internet. Websites now allow candidates at the constituency level to fundraise, organise and set out personalised policies. Social media allows them to communicate with supporters and potential voters practically cost-free. As such candidate dependency on the national party for resources and image now lies open to debate. Arguing that greater candidate independence may be a natural next step in light of the contemporary challenges faced by parties, this paper examines how New Media is being used by candidates at the constituency level to increase their personal vote. The paper will present findings from research carried out during two elections – the Japanese Lower House election of 2014 and the UK general election of 2015. During these elections a sample of candidates, totalling 150 candidates, from the three biggest parties in each country were selected and their new media output, specifically candidate websites, Twitter and Facebook output subjected to content analysis. The analysis examines how candidates are using new media to both become more functionally, through fundraising and volunteer mobilisation and politically, through the promotion of personal/local policies, independent from the national party. In order to validate the results of content analysis this paper will also present evidence from interviews carried out with 17 candidates that stood in the 2014 Japanese Lower House election or 2015 UK general election. With a combination of statistical analysis and interviews, several conclusions can be made about the use of New Media at constituency level. The findings show not just a clear difference in the way candidates from each country are using New Media but also differences within countries based upon the particular circumstances of each constituency. While it has not yet replaced traditional methods of fundraising and activist mobilisation, New Media is also becoming increasingly important in campaign organisation and the general consensus amongst candidates is that its importance will continue to grow along as politics in both countries becomes more diffuse.

Keywords: political campaigns, elections, new media, political communication

Procedia PDF Downloads 226