Search results for: identity based encryption
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 29402

Search results for: identity based encryption

29252 Issues in the Learning and Construction of a National Music Identity in Multiracial Malaysia: Diversity, Complexity, and Contingency

Authors: Loo Fung Ying, Loo Fung Chiat

Abstract:

The formation of a musical identity that shapes the nation in this multiracial country reveals many complexities, conundrums, and contingencies. Creativity and identity formation at the level of an individual or a collective group further diversified musical expression, representation, and style, which has led to an absence of regularities. In addition, ‘contemporizing accretion,’ borrowing a term used by Schnelle in theology (2009), further complicates musical identity, authenticity, conception, and realization. Thus, in this paper, we attempt to define the issues surrounding the teaching and learning of the multiracial Malaysian national music identity. We also discuss unnecessary power hierarchies, interracial conflicts, and sentiments in the construct of a multiracial national music identity by referring to genetic origins, the evolution of music, and the neglected issues of representation and reception at a global level from a diachronic perspective. Lastly, by synthesizing Ladson-Billings, Gay, Kruger, and West-Burns’s culturally relevant/responsive pedagogical theories, we discuss possible analytic tools for consideration that are more multiculturally relevant and responsive for the teaching, learning, and construction of a multiracial Malaysian national music identity.

Keywords: Malaysia, music, multiracial, national music identity, culturally relevant/responsive pedagogy

Procedia PDF Downloads 201
29251 Heroic Villains: An Exploration of the Use of Narrative Plotlines and Emerging Identities within Recovery Stories of Former Substance Abusers

Authors: Tria Moore Aimee Walker-Clarke

Abstract:

The purpose of the study was to develop a deeper understanding of how self-identity is negotiated and reconstructed by people in recovery from substance abuse. The approach draws on the notion that self-identity is constructed through stories. Specifically, dominant narratives of substance abuse involve the 'addict identity' in which the meaning of being an addict is constructed though social interaction and informed by broader social meanings of substance misuse, which are considered deviant. The addict is typically understood as out of control, weak and feckless. Users may unconsciously embody this addict identity which makes recovery less likely. Typical approaches to treatment employ the notion that recovery is much more likely when users change the way they think and feel about themselves by assembling a new identity. Recovery, therefore, involves a reconstruction of the self in a new light, which may mean rejecting a part of the self (the addict identity). One limitation is that previous research on this topic has been quantitative which, while useful, tells us little about how this process is best managed. Should one, for example, reject the past addict identity completely and move on to the new identity, or, is it more effective to accept the past identity and use this in the formation of the new non-user identity? The purpose of this research, then, is to explore how addicts in recovery have managed the transition between their past and current selves and whether this may inform therapeutic practice. Using a narrative approach, data were analyzed from five in-depth interviews with former addicts who had been abstinent for at least a year, and who were in some form of volunteering role at substance treatment services in the UK. Although participants' identified with a previous ‘addict identity,’ and made efforts to disassociate themselves from this, they also recognized that acceptance was an important part of reconstructing their new identity. The participants' narratives used familiar plot lines to structure their stories, in which they positioned themselves as the heroes in their own stories, rather than as victim of circumstance. Instead of rejecting their former addict identity, which would mean rejecting a part of the self, participants used their experience in a reconstructive and restorative way. The findings suggest that encouraging people to tell their story and accept their addict identity are important factors in successful recovery.

Keywords: addiction, identity, narrative, recovery, substance abuse

Procedia PDF Downloads 305
29250 Reflections on the Role of Cultural Identity in a Bilingual Education Program

Authors: Lina Tenjo, Ilba Rodríguez

Abstract:

The role of cultural identity in bilingual programs has been barely discussed in regards to SLA. This research focuses on providing relevant information that helps in having more knowledge about the experiences that an elementary student has during the second language learning process in a bilingual program within a multicultural context. This study explores the experience of 18 students in a dual language program, in a public elementary school in Northern Virginia, USA. It examines their dual language experience and the different ways this experience contributes to the formation of their cultural identity. The findings were studied with the purpose of determining the relationship between participants and certain aspects of cultural identity in a multicultural context. The reflections that originate from the voices of children are the key source that helps us to better understand the particular needs that young learners have during their participation in a DLP.

Keywords: acculturation, bilingual education, culture, dual language program, identity, second language acquisition

Procedia PDF Downloads 339
29249 Expressions of Local Identity via Residential Architecture Practice in UNESCO World Heritage Sites

Authors: Surasak Kangkhao, Chaturong Louhapensang

Abstract:

This research investigates design and cultural heritage interpretations by residential architecture design in World Heritage cities: Kamphaeng Phet, Thailand reflect on the essence of design based on local identity. The research consisted of three thematic foci. First, the studies examined the contextual background that led to the genesis of the building. Second, the investigations concentrated on how its design was developed and implemented. Third, these modes of problematisation lent a basis to argue that a quality of placeness was not confined exclusively to traditional or vernacular structures but could be found from the unconventional aesthetics of Residential Architecture as well.

Keywords: expressions, local identity, residential architecture, practice, world heritage site

Procedia PDF Downloads 396
29248 Continuity of Place-Identity: Identifying Regional Components of Kerala Architecture through 1805-1950

Authors: Manoj K. Kumar, Deepthi Bathala

Abstract:

Man has the need to know and feel as a part of the historical continuum and it is this continuum that reinforces his identity. Architecture and the built environment contribute to this identity as established by the various identity theories exploring the relationship between the two. Architecture which is organic has been successful in maintaining a continuum of identity until the advent of globalization when the world saw a drastic shift to architecture of ‘placelessness’. The answer to the perfect synthesis of ‘universalization’ and ‘regionalism’ is an ongoing quest. However, history has established a smooth transition from vernacular to colonial to modern unlike the architecture of today. The traditional Kerala architecture has evolved from the tropical climate, geography, local needs, materials, skills and foreign influences. It is unique in contrast to the architecture of the neighboring states as a result of the geographical barriers however influenced by the architecture of the Orient due to trade relations. Through 1805 to 1950, the European influence on the architecture of Kerala resulted in the emergence of the colonial style which managed to establish a continuum of the traditional architecture. The paper focuses on the identification of the components of architecture that established the continuity of place-identity in the architecture of Kerala and examines the transition from the traditional Kerala architecture to colonial architecture during the colonial period. Visual surveys based on the principles of urban design, cognitive mapping, typology analysis followed by the strong understanding of the morphological and built environment along with the matrix method are the research tools used. The understanding of these components of continuity can be useful in creating buildings which people can relate to in the present day. South-Asia shares the history of colonialism and the understanding of these components can pave the way for further research on how to establish a regional identity in the era of globalization.

Keywords: colonial, identity, place, regional

Procedia PDF Downloads 408
29247 Women Academics' Insecure Identity at Work: A Millennials Phenomenon

Authors: Emmanouil Papavasileiou, Nikos Bozionelos, Liza Howe-Walsh, Sarah Turnbull

Abstract:

Purpose: The research focuses on women academics’ insecure identity at work and examines its link with generational identity. The aim is to enrich understanding of identities at work as a crucial attribute of managing academics in the context of the proliferation of managerialist controls of audit, accountability, monitoring, and performativity. Methodology: Positivist quantitative methodology was utilized. Data were collected from the Scientific Women's Academic Network (SWAN) Charter. Responses from 155 women academics based in the British Higher Education system were analysed. Findings: Analysis showed high prevalence of strong imposter feelings among participants, suggesting high insecurity at work among women academics in the United Kingdom. Generational identity was related to imposter feelings. In particular, Millennials scored significantly higher than the other generational groups. Research implications: The study shows that imposter feelings are variously manifested among the prevalent generations of women academics, while generational identity is a significant antecedent of such feelings. Research limitations: Caution should be exercised in generalizing the findings to national cultural contexts beyond the United Kingdom. Practical and social implications: Contrary to popular depictions of Millennials as self-centered, narcissistic, materialistic and demanding, women academics who are members of this generational group appear significantly more insecure than the preceding generations. Value: The study provides insightful understandings into women academics’ identity at work as a function of generational identity, and provides a fruitful avenue for further research within and beyond this gender group and profession.

Keywords: academics, generational diversity, imposter feelings, United Kingdom, women, work identity

Procedia PDF Downloads 146
29246 Developing a Model for the Relation between Heritage and Place Identity

Authors: A. Arjomand Kermani, N. Charbgoo, M. Alalhesabi

Abstract:

In the situation of great acceleration of changes and the need for new developments in the cities on one hand and conservation and regeneration approaches on the other hand, place identity and its relation with heritage context have taken on new importance. This relation is generally mutual and complex one. The significant point in this relation is that the process of identifying something as heritage rather than just historical  phenomena, brings that which may be inherited into the realm of identity. In planning and urban design as well as environmental psychology and phenomenology domain, place identity and its attributes and components were studied and discussed. However, the relation between physical environment (especially heritage) and identity has been neglected in the planning literature. This article aims to review the knowledge on this field and develop a model on the influence and relation of these two major concepts (heritage and identity). To build this conceptual model, we draw on available literature in environmental psychology as well as planning on place identity and heritage environment using a descriptive-analytical methodology to understand how they can inform the planning strategies and governance policies. A cross-disciplinary analysis is essential to understand the nature of place identity and heritage context and develop a more holistic model of their relationship in order to be employed in planning process and decision making. Moreover, this broader and more holistic perspective would enable both social scientists and planners to learn from one another’s expertise for a fuller understanding of community dynamics. The result indicates that a combination of these perspectives can provide a richer understanding—not only of how planning impacts our experience of place, but also how place identity can impact community planning and development.

Keywords: heritage, inter-disciplinary study, place identity, planning

Procedia PDF Downloads 424
29245 Reversible Information Hitting in Encrypted JPEG Bitstream by LSB Based on Inherent Algorithm

Authors: Vaibhav Barve

Abstract:

Reversible information hiding has drawn a lot of interest as of late. Being reversible, we can restore unique computerized data totally. It is a plan where mystery data is put away in digital media like image, video, audio to maintain a strategic distance from unapproved access and security reason. By and large JPEG bit stream is utilized to store this key data, first JPEG bit stream is encrypted into all around sorted out structure and then this secret information or key data is implanted into this encrypted region by marginally changing the JPEG bit stream. Valuable pixels suitable for information implanting are computed and as indicated by this key subtle elements are implanted. In our proposed framework we are utilizing RC4 algorithm for encrypting JPEG bit stream. Encryption key is acknowledged by framework user which, likewise, will be used at the time of decryption. We are executing enhanced least significant bit supplanting steganography by utilizing genetic algorithm. At first, the quantity of bits that must be installed in a guaranteed coefficient is versatile. By utilizing proper parameters, we can get high capacity while ensuring high security. We are utilizing logistic map for shuffling of bits and utilization GA (Genetic Algorithm) to find right parameters for the logistic map. Information embedding key is utilized at the time of information embedding. By utilizing precise picture encryption and information embedding key, the beneficiary can, without much of a stretch, concentrate the incorporated secure data and totally recoup the first picture and also the original secret information. At the point when the embedding key is truant, the first picture can be recouped pretty nearly with sufficient quality without getting the embedding key of interest.

Keywords: data embedding, decryption, encryption, reversible data hiding, steganography

Procedia PDF Downloads 288
29244 A Bridge to Success: Building Academic Identity in Foundation Programs

Authors: Krystyna Golkowska

Abstract:

Recent years have witnessed rapid growth of Transnational Education (TNE), especially in Asia and the Middle East. Exporting North American curricula into different socio-cultural contexts brings with it numerous advantages as well as challenges that have yet to be fully explored. This article focuses on Foundation programs, bridge programs between local high schools and tertiary level education on North-American branch campuses in the Persian Gulf. Based on a case study of Foundation students in Qatar, it explores ways of preparing TNE students for academic success by helping them to develop not only their skills and subject knowledge but also their academic identity.

Keywords: academic identity, foundation program, gulf, transnational education

Procedia PDF Downloads 315
29243 A New Block Cipher for Resource-Constrained Internet of Things Devices

Authors: Muhammad Rana, Quazi Mamun, Rafiqul Islam

Abstract:

In the Internet of Things (IoT), many devices are connected and accumulate a sheer amount of data. These Internet-driven raw data need to be transferred securely to the end-users via dependable networks. Consequently, the challenges of IoT security in various IoT domains are paramount. Cryptography is being applied to secure the networks for authentication, confidentiality, data integrity and access control. However, due to the resource constraint properties of IoT devices, the conventional cipher may not be suitable in all IoT networks. This paper designs a robust and effective lightweight cipher to secure the IoT environment and meet the resource-constrained nature of IoT devices. We also propose a symmetric and block-cipher based lightweight cryptographic algorithm. The proposed algorithm increases the complexity of the block cipher, maintaining the lowest computational requirements possible. The proposed algorithm efficiently constructs the key register updating technique, reduces the number of encryption rounds, and adds a new layer between the encryption and decryption processes.

Keywords: internet of things, cryptography block cipher, S-box, key management, security, network

Procedia PDF Downloads 113
29242 Profiling on the Holistic Identity of Malaysian Gifted Learners

Authors: Rorlinda Yusof, Siti Aishah Hassan, Afifah Mohamad Radzi, Mohd Hakimie Zainal Abidin, Amran Rasli, Inderbir Sandhu

Abstract:

The purpose of this study is to examine the self-identities of gifted and talented students and the relationship between self-identity and academic accomplishment. A random sample of 300 students enrolled in a secondary education programme at the Pusat GENIUS@pintar Negara was chosen as respondents of a 151-item holistic-identity component development tool. The validity of the instrument was assessed using Principal Components Analysis and Factor Analysis via an inter-Item Correlation Matrix (Loading values 0.44 to 0.86), which resulted in the formation of eight dimensions. The Cronbach's Alpha was calculated to determine the instrument's reliability (the overall result was 0.98). The results showed that students' holistic-identity profiles were relatively high (mean=4.09, standard deviation=0.449). In addition, spiritual identity received the greatest mean score (4.34) out of the eight components of identity investigated, while leadership identity received the lowest mean score (3.88). A conceptual framework for Islamic school leadership is recommended to implement spiritual values without differentiation to harmonize spiritual and intellectual intelligence among all the students. Some benchmarking studies with other centres for gifted and talented students are recommended for further research.

Keywords: holistic self-identity, academic achievement, self-development programme, counselling services, gifted and talented students

Procedia PDF Downloads 112
29241 Personal Identity and Group Identity under Threat following Exclusion: A Study in Singapore and in the Netherlands

Authors: Z. N. Huwaë, E.M. W. Tong, Y. H. M. See

Abstract:

In the present study, the researchers examined whether people from collectivistic cultures perceive a more group identity threat following social exclusion, whereas a more personal identity threat would be the case for those from individualistic cultures. In doing so, they investigated whether threatened identities depend on whether people are excluded by ingroup members (same ethnic background) or outgroup members (another ethnic background), as exclusion studies have shown mixed results when it comes to being excluded by ingroup versus outgroup members. For this purpose, students in Singapore and in the Netherlands participated in an online ball-tossing game (Cyberball) where they were excluded or included by other players with either the same or other ethnicity. Tentative results showed that both Singaporean and Dutch participants reported a more threat to their group identity than to their personal identity following exclusion and this did not depend on who excluded them. These tentative findings suggest that threatened identities following exclusion may not depend on cultural factors or on the source of exclusion.

Keywords: cultures, exclusion, experiment, group membership, identities

Procedia PDF Downloads 116
29240 Processes of Identities Formation and Transformation among Professional Skilled Mexican Migrants in the United States

Authors: M. Laura Vazquez Maggio, Lilia Dominguez Villalobos, Jan Luka Frey

Abstract:

This paper contributes to the understanding of the dynamic and the relational nature of identities formation among skilled middle-class migrants. Following the idea that identities are never singular, multifaceted and have a necessarily processual character, the authors specifically analyze three dimensions of the identity of qualified Mexican migrants in the US and the interplay between them. Drawing on semi-structured interviews with skilled Mexican middle-class migrants in the US, the paper explores how skilled Mexican migrants preserve their ethno-national identity (their ‘Mexicanness’) in reaction to a hostile socio-political reception context in the US. It further shows how these migrants recreate their class identity and show tendencies to distance themselves from what they perceive as lower-class Mexican migrants and the dominant popular Mexican and Latin-American cultural expressions. In a final step, it examines how the lived experience of migration itself impacts the migrants’ identities, their concept of self and feelings/modes of being and belonging.

Keywords: ethno-national identity, middle class identity, middle-class migration, migrants’ identity, skilled migration

Procedia PDF Downloads 143
29239 Regional Identity Construction of Acehnese English Teachers in Professional Practice

Authors: Ugahara Bin Mahyuddin Yunus

Abstract:

In English Language Teaching, it cannot be denied that the backgrounds of English teachers do affect the way they teach English to their students, which in turn will affect their students’ English learning itself. Thus, it is very important to understand who the English teachers are so that how they teach English to their students can be understood. One of their backgrounds that is essential to be highlighted is their culture. Certainly, they wittingly or not will bring the perspectives and values of their culture into their daily teaching practices. In other words, their cultural identities do shape how they teach their students. Cultural identities themselves actually consist of some elements, one of which is regional identity. Indeed, the culture of the region in which English teachers identify with has impact on their beliefs and actions during teaching. For this reason, this study aims to understand how the regional identity of English teachers influence the way they teach English to their students. This study is a qualitative study conducted in a multilingual and multicultural setting, namely Aceh, Indonesia. Here, four Acehnese English teachers were involved as the research participants. In addition, this study adopted poststructuralist perspective to identity as the theoretical framework. Three research instruments were used in this study, namely semi-structured interviews, classroom observation, and teacher journal. The data gained from these instruments were then analyzed by using thematic analysis. Obviously, the research about the regional identity of English teachers in English Language Teaching has been studied worldwide. However, little is still known about it in Indonesian context, let alone Indonesia itself is a super diverse country with 34 regions. As a result, this study presents a good opportunity to advance the knowledge of how the regional identity construction of English teachers in this setting is. The findings of the study revealed that their regional identity construction in teaching was highly influenced by their indigenous language and religious faith. Even, how they teach English in classroom, in fact, is related to these two things. The conclusion that can be drawn from this study is for these English teachers, in fact, their regional identity itself constitutes their use of local language and religious identity, which are considered by them as their core identity.

Keywords: English language teaching, English teachers, identity construction, regional identity

Procedia PDF Downloads 244
29238 Encryption Image via Mutual Singular Value Decomposition

Authors: Adil Al-Rammahi

Abstract:

Image or document encryption is needed through e- government data base. Really in this paper we introduce two matrices images, one is the public, and the second is the secret (original). The analyses of each matrix is achieved using the transformation of singular values decomposition. So each matrix is transformed or analyzed to three matrices say row orthogonal basis, column orthogonal basis, and spectral diagonal basis. Product of the two row basis is calculated. Similarly the product of the two column basis is achieved. Finally we transform or save the files of public, row product and column product. In decryption stage, the original image is deduced by mutual method of the three public files.

Keywords: image cryptography, singular values decomposition

Procedia PDF Downloads 436
29237 Symbolic Status of Architectural Identity: Example of Famagusta Walled City

Authors: Rafooneh Mokhtarshahi Sani

Abstract:

This study explores how the residents of a conserved urban area have used goods and ideas as resources to maintain an enviable architectural identity. Whereas conserved urban quarters are seen as role model for maintaining architectural identity, the article describes how their residents try to give a contemporary modern image to their homes. It is argued that despite the efforts of authorities and decision makers to keep and preserve the traditional architectural identity in conserved urban areas, people have already moved on and have adjusted their homes with their preferred architectural taste. Being through such conflict of interests, have put the future of architectural identity in such places at risk. The thesis is that, on the one hand, such struggle over a desirable symbolic status in identity formation is taking place, and, on the other, it is continuously widening the gap between the real and ideal identity in the built environment. The study then analytically connects the concept of symbolic status to current identity debates. As an empirical research, this study uses systematic social and physical observation methods to describe and categorize the characteristics of settlements in Walled City of Famagusta, which symbolically represent the modern houses. The Walled City is a cultural heritage site, which most of its urban context has been conserved. Traditional houses in this area demonstrate the identity of North Cyprus architecture. The conserved residential buildings, however, either has been abandoned or went through changes by their users to present the ideal image of contemporary life. In the concluding section, the article discusses the differences between the symbolic status of people and authorities in defining a culturally valuable contemporary home. And raises the question of whether we can talk at all about architectural identity in terms of conserving the traditional style, and how we may do so on the basis of dynamic nature of identity and the necessity of its acceptance by the users.

Keywords: symbolic status, architectural identity, conservation, facades, Famagusta walled city

Procedia PDF Downloads 355
29236 Model Estimation and Error Level for Okike’s Merged Irregular Transposition Cipher

Authors: Okike Benjamin, Garba E. J. D.

Abstract:

The researcher has developed a new encryption technique known as Merged Irregular Transposition Cipher. In this cipher method of encryption, a message to be encrypted is split into parts and each part encrypted separately. Before the encrypted message is transmitted to the recipient(s), the positions of the split in the encrypted messages could be swapped to ensure more security. This work seeks to develop a model by considering the split number, S and the average number of characters per split, L as the message under consideration is split from 2 through 10. Again, after developing the model, the error level in the model would be determined.

Keywords: merged irregular transposition, error level, model estimation, message splitting

Procedia PDF Downloads 314
29235 Exploiting Identity Grievances: Al-Shabaab Propaganda Targeting Individuals Abroad

Authors: Mustafa Mabruk

Abstract:

Groups such as Al-Shabaab have managed to radicalize many individuals abroad, including the first American citizen to ever be radicalized. Yet the pathways of radicalization for these foreign individuals are understudied. Moreover, current measures to prevent foreign radicalization are ineffective, with privacy, screening and profiling implications that render current counter-radicalization efforts counterproductive. Such measures exhibit strictness, political bias, and harshness. As confirmed by recent studies, such counter-radicalization issues exacerbate existing grievances and channel fresh recruits to Al-Shabaab. Addressing these challenges is paramount, requiring alternative strategies to effectively reduce radicalization without triggering further harm. The development of counter-narratives emerges as a potential measure with minimal risk of exacerbating grievances, yet the development of such counter-narratives necessitates a thorough understanding of the radicalization pathways of foreign individuals that are understudied. This study investigates the success of Al-Shabaab in recruiting individuals abroad by analyzing their propaganda in conjunction with analyzing identity-focused theories of radicalization, including Framing Theory and Social Identity Theory. Qualitative content analysis is used to analyze various propaganda material, including tweets, speeches, and webpages. The analysis reveals that issues of identity are of major significance in the radicalization patterns identified and that grievances of Muslims worldwide are used to exploit identity-related grievances. Based on these findings, the paper argues that such evidence enhances our understanding of potential deradicalization pathways and present counter-narratives based on Islamic scripture.

Keywords: counter-narratives, foreign radicalization, identity grievances, propaganda analysis

Procedia PDF Downloads 41
29234 Secure Message Transmission Using Meaningful Shares

Authors: Ajish Sreedharan

Abstract:

Visual cryptography encodes a secret image into shares of random binary patterns. If the shares are exerted onto transparencies, the secret image can be visually decoded by superimposing a qualified subset of transparencies, but no secret information can be obtained from the superposition of a forbidden subset. The binary patterns of the shares, however, have no visual meaning and hinder the objectives of visual cryptography. In the Secret Message Transmission through Meaningful Shares a secret message to be transmitted is converted to grey scale image. Then (2,2) visual cryptographic shares are generated from this converted gray scale image. The shares are encrypted using A Chaos-Based Image Encryption Algorithm Using Wavelet Transform. Two separate color images which are of the same size of the shares, taken as cover image of the respective shares to hide the shares into them. The encrypted shares which are covered by meaningful images so that a potential eavesdropper wont know there is a message to be read. The meaningful shares are transmitted through two different transmission medium. During decoding shares are fetched from received meaningful images and decrypted using A Chaos-Based Image Encryption Algorithm Using Wavelet Transform. The shares are combined to regenerate the grey scale image from where the secret message is obtained.

Keywords: visual cryptography, wavelet transform, meaningful shares, grey scale image

Procedia PDF Downloads 455
29233 National Identity in Connecting the Community through Mural Art for Petronas Dagangan Berhad

Authors: Nadiah Mohamad, Wan Samiati Andriana Wan Mohd Daud, M. Suhaimi Tohid, Mohd Fazli Othman, Mohamad Rizal Salleh

Abstract:

This is a collaborative project of the mural art between The Department of Fine Art from Universiti Teknologi MARA (UiTM) and Petronas Dagangan Berhad (PDB), the most leading retailer and marketer of downstream oil and gas products in Malaysia. Five different states in the Peninsular of Malaysia that has been identified in showcasing the National Identity of Malaysia at each Petronas gas station, this also includes the Air Keroh in Melaka, Pasir Pekan in Kelantan, Pontian in Johor, Simpang Pulai in Perak, and also Wakaf Bharu in Terengganu. This project is to analyze the element of national identity that has been demonstrated at the Petronas's Mural. The ultimate aim of the mural is to let the community and local people to be aware about what Malaysians are consists and proud of and how everyone is able to connect with the idea through visual art. The method that is being explained in this research is by using visual data through research and also self-experience in collecting the visual data in identifying what images is considered as the national identity and idea development and visual analysis is being transferred based upon the visual data collection. In this stage, elements and principles of design will be the key in highlighting what is necessary for a work of art. In conclusion, visual image of the National Identity of Malaysia is able to connect to the audience from local and also to the people from outside the country to learn and understand the beauty and diversity of Malaysia as a unique country with art through the wall of five Petronas gas station.

Keywords: community, fine art, mural art, national identity

Procedia PDF Downloads 207
29232 Pattern in Splitting Sequence in Okike’s Merged Irregular Transposition Cipher for Encrypting Cyberspace Messages

Authors: Okike Benjamin, E. J. D. Garba

Abstract:

The protection of sensitive information against unauthorized access or fraudulent changes has been of prime concern throughout the centuries. Modern communication techniques, using computers connected through networks, make all data even more vulnerable to these threats. The researchers in this work propose a new encryption technique to be known as Merged Irregular Transposition Cipher. In this proposed encryption technique, a message to be encrypted will first of all be split into multiple parts depending on the length of the message. After the split, different keywords are chosen to encrypt different parts of the message. After encrypting all parts of the message, the positions of the encrypted message could be swapped to other position thereby making it very difficult to decrypt by any unauthorized user.

Keywords: information security, message splitting, pattern, sequence

Procedia PDF Downloads 288
29231 From Tionghoa to Tjina: Historical Tracing on the Identity Politics in Demonization of Ethnic Chinese in Indonesia

Authors: Michael J. Kristiono

Abstract:

This paper attempts to investigate the reasons behind the negative sentiments directed towards Chinese Indonesians from International Relations (IR) perspective. By tracing back the treatment of the New Order government towards ethnic Chinese, it was found that such demonization initially happened due to two politically motivated reasons. Firstly, as part of de-Soekarnoization done by the New Order, the Chinese were outcast because Chinese identity does not conform to the 'Indonesian identity', which was in essence, the Javanese identity. Secondly, the condition reflected the change in Indonesian foreign policy which drifted apart from People’s Republic of China (PRC) as the latter was suspected to be involved in September 30 Movement. Then, this paper argues that due to those reasons, coupled by blatant maltreatment from the New Order Government, Chinese Indonesians were constructed as the Others, that is, as non-Indonesians. Such construct has been deeply embedded such that reconciliation attempts done by the Reformation Era government were not sufficient enough to stop ethnic discrimination towards Chinese Indonesians from happening even until the present.

Keywords: Chinese Indonesians, ethnic discrimination, identity, New Order

Procedia PDF Downloads 332
29230 Examining Kokugaku as a Pattern of Defining Identity in Global Comparison

Authors: Mária Ildikó Farkas

Abstract:

Kokugaku of the Edo period can be seen as a key factor of defining cultural (and national) identity in the 18th and early 19th century based on Japanese cultural heritage. Kokugaku focused on Japanese classics, on exploring, studying and reviving (or even inventing) ancient Japanese language, literature, myths, history and also political ideology. ‘Japanese culture’ as such was distinguished from Chinese (and all other) cultures, ‘Japanese identity’ was thus defined. Meiji scholars used kokugaku conceptions of Japan to construct a modern national identity based on the premodern and culturalist conceptions of community. The Japanese cultural movement of the 18-19th centuries (kokugaku) of defining cultural and national identity before modernization can be compared not to the development of Western Europe (where national identity strongly attached to modern nation states) or other parts of Asia (where these emerged after the Western colonization), but rather with the ‘national awakening’ movements of the peoples of East Central Europe, a comparison which have not been dealt with in the secondary literature yet. The role of a common language, culture, history and myths in the process of defining cultural identity – following mainly Miroslav Hroch’s comparative and interdisciplinary theory of national development – can be examined compared to the movements of defining identity of the peoples of East Central Europe (18th-19th c). In the shadow of a cultural and/or political ‘monolith’ (China for Japan and Germany for Central Europe), before modernity, ethnic groups or communities started to evolve their own identities with cultural movements focusing on their own language and culture, thus creating their cultural identity, and in the end, a new sense of community, the nation. Comparing actual texts (‘narratives’) of the kokugaku scholars and Central European writers of the nation building period (18th and early 19th centuries) can reveal the similarities of the discourses of deliberate searches for identity. Similar motives of argument can be identified in these narratives: ‘language’ as the primary bearer of collective identity, the role of language in culture, ‘culture’ as the main common attribute of the community; and similar aspirations to explore, search and develop native language, ‘genuine’ culture, ‘original’ traditions. This comparative research offering ‘development patterns’ for interpretation can help us understand processes that may be ambiguously considered ‘backward’ or even ‘deleterious’ (e.g. cultural nationalism) or just ‘unique’. ‘Cultural identity’ played a very important role in the formation of national identity during modernization especially in the case of non-Western communities, who had to face the danger of losing their identities in the course of ‘Westernization’ accompanying modernization.

Keywords: cultural identity, Japanese modernization, kokugaku, national awakening

Procedia PDF Downloads 271
29229 Bridging the Gap and Widening the Divide

Authors: Lerato Dixon, Thorsten Chmura

Abstract:

This paper explores whether ethnic identity in Zimbabwe leads to discriminatory behaviour and the degree to which a norm-based intervention can shift this discriminatory behaviour. Social Identity Theory suggests that group identity can lead to favouritism towards the in-group and discriminatory behaviour towards the out-group. Agents yield higher utility from maintaining positive self-esteem by confirming with group behaviour. This paper focuses on the two majority ethnic groups in Zimbabwe – the Ndebele and Shona. Racial identities are synonymous with the language spoken. Zimbabwe’s history highlights how identity formation took place. As following independence, political parties became recognised as either Ndebele or Shona-speaking. It is against this backdrop that this study investigates the degree to which norm-based nudge can alter behaviour. This paper uses experimental methods to analyse discriminatory behaviour between two naturally occurring ethnic groups in Zimbabwe. In addition, we investigate if social norm-based interventions can shift discriminatory behaviour to understand if the divide between these two identity groups can be further divided or healed. Participants are randomly assigned into three groups to receive information regarding a social norm. We compare the effect of a proscriptive social norm-based intervention, stating what shouldn't be done and prescriptive social norms as interventions, stating what should be done. Specifically, participants are either shown the socially appropriate (Heal) norm, the socially inappropriateness (Divide) norm regarding interethnic marriages or no norm-based intervention. Following the random assignment into intervention groups, participants take part in the Trust Game. We conjecture that discrimination will shift in accordance with the prevailing social norm. Instead, we find evidence of interethnic discriminatory behaviour. We also find that trust increases when interacting with Ndebele, Shona and Zimbabwean participants following the Heal intervention. However, if the participant is Shona, the Heal intervention decreases trust toward in-groups and Zimbabwean co-players. On the other hand, if the participant is Shona, the Divide treatment significantly increases trust toward Ndebele participants. In summary, we find evidence that norm-based interventions significantly change behaviour. However, the prescriptive norm-based intervention (Heal) decreases trust toward the in-group, out-group and national identity group if the participant is Shona – therefore having an adverse effect. In contrast, the proscriptive Divide treatment increases trust if the participant is Shona towards Ndebele co-players. We conclude that norm-based interventions have a ‘rebound’ effect by altering behaviour in the opposite direction.

Keywords: discrimination, social identity, social norm-based intervention, zimbabwe

Procedia PDF Downloads 250
29228 Examining the Influences of Exchange Programmes on Youths' National Identity: A Hong Kong Case Study

Authors: Annie Y. N. Cheng

Abstract:

Since the handover of Hong Kong to China, 'National Identity' has become a vital focus promoted by the HKSAR government. According to the poll by the University of Hong Kong’s Public Opinion Programme (2010 – 2015), young people aged between 18 and 29 have the least and decreasing recognition, an average 5.5%, of their Chinese identity. Past research has shown that student participation in exchange programmes and study tours provides the possibility of new formulations of national identity. Since the Policy Address 2008, the HKSAR government has been actively expanding and exploring the feasibility of Mainland exchange programmes to enhance our youths’ understanding of Chineseness and to strengthen their national identity. Schools have been sponsored or subsidized with the costs of Mainland exchange activities through various grants and channels. Considering the significantly increasing number of Hong Kong youths who have participated in these Mainland exchange programmes and study tours, however, the effectiveness of these activities is understudied. At present, there is the lack of systematic research on the impacts of these activities and the ways in which they influence our students’ perceptions of national identity. Using case study approach, this study aims to examine students’ perceptions of their national identity; and evaluate whether the Mainland exchange programmes or study tours have influences on students’ perceptions of national identity. Results show that the influences on national identity varied which were dependent on the objectives and destinations of the programmes. The findings of this study can provide significant feedback for schools to organize meaningful Mainland exchange activities or study tours and inform policy makers how to formulate effective strategies for promoting such exchange activities.

Keywords: Hong Kong youth, mainland exchange programme, national identity, study tours

Procedia PDF Downloads 395
29227 Wasif Jawharriyeh and the Identity-Forming Spaces of Late Ottoman Jerusalem

Authors: Feyza Daloglu

Abstract:

This paper scrutinizes the Ottoman years of Wasif Jawharriyeh’s memoir, The Storyteller of Jerusalem, within the framework of citadinite, employed by the Open Jerusalem Project. Open Jerusalem Project uses the term citadinite to describe “the dynamic identity relationship city dwellers have with each other and their urban environment.” While Jerusalem and Jerusalemite identity have usually been analyzed within religious, national, or colonial frameworks, citadinite offers a fresh perspective by turning its lens to the urban identity of its citizens in the 19th and 20th centuries to overcome the shortcomings of usual frameworks. Wasif Jawharriyeh is a proud Jerusalemite and a Greek Orthodox Arab, who spent his childhood and teenage years under the Ottoman Empire. His memoir reveals a great deal of urbanity and a strong sense of Jerusalemite identity which appears to be favored over other forms of identities - Arab, Christian - in the late empire years. Through citadinite, this paper aims to discuss aspects of Jerusalemite identity and key points of urban life in the late Ottoman holy city with the guidance of a very lively and social Ottoman citizen and at that time a young musician, Wasif Jawharriyeh.

Keywords: arab memoir, cityscape, jerusalem identity, ottoman city, urban life

Procedia PDF Downloads 115
29226 A Design of Elliptic Curve Cryptography Processor based on SM2 over GF(p)

Authors: Shiji Hu, Lei Li, Wanting Zhou, DaoHong Yang

Abstract:

The data encryption, is the foundation of today’s communication. On this basis, how to improve the speed of data encryption and decryption is always a problem that scholars work for. In this paper, we proposed an elliptic curve crypto processor architecture based on SM2 prime field. In terms of hardware implementation, we optimized the algorithms in different stages of the structure. In finite field modulo operation, we proposed an optimized improvement of Karatsuba-Ofman multiplication algorithm, and shorten the critical path through pipeline structure in the algorithm implementation. Based on SM2 recommended prime field, a fast modular reduction algorithm is used to reduce 512-bit wide data obtained from the multiplication unit. The radix-4 extended Euclidean algorithm was used to realize the conversion between affine coordinate system and Jacobi projective coordinate system. In the parallel scheduling of point operations on elliptic curves, we proposed a three-level parallel structure of point addition and point double based on the Jacobian projective coordinate system. Combined with the scalar multiplication algorithm, we added mutual pre-operation to the point addition and double point operation to improve the efficiency of the scalar point multiplication. The proposed ECC hardware architecture was verified and implemented on Xilinx Virtex-7 and ZYNQ-7 platforms, and each 256-bit scalar multiplication operation took 0.275ms. The performance for handling scalar multiplication is 32 times that of CPU(dual-core ARM Cortex-A9).

Keywords: Elliptic curve cryptosystems, SM2, modular multiplication, point multiplication.

Procedia PDF Downloads 98
29225 Developed Text-Independent Speaker Verification System

Authors: Mohammed Arif, Abdessalam Kifouche

Abstract:

Speech is a very convenient way of communication between people and machines. It conveys information about the identity of the talker. Since speaker recognition technology is increasingly securing our everyday lives, the objective of this paper is to develop two automatic text-independent speaker verification systems (TI SV) using low-level spectral features and machine learning methods. (i) The first system is based on a support vector machine (SVM), which was widely used in voice signal processing with the aim of speaker recognition involving verifying the identity of the speaker based on its voice characteristics, and (ii) the second is based on Gaussian Mixture Model (GMM) and Universal Background Model (UBM) to combine different functions from different resources to implement the SVM based.

Keywords: speaker verification, text-independent, support vector machine, Gaussian mixture model, cepstral analysis

Procedia PDF Downloads 58
29224 Investigating Cultural Identities in Contemporary Greek Art: the Case of Greek Artists in Paris in 1980s

Authors: Sapfo Mortaki

Abstract:

Over the years, Greeks were leaving their homeland looking for better luck, including artists - painters and sculptors. Until mid-1940's, few were the ones who lived, worked, studied and were distinguished abroad. After the end of the Second World War, the group exit towards the cultural centers of the West commences. Since the mid-1970s, and especially in the early 1980s, Modern Greek Diaspora has undergone a new period. The creation of the European Community affects both the character of the immigration of artists as well as the creation of their identity within cultural pluralism. Since 1980 the situation in Greece changed significantly, and the contacts of artists with their homeland became greatly enhanced. Based on the above, this paper examines the cultural identity of the Greek artists in Paris during the 1980s, in comparison to the creation of the identity of the artists of the previous migratory movements, since this decade constitutes a critical point. Their cultural presence in Paris, as reflected in French and Greek daily press and journals of the period, is also investigated. At the same time, their connection with Greece and their contribution to the development and evolution of Contemporary Greek Art is discussed.

Keywords: artistic migration in Paris, cultural identity, cultural interaction, greek artists, greek contemporary art

Procedia PDF Downloads 333
29223 Identity Management in Virtual Worlds Based on Biometrics Watermarking

Authors: S. Bader, N. Essoukri Ben Amara

Abstract:

With the technological development and rise of virtual worlds, these spaces are becoming more and more attractive for cybercriminals, hidden behind avatars and fictitious identities. Since access to these spaces is not restricted or controlled, some impostors take advantage of gaining unauthorized access and practicing cyber criminality. This paper proposes an identity management approach for securing access to virtual worlds. The major purpose of the suggested solution is to install a strong security mechanism to protect virtual identities represented by avatars. Thus, only legitimate users, through their corresponding avatars, are allowed to access the platform resources. Access is controlled by integrating an authentication process based on biometrics. In the request process for registration, a user fingerprint is enrolled and then encrypted into a watermark utilizing a cancelable and non-invertible algorithm for its protection. After a user personalizes their representative character, the biometric mark is embedded into the avatar through a watermarking procedure. The authenticity of the avatar identity is verified when it requests authorization for access. We have evaluated the proposed approach on a dataset of avatars from various virtual worlds, and we have registered promising performance results in terms of authentication accuracy, acceptation and rejection rates.

Keywords: identity management, security, biometrics authentication and authorization, avatar, virtual world

Procedia PDF Downloads 265