Search results for: secure communication
3617 Literature Review: The Efficacy of Play-Based Therapy Programs in Decreasing Core Symptoms of Autism Spectrum Disorder
Authors: Rozan El-Khateeb
Abstract:
This literature review examines the effectiveness of therapy programs that utilize play as an intervention for reducing symptoms associated with Autism Spectrum Disorder (ASD). Play-based therapy approaches provide a child-centered and developmentally appropriate framework to address the core symptoms of ASD, including social communication deficits, restricted and repetitive behaviors, and sensory sensitivities. The review explores various play-based therapy strategies and their impact on improving social skills, communication abilities, adaptive behaviors, and overall functioning in individuals with ASD. The findings suggest that play-based therapy programs hold promise as effective interventions for reducing symptoms and enhancing the quality of life for individuals with ASD. However, further research is necessary to establish standardized protocols, identify optimal dosage and duration, and evaluate long-term outcomes.Keywords: autism, ABA, play, NET, systematic review
Procedia PDF Downloads 773616 Sentence vs. Keyword Content Analysis in Intellectual Capital Disclosures Study
Authors: Martin Surya Mulyadi, Yunita Anwar, Rosinta Ria Panggabean
Abstract:
Major transformations in economic activity from an agricultural economy to knowledge economy have led to an increasing focus on intellectual capital (IC) that has been characterized by continuous innovation, the spread of digital and communication technologies, intangible and human factors. IC is defined as the possession of knowledge and experience, professional knowledge and skill, proper relationships and technological capacities, which when applied will give organizations a competitive advantage. All of IC report/disclosure could be captured from the corporate annual report as it is a communication device that allows a corporation to connect with various external and internal stakeholders. This study was conducted using sentence-content analysis of IC disclosure in the annual report. This research aims to analyze whether the keyword-content analysis is reliable research methodology for IC disclosure related research.Keywords: intellectual capital, intellectual capital disclosure, content analysis, annual report, sentence analysis, keyword analysis
Procedia PDF Downloads 3673615 Usability and Biometric Authentication of Electronic Voting System
Authors: Nighat Ayub, Masood Ahmad
Abstract:
In this paper, a new voting system is developed and its usability is evaluated. The main feature of this system is the biometric verification of the voter and then a few easy steps to cast a vote. As compared to existing systems available, e.g dual vote, the new system requires no training in advance. The security is achieved via multiple key concept (another part of this project). More than 100 student voters were participated in the election from University of Malakanad, Chakdara, PK. To achieve the reliability, the voters cast their votes in two ways, i.e. paper based and electronic based voting using our new system. The results of paper based and electronic voting system are compared and it is concluded that the voters cast their votes for the intended candidates on the electronic voting system. The voters were requested to fill a questionnaire and the results of the questionnaire are carefully analyzed. The results show that the new system proposed in this paper is more secure and usable than other systems.Keywords: e-voting, security, usability, authentication
Procedia PDF Downloads 3923614 Developing a SOA-Based E-Healthcare Systems
Authors: Hend Albassam, Nouf Alrumaih
Abstract:
Nowadays we are in the age of technologies and communication and there is no doubt that technologies such as the Internet can offer many advantages for many business fields, and the health field is no execution. In fact, using the Internet provide us with a new path to improve the quality of health care throughout the world. The e-healthcare offers many advantages such as: efficiency by reducing the cost and avoiding duplicate diagnostics, empowerment of patients by enabling them to access their medical records, enhancing the quality of healthcare and enabling information exchange and communication between healthcare organizations. There are many problems that result from using papers as a way of communication, for example, paper-based prescriptions. Usually, the doctor writes a prescription and gives it to the patient who in turn carries it to the pharmacy. After that, the pharmacist takes the prescription to fill it and give it to the patient. Sometimes the pharmacist might find difficulty in reading the doctor’s handwriting; the patient could change and counterfeit the prescription. These existing problems and many others heighten the need to improve the quality of the healthcare. This project is set out to develop a distributed e-healthcare system that offers some features of e-health and addresses some of the above-mentioned problems. The developed system provides an electronic health record (EHR) and enables communication between separate health care organizations such as the clinic, pharmacy and laboratory. To develop this system, the Service Oriented Architecture (SOA) is adopted as a design approach, which helps to design several independent modules that communicate by using web services. The layering design pattern is used in designing each module as it provides reusability that allows the business logic layer to be reused by different higher layers such as the web service or the website in our system. The experimental analysis has shown that the project has successfully achieved its aims toward solving the problems related to the paper-based healthcare systems and it enables different health organization to communicate effectively. It implements four independent modules including healthcare provider, pharmacy, laboratory and medication information provider. Each module provides different functionalities and is used by a different type of user. These modules interoperate with each other using a set of web services.Keywords: e-health, services oriented architecture (SOA), web services, interoperability
Procedia PDF Downloads 3043613 On-Site Coaching on Freshly-Graduated Nurses to Improves Quality of Clinical Handover and to Avoid Clinical Error
Authors: Sau Kam Adeline Chan
Abstract:
World Health Organization had listed ‘Communication during Patient Care Handovers’ as one of its highest 5 patient safety initiatives. Clinical handover means transfer of accountability and responsibility of clinical information from one health professional to another. The main goal of clinical handover is to convey patient’s current condition and treatment plan accurately. Ineffective communication at point of care is globally regarded as the main cause of the sentinel event. Situation, Background, Assessment and Recommendation (SBAR), a communication tool, is extensively regarded as an effective communication tool in healthcare setting. Nonetheless, just by scenario-based program in nursing school or attending workshops on SBAR would not be enough for freshly graduated nurses to apply it competently in a complex clinical practice. To what extend and in-depth of information should be conveyed during handover process is not easy to learn. As such, on-site coaching is essential to upgrade their expertise on the usage of SBAR and ultimately to avoid any clinical error. On-site coaching for all freshly graduated nurses on the usage of SBAR in clinical handover was commenced in August 2014. During the preceptorship period, freshly graduated nurses were coached by the preceptor. After that, they were gradually assigned to take care of a group of patients independently. Nurse leaders would join in their shift handover process at patient’s bedside. Feedback and support were given to them accordingly. Discrepancies on their clinical handover process were shared with them and documented for further improvement work. Owing to the constraint of manpower in nurse leader, about coaching for 30 times were provided to a nurse in a year. Staff satisfaction survey was conducted to gauge their feelings about the coaching and look into areas for further improvement. Number of clinical error avoided was documented as well. The nurses reported that there was a significant improvement particularly in their confidence and knowledge in clinical handover process. In addition, the sense of empowerment was developed when liaising with senior and experienced nurses. Their proficiency in applying SBAR was enhanced and they become more alert to the critical criteria of an effective clinical handover. Most importantly, accuracy of transferring patient’s condition was improved and repetition of information was avoided. Clinical errors were prevented and quality patient care was ensured. Using SBAR as a communication tool looks simple. The tool only provides a framework to guide the handover process. Nevertheless, without on-site training, loophole on clinical handover still exists, patient’s safety will be affected and clinical error still happens.Keywords: freshly graduated nurse, competency of clinical handover, quality, clinical error
Procedia PDF Downloads 1483612 Portrait of Musical Creativity or Indolence: A Critique of Unoka Character in Achebe’s Things Fall Apart
Authors: Ebim Matthew Abua
Abstract:
In Chinua Achebe’s Things Fall Apart (henceforth, TFA), the character Unoka is portrayed as a weakling and indolent person even when he was a creative artist, a talented musician, and a mathematician. His lack of achievement becomes the barometer for measuring his success. Right from time, music is considered to be of great significance because of its capacity to recreate and retell social events. To this end, music is both a social act and a creative art. As a social act, music is a discursive medium that exploits the dynamics of art in its evaluation of society. Music is so much a part of human existence that its presence in literature can help readers relate to fictional situations and characters. In this paper, the character Unoka is examined against the backdrop of his musical proclivities and his contributions to the overall development of TFA. Unfortunately, Achebe’s Things Fall Apart, a product of artistic creativity, portrays the personality of Unoka as lazy and uninspiring because he (Unoka) is a musician who is busy playing his flute and hardly doing anything productive. This paper is significant because it examines the literary and or linguistic depiction of Unoka and the aftermath of that depiction on the entire novel and, by extension, the larger society. Methodologically, this paper adopted the qualitative approach from the ethnography of communication (EOC), which is the analysis of communication within the wider context of the social and cultural practices and beliefs of the members of a particular culture or speech community. The aim of this qualitative research method includes the ability to discern which communication acts and/or codes are important to different groups, what types of meanings groups apply to different communication events, and how group members learn these codes to provide insight into particular communities. The study reveals that the people of Umuofia were mono-directional in their economy, and there was no room for diversification. One was either a farmer, or such a person was relegated to the background. Unoka, taking up a new challenge of diversifying the economy from the perspective of entertainment, was viewed as a misnomer. This study opens the door to other areas of studying Achebe’s epic novel apart from the critical works of literary artists that have been dished out over time.Keywords: literature, popular culture, unoka, things fall apart
Procedia PDF Downloads 593611 Generation of Symmetric Key Using Randomness of Hash Function
Authors: Sai Charan Kamana, Harsha Vardhan Nakkina, B.R. Chandavarkar
Abstract:
In a highly secure and robust key generation process, a key role is played by randomness and random numbers when current real-world cryptosystems are observed. Most of the present-day cryptographic protocols depend upon the Random Number Generators (RNG), Pseudo-Random Number Generator (PRNG). These protocols often use noisy channels such as Disk seek time, CPU temperature, Mouse pointer movement, Fan noise to obtain true random values. Despite being cost-effective, these noisy channels may need additional hardware devices to continuously communicate with them. On the other hand, Hash functions are Pseudo-Random (because of their requirements). So, they are a good replacement for these noisy channels and have low hardware requirements. This paper discusses, some of the key generation methodologies, and their drawbacks. This paper explains how hash functions can be used in key generation, how to combine Key Derivation Functions with hash functions.Keywords: key derivation, hash based key derivation, password based key derivation, symmetric key derivation
Procedia PDF Downloads 1613610 VANETs Geographic Routing Protocols: A survey
Authors: Ramin Karimi
Abstract:
One of common highly mobile wireless ad hoc networks is Vehicular Ad Hoc Networks. Hence routing in vehicular ad hoc network (VANET) has attracted much attention during the last few years. VANET is characterized by its high mobility of nodes and specific topology patterns. Moreover these networks encounter a significant loss rate and a very short duration of communication. In vehicular ad hoc networks, one of challenging is routing of data due to high speed mobility and changing topology of vehicles. Geographic routing protocols are becoming popular due to advancement and availability of GPS devices. Delay Tolerant Networks (DTNs) are a class of networks that enable communication where connectivity issues like sparse connectivity, intermittent connectivity; high latency, long delay, high error rates, asymmetric data rate, and even no end-to-end connectivity exist. In this paper, we review the existing Geographic Routing Protocols for VANETs and also provide a qualitative comparison of them.Keywords: vehicular ad hoc networks, mobility, geographic routing, delay tolerant networks
Procedia PDF Downloads 5203609 The Role of Information and Communication Technology in Curbing Electoral Malpractices in Nigeria
Authors: Fred Fudah Moveh, Muhammad Abba Jallo
Abstract:
Electoral fraud remains a persistent threat to democracy in Nigeria, undermining public trust and stalling political development. This study explores the role of Information and Communication Technology (ICT) in curbing electoral fraud, focusing on its application in recent Nigerian elections. The paper identifies the main forms of electoral fraud, evaluates the effectiveness of ICT-based interventions like the Permanent Voter Card (PVC) and the Bi-modal Voter Accreditation System (BVAS), and discusses challenges such as poor infrastructure, voter intimidation, and legal inadequacies. Data was collected through structured questionnaires and interviews and analyzed using SPSS software. Results reveal that while ICT has mitigated some forms of fraud, systemic issues continue to hinder its full potential. The study concludes with recommendations for enhancing the application of ICT in Nigeria’s electoral process.Keywords: ICT, electoral fraud, election process, Nigeria, political instability
Procedia PDF Downloads 253608 Trait of Sales Professionals
Authors: Yuichi Morita, Yoshiteru Nakamori
Abstract:
In car dealer business of Japan, a sale professional is a key factor of company’s success. We hypothesize that, if a corporation knows what is the sales professionals’ trait of its corporation’s business field, it will be easier for a corporation to secure and nurture sales persons effectively. The lean human resources management will ensure business success and good performance of corporations, especially small and medium ones. The goal of the paper is to determine the traits of sales professionals for small-and medium-size car dealers, using chi-square test and the variable rough set model. As a result, the results illustrate that experience of job change, learning ability and product knowledge are important, and an academic background, building a career with internal transfer, experience of the leader and self-development are not important to be a sale professional. Also, we illustrate sales professionals’ traits are persistence, humility, improvisation and passion at business.Keywords: traits of sales professionals, variable precision rough sets theory, sales professional, sales professionals
Procedia PDF Downloads 3823607 Human Security Providers in Fragile State under Asymmetric War Conditions
Authors: Luna Shamieh
Abstract:
Various players are part of the game in an asymmetric war, all making efforts to provide human security to their own adherents. Although a fragile state is not able to provide sufficient and comprehensive services, it still provides special services and security to the elite; the insurgents as well provide services and security to their associates. The humanitarian organisations, on the other hand, provide some fundamental elements of human security, but only in the regions, they are able to access when possible (if possible). The counterinsurgents (security forces of the state and intervention forces) operate within a narrow band defined by the vision of the responsibility to protect and the perspective of the resolution of the conflict through combat; hence, the possibility to provide human security is shaken at this end. This article examines how each player provides human security from the perspective of freedom from want in order to secure basic and strategic needs, freedom from fear through providing protection against all kinds of violence, and the freedom to live in dignity. It identifies a vicious cycle caused by the intervention of the different players causing a centrifugal force that may lead to disintegration of the nation under war.Keywords: asymmetric war, counterinsurgency, fragile state, human security, insurgency
Procedia PDF Downloads 3343606 Portable Cardiac Monitoring System Based on Real-Time Microcontroller and Multiple Communication Interfaces
Authors: Ionel Zagan, Vasile Gheorghita Gaitan, Adrian Brezulianu
Abstract:
This paper presents the contributions in designing a mobile system named Tele-ECG implemented for remote monitoring of cardiac patients. For a better flexibility of this application, the authors chose to implement a local memory and multiple communication interfaces. The project described in this presentation is based on the ARM Cortex M0+ microcontroller and the ADAS1000 dedicated chip necessary for the collection and transmission of Electrocardiogram signals (ECG) from the patient to the microcontroller, without altering the performances and the stability of the system. The novelty brought by this paper is the implementation of a remote monitoring system for cardiac patients, having a real-time behavior and multiple interfaces. The microcontroller is responsible for processing digital signals corresponding to ECG and also for the implementation of communication interface with the main server, using GSM/Bluetooth SIMCOM SIM800C module. This paper translates all the characteristics of the Tele-ECG project representing a feasible implementation in the biomedical field. Acknowledgment: This paper was supported by the project 'Development and integration of a mobile tele-electrocardiograph in the GreenCARDIO© system for patients monitoring and diagnosis - m-GreenCARDIO', Contract no. BG58/30.09.2016, PNCDI III, Bridge Grant 2016, using the infrastructure from the project 'Integrated Center for research, development and innovation in Advanced Materials, Nanotechnologies, and Distributed Systems for fabrication and control', Contract No. 671/09.04.2015, Sectoral Operational Program for Increase of the Economic Competitiveness co-funded from the European Regional Development Fund.Keywords: Tele-ECG, real-time cardiac monitoring, electrocardiogram, microcontroller
Procedia PDF Downloads 2723605 Determining the Factors Affecting Social Media Addiction (Virtual Tolerance, Virtual Communication), Phubbing, and Perception of Addiction in Nurses
Authors: Fatima Zehra Allahverdi, Nukhet Bayer
Abstract:
Objective: Three questions were formulated to examine stressful working units (intensive care units, emergency unit nurses) utilizing the self-perception theory and social support theory. This study provides a distinctive input by inspecting the combination of variables regarding stressful working environments. Method: The descriptive research was conducted with the participation of 400 nurses working at Ankara City Hospital. The study used Multivariate Analysis of Variance (MANOVA), regression analysis, and a mediation model. Hypothesis one used MANOVA followed by a Scheffe post hoc test. Hypothesis two utilized regression analysis using a hierarchical linear regression model. Hypothesis three used a mediation model. Result: The study utilized mediation analyses. Findings supported the hypotheses that intensive care units have significantly high scores in virtual communication and virtual tolerance. The number of years on the job, virtual communication, virtual tolerance, and phubbing significantly predicted 51% of the variance of perception of addiction. Interestingly, the number of years on the job, while significant, was negatively related to perception of addiction. Conclusion: The reasoning behind these findings and the lack of significance in the emergency unit is discussed. Around 7% of the variance of phubbing was accounted for through working in intensive care units. The model accounted for 26.80 % of the differences in the perception of addiction.Keywords: phubbing, social media, working units, years on the job, stress
Procedia PDF Downloads 533604 Big Data Analytics and Data Security in the Cloud via Fully Homomorphic Encryption
Authors: Waziri Victor Onomza, John K. Alhassan, Idris Ismaila, Noel Dogonyaro Moses
Abstract:
This paper describes the problem of building secure computational services for encrypted information in the Cloud Computing without decrypting the encrypted data; therefore, it meets the yearning of computational encryption algorithmic aspiration model that could enhance the security of big data for privacy, confidentiality, availability of the users. The cryptographic model applied for the computational process of the encrypted data is the Fully Homomorphic Encryption Scheme. We contribute theoretical presentations in high-level computational processes that are based on number theory and algebra that can easily be integrated and leveraged in the Cloud computing with detail theoretic mathematical concepts to the fully homomorphic encryption models. This contribution enhances the full implementation of big data analytics based cryptographic security algorithm.Keywords: big data analytics, security, privacy, bootstrapping, homomorphic, homomorphic encryption scheme
Procedia PDF Downloads 3793603 Machine Learning Approach for Anomaly Detection in the Simulated Iec-60870-5-104 Traffic
Authors: Stepan Grebeniuk, Ersi Hodo, Henri Ruotsalainen, Paul Tavolato
Abstract:
Substation security plays an important role in the power delivery system. During the past years, there has been an increase in number of attacks on automation networks of the substations. In spite of that, there hasn’t been enough focus dedicated to the protection of such networks. Aiming to design a specialized anomaly detection system based on machine learning, in this paper we will discuss the IEC 60870-5-104 protocol that is used for communication between substation and control station and focus on the simulation of the substation traffic. Firstly, we will simulate the communication between substation slave and server. Secondly, we will compare the system's normal behavior and its behavior under the attack, in order to extract the right features which will be needed for building an anomaly detection system. Lastly, based on the features we will suggest the anomaly detection system for the asynchronous protocol IEC 60870-5-104.Keywords: Anomaly detection, IEC-60870-5-104, Machine learning, Man-in-the-Middle attacks, Substation security
Procedia PDF Downloads 3683602 A Study on the Reliability Evaluation of a Timer Card for Air Dryer of the Railway Vehicle
Authors: Chul Su Kim, Jun Ku Lee, Won Jun Lee
Abstract:
The EMU (electric multiple unit) vehicle timer card is a PCB (printed circuit board) for controlling the air-dryer to remove the moisture of the generated air from the air compressor of the braking device. This card is exposed to the lower part of the railway vehicle, so it is greatly affected by the external environment such as temperature and humidity. The main cause of the failure of this timer card is deterioration of soldering area of the PCB surface due to temperature and humidity. Therefore, in the viewpoint of preventive maintenance, it is important to evaluate the reliability of the timer card and predict the replacement cycle to secure the safety of the air braking device is one of the main devices for driving. In this study, the existing and the improved products were evaluated on the reliability through ALT (accelerated life test). In addition, the acceleration factor by the 'Coffin-Manson' equation was obtained, and the remaining lifetime was compared and examined.Keywords: reliability evaluation, timer card, Printed Circuit Board, Accelerated Life Test
Procedia PDF Downloads 2793601 Experiential Language Learning as a Tool for Effective Global Leadership
Authors: Christiane Dumont
Abstract:
This paper proposes to revisit foreign-language learning as a tool to increase motivation through advocacy and develop effective natural communication skills, which are critical leadership qualities. To this end, collaborative initiatives undertaken by advanced university students of French with local and international community partners will be reviewed. Close attention will be paid to the acquisition of intercultural skills, the reflective process, as well as the challenges and outcomes. Two international development projects conducted in Haiti will be highlighted, i.e., collaboration with a network of providers in the Haitian cultural heritage preservation and tourism sector (2014-15) and development of investigation and teacher training tools for a primary/secondary school in the Port-au-Prince area (current). The choice of community-service learning as a framework to teach French-as-a-second-language stemmed from the need to raise awareness against stereotypes and prejudice, which hinder the development of effective intercultural skills. This type of experiential education also proved very effective in identifying and preventing miscommunication caused by the lack of face-to-face interaction in our increasingly technology-mediated world. Learners experienced first-hand, the challenges and advantages of face-to-face communication, which, in turn, enhanced their motivation for developing effective intercultural skills. Vygotsky's and Kolb's theories, current research on service learning (Dwight, Eyler), action/project-based pedagogy (Beckett), and reflective learning (TSC Farrell), will provide useful background to analyze the benefits and challenges of community-service learning. The ultimate goal of this paper is to find out what makes experiential learning truly unique and transformative for both the learners and the community they wish to serve. It will demonstrate how enhanced motivation, community engagement, and clear, concise, and respectful communication impact and empower learners. The underlying hope is to help students in high-profile, and leading-edge industries become effective global leaders.Keywords: experiential learning, intercultural communication, reflective learning, effective leadership, learner motivation
Procedia PDF Downloads 1053600 Exploring Probabilistic Models for Transient Stability Analysis of Renewable-Dominant Power Grid
Authors: Phuong Nguyen
Abstract:
Along with the ongoing energy transition, the electrical power system is getting more vulnerable with the increasing penetration of renewable energy sources (RES). By replacing a large amount of fossil fuel-based power plants with RES, the rotating mass of the power grid is decreasing drastically, which has been reported by a number of system operators. This leads to a huge challenge for operators to secure the operation of their grids in all-time horizon ranges, from sub-seconds to minutes and even hours. There is a need to revise the grid capabilities in dealing with transient (angle) stability and voltage dynamics. While the traditional approaches relied on deterministic scenarios (worst-case scenarios), there is also a need to cover a whole range of probabilities regarding a wide range of uncertainties coming from massive RES units. To contribute to handle these issues, this paper aims to focus on developing a new analytical approach for transient stability.Keywords: transient stability, uncertainties, renewable energy sources, analytical approach
Procedia PDF Downloads 723599 Job Satisfaction and Commitment among Academic Staff of Selected Colleges of Education in Kano and Kaduna States of Nigeria
Authors: Mary Okonkwo Ekwy
Abstract:
The problem of the growing disillusionment of College of Education teachers with academic life vis-à-vis their job satisfaction and commitment was investigated in this study with a view to finding out if both their job satisfaction and commitment have suffered, and to find out if there was a relationship between job satisfaction and commitment among these College of Education teachers. Due consideration was also given in the study to the possible effects of demographic variables on attitudes to their job. To carry out a study of job satisfaction and commitment among the College of Education teachers and to explore the relationship between them, research instruments were used for measuring the levels of job satisfaction and commitment among them. A sample of 200 Colleges of Education teachers, comprising 15 Professors, 9 Principal Lecturers, 70 Senior Lecturer and 106 Lecturers was used for the study. Five major hypothesis were tested with regard to the relationship between job satisfaction and commitment among the teachers. The Pearson correlation, the F-ratio, and regression analysis were used for data analysis and hypothesis testing. The result of this investigation suggests that, perhaps the best way to secure the commitment of teachers is to ensure their job satisfaction. Future investigations will further enrich our knowledge about these very important themes.Keywords: job satisfaction, commitment, academic staff, college of education
Procedia PDF Downloads 5523598 Changing Arbitrary Data Transmission Period by Using Bluetooth Module on Gas Sensor Node of Arduino Board
Authors: Hiesik Kim, Yong-Beom Kim, Jaheon Gu
Abstract:
Internet of Things (IoT) applications are widely serviced and spread worldwide. Local wireless data transmission technique must be developed to rate up with some technique. Bluetooth wireless data communication is wireless technique is technique made by Special Inter Group (SIG) using the frequency range 2.4 GHz, and it is exploiting Frequency Hopping to avoid collision with a different device. To implement experiment, equipment for experiment transmitting measured data is made by using Arduino as open source hardware, gas sensor, and Bluetooth module and algorithm controlling transmission rate is demonstrated. Experiment controlling transmission rate also is progressed by developing Android application receiving measured data, and controlling this rate is available at the experiment result. It is important that in the future, improvement for communication algorithm be needed because a few error occurs when data is transferred or received.Keywords: Arduino, Bluetooth, gas sensor, IoT, transmission
Procedia PDF Downloads 2773597 Towards a Secure Storage in Cloud Computing
Authors: Mohamed Elkholy, Ahmed Elfatatry
Abstract:
Cloud computing has emerged as a flexible computing paradigm that reshaped the Information Technology map. However, cloud computing brought about a number of security challenges as a result of the physical distribution of computational resources and the limited control that users have over the physical storage. This situation raises many security challenges for data integrity and confidentiality as well as authentication and access control. This work proposes a security mechanism for data integrity that allows a data owner to be aware of any modification that takes place to his data. The data integrity mechanism is integrated with an extended Kerberos authentication that ensures authorized access control. The proposed mechanism protects data confidentiality even if data are stored on an untrusted storage. The proposed mechanism has been evaluated against different types of attacks and proved its efficiency to protect cloud data storage from different malicious attacks.Keywords: access control, data integrity, data confidentiality, Kerberos authentication, cloud security
Procedia PDF Downloads 3353596 Identity-Based Encryption: A Comparison of Leading Classical and Post-Quantum Implementations in an Enterprise Setting
Authors: Emily Stamm, Neil Smyth, Elizabeth O'Sullivan
Abstract:
In Identity-Based Encryption (IBE), an identity, such as a username, email address, or domain name, acts as the public key. IBE consolidates the PKI by eliminating the repetitive process of requesting public keys for each message encryption. Two of the most popular schemes are Sakai-Kasahara (SAKKE), which is based on elliptic curve pairings, and the Ducas, Lyubashevsky, and Prest lattice scheme (DLP- Lattice), which is based on quantum-secure lattice cryptography. In or- der to embed the schemes in a standard enterprise setting, both schemes are implemented as shared system libraries and integrated into a REST service that functions at the enterprise level. The performance of both schemes as libraries and services is compared, and the practicalities of implementation and application are discussed. Our performance results indicate that although SAKKE has the smaller key and ciphertext sizes, DLP-Lattice is significantly faster overall and we recommend it for most enterprise use cases.Keywords: identity-based encryption, post-quantum cryptography, lattice-based cryptography, IBE
Procedia PDF Downloads 1343595 Analysis of Transmedia Storytelling in Pokémon GO
Authors: Iva Nedelcheva
Abstract:
This study is part of a doctoral thesis on the topic of Hyperfiction: Past, Present and Future of Storytelling through Hypertext. It explores in depth the impact of transmedia storytelling and the role of hypertext in the realm of the currently popular social media phenomenon Pokémon GO. Storytelling is a powerful method to engage and unite people. Moreover, the technology progress adds a whole new angle to the method, with hypertext and cross-platform sharing that enhance the traditional storytelling so much that transmedia storytelling gives unlimited opportunities to affect the everyday life of people across the globe. This research aims at examining the transmedia storytelling approach in Pokémon GO, and explaining how that contributed to its establishment as a massive worldwide hit in less than a week. The social engagement is investigated in all major media platforms, including traditional and online media channels. Observation and content analyses are reported in this paper to form the conclusion that transmedia storytelling with the input of hypertext has a promising future as a method of establishing a productive and rewarding communication strategy.Keywords: communication, hypertext, Pokemon Go, storytelling, transmedia
Procedia PDF Downloads 1703594 The Dynamic Nexus of Public Health and Journalism in Informed Societies
Authors: Ali Raza
Abstract:
The dynamic landscape of communication has brought about significant advancements that intersect with the realms of public health and journalism. This abstract explores the evolving synergy between these fields, highlighting how their intersection has contributed to informed societies and improved public health outcomes. In the digital age, communication plays a pivotal role in shaping public perception, policy formulation, and collective action. Public health, concerned with safeguarding and improving community well-being, relies on effective communication to disseminate information, encourage healthy behaviors, and mitigate health risks. Simultaneously, journalism, with its commitment to accurate and timely reporting, serves as the conduit through which health information reaches the masses. Advancements in communication technologies have revolutionized the ways in which public health information is both generated and shared. The advent of social media platforms, mobile applications, and online forums has democratized the dissemination of health-related news and insights. This democratization, however, brings challenges, such as the rapid spread of misinformation and the need for nuanced strategies to engage diverse audiences. Effective collaboration between public health professionals and journalists is pivotal in countering these challenges, ensuring that accurate information prevails. The synergy between public health and journalism is most evident during public health crises. The COVID-19 pandemic underscored the pivotal role of journalism in providing accurate and up-to-date information to the public. However, it also highlighted the importance of responsible reporting, as sensationalism and misinformation could exacerbate the crisis. Collaborative efforts between public health experts and journalists led to the amplification of preventive measures, the debunking of myths, and the promotion of evidence-based interventions. Moreover, the accessibility of information in the digital era necessitates a strategic approach to health communication. Behavioral economics and data analytics offer insights into human decision-making and allow tailored health messages to resonate more effectively with specific audiences. This approach, when integrated into journalism, enables the crafting of narratives that not only inform but also influence positive health behaviors. Ethical considerations emerge prominently in this alliance. The responsibility to balance the public's right to know with the potential consequences of sensational reporting underscores the significance of ethical journalism. Health journalists must meticulously source information from reputable experts and institutions to maintain credibility, thus fortifying the bridge between public health and the public. As both public health and journalism undergo transformative shifts, fostering collaboration between these domains becomes essential. Training programs that familiarize journalists with public health concepts and practices can enhance their capacity to report accurately and comprehensively on health issues. Likewise, public health professionals can gain insights into effective communication strategies from seasoned journalists, ensuring that health information reaches a wider audience. In conclusion, the convergence of public health and journalism, facilitated by communication advancements, is a cornerstone of informed societies. Effective communication strategies, driven by collaboration, ensure the accurate dissemination of health information and foster positive behavior change. As the world navigates complex health challenges, the continued evolution of this synergy holds the promise of healthier communities and a more engaged and educated public.Keywords: public awareness, journalism ethics, health promotion, media influence, health literacy
Procedia PDF Downloads 703593 Secure Mobile E-Business Applications
Authors: Hala A. Alrumaih
Abstract:
It is widely believed that mobile device is a promising technology for lending the opportunity for the third wave of electronic commerce. Mobile devices have changed the way companies do business. Many applications are under development or being incorporated into business processes. In this day, mobile applications are a vital component of any industry strategy. One of the greatest benefits of selling merchandise and providing services on a mobile application is that it widens a company’s customer base significantly. Mobile applications are accessible to interested customers across regional and international borders in different electronic business (e-business) area. But there is a dark side to this success story. The security risks associated with mobile devices and applications are very significant. This paper introduces a broad risk analysis for the various threats, vulnerabilities, and risks in mobile e-business applications and presents some important risk mitigation approaches. It reviews and compares two different frameworks for security assurance in mobile e-business applications. Based on the comparison, the paper suggests some recommendations for applications developers and business owners in mobile e-business application development process.Keywords: e-business, mobile applications, risk mitigations, security assurance
Procedia PDF Downloads 2953592 Vocabulary Paradigm in Learning Romanian As a Foreign Language
Authors: Georgiana Ciobotaru
Abstract:
The vocabulary that foreign students assimilate once they start studying the Romanian language must allow them to develop the linguistic competence of oral and written expression, but also the intercultural one, necessary for their integration into the new socio-cultural environment. Therefore, the familiarization courses with Romanian as a foreign language aim at fundamental language acquisitions in order to obtain the expected level of Romanian language. They also relate differently to the new culture and the new language they come in contact with, having a distinct way of expressing themselves. Foreign students want to continue their university and postgraduate studies at specialized faculties in the country; therefore, they need both a general language for their integration into society and for interaction with others, Romanians or students from countries other than their own, but also from a specialized language that facilitates didactic communication and professional development. The complexity of the vocabulary must thus cover the daily communication needs, but also the subsequent evolution of each one. This paper aims to illustrate the most important semantic fields that students must assimilate in order to crystallize a linguistic identity in the new context of their personal and professional development and to help them cope with the culture shock.Keywords: integration, intercultural, language, linguistic, vocabulary
Procedia PDF Downloads 1953591 Chaos Cryptography in Cloud Architectures with Lower Latency
Authors: Mohammad A. Alia
Abstract:
With the rapid evolution of the internet applications, cloud computing becomes one of today’s hottest research areas due to its ability to reduce costs associated with computing. Cloud is, therefore, increasing flexibility and scalability for computing services in the internet. Cloud computing is Internet based computing due to shared resources and information which are dynamically delivered to consumers. As cloud computing share resources via the open network, hence cloud outsourcing is vulnerable to attack. Therefore, this paper will explore data security of cloud computing by implementing chaotic cryptography. The proposal scenario develops a problem transformation technique that enables customers to secretly transform their information. This work proposes the chaotic cryptographic algorithms have been applied to enhance the security of the cloud computing accessibility. However, the proposed scenario is secure, easy and straightforward process. The chaotic encryption and digital signature systems ensure the security of the proposed scenario. Though, the choice of the key size becomes crucial to prevent a brute force attack.Keywords: chaos, cloud computing, security, cryptography
Procedia PDF Downloads 3453590 Happiness, Media and Sustainability of Communities in Donkeaw, Mearim District, Chiang Mai, Thailand
Authors: Panida Jongsuksomsakul
Abstract:
This study of the ‘happiness’ and ‘sustainability’ in the community of Donkeaw, Amphoe Mae Rim, Chiang Mai Province during the non-election period in Thailand, noted that their happiness levels are in the middle-average range. This was found using a mixed approach of qualitative and quantitative methods (N = 386, α = 0.05). The study explores indicators for six aspects of well-being and happiness, including, good local governance, administrative support for the health system that maintains people’s mental and physical health, environment and weather, job security and a regular income aids them in managing a sustainable lifestyle. The impact of economic security and community relationships on social and cultural capital, and the way these aspects impact on the life style of the community, affects the sustainable well-being of people. Moreover, living with transparency and participatory communication led to diverse rewards in many areas.Keywords: communication, happiness, well-being, Donkeaw community, social and cultural capital
Procedia PDF Downloads 2343589 New Media and the Personal Vote in General Elections: A Comparison of Constituency Level Candidates in the United Kingdom and Japan
Authors: Sean Vincent
Abstract:
Within the academic community, there is a consensus that political parties in established liberal democracies are facing a myriad of organisational challenges as a result of falling membership, weakening links to grass-roots support and rising voter apathy. During the same period of party decline and growing public disengagement political parties have become increasingly professionalised. The professionalisation of political parties owes much to changes in technology, with television becoming the dominant medium for political communication. In recent years, however, it has become clear that a new medium of communication is becoming utilised by political parties and candidates – New Media. New Media, a term hard to define but related to internet based communication, offers a potential revolution in political communication. It can be utilised by anyone with access to the internet and its most widely used platforms of communication such as Facebook and Twitter, are free to use. The advent of Web 2.0 has dramatically changed what can be done with the Internet. Websites now allow candidates at the constituency level to fundraise, organise and set out personalised policies. Social media allows them to communicate with supporters and potential voters practically cost-free. As such candidate dependency on the national party for resources and image now lies open to debate. Arguing that greater candidate independence may be a natural next step in light of the contemporary challenges faced by parties, this paper examines how New Media is being used by candidates at the constituency level to increase their personal vote. The paper will present findings from research carried out during two elections – the Japanese Lower House election of 2014 and the UK general election of 2015. During these elections a sample of candidates, totalling 150 candidates, from the three biggest parties in each country were selected and their new media output, specifically candidate websites, Twitter and Facebook output subjected to content analysis. The analysis examines how candidates are using new media to both become more functionally, through fundraising and volunteer mobilisation and politically, through the promotion of personal/local policies, independent from the national party. In order to validate the results of content analysis this paper will also present evidence from interviews carried out with 17 candidates that stood in the 2014 Japanese Lower House election or 2015 UK general election. With a combination of statistical analysis and interviews, several conclusions can be made about the use of New Media at constituency level. The findings show not just a clear difference in the way candidates from each country are using New Media but also differences within countries based upon the particular circumstances of each constituency. While it has not yet replaced traditional methods of fundraising and activist mobilisation, New Media is also becoming increasingly important in campaign organisation and the general consensus amongst candidates is that its importance will continue to grow along as politics in both countries becomes more diffuse.Keywords: political campaigns, elections, new media, political communication
Procedia PDF Downloads 2263588 Causes and Consequences of Intuitive Animal Communication: A Case Study at Panthera Africa
Authors: Cathrine Scharning Cornwall-Nyquist, David Rafael Vaz Fernandes
Abstract:
Since its origins, mankind has been dreaming of communicating directly with other animals. Past civilizations interacted on different levels with other species and recognized them in their rituals and daily activities. However, recent scientific developments have limited the ability of humans to consider deeper levels of interaction beyond observation and/or physical behavior. In recent years, animal caretakers and facilities such as sanctuaries or rescue centers have been introducing new techniques based on intuition. Most of those initiatives are related to specific cases, such as the incapacity to understand an animal’s behavior. Respected organizations also include intuitive animal communication (IAC) sessions to follow up on past interventions with their animals. Despite the lack of credibility of this discipline, some animal caring structures have opted to integrate IAC into their daily routines and approaches to animal welfare. At this stage, animal communication will be generally defined as the ability of humans to communicate with animals on an intuitive level. The trend in the field remains to be explored. The lack of theory and previous research urges the scientific community to improve the description of the phenomenon and its consequences. Considering the current scenario, qualitative approaches may become a suitable pathway to explore this topic. The purpose of this case study is to explore the beliefs behind and the consequences of an approach based on intuitive animal communication techniques for Panthera Africa (PA), an ethical sanctuary located in South Africa. Due to their personal experience, the Sanctuary’s founders have developed a philosophy based on IAC while respecting the world's highest standards for big cat welfare. Their dual approach is reflected in their rescues, daily activities, and healing animals’ trauma. The case study's main research questions will be: (i) Why do they choose to apply IAC in their work? (ii) What consequences to their activities do IAC bring? (iii) What effects do IAC techniques bring in their interactions with the outside world? Data collection will be gathered on-site via: (i) Complete participation (field notes); (ii) Semi-structured interviews (audio transcriptions); (iii) Document analysis (internal procedures and policies); (iv) Audio-visual material (communication with third parties). The main researcher shall become an active member of the Sanctuary during a 30-day period and have full access to the site. Access to documents and audio-visual materials will be granted on a request basis. Interviews are expected to be held with PA founders and staff members and with IAC practitioners related to the facility. The information gathered shall enable the researcher to provide an extended description of the phenomenon and explore its internal and external consequences for Panthera Africa.Keywords: animal welfare, intuitive animal communication, Panthera Africa, rescue
Procedia PDF Downloads 92