Search results for: pseudo voter identity scheme PVID
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 3360

Search results for: pseudo voter identity scheme PVID

3030 A Privacy Protection Scheme Supporting Fuzzy Search for NDN Routing Cache Data Name

Authors: Feng Tao, Ma Jing, Guo Xian, Wang Jing

Abstract:

Named Data Networking (NDN) replaces IP address of traditional network with data name, and adopts dynamic cache mechanism. In the existing mechanism, however, only one-to-one search can be achieved because every data has a unique name corresponding to it. There is a certain mapping relationship between data content and data name, so if the data name is intercepted by an adversary, the privacy of the data content and user’s interest can hardly be guaranteed. In order to solve this problem, this paper proposes a one-to-many fuzzy search scheme based on order-preserving encryption to reduce the query overhead by optimizing the caching strategy. In this scheme, we use hash value to ensure the user’s query safe from each node in the process of search, so does the privacy of the requiring data content.

Keywords: NDN, order-preserving encryption, fuzzy search, privacy

Procedia PDF Downloads 467
3029 Zhou Enlai’s Impact to the Foreign Folicy of China

Authors: Nazira B. Boldurukova

Abstract:

The main aim of this article is to give the information about life and social and diplomatic work of Zhou Enlai, to prove his identity in his impact to the history of the world; to show his place in the organization of internal and foreign policy and in the peaceful international relationships of China with other countries.

Keywords: China, foreign policy of China, identity, politician, diplomacy, Zhou Enlai

Procedia PDF Downloads 536
3028 Fast Transient Workflow for External Automotive Aerodynamic Simulations

Authors: Christina Peristeri, Tobias Berg, Domenico Caridi, Paul Hutcheson, Robert Winstanley

Abstract:

In recent years the demand for rapid innovations in the automotive industry has led to the need for accelerated simulation procedures while retaining a detailed representation of the simulated phenomena. The project’s aim is to create a fast transient workflow for external aerodynamic CFD simulations of road vehicles. The geometry used was the SAE Notchback Closed Cooling DrivAer model, and the simulation results were compared with data from wind tunnel tests. The meshes generated for this study were of two types. One was a mix of polyhedral cells near the surface and hexahedral cells away from the surface. The other was an octree hex mesh with a rapid method of fitting to the surface. Three different grid refinement levels were used for each mesh type, with the biggest total cell count for the octree mesh being close to 1 billion. A series of steady-state solutions were obtained on three different grid levels using a pseudo-transient coupled solver and a k-omega-based RANS turbulence model. A mesh-independent solution was found in all cases with a medium level of refinement with 200 million cells. Stress-Blended Eddy Simulation (SBES) was chosen for the transient simulations, which uses a shielding function to explicitly switch between RANS and LES mode. A converged pseudo-transient steady-state solution was used to initialize the transient SBES run that was set up with the SIMPLEC pressure-velocity coupling scheme to reach the fastest solution (on both CPU & GPU solvers). An important part of this project was the use of FLUENT’s Multi-GPU solver. Tesla A100 GPU has been shown to be 8x faster than an Intel 48-core Sky Lake CPU system, leading to significant simulation speed-up compared to the traditional CPU solver. The current study used 4 Tesla A100 GPUs and 192 CPU cores. The combination of rapid octree meshing and GPU computing shows significant promise in reducing time and hardware costs for industrial strength aerodynamic simulations.

Keywords: CFD, DrivAer, LES, Multi-GPU solver, octree mesh, RANS

Procedia PDF Downloads 100
3027 ANN Based Simulation of PWM Scheme for Seven Phase Voltage Source Inverter Using MATLAB/Simulink

Authors: Mohammad Arif Khan

Abstract:

This paper analyzes and presents the development of Artificial Neural Network based controller of space vector modulation (ANN-SVPWM) for a seven-phase voltage source inverter. At first, the conventional method of producing sinusoidal output voltage by utilizing six active and one zero space vectors are used to synthesize the input reference, is elaborated and then new PWM scheme called Artificial Neural Network Based PWM is presented. The ANN based controller has the advantage of the very fast implementation and analyzing the algorithms and avoids the direct computation of trigonometric and non-linear functions. The ANN controller uses the individual training strategy with the fixed weight and supervised models. A computer simulation program has been developed using Matlab/Simulink together with the neural network toolbox for training the ANN-controller. A comparison of the proposed scheme with the conventional scheme is presented based on various performance indices. Extensive Simulation results are provided to validate the findings.

Keywords: space vector PWM, total harmonic distortion, seven-phase, voltage source inverter, multi-phase, artificial neural network

Procedia PDF Downloads 438
3026 An Efficient Proxy Signature Scheme Over a Secure Communications Network

Authors: H. El-Kamchouchi, Heba Gaber, Fatma Ahmed, Dalia H. El-Kamchouchi

Abstract:

Proxy signature scheme permits an original signer to delegate his/her signing capability to a proxy signer, and then the proxy signer generates a signing message on behalf of the original signer. The two parties must be able to authenticate one another and agree on a secret encryption key, in order to communicate securely over an unreliable public network. Authenticated key agreement protocols have an important role in building secure communications network between the two parties. In this paper, we present a secure proxy signature scheme over an efficient and secure authenticated key agreement protocol based on the discrete logarithm problem.

Keywords: proxy signature, warrant partial delegation, key agreement, discrete logarithm

Procedia PDF Downloads 326
3025 Big Data Analysis with Rhipe

Authors: Byung Ho Jung, Ji Eun Shin, Dong Hoon Lim

Abstract:

Rhipe that integrates R and Hadoop environment made it possible to process and analyze massive amounts of data using a distributed processing environment. In this paper, we implemented multiple regression analysis using Rhipe with various data sizes of actual data. Experimental results for comparing the performance of our Rhipe with stats and biglm packages available on bigmemory, showed that our Rhipe was more fast than other packages owing to paralleling processing with increasing the number of map tasks as the size of data increases. We also compared the computing speeds of pseudo-distributed and fully-distributed modes for configuring Hadoop cluster. The results showed that fully-distributed mode was faster than pseudo-distributed mode, and computing speeds of fully-distributed mode were faster as the number of data nodes increases.

Keywords: big data, Hadoop, Parallel regression analysis, R, Rhipe

Procedia PDF Downloads 487
3024 Urban Art as an Identity Branding of Kampong Ketandan Surabaya

Authors: R. A. Retno Hastijanti, David Agus Sagita, Arum Lintang Cahyani, Tectona Radike, Andreas Suluh Putra

Abstract:

Surabaya, is one of the oldest cities in Indonesia. Most of the old quarter city of Surabaya is an ancient Kampong. Ketandan is one ancient Kampong in the center of Surabaya, surrounded by a thriving trade area. These conditions make Kampong vulnerably degraded of environmental quality and tended to lose their cultural identity. Norms and values eroded by the rapid development of its local surroundings. Through Kampong conservation programs, Surabaya city government established Ketandan as one of the urban heritage. To achieve the ideal condition of urban heritage, public participation is required. One thing that can generate a motivation for Kampong Ketandan community participation is to rediscover the identity of Kampong Ketandan. This research aims to explore the appropriate method to rediscover the identity of Kampong Ketandan. Through qualitative research methods, based on observations and focus group discussions, it was concluded that mural mentoring program was the best method that can be accepted by the Kampong community to rediscover their identity. Mural as one of the urban art form, able to motivate Kampong community to express their self and bring an icon to their Kampong. The benefits of this research are to provide input to the city government and the private sector to preserve urban heritage, moreover, to transform an urban heritage into a productive space in urban areas in order to enhance city revenues.

Keywords: Kampong, Kampong Ketandan, mural, Surabaya, urban, urban heritage, urban art

Procedia PDF Downloads 316
3023 Reliability Factors Based Fuzzy Logic Scheme for Spectrum Sensing

Authors: Tallataf Rasheed, Adnan Rashdi, Ahmad Naeem Akhtar

Abstract:

The accurate spectrum sensing is a fundamental requirement of dynamic spectrum access for deployment of Cognitive Radio Network (CRN). To acheive this requirement a Reliability factors based Fuzzy Logic (RFL) Scheme for Spectrum Sensing has been proposed in this paper. Cognitive Radio User (CRU) predicts the presence or absence of Primary User (PU) using energy detector and calculates the Reliability factors which are SNR of sensing node, threshold of energy detector and decision difference of each node with other nodes in a cooperative spectrum sensing environment. Then the decision of energy detector is combined with Reliability factors of sensing node using Fuzzy Logic. These Reliability Factors used in RFL Scheme describes the reliability of decision made by a CRU to improve the local spectrum sensing. This Fuzzy combining scheme provides the accuracy of decision made by sensornode. The simulation results have shown that the proposed technique provide better PU detection probability than existing Spectrum Sensing Techniques.

Keywords: cognitive radio, spectrum sensing, energy detector, reliability factors, fuzzy logic

Procedia PDF Downloads 465
3022 Mapping Identity: Algerian Diasporic Voices in Literature

Authors: Salma Kaouthar Letaief

Abstract:

This article investigates the experience of diaspora in the writings of Algerian diasporic writers, namely: Leila Sebbar’s Silence on the Shores (2000), Keltoum Staali’ December’s Mimosa (2012). The study discusses the collective trauma of violence in Algeria and overseas. The experience of displacement of the characters to an alien territory compel their journey with issues related to nostalgia, identity crisis, alienation, racism, and in-betweeness. The focus in this research is, thus, on Algerian immigrants’ experience in the host country and their psychological conflicts. The theories Multiculturalism and Psychoanalysis are used to analyse the novels in this paper. While Multiculturalism examines how characters negotiate and navigate their identities in multicultural settings, Psychoanalysis enables the analysis of how characters in diasporic novels grapple with issues of identity, belonging, and self-discovery. Hence, interweaving multiculturalism and psychoanalysis provides an interdisciplinary framework that addresses both the socio-cultural and psychological aspects of the diasporic experience. Accordingly, this paper is an attempt to examine the diasporic experience and cultural dialectics.

Keywords: diaspora, algerian diasporic writers, trauma, algeria, displacement, identity crisis, cultural dialects

Procedia PDF Downloads 289
3021 Secure Bio Semantic Computing Scheme

Authors: Hiroshi Yamaguchi, Phillip C. Y. Sheu, Ryo Fujita, Shigeo Tsujii

Abstract:

In this paper, the secure BioSemantic Scheme is presented to bridge biological/biomedical research problems and computational solutions via semantic computing. Due to the diversity of problems in various research fields, the semantic capability description language (SCDL) plays and important role as a common language and generic form for problem formalization. SCDL is expected the essential for future semantic and logical computing in Biosemantic field. We show several example to Biomedical problems in this paper. Moreover, in the coming age of cloud computing, the security problem is considered to be crucial issue and we presented a practical scheme to cope with this problem.

Keywords: biomedical applications, private information retrieval (PIR), semantic capability description language (SCDL), semantic computing

Procedia PDF Downloads 377
3020 A Review: Artificial Intelligence (AI) Driven User Access Management and Identity Governance

Authors: Rupan Preet Kaur

Abstract:

This article reviewed the potential of artificial intelligence in the field of identity and access management (IAM) and identity governance and administration (IGA), the most critical pillars of any organization. The power of leveraging AI in the most complex and huge user base environment was outlined by simplifying and streamlining the user access approvals and re-certifications without any impact on the user productivity and at the same time strengthening the overall compliance of IAM landscape. Certain challenges encountered in the current state were detailed where majority of organizations are still lacking maturity in the data integrity aspect. Finally, this paper concluded that within the realm of possibility, users and application owners can reap the benefits of unified approach provided by AI to improve the user experience, improve overall efficiency, and strengthen the risk posture.

Keywords: artificial intelligence, machine learning, user access review, access approval

Procedia PDF Downloads 75
3019 Variation of Lexical Choice and Changing Need of Identity Expression

Authors: Thapasya J., Rajesh Kumar

Abstract:

Language plays complex roles in society. The previous studies on language and society explain their interconnected, complementary and complex interactions and, those studies were primarily focused on the variations in the language. Variation being the fundamental nature of languages, the question of personal and social identity navigated through language variation and established that there is an interconnection between language variation and identity. This paper analyses the sociolinguistic variation in language at the lexical level and how the lexical choice of the speaker(s) affects in shaping their identity. It obtains primary data from the lexicon of the Mappila dialect of Malayalam spoken by the members of Mappila (Muslim) community of Kerala. The variation in the lexical choice is analysed by collecting data from the speech samples of 15 minutes from four different age groups of Mappila dialect speakers. Various contexts were analysed and the frequency of borrowed words in each instance is calculated to reach a conclusion on how the variation is happening in the speech community. The paper shows how the lexical choice of the speakers could be socially motivated and involve in shaping and changing identities. Lexical items or vocabulary clearly signal the group identity and personal identity. Mappila dialect of Malayalam was rich in frequent use of borrowed words from Arabic, Persian and Urdu. There was a deliberate attempt to show their identity as a Mappila community member, which was derived from the socio-political situation during those days. This made a clear variation between the Mappila dialect and other dialects of Malayalam at the surface level, which was motivated to create and establish the identity of a person as the member of Mappila community. Historically, these kinds of linguistic variation were highly motivated because of the socio-political factors and, intertwined with the historical facts about the origin and spread of Islamism in the region; people from the Mappila community highly motivated to project their identity as a Mappila because of the social insecurities they had to face before accepting that religion. Thus the deliberate inclusion of Arabic, Persian and Urdu words in their speech helped in showing their identity. However, the socio-political situations and factors at the origin of Mappila community have been changed over a period of time. The social motivation for indicating their identity as a Mappila no longer exist and thus the frequency of borrowed words from Arabic, Persian and Urdu have been reduced from their speech. Apart from the religious terms, the borrowed words from these languages are very few at present. The analysis is carried out by the changes in the language of the people according to their age and found to have significant variations between generations and literacy plays a major role in this variation process. The need of projecting a specific identity of an individual would vary according to the change in the socio-political scenario and a variation in language can shape the identity in order to go with the varying socio-political situation in any language.

Keywords: borrowings, dialect, identity, lexical choice, literacy, variation

Procedia PDF Downloads 224
3018 Increasing National Health Insurance Scheme Enrolment in Ghana: Pro-Rata Insurance Premium Payment with Mobile Phone as the Answer

Authors: Joseph Marfo Boaheng, Daniel Ansong, Eugenia Amporfo

Abstract:

Health Insurance is proposed to provide financial protection against catastrophic health care cost arising from disease. Ghana has had a National Health Insurance Scheme (NHIS) since 2003 with the current enrolment/retention rate of 36%. The main goal of the scheme is to provide equity in the health sector as well as ensuring affordable health care for the poor. However, the current payment system is not flexible to attract significant proportion of the poor informal sector onto the scheme. Looking at the extensive use of mobiles in the Ghana where about 29,220,602.00 registered mobile phone lines are actively in used as of June 2014, paying health insurance premium through mobile phone could be feasible to attract larger proportion of the informal sector onto the scheme. Methodology: The quantitative cross-sectional survey was used to solicit the required information from 877 respondents living in Kumasi, the second capital city of Ghana. The magnitude of the effect of Pro-rata system (flexible payment terms) on NHIS enrollment rate was estimated with binary logistic regression model. Results: The odds for an individual to enroll onto NHIS with mobile phone increases about 2 times more when payment of insurance premium is on pro-rata basis ie. flexible payment terms (p=0.008, CI=1.212-3.565). Conclusion: The study advocates the National Health Insurance Authority consider this alternative payment system that has the potential of attracting a greater proportion of the informal sector to be enrolled or retained onto the scheme.

Keywords: enrollment, health insurance, mobile phone, pro-rata

Procedia PDF Downloads 364
3017 An Efficient Acquisition Algorithm for Long Pseudo-Random Sequence

Authors: Wan-Hsin Hsieh, Chieh-Fu Chang, Ming-Seng Kao

Abstract:

In this paper, a novel method termed the Phase Coherence Acquisition (PCA) is proposed for pseudo-random (PN) sequence acquisition. By employing complex phasors, the PCA requires only complex additions in the order of N, the length of the sequence, whereas the conventional method utilizing fast Fourier transform (FFT) requires complex multiplications and additions both in the order of Nlog2N . In order to combat noise, the input and local sequences are partitioned and mapped into complex phasors in PCA. The phase differences between pairs of input and local phasors are utilized for acquisition, and thus complex multiplications are avoided. For more noise-robustness capability, the multi-layer PCA is developed to extract the code phase step by step. The significant reduction of computational loads makes the PCA an attractive method, especially when the sequence length of is extremely large which becomes intractable for the FFT-based acquisition.

Keywords: FFT, PCA, PN sequence, convolution theory

Procedia PDF Downloads 467
3016 Use of Magnetically Separable Molecular Imprinted Polymers for Determination of Pesticides in Food Samples

Authors: Sabir Khan, Sajjad Hussain, Ademar Wong, Maria Del Pilar Taboada Sotomayor

Abstract:

The present work aims to develop magnetic molecularly imprinted polymers (MMIPs) for determination of a selected pesticide (ametryne) using high-performance liquid chromatography (HPLC). Computational simulation can assist the choice of the most suitable monomer for the synthesis of polymers. The (MMIPs) were polymerized at the surface of Fe3O4@SiO2 magnetic nanoparticles (MNPs) using 2-vinylpyradine as functional monomer, ethylene-glycol-dimethacrylate (EGDMA) is a cross-linking agent and 2,2-Azobisisobutyronitrile (AIBN) used as radical initiator. Magnetic non-molecularly imprinted polymer (MNIPs) was also prepared under the same conditions without analyte. The MMIPs were characterized by scanning electron microscopy (SEM), Brunauer, Emmett and Teller (BET) and Fourier transform infrared spectroscopy (FTIR). Pseudo first-order and pseudo second order model were applied to study kinetics of adsorption and it was found that adsorption process followed the pseudo-first-order kinetic model. Adsorption equilibrium data was fitted to Freundlich and Langmuir isotherms and the sorption equilibrium process was well described by Langmuir isotherm mode. The selectivity coefficients (α) of MMIPs for ametryne with respect to atrazine, ciprofloxacin and folic acid were 4.28, 12.32 and 14.53 respectively. The spiked recoveries ranged between 91.33 and 106.80% were obtained. The results showed high affinity and selectivity of MMIPs for pesticide ametryne in the food samples.

Keywords: molecularly imprinted polymer, pesticides, magnetic nanoparticles, adsorption

Procedia PDF Downloads 452
3015 Network Coding with Buffer Scheme in Multicast for Broadband Wireless Network

Authors: Gunasekaran Raja, Ramkumar Jayaraman, Rajakumar Arul, Kottilingam Kottursamy

Abstract:

Broadband Wireless Network (BWN) is the promising technology nowadays due to the increased number of smartphones. Buffering scheme using network coding considers the reliability and proper degree distribution in Worldwide interoperability for Microwave Access (WiMAX) multi-hop network. Using network coding, a secure way of transmission is performed which helps in improving throughput and reduces the packet loss in the multicast network. At the outset, improved network coding is proposed in multicast wireless mesh network. Considering the problem of performance overhead, degree distribution makes a decision while performing buffer in the encoding / decoding process. Consequently, BuS (Buffer Scheme) based on network coding is proposed in the multi-hop network. Here the encoding process introduces buffer for temporary storage to transmit packets with proper degree distribution. The simulation results depend on the number of packets received in the encoding/decoding with proper degree distribution using buffering scheme.

Keywords: encoding and decoding, buffer, network coding, degree distribution, broadband wireless networks, multicast

Procedia PDF Downloads 381
3014 A Semiotic Approach to the Construction of Classical Identity in Indian Classical Music Videos

Authors: Jayakrishnan Narayanan, Sengamalam Periyasamy Dhanavel

Abstract:

Indian classical (Karnatik) music videos across various media platforms have followed an audio-visual pattern that conforms to its socio-cultural and quasi-religious identity. The present paper analyzes the semiotic variations between ‘pure Karnatik music videos’ and ‘independent/contemporary-collaborative music videos’ posted on social media by young professional Karnatik musicians. The paper analyzes these media texts by comparing their various structural sememes namely, the title, artists, music, narrative schemata, visuals, lighting, sound, and costumes. The paper argues that the pure Karnatik music videos are marked by the presence of certain recurring mythological or third level signifiers and that these signifiers and codes are marked by their conspicuous absence in the independent music videos produced by the same musicians. While the music and the musical instruments used in both these sets of music videos remain similar, the meaning that is abducted by the beholder in each case is entirely different. The paper also attempts to study the identity conflicts that are projected through these music videos and the extent to which the cultural connotations of Karnatik music govern the production of its music videos.

Keywords: abduction, identity, media semiotics, music video

Procedia PDF Downloads 204
3013 Flood Modeling in Urban Area Using a Well-Balanced Discontinuous Galerkin Scheme on Unstructured Triangular Grids

Authors: Rabih Ghostine, Craig Kapfer, Viswanathan Kannan, Ibrahim Hoteit

Abstract:

Urban flooding resulting from a sudden release of water due to dam-break or excessive rainfall is a serious threatening environment hazard, which causes loss of human life and large economic losses. Anticipating floods before they occur could minimize human and economic losses through the implementation of appropriate protection, provision, and rescue plans. This work reports on the numerical modelling of flash flood propagation in urban areas after an excessive rainfall event or dam-break. A two-dimensional (2D) depth-averaged shallow water model is used with a refined unstructured grid of triangles for representing the urban area topography. The 2D shallow water equations are solved using a second-order well-balanced discontinuous Galerkin scheme. Theoretical test case and three flood events are described to demonstrate the potential benefits of the scheme: (i) wetting and drying in a parabolic basin (ii) flash flood over a physical model of the urbanized Toce River valley in Italy; (iii) wave propagation on the Reyran river valley in consequence of the Malpasset dam-break in 1959 (France); and (iv) dam-break flood in October 1982 at the town of Sumacarcel (Spain). The capability of the scheme is also verified against alternative models. Computational results compare well with recorded data and show that the scheme is at least as efficient as comparable second-order finite volume schemes, with notable efficiency speedup due to parallelization.

Keywords: dam-break, discontinuous Galerkin scheme, flood modeling, shallow water equations

Procedia PDF Downloads 162
3012 Characterization of Activated Tire Char (ATC) and Adsorptive Desulfurization of Tire Pyrolytic Oil (TPO) Using ATC

Authors: Moshe Mello, Hilary Rutto, Tumisang Seodigeng

Abstract:

The adsorptive ability of different carbon materials, tire char (TC), demineralized tire char (DTC), activated tire char (ATC) and Aldrich supplied commercial activated carbon (CAC) was studied for desulfurization of tire pyrolytic oil (TPO). TPO with an initial sulfur content of 7767.7 ppmw was used in this present study. Preparation of ATC was achieved by chemical treatment of raw TC using a potassium hydroxide (KOH) solution and subsequent activation at 800°C in the presence of nitrogen. The thermal behavior of TC, surface microstructure, and the surface functional groups of the carbon materials was investigated using TGA, SEM, and FTIR, respectively. Adsorptive desulfurization of TPO using the carbon materials was performed and they performed in the order of CAC>ATC>DTC>TC. Adsorption kinetics were studied, and pseudo-first order kinetic model displayed a better fit compared to pseudo-second order model. For isotherm studies, the Freundlich isotherm model fitted to the equilibrium data better than the Langmuir isotherm model.

Keywords: ATC, desulfurization, pyrolysis, tire, TPO

Procedia PDF Downloads 98
3011 A Desire to be ‘Recognizable and Reformed’: Natives’ Identity in Walcott’s “Dream on Monkey Mountain”

Authors: S. Khurram, N. Mubashar

Abstract:

The paper examines, through the lens of Postcolonial Theory, how natives resist and react in Derrek Walcott’s “Dream on Monkey Mountain”. It aims at how natives, for being ‘recognized and reformed’, mimic and adapt the white’s ways of living. It also focuses how Walcott expresses natives’ reaction when they cannot construct their identity. Moreover, the paper exploits the Homi. K Bhaba’s concept of Mimicry and Berry’s concepts of Hybridity to explain Caribbean native’s plight. Furthermore, it bring forth Walcott’s deep insight into the psychology of the Caribbean natives. He digs deep into the colonial discourse to reconstruct post-colonial identity and he, as a post-colonial writer, does so by deconstructing colonial ideology of racism by resisting against it.

Keywords: postcolonial theory, mimicry, hybridity, reaction

Procedia PDF Downloads 162
3010 Performance Analysis of MIMO-OFDM Using Convolution Codes with QAM Modulation

Authors: I Gede Puja Astawa, Yoedy Moegiharto, Ahmad Zainudin, Imam Dui Agus Salim, Nur Annisa Anggraeni

Abstract:

Performance of Orthogonal Frequency Division Multiplexing (OFDM) system can be improved by adding channel coding (error correction code) to detect and correct the errors that occur during data transmission. One can use the convolution code. This paper presents performance of OFDM using Space Time Block Codes (STBC) diversity technique use QAM modulation with code rate 1/2. The evaluation is done by analyzing the value of Bit Error Rate (BER) vs. Energy per Bit to Noise Power Spectral Density Ratio (Eb/No). This scheme is conducted 256 sub-carrier which transmits Rayleigh multipath channel in OFDM system. To achieve a BER of 10-3 is required 30 dB SNR in SISO-OFDM scheme. For 2x2 MIMO-OFDM scheme requires 10 dB to achieve a BER of 10-3. For 4x4 MIMO-OFDM scheme requires 5 dB while adding convolution in a 4x4 MIMO-OFDM can improve performance up to 0 dB to achieve the same BER. This proves the existence of saving power by 3 dB of 4x4 MIMO-OFDM system without coding, power saving 7 dB of 2x2 MIMO-OFDM system without coding and significant power savings from SISO-OFDM system.

Keywords: convolution code, OFDM, MIMO, QAM, BER

Procedia PDF Downloads 380
3009 Exploiting Identity Grievances: Al-Shabaab Propaganda Targeting Individuals Abroad

Authors: Mustafa Mabruk

Abstract:

Groups such as Al-Shabaab have managed to radicalize many individuals abroad, including the first American citizen to ever be radicalized. Yet the pathways of radicalization for these foreign individuals are understudied. Moreover, current measures to prevent foreign radicalization are ineffective, with privacy, screening and profiling implications that render current counter-radicalization efforts counterproductive. Such measures exhibit strictness, political bias, and harshness. As confirmed by recent studies, such counter-radicalization issues exacerbate existing grievances and channel fresh recruits to Al-Shabaab. Addressing these challenges is paramount, requiring alternative strategies to effectively reduce radicalization without triggering further harm. The development of counter-narratives emerges as a potential measure with minimal risk of exacerbating grievances, yet the development of such counter-narratives necessitates a thorough understanding of the radicalization pathways of foreign individuals that are understudied. This study investigates the success of Al-Shabaab in recruiting individuals abroad by analyzing their propaganda in conjunction with analyzing identity-focused theories of radicalization, including Framing Theory and Social Identity Theory. Qualitative content analysis is used to analyze various propaganda material, including tweets, speeches, and webpages. The analysis reveals that issues of identity are of major significance in the radicalization patterns identified and that grievances of Muslims worldwide are used to exploit identity-related grievances. Based on these findings, the paper argues that such evidence enhances our understanding of potential deradicalization pathways and present counter-narratives based on Islamic scripture.

Keywords: counter-narratives, foreign radicalization, identity grievances, propaganda analysis

Procedia PDF Downloads 31
3008 Leadership Development for Nurses as Educators

Authors: Abeer Alhazmi

Abstract:

Introduction: Clinical education is considered a significant part of the learning process for nurses and nursing students. However, recruiting high- caliber individuals to train them to be tomorrow’s educators/teachers has been a recurrent challenge. One of the troubling challenges in this field is the absent of proper training programmes to train educators to be future education professionals and leaders. Aim: To explore the impact of a stage 1 and stage 2 clinical instructor courses on developing leadership skills for nurses as educators.Theoretical Framework: Informed by a symbolic interactionist framework, this research explored the Impact of stage 1 and stage 2 clinical instructor courses on nurses' knowledge, attitudes, and leadership skills. Method: Using Glaserian grounded theory method the data were derived from 3 focus groups and 15 in-depth interviews with nurse educators/clinical instructors and nurses who attended stage 1 and stage 2 clinical instructor courses at King Abdu-Aziz University Hospital (KAUH). Findings: The findings of the research are represented in the core category exploring new identity as educator and its two constituent categories Accepting change, and constructing educator identity. The core and sub- categories were generated through a theoretical exploration of the development of educator’s identity throughout stage 1 and stage 2 clinical instructor courses. Conclusion: The social identity of the nurse educators was developed and changed during and after attending stage 1 and stage 2 clinical instructor courses. In light of an increased understanding of the development process of educators identity and role, the research presents implications and recommendations that may contribute to the development of nursing educators in general and in Saudi Arabia in specific.

Keywords: clinical instructor course, educators, identity work, clinical nursing

Procedia PDF Downloads 398
3007 An Energy Efficient Spectrum Shaping Scheme for Substrate Integrated Waveguides Based on Spread Reshaping Code

Authors: Yu Zhao, Rainer Gruenheid, Gerhard Bauch

Abstract:

In the microwave and millimeter-wave transmission region, substrate-integrated waveguide (SIW) is a very promising candidate for the development of circuits and components. It facilitates the transmission at the data rates in excess of 200 Gbit/s. An SIW mimics a rectangular waveguide by approximating the closed sidewalls with a via fence. This structure suppresses the low frequency components and makes the channel of the SIW a bandpass or high pass filter. This channel characteristic impedes the conventional baseband transmission using non-return-to-zero (NRZ) pulse shaping scheme. Therefore, mixers are commonly proposed to be used as carrier modulator and demodulator in order to facilitate a passband transmission. However, carrier modulation is not an energy efficient solution, because modulation and demodulation at high frequencies consume a lot of energy. For the first time to our knowledge, this paper proposes a spectrum shaping scheme of low complexity for the channel of SIW, namely spread reshaping code. It aims at matching the spectrum of the transmit signal to the channel frequency response. It facilitates the transmission through the SIW channel while it avoids using carrier modulation. In some cases, it even does not need equalization. Simulations reveal a good performance of this scheme, such that, as a result, eye opening is achieved without any equalization or modulation for the respective transmission channels.

Keywords: bandpass channel, eye-opening, switching frequency, substrate-integrated waveguide, spectrum shaping scheme, spread reshaping code

Procedia PDF Downloads 146
3006 Generation of Symmetric Key Using Randomness of Hash Function

Authors: Sai Charan Kamana, Harsha Vardhan Nakkina, B.R. Chandavarkar

Abstract:

In a highly secure and robust key generation process, a key role is played by randomness and random numbers when current real-world cryptosystems are observed. Most of the present-day cryptographic protocols depend upon the Random Number Generators (RNG), Pseudo-Random Number Generator (PRNG). These protocols often use noisy channels such as Disk seek time, CPU temperature, Mouse pointer movement, Fan noise to obtain true random values. Despite being cost-effective, these noisy channels may need additional hardware devices to continuously communicate with them. On the other hand, Hash functions are Pseudo-Random (because of their requirements). So, they are a good replacement for these noisy channels and have low hardware requirements. This paper discusses, some of the key generation methodologies, and their drawbacks. This paper explains how hash functions can be used in key generation, how to combine Key Derivation Functions with hash functions.

Keywords: key derivation, hash based key derivation, password based key derivation, symmetric key derivation

Procedia PDF Downloads 141
3005 Deconstruction of Gender Stereotypes through Fashion

Authors: Nihan Akdemir

Abstract:

This research aims to investigate the role of fashion in the context of the deconstruction of gender stereotypes. Expectation of society and culture related to the biological structure of the individual corresponds to the gender. At this point there are some unseen rules which are given to person even from his/her childhoods according to the sex and gender, are called stereotypes. With basic example, girls should wear pink, and the boys should wear blue. Or boys do not wear skirt and the woman must behave like a woman. There are also many many stereotypes like them. But the clothing style the individual uses to express his or her gender identity may not match the expectations of the community and society. In the context of big role of the clothing, these stereotypes could be deconstructed because clothes are the visible expression of gender identity of the person. And fashion is a big part of this structure because fashion is a pioneer of what people wear in other words fashion tells to people what should they wear this season. Nowadays fashion has also meant about expressing identity independent of whether you were born male or female. Many fashion brands prepare their collections in the concept of ‘gender fluid’ by deconstructions. It means that fashion is opening the roads for being more free about the gender identity. The representations of gender fluidity through fashion help bring a sense of normality to people who are trying to find the self-confidence to express who they want to be. Maybe the voice of the streets carries this point to the catwalks firstly, and then it becomes a trend. All these items have been explained with visual images and supported by the literature investigations. And the results are showed that the numbers of collections about it are increasing and fashion sector takes this issue into consideration. And this new approach reached to the streets.

Keywords: fashion, gender identity, gender stereotypes, trend

Procedia PDF Downloads 452
3004 Place-Making Theory behind Claremont Court

Authors: Sandra Costa-Santos, Nadia Bertolino, Stephen Hicks, Vanessa May, Camilla Lewis

Abstract:

This paper aims to elaborate the architectural theory on place-making that supported Claremont Court housing scheme (Edinburgh, United Kingdom). Claremont Court (1959-62) is a large post-war mixed development housing scheme designed by Basil Spence, which included ‘place-making’ as one of its founding principles. Although some stylistic readings of the housing scheme have been published, the theory on place-making that allegedly ruled the design has yet to be clarified. The architecture allows us to mark or make a place within space in order to dwell. Under the framework of contemporary philosophical theories of place, this paper aims to explore the relationship between place and dwelling through a cross-disciplinary reading of Claremont Court, with a view to develop an architectural theory on place-making. Since dwelling represents the way we are immersed in our world in an existential manner, this theme is not just relevant for architecture but also for philosophy and sociology. The research in this work is interpretive-historic in nature. It examines documentary evidence of the original architectural design, together with relevant literature in sociology, history, and architecture, through the lens of theories of place. First, the paper explores how the dwelling types originally included in Claremont Court supported ideas of dwelling or meanings of home. Then, it traces shared space and social ties in order to study the symbolic boundaries that allow the creation of a collective identity or sense of belonging. Finally, the relation between the housing scheme and the supporting theory is identified. The findings of this research reveal Scottish architect Basil Spence’s exploration of the meaning of home, as he changed his approach to the mass housing while acting as President of the Royal Incorporation of British Architects (1958-60). When the British Government was engaged in various ambitious building programmes, he sought to drive architecture to a wider socio-political debate as president of the RIBA, hence moving towards a more ambitious and innovative socio-architectural approach. Rather than trying to address the ‘genius loci’ with an architectural proposition, as has been stated, the research shows that the place-making theory behind the housing scheme was supported by notions of community-based on shared space and dispositions. The design of the housing scheme was steered by a desire to foster social relations and collective identities, rather than by the idea of keeping the spirit of the place. This research is part of a cross-disciplinary project funded by the Arts and Humanities Research Council. The findings present Claremont Court as a signifier of Basil Spence’s attempt to address the post-war political debate on housing in United Kingdom. They highlight the architect’s theoretical agenda and challenge current purely stylistic readings of Claremont Court as they fail to acknowledge its social relevance.

Keywords: architectural theory, dwelling, place-making, post-war housing

Procedia PDF Downloads 251
3003 A Secure Proxy Signature Scheme with Fault Tolerance Based on RSA System

Authors: H. El-Kamchouchi, Heba Gaber, Fatma Ahmed, Dalia H. El-Kamchouchi

Abstract:

Due to the rapid growth in modern communication systems, fault tolerance and data security are two important issues in a secure transaction. During the transmission of data between the sender and receiver, errors may occur frequently. Therefore, the sender must re-transmit the data to the receiver in order to correct these errors, which makes the system very feeble. To improve the scalability of the scheme, we present a secure proxy signature scheme with fault tolerance over an efficient and secure authenticated key agreement protocol based on RSA system. Authenticated key agreement protocols have an important role in building a secure communications network between the two parties.

Keywords: proxy signature, fault tolerance, rsa, key agreement protocol

Procedia PDF Downloads 268
3002 Reduced Power Consumption by Randomization for DSI3

Authors: David Levy

Abstract:

The newly released Distributed System Interface 3 (DSI3) Bus Standard specification defines 3 modulation levels from which 16 valid symbols are coded. This structure creates power consumption variations depending on the transmitted data of a factor of more than 2 between minimum and maximum. The power generation unit has to consider therefore the worst case maximum consumption all the time and be built accordingly. This paper proposes a method to reduce both the average current consumption and worst case current consumption. The transmitter randomizes the data using several pseudo-random sequences. It then estimates the energy consumption of the generated frames and selects to transmit the one which consumes the least. The transmitter also prepends the index of the pseudo-random sequence, which is not randomized, to allow the receiver to recover the original data using the correct sequence. We show that in the case that the frame occupies most of the DSI3 synchronization period, we achieve average power consumption reduction by up to 13% and the worst case power consumption is reduced by 17.7%.

Keywords: DSI3, energy, power consumption, randomization

Procedia PDF Downloads 521
3001 Africatown Ancestors’ Discourse Analysis: Unveiling Narratives of Identity Heritage

Authors: Maxime Vignon

Abstract:

This study delves into the discourse surrounding Africatown ancestors’ will, through a rigorous discourse analysis, to reveal the intricate narratives shaping heritage and identity within this unique community. Situated near Mobile, Alabama, Africatown traces its origins to the Clotilda, the last known slave ship to bring captives from Africa to the United States. Through a meticulous examination of Africatown ancestors posthumous will, this analysis aims to uncover the spiritual linguistic nuances which will contribute to the preservation of Africatown's ancestral heritage and the construction of individual self and collective empowerment. This research will be grounded in Michel Foucault discourse. In its attempt to analyze the four core elements of discourse, this study explores the role of rituals and spiritual discourses within the will of Africatown ancestors. Additionally, it delves into the descendants’ public appearance scrutinizing the use of ancestral names and identities. Ultimately, this discourse analysis contributes to a nuanced understanding of how language and narrative from the ancestors would shape unity, a valuable insight into the complexities of identity formation and the enduring impact of the transatlantic slave trade on this resilient community.

Keywords: applied linguistics, culture, discourse analysis, identity, spirituality, transatlantic slave trade

Procedia PDF Downloads 46