Search results for: video encryption
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 1163

Search results for: video encryption

683 Small-Sided Games in Football: Effect of Field Sizes on Technical Parameters

Authors: Faruk Guven, Nurtekin Erkmen, Samet Aktas, Cengiz Taskin

Abstract:

The aim of this study was to determine effects of field sizes on technical parameters of small-sided games in football players. Eight amateur football players (27.23±3.08 years, heigth: 171.01±5.36 cm, body weigth: 66.86±4.54 kg, sports experience: 12.88±3.28 years) performed 4-a-side small-sided games (SSG) with different field sizes. In SSGs, field sizes were 30 x 40 m and 26 mx24 m. SSGs was conducted as a series of 3 bouts of 6 min with 5 min recovery durations. All SSGs were video recorded using two digital video camcorder positioned on a tripot. Shoot on taget, passes, succesful passes, unsuccesful passes, dripling, tackle, possession in SSGs were counted by Mathball Match Analysis System. The effects of bouts on technical score were examined separately using a Friedman’s test. Mann Whitney U test was applied to analyse differences between field sizes. There were no significant differences in shoots on target, total pass, successful pass, tackle, interception, possession between bouts in 30x40 m field size (p>0.05). Unsuccessful pass in bout 3 for 30x40 m field size was lower than bout 1 and bout 2 (p<0.05) and dripling in bout 3 was lower than bout 2 (p<0.05). There was no significant difference in technical actions between bouts for 26x34 m field size (p>0.05). Shoot on target in SSG with 26 x 34 m field size was higher than SSG with 30x40 m field size (p<0.05). Unsuccessful pass for 26x34 m field size in bout 3 was higher than SSG with 30x40 m field size (p<0.05). There was no significant difference in technical actions between field sizes (p>0.05). In conclusion; in this study demonstrates that technical actions in a-4-side SSG are not influenced by different field sizes (for 30x40 m and 26x34 m field sizes). This consequence is same for both total SSG time and each bout. Dripling and unsuccessful pass decrease in bout 3 during SSG in 30 x 40 m field size.

Keywords: small-sided games, football, technical actions, sport science

Procedia PDF Downloads 553
682 Secure Cryptographic Operations on SIM Card for Mobile Financial Services

Authors: Kerem Ok, Serafettin Senturk, Serdar Aktas, Cem Cevikbas

Abstract:

Mobile technology is very popular nowadays and it provides a digital world where users can experience many value-added services. Service Providers are also eager to offer diverse value-added services to users such as digital identity, mobile financial services and so on. In this context, the security of data storage in smartphones and the security of communication between the smartphone and service provider are critical for the success of these services. In order to provide the required security functions, the SIM card is one acceptable alternative. Since SIM cards include a Secure Element, they are able to store sensitive data, create cryptographically secure keys, encrypt and decrypt data. In this paper, we design and implement a SIM and a smartphone framework that uses a SIM card for secure key generation, key storage, data encryption, data decryption and digital signing for mobile financial services. Our frameworks show that the SIM card can be used as a controlled Secure Element to provide required security functions for popular e-services such as mobile financial services.

Keywords: SIM card, mobile financial services, cryptography, secure data storage

Procedia PDF Downloads 312
681 A Comprehensive Framework to Ensure Data Security in Cloud Computing: Analysis, Solutions, and Approaches

Authors: Loh Fu Quan, Fong Zi Heng, Burra Venkata Durga Kumar

Abstract:

Cloud computing has completely transformed the way many businesses operate. Traditionally, confidential data of a business is stored in computers located within the premise of the business. Therefore, a lot of business capital is put towards maintaining computing resources and hiring IT teams to manage them. The advent of cloud computing changes everything. Instead of purchasing and managing their infrastructure, many businesses have started to shift towards working with the cloud with the help of a cloud service provider (CSP), leading to cost savings. However, it also introduces security risks. This research paper focuses on the security risks that arise during data migration and user authentication in cloud computing. To overcome this problem, this paper provides a comprehensive framework that includes Transport Layer Security (TLS), user authentication, security tokens and multi-level data encryption. This framework aims to prevent authorized access to cloud resources and data leakage, ensuring the confidentiality of sensitive information. This framework can be used by cloud service providers to strengthen the security of their cloud and instil confidence in their users.

Keywords: Cloud computing, Cloud security, Cloud security issues, Cloud security framework

Procedia PDF Downloads 121
680 An Authentication Protocol for Quantum Enabled Mobile Devices

Authors: Natarajan Venkatachalam, Subrahmanya V. R. K. Rao, Vijay Karthikeyan Dhandapani, Swaminathan Saravanavel

Abstract:

The quantum communication technology is an evolving design which connects multiple quantum enabled devices to internet for secret communication or sensitive information exchange. In future, the number of these compact quantum enabled devices will increase immensely making them an integral part of present communication systems. Therefore, safety and security of such devices is also a major concern for us. To ensure the customer sensitive information will not be eavesdropped or deciphered, we need a strong authentications and encryption mechanism. In this paper, we propose a mutual authentication scheme between these smart quantum devices and server based on the secure exchange of information through quantum channel which gives better solutions for symmetric key exchange issues. An important part of this work is to propose a secure mutual authentication protocol over the quantum channel. We show that our approach offers robust authentication protocol and further our solution is lightweight, scalable, cost-effective with optimized computational processing overheads.

Keywords: quantum cryptography, quantum key distribution, wireless quantum communication, authentication protocol, quantum enabled device, trusted third party

Procedia PDF Downloads 175
679 Audio-Lingual Method and the English-Speaking Proficiency of Grade 11 Students

Authors: Marthadale Acibo Semacio

Abstract:

Speaking skill is a crucial part of English language teaching and learning. This actually shows the great importance of this skill in English language classes. Through speaking, ideas and thoughts are shared with other people, and a smooth interaction between people takes place. The study examined the levels of speaking proficiency of the control and experimental groups on pronunciation, grammatical accuracy, and fluency. As a quasi-experimental study, it also determined the presence or absence of significant changes in their speaking proficiency levels in terms of pronouncing the words correctly, the accuracy of grammar and fluency of a language given the two methods to the groups of students in the English language, using the traditional and audio-lingual methods. Descriptive and inferential statistics were employed according to the stated specific problems. The study employed a video presentation with prior information about it. In the video, the teacher acts as model one, giving instructions on what is going to be done, and then the students will perform the activity. The students were paired purposively based on their learning capabilities. Observing proper ethics, their performance was audio recorded to help the researcher assess the learner using the modified speaking rubric. The study revealed that those under the traditional method were more fluent than those in the audio-lingual method. With respect to the way in which each method deals with the feelings of the student, the audio-lingual one fails to provide a principle that would relate to this area and follows the assumption that the intrinsic motivation of the students to learn the target language will spring from their interest in the structure of the language. However, the speaking proficiency levels of the students were remarkably reinforced in reading different words through the aid of aural media with their teachers. The study concluded that using an audio-lingual method of teaching is not a stand-alone method but only an aid of the teacher in helping the students improve their speaking proficiency in the English Language. Hence, audio-lingual approach is encouraged to be used in teaching English language, on top of the chalk-talk or traditional method, to improve the speaking proficiency of students.

Keywords: audio-lingual, speaking, grammar, pronunciation, accuracy, fluency, proficiency

Procedia PDF Downloads 70
678 Securing Healthcare IoT Devices and Enabling SIEM Integration: Addressing

Authors: Mubarak Saadu Nabunkari, Abdullahi Abdu Ibrahim, Muhammad Ilyas

Abstract:

This study looks at how Internet of Things (IoT) devices are used in healthcare to monitor and treat patients better. However, using these devices in healthcare comes with security problems. The research explores using Security Information and Event Management (SIEM) systems with healthcare IoT devices to solve these security challenges. Reviewing existing literature shows the current state of IoT security and emphasizes the need for better protection. The main worry is that healthcare IoT devices can be easily hacked, putting patient data and device functionality at risk. To address this, the research suggests a detailed security framework designed for these devices. This framework, based on literature and best practices, includes important security measures like authentication, data encryption, access controls, and anomaly detection. Adding SIEM systems to this framework helps detect threats in real time and respond quickly to incidents, making healthcare IoT devices more secure. The study highlights the importance of this integration and offers guidance for implementing healthcare IoT securely, efficiently, and effectively.

Keywords: cyber security, threat intelligence, forensics, heath care

Procedia PDF Downloads 67
677 Developing Digital Competencies in Aboriginal Students through University-College Partnerships

Authors: W. S. Barber, S. L. King

Abstract:

This paper reports on a pilot project to develop a collaborative partnership between a community college in rural northern Ontario, Canada, and an urban university in the greater Toronto area in Oshawa, Canada. Partner institutions will collaborate to address learning needs of university applicants whose goals are to attain an undergraduate university BA in Educational Studies and Digital Technology degree, but who may not live in a geographical location that would facilitate this pathways process. The UOIT BA degree is attained through a 2+2 program, where students with a 2 year college diploma or equivalent can attain a four year undergraduate degree. The goals reported on the project are as: 1. Our aim is to expand the BA program to include an additional stream which includes serious educational games, simulations and virtual environments, 2. Develop fully (using both synchronous and asynchronous technologies) online learning modules for use by university applicants who otherwise are not geographically located close to a physical university site, 3. Assess the digital competencies of all students, including members of local, distance and Indigenous communities using a validated tool developed and tested by UOIT across numerous populations. This tool, the General Technical Competency Use and Scale (GTCU) will provide the collaborating institutions with data that will allow for analyzing how well students are prepared to succeed in fully online learning communities. Philosophically, the UOIT BA program is based on a fully online learning communities model (FOLC) that can be accessed from anywhere in the world through digital learning environments via audio video conferencing tools such as Adobe Connect. It also follows models of adult learning and mobile learning, and makes a university degree accessible to the increasing demographic of adult learners who may use mobile devices to learn anywhere anytime. The program is based on key principles of Problem Based Learning, allowing students to build their own understandings through the co-design of the learning environment in collaboration with the instructors and their peers. In this way, this degree allows students to personalize and individualize the learning based on their own culture, background and professional/personal experiences. Using modified flipped classroom strategies, students are able to interrogate video modules on their own time in preparation for one hour discussions occurring in video conferencing sessions. As a consequence of the program flexibility, students may continue to work full or part time. All of the partner institutions will co-develop four new modules, administer the GTCU and share data, while creating a new stream of the UOIT BA degree. This will increase accessibility for students to bridge from community colleges to university through a fully digital environment. We aim to work collaboratively with Indigenous elders, community members and distance education instructors to increase opportunities for more students to attain a university education.

Keywords: aboriginal, college, competencies, digital, universities

Procedia PDF Downloads 216
676 Major Role of Social Media in Encouraging Public Interaction with Health Awareness: A Case Study of Successful Saudi Diabetes Campaign

Authors: Budur Almutairi

Abstract:

Introduction: There is an alarming increase in the number of diabetic patients in Saudi Arabia during the last twenty years. The World Health Organization (WHO) reports that the country ranks seventh in the world for the rate of diabetes. It is also estimated that around 7 million of the population are diabetic and almost around 3 million have pre-diabetes. The prevalence is more in urban area than in rural and more in women than in men and it is closely associated with the parallel rise in obesity rates. Diabetes is found to be contributing to the increasing mortality, morbidity and vascular complications and becoming a significant cause of medical complications and even death. The trends shown by the numbers are worrying as the prevalence is steadily doubling every two decades and particularly in Saudi Arabia, this could soon reach 50% in those over 50 years of age. The economic growth and prosperity have shown notable changes in the lifestyle of the people. Most importantly, along with an increased consumption of fast foods and sugar-rich carbonated soft drinks, eating habits became less healthy and the level of physical activity is decreased. The simultaneous technological advancement and the introduction of new mechanical devices like, elevators, escalators, remotes and vehicles pushed people to a situation of leading a more sedentary life. This study is attempting to evaluate the success of the campaign that introduced through popular social media in the country. Methodology: The Ministry of Health (MoH) has initiated a novel method of campaign activity to generate discussion among public about diabetes. There were mythical monsters introduced through popular social media with disguised messages about the condition of diabetes has generated widespread discussions about the disease among the general public. The characters that started appearing in social media About 600 retweets of the original post was testimonial for the success of the Twitter campaign. The second most successful form of campaign was a video that adopted a very popular approach of using Dark Comedy in which, the diabetes was represented through a twisted negative character that talks about his meticulous plans of how he is going to take the common people into his clutches. This fictional character gained more popularity when introduced into twitter and people started interacting with him raising various questions and challenging his anti-social activities. Major findings: The video generated more than 3,200,000 views ranking 9th in You Tube’s most popular video in Saudi Arabia and was shared 7000 times in a single week. Also, the hashtag got over 4,500,000impressions and over one million visits. Conclusion: Diabetes mellitus in Saudi Arabia is emerging as an epidemic of massive proportions, threatening to negate the benefits of modernization and economic revival. It is highly possible that healthy practices connected with the prevention and management of DM can easily be implemented in a manner that does not conflict with the cultural milieu of Saudi Arabia.

Keywords: campaign, diabetes, Saudi, social media

Procedia PDF Downloads 131
675 VANETs: Security Challenges and Future Directions

Authors: Jared Oluoch

Abstract:

Connected vehicles are equipped with wireless sensors that aid in Vehicle to Vehicle (V2V) and Vehicle to Infrastructure (V2I) communication. These vehicles will in the near future provide road safety, improve transport efficiency, and reduce traffic congestion. One of the challenges for connected vehicles is how to ensure that information sent across the network is secure. If security of the network is not guaranteed, several attacks can occur, thereby compromising the robustness, reliability, and efficiency of the network. This paper discusses existing security mechanisms and unique properties of connected vehicles. The methodology employed in this work is exploratory. The paper reviews existing security solutions for connected vehicles. More concretely, it discusses various cryptographic mechanisms available, and suggests areas of improvement. The study proposes a combination of symmetric key encryption and public key cryptography to improve security. The study further proposes message aggregation as a technique to overcome message redundancy. This paper offers a comprehensive overview of connected vehicles technology, its applications, its security mechanisms, open challenges, and potential areas of future research.

Keywords: VANET, connected vehicles, 802.11p, WAVE, DSRC, trust, security, cryptography

Procedia PDF Downloads 314
674 Deterministic Random Number Generator Algorithm for Cryptosystem Keys

Authors: Adi A. Maaita, Hamza A. A. Al Sewadi

Abstract:

One of the crucial parameters of digital cryptographic systems is the selection of the keys used and their distribution. The randomness of the keys has a strong impact on the system’s security strength being difficult to be predicted, guessed, reproduced or discovered by a cryptanalyst. Therefore, adequate key randomness generation is still sought for the benefit of stronger cryptosystems. This paper suggests an algorithm designed to generate and test pseudo random number sequences intended for cryptographic applications. This algorithm is based on mathematically manipulating a publically agreed upon information between sender and receiver over a public channel. This information is used as a seed for performing some mathematical functions in order to generate a sequence of pseudorandom numbers that will be used for encryption/decryption purposes. This manipulation involves permutations and substitutions that fulfills Shannon’s principle of “confusion and diffusion”. ASCII code characters wereutilized in the generation process instead of using bit strings initially, which adds more flexibility in testing different seed values. Finally, the obtained results would indicate sound difficulty of guessing keys by attackers.

Keywords: cryptosystems, information security agreement, key distribution, random numbers

Procedia PDF Downloads 269
673 Investigation of Delivery of Triple Play Data in GE-PON Fiber to the Home Network

Authors: Ashima Anurag Sharma

Abstract:

Optical fiber based networks can deliver performance that can support the increasing demands for high speed connections. One of the new technologies that have emerged in recent years is Passive Optical Networks. This research paper is targeted to show the simultaneous delivery of triple play service (data, voice, and video). The comparison between various data rates is presented. It is demonstrated that as we increase the data rate, number of users to be decreases due to increase in bit error rate.

Keywords: BER, PON, TDMPON, GPON, CWDM, OLT, ONT

Procedia PDF Downloads 529
672 Investigation of Delivery of Triple Play Services

Authors: Paramjit Mahey, Monica Sharma, Jasbinder Singh

Abstract:

Fiber based access networks can deliver performance that can support the increasing demands for high speed connections. One of the new technologies that have emerged in recent years is Passive Optical Networks. This paper is targeted to show the simultaneous delivery of triple play service (data, voice and video). The comparative investigation and suitability of various data rates is presented. It is demonstrated that as we increase the data rate, number of users to be accommodated decreases due to increase in bit error rate.

Keywords: BER, PON, TDMPON, GPON, CWDM, OLT, ONT

Procedia PDF Downloads 542
671 Hidden Hot Spots: Identifying and Understanding the Spatial Distribution of Crime

Authors: Lauren C. Porter, Andrew Curtis, Eric Jefferis, Susanne Mitchell

Abstract:

A wealth of research has been generated examining the variation in crime across neighborhoods. However, there is also a striking degree of crime concentration within neighborhoods. A number of studies show that a small percentage of street segments, intersections, or addresses account for a large portion of crime. Not surprisingly, a focus on these crime hot spots can be an effective strategy for reducing community level crime and related ills, such as health problems. However, research is also limited in an important respect. Studies tend to use official data to identify hot spots, such as 911 calls or calls for service. While the use of call data may be more representative of the actual level and distribution of crime than some other official measures (e.g. arrest data), call data still suffer from the 'dark figure of crime.' That is, there is most certainly a degree of error between crimes that occur versus crimes that are reported to the police. In this study, we present an alternative method of identifying crime hot spots, that does not rely on official data. In doing so, we highlight the potential utility of neighborhood-insiders to identify and understand crime dynamics within geographic spaces. Specifically, we use spatial video and geo-narratives to record the crime insights of 36 police, ex-offenders, and residents of a high crime neighborhood in northeast Ohio. Spatial mentions of crime are mapped to identify participant-identified hot spots, and these are juxtaposed with calls for service (CFS) data. While there are bound to be differences between these two sources of data, we find that one location, in particular, a corner store, emerges as a hot spot for all three groups of participants. Yet it does not emerge when we examine CFS data. A closer examination of the space around this corner store and a qualitative analysis of narrative data reveal important clues as to why this store may indeed be a hot spot, but not generate disproportionate calls to the police. In short, our results suggest that researchers who rely solely on official data to study crime hot spots may risk missing some of the most dangerous places.

Keywords: crime, narrative, video, neighborhood

Procedia PDF Downloads 238
670 Performance Analysis of Elliptic Curve Cryptography Using Onion Routing to Enhance the Privacy and Anonymity in Grid Computing

Authors: H. Parveen Begam, M. A. Maluk Mohamed

Abstract:

Grid computing is an environment that allows sharing and coordinated use of diverse resources in dynamic, heterogeneous and distributed environment using Virtual Organization (VO). Security is a critical issue due to the open nature of the wireless channels in the grid computing which requires three fundamental services: authentication, authorization, and encryption. The privacy and anonymity are considered as an important factor while communicating over publicly spanned network like web. To ensure a high level of security we explored an extension of onion routing, which has been used with dynamic token exchange along with protection of privacy and anonymity of individual identity. To improve the performance of encrypting the layers, the elliptic curve cryptography is used. Compared to traditional cryptosystems like RSA (Rivest-Shamir-Adelman), ECC (Elliptic Curve Cryptosystem) offers equivalent security with smaller key sizes which result in faster computations, lower power consumption, as well as memory and bandwidth savings. This paper presents the estimation of the performance improvements of onion routing using ECC as well as the comparison graph between performance level of RSA and ECC.

Keywords: grid computing, privacy, anonymity, onion routing, ECC, RSA

Procedia PDF Downloads 398
669 Digital Image Steganography with Multilayer Security

Authors: Amar Partap Singh Pharwaha, Balkrishan Jindal

Abstract:

In this paper, a new method is developed for hiding image in a digital image with multilayer security. In the proposed method, the secret image is encrypted in the first instance using a flexible matrix based symmetric key to add first layer of security. Then another layer of security is added to the secret data by encrypting the ciphered data using Pythagorean Theorem method. The ciphered data bits (4 bits) produced after double encryption are then embedded within digital image in the spatial domain using Least Significant Bits (LSBs) substitution. To improve the image quality of the stego-image, an improved form of pixel adjustment process is proposed. To evaluate the effectiveness of the proposed method, image quality metrics including Peak Signal-to-Noise Ratio (PSNR), Mean Square Error (MSE), entropy, correlation, mean value and Universal Image Quality Index (UIQI) are measured. It has been found experimentally that the proposed method provides higher security as well as robustness. In fact, the results of this study are quite promising.

Keywords: Pythagorean theorem, pixel adjustment, ciphered data, image hiding, least significant bit, flexible matrix

Procedia PDF Downloads 337
668 An Exploration of the Integration of Guided Play With Explicit Instruction in Early Childhood Mathematics

Authors: Anne Tan, Kok-Sing Tang, Audrey Cooke

Abstract:

Play has always been a prominent pedagogy in early childhood. However, there is growing evidence of success in students’ learning using explicit instruction, especially in literacy in the early years. There is also limited research using explicit instruction in early childhood mathematics, and play is usually prominently mentioned. This proposed research aims to investigate the possibilities and benefits of integrating guided play with explicit instruction in early childhood mathematics education. While play has traditionally been a prominent pedagogy in early childhood, there is growing evidence of success in student learning through explicit instruction, particularly in literacy. However, limited research exists on the integration of explicit instruction in early childhood mathematics, where play remains prominently mentioned. This study utilises a multiple case study methodology to gather data and provide immediate opportunities for curriculum improvement. The research will commence with semi-structured interviews to gain insights into educators' background knowledge. Highly structured observations will be conducted to record the frequency and manner in which guided play is integrated with specific elements of explicit instruction during mathematics teaching in early childhood. To enhance the observations, video recordings will be made using cameras with video settings and Microsoft Teams meeting recordings. In addition to interviews and observations, educators will maintain journals and use the Microsoft Teams platform for self-reflection on the integration of guided play and explicit instruction in their classroom practices and experiences. The study participants will include educators with early childhood degrees and students in years one and two. The primary goal of this research is to inform the benefits of integrating two high-impact pedagogies, guided play, and explicit instruction, for enhancing student learning outcomes in mathematics education. By exploring the integration of these pedagogical approaches, this study aims to contribute to the development of effective instructional strategies in early childhood mathematics education.

Keywords: early childhood, early childhood mathematics, early childhood numbers, guided play, play-based learning, explicit instruction

Procedia PDF Downloads 65
667 Analysis of Barbell Kinematics of Snatch Technique among Women Weightlifters in India

Authors: Manish Kumar Pillai, Madhavi Pathak Pillai, Rajender Lal, Dinesh P. Sharma

Abstract:

India has not yet been able to produce many weightlifters in the past years. Karnam Malleshwari is the only woman to win a medal for India in Olympics. When we try to introspect, there seem to be different reasons. One of the probable cause could be the lack of biomechanical analysis for technique improvements. The analysis of motion in sports has gained prime importance for technical improvement. It helps an athlete to develop a better understanding of his own skills and increasing the rate of technical learning process. Kinematics is concerned with describing and quantifying both the linear and angular position of bodies and their time derivatives. The techniques analysis of barbell movement is very important in weightlifting. But women weightlifting has a shorter history than men’s. Research on women weightlifting based on video analysis is less; there is a lack of scientific evidence based on kinematic analysis of especially on Indian weightlifters at national level are limited. Hence, the present investigation was aimed to analyze the barbell kinematics of women weightlifters in India. The study was delimited to the medal winners of 69-kilogram weight category in the All India Inter-University Competition, age ranging between 18 and 28 years. The variables selected for the mechanical analysis of Barbell kinematics included barbell trajectory, velocity, acceleration, potential energy, kinetic energy, mechanical energy, and average power output. The performance was captured during the competition by two DV PC-60 Digital cameras (Panasonic Company, Ltd). Two cameras were placed 6-meters perpendicular to the plane of the motion, 130 cm. above the ground to record/capture the frontal and lateral view of the lifters simultaneously. Video recordings were analyzed by using Dartfish software, and barbell kinematics were analyzed with the information derived with the help of software. The result documented on the basis of the finding of the study clearly states that there are differences in the selected kinematic variables in all three lifters in respect to their technique in five phases during snatch technique using by them.

Keywords: dartfish, digital camera, kinematic, snatch, weightlifting

Procedia PDF Downloads 136
666 Emotion Recognition in Video and Images in the Wild

Authors: Faizan Tariq, Moayid Ali Zaidi

Abstract:

Facial emotion recognition algorithms are expanding rapidly now a day. People are using different algorithms with different combinations to generate best results. There are six basic emotions which are being studied in this area. Author tried to recognize the facial expressions using object detector algorithms instead of traditional algorithms. Two object detection algorithms were chosen which are Faster R-CNN and YOLO. For pre-processing we used image rotation and batch normalization. The dataset I have chosen for the experiments is Static Facial Expression in Wild (SFEW). Our approach worked well but there is still a lot of room to improve it, which will be a future direction.

Keywords: face recognition, emotion recognition, deep learning, CNN

Procedia PDF Downloads 188
665 Integrating the Modbus SCADA Communication Protocol with Elliptic Curve Cryptography

Authors: Despoina Chochtoula, Aristidis Ilias, Yannis Stamatiou

Abstract:

Modbus is a protocol that enables the communication among devices which are connected to the same network. This protocol is, often, deployed in connecting sensor and monitoring units to central supervisory servers in Supervisory Control and Data Acquisition, or SCADA, systems. These systems monitor critical infrastructures, such as factories, power generation stations, nuclear power reactors etc. in order to detect malfunctions and ignite alerts and corrective actions. However, due to their criticality, SCADA systems are vulnerable to attacks that range from simple eavesdropping on operation parameters, exchanged messages, and valuable infrastructure information to malicious modification of vital infrastructure data towards infliction of damage. Thus, the SCADA research community has been active over strengthening SCADA systems with suitable data protection mechanisms based, to a large extend, on cryptographic methods for data encryption, device authentication, and message integrity protection. However, due to the limited computation power of many SCADA sensor and embedded devices, the usual public key cryptographic methods are not appropriate due to their high computational requirements. As an alternative, Elliptic Curve Cryptography has been proposed, which requires smaller key sizes and, thus, less demanding cryptographic operations. Until now, however, no such implementation has been proposed in the SCADA literature, to the best of our knowledge. In order to fill this gap, our methodology was focused on integrating Modbus, a frequently used SCADA communication protocol, with Elliptic Curve based cryptography and develop a server/client application to demonstrate the proof of concept. For the implementation we deployed two C language libraries, which were suitably modify in order to be successfully integrated: libmodbus (https://github.com/stephane/libmodbus) and ecc-lib https://www.ceid.upatras.gr/webpages/faculty/zaro/software/ecc-lib/). The first library provides a C implementation of the Modbus/TCP protocol while the second one offers the functionality to develop cryptographic protocols based on Elliptic Curve Cryptography. These two libraries were combined, after suitable modifications and enhancements, in order to give a modified version of the Modbus/TCP protocol focusing on the security of the data exchanged among the devices and the supervisory servers. The mechanisms we implemented include key generation, key exchange/sharing, message authentication, data integrity check, and encryption/decryption of data. The key generation and key exchange protocols were implemented with the use of Elliptic Curve Cryptography primitives. The keys established by each device are saved in their local memory and are retained during the whole communication session and are used in encrypting and decrypting exchanged messages as well as certifying entities and the integrity of the messages. Finally, the modified library was compiled for the Android environment in order to run the server application as an Android app. The client program runs on a regular computer. The communication between these two entities is an example of the successful establishment of an Elliptic Curve Cryptography based, secure Modbus wireless communication session between a portable device acting as a supervisor station and a monitoring computer. Our first performance measurements are, also, very promising and demonstrate the feasibility of embedding Elliptic Curve Cryptography into SCADA systems, filling in a gap in the relevant scientific literature.

Keywords: elliptic curve cryptography, ICT security, modbus protocol, SCADA, TCP/IP protocol

Procedia PDF Downloads 276
664 Game Structure and Spatio-Temporal Action Detection in Soccer Using Graphs and 3D Convolutional Networks

Authors: Jérémie Ochin

Abstract:

Soccer analytics are built on two data sources: the frame-by-frame position of each player on the terrain and the sequences of events, such as ball drive, pass, cross, shot, throw-in... With more than 2000 ball-events per soccer game, their precise and exhaustive annotation, based on a monocular video stream such as a TV broadcast, remains a tedious and costly manual task. State-of-the-art methods for spatio-temporal action detection from a monocular video stream, often based on 3D convolutional neural networks, are close to reach levels of performances in mean Average Precision (mAP) compatibles with the automation of such task. Nevertheless, to meet their expectation of exhaustiveness in the context of data analytics, such methods must be applied in a regime of high recall – low precision, using low confidence score thresholds. This setting unavoidably leads to the detection of false positives that are the product of the well documented overconfidence behaviour of neural networks and, in this case, their limited access to contextual information and understanding of the game: their predictions are highly unstructured. Based on the assumption that professional soccer players’ behaviour, pose, positions and velocity are highly interrelated and locally driven by the player performing a ball-action, it is hypothesized that the addition of information regarding surrounding player’s appearance, positions and velocity in the prediction methods can improve their metrics. Several methods are compared to build a proper representation of the game surrounding a player, from handcrafted features of the local graph, based on domain knowledge, to the use of Graph Neural Networks trained in an end-to-end fashion with existing state-of-the-art 3D convolutional neural networks. It is shown that the inclusion of information regarding surrounding players helps reaching higher metrics.

Keywords: fine-grained action recognition, human action recognition, convolutional neural networks, graph neural networks, spatio-temporal action recognition

Procedia PDF Downloads 29
663 Tattooing: Personal Markings with Meaning: Themes Uncovered While Making a Video Documentary

Authors: Byrad Yyelland, Robert Bianchi

Abstract:

No longer the secret mark of outlaw bikers, criminals, and sailors, tattooing has become mainstream in much of the world. The current study showcases data gathered for a video documentary on the triangulated relationship connecting tattoos as a form of body modification, cultural norms, and personal meanings. This research has revealed that some religious belief systems, Buddhism in Thailand, is one example, connect tattooing with spirituality in an intimate manner. Buddhist monks provide tattoos using traditional bamboo implements and processes, and they pray over the tattoo, infusing magic into the tattoo and consequently, into the body of the receiver. In contrast, although there is no direct mention of tattooing in the Qur’an, many Islamic scholars argue that permanent tattooing is considered haram—forbidden for Muslims. Only the temporary henna is acceptable. In fact, tattooing is illegal in Qatar. Some Indigenous belief systems in Canada adopt a similar stance on the basis that we were all created by the Creator and as such, we do not have the right to alter what the Creator has made. Still other belief systems such as Spiritism in Brazil and mainstream Christianity in the West are more inclined to regard tattooing as a matter of personal choice. It is practically impossible for any culture to resist the dual impacts of time and globalization. Long term cultural change has resulted in mainstream acceptance of tattooing in the west and increased acceptance in Japan. Short-term cultural change is seen in Qatar where tattoos are on on public display amongst expats and migrant laborers. This tolerance of tattooed individuals was clearly evident with the choice of David Beckham as ambassador for the FIFA World Cup and during the corresponding tourist celebrations. Themes uncovered in this multicultural research also include individual meanings attributed to tattoo imagery and processes, experiences of personal empowerment, devotion to family, personal philosophy, gender identity, and aesthetics.

Keywords: culture, norms, tattooing, spirituality, personal motivations and personal meanings

Procedia PDF Downloads 74
662 Readiness of Iran’s Insurance Industry Salesforce to Accept Changing to Become Islamic Personal Financial Planners

Authors: Pedram Saadati, Zahra Nazari

Abstract:

Today, the role and importance of financial technology businesses in Iran have increased significantly. Although, in Iran, there is no Islamic or non-Islamic personal financial planning field of study in the universities or educational centers, the profession of personal financial planning is not defined, and there is no software introduced in this regard for advisors or consumers. The largest sales network of financial services in Iran belongs to the insurance industry, and there is an untapped market for international companies in Iran that can contribute to 130 thousand representatives in the insurance industry and 28 million families by providing training and personal financial advisory software. To the best of the author's knowledge, despite the lack of previous internal studies in this field, the present study investigates the level of readiness of the salesforce of the insurance industry to accept this career and its technology. The statistical population of the research is made up of managers, insurance sales representatives, assistants and heads of sales departments of insurance companies. An 18-minute video was prepared that introduced and taught the job of Islamic personal financial planning and explained its difference from its non-Islamic model. This video was provided to the respondents. The data collection tool was a research-made questionnaire. To investigate the factors affecting technology acceptance and job change, independent T descriptive statistics and Pearson correlation were used, and Friedman's test was used to rank the effective factors. The results indicate the mental perception and very positive attitude of the insurance industry activists towards the usefulness of this job and its technology, and the studied sample confirmed the intention of training in this knowledge. Based on research results, the change in the customer's attitude towards the insurance advisor and the possibility of increasing income are considered as the reasons for accepting. However, Restrictions on using investment opportunities due to Islamic financial services laws and the uncertainty of the position of the central insurance in this regard are considered as the most important obstacles.

Keywords: fintech, insurance, personal financial planning, wealth management

Procedia PDF Downloads 49
661 A Normalized Non-Stationary Wavelet Based Analysis Approach for a Computer Assisted Classification of Laryngoscopic High-Speed Video Recordings

Authors: Mona K. Fehling, Jakob Unger, Dietmar J. Hecker, Bernhard Schick, Joerg Lohscheller

Abstract:

Voice disorders origin from disturbances of the vibration patterns of the two vocal folds located within the human larynx. Consequently, the visual examination of vocal fold vibrations is an integral part within the clinical diagnostic process. For an objective analysis of the vocal fold vibration patterns, the two-dimensional vocal fold dynamics are captured during sustained phonation using an endoscopic high-speed camera. In this work, we present an approach allowing a fully automatic analysis of the high-speed video data including a computerized classification of healthy and pathological voices. The approach bases on a wavelet-based analysis of so-called phonovibrograms (PVG), which are extracted from the high-speed videos and comprise the entire two-dimensional vibration pattern of each vocal fold individually. Using a principal component analysis (PCA) strategy a low-dimensional feature set is computed from each phonovibrogram. From the PCA-space clinically relevant measures can be derived that quantify objectively vibration abnormalities. In the first part of the work it will be shown that, using a machine learning approach, the derived measures are suitable to distinguish automatically between healthy and pathological voices. Within the approach the formation of the PCA-space and consequently the extracted quantitative measures depend on the clinical data, which were used to compute the principle components. Therefore, in the second part of the work we proposed a strategy to achieve a normalization of the PCA-space by registering the PCA-space to a coordinate system using a set of synthetically generated vibration patterns. The results show that owing to the normalization step potential ambiguousness of the parameter space can be eliminated. The normalization further allows a direct comparison of research results, which bases on PCA-spaces obtained from different clinical subjects.

Keywords: Wavelet-based analysis, Multiscale product, normalization, computer assisted classification, high-speed laryngoscopy, vocal fold analysis, phonovibrogram

Procedia PDF Downloads 266
660 Virtual Science Hub: An Open Source Platform to Enrich Science Teaching

Authors: Enrique Barra, Aldo Gordillo, Juan Quemada

Abstract:

This paper presents the Virtual Science Hub platform. It is an open source platform that combines a social network, an e-learning authoring tool, a video conference service and a learning object repository for science teaching enrichment. These four main functionalities fit very well together. The platform was released in April 2012 and since then it has not stopped growing. Finally we present the results of the surveys conducted and the statistics gathered to validate this approach.

Keywords: e-learning, platform, authoring tool, science teaching, educational sciences

Procedia PDF Downloads 397
659 Game “EZZRA” as an Innovative Solution

Authors: Mane Varosyan, Diana Tumanyan, Agnesa Martirosyan

Abstract:

There are many catastrophic events that end with dire consequences, and to avoid them, people should be well-armed with the necessary information about these situations. During the last years, Serious Games have increasingly gained popularity for training people for different types of emergencies. The major discussed problem is the usage of gamification in education. Moreover, it is mandatory to understand how and what kind of gamified e-learning modules promote engagement. As the theme is emergency, we also find out people’s behavior for creating the final approach. Our proposed solution is an educational video game, “EZZRA”.

Keywords: gamification, education, emergency, serious games, game design, virtual reality, digitalisation

Procedia PDF Downloads 77
658 Statistical Investigation Projects: A Way for Pre-Service Mathematics Teachers to Actively Solve a Campus Problem

Authors: Muhammet Şahal, Oğuz Köklü

Abstract:

As statistical thinking and problem-solving processes have become increasingly important, teachers need to be more rigorously prepared with statistical knowledge to teach their students effectively. This study examined preservice mathematics teachers' development of statistical investigation projects using data and exploratory data analysis tools, following a design-based research perspective and statistical investigation cycle. A total of 26 pre-service senior mathematics teachers from a public university in Turkiye participated in the study. They formed groups of 3-4 members voluntarily and worked on their statistical investigation projects for six weeks. The data sources were audio recordings of pre-service teachers' group discussions while working on their projects in class, whole-class video recordings, and each group’s weekly and final reports. As part of the study, we reviewed weekly reports, provided timely feedback specific to each group, and revised the following week's class work based on the groups’ needs and development in their project. We used content analysis to analyze groups’ audio and classroom video recordings. The participants encountered several difficulties, which included formulating a meaningful statistical question in the early phase of the investigation, securing the most suitable data collection strategy, and deciding on the data analysis method appropriate for their statistical questions. The data collection and organization processes were challenging for some groups and revealed the importance of comprehensive planning. Overall, preservice senior mathematics teachers were able to work on a statistical project that contained the formulation of a statistical question, planning, data collection, analysis, and reaching a conclusion holistically, even though they faced challenges because of their lack of experience. The study suggests that preservice senior mathematics teachers have the potential to apply statistical knowledge and techniques in a real-world context, and they could proceed with the project with the support of the researchers. We provided implications for the statistical education of teachers and future research.

Keywords: design-based study, pre-service mathematics teachers, statistical investigation projects, statistical model

Procedia PDF Downloads 87
657 Human Behaviour During an Earthquake: Descriptive Analysis on Indoor Video Recordings

Authors: Mazlum Çelik, Burcu Gürkan Ercan, Ahmet Ayaz, Hilal Yakut İpekoğlu, Furkan Baltacı, Mustafa Kurtoğlu, Bilge Kalkavan, Sinem Küçükyılmaz, Hikmet Çağrı Yardımcı, Şeyma Sevgican, Cemile Gökçe Elkovan, Bilal Çayır, Mehmet Emin Düzcan

Abstract:

The earthquake research literature generally examines emotional, cognitive, and behavioral responses after an earthquake. Studies concerning the behavioral responses to earthquakes reveal that after the earthquake, people either flee in a panic or do not act according to the stereotype that they act irrationally and anti-socially and sometimes give rational and adaptive reactions. However, the rareness of research dealing with human behavior experiencing the earthquake moment makes it necessary to pay particular attention to these behavior patterns. In this direction, this study aims to examine human behavior indoors in case of rising earthquake intensity. In Turkey, located on geography in the earthquake zone, devastating earthquakes took place, such as in "Istanbul" with a magnitude of 7.4 in 1999 and in "Elazığ" with a magnitude of 6.8 in 2020. Occurred recently, the "Kahramanmaraş" earthquake affected 11 provinces, with a magnitude of 7.7 and 7.6 in 2023. In addition, there is expected to be a devastating earthquake in Istanbul, experts warn. For this reason, it is essential to understand human behavior for disaster risk. Management and pre-disaster preparedness to be effective and efficient and to take realistic measures to protect human life. Mazlum Çelik, Burcu Gürkan Ercan, Ahmet Ayaz, Hilal Yakut İpekoğlu, Furkan Baltacı, Mustafa Kurtoğlu, Bilge Kalkavan, Sinem Küçükyılmaz, Hikmet Çağrı Yardımcı, Şeyma Sevgican, Cemile Gökçe Elkovan, Bilal Çayır, Mehmet Emin Düzcan. In this study, which is currently part of a project supported by The Scientific and Technological Council of Turkey (TUBITAK), the indoor recordings during the earthquakes in Elazig on January 24, 2020, and in İzmir on October 30, 2020, are examined, and the people's behavior during the earthquake is analyzed. In this direction, video recordings taken from the YouTube archives of İzmir and Elazığ Disaster and Emergency Management Presidency (AFAD) Directorates and metropolitan municipalities are examined. The researchers have created an observation form in line with the information in the relevant literature to classify people's behavior during an earthquake. It is intended to determine the behavioral patterns by classifying according to the form and video analysis of the people heading toward the door, remaining stable, taking protective measures, turning to people, and engaging in "other" behaviors outside of these behaviors during the earthquake. A total of 60 video analyzes are carried out from Elazığ and İzmir. The descriptive statistic has been used with the SPSS 23.0 package program in the data analysis. It is found that in the event of an increase in the severity of the earthquake, unlike Elazığ, in İzmir, protective action is preferred to the act of remaining stable. In addition, it is observed that with the increase in the earthquake's intensity, women attempt to take more protective action while men head toward the door. In contrast, a rise is observed in the behavior of young people heading toward the door and taking protective actions, while there is a decrease in their behavior directing to people. These findings, unlike the literature, reveal that human behavior during earthquakes cannot be reduced to a single behavior pattern, such as drop-cover-hold-on. The results show that it is necessary to understand the behaviors of individuals during the earthquake and to develop practical policy proposals for combating earthquakes by considering sociocultural, geographical, and demographic variables.

Keywords: descriptive analysis, earthquake, human behaviour, disaster policy.

Procedia PDF Downloads 105
656 Design of Bidirectional Wavelength Division Multiplexing Passive Optical Network in Optisystem Environment

Authors: Ashiq Hussain, Mahwash Hussain, Zeenat Parveen

Abstract:

Now a days the demand for broadband service has increased. Due to which the researchers are trying to find a solution to provide a large amount of service. There is a shortage of bandwidth because of the use of downloading video, voice and data. One of the solutions to overcome this shortage of bandwidth is to provide the communication system with passive optical components. We have increased the data rate in this system. From experimental results we have concluded that the quality factor has increased by adding passive optical networks.

Keywords: WDM-PON, optical fiber, BER, Q-factor, eye diagram

Procedia PDF Downloads 511
655 How Did a Blind Child Begin Understanding Her “Blind Self”?: A Longitudinal Analysis Of Conversation between Her and Adults

Authors: Masahiro Nochi

Abstract:

This study explores the process in which a Japanese child with congenital blindness deepens understanding of the condition of being “unable to see” and develops the idea of “blind self,” despite having no direct experience of vision. The rehabilitation activities of a child with a congenital visual impairment that were video-recorded from 1 to 6 years old were analyzed qualitatively. The duration of the video was about 80 hours. The recordings were transcribed verbatim, and the episodes in which the child used the words related to the act of “looking” were extracted. Detailed transcripts were constructed referencing the notations of conversation analysis. Characteristics of interactions in those episodes were identified and compared longitudinally. Results showed that the child used the expression "look" under certain interaction patterns and her body expressions and interaction with adults developed in conjunction with the development of language use. Four stages were identified. At the age of 1, interactions involving “look” began to occur. The child said "Look" in the sequence: the child’s “Look,” an adult’s “I’m looking,” certain performances by the child, and the adult’s words of praise. At the age of 3, the child began to behave in accordance with the spatial attributes of the act of "looking," such as turning her face to the adult’s voice before saying, “Look.” She also began to use the expression “Keep looking,” which seemed to reflect her understanding of the temporality of the act of “looking.” At the age of 4, the use of “Look” or “Keep looking” became three times more frequent. She also started to refer to the act of looking in the future, such as “Come and look at my puppy someday.” At the age of 5, she moved her hands toward the adults when she was holding something she wanted to show them. She seemed to understand that people could see the object more clearly when it was in close priximity. About that time, she began to say “I cannot see” to her mother, which suggested a heightened understanding of her own blindness. The findings indicate that as she grew up, the child came to utilize nonverbal behavior before and after the order "Look" to make the progress of the interaction with adults even more certain. As a result, actions that reflect the characteristics of the sighted person's visual experience were incorporated into the interaction chain. The purpose of "Look," with which she intended to attract the adult's attention at first, changed and became something that requests a confirmation she was unable to make herself. It is considered that such a change in the use of the word as well as interaction with sighted adults reflected her heightened self-awareness as someone who could not do what sighted people could do easily. A blind child can gradually deepen their understanding of their own characteristics of blindness among sighted people around them. The child can also develop “blind self” by learning how to interact with others even without direct visual experiences.

Keywords: blindness, child development, conversation analysis, self-concept

Procedia PDF Downloads 123
654 Analysis of Delivery of Quad Play Services

Authors: Rahul Malhotra, Anurag Sharma

Abstract:

Fiber based access networks can deliver performance that can support the increasing demands for high speed connections. One of the new technologies that have emerged in recent years is Passive Optical Networks. This paper is targeted to show the simultaneous delivery of triple play service (data, voice, and video). The comparative investigation and suitability of various data rates is presented. It is demonstrated that as we increase the data rate, number of users to be accommodated decreases due to increase in bit error rate.

Keywords: FTTH, quad play, play service, access networks, data rate

Procedia PDF Downloads 417