Search results for: real-time voice encryption
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 692

Search results for: real-time voice encryption

302 Syntactic, Semantic, and Pragmatic Rationalization of Modal Auxiliary Verbs in Akan

Authors: Joana Portia Sakyi

Abstract:

The uniqueness of auxiliary verbs and their contribution to grammar as constituents, which act as preverbs to supply additional grammatical or functional meanings to clauses, are well established. Functionally, they relate clauses to tense, aspect, mood, voice, emphasis, and modality, along with the main verbs conveying the appropriate lexical content. There has been an issue in Akan grammar vis-à-vis the status of auxiliary verbs, in terms of whether Akan has auxiliaries or not and even which forms are to be regarded as auxiliaries. We investigate the syntactic, semantic, and pragmatic components of expressions and claim that Akan has auxiliary verbs that contribute the functional or grammatical meaning of modality, tense/aspect, etc., to clauses they occur in. Essentially, we use a self-created corpus data to consider the affix bέ- ‘may’, ‘must’, ‘should’; the form tùmí ‘can’, ‘be able to’; mà ‘to let’, ‘to allow’, ‘to permit’, ‘to make’, or ‘to cause’ someone to do something; the multi-word forms ὲsὲ sέ ‘must’, ‘should’ or ‘have to’ and ètwà sέ ‘must’, ‘should’ or ‘have to’, and assert that they are legitimate modal auxiliaries conveying epistemic, deontic, and dynamic modalities, as well as other meanings in the language.

Keywords: Akan, modality, modal auxiliaries, semantics

Procedia PDF Downloads 72
301 The Design and Development of Online Infertility Prevention Education in the Frame of Mayer's Multimedia Learning Theory

Authors: B. Baran, S. N. Kaptanoglu, M. Ocal, Y. Kagnici, E. Esen, E. Siyez, D. M. Siyez

Abstract:

Infertility is the fact that couples cannot have children despite 1 year of unprotected sexual life. Infertility can be considered as an important problem affecting not only sexual life but also social and psychological conditions of couples. Learning about information about preventable factors related to infertility during university years plays an important role in preventing a possible infertility case in older ages. The possibility to facilitate access to information with the internet has provided the opportunity to reach a broad audience in the diverse learning environments and educational environment. Moreover, the internet has become a basic resource for the 21st-century learners. Providing information about infertility over the internet will enable more people to reach in a short time. When studies conducted abroad about infertility are examined, interactive websites and online education programs come to the fore. In Turkey, while there is no comprehensive online education program for university students, it seems that existing studies are aimed to make more advertisements for doctors or hospitals. In this study, it was aimed to design and develop online infertility prevention education for university students. Mayer’s Multimedia Learning Theory made up the framework for the online learning environment in this study. The results of the needs analysis collected from the university students in Turkey who were selected with sampling to represent the audience for online learning contributed to the design phase. In this study, an infertility prevention online education environment designed as a 4-week education was developed by explaining the theoretical basis and needs analysis results. As a result; in the development of the online environment, different kind of visual aids that will increase teaching were used in the environment of online education according to Mayer’s principles of extraneous processing (coherence, signaling, spatial contiguity, temporal contiguity, redundancy, expectation principles), essential processing (segmenting, pre-training, modality principles) and generative processing (multimedia, personalization, voice principles). For example, the important points in reproductive systems’ expression were emphasized by visuals in order to draw learners’ attention, and the presentation of the information was also supported by the human voice. In addition, because of the limited knowledge of university students in the subject, the issue of female reproductive and male reproductive systems was taught before preventable factors related to infertility. Furthermore, 3D video and augmented reality application were developed in order to embody female and male reproductive systems. In conclusion, this study aims to develop an interactive Online Infertility Prevention Education in which university students can easily access reliable information and evaluate their own level of knowledge about the subject. It is believed that the study will also guide the researchers who want to develop online education in this area as it contains design-stage decisions of interactive online infertility prevention education for university students.

Keywords: infertility, multimedia learning theory, online education, reproductive health

Procedia PDF Downloads 166
300 Sentiment Analysis of Tourist Online Reviews Concerning Lisbon Cultural Patrimony, as a Contribute to the City Attractiveness Evaluation

Authors: Joao Ferreira Do Rosario, Maria De Lurdes Calisto, Ana Teresa Machado, Nuno Gustavo, Rui Gonçalves

Abstract:

The tourism sector is increasingly important to the economic performance of countries and a relevant theme to academic research, increasing the importance of understanding how and why tourists evaluate tourism locations. The city of Lisbon is currently a tourist destination of excellence in the European and world-wide panorama, registering a significant growth of the economic weight of its tourist activities in the Gross Added Value of the region. Although there is research on the feedback of those who visit tourist sites and different methodologies for studying tourist sites have been applied, this research seeks to be innovative in the objective of obtaining insights on the competitiveness in terms of attractiveness of the city of Lisbon as a tourist destination, based the feedback of tourists in the Facebook pages of the most visited museums and monuments of Lisbon, an interpretation that is relevant in the development of strategies of tourist attraction. The intangible dimension of the tourism offer, due to its unique condition of simultaneous production and consumption, makes eWOM particularly relevant. The testimony of consumers is thus a decisive factor in the decision-making and buying process in tourism. Online social networks are one of the most used platforms for tourists to evaluate the attractiveness's points of a tourism destination (e.g. cultural and historical heritage), with this user-generated feedback enabling relevant information about the customer-tourists. This information is related to the tourist experience representing the true voice of the customer. Furthermore, this voice perceived by others as genuine, opposite to marketing messages, may have a powerful word-of-mouth influence on other potential tourists. The relevance of online reviews sharing, however, becomes particularly complex, considering social media users’ different profiles or the possible and different sources of information available, as well as their associated reputation associated with each source. In the light of these trends, our research focuses on the tourists’ feedback on Facebook pages of the most visited museums and monuments of Lisbon that contribute to its attractiveness as a tourism destination. Sentiment Analysis is the methodology selected for this research, using public available information in the online context, which was deemed as an appropriate non-participatory observation method. Data will be collected from two museums (Museu dos Coches and Museu de Arte Antiga) and three monuments ((Mosteiro dos Jerónimos, Torre de Belém and Panteão Nacional) Facebook pages during a period of one year. The research results will help in the evaluation of the considered places by the tourists, their contribution to the city attractiveness and present insights helpful for the management decisions regarding this museums and monuments. The results of this study will also contribute to a better knowledge of the tourism sector, namely the identification of attributes in the evaluation and choice of the city of Lisbon as a tourist destination. Further research will evaluate the Lisbon attraction points for tourists in different categories beyond museums and monuments, will also evaluate the tourist feedback from other sources like TripAdvisor and apply the same methodology in other cities and country regions.

Keywords: Lisbon tourism, opinion mining, sentiment analysis, tourism location attractiveness evaluation

Procedia PDF Downloads 233
299 We Are the 99 percent – the Occupy-Movement in Social Media

Authors: Wolfram Karg

Abstract:

The Occupy-Movement came into in 2011 existence in the US as a reaction to one of the worst economic crisis since World War II. With cuts in benefits and social services, with people being evicted from their homes on the one hand and high bonuses granted to their managers of the very same companies, a strong feeling of injustice besieged people in the US and caused them to voice their anger peacefully in social media and on the streets. Due to the world-wide-web, users all around the world read about this movement and recognized the same injustice in their own countries, making Occupy a global movement. The vast array of topics covered by Occupy offers a unique chance to carry out a corpus-based discourse analysis based on the DIMEAN-Model. The focus on this paper is limited to two aspects of DIMEAN: intertextual references and the use of connectors in texts. Because the discourse is to a large extent carried out via posts in blogs, online-articles and comments, the paper also analyses, in how far modern (i.e. computer-based media) there is a correlation between the use of connectors in different communicative types used by the Occupy-Movement.

Keywords: discourse, new media, occupy, corpus analysis

Procedia PDF Downloads 489
298 Dynamics of Mach Zehnder Modulator in Open and Closed Loop Bias Condition

Authors: Ramonika Sengupta, Stuti Kachhwaha, Asha Adhiya, K. Satya Raja Sekhar, Rajwinder Kaur

Abstract:

Numerous efforts have been done in the past decade to develop the methods of secure communication that are free from interception and eavesdropping. In fiber optic communication, chaotic optical carrier signals are used for data encryption in secure data transmission. Mach-Zehnder Modulators (MZM) are the key components for generating the chaotic signals to be used as optical carriers. This paper presents the dynamics of a lithium niobate MZM modulator under various biasing conditions. The chaotic fluctuations of the intensity of a laser diode have been generated using the electro-optic MZM modulator operating in a highly nonlinear regime. The modulator is driven in closed loop by its own output at an earlier time. When used as an electro-optic oscillator employing delayed feedback, the MZM displays a wide range of output waveforms of varying complexity. The dynamical behavior of the system ranges from periodic to nonlinear oscillations. The nonlinearity displayed by the system is reproducible and is easily controllable. In this paper, we demonstrate a wide variety of optical signals generated by MZM using easily controllable device parameters in both open and close loop bias conditions.

Keywords: chaotic carrier, fiber optic communication, Mach-Zehnder modulator, secure data transmission

Procedia PDF Downloads 268
297 Integration of Quality Function Deployment and Modular Function Deployment in Product Development

Authors: Naga Velamakuri, Jyothi K. Reddy

Abstract:

Quality must be designed into a product and not inspected has become the main motto of all the companies globally. Due to the rapidly increasing technology in the past few decades, the nature of demands from the consumers has become more sophisticated. To sustain this global revolution of innovation in production systems, companies have to take steps to accommodate this technology growth. In this process of understanding the customers' expectations, all the firms globally take steps to deliver a perfect output. Most of these techniques also concentrate on the consistent development and optimization of the product to exceed the expectations. Quality Function Deployment(QFD) and Modular Function Deployment(MFD) are such techniques which rely on the voice of the customer and help deliver the needs. In this paper, Quality Function Deployment and Modular Function Deployment techniques which help in converting the quantitative descriptions to qualitative outcomes are discussed. The area of interest would be to understand the scope of each of the techniques and the application range in product development when these are applied together to any problem. The research question would be mainly aimed at comprehending the limitations using modularity in product development.

Keywords: quality function deployment, modular function deployment, house of quality, methodology

Procedia PDF Downloads 323
296 Discerning Beginning Teachers' Conceptions of Competence through a Phenomenographic Investigation

Authors: Pauline Swee Choo Goh, Kung Teck Wong

Abstract:

The research reported here investigates variation in beginning teachers’ early experiences of their own teaching competency. A phenomenographic research approach was used to show the qualitatively different ways teacher competence was understood amongst beginning teachers in Malaysia. Phenomenographic interviews were conducted with 18 beginning teachers who had started full time teaching for between 1-3 years. Analysis revealed that beginning teachers ‘saw’, ‘understood’ the conceptions of competency in five different ways: i) the ability to manage classroom and student behavior, ii) a strong knowledge of the subject content, iii) the ability to reach out for assistance and support, iv) understanding the students they teach, and v) possessing values of professionalism. The relationships between these different ways are represented diagrammatically. This investigation gives an insider’s perspective a strong voice of what constitutes teacher competence, as well as illustrates that if teacher competence is to be used for any articulation of teacher standards, the term must be carefully defined through the help of the group most affected by any judgements of their competency to avoid misunderstandings, unhappiness and discontent.

Keywords: pre-service teachers, phenomenology, competency, teacher education

Procedia PDF Downloads 314
295 The Morphing Avatar of Startup Sales - Destination Virtual Reality

Authors: Sruthi Kannan

Abstract:

The ongoing covid pandemic has accelerated digital transformation like never before. The physical barriers brought in as a result of the pandemic are being bridged by digital alternatives. While basic collaborative activities like voice, video calling, screen sharing have been replicated in these alternatives, there are several others that require a more intimate setup. Pitching, showcasing, and providing demonstrations are an integral part of selling strategies for startups. Traditionally these have been in-person engagements, enabling a depth of understanding of the startups’ offerings. In the new normal scenario of virtual-only connects, startups are feeling the brunt of the lack of in-person connections with potential customers and investors. This poster demonstrates how a virtual reality platform has been conceptualized and custom-built for startups to engage with their stakeholders and redefine their selling strategies. This virtual reality platform is intended to provide an immersive experience for startup showcases and offers the nearest possible alternative to physical meetings for the startup ecosystem, thereby opening newer frontiers for entrepreneurial collaborations.

Keywords: collaboration, sales, startups, strategy, virtual reality

Procedia PDF Downloads 302
294 Satire of Victorian Mores in Charles Dickens’ Great Expectations

Authors: Nagwa Abouserie Soliman

Abstract:

The Victorian era, which started with the reign of Queen Victoria from June 1837 to January 1901, could be considered as one of the most significant eras that had a crucial impact which formed contemporary British life despite the fact that with the rise of the British empire many negative aspects surfaced, namelysocial inequalities such as class differences, child labor, population increase and poverty due to the industrial revolution. Charles Dickens was one of the most prominent writers of the Victorian era who perceived the hypocrisy of the Victorian mores. The appropriate researchstyle that was chosen for this literary analysis is a qualitative research method in which the researcher used the conceptual approach to analyse theDickensian characterisation andwriting style through diction, narrative voice, and images. The aim of this paper is to argue that Charles Dickens inGreat Expectations (1861) was highly satirical of the Victorian mores, as he uses a lot of sharp irony-to satirize various Victorian traditions such as class divisions, the justice system, the poor working class, and the upper-class snobbery that he thought are inhumane and unjust.

Keywords: victorian, child labour, poverty, class division, snobbery

Procedia PDF Downloads 120
293 Smart Disassembly of Waste Printed Circuit Boards: The Role of IoT and Edge Computing

Authors: Muhammad Mohsin, Fawad Ahmad, Fatima Batool, Muhammad Kaab Zarrar

Abstract:

The integration of the Internet of Things (IoT) and edge computing devices offers a transformative approach to electronic waste management, particularly in the dismantling of printed circuit boards (PCBs). This paper explores how these technologies optimize operational efficiency and improve environmental sustainability by addressing challenges such as data security, interoperability, scalability, and real-time data processing. Proposed solutions include advanced machine learning algorithms for predictive maintenance, robust encryption protocols, and scalable architectures that incorporate edge computing. Case studies from leading e-waste management facilities illustrate benefits such as improved material recovery efficiency, reduced environmental impact, improved worker safety, and optimized resource utilization. The findings highlight the potential of IoT and edge computing to revolutionize e-waste dismantling and make the case for a collaborative approach between policymakers, waste management professionals, and technology developers. This research provides important insights into the use of IoT and edge computing to make significant progress in the sustainable management of electronic waste

Keywords: internet of Things, edge computing, waste PCB disassembly, electronic waste management, data security, interoperability, machine learning, predictive maintenance, sustainable development

Procedia PDF Downloads 22
292 Comparing Nonverbal Deception Detection of Police Officers and Human Resources Students in the Czech Republic

Authors: Lenka Mynaříková, Hedvika Boukalová

Abstract:

The study looks at the ability to detect nonverbal deception among police officers and management students in the Czech Republic. Respondents from police departments (n=197) and university students of human resources (n=161) completed a deception detection task and evaluated veracity of the statements of suspects in 21 video clips from real crime investigations. Their evaluations were based on nonverbal behavior. Voices in the video clips were modified so that words were not recognizable, yet paraverbal voice characteristics were preserved. Results suggest that respondents have a tendency to lie bias based on their profession. In the evaluation of video clips, stereotypes also played a significant role. The statements of suspects of a different ethnicity, younger age or specific visual features were considered deceitful more often. Research might be beneficial for training in professions that are in need of deception detection techniques.

Keywords: deception detection, police officers, human resources, forensic psychology, forensic studies, organizational psychology

Procedia PDF Downloads 428
291 Denoising Convolutional Neural Network Assisted Electrocardiogram Signal Watermarking for Secure Transmission in E-Healthcare Applications

Authors: Jyoti Rani, Ashima Anand, Shivendra Shivani

Abstract:

In recent years, physiological signals obtained in telemedicine have been stored independently from patient information. In addition, people have increasingly turned to mobile devices for information on health-related topics. Major authentication and security issues may arise from this storing, degrading the reliability of diagnostics. This study introduces an approach to reversible watermarking, which ensures security by utilizing the electrocardiogram (ECG) signal as a carrier for embedding patient information. In the proposed work, Pan-Tompkins++ is employed to convert the 1D ECG signal into a 2D signal. The frequency subbands of a signal are extracted using RDWT(Redundant discrete wavelet transform), and then one of the subbands is subjected to MSVD (Multiresolution singular valued decomposition for masking. Finally, the encrypted watermark is embedded within the signal. The experimental results show that the watermarked signal obtained is indistinguishable from the original signals, ensuring the preservation of all diagnostic information. In addition, the DnCNN (Denoising convolutional neural network) concept is used to denoise the retrieved watermark for improved accuracy. The proposed ECG signal-based watermarking method is supported by experimental results and evaluations of its effectiveness. The results of the robustness tests demonstrate that the watermark is susceptible to the most prevalent watermarking attacks.

Keywords: ECG, VMD, watermarking, PanTompkins++, RDWT, DnCNN, MSVD, chaotic encryption, attacks

Procedia PDF Downloads 95
290 Development of a Computer Vision System for the Blind and Visually Impaired Person

Authors: Rodrigo C. Belleza, Jr., Roselyn A. Maaño, Karl Patrick E. Camota, Darwin Kim Q. Bulawan

Abstract:

Eyes are an essential and conspicuous organ of the human body. Human eyes are outward and inward portals of the body that allows to see the outside world and provides glimpses into ones inner thoughts and feelings. Inevitable blindness and visual impairments may result from eye-related disease, trauma, or congenital or degenerative conditions that cannot be corrected by conventional means. The study emphasizes innovative tools that will serve as an aid to the blind and visually impaired (VI) individuals. The researchers fabricated a prototype that utilizes the Microsoft Kinect for Windows and Arduino microcontroller board. The prototype facilitates advanced gesture recognition, voice recognition, obstacle detection and indoor environment navigation. Open Computer Vision (OpenCV) performs image analysis, and gesture tracking to transform Kinect data to the desired output. A computer vision technology device provides greater accessibility for those with vision impairments.

Keywords: algorithms, blind, computer vision, embedded systems, image analysis

Procedia PDF Downloads 313
289 Interactive Shadow Play Animation System

Authors: Bo Wan, Xiu Wen, Lingling An, Xiaoling Ding

Abstract:

The paper describes a Chinese shadow play animation system based on Kinect. Users, without any professional training, can personally manipulate the shadow characters to finish a shadow play performance by their body actions and get a shadow play video through giving the record command to our system if they want. In our system, Kinect is responsible for capturing human movement and voice commands data. Gesture recognition module is used to control the change of the shadow play scenes. After packaging the data from Kinect and the recognition result from gesture recognition module, VRPN transmits them to the server-side. At last, the server-side uses the information to control the motion of shadow characters and video recording. This system not only achieves human-computer interaction, but also realizes the interaction between people. It brings an entertaining experience to users and easy to operate for all ages. Even more important is that the application background of Chinese shadow play embodies the protection of the art of shadow play animation.

Keywords: hadow play animation, Kinect, gesture recognition, VRPN, HCI

Procedia PDF Downloads 398
288 Quantum Inspired Security on a Mobile Phone

Authors: Yu Qin, Wanjiaman Li

Abstract:

The widespread use of mobile electronic devices increases the complexities of mobile security. This thesis aims to provide a secure communication environment for smartphone users. Some research proves that the one-time pad is one of the securest encryption methods, and that the key distribution problem can be solved by using the QKD (quantum key distribution). The objective of this project is to design an Android APP (application) to exchange several random keys between mobile phones. Inspired by QKD, the developed APP uses the quick response (QR) code as a carrier to dispatch large amounts of one-time keys. After evaluating the performance of APP, it allows the mobile phone to capture and decode 1800 bytes of random data in 600ms. The continuous scanning mode of APP is designed to improve the overall transmission performance and user experience, and the maximum transmission rate of this mode is around 2200 bytes/s. The omnidirectional readability and error correction capability of QR code gives it a better real-life application, and the features of adequate storage capacity and quick response optimize overall transmission efficiency. The security of this APP is guaranteed since QR code is exchanged face-to-face, eliminating the risk of being eavesdropped. Also, the id of QR code is the only message that would be transmitted through the whole communication. The experimental results show this project can achieve superior transmission performance, and the correlation between the transmission rate of the system and several parameters, such as the QR code size, has been analyzed. In addition, some existing technologies and the main findings in the context of the project are summarized and critically compared in detail.

Keywords: one-time pad, QKD (quantum key distribution), QR code, application

Procedia PDF Downloads 143
287 Urban Refugees and Education in Developing Countries

Authors: Sheraz Akhtar

Abstract:

In recent years, a massive influx of refugees into developing countries has placed significant constraints on the host government’s capacities to provide social services, including education, to all. As a result, the refugee communities often find themselves deprived of their rights to education in these host countries, particularly for those who to live outside camps in urban locations. While previous research has examined the educational experiences of refugees who have resettled in developed nations, there remains a dearth of research on the educational experiences of urban refugees in developing nations. This study examines this issue through a case study of Pakistani Christian refugees living in urban settings in Thailand. Using a combination of observations within community learning centres set up by international non-government organisations (INGOs) working with these communities, and interviews with young Pakistani Christian refugees and their families, the research aims to give greater voice to the Pakistani Christian refugee community living in Thailand, and better understand their educational aspirations.

Keywords: Education, Developing Countries , INGOs, Urban Refugees

Procedia PDF Downloads 122
286 Ethnographic Studies of the Choreographic Exploration Unveiling the Black Caribbean Female Body

Authors: Elle Nielsen

Abstract:

Festival time on the island of St. Croix is an annual celebration of a melting pot of rich culture and heritage. All your senses are amplified by the colorful bodies that paint the streets with swaying hips commemorating the ancestors who didn’t have the voice to express themselves, let alone the bodily authority through movement. Within this atmosphere of jubilee, you will become a witness to how the melodies of Calypso and Soca music take full control of the body. As a result, the waist and hips in a trance follow the polyrhythmic patterns birthing the shunned movement practices of whining and wukkin up. Spectators on the sidelines of the festival events will either frown upon this spectacle of the whining bodies or gaze in awe at the performative history in a public space. The historical value of the Caribbean Carnival is being defaced by the transnational spectatorship using body politics to push more of a Eurocentric-influenced atmosphere. The themes within this investigation are the stereotypes of over-sexualization and resistance to assimilation to how black female bodies are being viewed in Carnival.

Keywords: women equity, West Indian movement vocabulary, critical dance studies, humanitarianism in dance academia

Procedia PDF Downloads 94
285 Law and Literature: The Testimony in Pedro Casaldaliga's Poetic

Authors: Eliziane Navarro

Abstract:

It is intended, in this study, from some poems from the work of the poet and Bishop of São Félix do Araguaia-MT Brazil Dom Pedro Casaldáliga, to analyze his poetics from the perspective of the environmental law. In his work, Casaldáliga made a considerable manifest against the oppression experienced especially by Xavante people inside the constryside of the state of Mato Grosso when some government programs benefited a large number of landowners in instead of that minority as a power and control self-affirmation process. The attention which Casaldáliga dismissed to the cause of indigenous eviction of their land called Maraiwatsede resulted in numerous death threats against the poet who was not silenced in face of the landowners’ grievances. His voice contributed significantly to the process of land returning to the indigenous people. Because of the international pressure, the Italian company AGIP, owner of the land, tried to return it to the hands of the indigenous, unfortunately, in the middle of the process, the land was occupied by politicians and big landowners of the region. Another objective of this research is to check the connection of his testimonial literature with the actual legal context of the state in the 50s and also to analyze his poetry as a complaint that led the cause of the state's indigenous to the Eco 92 discussion in Rio de Janeiro.

Keywords: law and literature, Brazil, indigenous, Pedro Casaldáliga

Procedia PDF Downloads 207
284 An Approach to Secure Mobile Agent Communication in Multi-Agent Systems

Authors: Olumide Simeon Ogunnusi, Shukor Abd Razak, Michael Kolade Adu

Abstract:

Inter-agent communication manager facilitates communication among mobile agents via message passing mechanism. Until now, all Foundation for Intelligent Physical Agents (FIPA) compliant agent systems are capable of exchanging messages following the standard format of sending and receiving messages. Previous works tend to secure messages to be exchanged among a community of collaborative agents commissioned to perform specific tasks using cryptosystems. However, the approach is characterized by computational complexity due to the encryption and decryption processes required at the two ends. The proposed approach to secure agent communication allows only agents that are created by the host agent server to communicate via the agent communication channel provided by the host agent platform. These agents are assumed to be harmless. Therefore, to secure communication of legitimate agents from intrusion by external agents, a 2-phase policy enforcement system was developed. The first phase constrains the external agent to run only on the network server while the second phase confines the activities of the external agent to its execution environment. To implement the proposed policy, a controller agent was charged with the task of screening any external agent entering the local area network and preventing it from migrating to the agent execution host where the legitimate agents are running. On arrival of the external agent at the host network server, an introspector agent was charged to monitor and restrain its activities. This approach secures legitimate agent communication from Man-in-the Middle and Replay attacks.

Keywords: agent communication, introspective agent, isolation of agent, policy enforcement system

Procedia PDF Downloads 294
283 ‘Non-Legitimate’ Voices as L2 Models: Towards Becoming a Legitimate L2 Speaker

Authors: M. Rilliard

Abstract:

Based on a Multiliteracies-inspired and sociolinguistically-informed advanced French composition class, this study employed autobiographical narratives from speakers traditionally considered non-legitimate models for L2 teaching purposes of inspiring students to develop an authentic L2 voice and to see themselves as legitimate L2 speakers. Students explored their L2 identities in French through a self-inspired fictional character. Two autobiographical narratives of identity quest by non-traditional French speakers provided them guidance through this process: the novel Le Bleu des Abeilles (2013) and the film Qu’Allah Bénisse la France (2014). Written and French oral productions for different genres, as well as metalinguistic reflections in English, were collected and analyzed. Results indicate that ideas and materials that were relatable to students, namely relatable experiences and relatable language, were most useful to them in developing their L2 voices and achieving authentic and legitimate L2 speakership. These results point towards the benefits of using non-traditional speakers as pedagogical models, as they serve to legitimize students’ sense of their own L2-speakership, which ultimately leads them towards a better, more informed, mastery of the language.

Keywords: foreign language classroom, L2 identity, L2 learning and teaching, L2 writing, sociolinguistics

Procedia PDF Downloads 129
282 Arithmetic Operations Based on Double Base Number Systems

Authors: K. Sanjayani, C. Saraswathy, S. Sreenivasan, S. Sudhahar, D. Suganya, K. S. Neelukumari, N. Vijayarangan

Abstract:

Double Base Number System (DBNS) is an imminent system of representing a number using two bases namely 2 and 3, which has its application in Elliptic Curve Cryptography (ECC) and Digital Signature Algorithm (DSA).The previous binary method representation included only base 2. DBNS uses an approximation algorithm namely, Greedy Algorithm. By using this algorithm, the number of digits required to represent a larger number is less when compared to the standard binary method that uses base 2 algorithms. Hence, the computational speed is increased and time being reduced. The standard binary method uses binary digits 0 and 1 to represent a number whereas the DBNS method uses binary digit 1 alone to represent any number (canonical form). The greedy algorithm uses two ways to represent the number, one is by using only the positive summands and the other is by using both positive and negative summands. In this paper, arithmetic operations are used for elliptic curve cryptography. Elliptic curve discrete logarithm problem is the foundation for most of the day to day elliptic curve cryptography. This appears to be a momentous hard slog compared to digital logarithm problem. In elliptic curve digital signature algorithm, the key generation requires 160 bit of data by usage of standard binary representation. Whereas, the number of bits required generating the key can be reduced with the help of double base number representation. In this paper, a new technique is proposed to generate key during encryption and extraction of key in decryption.

Keywords: cryptography, double base number system, elliptic curve cryptography, elliptic curve digital signature algorithm

Procedia PDF Downloads 392
281 A Novel Combined Finger Counting and Finite State Machine Technique for ASL Translation Using Kinect

Authors: Rania Ahmed Kadry Abdel Gawad Birry, Mohamed El-Habrouk

Abstract:

This paper presents a brief survey of the techniques used for sign language recognition along with the types of sensors used to perform the task. It presents a modified method for identification of an isolated sign language gesture using Microsoft Kinect with the OpenNI framework. It presents the way of extracting robust features from the depth image provided by Microsoft Kinect and the OpenNI interface and to use them in creating a robust and accurate gesture recognition system, for the purpose of ASL translation. The Prime Sense’s Natural Interaction Technology for End-user - NITE™ - was also used in the C++ implementation of the system. The algorithm presents a simple finger counting algorithm for static signs as well as directional Finite State Machine (FSM) description of the hand motion in order to help in translating a sign language gesture. This includes both letters and numbers performed by a user, which in-turn may be used as an input for voice pronunciation systems.

Keywords: American sign language, finger counting, hand tracking, Microsoft Kinect

Procedia PDF Downloads 293
280 Preserving Digital Arabic Text Integrity Using Blockchain Technology

Authors: Zineb Touati Hamad, Mohamed Ridda Laouar, Issam Bendib

Abstract:

With the massive development of technology today, the Arabic language has gained a prominent position among the languages most used for writing articles, expressing opinions, and also for citing in many websites, defying its growing sensitivity in terms of structure, language skills, diacritics, writing methods, etc. In the context of the spread of the Arabic language, the Holy Quran represents the most prevalent Arabic text today in many applications and websites for citation purposes or for the reading and learning rituals. The Quranic verses / surahs are published quickly and without cost, which may cause great concern to ensure the safety of the content from tampering and alteration. To protect the content of texts from distortion, it is necessary to refer to the original database and conduct a comparison process to extract the percentage of distortion. The disadvantage of this method is that it takes time, in addition to the lack of any guarantee on the integrity of the database itself as it belongs to one central party. Blockchain technology today represents the best way to maintain immutable content. Blockchain is a distributed database that stores information in blocks linked to each other through encryption, where the modification of each block can be easily known. To exploit these advantages, we seek in this paper to justify the use of this technique in preserving the integrity of Arabic texts sensitive to change by building a decentralized framework to authenticate and verify the integrity of the digital Quranic verses/surahs spread on websites.

Keywords: arabic text, authentication, blockchain, integrity, quran, verification

Procedia PDF Downloads 158
279 Women’s Leadership for Sustainable Outcomes: On the Road to Gender Equality for a Better Tomorrow

Authors: Deepika Faugoo

Abstract:

Gender equality stands as the cornerstone of societal progress, intricately woven into the very essence of the 2030 Sustainable Development Goals (SDGs). Yet, the gender leadership gap remains a formidable obstacle hindering global equality. Despite women's educational advancements, their underrepresentation in senior roles persists as a baffling anomaly. Drawing from contemporary research, empirical evidence, and secondary data, this paper underscores the imperative of advancing women in leadership to drive SDGs related to empowerment and gender equality by 2030. It highlights the undeniable link between women leaders and sustainable outcomes, citing case studies and examples of their contributions to financial performance, prosperity, economic growth, and societal well-being. Exploring persistent barriers and emerging challenges, it offers actionable strategies to enhance women's representation in leadership, promising transformative benefits for organizations and societies. Amidst societal upheavals, gender equality emerges as a potent solution, catalyzing change toward a future where every voice resonates, ensuring no one is left behind.

Keywords: senior leadership, empowerment, SDGs, gender equality

Procedia PDF Downloads 59
278 A Comparative Analysis of the Lexicostatics of Usen, Edo and Yoruba

Authors: Mercy Itohan Aruya

Abstract:

This paper focuses on Usen, a speech form enclaved by the Edo communities in Ovia South West Local Government Area of Edo State, Nigeria. Usen lies at the border between Edo and the Osun state in Nigeria and has a population size of about a hundred and eighty thousand native speakers (2006 population census of Nigeria). Usen, as it is spoken today is highly endangered and it is serious struggling for survival. The aim, therefore, is to ascertain the linguistics status of Usen using a lexicostatical approach. Lexicostatics is a linguistic technique employed in accessing the degree of linguistic divergence or relatedness between two or more languages based on the proportion of cognates. Data for this study were collected from competent native speakers whose ages fall within the range of 40-65. The instrument for this study is the Ibadan 400 word-list of basic items which are collected with of a digital voice recorder. Our major finding in this paper reveals and establishes the facts that Usen speech form is not a dialect but a language of its own. However, Usen is more related to Yoruba than Edo as the degree of relatedness between Usen and Yoruba is 56.14% while that between Usen and Edo is about 21.4% as shown in this research effort.

Keywords: Usen, lexicostatistics, cognate words, language status

Procedia PDF Downloads 195
277 Operating System Support for Mobile Device Thermal Management and Performance Optimization in Augmented Reality Applications

Authors: Yasith Mindula Saipath Wickramasinghe

Abstract:

Augmented reality applications require a high processing power to load, render and live stream high-definition AR models and virtual scenes; it also requires device sensors to work excessively to coordinate with internal hardware, OS and give the expected outcome in advance features like object detection, real time tracking, as well as voice and text recognition. Excessive thermal generation due to these advanced functionalities has become a major research problem as it is unbearable for smaller mobile devices to manage such heat increment and battery drainage as it causes physical harm to the devices in the long term. Therefore, effective thermal management is one of the major requirements in Augmented Reality application development. As this paper discusses major causes for this issue, it also provides possible solutions in the means of operating system adaptations as well as further research on best coding practises to optimize the application performance that reduces thermal excessive thermal generation.

Keywords: augmented reality, device thermal management, GPU, operating systems, device I/O, overheating

Procedia PDF Downloads 114
276 Medical Experience: Usability Testing of Displaying Computed Tomography Scans and Magnetic Resonance Imaging in Virtual and Augmented Reality for Accurate Diagnosis

Authors: Alyona Gencheva

Abstract:

The most common way to study diagnostic results is using specialized programs at a stationary workplace. Magnetic Resonance Imaging is presented in a two-dimensional (2D) format, and Computed Tomography sometimes looks like a three-dimensional (3D) model that can be interacted with. The main idea of the research is to compare ways of displaying diagnostic results in virtual reality that can help a surgeon during or before an operation in augmented reality. During the experiment, the medical staff examined liver vessels in the abdominal area and heart boundaries. The search time and detection accuracy were measured on black-and-white and coloured scans. Usability testing in virtual reality shows convenient ways of interaction like hand input, voice activation, displaying risk to the patient, and the required number of scans. The results of the experiment will be used in the new C# program based on Magic Leap technology.

Keywords: augmented reality, computed tomography, magic leap, magnetic resonance imaging, usability testing, VTE risk

Procedia PDF Downloads 107
275 Community Strengths and Indigenous Resilience as Drivers for Health Reform Change

Authors: Shana Malio-Satele, Lemalu Silao Vaisola Sefo

Abstract:

Introductory Statement: South Seas Healthcare is Ōtara’s largest Pacific health provider in South Auckland, New Zealand. Our vision is excellent health and well-being for Pacific people and all communities through strong Pacific values. During the DELTA and Omicron outbreak of COVID-19, our Pacific people, indigenous Māori, and the community of South Auckland were disproportionately affected and faced significant hardship with existing inequities magnified. This study highlights the community-based learnings of harnessing community-based strengths such as indigenous resilience, family-informed experiences and stories that provide critical insights that inform health reform changes that will be sustainable and equitable for all indigenous populations. This study is based on critical learnings acquired during COVID-19 that challenge the deficit narrative common in healthcare about indigenous populations. This study shares case studies of marginalised groups and religious groups and the successful application of indigenous cultural strengths, such as collectivism, positive protective factors, and using trusted relationships to create meaningful change in the way healthcare is delivered. The significance of this study highlights the critical conditions needed to adopt a community-informed way of creating integrated healthcare that works and the role that the community can play in being part of the solution. Methodologies: Key methodologies utilised are indigenous and Pacific-informed. To achieve critical learnings from the community, Pacific research methodologies, heavily informed by the Polynesian practice, were applied. Specifically, this includes; Teu Le Va (Understanding the importance of trusted relationships as a way of creating positive health solutions); The Fonofale Methodology (A way of understanding how health incorporates culture, family, the physical, spiritual, mental and other dimensions of health, as well as time, context and environment; The Fonua Methodology – Understanding the overall wellbeing and health of communities, families and individuals and their holistic needs and environmental factors and the Talanoa methodology (Researching through conversation, where understanding the individual and community is through understanding their history and future through stories). Major Findings: Key findings in the study included: 1. The collectivist approach in the community is a strengths-based response specific to populations, which highlights the importance of trusted relationships and cultural values to achieve meaningful outcomes. 2. The development of a “village model” which identified critical components to achieving health reform change; system navigation, a sense of service that was culturally responsive, critical leadership roles, culturally appropriate support, and the ability to influence the system enablers to support an alternative way of working. Concluding Statement: There is a strong connection between community-based strengths being implemented into healthcare strategies and reforms and the sustainable success of indigenous populations and marginalised communities accessing services that are cohesive, equitably resourced, accessible and meaningful for families. This study highlights the successful community-informed approaches and practices used during the COVID-19 response in New Zealand that are now being implemented in the current health reform.

Keywords: indigenous voice, community voice, health reform, New Zealand

Procedia PDF Downloads 86
274 A Proposal to Tackle Security Challenges of Distributed Systems in the Healthcare Sector

Authors: Ang Chia Hong, Julian Khoo Xubin, Burra Venkata Durga Kumar

Abstract:

Distributed systems offer many benefits to the healthcare industry. From big data analysis to business intelligence, the increased computational power and efficiency from distributed systems serve as an invaluable resource in the healthcare sector to utilize. However, as the usage of these distributed systems increases, many issues arise. The main focus of this paper will be on security issues. Many security issues stem from distributed systems in the healthcare industry, particularly information security. The data of people is especially sensitive in the healthcare industry. If important information gets leaked (Eg. IC, credit card number, address, etc.), a person’s identity, financial status, and safety might get compromised. This results in the responsible organization losing a lot of money in compensating these people and even more resources expended trying to fix the fault. Therefore, a framework for a blockchain-based healthcare data management system for healthcare was proposed. In this framework, the usage of a blockchain network is explored to store the encryption key of the patient’s data. As for the actual data, it is encrypted and its encrypted data, called ciphertext, is stored in a cloud storage platform. Furthermore, there are some issues that have to be emphasized and tackled for future improvements, such as a multi-user scheme that could be proposed, authentication issues that have to be tackled or migrating the backend processes into the blockchain network. Due to the nature of blockchain technology, the data will be tamper-proof, and its read-only function can only be accessed by authorized users such as doctors and nurses. This guarantees the confidentiality and immutability of the patient’s data.

Keywords: distributed, healthcare, efficiency, security, blockchain, confidentiality and immutability

Procedia PDF Downloads 179
273 Preparation of Wireless Networks and Security; Challenges in Efficient Accession of Encrypted Data in Healthcare

Authors: M. Zayoud, S. Oueida, S. Ionescu, P. AbiChar

Abstract:

Background: Wireless sensor network is encompassed of diversified tools of information technology, which is widely applied in a range of domains, including military surveillance, weather forecasting, and earthquake forecasting. Strengthened grounds are always developed for wireless sensor networks, which usually emerges security issues during professional application. Thus, essential technological tools are necessary to be assessed for secure aggregation of data. Moreover, such practices have to be incorporated in the healthcare practices that shall be serving in the best of the mutual interest Objective: Aggregation of encrypted data has been assessed through homomorphic stream cipher to assure its effectiveness along with providing the optimum solutions to the field of healthcare. Methods: An experimental design has been incorporated, which utilized newly developed cipher along with CPU-constrained devices. Modular additions have also been employed to evaluate the nature of aggregated data. The processes of homomorphic stream cipher have been highlighted through different sensors and modular additions. Results: Homomorphic stream cipher has been recognized as simple and secure process, which has allowed efficient aggregation of encrypted data. In addition, the application has led its way to the improvisation of the healthcare practices. Statistical values can be easily computed through the aggregation on the basis of selected cipher. Sensed data in accordance with variance, mean, and standard deviation has also been computed through the selected tool. Conclusion: It can be concluded that homomorphic stream cipher can be an ideal tool for appropriate aggregation of data. Alongside, it shall also provide the best solutions to the healthcare sector.

Keywords: aggregation, cipher, homomorphic stream, encryption

Procedia PDF Downloads 255