Search results for: internet language
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 5186

Search results for: internet language

1886 Security Design of Root of Trust Based on RISC-V

Authors: Kang Huang, Wanting Zhou, Shiwei Yuan, Lei Li

Abstract:

Since information technology develops rapidly, the security issue has become an increasingly critical for computer system. In particular, as cloud computing and the Internet of Things (IoT) continue to gain widespread adoption, computer systems need to new security threats and attacks. The Root of Trust (RoT) is the foundation for providing basic trusted computing, which is used to verify the security and trustworthiness of other components. Design a reliable Root of Trust and guarantee its own security are essential for improving the overall security and credibility of computer systems. In this paper, we discuss the implementation of self-security technology based on the RISC-V Root of Trust at the hardware level. To effectively safeguard the security of the Root of Trust, researches on security safeguard technology on the Root of Trust have been studied. At first, a lightweight and secure boot framework is proposed as a secure mechanism. Secondly, two kinds of memory protection mechanism are built to against memory attacks. Moreover, hardware implementation of proposed method has been also investigated. A series of experiments and tests have been carried on to verify to effectiveness of the proposed method. The experimental results demonstrated that the proposed approach is effective in verifying the integrity of the Root of Trust’s own boot rom, user instructions, and data, ensuring authenticity and enabling the secure boot of the Root of Trust’s own system. Additionally, our approach provides memory protection against certain types of memory attacks, such as cache leaks and tampering, and ensures the security of root-of-trust sensitive information, including keys.

Keywords: root of trust, secure boot, memory protection, hardware security

Procedia PDF Downloads 173
1885 Security Analysis of Mod. S Transponder Technology and Attack Examples

Authors: M. Rutkowski, J. Cwiklak, M. Grzegorzewski, M. Adamski

Abstract:

All class A Airplanes have to be equipped with Mod. S transponder for ATC surveillance purposes. This technology was designed to provide a robust and dependable solution to localize, identify and exchange data with the airplane. The purpose of this paper is to analyze potential hazards that are a result of lack of any security or encryption on a design level. Secondary Surveillance Radars rely on an active response from an airplane. SSR radar installation is broadcasting a directional interrogation signal to the planes in range on 1030MHz frequency with DPSK modulation. If the interrogation is correctly received by the transponder located on the plane, a proper answer is sent on 1090MHz with PPM modulation containing plane’s SQUAWK, barometric altitude, GPS coordinates and 24bit unique address code. This technology does not use any kind of encryption. All of the specifications from the previous chapter can be found easily on the internet. Since there is no encryption or security measure to ensure the credibility of the sender and message, it is highly hazardous to use such technology to ensure the safety of the air traffic. The only thing that identifies the airplane is the 24-bit unique address. Most of the planes have been sniffed by aviation enthusiasts and cataloged in web databases. In the moment of writing this article, The PoFung Technologies has announced that they are planning to release all band SDR transceiver – this device would be more than enough to build your own Mod. S Transponder. With fake transponder, a potential terrorist can identify as a different airplane. By replacing the transponder in a poorly controlled airspace, hijackers can enter another airspace identifying themselves as another plane and land in the desired area.

Keywords: flight safety, hijack, mod S transponder, security analysis

Procedia PDF Downloads 281
1884 Designing a Tool for Software Maintenance

Authors: Amir Ngah, Masita Abdul Jalil, Zailani Abdullah

Abstract:

The aim of software maintenance is to maintain the software system in accordance with advancement in software and hardware technology. One of the early works on software maintenance is to extract information at higher level of abstraction. In this paper, we present the process of how to design an information extraction tool for software maintenance. The tool can extract the basic information from old program such as about variables, based classes, derived classes, objects of classes, and functions. The tool have two main part; the lexical analyzer module that can read the input file character by character, and the searching module which is user can get the basic information from existing program. We implemented this tool for a patterned sub-C++ language as an input file.

Keywords: extraction tool, software maintenance, reverse engineering, C++

Procedia PDF Downloads 476
1883 Big Data in Telecom Industry: Effective Predictive Techniques on Call Detail Records

Authors: Sara ElElimy, Samir Moustafa

Abstract:

Mobile network operators start to face many challenges in the digital era, especially with high demands from customers. Since mobile network operators are considered a source of big data, traditional techniques are not effective with new era of big data, Internet of things (IoT) and 5G; as a result, handling effectively different big datasets becomes a vital task for operators with the continuous growth of data and moving from long term evolution (LTE) to 5G. So, there is an urgent need for effective Big data analytics to predict future demands, traffic, and network performance to full fill the requirements of the fifth generation of mobile network technology. In this paper, we introduce data science techniques using machine learning and deep learning algorithms: the autoregressive integrated moving average (ARIMA), Bayesian-based curve fitting, and recurrent neural network (RNN) are employed for a data-driven application to mobile network operators. The main framework included in models are identification parameters of each model, estimation, prediction, and final data-driven application of this prediction from business and network performance applications. These models are applied to Telecom Italia Big Data challenge call detail records (CDRs) datasets. The performance of these models is found out using a specific well-known evaluation criteria shows that ARIMA (machine learning-based model) is more accurate as a predictive model in such a dataset than the RNN (deep learning model).

Keywords: big data analytics, machine learning, CDRs, 5G

Procedia PDF Downloads 124
1882 Narratives and Meta-Narratives in the News of People Killed in 2022 Iranian Protests

Authors: Abbas Rezaei Samarin

Abstract:

In October 2022, protests began following the death of Mahsa Amini and were followed by the deaths of those arrested by Iran's morality police which Iran's official media and foreign Persian-language satellite channels presented to the audience different narratives of how they were killed. These two types of media produced two different and sometimes conflicting narratives when faced with the news of a certain person's death, and the conflict is found between the narratives in some cases. This study has focused on the semiotics of these narratives, the interpretation of discourses supporting the narratives, and finally, their analysis within the framework of narrative theories. In the present study, the researcher has used a qualitative approach and has concluded that the narrative of both types of media is structured around the functions of the existing and ideal political system.

Keywords: narrative, iran, fake news, protests, manipulation of reality

Procedia PDF Downloads 82
1881 Perceived Risks in Business-to-Consumer Online Contracts: An Empirical Study in Saudi Arabia

Authors: Shaya Alshahrani

Abstract:

Perceived risks play a major role in consumer intentions, behaviors, attitudes, and decisions about online shopping in the KSA. This paper investigates the influence of six perceived risk dimensions on Saudi consumers: product risk, information risk, financial risk, privacy and security risk, delivery risk, and terms and conditions risk empirically. To ensure the success of this study, a random survey was distributed to reflect the consumers’ perceived risk and to enable the generalization of the results. Data were collected from 323 respondents in the Kingdom of Saudi Arabia (KSA): 50 who had never shopped online and 273 who had done so. The results indicated that all six risks influenced the respondents’ perceptions of online shopping. The non-online shoppers perceived financial and delivery risks as the most significant barriers to online shopping. This was followed closely by performance, information, and privacy and security risks. Terms and conditions were perceived as less significant. The online consumers considered delivery and performance risks to be the most significant influences on internet shopping. This was followed closely by information and terms and conditions. Financial and privacy and security risks were perceived as less significant. This paper argues that introducing adequate legal solutions to addressing related problems arising from this study is an urgent need. This may enhance consumer trust in the KSA online market, increase consumers’ intentions regarding online shopping, and improve consumer protection.

Keywords: perceived risk, online contracts, Saudi Arabia, consumer protection

Procedia PDF Downloads 132
1880 Psycholinguistic Analysis on Stuttering Treatment through Systemic Functional Grammar in Tom Hooper’s The King’s Speech

Authors: Nurvita Wijayanti

Abstract:

The movie titled The King’s Speech is based on a true story telling an English king suffers from stuttering and how he gets the treatment from the therapist, so that he can reduce the high frequency on stuttering. The treatment uses the unique approach implying the linguistic principles. This study shows how the language works significantly in order to treat the stuttering sufferer using psychological approach. Therefore, the linguistic study is done to analyze the treatment activity. Halliday’s Systemic Functional Grammar is used as the main approach in this study along with qualitative descriptive method. The study finds that the therapist though using the orthodox approach applies the psycholinguistic method to overcome the king’s stuttering.

Keywords: psycholinguistics, stuttering, systemic functional grammar, treatment

Procedia PDF Downloads 235
1879 Big Data Analysis with RHadoop

Authors: Ji Eun Shin, Byung Ho Jung, Dong Hoon Lim

Abstract:

It is almost impossible to store or analyze big data increasing exponentially with traditional technologies. Hadoop is a new technology to make that possible. R programming language is by far the most popular statistical tool for big data analysis based on distributed processing with Hadoop technology. With RHadoop that integrates R and Hadoop environment, we implemented parallel multiple regression analysis with different sizes of actual data. Experimental results showed our RHadoop system was much faster as the number of data nodes increases. We also compared the performance of our RHadoop with lm function and big lm packages available on big memory. The results showed that our RHadoop was faster than other packages owing to paralleling processing with increasing the number of map tasks as the size of data increases.

Keywords: big data, Hadoop, parallel regression analysis, R, RHadoop

Procedia PDF Downloads 421
1878 Digital Storytelling in the ELL Classroom: A Literature Review

Authors: Nicholas Jobe

Abstract:

English Language Learners (ELLs) often struggle in a classroom setting, too embarrassed at their skill level to write or speak in front of peers and too lacking in confidence to practice. Storytelling is an age-old method of teaching that allows learners to remember important details while listening or sharing a narrative. In the modern world, digital storytelling through the use of technological tools such as podcasts and videos allow students to safely interact with each other to build skills in a fun and engaging way that also works as a confidence booster. Specifically using a constructionist approach to learning, digital storytelling allows ELL students to grow and build new and prior knowledge by creating stories via these technological means. Research herein suggests, through the use of case studies and mixed methodologies, that digital storytelling mainly yields positive results for effective learning in an ELL classroom setting.

Keywords: digital storytelling, ELL, narrative, podcast

Procedia PDF Downloads 123
1877 Parallel Querying of Distributed Ontologies with Shared Vocabulary

Authors: Sharjeel Aslam, Vassil Vassilev, Karim Ouazzane

Abstract:

Ontologies and various semantic repositories became a convenient approach for implementing model-driven architectures of distributed systems on the Web. SPARQL is the standard query language for querying such. However, although SPARQL is well-established standard for querying semantic repositories in RDF and OWL format and there are commonly used APIs which supports it, like Jena for Java, its parallel option is not incorporated in them. This article presents a complete framework consisting of an object algebra for parallel RDF and an index-based implementation of the parallel query engine capable of dealing with the distributed RDF ontologies which share common vocabulary. It has been implemented in Java, and for validation of the algorithms has been applied to the problem of organizing virtual exhibitions on the Web.

Keywords: distributed ontologies, parallel querying, semantic indexing, shared vocabulary, SPARQL

Procedia PDF Downloads 185
1876 A Summary-Based Text Classification Model for Graph Attention Networks

Authors: Shuo Liu

Abstract:

In Chinese text classification tasks, redundant words and phrases can interfere with the formation of extracted and analyzed text information, leading to a decrease in the accuracy of the classification model. To reduce irrelevant elements, extract and utilize text content information more efficiently and improve the accuracy of text classification models. In this paper, the text in the corpus is first extracted using the TextRank algorithm for abstraction, the words in the abstract are used as nodes to construct a text graph, and then the graph attention network (GAT) is used to complete the task of classifying the text. Testing on a Chinese dataset from the network, the classification accuracy was improved over the direct method of generating graph structures using text.

Keywords: Chinese natural language processing, text classification, abstract extraction, graph attention network

Procedia PDF Downloads 78
1875 The Experience of Gay Men Using Dating Applications in Their Emerging Adulthood

Authors: Chuang Bing-Kai, Shih Hsiang-Ju

Abstract:

Previous studies showed that emergent adults used dating applications the most since it would satisfy their needs for intimacy. It's also found that those emergent adults were mostly non-heterosexual. What’s more, in this digital era, more and more bisexuals and homosexuals choose to establish connections with others through Internet to seek a sense of belonging. However, studies rarely focused on gay men in their emergent adulthood to explore their experiences of dating applications. The purpose of this study was to explore the experience of gay men using dating applications in their emerging adulthood and to understand their self-presentations and the process of it among different relationships while interacting with others upon using dating applications. The semi-structured interview was conducted with those gay men who aged from 18 to 29, felt attracted to people with same gender physically and mentally, considered themselves homosexual from their subjective understanding and had been using dating applications for more than half a year. Research invitations were distributed with the assistance of social media platforms and LGBTQ+ friends in the community. This study adopted a qualitative research approach and applied hermeneutic phenomenology as the method to analyze the transcripts transcribed from the recorded audio, and to explore their using experiences and self-presentations while interacting with others while using dating apps. It’s expected to find out that there are four stages in the self-presentation process including establishing personal identity, self-exploration and experimentation, exploring shared interest and values, developing and maintaining connections. Plus, gay men’s motives to use dating apps play an important role in this process and thus influence how they position the apps in their life. Through this study, professional workers can better understand gay men’s considerations and strategies in their self-presentation process as well as the impact of using motives.

Keywords: dating applications, emerging adulthood, gay men, hermeneutic phenomenology

Procedia PDF Downloads 36
1874 Associated Map and Inter-Purchase Time Model for Multiple-Category Products

Authors: Ching-I Chen

Abstract:

The continued rise of e-commerce is the main driver of the rapid growth of global online purchase. Consumers can nearly buy everything they want at one occasion through online shopping. The purchase behavior models which focus on single product category are insufficient to describe online shopping behavior. Therefore, analysis of multi-category purchase gets more and more popular. For example, market basket analysis explores customers’ buying tendency of the association between product categories. The information derived from market basket analysis facilitates to make cross-selling strategies and product recommendation system. To detect the association between different product categories, we use the market basket analysis with the multidimensional scaling technique to build an associated map which describes how likely multiple product categories are bought at the same time. Besides, we also build an inter-purchase time model for associated products to describe how likely a product will be bought after its associated product is bought. We classify inter-purchase time behaviors of multi-category products into nine types, and use a mixture regression model to integrate those behaviors under our assumptions of purchase sequences. Our sample data is from comScore which provides a panelist-label database that captures detailed browsing and buying behavior of internet users across the United States. Finding the inter-purchase time from books to movie is shorter than the inter-purchase time from movies to books. According to the model analysis and empirical results, this research finally proposes the applications and recommendations in the management.

Keywords: multiple-category purchase behavior, inter-purchase time, market basket analysis, e-commerce

Procedia PDF Downloads 353
1873 English Loanwords in Nigerian Languages: Sociolinguistic Survey

Authors: Surajo Ladan

Abstract:

English has been in existence in Nigeria since colonial period. The advent of English in Nigeria has caused a lot of linguistic changes in Nigerian languages especially among the educated elites and to some extent, even the ordinary people were not spared from this phenomenon. This scenario has generated a linguistic situation which culminated into the creation of Nigerian Pidgin that are conglomeration of English and other Nigerian languages. English has infiltrated the Nigerian languages to a point that a typical Nigerian can hardly talk without code-switching or using one English word or the other. The existence of English loanwords in Nigerian languages has taken another dimension in this scientific and technological age. Most of scientific and technological inventions are products of English language which are virtually adopted into the languages with phonological, morphological, and sometimes semantic variations. This paper is of the view that there should be a re-think and agitation from Nigerians to protect their languages from the linguistic genocide of English which are invariably facing extinction.

Keywords: linguistic change, loanword, phenomenon, pidgin

Procedia PDF Downloads 823
1872 Hash Based Block Matching for Digital Evidence Image Files from Forensic Software Tools

Authors: M. Kaya, M. Eris

Abstract:

Internet use, intelligent communication tools, and social media have all become an integral part of our daily life as a result of rapid developments in information technology. However, this widespread use increases crimes committed in the digital environment. Therefore, digital forensics, dealing with various crimes committed in digital environment, has become an important research topic. It is in the research scope of digital forensics to investigate digital evidences such as computer, cell phone, hard disk, DVD, etc. and to report whether it contains any crime related elements. There are many software and hardware tools developed for use in the digital evidence acquisition process. Today, the most widely used digital evidence investigation tools are based on the principle of finding all the data taken place in digital evidence that is matched with specified criteria and presenting it to the investigator (e.g. text files, files starting with letter A, etc.). Then, digital forensics experts carry out data analysis to figure out whether these data are related to a potential crime. Examination of a 1 TB hard disk may take hours or even days, depending on the expertise and experience of the examiner. In addition, it depends on examiner’s experience, and may change overall result involving in different cases overlooked. In this study, a hash-based matching and digital evidence evaluation method is proposed, and it is aimed to automatically classify the evidence containing criminal elements, thereby shortening the time of the digital evidence examination process and preventing human errors.

Keywords: block matching, digital evidence, hash list, evaluation of digital evidence

Procedia PDF Downloads 241
1871 The Impact of Online Advertising on Generation Y’s Purchase Decision in Malaysia

Authors: Mui Joo Tang, Eang Teng Chan

Abstract:

Advertising is commonly used to foster sales and reputation of an institution. It is at first the growth of print advertising that has increased the population and number of periodicals of newspaper and its circulation. The rise of Internet and online media has somehow blurred the role of media and advertising though the intention is still to reach out to audience and to increase sales. The relationship between advertising and audience on a product purchase through persuasion has been developing from print media to online media. From the changing media environment and audience, it is the concern of this research to study the impact of online advertising to such a relationship cycle. The content of online advertisements is much of text, multimedia, photo, audio and video. The messages of such content format may indeed bring impacts to its audience and its credibility. This study is therefore reflecting the effectiveness of online advertisement and its influences on generation Y in their purchasing behavior. This study uses Media Dependency Theory to analyze the relationship between the impact of online advertisement and media usage pattern of generation Y. Hierarchy of Effectiveness Model is used as a marketing communication model to study the effectiveness of advertising and further to determine the impact of online advertisement on generation Y in their purchasing decision making. This research uses online survey to reach out the sample of generation Y. The results have shown that online advertisements do not affect much on purchase decision making even though generation Y relies much on the media content including online advertisement for its information and believing in its credibility. There are few other external factors that may interrupt the effectiveness of online advertising. The very obvious influence of purchasing behavior is actually derived from the peers.

Keywords: generation Y, purchase decision, print media, online advertising, persuasion

Procedia PDF Downloads 511
1870 Exploration of Correlation between Design Principles and Elements with the Visual Aesthetic in Residential Interiors

Authors: Ikra Khan, Reenu Singh

Abstract:

Composition is essential when designing the interiors of residential spaces. The ability to adopt a unique style of using design principles and design elements is another. This research report explores how the visual aesthetic within a space is achieved through the use of design principles and design elements while maintaining a signature style. It also observes the relationship between design styles and compositions that are achieved as a result of the implementation of the principles. Information collected from books and the internet helped to understand how a composition can be achieved in residential interiors by resorting to design principles and design elements as tools for achieving an aesthetic composition. It also helped determine the results of authentic representation of design ideas and how they make one’s work exceptional. A questionnaire survey was also conducted to understand the impact of a visually aesthetic residential interior of a signature style on the lifestyle of individuals residing in them. The findings denote a pattern in the application of design principles and design elements. Individual principles and elements or a combination of the same are used to achieve an aesthetically pleasing composition. This was supported by creating CAD illustrations of two different residential projects with varying approaches and design styles. These illustrations include mood boards, 3D models, and sectional elevations as rendered views to understand the concept design and its translation via these mediums. A direct relation is observed between the application of design principles and design elements to achieve visually aesthetic residential interiors that suit an individual’s taste. These practices can be applied when designing bespoke commercial as well as industrial interiors that are suited to specific aesthetic and functional needs.

Keywords: composition, design principles, elements, interiors, residential spaces

Procedia PDF Downloads 89
1869 Gulfnet: The Advent of Computer Networking in Saudi Arabia and Its Social Impact

Authors: Abdullah Almowanes

Abstract:

The speed of adoption of new information and communication technologies is often seen as an indicator of the growth of knowledge- and technological innovation-based regional economies. Indeed, technological progress and scientific inquiry in any society have undergone a particularly profound transformation with the introduction of computer networks. In the spring of 1981, the Bitnet network was launched to link thousands of nodes all over the world. In 1985 and as one of the first adopters of Bitnet, Saudi Arabia launched a Bitnet-based network named Gulfnet that linked computer centers, universities, and libraries of Saudi Arabia and other Gulf countries through high speed communication lines. In this paper, the origins and the deployment of Gulfnet are discussed as well as social, economical, political, and cultural ramifications of the new information reality created by the network. Despite its significance, the social and cultural aspects of Gulfnet have not been investigated in history of science and technology literature to a satisfactory degree before. The presented research is based on an extensive archival research aimed at seeking out and analyzing of primary evidence from archival sources and records. During its decade and a half-long existence, Gulfnet demonstrated that the scope and functionality of public computer networks in Saudi Arabia have to be fine-tuned for compliance with Islamic culture and political system of the country. It also helped lay the groundwork for the subsequent introduction of the Internet. Since 1980s, in just few decades, the proliferation of computer networks has transformed communications world-wide.

Keywords: Bitnet, computer networks, computing and culture, Gulfnet, Saudi Arabia

Procedia PDF Downloads 235
1868 US-Iran Hostage Crisis by the Metaphor of Argo in the Light of Post-Modernist Post-Colonial and Realist Theories

Authors: Hatice Idil Gorgen

Abstract:

This paper argues that discourses and textuality which is literary tool of Western ethnocentrism create aggressive foreign policy against the West by Non-West countries. Quasi-colonial experiences create an inferiority complex on officially or not colonized areas by reconstructing their identity. This reconstructed identity leads revolution and resistance movement to feel secure themselves as a psychological defense against colonial powers. Knowledge learned by successful implementation of discourses grants right to has power for authority, in addition to serving as a tool to reinforce power of authority by its cognitive traits on foreign policy decision making. The combination of these points contributes to shaping and then make predictable state policies. In the methodology of paper, secondary data was firstly reviewed through university library using a range of sources such as academic abstract, OPAC system, bibliography databases and internet search engines. The film of Argo was used to strengthen and materialize theoretical explanations as a metaphor. This paper aims to highlight the cumulative effects on the construction of the identity throughout embedded discourses by textuality. To demonstrate it by a metaphor, Argo will be used as a primary source for good story-telling about history. U.S-Iran hostage crisis is mainly applied by aiming to see foundations Iran’s behavior in the context of its revolutionary identity and major influences of actions of U.S on it.

Keywords: discourse, post colonialism, post modernism, objectivity

Procedia PDF Downloads 139
1867 A Description Logics Based Approach for Building Multi-Viewpoints Ontologies

Authors: M. Hemam, M. Djezzar, T. Djouad

Abstract:

We are interested in the problem of building an ontology in a heterogeneous organization, by taking into account different viewpoints and different terminologies of communities in the organization. Such ontology, that we call multi-viewpoint ontology, confers to the same universe of discourse, several partial descriptions, where each one is relative to a particular viewpoint. In addition, these partial descriptions share at global level, ontological elements constituent a consensus between the various viewpoints. In order to provide response elements to this problem we define a multi-viewpoints knowledge model based on viewpoint and ontology notions. The multi-viewpoints knowledge model is used to formalize the multi-viewpoints ontology in description logics language.

Keywords: description logic, knowledge engineering, ontology, viewpoint

Procedia PDF Downloads 295
1866 A Study of Behaviors in Using Social Networks of Corporate Personnel of Suan Sunandha Rajabhat University

Authors: Wipada Chaiwchan

Abstract:

This research aims to study behaviors in using social networks of Corporate personnel of Suan Sunandha Rajabhat University. The sample used in the study were two groups: 1) Academic Officer 70 persons and 2) Operation Officer 143 persons were used in this study. The tools in this research consisted of questionnaire which the data were analyzed by using percentage, average (X) and Standard deviation (S.D.) and Independent Sample T-Test to test the difference between the mean values obtained from two independent samples, and One-way anova to analysis of variance, and Multiple comparisons to test that the average pair of different methods by Fisher’s Least Significant Different (LSD). The study result found that the most of corporate personnel have purpose in using social network to information awareness aspect was knowledge and online conference with social media. By using the average more than 3 hours per day in everyday. Using time in working in one day and there are computers connected to the Internet at home, by using the communication in the operational processes. Behaviors using social networks in relation to gender, age, job title, department, and type of personnel. Hypothesis testing, and analysis of variance for the effects of this analysis is divided into three aspects: The use of online social networks, the attitude of the users and the security analysis has found that Corporate Personnel of Suan Sunandha Rajabhat University. Overall and specifically at the high level, and considering each item found all at a high level. By sorting of the social network (X=3.22), The attitude of the users (X= 3.06) and the security (X= 3.11). The overall behaviors using of each side (X=3.11).

Keywords: social network, behaviors, social media, computer information systems

Procedia PDF Downloads 382
1865 Enhancing Knowledge and Teaching Skills of Grade Two Teachers who Work with Children at Risk of Dyslexia

Authors: Rangika Perera, Shyamani Hettiarachchi, Fran Hagstrom

Abstract:

Dyslexia is the most common reading reading-related difficulty among the school school-aged population and currently, 5-10% are showing the features of dyslexia in Sri Lanka. As there is an insufficient number of speech and language pathologists in the country and few speech and language pathologists working in government mainstream school settings, these children who are at risk of dyslexia are not receiving enough quality early intervention services to develop their reading skills. As teachers are the key professionals who are directly working with these children, using them as the primary facilitators to improve their reading skills will be the most effective approach. This study aimed to identify the efficacy of a two and half a day of intensive training provided to fifteen mainstream government school teachers of grade two classes. The goal of the training was to enhance their knowledge of dyslexia and provide full classroom skills training that could be used to support the development of the students’ reading competencies. A closed closed-ended multiple choice questionnaire was given to these teachers pre and -post-training to measure teachers’ knowledge of dyslexia, the areas in which these children needed additional support, and the best strategies to facilitate reading competencies. The data revealed that the teachers’ knowledge in all areas was significantly poorer prior to the training and that there was a clear improvement in all areas after the training. The gain in target areas of teaching skills selected to improve the reading skills of children was evaluated through peer feedback. Teachers were assigned to three groups and expected to model how they were going to introduce the skills in recommended areas using researcher developed, validated and reliability reliability-tested materials and the strategies which were introduced during the training within the given tasks. Peers and the primary investigator rated teachers’ performances and gave feedback on organizational skills, presentation skills of materials, clarity of instruction, and appropriateness of vocabulary. After modifying their skills according to the feedback the teachers received, they were expected to modify and represent the same tasks to the group the following day. Their skills were re-evaluated by the peers and primary investigator using the same rubrics to measure the improvement. The findings revealed a significant improvement in their teaching skills development. The data analysis of both knowledge and skills gains of the teachers was carried out using quantitative descriptive data analysis. The overall findings of the study yielded promising results that support intensive training as a method for improving teachers’ knowledge and teaching skill development for use with children in a whole class intervention setting who are at risk of dyslexia.

Keywords: Dyslexia, knowledge, teaching skills, training program

Procedia PDF Downloads 62
1864 Improving Medication Understanding, Use and Self-Efficacy among Stroke Patients: A Randomised Controlled Trial; Study Protocol

Authors: Jamunarani Appalasamy, Tha Kyi Kyi, Quek Kia Fatt, Joyce Pauline Joseph, Anuar Zaini M. Zain

Abstract:

Background: The Health Belief Theory had always been associated with chronic disease management. Various health behaviour concepts and perception branching from this Health Belief Theory had involved with medication understanding, use, and self-efficacy which directly link to medication adherence. In a previous quantitative and qualitative study, stroke patients in Malaysia were found to be strongly believing information obtained by various sources such as the internet and social communication. This action leads to lower perception of their stroke preventative medication benefit which in long-term creates non-adherence. Hence, this study intends to pilot an intervention which uses audio-visual concept incorporated with mHealth service to enhance learning and self-reflection among stroke patients to manage their disease. Methods/Design: Twenty patients will be allocated to a proposed intervention whereas another twenty patients are allocated to the usual treatment. The intervention involves a series of developed audio-visual videos sent via mobile phone which later await for responses and feedback from the receiver (patient) via SMS or recorded calls. The primary outcome would be the medication understanding, use and self-efficacy measured over two months pre and post intervention. Secondary outcome is measured from changes of blood parameters and other self-reported questionnaires. Discussion: This study shall also assess uptake/attrition, feasibility, and acceptability of this intervention. Trial Registration: NMRR-15-851-24737 (IIR)

Keywords: health belief, medication understanding, medication use, self-efficacy

Procedia PDF Downloads 201
1863 Arabic Text Classification: Review Study

Authors: M. Hijazi, A. Zeki, A. Ismail

Abstract:

An enormous amount of valuable human knowledge is preserved in documents. The rapid growth in the number of machine-readable documents for public or private access requires the use of automatic text classification. Text classification can be defined as assigning or structuring documents into a defined set of classes known in advance. Arabic text classification methods have emerged as a natural result of the existence of a massive amount of varied textual information written in the Arabic language on the web. This paper presents a review on the published researches of Arabic Text Classification using classical data representation, Bag of words (BoW), and using conceptual data representation based on semantic resources such as Arabic WordNet and Wikipedia.

Keywords: Arabic text classification, Arabic WordNet, bag of words, conceptual representation, semantic relations

Procedia PDF Downloads 409
1862 SIP Flooding Attacks Detection and Prevention Using Shannon, Renyi and Tsallis Entropy

Authors: Neda Seyyedi, Reza Berangi

Abstract:

Voice over IP (VOIP) network, also known as Internet telephony, is growing increasingly having occupied a large part of the communications market. With the growth of each technology, the related security issues become of particular importance. Taking advantage of this technology in different environments with numerous features put at our disposal, there arises an increasing need to address the security threats. Being IP-based and playing a signaling role in VOIP networks, Session Initiation Protocol (SIP) lets the invaders use weaknesses of the protocol to disable VOIP service. One of the most important threats is denial of service attack, a branch of which in this article we have discussed as flooding attacks. These attacks make server resources wasted and deprive it from delivering service to authorized users. Distributed denial of service attacks and attacks with a low rate can mislead many attack detection mechanisms. In this paper, we introduce a mechanism which not only detects distributed denial of service attacks and low rate attacks, but can also identify the attackers accurately. We detect and prevent flooding attacks in SIP protocol using Shannon (FDP-S), Renyi (FDP-R) and Tsallis (FDP-T) entropy. We conducted an experiment to compare the percentage of detection and rate of false alarm messages using any of the Shannon, Renyi and Tsallis entropy as a measure of disorder. Implementation results show that, according to the parametric nature of the Renyi and Tsallis entropy, by changing the parameters, different detection percentages and false alarm rates will be gained with the possibility to adjust the sensitivity of the detection mechanism.

Keywords: VOIP networks, flooding attacks, entropy, computer networks

Procedia PDF Downloads 391
1861 The Research of Students Internet in Choosing the Technical and Professional Course in Izeh: Educational Year 2001-2002

Authors: Seyyed Kavous Abbasi

Abstract:

Technical and professional branch is a subcategory of high school educational system. It deals with the programs which have been designed for the promotion of applied science and necessary skill and growth of potential talents in students. The purpose of performance of this branch is preparing of preponderance of in police in different section of industries and service. The aim of this research is the survey of group relation family, economic, educational and individual factors and the student's tendency toward technical professional courses. The method of the study is descriptive survey. 195 subjects were chosen randomly from all the male and female students of technical and professional school in Izeh. Instrument for this research was research-made questionnaire consisting of 22 questions on the base of likers spectrum. The reliability of this questionnaire has been estimated 0.8. Analyses of research data has been performed in two levels of descriptive and inferential statistics. Analyses of data has shown that the family factors with average of 3.12, individual factors 3.95, economic factors 3.92 and educational factors 3.57 more than middle level have more effects , in comparison with the factor of group relation with average of 2.79 less than average level in tendency the technical and professional course . Comparison of effective factors in tendency to technical and professional course has shown that individual factors had the most effects and the group relation factors had the least effects. Comparison between male and female subject's ideas showed that there is a different between their ideas about economics and family factors.

Keywords: high school, relation family, individual factors, analysis interest

Procedia PDF Downloads 231
1860 Message Authentication Scheme for Vehicular Ad-Hoc Networks under Sparse RSUs Environment

Authors: Wen Shyong Hsieh, Chih Hsueh Lin

Abstract:

In this paper, we combine the concepts of chameleon hash function (CHF) and identification based cryptography (IBC) to build a message authentication environment for VANET under sparse RSUs. Based on the CHF, TA keeps two common secrets that will be embedded to all identities to be as the evidence of mutual trusting. TA will issue one original identity to every RSU and vehicle. An identity contains one public ID and one private key. The public ID, includes three components: pseudonym, random key, and public key, is used to present one entity and can be verified to be a legal one. The private key is used to claim the ownership of the public ID. Based on the concept of IBC, without any negotiating process, a CHF pairing key multiplied by one private key and other’s public key will be used for mutually trusting and to be utilized as the session key of secure communicating between RSUs and vehicles. To help the vehicles to do message authenticating, the RSUs are assigned to response the vehicle’s temple identity request using two short time secretes that are broadcasted by TA. To light the loading of request information, one day is divided into M time slots. At every time slot, TA will broadcast two short time secretes to all valid RSUs for that time slot. Any RSU can response the temple identity request from legal vehicles. With the collected announcement of public IDs from the neighbor vehicles, a vehicle can set up its neighboring set, which includes the information about the neighbor vehicle’s temple public ID and temple CHF pairing key that can be derived by the private key and neighbor’s public key and will be used to do message authenticating or secure communicating without the help of RSU.

Keywords: Internet of Vehicles (IOV), Vehicular Ad-hoc Networks (VANETs), Chameleon Hash Function (CHF), message authentication

Procedia PDF Downloads 376
1859 The Role of Validity and Reliability in the Development of Online Testing

Authors: Ani Demetrashvili

Abstract:

The purpose of this paper is to show how students trust online tests and determine validity and reliability in the development of online testing. The pandemic situation changed every field in the world, and it changed education as well. Educational institutions moved into the online space, which was the only decision they were able to make at that time. Online assessment through online proctoring was a totally new challenge for educational institutions, and they needed to deal with it successfully. Participants were chosen from the English language center. The validity of the questionnaire was identified according to the Likert scale and Cronbach’s alpha; later, data from the participants was analyzed as well. The article summarizes literature that is available about online assessment and is interesting for people who are interested in this kind of assessment. Based on the research findings, students favor in-person testing over online assessment due to their lack of experience and skills in the latter.

Keywords: online assessment, online proctoring

Procedia PDF Downloads 20
1858 Ideas for Musical Activities and Games in the Early Year (IMAGINE-Autism): A Case Study Approach

Authors: Tania Lisboa, Angela Voyajolu, Adam Ockelford

Abstract:

The positive impact of music on the development of children with autism is widely acknowledged: music offers a unique channel for communication, wellbeing and self-regulation, as well as access to culture and a means of creative engagement. Yet, no coherent program exists for parents, carers and teachers to follow with their children in the early years, when the need for interventions is often most acute. Hence, research and the development of resources is urgently required. Autism is a project with children on the autism spectrum. The project aims at promoting the participants’ engagement with music through involvement in specially-designed musical activities with parents and carers. The main goal of the research is to verify the effectiveness of newly designed resources and strategies, which are based on the Sounds of Intent in the Early Years (SoI-EY) framework of musical development. This is a pilot study, comprising case studies of five children with autism in the early years. The data comprises semi-structured interviews, observations of videos, and feedback from parents on resources. Interpretative Phenomenological Analysis was chosen to analyze the interviews. The video data was coded in relation to the SoI-EY framework. The feedback from parents was used to evaluate the resources (i.e. musical activity cards). The participants’ wider development was also assessed through selected elements of the Early Years Foundation Stage (EYFS), a national assessment framework used in England: specifically, communication, language and social-emotional development. Five families of children on the autism spectrum (aged between 4-8 years) participated in the pilot. The research team visited each family 4 times over a 3-month period, during which the children were observed, and musical activities were suggested based on the child’s assessed level of musical development. Parents then trialed the activities, providing feedback and gathering further video observations of their child’s musical engagement between visits. The results of one case study will be featured in this paper, in which the evidence suggests that specifically tailored musical activity may promote communication and social engagement for a child with language difficulties on the autism spectrum. The resources were appropriate for the children’s involvement in musical activities. Findings suggest that non-specialist musical engagement with family and carers can be a powerful means to foster communication. The case study featured in this paper illustrates this with a child of limited verbal ability. There is a need for further research and development of resources that can be made available to all those working with children on the autism spectrum.

Keywords: autism, development, music education, resources

Procedia PDF Downloads 96
1857 Realising the Socio-Economic Rights of Refugees Under Human Rights Law: A Case Study of South Africa

Authors: Taguekou Kenfack Alexie

Abstract:

For a long time, refugee protection has constituted one of the main concerns of the international community as a whole and for the South African government in particular.The focus of this paper is on the challenges refugees face in accessing their rights in South Africa. In particular, it analyses the legal framework for the protection of the socio economic rights of refugees under international law, regional and domestic law and the extent to which the rights have been realized. The main hypothesis of the study centered on the fact that the social protection of refugees in South Africa is in conformity with international standards. To test this hypothesis, the qualitative research method was applied. Refugee related legal instruments were analyzed as well as academic publications, organizational reports and internet sources. The data analyzed revealed that there has been enormous progress in meeting international standards in the areas of education, emergency relief and assistance, protection of women and refugee children. The results also indicated that much remain to be desired in such areas as nutrition, shelter, health care, freedom of movement and very importantly, employment and social security. The paper also seeks to address the obstacles which prevent the proper treatment of refugees and to make recommendations as how the South African government can better regulate the treatment of refugees living in its territory.Recommendations include the amendment of the legal instruments that provide the normative framework for protection and improvement of protection policies to reflect the changing dynamics.

Keywords: international community, refugee, socioeconomic rights, social protection

Procedia PDF Downloads 267