Search results for: real-time voice encryption
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 684

Search results for: real-time voice encryption

534 A New Block Cipher for Resource-Constrained Internet of Things Devices

Authors: Muhammad Rana, Quazi Mamun, Rafiqul Islam

Abstract:

In the Internet of Things (IoT), many devices are connected and accumulate a sheer amount of data. These Internet-driven raw data need to be transferred securely to the end-users via dependable networks. Consequently, the challenges of IoT security in various IoT domains are paramount. Cryptography is being applied to secure the networks for authentication, confidentiality, data integrity and access control. However, due to the resource constraint properties of IoT devices, the conventional cipher may not be suitable in all IoT networks. This paper designs a robust and effective lightweight cipher to secure the IoT environment and meet the resource-constrained nature of IoT devices. We also propose a symmetric and block-cipher based lightweight cryptographic algorithm. The proposed algorithm increases the complexity of the block cipher, maintaining the lowest computational requirements possible. The proposed algorithm efficiently constructs the key register updating technique, reduces the number of encryption rounds, and adds a new layer between the encryption and decryption processes.

Keywords: internet of things, cryptography block cipher, S-box, key management, security, network

Procedia PDF Downloads 94
533 Bitplanes Gray-Level Image Encryption Approach Using Arnold Transform

Authors: Ali Abdrhman M. Ukasha

Abstract:

Data security needed in data transmission, storage, and communication to ensure the security. The single step parallel contour extraction (SSPCE) method is used to create the edge map as a key image from the different Gray level/Binary image. Performing the X-OR operation between the key image and each bit plane of the original image for image pixel values change purpose. The Arnold transform used to changes the locations of image pixels as image scrambling process. Experiments have demonstrated that proposed algorithm can fully encrypt 2D Gary level image and completely reconstructed without any distortion. Also shown that the analyzed algorithm have extremely large security against some attacks like salt & pepper and JPEG compression. Its proof that the Gray level image can be protected with a higher security level. The presented method has easy hardware implementation and suitable for multimedia protection in real time applications such as wireless networks and mobile phone services.

Keywords: SSPCE method, image compression-salt- peppers attacks, bitplanes decomposition, Arnold transform, lossless image encryption

Procedia PDF Downloads 421
532 Focalization Used as a Narrative Strategy Mirroring Fadia Faqir’s Ideology in Pillars of Salt 1996

Authors: Malika Hammouche

Abstract:

The novel Pillars of Salt, written by Fadia Faqir in 1996, is a good example where storytelling is utilized as a traditional material to underline the author’s womanist ideology. A study of narrative could be fruitfully combined with that of ideology in this case. This combination could be demonstrated through the narrative technique used by Fadia Faqir in Pillars of Salt (1996), reflecting her anti-colonial ideology. The first step of this work will highlight the storyteller’s narrative in the novel representing, on the one hand, the imperial voice, and on the other exoticism and orientalism. The second step will demonstrate how Faqir’s narrative technique uses focalization as a narratological tool to negotiate her space. Faqir gives a voice to the female protagonist of the novel within the androcentric bias of Arab narrative theory to point to and amend the orientalist discourse typical to colonial literature. The orientalist discourse is represented through the voice of the storyteller in the novel. The juxtaposition of the storyteller’s and the female protagonist narratives is borrowed from the Arab literary background. It is a postcolonial counter-discursive strategy used by the author as a traditional material to underline her Arabo Islamic Womanist ideology in this novel.

Keywords: Arabo Islamic womanism, focalization, ideology, narrative technique, orientalist

Procedia PDF Downloads 218
531 Bitplanes Image Encryption/Decryption Using Edge Map (SSPCE Method) and Arnold Transform

Authors: Ali A. Ukasha

Abstract:

Data security needed in data transmission, storage, and communication to ensure the security. The single step parallel contour extraction (SSPCE) method is used to create the edge map as a key image from the different Gray level/Binary image. Performing the X-OR operation between the key image and each bit plane of the original image for image pixel values change purpose. The Arnold transform used to changes the locations of image pixels as image scrambling process. Experiments have demonstrated that proposed algorithm can fully encrypt 2D Gary level image and completely reconstructed without any distortion. Also shown that the analyzed algorithm have extremely large security against some attacks like salt & pepper and JPEG compression. Its proof that the Gray level image can be protected with a higher security level. The presented method has easy hardware implementation and suitable for multimedia protection in real time applications such as wireless networks and mobile phone services.

Keywords: SSPCE method, image compression, salt and peppers attacks, bitplanes decomposition, Arnold transform, lossless image encryption

Procedia PDF Downloads 482
530 Listening to Voices: A Meaning-Focused Framework for Supporting People with Auditory Verbal Hallucinations

Authors: Amar Ghelani

Abstract:

People with auditory verbal hallucinations (AVH) who seek support from mental health services commonly report feeling unheard and invalidated in their interactions with social workers and psychiatric professionals. Current mental health training and clinical approaches have proven to be inadequate in addressing the complex nature of voice hearing. Childhood trauma is a key factor in the development of AVH and can render people more vulnerable to hearing both supportive and/or disturbing voices. Lived experiences of racism, poverty, and immigration are also associated with development of what is broadly classified as psychosis. Despite evidence affirming the influence of environmental factors on voice hearing, the Western biomedical system typically conceptualizes this experience as a symptom of genetically-based mental illnesses which requires diagnosis and treatment. Overemphasis on psychiatric medications, referrals, and directive approaches to people’s problems has shifted clinical interventions away from assessing and addressing problems directly related to AVH. The Maastricht approach offers voice hearers and mental health workers an alternative and respectful starting point for understanding and coping with voices. The approach was developed by voice hearers in partnership with mental health professionals and entails an innovative method to assess and create meaning from voice hearing and related life stressors. The objectives of the approach are to help people who hear voices: (1) understand the problems and/or people the voices may represent in their history, and (2) cope with distress and find solutions to related problems. The Maastricht approach has also been found to help voice hearers integrate emotional conflicts, reduce avoidance or fear associated with AVH, improve therapeutic relationships, and increase a sense of control over internal experiences. The proposed oral presentation will be guided by a recovery-oriented theoretical framework which suggests healing from psychological wounds occurs through social connections and community support systems. The presentation will start with a brainstorming exercise to identify participants pre-existing knowledge of the subject matter. This will lead into a literature review on the relations between trauma, intersectionality, and AVH. An overview of the Maastricht approach and review of research related to its therapeutic risks and benefits will follow. Participants will learn trauma-informed coping skills and questions which can help voice hearers make meaning from their experiences. The presentation will conclude with a review of resources and learning opportunities where participants can expand their knowledge of the Hearing Voices Movement and Maastricht approach.

Keywords: Maastricht interview, recovery, therapeutic assessment, voice hearing

Procedia PDF Downloads 99
529 Application of Quality Function Deployment Approach to Industrial Engineering Department of Gaziantep University

Authors: Eren Özceylan, Cihan Çetinkaya

Abstract:

Quality function deployment (QFD) is a technique to assist transform the voice of the customer into engineering characteristics for a product/service. With the difference of existing studies, QFD is applied to an educational area that is a service sector which is not a manufacturing firm. The objective of the study is to design the undergraduate program according to students’ desire and expectations. To do so, third and fourth year students of industrial engineering department of Gaziantep University are considered as customers. Some suggestions about lecturers, courses, exams and facility for how to satisfy students’ demands are presented and as a result, sharing the materials of courses is the most important requirement among others.

Keywords: higher education, quality function deployment, quality house, voice of customer

Procedia PDF Downloads 421
528 Vocal Advocacy: A Case Study at the First Black College Regarding Students Experiencing an Empowerment Workshop

Authors: Denise F. Brown, Melina McConatha

Abstract:

African Americans utilizing the art of vocal expressions, particularly for self-expression, has been a historical avenue of advocating for social justice and human rights. Vocal expressions can take many forms, such as singing, poetry, storytelling, and acting. Many well-known artists, politicians, leaders, and teachers used their voices to promote the causes and concerns of the African American community as well as the expression of their own experiences of being 'black' in America. The purpose of this project was to evaluate the perceptions of African American students in utilizing their voices for self-awareness, interview skills, and social change after attending a three-part workshop on vocal advocacy. This research utilized the framework of black feminism to understand empowerment in advocacy and self-expression. Students participated in learning about the power of their voices, and what purpose presence, and passion they discovered through the Immersive Voice workshop. There were three areas covered in the workshop. The first area was the power of the voice, the second area was the application of vocal passion, and the third area was applying the vocal power to express personal interest, interests of advocating for others, and confidence and speaking to others to further careers, i.e., using vocal power for job interviewing skills. The students were instructed to prepare for the workshops by completing a pre-workshop open-ended survey. There were a total of 15 students that participated. After the workshop ended, the students were instructed to complete a post-workshop survey. The surveys were assessed by evaluating both themes and codes from student's written feedback. From the pre-workshop survey, students were given a survey for them to provide feedback regarding the power of voice prior to participating in the workshops. From the student's responses, the theme (advocating for self and others) emerged as it related to student's feedback on what it means to advocate. There were three codes that led to the theme, having knowledge about advocating for self and others, gaining knowledge to advocate for self and others, and using that knowledge to advocate for self and others. After the students completed participation in the workshops, a post workshop- survey was given to the students. Students' feedback was assessed, and the same theme emerged, 'advocating for self and others.' The codes related to the theme, however, were different and included using vocal power (a term students learned during the workshop) to represent self, represent others, and obtain a job/career. In conclusion, the results of the survey showed that students still perceived advocating as speaking up for themselves and other people. After the workshop, students still continued to associate advocacy with helping themselves and helping others but were able to be more specific about how the sound of their voice could help in advocating, and how they could use their voice to represent themselves in getting a job or starting a career.

Keywords: advocacy, command, self-expression, voice

Procedia PDF Downloads 102
527 Foregrounding Events in Modern Sundanese: The Pragmatics of Particle-to-Active Voice Marking Shift

Authors: Rama Munajat

Abstract:

Discourse information levels may be viewed from either a background-foreground distinction or a multi-level perspective, and cross-linguistic studies on this area suggest that each information level is marked by a specific linguistic device. In this sense, Sundanese, spoken in Indonesia’s West Javanese Province, further differentiates the background and foreground information into ordinary and significant types. This paper will report an ongoing shift from particle-to-active voice marking in the way Sundanese signals foregrounding events. The shift relates to decades of contact with Bahasa Indonesia (Indonesia’s official language) and linguistic compatibility between the two surface marking strategies. Representative data analyzed include three groups of short stories in both Sundanese and Bahasa Indonesia (Indonesian) published in three periods: before 1945, 1965-2006, and 2016-2019. In the first group of Sundanese data, forward-moving events dominantly appear in particle KA (Kecap Anteuran, word-accompanying) constructions, where the KA represents different particles that co-occur with a special group of verbs. The second group, however, shows that the foregrounded events are more frequently described in active-voice forms with a subject-predicate (SP) order. Subsequently, the third offers stronger evidence for the use of the SP structure. As for the Indonesian data, the foregrounding events in the first group occur in verb-initial and passive-voice constructions, while in the second and third, the events more frequently appear in active-voice structures (subject-predicate sequence). The marking shift above suggests a structural influence from Indonesian, stemmed from generational differences among authors of the Sundanese short stories, particularly related to their education and language backgrounds. The first group of short stories – published before 1945 or before Indonesia's independence from Dutch – were written by native speakers of Sundanese who spoke Indonesian as a foreign language and went through the Dutch education system. The second group of authors, on the other hand, represents a generation of Sundanese native speakers who spoke Indonesian as a second language. Finally, the third group consists of authors who are bilingual speakers of both Sundanese and Indonesian. The data suggest that the last two groups of authors completed the Indonesian education system. With these, the use of subject-predicate sequences to denote foregrounding events began to appear more frequently in the second group and then became more dominant in those of the third. The coded data also signify that cohesion, coherence, and pragmatic purposes in Particle KA constructions are intact in their respective active-voice structure counterparts. For instance, the foregrounding events in Particle KA constructions occur in Sentence-initial KA and Pre-verbal KA forms, whereas those in the active-voice are described in Subject-Predicate (SP) and Zero-Subject active-voice patterns. Cross-language data further demonstrate that the Sentence-initial KA and the SP active-voice structures each contain an overt noun phrase (NP) co-referential with one of the entities introduced in a preceding context. Similarly, the pre-verbal KA and Zero-Subject active-voice patterns have a deleted noun phrase unambiguously referable to the only one entity previously mentioned. The presence and absence of an NP inform a pragmatic strategy to place prominence on topic/given and comment/new information, respectively.

Keywords: discourse analysis, foregrounding marking, pragmatics, language contact

Procedia PDF Downloads 122
526 The Use of Political Savviness in Dealing with Workplace Ostracism: A Social Information Processing Perspective

Authors: Amy Y. Wang, Eko L. Yi

Abstract:

Can vicarious experiences of workplace ostracism affect employees’ willingness to voice? Given the increasingly interdependent nature of the modern workplace in which employees rely on social interactions to fulfill organizational goals, workplace ostracism –the extent to which an individual perceives that he or she is ignored or excluded by others in the workplace– has garnered significant interest from scholars and practitioners alike. Extending beyond conventional studies that largely focus on the perspectives and outcomes of ostracized targets, we address the indirect effects of workplace ostracism on third-party employees embedded in the same social context. Using a social information processing approach, we propose that the ostracism of coworkers acts as political information that influences third-party employees in their decisions to engage in risky and discretionary behaviors such as employee voice. To make sense of and to navigate through experiences of workplace ostracism, we posit that both political understanding and political skill allow third party employees to minimize the risks and uncertainty of voicing. This conceptual model was tested by a study involving 154 supervisor-subordinate dyads of a publicly listed bio-technology firm located in Mainland China. Each supervisor and their direct subordinates composed of a work team; each team had a minimum of two subordinates and a maximum of four subordinates. Human resources used the master list to distribute the ID coded questionnaires to the matching names. All studied constructs were measured using existing scales proved effective in previous literature. Hypotheses were tested using Confirmatory Factor Analysis and Hierarchal Multiple Regression. All three hypotheses were supported which showed that employees were less likely to engage in voice behaviors when their coworkers reported having experienced ostracism in the workplace. Results also showed a significant three-way interaction between political understanding and political skill on the relationship between coworkers’ ostracism and employee voice, indicating that political savviness is a valuable resource in mitigating ostracism’s negative and indirect effects. Our results illustrated that an employee’s coworkers being ostracized indeed adversely impacted his or her own voice behavior. However, not all individuals reacted passively to the social context; rather, we found that politically savvy individuals – possessing both political understanding and political skill – and their voice behaviors were less impacted by ostracism in their work environment. At the same time, we found that having only political understanding or only political skill was significantly less effective in mitigating ostracism’s negative effects, suggesting a necessary duality of political knowledge and political skill in combatting ostracism. Organizational implications, recommendations, and future research ideas are also discussed.

Keywords: employee voice, organizational politics, social information processing, workplace ostracism

Procedia PDF Downloads 123
525 The Relationship between Organizational Silence and Voice with the Quality of Work Life among Employees of the Youth and Sports Departments of Tehran Province

Authors: Soodabeh Dehghan, Siavash Hamidzadeh, Naqshbandi Seyyed Salahedin, Ali Mohammad Safania

Abstract:

The present research with the aim of the relationship between organizational silence and organizational voice with quality of work-life among employees of the sport and youth departments of Tehran Province was done. The statistical population of this research includes all employees of the sport and youth departments of Tehran province, and considering the not very large number of society, the sample and society were considered to be the same, and the sample was considered as the whole number. To measure each of these variables, a questionnaire was used. The research questionnaire was presented in four sections. The results showed that, since the extension of the process of organizational silence is usually done by managers, their attitude and attitudes toward this phenomenon are prioritized and also because silence reduces learning due to lack of knowledge sharing, makes it less effective and makes changes more difficult, it is necessary to take steps to break the silence and to further urge the staff (employees) to express their beliefs (organizational voices) and to share them in the organization's fate individuals, whose beliefs are respected and so called taken into account in the organization, would be dependent on the organization and feel obliged to remain with the organization during the hardships. This affects employees' quality of work life and their satisfaction too much.

Keywords: organizational silence, organizational voice, quality of work life, the sports and youth departments of Tehran province

Procedia PDF Downloads 133
524 Security of Database Using Chaotic Systems

Authors: Eman W. Boghdady, A. R. Shehata, M. A. Azem

Abstract:

Database (DB) security demands permitting authorized users and prohibiting non-authorized users and intruders actions on the DB and the objects inside it. Organizations that are running successfully demand the confidentiality of their DBs. They do not allow the unauthorized access to their data/information. They also demand the assurance that their data is protected against any malicious or accidental modification. DB protection and confidentiality are the security concerns. There are four types of controls to obtain the DB protection, those include: access control, information flow control, inference control, and cryptographic. The cryptographic control is considered as the backbone for DB security, it secures the DB by encryption during storage and communications. Current cryptographic techniques are classified into two types: traditional classical cryptography using standard algorithms (DES, AES, IDEA, etc.) and chaos cryptography using continuous (Chau, Rossler, Lorenz, etc.) or discreet (Logistics, Henon, etc.) algorithms. The important characteristics of chaos are its extreme sensitivity to initial conditions of the system. In this paper, DB-security systems based on chaotic algorithms are described. The Pseudo Random Numbers Generators (PRNGs) from the different chaotic algorithms are implemented using Matlab and their statistical properties are evaluated using NIST and other statistical test-suits. Then, these algorithms are used to secure conventional DB (plaintext), where the statistical properties of the ciphertext are also tested. To increase the complexity of the PRNGs and to let pass all the NIST statistical tests, we propose two hybrid PRNGs: one based on two chaotic Logistic maps and another based on two chaotic Henon maps, where each chaotic algorithm is running side-by-side and starting from random independent initial conditions and parameters (encryption keys). The resulted hybrid PRNGs passed the NIST statistical test suit.

Keywords: algorithms and data structure, DB security, encryption, chaotic algorithms, Matlab, NIST

Procedia PDF Downloads 259
523 An Efficient Encryption Scheme Using DWT and Arnold Transforms

Authors: Ali Abdrhman M. Ukasha

Abstract:

Data security needed in data transmission, storage, and communication to ensure the security. The color image is decomposed into red, green, and blue channels. The blue and green channels are compressed using 3-levels discrete wavelet transform. The Arnold transform uses to changes the locations of red image channel pixels as image scrambling process. Then all these channels are encrypted separately using a key image that has same original size and is generating using private keys and modulo operations. Performing the X-OR and modulo operations between the encrypted channels images for image pixel values change purpose. The extracted contours of color image recovery can be obtained with accepted level of distortion using Canny edge detector. Experiments have demonstrated that proposed algorithm can fully encrypt 2D color image and completely reconstructed without any distortion. It has shown that the color image can be protected with a higher security level. The presented method has easy hardware implementation and suitable for multimedia protection in real time applications such as wireless networks and mobile phone services.

Keywords: color image, wavelet transform, edge detector, Arnold transform, lossy image encryption

Procedia PDF Downloads 469
522 Patient-Friendly Hand Gesture Recognition Using AI

Authors: K. Prabhu, K. Dinesh, M. Ranjani, M. Suhitha

Abstract:

During the tough times of covid, those people who were hospitalized found it difficult to always convey what they wanted to or needed to the attendee. Sometimes the attendees might also not be there. In that case, the patients can use simple hand gestures to control electrical appliances (like its set it for a zero watts bulb)and three other gestures for voice note intimation. In this AI-based hand recognition project, NodeMCU is used for the control action of the relay, and it is connected to the firebase for storing the value in the cloud and is interfaced with the python code via raspberry pi. For three hand gestures, a voice clip is added for intimation to the attendee. This is done with the help of Google’s text to speech and the inbuilt audio file option in the raspberry pi 4. All the five gestures will be detected when shown with their hands via the webcam, which is placed for gesture detection. The personal computer is used for displaying the gestures and for running the code in the raspberry pi imager.

Keywords: nodeMCU, AI technology, gesture, patient

Procedia PDF Downloads 148
521 Graph Neural Networks and Rotary Position Embedding for Voice Activity Detection

Authors: YingWei Tan, XueFeng Ding

Abstract:

Attention-based voice activity detection models have gained significant attention in recent years due to their fast training speed and ability to capture a wide contextual range. The inclusion of multi-head style and position embedding in the attention architecture are crucial. Having multiple attention heads allows for differential focus on different parts of the sequence, while position embedding provides guidance for modeling dependencies between elements at various positions in the input sequence. In this work, we propose an approach by considering each head as a node, enabling the application of graph neural networks (GNN) to identify correlations among the different nodes. In addition, we adopt an implementation named rotary position embedding (RoPE), which encodes absolute positional information into the input sequence by a rotation matrix, and naturally incorporates explicit relative position information into a self-attention module. We evaluate the effectiveness of our method on a synthetic dataset, and the results demonstrate its superiority over the baseline CRNN in scenarios with low signal-to-noise ratio and noise, while also exhibiting robustness across different noise types. In summary, our proposed framework effectively combines the strengths of CNN and RNN (LSTM), and further enhances detection performance through the integration of graph neural networks and rotary position embedding.

Keywords: voice activity detection, CRNN, graph neural networks, rotary position embedding

Procedia PDF Downloads 52
520 Design and Development of Automatic Onion Harvester

Authors: P. Revathi, T. Mrunalini, K. Padma Priya, P. Ramya, R. Saranya

Abstract:

During the tough times of covid, those people who were hospitalized found it difficult to always convey what they wanted to or needed to the attendee. Sometimes the attendees might also not be there. In that case, the patients can use simple hand gestures to control electrical appliances (like its set it for a zero watts bulb)and three other gestures for voice note intimation. In this AI-based hand recognition project, NodeMCU is used for the control action of the relay, and it is connected to the firebase for storing the value in the cloud and is interfaced with the python code via raspberry pi. For three hand gestures, a voice clip is added for intimation to the attendee. This is done with the help of Google’s text to speech and the inbuilt audio file option in the raspberry pi 4. All the 5 gestures will be detected when shown with their hands via a webcam which is placed for gesture detection. A personal computer is used for displaying the gestures and for running the code in the raspberry pi imager.

Keywords: onion harvesting, automatic pluging, camera, raspberry pi

Procedia PDF Downloads 182
519 Developed Text-Independent Speaker Verification System

Authors: Mohammed Arif, Abdessalam Kifouche

Abstract:

Speech is a very convenient way of communication between people and machines. It conveys information about the identity of the talker. Since speaker recognition technology is increasingly securing our everyday lives, the objective of this paper is to develop two automatic text-independent speaker verification systems (TI SV) using low-level spectral features and machine learning methods. (i) The first system is based on a support vector machine (SVM), which was widely used in voice signal processing with the aim of speaker recognition involving verifying the identity of the speaker based on its voice characteristics, and (ii) the second is based on Gaussian Mixture Model (GMM) and Universal Background Model (UBM) to combine different functions from different resources to implement the SVM based.

Keywords: speaker verification, text-independent, support vector machine, Gaussian mixture model, cepstral analysis

Procedia PDF Downloads 35
518 Blind Speech Separation Using SRP-PHAT Localization and Optimal Beamformer in Two-Speaker Environments

Authors: Hai Quang Hong Dam, Hai Ho, Minh Hoang Le Ngo

Abstract:

This paper investigates the problem of blind speech separation from the speech mixture of two speakers. A voice activity detector employing the Steered Response Power - Phase Transform (SRP-PHAT) is presented for detecting the activity information of speech sources and then the desired speech signals are extracted from the speech mixture by using an optimal beamformer. For evaluation, the algorithm effectiveness, a simulation using real speech recordings had been performed in a double-talk situation where two speakers are active all the time. Evaluations show that the proposed blind speech separation algorithm offers a good interference suppression level whilst maintaining a low distortion level of the desired signal.

Keywords: blind speech separation, voice activity detector, SRP-PHAT, optimal beamformer

Procedia PDF Downloads 273
517 Searchable Encryption in Cloud Storage

Authors: Ren Junn Hwang, Chung-Chien Lu, Jain-Shing Wu

Abstract:

Cloud outsource storage is one of important services in cloud computing. Cloud users upload data to cloud servers to reduce the cost of managing data and maintaining hardware and software. To ensure data confidentiality, users can encrypt their files before uploading them to a cloud system. However, retrieving the target file from the encrypted files exactly is difficult for cloud server. This study proposes a protocol for performing multikeyword searches for encrypted cloud data by applying k-nearest neighbor technology. The protocol ranks the relevance scores of encrypted files and keywords, and prevents cloud servers from learning search keywords submitted by a cloud user. To reduce the costs of file transfer communication, the cloud server returns encrypted files in order of relevance. Moreover, when a cloud user inputs an incorrect keyword and the number of wrong alphabet does not exceed a given threshold; the user still can retrieve the target files from cloud server. In addition, the proposed scheme satisfies security requirements for outsourced data storage.

Keywords: fault-tolerance search, multi-keywords search, outsource storage, ranked search, searchable encryption

Procedia PDF Downloads 365
516 Music in the Early Stages of Life: Considerations from Working with Groups of Mothers and Babies

Authors: Ana Paula Melchiors Stahlschmidt

Abstract:

This paper discusses the role of music as a ludic activity and constituent element of voice in the construction and consolidation of the relationship of the baby and his/her mother or caretaker, evaluating its implications in his/her psychic structure and constitution as a subject. The work was based on the research developed as part of the author’s doctoral activities carried out from her insertion in a project of the Music Department of Federal University of Rio Grande do Sul - UFRGS, which objective was the development of musical activities with groups of babies from 0 to 24 months old and their caretakers. Observations, video recordings of the meetings, audio testemonies, and evaluation tools applied to group participants were used as instruments for this research. Information was collected on the participation of 195 babies, among which 8 were more focused on through interviews with their mothers or caretakers. These interviews were analyzed based on the referential of French Discourse Analysis, Psychoanalysis, Psychology of Development and Musical Education. The results of the research were complemented by other posterior experiences that the author developed with similar groups, in a context of a private clinic. The information collected allowed the observation of the ludic and structural functions of musical activities, when developed in a structured environment, as well as the importance of the musicality of the mother’s voice to the psychical structuring of the baby, allowing his/her insertion in the language and his/her constituition as a subject.

Keywords: music and babies, maternal voice, Psychoanalysis and music, psychology and music

Procedia PDF Downloads 441
515 Voice in Music Therapy and Adult Trauma Research: Presenting a Meta-Synthesis of Lived Experience Perspectives

Authors: Kirsten B. Hillman

Abstract:

There is a growing body of qualitative research in adult mental health and music therapy contexts which highlights user perspectives; however, only a very small sub-section of this literature pertains to people with lived experiences of psychological trauma. This paper will provide a meta-synthesis of this existing body of research, with the intention to present a cohesive overview of salient themes in this research and a platform for the under-represented voices of those with lived experience. This synthesis will be contextualised within a broader discussion of ‘Voice’ in trauma and music therapy research, considering its layered meanings: including literal expressive vocalising and musical expression, voicing after experiences of silencing, and the possibilities of experiencing self-determination and agency in therapy after trauma.

Keywords: lived experience, music therapy, trauma, user perspectives

Procedia PDF Downloads 214
514 Effect Analysis of an Improved Adaptive Speech Noise Reduction Algorithm in Online Communication Scenarios

Authors: Xingxing Peng

Abstract:

With the development of society, there are more and more online communication scenarios such as teleconference and online education. In the process of conference communication, the quality of voice communication is a very important part, and noise may cause the communication effect of participants to be greatly reduced. Therefore, voice noise reduction has an important impact on scenarios such as voice calls. This research focuses on the key technologies of the sound transmission process. The purpose is to maintain the audio quality to the maximum so that the listener can hear clearer and smoother sound. Firstly, to solve the problem that the traditional speech enhancement algorithm is not ideal when dealing with non-stationary noise, an adaptive speech noise reduction algorithm is studied in this paper. Traditional noise estimation methods are mainly used to deal with stationary noise. In this chapter, we study the spectral characteristics of different noise types, especially the characteristics of non-stationary Burst noise, and design a noise estimator module to deal with non-stationary noise. Noise features are extracted from non-speech segments, and the noise estimation module is adjusted in real time according to different noise characteristics. This adaptive algorithm can enhance speech according to different noise characteristics, improve the performance of traditional algorithms to deal with non-stationary noise, so as to achieve better enhancement effect. The experimental results show that the algorithm proposed in this chapter is effective and can better adapt to different types of noise, so as to obtain better speech enhancement effect.

Keywords: speech noise reduction, speech enhancement, self-adaptation, Wiener filter algorithm

Procedia PDF Downloads 46
513 Isolation Preserving Medical Conclusion Hold Structure via C5 Algorithm

Authors: Swati Kishor Zode, Rahul Ambekar

Abstract:

Data mining is the extraction of fascinating examples on the other hand information from enormous measure of information and choice is made as indicated by the applicable information extracted. As of late, with the dangerous advancement in internet, stockpiling of information and handling procedures, privacy preservation has been one of the major (higher) concerns in data mining. Various techniques and methods have been produced for protection saving data mining. In the situation of Clinical Decision Support System, the choice is to be made on the premise of the data separated from the remote servers by means of Internet to diagnose the patient. In this paper, the fundamental thought is to build the precision of Decision Support System for multiple diseases for different maladies and in addition protect persistent information while correspondence between Clinician side (Client side) also, the Server side. A privacy preserving protocol for clinical decision support network is proposed so that patients information dependably stay scrambled amid diagnose prepare by looking after the accuracy. To enhance the precision of Decision Support System for various malady C5.0 classifiers and to save security, a Homomorphism encryption algorithm Paillier cryptosystem is being utilized.

Keywords: classification, homomorphic encryption, clinical decision support, privacy

Procedia PDF Downloads 322
512 System of Quality Automation for Documents (SQAD)

Authors: R. Babi Saraswathi, K. Divya, A. Habeebur Rahman, D. B. Hari Prakash, S. Jayanth, T. Kumar, N. Vijayarangan

Abstract:

Document automation is the design of systems and workflows, assembling repetitive documents to meet the specific business needs. In any organization or institution, documenting employee’s information is very important for both employees as well as management. It shows an individual’s progress to the management. Many documents of the employee are in the form of papers, so it is very difficult to arrange and for future reference we need to spend more time in getting the exact document. Also, it is very tedious to generate reports according to our needs. The process gets even more difficult on getting approvals and hence lacks its security aspects. This project overcomes the above-stated issues. By storing the details in the database and maintaining the e-documents, the automation system reduces the manual work to a large extent. Then the approval process of some important documents can be done in a much-secured manner by using Digital Signature and encryption techniques. Details are maintained in the database and e-documents are stored in specific folders and generation of various kinds of reports is possible. Moreover, an efficient search method is implemented is used in the database. Automation supporting document maintenance in many aspects is useful for minimize data entry, reduce the time spent on proof-reading, avoids duplication, and reduce the risks associated with the manual error, etc.

Keywords: e-documents, automation, digital signature, encryption

Procedia PDF Downloads 378
511 Effect of Lullabies on Babies Stress and Relaxation Symptoms in the Neonatal Intensive Care Units

Authors: Meltem Kürtüncü, Işın Alkan

Abstract:

Objective: This study was carried out with an experimental design in order to determine whether the lullaby, which was listened from mother’s voice and a stranger’s voice to the babies born at term and hospitalized in neonatal intensive care unit, had an effect on stress and relaxation symptoms of the infants. Method: Data from the study were obtained from 90 newborn babies who were hospitalized in Neonatal Intensive Care Unit of Zonguldak Maternity And Children Hospital between September 2015-January 2016 and who met the eligibility criteria. Lullaby concert was performed by choosing one of the suitable care hours. Stress and relaxation symptoms were recorded by the researcher on “Newborn response follow-up form” at pre-care and post-care. Results: After lullaby concert when stress symptoms compared to infants in the experimental and control groups before the care was not detected statistically significant difference between crying, contraction, facial grimacing, flushing, cyanosis and the rates of increase in temperature. After care, crying, contractions, facial grimacing, flushing, and restlessness revealed a statistically significant difference between the groups, but as the cyanosis and temperature increased stress responses did not result in a significant difference between the groups. In the control group babies the crying, contraction, facial grimacing, flushing, and restlessness behaviors rates were found to be significantly higher than experimental group babies. After lullaby concert when relaxation symptoms compared to infants in the experimental and control groups before the care, eye contact rates who listen to lullaby from mother’s voice was found to be significantly higher than infants who listen to lullaby from stranger’s voice and infants in the control group. After care as eye contact, smiling, sucking/searching, yawning, non-crying and sleep behaviors relaxation symptoms revealed statistically significant results. In the control group, these behaviors were found statistically lower degree than the experimental groups. Conclusion: Lullaby concerts as masking the ambient noise, reducing the stress symptoms and increasing the relaxation symptoms, and also for soothing and stimulant affects, due to ease the transition to the sleep state should be preferred in the neonatal intensive care units.

Keywords: lullaby, mother voice, relaxation, stress

Procedia PDF Downloads 220
510 Riding the Crest of the Wave: Inclusive Education in New Zealand

Authors: Barbara A. Perry

Abstract:

In 1996, the New Zealand government and the Ministry of Education announced that they were setting up a "world class system of inclusive education". As a parent of a son with high and complex needs, a teacher, school Principal and Disability studies Lecturer, this author will track the changes in the journey towards inclusive education over the last 20 years. Strategies for partnering with families to ensure educational success along with insights from one of those on the crest of the wave will be presented. Using a narrative methodology the author will illuminate how far New Zealand has come towards this world class system of inclusion promised and share from personal experience some of the highlights and risks in the system. This author has challenged the old structures and been part of the setting up of new structures particularly for providing parent voice and insight; this paper provides a unique view from an insider’s voice as well as a professional in the system.

Keywords: disability studies, inclusive education, special education, working with families with children with disability

Procedia PDF Downloads 234
509 Secure Message Transmission Using Meaningful Shares

Authors: Ajish Sreedharan

Abstract:

Visual cryptography encodes a secret image into shares of random binary patterns. If the shares are exerted onto transparencies, the secret image can be visually decoded by superimposing a qualified subset of transparencies, but no secret information can be obtained from the superposition of a forbidden subset. The binary patterns of the shares, however, have no visual meaning and hinder the objectives of visual cryptography. In the Secret Message Transmission through Meaningful Shares a secret message to be transmitted is converted to grey scale image. Then (2,2) visual cryptographic shares are generated from this converted gray scale image. The shares are encrypted using A Chaos-Based Image Encryption Algorithm Using Wavelet Transform. Two separate color images which are of the same size of the shares, taken as cover image of the respective shares to hide the shares into them. The encrypted shares which are covered by meaningful images so that a potential eavesdropper wont know there is a message to be read. The meaningful shares are transmitted through two different transmission medium. During decoding shares are fetched from received meaningful images and decrypted using A Chaos-Based Image Encryption Algorithm Using Wavelet Transform. The shares are combined to regenerate the grey scale image from where the secret message is obtained.

Keywords: visual cryptography, wavelet transform, meaningful shares, grey scale image

Procedia PDF Downloads 440
508 Thus Spoke the Mouth: Problematizing Dalit Voice in Selected Poems

Authors: Barnali Saha

Abstract:

Dalit writing is the interventionalist voice of the dispossessed subaltern in the cultural economy of the society. As such, Dalit writing, including Dalit poetry, considers the contradictions that permeate the socio-cultural structure historically allocated and religiously sanctioned in the Indian subcontinent. As an epicenter of all Dalit experiences of trauma and violence, the poetics the Dalit body is deeply rooted in the peripheral space socially assigned to it by anachronistic caste-based litigation. An appraisal of Dalit creative-critical work by writers like Sharan Kumar Limbale, Arjun Dangle, Namdeo Dhasal, Om Prakash Valmiki, Muktibodh and others underscore the conjunction of the physical, psychical and the psychological in their interpretation of Dalit consciousness. They put forward the idea that Dalit poetry is begotten by the trauma of societal oppression and therefore, Dalit language and its revitalization are two elements obdurately linked to Dalit poetics. The present research paper seeks to read the problematization of the Dalit agency through the conduit of the Dalit voice wherein the anatomical category of the mouth is closely related to the question of Dalit identity. Theoretically aligned to Heidegger’s notion of language as the house of being and Bachelard’s assertion of a house as an ideal metaphor of poetic imagination and Dylan Trigg’s view of the coeval existence of space and body, the paper examines a series of selected poems by Dalit poetic voices to examine how their distinct Dalit point of view underscores Dalit speech and directs our attention to the historical abstraction of it. The paper further examines how speech as a category in Dalit writing places the Dalit somatic entity as a site of contestation with the ‘Mouth’ as a loaded symbolic category inspiring rebellion and resistance. And as the quintessential purpose of Dalit literature is the unleashing of Dalit voice from the anti-verbal domain of social decrepitude, Dalit poetry needs to be critically read based on the experience of the mouth and the patois.

Keywords: Dalit, poetry, speech, mouth, subaltern, minority, exploitation, space

Procedia PDF Downloads 180
507 Smart Help at the Workplace for Persons with Disabilities (SHW-PWD)

Authors: Ghassan Kbar, Shady Aly, Ibrahim Alsharawy, Akshay Bhatia, Nur Alhasan, Ronaldo Enriquez

Abstract:

The Smart Help for persons with disability (PWD) is a part of the project SMARTDISABLE which aims to develop relevant solution for PWD that target to provide an adequate workplace environment for them. It would support PWD needs smartly through smart help to allow them access to relevant information and communicate with other effectively and flexibly, and smart editor that assist them in their daily work. It will assist PWD in knowledge processing and creation as well as being able to be productive at the work place. The technical work of the project involves design of a technological scenario for the Ambient Intelligence (AmI) - based assistive technologies at the workplace consisting of an integrated universal smart solution that suits many different impairment conditions and will be designed to empower the Physically disabled persons (PDP) with the capability to access and effectively utilize the ICTs in order to execute knowledge rich working tasks with minimum efforts and with sufficient comfort level. The proposed technology solution for PWD will support voice recognition along with normal keyboard and mouse to control the smart help and smart editor with dynamic auto display interface that satisfies the requirements for different PWD group. In addition, a smart help will provide intelligent intervention based on the behavior of PWD to guide them and warn them about possible misbehavior. PWD can communicate with others using Voice over IP controlled by voice recognition. Moreover, Auto Emergency Help Response would be supported to assist PWD in case of emergency. This proposed technology solution intended to make PWD very effective at the work environment and flexible using voice to conduct their tasks at the work environment. The proposed solution aims to provide favorable outcomes that assist PWD at the work place, with the opportunity to participate in PWD assistive technology innovation market which is still small and rapidly growing as well as upgrading their quality of life to become similar to the normal people at the workplace. Finally, the proposed smart help solution is applicable in all workplace setting, including offices, manufacturing, hospital, etc.

Keywords: ambient intelligence, ICT, persons with disability PWD, smart application, SHW

Procedia PDF Downloads 409
506 Visualization-Based Feature Extraction for Classification in Real-Time Interaction

Authors: Ágoston Nagy

Abstract:

This paper introduces a method of using unsupervised machine learning to visualize the feature space of a dataset in 2D, in order to find most characteristic segments in the set. After dimension reduction, users can select clusters by manual drawing. Selected clusters are recorded into a data model that is used for later predictions, based on realtime data. Predictions are made with supervised learning, using Gesture Recognition Toolkit. The paper introduces two example applications: a semantic audio organizer for analyzing incoming sounds, and a gesture database organizer where gestural data (recorded by a Leap motion) is visualized for further manipulation.

Keywords: gesture recognition, machine learning, real-time interaction, visualization

Procedia PDF Downloads 335
505 Cloud Shield: Model to Secure User Data While Using Content Delivery Network Services

Authors: Rachna Jain, Sushila Madan, Bindu Garg

Abstract:

Cloud computing is the key powerhouse in numerous organizations due to shifting of their data to the cloud environment. In recent years it has been observed that cloud-based-services are being used on large scale for content storage, distribution and processing. Various issues have been observed in cloud computing environment that need to be addressed. Security and privacy are found topmost concern area. In this paper, a novel security model is proposed to secure data by utilizing CDN services like image to icon conversion. CDN Service is a content delivery service which converts an image to icon, word to pdf & Latex to pdf etc. Presented model is used to convert an image into icon by keeping image secret. Here security of image is imparted so that image should be encrypted and decrypted by data owners only. It is also discussed in the paper that how server performs multiplication and selection on encrypted data without decryption. The data can be image file, word file, audio or video file. Moreover, the proposed model is capable enough to multiply images, encrypt them and send to a server application for conversion. Eventually, the prime objective is to encrypt an image and convert the encrypted image to image Icon by utilizing homomorphic encryption.

Keywords: cloud computing, user data security, homomorphic encryption, image multiplication, CDN service

Procedia PDF Downloads 325