Search results for: shared secret
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 1121

Search results for: shared secret

971 Applying Concurrent Development Process for the Web Using Aspect-Oriented Approach

Authors: Hiroaki Fukuda

Abstract:

This paper shows a concurrent development process for modern web application, called Rich Internet Application (RIA), and describes its effect using a non-trivial application development. In the last years, RIAs such as Ajax and Flex have become popular based mainly on high-speed network. RIA provides sophisticated interfaces and user experiences, therefore, the development of RIA requires two kinds of engineer: a developer who implements business logic, and a designer who designs interface and experiences. Although collaborative works are becoming important for the development of RIAs, shared resources such as source code make it difficult. For example, if a design of interface is modified after developers have finished business logic implementations, they need to repeat the same implementations, and also tests to verify application’s behavior. MVC architecture and Object-oriented programming (OOP) enables to dividing an application into modules such as interfaces and logic, however, developers and/or designers have to write pieces of code (e.g., event handlers) that make these modules work as an application. On the other hand, Aspect-oriented programming (AOP) is ex- pected to solve complexity of application software development nowadays. AOP provides methods to separate crosscutting concerns that are scattered pieces of code from primary concerns. In this paper, we provide a concurrent development process for RIAs by introducing AOP concept. This process makes it possible to reduce shared resources between developers and designers, therefore they can perform their tasks concurrently. In addition, we describe experiences of development for a practical application using our proposed development process to show its availability.

Keywords: aspect-oriented programming, concurrent, development process, rich internet application

Procedia PDF Downloads 301
970 Rethinking Pathways to Shared Prosperity for Forest Communities: A Case Study of Nigerian REDD+ Readiness Project

Authors: U. Isyaku, C. Upton, J. Dickinson

Abstract:

Critical institutional approach for understanding pathways to shared prosperity among forest communities enabled questioning the underlying rational choice assumptions that have dominated traditional institutional thinking in natural resources management. Common pool resources framing assumes that communities as social groups share collective interests and values towards achieving greater development. Hence, policies related to natural resources management in the global South prioritise economic prosperity by focusing on how to maximise material benefits and improve the livelihood options of resource dependent communities. Recent trends in commodification and marketization of ecosystem goods and services into tradable natural capital and incentivising conservation are structured in this paradigm. Several researchers however, have problematized this emerging market-based model because it undermines cultural basis for protecting natural ecosystems. By exploring how forest people’s motivations for conservation differ within the context of reducing emissions from deforestation and forest degradation (REDD+) project in Nigeria, we aim to provide an alternative approach to conceptualising prosperity beyond the traditional economic thinking. Through in depth empirical work over seven months with five communities in Nigeria’s Cross River State, Q methodology was used to uncover communities’ perspectives and meanings of forest values that underpin contemporary and historic conservation practices, expected benefits, and willingness to participate in the REDD+ process. Our study finds six discourses about forest and conservation values that transcend wealth creation, poverty reduction and livelihoods. We argue that communities’ decisions about forest conservation consist of a complex mixture of economic, emotional, moral, and ecological justice concerns that constitute new meanings and dimensions of prosperity. Prosperity is thus reconfigured as having socio-cultural and psychological pathways that could be derived through place identity and attachment, connectedness to nature, family ties, and ability to participate in everyday social life. We therefore suggest that natural resources policy making and development interventions should consider institutional arrangements that also include the psycho-cultural dimensions of prosperity among diverse community groups.

Keywords: critical institutionalism, Q methodology, REDD+, shared prosperity

Procedia PDF Downloads 344
969 Novel Recombinant Betasatellite Associated with Vein Thickening Symptoms on Okra Plants in Saudi Arabia

Authors: Adel M. Zakri, Mohammed A. Al-Saleh, Judith. K. Brown, Ali M. Idris

Abstract:

Betasatellites are small circular single stranded DNA molecules found associated with begomoviruses on field symptomatic plants. Their genome size is about half that of the helper begomovirus, ranging between 1.3 and 1.4 kb. The helper begomoviruses are usually members of the family Geminiviridae. Okra leaves showing vein thickening were collected from okra plants growing in Jazan, Saudi Arabia. Total DNA was extracted from leaves and used as a template to amplify circular DNA using rolling circle amplification (RCA) technology. Products were digested with PstI to linearize the helper viral genome(s), and associated DNA satellite(s), yielding a 2.8kbp and 1.4kbp fragment, respectively. The linearized fragments were cloned into the pGEM-5Zf (+) vector and subjected to DNA sequencing. The 2.8 kb fragment was identified as Cotton leaf curl Gezira virus genome, at 2780bp, an isolate closely related to strains reported previously from Saudi Arabia. A clone obtained from the 1.4 kb fragments he 1.4kb was blasted to GeneBank database found to be a betasatellite. The genome of betasatellite was 1357-bp in size. It was found to be a recombinant containing one fragment (877-bp) that shared 91% nt identity with Cotton leaf curl Gezira betasatellite [KM279620], and a smaller fragment [133--bp) that shared 86% nt identity with Tomato leaf curl Sudan virus [JX483708]. This satellite is thus a recombinant between a malvaceous-infecting satellite and a solanaceous-infecting begomovirus.

Keywords: begomovirus, betasatellites, cotton leaf curl Gezira virus, okra plants

Procedia PDF Downloads 341
968 A Review on Cloud Computing and Internet of Things

Authors: Sahar S. Tabrizi, Dogan Ibrahim

Abstract:

Cloud Computing is a convenient model for on-demand networks that uses shared pools of virtual configurable computing resources, such as servers, networks, storage devices, applications, etc. The cloud serves as an environment for companies and organizations to use infrastructure resources without making any purchases and they can access such resources wherever and whenever they need. Cloud computing is useful to overcome a number of problems in various Information Technology (IT) domains such as Geographical Information Systems (GIS), Scientific Research, e-Governance Systems, Decision Support Systems, ERP, Web Application Development, Mobile Technology, etc. Companies can use Cloud Computing services to store large amounts of data that can be accessed from anywhere on Earth and also at any time. Such services are rented by the client companies where the actual rent depends upon the amount of data stored on the cloud and also the amount of processing power used in a given time period. The resources offered by the cloud service companies are flexible in the sense that the user companies can increase or decrease their storage requirements or the processing power requirements at any time, thus minimizing the overall rental cost of the service they receive. In addition, the Cloud Computing service providers offer fast processors and applications software that can be shared by their clients. This is especially important for small companies with limited budgets which cannot afford to purchase their own expensive hardware and software. This paper is an overview of the Cloud Computing, giving its types, principles, advantages, and disadvantages. In addition, the paper gives some example engineering applications of Cloud Computing and makes suggestions for possible future applications in the field of engineering.

Keywords: cloud computing, cloud systems, cloud services, IaaS, PaaS, SaaS

Procedia PDF Downloads 233
967 Making Sense of C. G. Jung’s Red Book and Black Books: Masonic Rites and Trauma

Authors: Lynn Brunet

Abstract:

In 2019 the author published a book-length study examining Jung’s Red Book. This study consisted of a close reading of each of the chapters in Liber Novus, focussing on the fantasies themselves and Jung’s accompanying paintings. It found that the plots, settings, characters and symbolism in each of these fantasies are not entirely original but remarkably similar to those found in some of the higher degrees of Continental Freemasonry. Jung was the grandson of his namesake, C.G. Jung (1794–1864), who was a Freemason and one-time Grand Master of the Swiss Masonic Lodge. The study found that the majority of Jung’s fantasies are very similar to those of the Ancient and Accepted Scottish Rite, practiced in Switzerland during the time of Jung’s childhood. It argues that the fantasies appear to be memories of a series of terrifying initiatory ordeals conducted using spurious versions of the Masonic rites. Spurious Freemasonry is a term that Masons use for the ‘irregular’ or illegitimate use of the rituals and are not sanctioned by the Order. Since the 1980s there have been multiple reports of ritual trauma amongst a wide variety of organizations, cults and religious groups that psychologists, counsellors, social workers, and forensic scientists have confirmed. The abusive use of Masonic rites features frequently in these reports. This initial study allows a reading of The Red Book that makes sense of the obscure references, bizarre scenarios and intense emotional trauma described by Jung throughout Liber Novus. It suggests that Jung appears to have undergone a cruel initiatory process as a child. The author is currently examining the extra material found in Jung’s Black Books and the results are confirming the original discoveries and demonstrating a number of aspects not covered in the first publication. These include the complex layering of ancient gods and belief systems in answer to Jung’s question, ‘In which underworld am I?’ It demonstrates that the majority of these ancient systems and their gods are discussed in a handbook for the Scottish Rite, Morals and Dogma by Albert Pike, but that the way they are presented by Philemon and his soul is intended to confuse him rather than clarify their purpose. This new study also examines Jung’s soul’s question ‘I am not a human being. What am I then?’ While further themes that emerge from the Black Books include his struggle with vanity and whether he should continue creating his ‘holy book’; and a comparison between Jung’s ‘mystery plays’ and examples from the Theatre of the Absurd. Overall, it demonstrates that Jung’s experience, while inexplicable in his own time, is now known to be the secret and abusive practice of initiation of the young found in a range of cults and religious groups in many first world countries. This paper will present a brief outline of the original study and then examine the themes that have emerged from the extra material found in the Black Books.

Keywords: C. G. Jung, the red book, the black books, masonic themes, trauma and dissociation, initiation rites, secret societies

Procedia PDF Downloads 134
966 The Aesthetic and Critiques of Weimar Democracy: The Counter and Complement to Carl Schmitt’s Political Myth

Authors: Peter Jin

Abstract:

Ever since the recent resurgence of interest in political theorist Carl Schmitt’s work, much of the current analysis on Schmitt has fo-cused on evaluating Schmitt’s legacy by exposing contradictions in his rationale. Rather than condemn such contradictions, this paper instead seeks to analyze these contradictions in an effort to better understand the radical shift in Schmitt’s intellectual trajectory from an astute critic of liberal democracy to a fascist apologist towards the end of the Weimar period. An essential part of this change is his interest in what Schmitt called ‘the emergence of aesthetics.’ Schmitt diagnosed the underlying issue with the aesthetic in the political sphere to be its irrationalism, indifference, and indeci-siveness. For Schmitt, the latter two of these were especially prob-lematic for two of his key concepts: the ‘political’ and ‘the shared historical reality.’ Schmitt’s radical depiction of ‘the political’ as an existential opposition of allegiances that necessitated a state of emergency and a decisionist sovereign political struggle required an equally radical justification, or Schmitt’s call for ‘a shared his-torical reality’ not based in historical fact yet able to mobilize the masses. In this way, Schmitt clearly condemns the indifferent, indecisive aesthetic that runs against his decisionist, action-oriented political theory. Yet despite his firm stance against aestheticism, Schmitt himself used the evocative and irrational power of aesthet-icism as a tool to present his own ‘political myth’ that compelled believers to join in decisive unity against a common enemy. In short, Schmitt’s contradictions on aestheticism and his creation of a ‘political myth’ suggest that Schmitt’s underlying conflict with aestheticism was not as much of an issue of irrationality as it was a chronic preoccupation with coercing concrete action at the expense of rational deliberation.

Keywords: aesthetics of the political, Carl Schmitt, political myth, Weimar democracy

Procedia PDF Downloads 146
965 Enabling Self-Care and Shared Decision Making for People Living with Dementia

Authors: Jonathan Turner, Julie Doyle, Laura O’Philbin, Dympna O’Sullivan

Abstract:

People living with dementia should be at the centre of decision-making regarding goals for daily living. These goals include basic activities (dressing, hygiene, and mobility), advanced activities (finances, transportation, and shopping), and meaningful activities that promote well-being (pastimes and intellectual pursuits). However, there is limited involvement of people living with dementia in the design of technology to support their goals. A project is described that is co-designing intelligent computer-based support for, and with, people affected by dementia and their carers. The technology will support self-management, empower participation in shared decision-making with carers and help people living with dementia remain healthy and independent in their homes for longer. It includes information from the patient’s care plan, which documents medications, contacts, and the patient's wishes on end-of-life care. Importantly for this work, the plan can outline activities that should be maintained or worked towards, such as exercise or social contact. The authors discuss how to integrate care goal information from such a care plan with data collected from passive sensors in the patient’s home in order to deliver individualized planning and interventions for persons with dementia. A number of scientific challenges are addressed: First, to co-design with dementia patients and their carers computerized support for shared decision-making about their care while allowing the patient to share the care plan. Second, to develop a new and open monitoring framework with which to configure sensor technologies to collect data about whether goals and actions specified for a person in their care plan are being achieved. This is developed top-down by associating care quality types and metrics elicited from the co-design activities with types of data that can be collected within the home, from passive and active sensors, and from the patient’s feedback collected through a simple co-designed interface. These activities and data will be mapped to appropriate sensors and technological infrastructure with which to collect the data. Third, the application of machine learning models to analyze data collected via the sensing devices in order to investigate whether and to what extent activities outlined via the care plan are being achieved. The models will capture longitudinal data to track disease progression over time; as the disease progresses and captured data show that activities outlined in the care plan are not being achieved, the care plan may recommend alternative activities. Disease progression may also require care changes, and a data-driven approach can capture changes in a condition more quickly and allow care plans to evolve and be updated.

Keywords: care goals, decision-making, dementia, self-care, sensors

Procedia PDF Downloads 169
964 ‘Saying’ the Nuclear Power in France: Evolution of the Images and Perceptions of a Sensitive Theme

Authors: Jandot Aurélia

Abstract:

As the nuclear power is a sensitive field leading to controversy, the quality of the communication about it is important. Between 1965 and 1981, in France, this one had gradually changed. This change is studied here in the main French news magazine L’Express, in connection with several parameters. As this represents a huge number of copies and occurrences, thus a considerable amount of information; this paper is focused on the main articles as well as the main “mental images”. These ones are important, as their aim is to direct the thought of the readers, and as they have led the public awareness to evolve. Over this 17 years, two trends are in confrontation: The first one is promoting the perception of the nuclear power, while the second one is discrediting it. These trends are organized in two axes: the evolution of engineering, and the risks. In both cases, the changes in the language allow discerning the deepest intentions of the magazine editing, over a period when the nuclear technology, to there a laboratory object accompanied with mystery and secret, has become a social issue seemingly open to all.

Keywords: French news magazine, mental images, nuclear power, public awareness

Procedia PDF Downloads 304
963 Hyper Presidentialism and First Year of the Turkish Type of Presidentialism

Authors: Ahmet Ekinci

Abstract:

The new government system of Turkey can be described as hyper-presidentialism, this is because the president then becomes the arbiter of all powers. In another word, the power to enact decrees, appoint bureaucrats and judicial officials into offices, and the power to dissolve a parliament belongs solely to the president. As a strong presidency fuse with a disciplined party system as well as concurrent elections and 10 percent electoral threshold, the president possibly poses a great danger to the separation of powers. Additionally, with regards to the presidential term, the president constitutionally holds the power to be elected only for two terms in Turkey. However, Erdoğan and his supporters believe that the 2017 constitutional amendments that changed the system of government have reset the agenda. Thus, the 2017 amendments offered Erdoğan a secret opportunity to join the presidential election race for a third and even a fourth term.

Keywords: hyper-presidentialism, Turkish presidentialism, presidential decree, concurrent election, Erdogan’s term limit, Turkish government system

Procedia PDF Downloads 139
962 Facilitating Conditions Mediating SME’s Intention to Use Social Media for Knowledge Sharing

Authors: Stevens Phaphadi Mamorobela

Abstract:

The Covid-19 pandemic has accelerated the use of social media in SMEs to stay abreast with information about the latest news and developments and to predict the future world of business. The national shutdown regulations for curbing the spread of the Covid-19 virus resulted in SMEs having to distribute large volumes of information through social media platforms to collaborate and conduct business remotely. How much of the information shared on social media is used by SMEs as significant knowledge for economic rent is yet to be known. This study aims to investigate the facilitating conditions that enable SMEs’ intention to use social media as a knowledge-sharing platform to create economic rent and to cope with the Covid-19 challenges. A qualitative research approach was applied where semi-structured interviews were conducted with 13 SME owners located in the Gauteng province in South Africa to identify and explain the facilitating conditions of SMEs towards their intention to use social media as a knowledge-sharing tool in the Covid-19 era. The study discovered that the national lockdown regulations towards curbing the spread of the Covid-19 pandemic had compelled SMEs to adopt digital technologies that enabled them to quickly transform their business processes to cope with the challenges of the pandemic. The facilitating conditions, like access to high bandwidth internet coverage in the Gauteng region, enable SMEs to have strong intentions to use social media to distribute content and to reach out to their target market. However, the content is shared informally using diverse social media platforms without any guidelines for transforming content into rent-yielding knowledge.

Keywords: facilitating conditions, knowledge sharing, social media, intention to use, SME

Procedia PDF Downloads 105
961 Anomaly: A Case of Babri Masjid Dispute

Authors: Karitikeya Sonker

Abstract:

Religion as a discrete system through its lawful internal working produces an output in the form of realised spatial order with its social logic and a social order with its spatial logic. Thus, it appears to exhibit its duality of spatial and trans-spatial. The components of this system share a relevance forming a collective. This shared relevance creates meaning forming a group where all collectives share one identity. This group with its new social order and its spatial logic revive the already existing spatial order. These religious groups do so having a tendency to expand resulting in the production of space in a situation of encounter where they have found relevance. But an encounter without a lawful internal working of a discrete system results in anomaly because groups do not find relevance due to the absence of collective identity. Events happen all around. One of the main reasons we could say that something became an event is because of conflict. Conflict not in its definitive sense but any occurrence that happens because of an intervention that creates an event worth remembering. The unfolding of such events creates Cities and Urban spaces which exhibit their duality of spatial and trans-spatial by behaving as a discrete system. This system through its lawful internal working produces an output in the form of realized spatial order with its social logic and a social order with spatial logic. The components of this system form a collective through a shared a relevance. This shared relevance creates meaning forming a group where all collectives share one identity. This group with its new social order and its spatial logic revives the already existing spatial order. These groups do so having a tendency to expand resulting in the production of space in a situation of encounter where they have found relevance. But an encounter without a lawful internal working of the discrete system results in anomaly because groups do not find relevance due to the absence of collective identity. This paper makes an effort to explore one such even in the case of Babri Mosque and Ramjanmabhumi, Ayodhya to explain the anomaly as transposition of social and spatial. The paper through the case studies makes an attempt to generate an equation explaining the two different situations of religious encounters, former reviving the social and spatial order and the other resulting in anomaly. Through the case study, it makes an attempt to generate an equation explaining the two different situations of religious encounters, former reviving the social and spatial order and the other resulting in anomaly.

Keywords: Babri Masjid, Ayodhya, conflict, religion

Procedia PDF Downloads 275
960 Shared Decision-Making in Holistic Healthcare: Integrating Evidence-Based Medicine and Values-Based Medicine

Authors: Ling-Lang Huang

Abstract:

Research Background: Historically, the evolution of medicine has not only aimed to extend life but has also inadvertently introduced suffering in the process of maintaining life, presenting a contemporary challenge. We must carefully assess the conflict between the length of life and the quality of living. Evidence-Based Medicine (EBM) exists primarily to ensure the quality of cures. However, EBM alone does not fulfill our ultimate medical goals; we must also evaluate Value-Based Medicine (VBM) to find the best treatment for patients. Research Methodology: We can attempt to integrate EBM with VBM. Within the five steps of EBM, the first three steps (Ask—Acquire—Appraise) focus on the physical aspect of humans. However, in the fourth and fifth steps (Apply—Assess), the focus shifts from the physical to applying evidence-based treatment to the patient and assessing its effectiveness, considering a holistic approach to the individual. To consider VBM for patients, we can divide the process into three steps: The first step is "awareness," recognizing that each patient inhabits a different life-world and possesses unique differences. The second step is "integration," akin to the hermeneutic concept of the Fusion of Horizons. This means being aware of differences and also understanding the origins of these patient differences. The third step is "respect," which involves setting aside our adherence to medical objectivity and scientific rigor to respect the ultimate healthcare decisions made by individuals regarding their lives. Discussion and Conclusion: After completing these three steps of VBM, we can return to the fifth step of EBM: Assess. Our assessment can now transcend the physical treatment focus of the initial steps to align with a holistic care philosophy.

Keywords: shared decision-making, evidence-based medicine, values-based medicine, holistic healthcare

Procedia PDF Downloads 52
959 The Shared Breath Project: Inhabiting Each Other’s Words and Being

Authors: Beverly Redman

Abstract:

With the Theatre Season of 2020-2021 cancelled due to COVID-19 at Purdue University, Fort Wayne, IN, USA, faculty directors found themselves scrambling to create theatre production opportunities for their students in the Department of Theatre. Redman, Chair of the Department, found her community to be suffering from anxieties brought on by a confluence of issues: the global-scale Covid-19 Pandemic, the United States’ Black Lives Matter protests erupting in cities all across the country and the coming Presidential election, arguably the most important and most contentious in the country’s history. Redman wanted to give her students the opportunity to speak not only on these issues but also to be able to record who they were at this time in their personal lives, as well as in this broad socio-political context. She also wanted to invite them into an experience of feeling empathy, too, at a time when empathy in this world seems to be sorely lacking. Returning to a mode of Devising Theatre she had used with community groups in the past, in which storytelling and re-enactment of participants’ life events combined with oral history documentation practices, Redman planned The Shared Breath Project. The process involved three months of workshops, in which participants alternated between theatre exercises and oral history collection and documentation activities as a way of generating original material for a theatre production. The goal of the first half of the project was for each participant to produce a solo piece in the form of a monologue after many generations of potential material born out of gammes, improvisations, interviews and the like. Along the way, many film and audio clips recorded the process of each person’s written documentation—documentation prepared by the subject him or herself but also by others in the group assigned to listen, watch and record. Then, in the second half of the project—and only once each participant had taken their own contributions from raw improvisatory self-presentations and through the stages of composition and performative polish, participants then exchanged their pieces. The second half of the project involved taking on each other’s words, mannerisms, gestures, melodic and rhythmic speech patterns and inhabiting them through the rehearsal process as their own, thus the title, The Shared Breath Project. Here, in stage two the acting challenges evolved to be those of capturing the other and becoming the other through accurate mimicry that embraces Denis Diderot’s concept of the Paradox of Acting, in that the actor is both seeming and being simultaneous. This paper shares the carefully documented process of making the live-streamed theatre production that resulted from these workshops, writing processes and rehearsals, and forming, The Shared Breath Project, which ultimately took the students’ Realist, life-based pieces and edited them into a single unified theatre production. The paper also utilizes research on the Paradox of Acting, putting a Post-Structuralist spin on Diderot’s theory. Here, the paper suggests the limitations of inhabiting the other by allowing that the other is always already a thing impenetrable but nevertheless worthy of unceasing empathetic, striving and delving in an epoch in which slow, careful attention to our fellows is in short supply.

Keywords: otherness, paradox of acting, oral history theatre, devised theatre, political theatre, community-based theatre, peoples’ theatre

Procedia PDF Downloads 184
958 Difference Expansion Based Reversible Data Hiding Scheme Using Edge Directions

Authors: Toshanlal Meenpal, Ankita Meenpal

Abstract:

A very important technique in reversible data hiding field is Difference expansion. Secret message as well as the cover image may be completely recovered without any distortion after data extraction process due to reversibility feature. In general, in any difference expansion scheme embedding is performed by integer transform in the difference image acquired by grouping two neighboring pixel values. This paper proposes an improved reversible difference expansion embedding scheme. We mainly consider edge direction for embedding by modifying the difference of two neighboring pixels values. In general, the larger difference tends to bring a degraded stego image quality than the smaller difference. Image quality in the range of 0.5 to 3.7 dB in average is achieved by the proposed scheme, which is shown through the experimental results. However payload wise it achieves almost similar capacity in comparisons with previous method.

Keywords: information hiding, wedge direction, difference expansion, integer transform

Procedia PDF Downloads 484
957 Easily Memorable Strong Password Generation and Retrieval

Authors: Shatadru Das, Natarajan Vijayarangan

Abstract:

In this paper, a system and method for generating and recovering an authorization code has been designed and analyzed. The system creates an authorization code by accepting a base-sentence from a user. Based on the characters present in this base-sentence, the system computes a base-sentence matrix. The system also generates a plurality of patterns. The user can either select the pattern from the multiple patterns suggested by the system or can create his/her own pattern. The system then performs multiplications between the base-sentence matrix and the selected pattern matrix at different stages in the path forward, for obtaining a strong authorization code. In case the user forgets the base sentence, the system has a provision to manage and retrieve 'forgotten authorization code'. This is done by fragmenting the base sentence into different matrices and storing the fragmented matrices into a repository after computing matrix multiplication with a security question-answer approach and with a secret key provided by the user.

Keywords: easy authentication, key retrieval, memorable passwords, strong password generation

Procedia PDF Downloads 400
956 Analysis of Employed and Unemployed Mother’s Perspectives Towards Story Narration in Typically Developing Children between 2 to 5 Years

Authors: Bindu S., Malavika Anakkathil Anil, Jayashree S. Bhat

Abstract:

The dyadic interaction between the parent and child during story narration facilitates the emergence of early literacy skills. Early shared reading experiences positively predict better reading and language outcomes in children who experience rich communicative and effective interactions during shared book reading. However, research is yet to systematically explore mother’s perspective towards story narration and how employment may influence their perspectives. The study analysed the perspectives of employed and unemployed mothers of typically developing children between the age ranges of 2 to 5 years through a questionnaire which covered domains on story narration exposure and parental attitudes & beliefs. The results indicate no statistical difference between employed mothers (M=8.5, SD=3.4) and unemployed mothers (M=10.1, SD=1.06). Whereas, post-hoc comparisons using the scheffe test, revealed a significant difference in scores. An increasing score was obtained as the age of the child increased. This change could be attributed due to the integration of children in preschools which could have contributed to the change of perception towards story narration. Older children’s mother perceive story narration to be an important part of their curriculum, which could facilitate rich vocabulary and language output. Younger children’s parents are however not realising the significance of story narration and its impact on the emergent literacy skills. Parent-child interaction is a significant contributor to a healthy social and cultural development. The study emphasises on the need of mothers to engage in preliteracy based activities which contribute to better academic performance in later stages.

Keywords: early literacy skill, employment, language development, mother’s perspective, story narration

Procedia PDF Downloads 139
955 The Power of Earned Media: Exploring the Key Success of Love Destiny, Thai Smash Hit Television Drama

Authors: Wilaiwan Jongwilaikasaem, Phatteera Sarakornborrirak

Abstract:

While Thai television producers feel anxious about digital disruption, Love Destiny, Thai television period drama became smash hit in Thailand in 2018. Audience throughout the country not only watched the drama both offline and online but also spread the content of the drama on social media and followed cultural trends from the protagonist. Thus, the main purpose of this article is to examine the secret behind the success of Love Destiny. Data were collected from content analysis and in-depth interview. The result shows that the key success of the drama is from earned media phenomenon from the audience and marketers’ engagement. As Love Destiny has full-flavored content with traditional challenged plot, delicate production, and presentation of Thainess in a positive and tangible way; audience and marketers are enthusiastic about building up the popular trend of Love Destiny on social media and also coming back home to watch televisions when the drama was on the air.

Keywords: Thai drama, earned media, Love Destiny, television

Procedia PDF Downloads 177
954 Facial Biometric Privacy Using Visual Cryptography: A Fundamental Approach to Enhance the Security of Facial Biometric Data

Authors: Devika Tanna

Abstract:

'Biometrics' means 'life measurement' but the term is usually associated with the use of unique physiological characteristics to identify an individual. It is important to secure the privacy of digital face image that is stored in central database. To impart privacy to such biometric face images, first, the digital face image is split into two host face images such that, each of it gives no idea of existence of the original face image and, then each cover image is stored in two different databases geographically apart. When both the cover images are simultaneously available then only we can access that original image. This can be achieved by using the XM2VTS and IMM face database, an adaptive algorithm for spatial greyscale. The algorithm helps to select the appropriate host images which are most likely to be compatible with the secret image stored in the central database based on its geometry and appearance. The encryption is done using GEVCS which results in a reconstructed image identical to the original private image.

Keywords: adaptive algorithm, database, host images, privacy, visual cryptography

Procedia PDF Downloads 130
953 Fast Bayesian Inference of Multivariate Block-Nearest Neighbor Gaussian Process (NNGP) Models for Large Data

Authors: Carlos Gonzales, Zaida Quiroz, Marcos Prates

Abstract:

Several spatial variables collected at the same location that share a common spatial distribution can be modeled simultaneously through a multivariate geostatistical model that takes into account the correlation between these variables and the spatial autocorrelation. The main goal of this model is to perform spatial prediction of these variables in the region of study. Here we focus on a geostatistical multivariate formulation that relies on sharing common spatial random effect terms. In particular, the first response variable can be modeled by a mean that incorporates a shared random spatial effect, while the other response variables depend on this shared spatial term, in addition to specific random spatial effects. Each spatial random effect is defined through a Gaussian process with a valid covariance function, but in order to improve the computational efficiency when the data are large, each Gaussian process is approximated to a Gaussian random Markov field (GRMF), specifically to the block nearest neighbor Gaussian process (Block-NNGP). This approach involves dividing the spatial domain into several dependent blocks under certain constraints, where the cross blocks allow capturing the spatial dependence on a large scale, while each individual block captures the spatial dependence on a smaller scale. The multivariate geostatistical model belongs to the class of Latent Gaussian Models; thus, to achieve fast Bayesian inference, it is used the integrated nested Laplace approximation (INLA) method. The good performance of the proposed model is shown through simulations and applications for massive data.

Keywords: Block-NNGP, geostatistics, gaussian process, GRMF, INLA, multivariate models.

Procedia PDF Downloads 97
952 BigCrypt: A Probable Approach of Big Data Encryption to Protect Personal and Business Privacy

Authors: Abdullah Al Mamun, Talal Alkharobi

Abstract:

As data size is growing up, people are became more familiar to store big amount of secret information into cloud storage. Companies are always required to need transfer massive business files from one end to another. We are going to lose privacy if we transmit it as it is and continuing same scenario repeatedly without securing the communication mechanism means proper encryption. Although asymmetric key encryption solves the main problem of symmetric key encryption but it can only encrypt limited size of data which is inapplicable for large data encryption. In this paper we propose a probable approach of pretty good privacy for encrypt big data using both symmetric and asymmetric keys. Our goal is to achieve encrypt huge collection information and transmit it through a secure communication channel for committing the business and personal privacy. To justify our method an experimental dataset from three different platform is provided. We would like to show that our approach is working for massive size of various data efficiently and reliably.

Keywords: big data, cloud computing, cryptography, hadoop, public key

Procedia PDF Downloads 320
951 Purple Spots on Historical Parchments: Confirming the Microbial Succession at the Basis of Biodeterioration

Authors: N. Perini, M. C. Thaller, F. Mercuri, S. Orlanducci, A. Rubechini, L. Migliore

Abstract:

The preservation of cultural heritage is one of the major challenges of today’s society, because of the fundamental right of future generations to inherit it as the continuity with their historical and cultural identity. Parchments, consisting of a semi-solid matrix of collagen produced from animal skin (i.e., sheep or goats), are a significant part of the cultural heritage, being used as writing material for many centuries. Due to their animal origin, parchments easily undergo biodeterioration. The most common biological damage is characterized by isolated or coalescent purple spots that often leads to the detachment of the superficial layer and the loss of the written historical content of the document. Although many parchments with the same biodegradative features were analyzed, no common causative agent has been found so far. Very recently, a study was performed on a purple-damaged parchment roll dated back 1244 A.D, the A.A. Arm. I-XVIII 3328, belonging to the oldest collection of the Vatican Secret Archive (Fondo 'Archivum Arcis'), by comparing uncolored undamaged and purple damaged areas of the same document. As a whole, the study gave interesting results to hypothesize a model of biodeterioration, consisting of a microbial succession acting in two main phases: the first one, common to all the damaged parchments, is characterized by halophilic and halotolerant bacteria fostered by the salty environment within the parchment maybe induced by bringing of the hides; the second one, changing with the individual history of each parchment, determines the identity of its colonizers. The design of this model was pivotal to this study, performed by different labs of the Tor Vergata University (Rome, Italy), in collaboration with the Vatican Secret Archive. Three documents, belonging to a collection of dramatically damaged parchments archived as 'Faldone Patrizi A 19' (dated back XVII century A.D.), were analyzed through a multidisciplinary approach, including three updated technologies: (i) Next Generation Sequencing (NGS, Illumina) to describe the microbial communities colonizing the damaged and undamaged areas, (ii) RAMAN spectroscopy to analyze the purple pigments, (iii) Light Transmitted Analysis (LTA) to evaluate the kind and entity of the damage to native collagen. The metagenomic analysis obtained from NGS revealed DNA sequences belonging to Halobacterium salinarum mainly in the undamaged areas. RAMAN spectroscopy detected pigments within the purple spots, mainly bacteriorhodopsine/rhodopsin-like pigments, a purple transmembrane protein containing retinal and present in Halobacteria. The LTA technique revealed extremely damaged collagen structures in both damaged and undamaged areas of the parchments. In the light of these data, the study represents a first confirmation of the microbial succession model described above. The demonstration of this model is pivotal to start any possible new restoration strategy to bring back historical parchments to their original beauty, but also to open opportunities for intervention on a huge amount of documents.

Keywords: biodeterioration, parchments, purple spots, ecological succession

Procedia PDF Downloads 171
950 Frequency of Occurrence Hybrid Watermarking Scheme

Authors: Hamza A. Ali, Adnan H. M. Al-Helali

Abstract:

Generally, a watermark is information that identifies the ownership of multimedia (text, image, audio or video files). It is achieved by introducing modifications into these files that are imperceptible to the human senses but easily recoverable by a computer program. These modifications are done according to a secret key in a descriptive model that would be either in the time domain or frequency domain or both. This paper presents a procedure for watermarking by mixing amplitude modulation with frequency transformation histogram; namely a specific value is used to modulate the intensity component Y of the YIQ components of the carrier image. This scheme is referred to as histogram embedding technique (HET). Results comparison with those of other techniques such as discrete wavelet transform (DWT), discrete cosine transform (DCT) and singular value decomposition (SVD) have shown an enhance efficiency in terms of ease and performance. It has manifested a good degree of robustness against various environment effects such as resizing, rotation and different kinds of noise. This method would prove very useful technique for copyright protection and ownership judgment.

Keywords: watermarking, ownership, copyright protection, steganography, information hiding, authentication

Procedia PDF Downloads 368
949 Internet of Health Things as a Win-Win Solution for Mitigating the Paradigm Shift inside Senior Patient-Physician Shared Health Management

Authors: Marilena Ianculescu, Adriana Alexandru

Abstract:

Internet of Health Things (IoHT) has already proved to be a persuasive means to support a proper assessment of the living conditions by collecting a huge variety of data. For a customized health management of a senior patient, IoHT provides the capacity to build a dynamic solution for sustaining the shift inside the patient-physician relationship by allowing a real-time and continuous remote monitoring of the health status, well-being, safety and activities of the senior, especially in a non-clinical environment. Thus, is created a win-win solution in which both the patient and the physician enhance their involvement and shared decision-making, with significant outcomes. Health monitoring systems in smart environments are becoming a viable alternative to traditional healthcare solutions. The ongoing “Non-invasive monitoring and health assessment of the elderly in a smart environment (RO-SmartAgeing)” project aims to demonstrate that the existence of complete and accurate information is critical for assessing the health condition of the seniors, improving wellbeing and quality of life in relation to health. The researches performed inside the project aim to highlight how the management of IoHT devices connected to the RO-SmartAgeing platform in a secure way by using a role-based access control system, can allow the physicians to provide health services at a high level of efficiency and accessibility, which were previously only available in hospitals. The project aims to identify deficient aspects in the provision of health services tailored to a senior patient’s specificity and to offer a more comprehensive perspective of proactive and preventive medical acts.

Keywords: health management, internet of health things, remote monitoring, senior patient

Procedia PDF Downloads 100
948 Redesigning Clinical and Nursing Informatics Capstones

Authors: Sue S. Feldman

Abstract:

As clinical and nursing informatics mature, an area that has gotten a lot of attention is the value capstone projects. Capstones are meant to address authentic and complex domain-specific problems. While capstone projects have not always been essential in graduate clinical and nursing informatics education, employers are wanting to see evidence of the prospective employee's knowledge and skills as an indication of employability. Capstones can be organized in many ways: a single course over a single semester, multiple courses over multiple semesters, as a targeted demonstration of skills, as a synthesis of prior knowledge and skills, mentored by one single person or mentored by various people, submitted as an assignment or presented in front of a panel. Because of the potential for capstones to enhance the educational experience, and as a mechanism for application of knowledge and demonstration of skills, a rigorous capstone can accelerate a graduate's potential in the workforce. In 2016, the capstone at the University of Alabama at Birmingham (UAB) could feel the external forces of a maturing Clinical and Nursing Informatics discipline. While the program had a capstone course for many years, it was lacking the depth of knowledge and demonstration of skills being asked for by those hiring in a maturing Informatics field. Since the program is online, all capstones were always in the online environment. While this modality did not change, other contributors to instruction modality changed. Pre-2016, the instruction modality was self-guided. Students checked in with a single instructor, and that instructor monitored progress across all capstones toward a PowerPoint and written paper deliverable. At the time, the enrollment was few, and the maturity had not yet pushed hard enough. By 2017, doubling enrollment and the increased demand of a more rigorously trained workforce led to restructuring the capstone so that graduates would have and retain the skills learned in the capstone process. There were three major changes: the capstone was broken up into a 3-course sequence (meaning it lasted about 10 months instead of 14 weeks), there were many chunks of deliverables, and each faculty had a cadre of about 5 students to advise through the capstone process. Literature suggests that the chunking, breaking up complex projects (i.e., the capstone in one summer) into smaller, more manageable chunks (i.e., chunks of the capstone across 3 semesters), can increase and sustain learning while allowing for increased rigor. By doing this, the teaching responsibility was shared across faculty with each semester course being taught by a different faculty member. This change facilitated delving much deeper in instruction and produced a significantly more rigorous final deliverable. Having students advised across the faculty seemed like the right thing to do. It not only shared the load, but also shared the success of students. Furthermore, it meant that students could be placed with an academic advisor who had expertise in their capstone area, further increasing the rigor of the entire capstone process and project and increasing student knowledge and skills.

Keywords: capstones, clinical informatics, health informatics, informatics

Procedia PDF Downloads 133
947 Exploring the Types of Infants and Toddlers' Reading Responses in Nursery Centers: A Qualitative Study

Authors: Ming Fang Hsieh

Abstract:

The purpose of this study was to investigate the reading responses of infants and toddlers across different contexts in nursery centers. The study adopted Sipe’s framework for children’s literacy education to explore the reading behavior of infants and toddlers. The study was conducted at two nurseries. The sample comprised 46 infants and toddlers and 6 caregivers. The methods of data collection included observation of various reading activities, including shared reading in a group, one-on-one reading, and unstructured reading activities, as well as interviews with caregivers. The data obtained through observations and interviews were transcribed and analyzed. The caregivers and the children’s parents signed an informed consent form before the start of the study. There was no risk anticipated during the course of the study. The analysis revealed five types of reading responses exhibited by the infants and toddlers: (1) linguistic- verbally responding to reading, repeating vocabulary, and answering questions; (2) affective- concentrating on reading or requesting for repeated reading, leaning on books, and gazing at caregivers; (3) explosive- children under 18 months were observed manipulating books through their bodies or different movements like flipping, rotating, or tapping on books; (4) social- during unstructured reading context, children were seen interacting with peers or following the rules of reading, sitting properly, and choosing one book at a time; and (5) distracted responses- paying attention to something else instead of reading, walking around, and playing, which was usually observed during shared reading in a group. The study concluded that children’s distraction and explosive reading behaviors may be a part of the process of their emergent reading behavior. As children develop, they demonstrate an increase in verbal responses, improved concentration, and better behavior. The study suggests that adults should continue to provide appropriate reading opportunities beginning from infancy to nurture children’s reading behaviors.

Keywords: reading response, infants and toddlers, early reading, picture books

Procedia PDF Downloads 108
946 Puerto Rico and Pittsburg: A Social Psychology Perspective on How Perceived Infringement on Job and Cultural Identity Unite Racially Different Working-Class Groups

Authors: Reagan Rodriguez

Abstract:

With a growing divide between political echo chambers in the United States, exacerbated by race and income inequality, it might seem to be unfathomable to draw connections that tie working class in an industrial city and a U.S. territory. Yet, in regions where either the economy has been hit due to dwindling job infrastructure or natural disasters have left indelible marks on an island already once marked by colonial imperialism, a larger social shared identity is at play. Fracking has long been an intergenerational and stable work opportunity for many in the Pittsburg PA, yet the rising severity of global climate change may soon impact the policy and even presidential elections which could result in the reduction of jobs in the industry. Cock-fighting, considered a cultural mainstay within the island of Puerto Rico, has already had legislation banning activity and thus cutting out one of the most lucrative aspects of a severely injured economy. Insecurity, infringement, and isolation while being tied to a working-class bracket with no other opportunities in proximity have left both groups expressing similar frustration and while another larger shared identity politic is giving little other options to develop social mobility. This paper utilizes a thematic analysis and compares convergent and divergent themes on internet forums amongst unionized fracking workers in Pittsburg and cockfighters in Puerto Rico. This research examines how group identity in relation to job and cultural identity is most strong and at which points its most malleable; when intergenerational job identity becomes a part of one’s cultural identity, its override may be strongest when it is perceived as threatened. Final findings and limitations were comprehensively outlined.

Keywords: identity threat, social psychology, group identity, culture and social mobility

Procedia PDF Downloads 150
945 Evaluation and Analysis of the Secure E-Voting Authentication Preparation Scheme

Authors: Nidal F. Shilbayeh, Reem A. Al-Saidi, Ahmed H. Alsswey

Abstract:

In this paper, we presented an evaluation and analysis of E-Voting Authentication Preparation Scheme (EV-APS). EV-APS applies some modified security aspects that enhance the security measures and adds a strong wall of protection, confidentiality, non-repudiation and authentication requirements. Some of these modified security aspects are Kerberos authentication protocol, PVID scheme, responder certificate validation, and the converted Ferguson e-cash protocol. Authentication and privacy requirements have been evaluated and proved. Authentication guaranteed only eligible and authorized voters were permitted to vote. Also, the privacy guaranteed that all votes will be kept secret. Evaluation and analysis of some of these security requirements have been given. These modified aspects will help in filtering the counter buffer from unauthorized votes by ensuring that only authorized voters are permitted to vote.

Keywords: e-voting preparation stage, blind signature protocol, Nonce based authentication scheme, Kerberos Authentication Protocol, pseudo voter identity scheme PVID

Procedia PDF Downloads 298
944 Whatsapp Messaging Platform and Academic Performance of Mass Communication Students, Abdu Gusau Polytechnic, Talata Mafara

Authors: Ibrahim Magaji

Abstract:

WhatsApp messaging platform brings about new opportunities for users to participate in unique storytelling experiences and audience engagement, particularly to Students of Mass communication who receive training to report events and issues accurately and objectively in accordance with official controls. Also, the complex nature of society today made it possible to use the WhatsApp platform that revolutionizes the means of sharing information, ideas, and experiences. This paper examined the WhatsApp messaging platform and how it influenced the academic performance of students in the Department of Mass Communication, Abdu Gusau Polytechnic, Talata Mafara. It used in-depth interview techniques and focus group discussion with students, as well as the use of published materials as well as unpublished materials to gather related and relevant data. Also, the paper used procedures involved to analyze long interview content. This procedure includes observation of a useful utterance, development of expanded observation, the examination of the interconnection of observed comments, collective scrutiny of observation for patterns and themes, and review and analysis of the themes across all interviews for development of the thesis. The result revealed that the majority of students used WhatsApp messenger for making friends and chatting. Also, the students experienced negative effects such as poor grammar and spelling, less study time, and poor academic performance because of active participation in the use of WhatsApp messaging platform. Surprisingly, there was a high addiction rate among students in the usage of WhatsApp messenger. However, other students experienced an improvement in their readings skills as a result of participation in the use of the platform. Also, students shared ideas, discussed, and shared examination questions among themselves on WhatsApp messenger.

Keywords: WhatsApp messenger, students, participation, group

Procedia PDF Downloads 131
943 A NoSQL Based Approach for Real-Time Managing of Robotics's Data

Authors: Gueidi Afef, Gharsellaoui Hamza, Ben Ahmed Samir

Abstract:

This paper deals with the secret of the continual progression data that new data management solutions have been emerged: The NoSQL databases. They crossed several areas like personalization, profile management, big data in real-time, content management, catalog, view of customers, mobile applications, internet of things, digital communication and fraud detection. Nowadays, these database management systems are increasing. These systems store data very well and with the trend of big data, a new challenge’s store demands new structures and methods for managing enterprise data. The new intelligent machine in the e-learning sector, thrives on more data, so smart machines can learn more and faster. The robotics are our use case to focus on our test. The implementation of NoSQL for Robotics wrestle all the data they acquire into usable form because with the ordinary type of robotics; we are facing very big limits to manage and find the exact information in real-time. Our original proposed approach was demonstrated by experimental studies and running example used as a use case.

Keywords: NoSQL databases, database management systems, robotics, big data

Procedia PDF Downloads 353
942 Empowering Learners: From Augmented Reality to Shared Leadership

Authors: Vilma Zydziunaite, Monika Kelpsiene

Abstract:

In early childhood and preschool education, play has an important role in learning and cognitive processes. In the context of a changing world, personal autonomy and the use of technology are becoming increasingly important for the development of a wide range of learner competencies. By integrating technology into learning environments, the educational reality is changed, promoting unusual learning experiences for children through play-based activities. Alongside this, teachers are challenged to develop encouragement and motivation strategies that empower children to act independently. The aim of the study was to reveal the changes in the roles and experiences of teachers in the application of AR technology for the enrichment of the learning process. A quantitative research approach was used to conduct the study. The data was collected through an electronic questionnaire. Participants: 319 teachers of 5-6-year-old children using AR technology tools in their educational process. Methods of data analysis: Cronbach alpha, descriptive statistical analysis, normal distribution analysis, correlation analysis, regression analysis (SPSS software). Results. The results of the study show a significant relationship between children's learning and the educational process modeled by the teacher. The strongest predictor of child learning was found to be related to the role of the educator. Other predictors, such as pedagogical strategies, the concept of AR technology, and areas of children's education, have no significant relationship with child learning. The role of the educator was found to be a strong determinant of the child's learning process. Conclusions. The greatest potential for integrating AR technology into the teaching-learning process is revealed in collaborative learning. Teachers identified that when integrating AR technology into the educational process, they encourage children to learn from each other, develop problem-solving skills, and create inclusive learning contexts. A significant relationship has emerged - how the changing role of the teacher relates to the child's learning style and the aspiration for personal leadership and responsibility for their learning. Teachers identified the following key roles: observer of the learning process, proactive moderator, and creator of the educational context. All these roles enable the learner to become an autonomous and active participant in the learning process. This provides a better understanding and explanation of why it becomes crucial to empower the learner to experiment, explore, discover, actively create, and foster collaborative learning in the design and implementation of the educational content, also for teachers to integrate AR technologies and the application of the principles of shared leadership. No statistically significant relationship was found between the understanding of the definition of AR technology and the teacher’s choice of role in the learning process. However, teachers reported that their understanding of the definition of AR technology influences their choice of role, which has an impact on children's learning.

Keywords: teacher, learner, augmented reality, collaboration, shared leadership, preschool education

Procedia PDF Downloads 40