Search results for: secret message
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 461

Search results for: secret message

161 Relationship between ICTs Application with Production and Protection Technology: Lesson from Rural Punjab-Pakistan

Authors: Tahir Munir Butt, Gao Qijie, Babar Shahbaz, Muhammad Zakaria Yousaf Hassan, Zhnag Chuanhong

Abstract:

The main objective of this paper is to identify the relationship between Information Communication Technology (ICTs) applications with Agricultural development in the process of communication at rural Punjab-Pakistan. The authors analyzed the relationship of ICTs applications with the most prominent factor for the Agricultural Information Services (AIS) in the Agricultural Extension Approaches (AEA). The data collection procedure was started from Jan. 2015 and completed in July 2015. It is the one of the part in PhD studies at China Agriculture, University Hadian-Beijng China. It was observed that on major constraint in the AIS disseminated was the limited number of farmers especially and unknown the farmers about new ICTs technology for Agriculture at rural areas. Majority of ICTs application e.g. Toll free number; Robo Calls; Text message was highly significances in the AIS approach. The recommendation is communication and capacity building one of the indispensable elements for sustainable and agricultural development and Agricultural extension should be provided training to farmer about new ICTs technologies to access and use of it for Sustainable Agriculture Development (SAD) and update the scenario of flow of information also with try to established ICTs hub at the village level.

Keywords: ICTs, AEA, AIS, SAD, rural farmers

Procedia PDF Downloads 301
160 Jesus’ Approach in Liberation of the Poor, Luke 4:18-19: Lesson for Nigerian Leaders

Authors: Aboekwe, Mary Emilia

Abstract:

Jesus’ mission was not only a religious one but had social and political implications. From the birth to the death of Jesus, God’s message of liberation is proclaimed in and through Jesus. This work studied Jesus’ inaugural mission in Luke 4: 18 -19 in the context of Nigerian leaders. A theological interpretation was adopted and it was discovered that Luke 4: 18-19 unfolded Jesus’ mission statement. This mission statement centered in preaching the good news to the poor, the release of the captives, healing the sick, liberation to the oppressed, and favour and abundance in the land. Related to the Jewish-Roman world of Jesus and the Nigerian nation, it was discovered that most of the maladies enumerated in Jesus’ inaugural mission statement were prevalent in Nigerian society. Maladies like poverty, oppression, violence, sickness and diseases are widespread in Nigeria. Poverty affects all, irrespective of gender, religion, or ethnicity. There is insecurity everywhere. Unemployment bites harder on Nigeria’s youthful population, and they are unable to find a job at the prevailing wage rate. To this effect, therefore, this study proposes Jesus’ liberative technique as a solution to these maladies prevalent in the country. The work equally challenged the Nigerian leaders to emulate Jesus’ mission statement and take proactive measures in fighting against these social challenges resident in Nigeria today.

Keywords: liberation, leadership, maladies, poverty

Procedia PDF Downloads 77
159 Toxic Masculinity as Dictatorship: Gender and Power Struggles in Tomás Eloy Martínez´s Novels

Authors: Mariya Dzhyoyeva

Abstract:

In the present paper, I examine manifestations of toxic masculinity in the novels by Tomás Eloy Martínez, a post-Boom author, journalist, literary critic, and one of the representatives of the Argentine writing diaspora. I focus on the analysis of Martínez´s characters that display hypermasculine traits to define the relationship between toxic masculinity and power, including the power of authorship and violence as they are represented in his novels. The analysis reveals a complex network in which gender, power, and violence are intertwined and influence and modify each other. As the author exposes toxic masculine behaviors that generate violence, he looks to undermine them. Departing from M. Kimmel´s idea of masculinity as homophobia, I examine how Martínez “outs” his characters by incorporating into the narrative some secret, privileged sources that provide alternative accounts of their otherwise hypermasculine lives. These background stories expose their “weaknesses,” both physical and mental, and thereby feminize them in their own eyes. In a similar way, the toxic masculinity of the fictional male author that wields his power by abusing the written word as he abuses the female character in the story is exposed as a complex of insecurities accumulated by the character due to his childhood trauma. The artistic technique that Martínez uses to condemn the authoritarian male behavior is accessing his subjectivity and subverting it through a multiplicity of identities. Martínez takes over the character’s “I” and turns it into a host of pronouns with a constantly shifting point of reference that distorts not only the notions of gender but also the very notion of identity. In doing so, he takes the character´s affirmation of masculinity to the limit where the very idea of it becomes unsustainable. Viewed in the context of Martínez´s own exilic story, the condemnation of toxic masculine power turns into the condemnation of dictatorship and authoritarianism.

Keywords: gender, masculinity., toxic masculinity, authoritarian, Argentine literature, Martínez

Procedia PDF Downloads 71
158 Gender Identify and Agency of Traumatized Subjects in Incestuous Family

Authors: Jenyu Peng

Abstract:

Incestuous abuse can be considered a form of domestic violence that exemplifies gender inequality. It challenges the common image of home as “haven of safety”. In Taiwan, even after years of feminist NGOs’ effort to encourage victims to speak up, the shared cultural representations of family, still praising piety towards the parents, seem to keep the incest trauma in secret. As clinical practitioners have observed, most devastating psychological sequels of incest trauma are often related to silencing. Thus one can expect that in families centered cultures, the difficulties for victims to disclose are greater, and the traumatic consequences more severe. This poses crucial therapeutic issues for clinicians working in those cultures. Since 2009, the author, a trained psychoanalyst and researcher, has been conducting “clinical fieldwork” on incest trauma in Taiwan. Employing ethnographical method, our theoretical references are both psychoanalytical and anthropological. The necessity of interdisciplinary efforts in incest trauma research will be addressed and discussed. The analyses of the present paper will focus on five incestuous families: four Han families, and one aboriginal. Although Taiwanese aboriginal peoples have been pretty much sinicized since decades, it is worth observing the convergent and divergent aspects in these two cultures. Moreover, findings of a previous research conducted in France during 2002-2004 will serve as background for the purpose of comparison. The results will be presented along with three questions: 1) How the perception of family influences the process of disclosure? 2) How the incestuous experience comes into play with victims’ gender identity and sexuality, pivotal for the subjectification? 3) How victims more successful in gendered subjectification modify their dynamics with their traumatizing family? This research finds that most victims tend to defend their own incestuous families, and that victims’ subjectivity and agency are actually entangled in the power structure of incestuous family.

Keywords: incestuous family, subjectification, gender identity, agency

Procedia PDF Downloads 352
157 Diplomatic Assurances in International Law

Authors: William Thomas Worster

Abstract:

Diplomatic assurances issued by states declaring that they will not mistreat individuals returned to them occupy a strange middle ground between being legal and non-legal obligations. States assert that they are non-binding, yet at other times that they are binding. However, this assertion may not be the end of the discussion. The International Court of Justice and other tribunals have concluded that similar instruments were binding, states have disagreed that certain similar instruments were binding, and the Vienna Convention on the Law of Treaties and its travaux prépératoires do not appear to contemplate non-binding instruments. This paper is a case study of diplomatic assurances but, by necessity, touches on the delicate question of whether certain texts are treaties, promises, or non-binding political statements. International law, and law in general, requires a binary approach to obligation. All communications must be binding or not, even if the fit is not precise. Through this study, we will find that some of the obligations in certain assurances can be understood as legal and some not. We will attempt to state the current methodology for determining which obligations are legal under the law of treaties and law on binding unilateral promises. The paper begins with some background of the legal environment of diplomatic assurances and their use in cases of expulsion. The paper then turns to discuss the legal nature of diplomatic assurances, proceeding to address various possibilities for legal value as treaties and as binding unilateral statements. This paper will not examine the legal value of diplomatic assurances solely under customary international law other than the way in which customary international law might further refine the treaty definition. In order to identify whether any assurances are contained in legal acts, this study identifies a pool of relevant assurances and qualitatively analyzes whether any of those are contained in treaties or binding unilateral statements. To the author’s best knowledge, this study is the first large-scale, qualitative qualitative analysis of assurances as a group of instruments that accounts for their heterogenous nature. It is also the first study to identify the indicators of whether an instrument is a treaty or promise.

Keywords: diplomatic assurances, deportation, extradition, expulsion, non-refoulement, torture, persecution, death penalty, human rights, memorandum of understanding, promises, secret, monitoring, compliance, enforcement

Procedia PDF Downloads 90
156 Exploring the Use of Adverbs in Two Young Learners Written Corpora

Authors: Chrysanthi S. Tiliakou, Katerina T. Frantzi

Abstract:

Writing has always been considered a most demanding skill for English as a Foreign Language learners as well as for native speakers. Novice foreign language writers are asked to handle a limited range of vocabulary to produce writing tasks at lower levels. Adverbs are the parts of speech that are not used extensively in the early stages of English as a Foreign Language writing. An additional problem with learning new adverbs is that, next to learning their meanings, learners are expected to acquire the proper placement of adverbs in a sentence. The use of adverbs is important as they enhance “expressive richness to one’s message”. By exploring the patterns of use of adverbs, researchers and educators can identify types of adverbs, which appear more taxing for young learners or that puzzle novice English as a Foreign Language writers with their placement, and focus on their teaching. To this end, the study examines the use of adverbs on two written Corpora of young learners of English of A1 – A2 levels and determines the types of adverbs used, their frequencies, problems in their use, and whether there is any differentiation between levels. The Antconc concordancing tool was used for the Greek Learner Corpus, and the Corpuscle concordancing tool for the Norwegian Corpus. The research found a similarity in the normalized frequencies of the adverbs used in the A1-A2 level Greek Learner Corpus with the frequencies of the same adverbs in the Norwegian Learner Corpus.

Keywords: learner corpora, young learners, writing, use of adverbs

Procedia PDF Downloads 93
155 Investigating Message Timing Side Channel Attacks on Networks on Chip with Ring Topology

Authors: Mark Davey

Abstract:

Communications on a Network on Chip (NoC) produce timing information, i.e., network injection delays, packet traversal times, throughput metrics, and other attributes relating to the traffic being sent across the chip. The security requirements of a platform encompass each node to operate with confidentiality, integrity, and availability (ISO 27001). Inherently, a shared NoC interconnect is exposed to analysis of timing patterns created by contention for the network components, i.e., links and switches/routers. This phenomenon is defined as information leakage, which represents a ‘side channel’ of sensitive information that can be correlated to platform activity. The key algorithm presented in this paper evaluates how an adversary can control two platform neighbouring nodes of a target node to obtain sensitive information about communication with the target node. The actual information obtained is the period value of a periodic task communication. This enacts a breach of the expected confidentiality of a node operating in a multiprocessor platform. An experimental investigation of the side channel is undertaken to judge the level and significance of inferred information produced by access times to the NoC. Results are presented with a series of expanding task set scenarios to evaluate the efficacy of the side channel detection algorithm as the network load increases.

Keywords: embedded systems, multiprocessor, network on chip, side channel

Procedia PDF Downloads 73
154 Exploring the Role of Humorous Dialogues in Advertisements of Pakistani Network Companies: Analysis of Discourses through Multi-Modal Critical Approach

Authors: Jane E. Alam Solangi

Abstract:

The contribution of the study is to explore the important part of humorous dialogues in cellular network advertisements. This promotes the message of valuable construction and promotion of network companies in Pakistan that employ different and broad techniques to give promotion to selling products. It merely instigates the consumers to buy it. The results of the study after analysis of its collected data gives a vision that advertisers of network advertisements use humorous dialogues as a significant device to the greater level. The source of entertainment in the advertisement is accompanied by the texts and humorous discourses to influence buying decisions of the consumers. Therefore, it tends to neutralize personal and social based values. The earlier contribution of scholars presented that the technical employment of humorous devices leads to the successful market of the relevant products. In order to analyze the humorous discourse devices, the approach of multi-modality of Fairclough (1989) is used. It is accompanied by the framework of Kress and van Leeuwen’s (1996). It analyzes the visual graph of the grammar. The overall findings in the study verified the role of humorous devices in the captivation of consumers’ decision to buy the product that interests them. Therefore, the role of humor acts as a breaker of the monotonous rhythm of advertisements.

Keywords: advertisements, devices, humorous, multi-modality, networks, Pakistan

Procedia PDF Downloads 106
153 A Group Setting of IED in Microgrid Protection Management System

Authors: Jyh-Cherng Gu, Ming-Ta Yang, Chao-Fong Yan, Hsin-Yung Chung, Yung-Ruei Chang, Yih-Der Lee, Chen-Min Chan, Chia-Hao Hsu

Abstract:

There are a number of distributed generations (DGs) installed in microgrid, which may have diverse path and direction of power flow or fault current. The overcurrent protection scheme for the traditional radial type distribution system will no longer meet the needs of microgrid protection. Integrating the intelligent electronic device (IED) and a supervisory control and data acquisition (SCADA) with IEC 61850 communication protocol, the paper proposes a microgrid protection management system (MPMS) to protect power system from the fault. In the proposed method, the MPMS performs logic programming of each IED to coordinate their tripping sequence. The GOOSE message defined in IEC 61850 is used as the transmission information medium among IEDs. Moreover, to cope with the difference in fault current of microgrid between grid-connected mode and islanded mode, the proposed MPMS applies the group setting feature of IED to protect system and robust adaptability. Once the microgrid topology varies, the MPMS will recalculate the fault current and update the group setting of IED. Provided there is a fault, IEDs will isolate the fault at once. Finally, the Matlab/Simulink and Elipse Power Studio software are used to simulate and demonstrate the feasibility of the proposed method.

Keywords: IEC 61850, IED, group Setting, microgrid

Procedia PDF Downloads 463
152 Computer Assisted Strategies Help to Pharmacist

Authors: Komal Fizza

Abstract:

All around the world in every field professionals are taking great support from their computers. Computer assisted strategies not only increase the efficiency of the professionals but also in case of healthcare they help in life-saving interventions. The background of this current research is aimed towards two things; first to find out if computer assisted strategies are useful for Pharmacist for not and secondly how much these assist a Pharmacist to do quality interventions. Shifa International Hospital is a 500 bedded hospital, and it is running Antimicrobial Stewardship, during their stewardship rounds pharmacists observed that a lot of wrong doses of antibiotics were coming at times those were being overlooked by the other pharmacist even. So, with the help of MIS team the patients were categorized into adult and peads depending upon their age. Minimum and maximum dose of every single antibiotic present in the pharmacy that could be dispensed to the patient was developed. These were linked to the order entry window. So whenever pharmacist would type any order and the dose would be below or above the therapeutic limit this would give an alert to the pharmacist. Whenever this message pop-up this was recorded at the back end along with the antibiotic name, pharmacist ID, date, and time. From 14th of January 2015 and till 14th of March 2015 the software stopped different users 350 times. Out of this 300 were found to be major errors which if reached to the patient could have harmed them to the greater extent. While 50 were due to typing errors and minor deviations. The pilot study showed that computer assisted strategies can be of great help to the pharmacist. They can improve the efficacy and quality of interventions.

Keywords: antibiotics, computer assisted strategies, pharmacist, stewardship

Procedia PDF Downloads 491
151 Ice Breakers: A Tool for Esl Learners

Authors: Nazia Shehzad

Abstract:

An icebreaker is a facilitation exercise intended to help a group to begin the process of forming themselves into a team. Icebreakers are commonly presented as a game to ‘warm up’ the group by helping the members to get to know each other. They often focus on sharing personal information such as names, hobbies, etc. Challenging icebreakers also have the ability to allow a group to be better prepared to complete its assigned tasks. For example, if the team's objective is to redesign a business process such as Accounts Payable, the icebreaker activity might take the team through a process analysis. The analysis could include the identification of failure points, challenging assumptions, and development of new solutions — all in a simpler and ‘safer’ setting where the team can practice the group dynamics which they will use to solve the assigned problem. Icebreakers help establish a positive environment and provide an opportunity for students to get to know one another and the instructor. Both are critical to the retention and success of students. There are a number of benefits of using ice-breakers activities in the classroom. It reduces both student and instructor anxiety prior to introducing the course, fosters in a powerful way both student-student and faculty-student interactions. It creates an environment where the learner is expected to participate and the instructor is willing to listen, actively engage students from the onset. It conveys the message that the instructor cares about getting to know the students and makes it easier for students to form relationships early in the semester so they can work together both in and out of class.

Keywords: actively engages students, facilitation exercise, faculty- student interactions, group dynamics, warm up

Procedia PDF Downloads 351
150 Communication Aesthetics of Techno-Scenery and Lighting in Bolanle Austen-Peters Queen Moremi the Musical

Authors: Badeji Adebayo John

Abstract:

Technology has immense contribution in every aspect of human endeavor; it has not only made work easier but also provided exhilarating impression in the mind of the people. Theatre is not exempted from the multifaceted influence of technology on phenomenon. Therefore, theatre performances have experienced the excellence of technology in the contemporary era such that audiences have unforgettable experiences after seeing theatre performances. Some of these technological advancements that have amplified the aesthetics of performances in the theatre are techno-scenery (3D mapping) and lighting. In view of this, the objective of this study is to explore how techno-scenery and lighting technologies were used to communicate messages in the performance of Queen Moremi the Musical. In so doing, Participant-Observation Method and Content Analysis are adopted. Berlo’s model of communication is also employed to explain the communicative aesthetics of these theatre technologies in the performance. Techno-scenery and lighting are communication media modifier that facilitates audiences’ comprehension of the messages in the performance of Queen Moremi the Musical. They also create clear motion pictures of the setting which the performers cannot communicate in their acting, dances and singing, to ease the audiences’ decoding of messages that the performers are sending to the audience. Therefore, consistent incorporation of these technologies to theatre performances will facilitate easy flow of communication in-between the performers who are the sender, the message which is the performance and the audience who are the receiver.

Keywords: communication, aesthetics, techno-scenery, lighting, musical

Procedia PDF Downloads 85
149 Design and Realization of Computer Network Security Perception Control System

Authors: El Miloudi Djelloul

Abstract:

Based on analysis on applications by perception control technology in computer network security status and security protection measures, from the angles of network physical environment and network software system environmental security, this paper provides network security system perception control solution using Internet of Things (IOT), telecom and other perception technologies. Security Perception Control System is in the computer network environment, utilizing Radio Frequency Identification (RFID) of IOT and telecom integration technology to carry out integration design for systems. In the network physical security environment, RFID temperature, humidity, gas and perception technologies are used to do surveillance on environmental data, dynamic perception technology is used for network system security environment, user-defined security parameters, security log are used for quick data analysis, extends control on I/O interface, by development of API and AT command, Computer Network Security Perception Control based on Internet and GSM/GPRS is achieved, which enables users to carry out interactive perception and control for network security environment by WEB, E-MAIL as well as PDA, mobile phone short message and Internet. In the system testing, through middle ware server, security information data perception in real time with deviation of 3-5% was achieved; it proves the feasibility of Computer Network Security Perception Control System.

Keywords: computer network, perception control system security strategy, Radio Frequency Identification (RFID)

Procedia PDF Downloads 447
148 Mordechai Vanunu: “The Atomic Spy” as a Nuclear Threat to Discourse in Israeli Society

Authors: Ada Yurman

Abstract:

Using the case of Israeli Atomic Spy Mordechai Vanunu as an example, this study sought to examine social response to political deviance whereby social response can be mobilized in order to achieve social control. Mordechai Vanunu, a junior technician in the Dimona Atomic Research Center, played a normative role in the militaristic discourse while working in the “holy shrine” of the Israeli defense system for many years. At a certain stage, however, Vanunu decided to detach himself from this collective and launched an assault on this top-secret circle. Israeli society in general and the security establishment in particular found this attack intolerable and unforgivable. They presented Vanunu as a ticking time bomb, delegitimized him and portrayed him as “other”. In addition, Israeli enforcement authorities imposed myriad prohibitions and sanctions on Vanunu even after his release from prison – “as will be done to he who desecrates holiness.” Social response to Vanunu at the time of his capture and trial was studied by conducting a content analysis of six contemporary daily newspapers. The analysis focused on use of language and forms of expression. In contrast with traditional content analysis methodology, this study did not just look at frequency of expressions of ideas and terms in the text and covert content; rather, the text was analyzed as a structural whole, and included examination of style, tone and unusual use of imagery, and more, in order to uncover hidden messages within the text. The social response to this case was extraordinarily intense, not only because in this case of political deviance, involving espionage and treason, Vanunu’s actions comprised a real potential threat to the country, but also because of the threat his behavior posed to the symbolic universe of society. Therefore, the response to this instance of political deviance can be seen as being part of a mechanism of social control aiming to protect world view of society as a whole, as well as to punish the criminal.

Keywords: militarism, political deviance, social construction, social control

Procedia PDF Downloads 113
147 A Comparative Analysis of Asymmetric Encryption Schemes on Android Messaging Service

Authors: Mabrouka Algherinai, Fatma Karkouri

Abstract:

Today, Short Message Service (SMS) is an important means of communication. SMS is not only used in informal environment for communication and transaction, but it is also used in formal environments such as institutions, organizations, companies, and business world as a tool for communication and transactions. Therefore, there is a need to secure the information that is being transmitted through this medium to ensure security of information both in transit and at rest. But, encryption has been identified as a means to provide security to SMS messages in transit and at rest. Several past researches have proposed and developed several encryption algorithms for SMS and Information Security. This research aims at comparing the performance of common Asymmetric encryption algorithms on SMS security. The research employs the use of three algorithms, namely RSA, McEliece, and RABIN. Several experiments were performed on SMS of various sizes on android mobile device. The experimental results show that each of the three techniques has different key generation, encryption, and decryption times. The efficiency of an algorithm is determined by the time that it takes for encryption, decryption, and key generation. The best algorithm can be chosen based on the least time required for encryption. The obtained results show the least time when McEliece size 4096 is used. RABIN size 4096 gives most time for encryption and so it is the least effective algorithm when considering encryption. Also, the research shows that McEliece size 2048 has the least time for key generation, and hence, it is the best algorithm as relating to key generation. The result of the algorithms also shows that RSA size 1024 is the most preferable algorithm in terms of decryption as it gives the least time for decryption.

Keywords: SMS, RSA, McEliece, RABIN

Procedia PDF Downloads 165
146 Nuclear Energy: The Reorientations of the French Public Perception

Authors: Aurélia Jandot

Abstract:

With the oil and economic crises which began in the 1970’s, it has progressively appeared necessary to convince the French “general public“ that a use of new energy sources was essential. In this field, nuclear energy represented the future and concentrated lots of hopes. However, the discourse about nuclear energy has progressively seen negative arguments growing in the French media. The gradual changes in the perception of nuclear energy will be studied here through the arguments given in the main French weekly newsmagazines, which had a great impact on the readers, thus on the “general public“, from the 1970’s to the end of the 1980’s. Indeed, to understand better these changes will be taken into account the major international events, the reorientations of the French domestic policy, and the evolutions of the nuclear technology. As this represents a considerable amount of copies and thus of information, will be selected here the main articles which emphasize the “mental images“ aiming to direct the thought of the readers, and which have led the public awareness and acceptance to evolve. From the 1970’s to the end of the 1980’s, two dichotomous trends are in confrontation : one is promoting the perception of the nuclear energy, the other is discrediting it. Moreover, these two trends are organized in two axes. The first axis is about the engineerings evolutions, such as the main French media represent them, with its approximations, its exaggerations, its fictions sometimes. Is added the will to make accessible to the “general public“ some concepts which are quite difficult to understand for the largest number. The second axis rests on the way the major accidents of the period are approached, including those of Three Mile Island and Chernobyl. Thanks to these accidents and because of the international relations evolutions, the ecologist movements and their impacts have progressively grown, with evident consequences on the public perception of nuclear energy and on the way the successive governments can implement new power plants in France. Then, in both cases, over the period considered, the language has changed, as the perceptible objectives of the communication, allowing to discern the deepest intentions of the newsmagazines editing. This is all these changes that will be emphasized, over a period where the nuclear energy technology, to there a field for specialists, bearing mystery and secret, has become a social issue seemingly open to all.

Keywords: social issues, public acceptance, mediatization, discourse changes

Procedia PDF Downloads 292
145 Fuzzy Logic Modeling of Evaluation the Urban Skylines by the Entropy Approach

Authors: Murat Oral, Seda Bostancı, Sadık Ata, Kevser Dincer

Abstract:

When evaluating the aesthetics of cities, an analysis of the urban form development depending on design properties with a variety of factors is performed together with a study of the effects of this appearance on human beings. Different methods are used while making an aesthetical evaluation related to a city. Entropy, in its preliminary meaning, is the mathematical representation of thermodynamic results. Measuring the entropy is related to the distribution of positional figures of a message or information from the probabilities standpoint. In this study, analysis of evaluation the urban skylines by the entropy approach was modelled with Rule-Based Mamdani-Type Fuzzy (RBMTF) modelling technique. Input-output parameters were described by RBMTF if-then rules. Numerical parameters of input and output variables were fuzzificated as linguistic variables: Very Very Low (L1), Very Low (L2), Low (L3), Negative Medium (L4), Medium (L5), Positive Medium (L6), High (L7), Very High (L8) and Very Very High (L9) linguistic classes. The comparison between application data and RBMTF is done by using absolute fraction of variance (R2). The actual values and RBMTF results indicated that RBMTF can be successfully used for the analysis of evaluation the urban skylines by the entropy approach. As a result, RBMTF model has shown satisfying relation with experimental results, which suggests an alternative method to evaluation of the urban skylines by the entropy approach.

Keywords: urban skylines, entropy, rule-based Mamdani type, fuzzy logic

Procedia PDF Downloads 290
144 The Impact of Political Satire on the Balance of Political Powers in Egypt: The Case of El-Bernameg in Egypt

Authors: Sally Barsoum

Abstract:

This paper is providing a significant insight into the role of satire in Egyptian politics and how it has been received from the government and viewer’s point of view. It mainly sets out to test whether Bassem Youssef’s satirical program has played a significant role in Egypt recent politics and to investigate what is the nature and extent of this role. In order to test this hypothesis, the researcher chose to critically analyze one episode of Bassem Youssef’s satirical show, El Bernameg. This paper goes further to highlight that the aims of satire is to invite citizens to analyze, criticize and question people in power and the realm of politics rather than remain as untouched subjects by combining humor with critique in order to enhance citizens’ political awareness and perhaps even political engagement. Moreover it identifies that Bassem Youssef’s satire is to use laughter as a medium to communicate his political message. By first informing the public and secondly engaging them through laughter, satire plays a very constructive political role, which have been argued finally that Bassem Youssef has indeed played an important part in the Egyptian political scene of today and this can be measured by the degree of censorship that he has been subject to and the level of international and domestic reaction towards his satirical show. At the end, this paper is suggesting that the measure of a strong government is its ability not only to accommodate satire but also to learn from it.

Keywords: political satirist, Bassem Youssef, capital broadcasting center, TV channel, muslims brotherhood regime, ONTV Egyptian TV channel

Procedia PDF Downloads 324
143 A Highly Efficient Broadcast Algorithm for Computer Networks

Authors: Ganesh Nandakumaran, Mehmet Karaata

Abstract:

A wave is a distributed execution, often made up of a broadcast phase followed by a feedback phase, requiring the participation of all the system processes before a particular event called decision is taken. Wave algorithms with one initiator such as the 1-wave algorithm have been shown to be very efficient for broadcasting messages in tree networks. Extensions of this algorithm broadcasting a sequence of waves using a single initiator have been implemented in algorithms such as the m-wave algorithm. However as the network size increases, having a single initiator adversely affects the message delivery times to nodes further away from the initiator. As a remedy, broadcast waves can be allowed to be initiated by multiple initiator nodes distributed across the network to reduce the completion time of broadcasts. These waves initiated by one or more initiator processes form a collection of waves covering the entire network. Solutions to global-snapshots, distributed broadcast and various synchronization problems can be solved efficiently using waves with multiple concurrent initiators. In this paper, we propose the first stabilizing multi-wave sequence algorithm implementing waves started by multiple initiator processes such that every process in the network receives at least one sequence of broadcasts. Due to being stabilizing, the proposed algorithm can withstand transient faults and do not require initialization. We view a fault as a transient fault if it perturbs the configuration of the system but not its program.

Keywords: distributed computing, multi-node broadcast, propagation of information with feedback and cleaning (PFC), stabilization, wave algorithms

Procedia PDF Downloads 505
142 Cultural-Creative Design with Language Figures of Speech

Authors: Wei Chen Chang, Ming Yu Hsiao

Abstract:

The commodity takes one kind of mark, the designer how to construction and interpretation the user how to use the process and effectively convey message in design education has always been an important issue. Cultural-creative design refers to signifying cultural heritage for product design. In terms of Peirce’s Semiotic Triangle: signifying elements-object-interpretant, signifying elements are the outcomes of design, the object is cultural heritage, and the interpretant is the positioning and description of product design. How to elaborate the positioning, design, and development of a product is a narrative issue of the interpretant, and how to shape the signifying elements of a product by modifying and adapting styles is a rhetoric matter. This study investigated the rhetoric of elements signifying products to develop a rhetoric model with cultural style. Figures of speech are a rhetoric method in narrative. By adapting figures of speech to the interpretant, this study developed the rhetoric context of cultural context by narrative means. In this two-phase study, phase I defines figures of speech and phase II analyzes existing cultural-creative products in terms of figures of speech to develop a rhetoric of style model. We expect it can reference for the future development of Cultural-creative design.

Keywords: cultural-creative design, cultural-creative products, figures of speech, Peirce’s semiotic triangle, rhetoric of style model

Procedia PDF Downloads 373
141 Changing Patterns of Marriage and Sexual Relations among Young Single Female Workers in Garment Factories in Gazipur, Bangladesh

Authors: Runa Laila

Abstract:

In Bangladesh, migration and employment opportunities in the ready-made garment factories presented an alternative to early and arranged-marriage to many young women from the countryside. Although the positive impact of young women’s labour migration and employment in the garment industry on economic independence, increased negotiation power, and enhancement of self-esteem have been well documented, impact of employment on sexual norms and practices remained under-researched. This ethnographic study comprising of an in-depth interview of 21 single young women working in various garment factories in Gazipur, Dhaka, explores the implication of work on sexual norms and practices. This study found young single garment workers experience a range of consensual and coercive sexual relations. The mixed-sex work environment in the garment manufacturing industry and private housing arrangements provide young single women opportunities to develop romantic and sexual relationships in the transient urban space, which was more restricted in the rural areas. The use of mobile phones further aids lovers to meet in amusement parks, friends’ houses, or residential hotels beyond the gaze of colleagues and neighbors. Due to sexual double standard, men’s sexual advantage is seen as natural and accepted, while women are being blamed as immoral for being engaged in pre-marital sex. Although self-choice marriage and premarital relations reported to be common among garment workers, stigma related to premarital sex lead young single women to resort to secret abortion practices. Married men also use power position to lure women in a subordinate position in coerce sexual relations, putting their reproductive and psychological health at risk. To improve sexual and reproductive health and wellbeing of young female garment workers, it is important to understand these changing sexual practices which otherwise remain taboo in public health discourses.

Keywords: female migration, ready-made garment, reproductive health, sexual practice

Procedia PDF Downloads 187
140 Tattooing: Personal Markings with Meaning: Themes Uncovered While Making a Video Documentary

Authors: Byrad Yyelland, Robert Bianchi

Abstract:

No longer the secret mark of outlaw bikers, criminals, and sailors, tattooing has become mainstream in much of the world. The current study showcases data gathered for a video documentary on the triangulated relationship connecting tattoos as a form of body modification, cultural norms, and personal meanings. This research has revealed that some religious belief systems, Buddhism in Thailand, is one example, connect tattooing with spirituality in an intimate manner. Buddhist monks provide tattoos using traditional bamboo implements and processes, and they pray over the tattoo, infusing magic into the tattoo and consequently, into the body of the receiver. In contrast, although there is no direct mention of tattooing in the Qur’an, many Islamic scholars argue that permanent tattooing is considered haram—forbidden for Muslims. Only the temporary henna is acceptable. In fact, tattooing is illegal in Qatar. Some Indigenous belief systems in Canada adopt a similar stance on the basis that we were all created by the Creator and as such, we do not have the right to alter what the Creator has made. Still other belief systems such as Spiritism in Brazil and mainstream Christianity in the West are more inclined to regard tattooing as a matter of personal choice. It is practically impossible for any culture to resist the dual impacts of time and globalization. Long term cultural change has resulted in mainstream acceptance of tattooing in the west and increased acceptance in Japan. Short-term cultural change is seen in Qatar where tattoos are on on public display amongst expats and migrant laborers. This tolerance of tattooed individuals was clearly evident with the choice of David Beckham as ambassador for the FIFA World Cup and during the corresponding tourist celebrations. Themes uncovered in this multicultural research also include individual meanings attributed to tattoo imagery and processes, experiences of personal empowerment, devotion to family, personal philosophy, gender identity, and aesthetics.

Keywords: culture, norms, tattooing, spirituality, personal motivations and personal meanings

Procedia PDF Downloads 74
139 A Location-based Authentication and Key Management Scheme for Border Surveillance Wireless Sensor Networks

Authors: Walid Abdallah, Noureddine Boudriga

Abstract:

Wireless sensor networks have shown their effectiveness in the deployment of many critical applications especially in the military domain. Border surveillance is one of these applications where a set of wireless sensors are deployed along a country border line to detect illegal intrusion attempts to the national territory and report this to a control center to undergo the necessary measures. Regarding its nature, this wireless sensor network can be the target of many security attacks trying to compromise its normal operation. Particularly, in this application the deployment and location of sensor nodes are of great importance for detecting and tracking intruders. This paper proposes a location-based authentication and key distribution mechanism to secure wireless sensor networks intended for border surveillance where the key establishment is performed using elliptic curve cryptography and identity-based public key scheme. In this scheme, the public key of each sensor node will be authenticated by keys that depend on its position in the monitored area. Before establishing a pairwise key between two nodes, each one of them must verify the neighborhood location of the other node using a message authentication code (MAC) calculated on the corresponding public key and keys derived from encrypted beacon messages broadcast by anchor nodes. We show that our proposed public key authentication and key distribution scheme is more resilient to node capture and node replication attacks than currently available schemes. Also, the achievement of the key distribution between nodes in our scheme generates less communication overhead and hence increases network performances.

Keywords: wireless sensor networks, border surveillance, security, key distribution, location-based

Procedia PDF Downloads 661
138 Language on Skin Whitening Products in Pakistan Promotes Unfair Beauty Standards: A Critical Discourse Analysis

Authors: Azeem Alphonce

Abstract:

In Pakistan, there is a variety of skin tones and colors across all provinces. However, a fair complexion is one of the standards of beauty among females in Pakistan, which creates insecurities in dark-complexioned females. This research is a critical discourse analysis of the language used on beauty products for females in Pakistan. The purpose was to analyze the language used on female beauty products using Van Dijk's three-stage socio-cognitive model to understand what message is received from the few words written and repeated across the packaging of various facial products, why such language is used and what are its wider socio-cognitive effects? The criterion for the selection of beauty products was skin whitening terminologies and the language used on these products. The results showed that over 57 per cent of products utilized skin-whitening terms. The adjectives written on the package indicate that fairer skin is the ultimate beauty goal of females. The analysis explored how the language reinforces unfair beauty standards and perpetuates colorism. It was concluded that female beauty products utilize discriminatory discourse by marginalizing individuals of darker skin tones. Fairer skin is promoted, whereas darker skin is referred to as a problem, flaw or imperfection. Socially shared mental models seem to have caused beauty companies to exploit and promote perceptions of colorism in society. Therefore, such discourse should be prevented, and beauty companies should utilize their discourse to promote acceptance of various skin tones.

Keywords: language, skin whitening products, beauty standards, social mental models

Procedia PDF Downloads 73
137 Aspects of the Promotional Language of Tourism in Social Media. A Case Study of Romanian Accommodation Industry

Authors: Sanda-Maria Ardeleanu, Ana Crăciunescu

Abstract:

This paper is sustained by our previous research on discursive strategies, whichdemonstrated that tourismhas developed and employed apromotional languageper se. We have studied this concept within the framework of audio-visual advertising by analyzing its discursive structures at the level of three main strategies (textual, visual, and both textual and visual) and confirmed the applicability of the promotional language per se within the field. Tourism, at large, represents a largely potential interdisplinary field, which allowed us to use qualitative methods of research such as Discourse Analysis (DA). Due to further research which showed that in the third phase of qualitative research methodologies, scholars in tourism recognized semiotics and DA as potential paths to follow, but which were insufficiently explored at the time, we soon realized that the natural next step to take is to bring together common qualitative methodologies for both fields, such as the method of observation, the triangulation, Discourse Analysis, etc. Therefore and in the light of fast transformations of the medium that intermediates the message, in this paper, we are going to focus on the manifestations of the promotional language in social media texts, which advertise for the urban industry of accommodation in Romania. We shall constitute a corpus of study as the basis for our research methodology and, through the empirical method of observation and DA, we propose to recognize or discover new patterns developed at textual (mainly) and visual level or the mix of the two, known as strategies of the promotional language of tourism.

Keywords: discourse analysis, promotional language of tourism, social media, urban accommodation industry, tourism

Procedia PDF Downloads 167
136 Quantum Inspired Security on a Mobile Phone

Authors: Yu Qin, Wanjiaman Li

Abstract:

The widespread use of mobile electronic devices increases the complexities of mobile security. This thesis aims to provide a secure communication environment for smartphone users. Some research proves that the one-time pad is one of the securest encryption methods, and that the key distribution problem can be solved by using the QKD (quantum key distribution). The objective of this project is to design an Android APP (application) to exchange several random keys between mobile phones. Inspired by QKD, the developed APP uses the quick response (QR) code as a carrier to dispatch large amounts of one-time keys. After evaluating the performance of APP, it allows the mobile phone to capture and decode 1800 bytes of random data in 600ms. The continuous scanning mode of APP is designed to improve the overall transmission performance and user experience, and the maximum transmission rate of this mode is around 2200 bytes/s. The omnidirectional readability and error correction capability of QR code gives it a better real-life application, and the features of adequate storage capacity and quick response optimize overall transmission efficiency. The security of this APP is guaranteed since QR code is exchanged face-to-face, eliminating the risk of being eavesdropped. Also, the id of QR code is the only message that would be transmitted through the whole communication. The experimental results show this project can achieve superior transmission performance, and the correlation between the transmission rate of the system and several parameters, such as the QR code size, has been analyzed. In addition, some existing technologies and the main findings in the context of the project are summarized and critically compared in detail.

Keywords: one-time pad, QKD (quantum key distribution), QR code, application

Procedia PDF Downloads 146
135 The Effects of Negative Electronic Word-of-Mouth and Webcare on Thai Online Consumer Behavior

Authors: Pongsatorn Tantrabundit, Lersak Phothong, Ong-art Chanprasitchai

Abstract:

Due to the emergence of the Internet, it has extended the traditional Word-of-Mouth (WOM) to a new form called “Electronic Word-of-Mouth (eWOM).” Unlike traditional WOM, eWOM is able to present information in various ways by applying different components. Each eWOM component generates different effects on online consumer behavior. This research investigates the effects of Webcare (responding message) from product/ service providers on negative eWOM by applying two types of products (search and experience). The proposed conceptual model was developed based on the combination of the stages in consumer decision-making process, theory of reasoned action (TRA), theory of planned behavior (TPB), the technology acceptance model (TAM), the information integration theory and the elaboration likelihood model. The methodology techniques used in this study included multivariate analysis of variance (MANOVA) and multiple regression analysis. The results suggest that Webcare does slightly increase Thai online consumer’s perceptions on perceived eWOM trustworthiness, information diagnosticity and quality. For negative eWOM, we also found that perceived eWOM Trustworthiness, perceived eWOM diagnosticity and quality have a positive relationship with eWOM influence whereas perceived valence has a negative relationship with eWOM influence in Thai online consumers.

Keywords: consumer behavior, electronic word-of-mouth, online review, online word-of-mouth, Thai online consumer, webcare

Procedia PDF Downloads 206
134 Divergences in Interpreters’ Oral Interpretation among Pentecostal Churches: Sermonic Reflections

Authors: Rufus Olufemi Adebayo, Sylvia Phiwani Zulu

Abstract:

Interpreting in the setting of diverse language and multicultural congregants, is often understood as integrating the content of the message. Preaching, similar to any communication, takes seriously people’s multiple contexts. The one who provides the best insight into understanding “the other”, traditionally speaking could be an interpreter in a multilingual context. Nonetheless, there are reflections in the loss of spiritual communication, translation and interpretive dialogue. No matter how eloquent the preacher is, an interpreter can make or mere the sermon (speech). The sermon that the preacher preaches is not always the one the congregation hears from the interpreter. In other occurrences, however, interpreting can lead not only to distort messages but also to dissatisfied audiences and preacher being overshadowed by the pranks of the interpreter. Using qualitative methodology, this paper explores the challenges and the conventional assumptions about preachers’ interpreter as influenced by spirituality, culture, and language in empirical and theoretical perspectives. An emphasis on the bias translation and the basis of reality that suppresses or devalues the spiritual communication is examined. The result indicates that interpretation of the declaration of guilt, history of congregation, spirituality, attitudes, morals, customs, specific practices of a preacher, education, and the environment form an entangled and misinterpretation. The article concludes by re-examining these qualities and rearticulating them into a preliminary theory for practice, as distinguished from theory, which could possibly enhance the development of more sustainable multilingual interpretation in the South African Pentecostal churches.

Keywords: congregants, divergences, interpreting/translation, language & communication, sermon/preaching

Procedia PDF Downloads 166
133 Mitigation of Interference in Satellite Communications Systems via a Cross-Layer Coding Technique

Authors: Mario A. Blanco, Nicholas Burkhardt

Abstract:

An important problem in satellite communication systems which operate in the Ka and EHF frequency bands consists of the overall degradation in link performance of mobile terminals due to various types of degradations in the link/channel, such as fading, blockage of the link to the satellite (especially in urban environments), intentional as well as other types of interference, etc. In this paper, we focus primarily on the interference problem, and we develop a very efficient and cost-effective solution based on the use of fountain codes. We first introduce a satellite communications (SATCOM) terminal uplink interference channel model that is classically used against communication systems that use spread-spectrum waveforms. We then consider the use of fountain codes, with focus on Raptor codes, as our main mitigation technique to combat the degradation in link/receiver performance due to the interference signal. The performance of the receiver is obtained in terms of average probability of bit and message error rate as a function of bit energy-to-noise density ratio, Eb/N0, and other parameters of interest, via a combination of analysis and computer simulations, and we show that the use of fountain codes is extremely effective in overcoming the effects of intentional interference on the performance of the receiver and associated communication links. We then show this technique can be extended to mitigate other types of SATCOM channel degradations, such as those caused by channel fading, shadowing, and hard-blockage of the uplink signal.

Keywords: SATCOM, interference mitigation, fountain codes, turbo codes, cross-layer

Procedia PDF Downloads 362
132 Advancing Strategic Communication through Networking and Mobile Computing: A Framework for Organisational Connectivity

Authors: Daniel Ngusha Chile

Abstract:

In the contemporary digital age, networking and mobile computing have become integral to advancing strategic communication within organisations. The ability to communicate effectively across various platforms and devices has enhanced organisational connectivity, fostering seamless collaboration and improving decision-making processes. This study explores how networking and mobile computing contribute to strategic communication by providing a robust framework for enhancing organisational efficiency and adaptability in dynamic environments. Using a mixed-methods approach, the research combines surveys and interviews with communication professionals to assess the adoption of networking and mobile computing technologies. Quantitative data were analysed to identify patterns in technology utilisation, while qualitative insights from interviews provided a deeper understanding of how these tools shape communication strategies. Case studies of leading organisations further highlight best practices in leveraging mobile computing for strategic objectives. The findings reveal that integrating networking and mobile computing into strategic communication frameworks significantly improves message delivery, real-time collaboration, and accessibility. However, challenges such as cybersecurity threats and technological skill gaps persist, necessitating targeted interventions to maximise these benefits. In conclusion, the study underscores the transformative potential of networking and mobile computing in driving strategic communication. By adopting these technologies, organisations can enhance connectivity, streamline operations, and maintain a competitive edge in an increasingly digital and mobile-centric world.

Keywords: strategic communication, networking, mobile computing, organisational connectivity

Procedia PDF Downloads 4