Search results for: bounded-sized message model
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 16591

Search results for: bounded-sized message model

16531 Anaphora and Cataphora on the Selected State of the City Addresses of the Mayor of Dapitan

Authors: Mark Herman Sumagang Potoy

Abstract:

State of the City Address (SOCA) is a speech, modelled after the State of the Nation Address, given not as mandated by law but usually a matter of practice or tradition delivered before the chief executive’s constituents. Through this, the general public is made to know the performance of the local government unit and its agenda for the coming year. Therefore, it is imperative for SOCAs to clearly convey its message and carry out the myriad function of enlightening its readers which could be achieved through the proper use of reference. Anaphora and cataphora are the two major types of reference; the former refer back to something that has already been mentioned while the latter points forward to something which is yet to be said. This paper seeks to identify the types of reference employed on the SOCAs from 2014 to 2016 of Hon. Rosalina Garcia Jalosjos, Mayor of Dapitan City and look into how the references contribute to the clarity of the message of the text. The qualitative method of research is used in this study through an in-depth analysis of the corpus. As soon as the copies of the SOCAs are secured from the Office of the City Mayor, they are then analyzed using documentary technique categorizing the types of reference as to anaphora and cataphora, counting each of these types and describing the implications of the dominant types used in the addresses. After a thorough analysis, it is found out that the two reference types namely, anaphora and cataphora are both employed on the three SOCAs, the former being used more frequently than the latter accounting to 80% and 20% of actual usage, respectively. Moreover, the use of anaphors and cataphora on the three addresses helps in conveying the message clearly because they primarily become aids to avoid the repetition of the same element in the text especially when there wasn’t a need to emphasize a point. Finally, it is recommended that writers of State of the City Addresses should have a vast knowledge on how reference should be used and the functions they take in the text since this is a vital tool to clearly transmit a message. Moreover, English teachers should explicitly teach the proper usage of anaphora and cataphora, as instruments to develop cohesion in written discourse, to enable students to write not only with sense but also with fluidity in tying utterances together.

Keywords: anaphora, cataphora, reference, State of the City Address

Procedia PDF Downloads 168
16530 Cross-Cultural Evangelism a Necessity in Contemporary Times: A Case Study of Mission of Diocese on the Niger Anglican Communion to Togo

Authors: Nnatuanya Chinedu Emmanuel

Abstract:

The focus of this research is to point out the importance of mission across nations, tribes, and languages. This is because the message of the gospel is global in nature and as a result, Christians of nations, irrespective of color and denomination, must strive to ensure that this message of transformation is extended to all, notwithstanding their region, locality and color. It is in response to this that this work investigates the evangelization activity of the Diocese on the Niger in Togo, their impacts and activities. The framework of qualitative research was adopted while findings indicate that much work has been done in the areas of human and societal development; notwithstanding, the problem of funding, language barrier, and manpower become a threat to the mission work.

Keywords: cross–cultural Evangelism, diocese on the Niger, Anglican communion, Togo

Procedia PDF Downloads 61
16529 The Role of Paraphrase in Interpreting Students’ Writing

Authors: Maya Lisa Aryanti, S. S. M. Hum

Abstract:

To improve students’ skill, writing is the most challenging skill to be developed. The reason is that besides helping the students to develop their skill, this activity also helps them to express themselves. This paper depicts how paraphrasing is very helpful to interpret students’ writing. Syntactic units, used tenses and meanings will indeed change once the writings were paraphrased. The objectives of this research are to reveal the inappropriate structure of syntactic units, to show what types of sentences the students often make, and to show how paraphrasing can help to infer the message. The methodology of this research is descriptive qualitative research. In addition, theories of linguistics are also included. This includes theory of Syntax to describe syntactic units and tenses and theory of Semantics to describe theories of meaning and how paraphrasing works. The theories of general linguistics, grammar and writing are also provided to support the theories of Syntax and Semantics. The results of this research are concerned with how the message is received in the end. The message written in the students’ essay is not clear because of the improper structure of syntactic units and use of incorrect of tenses. The students tend to use simple sentences, compound sentences and complex sentences with a few mistakes in their writing. In addition, they tend to create unnecessary phrases. The last point is that this research shows how paraphrase works to attain complete meaning of a sentence.

Keywords: meanings, syntactic units, tenses, syntax and semantics

Procedia PDF Downloads 167
16528 The Potential of Role Models in Enhancing Smokers' Readiness to Change (Decision to Quit Smoking): A Case Study of Saudi National Anti-Smoking Campaign

Authors: Ghada M. AlSwayied, Anas N. AlHumaid

Abstract:

Smoking has been linked to thousands of deaths worldwide. Around three million adults continue to use tobacco each day in Saudi Arabia; a sign that smoking is prevalent among Saudi population and obviously considered as a public health threat. Although the awareness against smoking is continuously running, it can be observed that smoking behavior increases noticeably as common practice especially among young adults across the world. Therefore, it was an essential step to guess what does motivate smokers to think about quit smoking. Can a graphic and emotional ad that is focusing on health consequences do really make a difference? A case study has been conducted on the Annual Anti-Smoking National Campaign, which was provided by Saudi Ministry of Health in the period of May 2017. To assess campaign’s effects on the number of calls, the number of visits and online access to health messages during and after the campaign period from May to August compared with the previous campaign in 2016. The educational video was selected as a primary tool to deliver the smoking health message. The Minister of Health who is acting as a role model for young adults was used to deliver a direct message to smokers with an avoidance of smoking cues usage. Due to serious consequences of smoking, the Minister of Health delivered the news of canceling the media campaign and directing the budget to smoking cessation clinics. It was shown that the positive responses and interactions on the campaign were obviously remarkable; achieving a high rate of recall and recognition. During the campaign, the number of calls to book for a visit reached 45880 phone calls, and the total online views ran to 1,253,879. Whereas, clinic visit raised up to 213 cumulative percent. Interestingly, a total number of 15,192 patients visited the clinics along three months compared with the last year campaign’s period, which was merely 4850 patients. Furthermore, around half of patients who visited the clinics were in the age from 26 to 40-year-old. There was a great progress in enhancing public awareness on: 'where to go' to assist smokers in making a quit attempt. With regard to the stages of change theory, it was predicted that by following direct-message technique; the proportion of patients in the contemplation and preparation stages would be increased. There was no process evaluation obtained to assess implementation of the campaigns’ activities.

Keywords: smoking, health promotion, role model, educational material, intervention, community health

Procedia PDF Downloads 122
16527 A Reactive Fast Inter-MAP Handover for Hierarchical Mobile IPv6

Authors: Pyung Soo Kim

Abstract:

This paper proposes an optimized reactive fast intermobility anchor point (MAP) handover scheme for Hierarchical Mobile IPv6, called the ORFH-HMIPv6, to minimize packet loss of the existing scheme. The key idea of the proposed ORFHHMIPv6 scheme is that the serving MAP buffers packets toward the mobile node (MN) as soon as the link layer between MN and serving base station is disconnected. To implement the proposed scheme, the MAP discovery message exchanged between MN and serving MAP is extended. In addition, the IEEE 802.21 Media Independent Handover Function (MIHF) event service message is defined newly. Through analytic performance evaluation, the proposed ORFH-HMIPv6 scheme can be shown to minimize packet loss much than the existing scheme.

Keywords: hierarchical mobile IPv6 (HMIPv6), fast handover, reactive behavior, packet loss

Procedia PDF Downloads 187
16526 A Voice Signal Encryption Scheme Based on Chaotic Theory

Authors: Hailang Yang

Abstract:

To ensure the confidentiality and integrity of speech signals in communication transmission, this paper proposes a voice signal encryption scheme based on chaotic theory. Firstly, the scheme utilizes chaotic mapping to generate a key stream and then employs the key stream to perform bitwise exclusive OR (XOR) operations for encrypting the speech signal. Additionally, the scheme utilizes a chaotic hash function to generate a Message Authentication Code (MAC), which is appended to the encrypted data to verify the integrity of the data. Subsequently, we analyze the security performance and encryption efficiency of the scheme, comparing and optimizing it against existing solutions. Finally, experimental results demonstrate that the proposed scheme can resist common attacks, achieving high-quality encryption and speed.

Keywords: chaotic theory, XOR encryption, chaotic hash function, Message Authentication Code (MAC)

Procedia PDF Downloads 25
16525 Enhanced Automated Teller Machine Using Short Message Service Authentication Verification

Authors: Rasheed Gbenga Jimoh, Akinbowale Nathaniel Babatunde

Abstract:

The use of Automated Teller Machine (ATM) has become an important tool among commercial banks, customers of banks have come to depend on and trust the ATM conveniently meet their banking needs. Although the overwhelming advantages of ATM cannot be over-emphasized, its alarming fraud rate has become a bottleneck in it’s full adoption in Nigeria. This study examined the menace of ATM in the society another cost of running ATM services by banks in the country. The researcher developed a prototype of an enhanced Automated Teller Machine Authentication using Short Message Service (SMS) Verification. The developed prototype was tested by Ten (10) respondents who are users of ATM cards in the country and the data collected was analyzed using Statistical Package for Social Science (SPSS). Based on the results of the analysis, it is being envisaged that the developed prototype will go a long way in reducing the alarming rate of ATM fraud in Nigeria.

Keywords: ATM, ATM fraud, e-banking, prototyping

Procedia PDF Downloads 281
16524 Perception of Young Consumers about SMS Marketing in Pakistan

Authors: Raja Irfan Sabir, Nargis Dewan

Abstract:

This study examines the role of SMS marketing on perception of young consumers and its impact on society by keeping in mind the culture, values and communication norms of Pakistan. The study focused on the consumer’s perception towards SMS Marketing of Entertainment, Informativeness, Credibility and Irritation factor which can have influence on the perception of young consumer positively or negatively. It’s also observed that some of the message contents do have good or bad impact on the society’s norm. The result derived from a sample of 200 consumers indicate that communication medium ‘SMS marketing’ positively influence the consumers perception but the messages that consumers receive from these companies are against the social norms and have bad impact. So Pakistani entrepreneurs of cellular industries should be more aware that there is need to somehow modify their message content strategies according to culture, norms and values of our society and environmental situation.

Keywords: SMS marketing, messages content, consumers’ perception, cultural values and norms

Procedia PDF Downloads 371
16523 Efficient Fuzzy Classified Cryptographic Model for Intelligent Encryption Technique towards E-Banking XML Transactions

Authors: Maher Aburrous, Adel Khelifi, Manar Abu Talib

Abstract:

Transactions performed by financial institutions on daily basis require XML encryption on large scale. Encrypting large volume of message fully will result both performance and resource issues. In this paper a novel approach is presented for securing financial XML transactions using classification data mining (DM) algorithms. Our strategy defines the complete process of classifying XML transactions by using set of classification algorithms, classified XML documents processed at later stage using element-wise encryption. Classification algorithms were used to identify the XML transaction rules and factors in order to classify the message content fetching important elements within. We have implemented four classification algorithms to fetch the importance level value within each XML document. Classified content is processed using element-wise encryption for selected parts with "High", "Medium" or “Low” importance level values. Element-wise encryption is performed using AES symmetric encryption algorithm and proposed modified algorithm for AES to overcome the problem of computational overhead, in which substitute byte, shift row will remain as in the original AES while mix column operation is replaced by 128 permutation operation followed by add round key operation. An implementation has been conducted using data set fetched from e-banking service to present system functionality and efficiency. Results from our implementation showed a clear improvement in processing time encrypting XML documents.

Keywords: XML transaction, encryption, Advanced Encryption Standard (AES), XML classification, e-banking security, fuzzy classification, cryptography, intelligent encryption

Procedia PDF Downloads 380
16522 Using VR as a Training Tool in the Banking Industry

Authors: Bjørn Salskov, Nicolaj Bang, Charlotte Falko

Abstract:

Future labour markets demand employees that can carry out a non-linear task which is still not possible for computers. This means that employees must have well-developed soft-skills to perform at high levels in such a work environment. One of these soft-skills is presenting a message effectively. To be able to present a message effectively, one needs to practice this. To practice effectively, the trainee needs feedback on the current performance. Here VR environments can be used as a practice tool because it gives the trainee a sense of presence and reality. VR environments are becoming a cost-effective training method since it does not demand the presence of an expert to provide this feedback. The research article analysed in this study suggests that VR environment can be used and are able to provide the necessary feedback to the trainee which in turn will help the trainee become better at the task. The research analysed in this review does, however, show that there is a need for a study with larger sample size and a study which runs over a longer period.

Keywords: training, presentation, presentation skills, VR training, VR as a training tool, VR and presentation

Procedia PDF Downloads 92
16521 Electronic-Word of Mouth(e-WoM): Preliminary Study of Malaysian Undergrad Students Smartphone Online Review

Authors: Norshakirah Ab.Aziz, Nurul Atiqah Jamaluddin

Abstract:

Consequently, electronic word-of-mouth (e-WoM) becomes one of the resources in the decision making process and considered a valuable marketing channel for consumers and organizations. Admittedly, there is increasing concern on the accuracy and genuine of e-WoM content because consumers prefer to look out product or service information available online. Thus, the focus of this study is to propose a model and guidelines how to select trusted online review content according to domain chosen –undergrad students smartphone online review. Undeniable, mobile devices like smartphone has now become a necessity in today are daily life to complete our daily chores. The model and guideline focused on product competency review and the message integrity. In other words, this study aims to enable consumers to identify trusted online review content, which helps them in buying decisions.

Keywords: electronic word of mouth, e-WoM, WoM, online review

Procedia PDF Downloads 308
16520 Broadcast Routing in Vehicular Ad hoc Networks (VANETs)

Authors: Muazzam A. Khan, Muhammad Wasim

Abstract:

Vehicular adhoc network (VANET) Cars for network (VANET) allowing vehicles to talk to each other, which is committed to building a strong network of mobile vehicles is technical. In VANETs vehicles are equipped with special devices that can get and share info with the atmosphere and other vehicles in the network. Depending on this data security and safety of the vehicles can be enhanced. Broadcast routing is dispersion of any audio or visual medium of mass communication scattered audience distribute audio and video content, but usually using electromagnetic radiation (waves). The lack of server or fixed infrastructure media messages in VANETs plays an important role for every individual application. Broadcast Message VANETs still open research challenge and requires some effort to come to good solutions. This paper starts with a brief introduction of VANET, its applications, and the law of the message-trends in this network starts. This work provides an important and comprehensive study of reliable broadcast routing in VANET scenario.

Keywords: vehicular ad-hoc network , broadcasting, networking protocols, traffic pattern, low intensity conflict

Procedia PDF Downloads 497
16519 A Study on Information Structure in the Vajrachedika-Prajna-paramita Sutra and Translation Aspect

Authors: Yoon-Cheol Park

Abstract:

This research focuses on examining the information structures in the old Chinese character-Korean translation of the Vajrachedika-prajna-paramita sutra. The background of this research comes from the fact that there were no previous researches which looked into the information structures in the target text of the Vajrachedika-prajna-paramita sutra by now. The existing researches on the Buddhist scripture translation mainly put weight on message conveyance by literal and semantic translation methods. But the message conveyance from one language to another has a necessity to be delivered with equivalent information structure. Thus, this research is intended to investigate on the flow of old and new information in the target text of Buddhist scripture, compared with source text. The Vajrachedika-prajna-paramita sutra unlike other Buddhist scriptures is composed of conversational structures between Buddha and his disciple, Suboli. This implies that the information flow can be changed by utterance context and some propositions. So, this research tries to analyze the flow of old and new information within the source and target text. As a result of analysis, this research can discover the following facts; firstly, there are the differences of the information flow in the message conveyance between the old Chinese character and Korean by language features. The old Chinese character reveals that old-new information flow is developed, while Korean indicates new-old information flow because of word order. Secondly, the source text of the Vajrachedika-prajna-paramita sutra includes abstruse terminologies, jargon and abstract words. These make influence on the target text and cause the change of the information flow. But the repetitive expressions of these words provide the old information in the target text. Lastly, the Vajrachedika-prajna-paramita sutra offers the expository structure from conversations between Buddha and Suboli. It means that the information flow is developed in the way of explaining specific subjects and of paraphrasing unfamiliar phrases and expressions. From the results of analysis above, this research can verify that the information structures in the target text of the Vajrachedika-prajna-paramita sutra are changed by specific subjects and terminologies, developed with the new-old information flow by repetitive expressions or word order and reveal the information structures familiar to target culture. It also implies that the translation of the Vajrachedika-prajna-paramita sutra as a religious book needs the message conveyance to take into account the information structures of two languages.

Keywords: abstruse terminologies, the information structure, new and old information, old Chinese character-Korean translation

Procedia PDF Downloads 347
16518 Cultural Semiotics of the Traditional Costume from Banat’s Plain from 1870 to 1950 from Lotman’s Perspective

Authors: Glavan Claudiu

Abstract:

My paper focuses on the cultural semiotic interpretation of the Romanian costume from Banat region, from the perspective of Lotman’s semiotic theory of culture. Using Lotman’s system we will analyse the level of language, text and semiosphere within the unity of Banat’s traditional costume. In order to establish a common language and to communicate, the forms and chromatic compositions were expressed through symbols, which carried semantic meanings with an obvious significant semantic load. The symbols, used in this region, receive a strong specific ethnical mark in its representation, in its compositional and chromatic complexity, in accordance with the values and conceptions of life for the people living here. Thus the signs become a unifying force of this ethnic community. Associated with the signs, were the fabrics used in manufacturing the costumes and the careful selections of colours. For example, softer fabrics like silk associated with red vivid colours were used for young woman sending the message they ready to be married. The unity of these elements created the important message that you were sending to your community. The unity of the symbol, fabrics and choice of colours used on the costume carried out an important message like: marital status, social position, or even the village you belonged to. Using Lotman’s perspective on cultural semiotics we will read and analyse the symbolism of the traditional Romanian art from Banat. We will discover meaning in the codified existence of ancient solar symbols, symbols regarding fertility, religious symbols and very few heraldic symbols. Visual communication makes obvious the importance of semiotic value that the traditional costume is carrying from our ancestors.

Keywords: traditional costume, semiotics, Lotman’s theory of culture, traditional culture, signs and symbols

Procedia PDF Downloads 120
16517 Explainable Graph Attention Networks

Authors: David Pham, Yongfeng Zhang

Abstract:

Graphs are an important structure for data storage and computation. Recent years have seen the success of deep learning on graphs such as Graph Neural Networks (GNN) on various data mining and machine learning tasks. However, most of the deep learning models on graphs cannot easily explain their predictions and are thus often labelled as “black boxes.” For example, Graph Attention Network (GAT) is a frequently used GNN architecture, which adopts an attention mechanism to carefully select the neighborhood nodes for message passing and aggregation. However, it is difficult to explain why certain neighbors are selected while others are not and how the selected neighbors contribute to the final classification result. In this paper, we present a graph learning model called Explainable Graph Attention Network (XGAT), which integrates graph attention modeling and explainability. We use a single model to target both the accuracy and explainability of problem spaces and show that in the context of graph attention modeling, we can design a unified neighborhood selection strategy that selects appropriate neighbor nodes for both better accuracy and enhanced explainability. To justify this, we conduct extensive experiments to better understand the behavior of our model under different conditions and show an increase in both accuracy and explainability.

Keywords: explainable AI, graph attention network, graph neural network, node classification

Procedia PDF Downloads 148
16516 The Influence of Group Heuristics on Corporate Social Responsibility Messages Designed to Reduce Illegal Consumption

Authors: Kate Whitman, Zahra Murad, Joe Cox

Abstract:

Corporate social responsibility projects are suggested to motivate consumers to reciprocate good corporate deeds with their custom. When the projects benefit the ingroup vs the outgroup, such as locals rather than foreigners, the effect on reciprocity is suggested to be more powerful. This may be explained by group heuristics, a theory which indicates that favours to the ingroup (but not outgroup) are expected to be reciprocated, resulting in ingroup favouritism. The heuristic is theorised to explain prosocial behaviours towards the ingroup. The aim of this study is to test whether group heuristics similarly explain a reduction in antisocial behaviours towards the ingroup, measured by illegal consumption which harms a group that consumers identify with. In order to test corporate social responsibility messages, a population of interested consumers is required, so sport fans are recruited. A pre-registered experiment (N = 600) tests the influence of a focused “team” benefiting message vs a broader “sport” benefiting message on change in illegal intentions. The influence of group (team) identity and trait reciprocity on message efficacy are tested as measures of group heuristics. Results suggest that the “team” treatment significantly reduces illegal consumption intentions. The “sport” treatment interacted with the team identification measure, increasing illegal consumption intentions for low team identification individuals. The results suggest that corporate social responsibility may be effective in reducing illegal consumption, if the messages are delivered directly from brands to consumers with brand identification. Messages delivered on the behalf of an industry may have an undesirable effect.

Keywords: live sports, piracy, counterfeiting, corporate social responsibility, group heuristics, ingroup bias, team identification

Procedia PDF Downloads 51
16515 Ethics in the Islamic Political System

Authors: Djehich Mohamed Yousri

Abstract:

This research deals with an important issue in Islamic political thought, which is the relationship of ethics to the Islamic political system. This is done by following the legal politics books and analyzing their texts in order to reach the moral values on which the political system in Islam is based, starting from the concept of politics to the political principles and conditions of the ruler and the reasons for his removal and the conditions of those authorized to choose him, and ending with the ruler’s relationship with his people, and the relationship of the Islamic state with other countries. The research concluded that moral values are the basis of the political system in Islam, and the reason for this is due to the fact that Islam is a religion and a global and realistic human system that embraces morals and higher values in order to preserve its lofty message and calls for brotherhood, love, and justice and does not harm human morals. And if the reality of politics in the Islamic world today is not related to the moral values and the lofty message of Islam, this research tries to show the origins of political theory in Islam, and the purpose of the Islamic political system, towards the morality of politics.

Keywords: moral, politics, islam, political system, islamic political system

Procedia PDF Downloads 74
16514 Influence of the Refractory Period on Neural Networks Based on the Recognition of Neural Signatures

Authors: José Luis Carrillo-Medina, Roberto Latorre

Abstract:

Experimental evidence has revealed that different living neural systems can sign their output signals with some specific neural signature. Although experimental and modeling results suggest that neural signatures can have an important role in the activity of neural networks in order to identify the source of the information or to contextualize a message, the functional meaning of these neural fingerprints is still unclear. The existence of cellular mechanisms to identify the origin of individual neural signals can be a powerful information processing strategy for the nervous system. We have recently built different models to study the ability of a neural network to process information based on the emission and recognition of specific neural fingerprints. In this paper we further analyze the features that can influence on the information processing ability of this kind of networks. In particular, we focus on the role that the duration of a refractory period in each neuron after emitting a signed message can play in the network collective dynamics.

Keywords: neural signature, neural fingerprint, processing based on signal identification, self-organizing neural network

Procedia PDF Downloads 462
16513 High Secure Data Hiding Using Cropping Image and Least Significant Bit Steganography

Authors: Khalid A. Al-Afandy, El-Sayyed El-Rabaie, Osama Salah, Ahmed El-Mhalaway

Abstract:

This paper presents a high secure data hiding technique using image cropping and Least Significant Bit (LSB) steganography. The predefined certain secret coordinate crops will be extracted from the cover image. The secret text message will be divided into sections. These sections quantity is equal the image crops quantity. Each section from the secret text message will embed into an image crop with a secret sequence using LSB technique. The embedding is done using the cover image color channels. Stego image is given by reassembling the image and the stego crops. The results of the technique will be compared to the other state of art techniques. Evaluation is based on visualization to detect any degradation of stego image, the difficulty of extracting the embedded data by any unauthorized viewer, Peak Signal-to-Noise Ratio of stego image (PSNR), and the embedding algorithm CPU time. Experimental results ensure that the proposed technique is more secure compared with the other traditional techniques.

Keywords: steganography, stego, LSB, crop

Procedia PDF Downloads 242
16512 A New Nonlinear State-Space Model and Its Application

Authors: Abdullah Eqal Al Mazrooei

Abstract:

In this work, a new nonlinear model will be introduced. The model is in the state-space form. The nonlinearity of this model is in the state equation where the state vector is multiplied by its self. This technique makes our model generalizes many famous models as Lotka-Volterra model and Lorenz model which have many applications in the real life. We will apply our new model to estimate the wind speed by using a new nonlinear estimator which suitable to work with our model.

Keywords: nonlinear systems, state-space model, Kronecker product, nonlinear estimator

Procedia PDF Downloads 662
16511 VANETs: Security Challenges and Future Directions

Authors: Jared Oluoch

Abstract:

Connected vehicles are equipped with wireless sensors that aid in Vehicle to Vehicle (V2V) and Vehicle to Infrastructure (V2I) communication. These vehicles will in the near future provide road safety, improve transport efficiency, and reduce traffic congestion. One of the challenges for connected vehicles is how to ensure that information sent across the network is secure. If security of the network is not guaranteed, several attacks can occur, thereby compromising the robustness, reliability, and efficiency of the network. This paper discusses existing security mechanisms and unique properties of connected vehicles. The methodology employed in this work is exploratory. The paper reviews existing security solutions for connected vehicles. More concretely, it discusses various cryptographic mechanisms available, and suggests areas of improvement. The study proposes a combination of symmetric key encryption and public key cryptography to improve security. The study further proposes message aggregation as a technique to overcome message redundancy. This paper offers a comprehensive overview of connected vehicles technology, its applications, its security mechanisms, open challenges, and potential areas of future research.

Keywords: VANET, connected vehicles, 802.11p, WAVE, DSRC, trust, security, cryptography

Procedia PDF Downloads 278
16510 Effect of Mobile Phone Text Message Reminders on Adherence to Routine Prenatal Iron/Folic Acid Supplement among Pregnant Women: A Pilot Study

Authors: Nneka U. Igboeli, Maxwell O. Adibe

Abstract:

Iron and folate supplementation in pregnancy are important interventions that prevent maternal anaemia and fetal anomaly. Thus, daily oral doses of iron and folic acid are recommended throughout pregnancy as part of antenatal care. However, low adherence has been a major drawback leading to low effectiveness of these programs. The effect of mobile text message reminders to pregnant women to take their routine medications on adherence was evaluated in this study. The first 100 women who consented to the study were recruited and randomized to either receive a text message reminder on adherence to routine medications or not. Adherence was assessed using the 8-item Modified Morisky Adherence Scale (8-MMAS). The folders of successfully recruited women were tagged with the a study number assigned to each of them. The womens’ phone numbers were collected and these were used to send text messages reminders on adhering to routine drugs only to women in the intervention group. The text messages were sent three times per week for a period of four weeks with an adherence reassessment at the one month follow-up antenatal visit for recruited women. At one month follow-up, the lost to follow-up were 6 (16%) women for the intervention group and 17 (34%) for the control group. The across group mean difference in adherence score was 0.07 (-0.96 – 1.10) at baseline and 0.3 (-0.31 – 0.92) after intervention, both insignificant at p > 0.05. The within group change were increases of 0.58 (0.00 – 1.16) (p = 0.05) from baseline for the intervention group and a 0.35 (-0.51 – 1.20) (p = 0.395) for the control group. Non-significant increase in adherence scores were recorded for both groups. However, the increase in adherence scores of women in the intervention group was greater and may be potentially transformed into more positive results if the study period is increased with possibly reduced study drop-outs shows great promise for more positive results.

Keywords: adherence, mobile phone, pregnant women, reminders

Procedia PDF Downloads 152
16509 A Hybrid Model for Secure Protocol Independent Multicast Sparse Mode and Dense Mode Protocols in a Group Network

Authors: M. S. Jimah, A. C. Achuenu, M. Momodu

Abstract:

Group communications over public infrastructure are prone to a lot of security issues. Existing network protocols like Protocol Independent Multicast Sparse Mode (PIM SM) and Protocol Independent Multicast Dense Mode (PIM DM) do not have inbuilt security features. Therefore, any user or node can easily access the group communication as long as the user can send join message to the source nodes, the source node then adds the user to the network group. In this research, a hybrid method of salting and hashing to encrypt information in the source and stub node was designed, and when stub nodes need to connect, they must have the appropriate key to join the group network. Object oriented analysis design (OOAD) was the methodology used, and the result shows that no extra controlled bandwidth overhead cost was added by encrypting and the hybrid model was more securing than the existing PIM SM, PIM DM and Zhang secure PIM SM.

Keywords: group communications, multicast, PIM SM, PIM DM, encryption

Procedia PDF Downloads 138
16508 Trump’s COVID-19 Discourse: Downgrading the Fundamentals of the Political Fair Play

Authors: Gustavo Naranjo Maroto, Dolores Fernandez Martinez

Abstract:

Context has always been essential to understand any reaction from every human being, and words, whether written or spoken, are definitely a powerful representative sample of human reaction. This study starts with an accurate breakdown of the context in which the current president of the US, Mr. Donald J. Trump is conveying his discourses in order to be able to judge them from a critical discourse analysis point of view. The present world’s scenario with a pandemic disease in form of Covid-19 that is threatening the world and certainly putting at risk the so called 'Welfare State', the role of the United States as the first superpower on earth nowadays, the very peculiar profile of President Trump not only as a politician but as a persona, and the fact of being on the verge of a very controversial presidential elections are without doubt a great and undeniable opportunity for the implementation of the critical discourse analysis methodology. Hence, this research will primarily analyze in detail some of the most interesting discourses delivered by Trump in different media since the very beginning of the outbreak of the coronavirus pandemic in the United States of America (February, 2020), sadly very often downplayed by President Trump, until the final result of the upcoming presidential election scheduled for Tuesday, November 3, 2020, where the political discourse has been dramatically downgraded to a very dangerous state, putting in jeopardy the fundamentals of the political fair play in terms of speech. Finally, the study will hopefully conclude with the final outcome of the data analyzed, allowing to picture how significant the context can be concerning linguistics on the one hand, in terms of shaping or altering the message that the issuer thought to convey in the first place, and on the other hand, generously assessing to what extend the recipients of the message are influenced by the message in terms of receptiveness.

Keywords: Covid-19, critical discourse analysis, Donald J. Trump, political discourse

Procedia PDF Downloads 103
16507 Performance Comparison of a Low Cost Air Quality Sensor with a Commercial Electronic Nose

Authors: Ünal Kızıl, Levent Genç, Sefa Aksu, Ahmet Tapınç

Abstract:

The Figaro AM-1 sensor module which employs TGS 2600 model gas sensor in air quality assessment was used. The system was coupled with a microprocessor that enables sensor module to create warning message via telephone. This low cot sensor system’s performance was compared with a Diagnose II commercial electronic nose system. Both air quality sensor and electronic nose system employ metal oxide chemical gas sensors. In the study experimental setup, data acquisition methods for electronic nose system, and performance of the low cost air quality system were evaluated and explained.

Keywords: air quality, electronic nose, environmental quality, gas sensor

Procedia PDF Downloads 415
16506 Efficient Signcryption Scheme with Provable Security for Smart Card

Authors: Jayaprakash Kar, Daniyal M. Alghazzawi

Abstract:

The article proposes a novel construction of signcryption scheme with provable security which is most suited to implement on smart card. It is secure in random oracle model and the security relies on Decisional Bilinear Diffie-Hellmann Problem. The proposed scheme is secure against adaptive chosen ciphertext attack (indistiguishbility) and adaptive chosen message attack (unforgebility). Also, it is inspired by zero-knowledge proof. The two most important security goals for smart card are Confidentiality and authenticity. These functions are performed in one logical step in low computational cost.

Keywords: random oracle, provable security, unforgebility, smart card

Procedia PDF Downloads 569
16505 The Effect of the Internal Organization Communications' Effectiveness through Employee's Performance of Faculty of Management Science, Suan Sunandha Rajabhat University

Authors: Malaiphan Pansap, Surasit Vithayarat

Abstract:

The purpose of this study was to study the relationship between internal organization communications’ effectiveness and employee’s performance of Faculty of Management Science, Suan Sunandha Rajabhat University. Study on solutions of communication were carried out within the organization. Questionnaire was used to collect information from 136 people of staff and instructor and data were analyzed by using frequency, percentage, mean and standard deviation and then data processing statistic programs. The result found that organization communication that affects their employee’s performance is sender which lack the skills for speaking and writing to convince audiences ready before taking message and the message which organizations are not always informed. The employees believe the behavior of good organization communication has a positive impact on the development of organization because the employees feel involved and be a part of the organization, by the cooperation in working to achieve the goal, the employees can work in the same direction and meet goal quickly.

Keywords: employee’s performance, faculty of management science, internal organization communications’ effectiveness, management accounting, Suan Sunandha Rajabhat University

Procedia PDF Downloads 213
16504 Spontaneous Message Detection of Annoying Situation in Community Networks Using Mining Algorithm

Authors: P. Senthil Kumari

Abstract:

Main concerns in data mining investigation are social controls of data mining for handling ambiguity, noise, or incompleteness on text data. We describe an innovative approach for unplanned text data detection of community networks achieved by classification mechanism. In a tangible domain claim with humble secrecy backgrounds provided by community network for evading annoying content is presented on consumer message partition. To avoid this, mining methodology provides the capability to unswervingly switch the messages and similarly recover the superiority of ordering. Here we designated learning-centered mining approaches with pre-processing technique to complete this effort. Our involvement of work compact with rule-based personalization for automatic text categorization which was appropriate in many dissimilar frameworks and offers tolerance value for permits the background of comments conferring to a variety of conditions associated with the policy or rule arrangements processed by learning algorithm. Remarkably, we find that the choice of classifier has predicted the class labels for control of the inadequate documents on community network with great value of effect.

Keywords: text mining, data classification, community network, learning algorithm

Procedia PDF Downloads 479
16503 Markov-Chain-Based Optimal Filtering and Smoothing

Authors: Garry A. Einicke, Langford B. White

Abstract:

This paper describes an optimum filter and smoother for recovering a Markov process message from noisy measurements. The developments follow from an equivalence between a state space model and a hidden Markov chain. The ensuing filter and smoother employ transition probability matrices and approximate probability distribution vectors. The properties of the optimum solutions are retained, namely, the estimates are unbiased and minimize the variance of the output estimation error, provided that the assumed parameter set are correct. Methods for estimating unknown parameters from noisy measurements are discussed. Signal recovery examples are described in which performance benefits are demonstrated at an increased calculation cost.

Keywords: optimal filtering, smoothing, Markov chains

Procedia PDF Downloads 298
16502 Logistic Regression Model versus Additive Model for Recurrent Event Data

Authors: Entisar A. Elgmati

Abstract:

Recurrent infant diarrhea is studied using daily data collected in Salvador, Brazil over one year and three months. A logistic regression model is fitted instead of Aalen's additive model using the same covariates that were used in the analysis with the additive model. The model gives reasonably similar results to that using additive regression model. In addition, the problem with the estimated conditional probabilities not being constrained between zero and one in additive model is solved here. Also martingale residuals that have been used to judge the goodness of fit for the additive model are shown to be useful for judging the goodness of fit of the logistic model.

Keywords: additive model, cumulative probabilities, infant diarrhoea, recurrent event

Procedia PDF Downloads 609