Search results for: real-time voice encryption
491 Real Time Traffic Performance Study over MPLS VPNs with DiffServ
Authors: Naveed Ghani
Abstract:
With the arrival of higher speed communication links and mature application running over the internet, the requirement for reliable, efficient and robust network designs rising day by day. Multi-Protocol Label Switching technology (MPLS) Virtual Private Networks (VPNs) have committed to provide optimal network services. They are gaining popularity in industry day by day. Enterprise customers are moving to service providers that offer MPLS VPNs. The main reason for this shifting is the capability of MPLS VPN to provide built in security features and any-to-any connectivity. MPLS VPNs improved the network performance due to fast label switching as compare to traditional IP Forwarding but traffic classification and policing was still required on per hop basis to enhance the performance of real time traffic which is delay sensitive (particularly voice and video). QoS (Quality of service) is the most important factor to prioritize enterprise networks’ real time traffic such as voice and video. This thesis is focused on the study of QoS parameters (e.g. delay, jitter and MOS (Mean Opinion Score)) for the real time traffic over MPLS VPNs. DiffServ (Differentiated Services) QoS model will be used over MPLS VPN network to get end-to-end service quality.Keywords: network, MPLS, VPN, DiffServ, MPLS VPN, DiffServ QoS, QoS Model, GNS2
Procedia PDF Downloads 426490 The Evolution of Amazon Alexa: From Voice Assistant to Smart Home Hub
Authors: Abrar Abuzaid, Maha Alaaeddine, Haya Alesayi
Abstract:
This project is centered around understanding the usage and impact of Alexa, Amazon's popular virtual assistant, in everyday life. Alexa, known for its integration into devices like Amazon Echo, offers functionalities such as voice interaction, media control, providing real-time information, and managing smart home devices. Our primary focus is to conduct a straightforward survey aimed at uncovering how people use Alexa in their daily routines. We plan to reach out to a wide range of individuals to get a diverse perspective on how Alexa is being utilized for various tasks, the frequency and context of its use, and the overall user experience. The survey will explore the most common uses of Alexa, its impact on daily life, features that users find most beneficial, and improvements they are looking for. This project is not just about collecting data but also about understanding the real-world applications of a technology like Alexa and how it fits into different lifestyles. By examining the responses, we aim to gain a practical understanding of Alexa's role in homes and possibly in workplaces. This project will provide insights into user satisfaction and areas where Alexa could be enhanced to meet the evolving needs of its users. It’s a step towards connecting technology with everyday life, making it more accessible and user-friendlyKeywords: Amazon Alexa, artificial intelligence, smart speaker, natural language processing
Procedia PDF Downloads 60489 Evaluation of Fetal brain using Magnetic Resonance Imaging
Authors: Mahdi Farajzadeh Ajirlou
Abstract:
Ordinary fetal brain development can be considered by in vivo attractive reverberation imaging (MRI) from the 18th gestational week (GW) to term and depends fundamentally on T2-weighted and diffusion-weighted (DW) arrangements. The foremost commonly suspected brain pathologies alluded to fetal MRI for assist assessment are ventriculomegaly, lost corpus callosum, and anomalies of the posterior fossa. Brain division could be a crucial to begin with step in neuroimage examination. Within the case of fetal MRI it is especially challenging and critical due to the subjective introduction of the hatchling, organs that encompass the fetal head, and irregular fetal movement. A few promising strategies have been proposed but are constrained in their execution in challenging cases and in realtime division. Fetal MRI is routinely performed on a 1.5-Tesla scanner without maternal or fetal sedation. The mother lies recumbent amid the course of the examination, the length of which is ordinarily 45 to 60 minutes. The accessibility and continuous approval of standardizing fetal brain development directions will give critical devices for early discovery of impeded fetal brain development upon which to oversee high-risk pregnancies.Keywords: brain, fetal, MRI, imaging
Procedia PDF Downloads 77488 Finding a Paraguayan Voice: The Indigenous Language Guarani in Performances of Paraguayan Female Singers
Authors: Romy Martinez
Abstract:
This paper focuses on the use of the indigenous language Guarani in Paraguayan popular song and on some key interpreters born between the 1930s and 1980s. It analyses two representative musical genres of Paraguay, the Polka Paraguaya and Guarania. The lyrics of these genres follow one of four poetic-linguistic forms: to be entirely in Guarani, entirely in Spanish, bilingual (alternating verses in Guarani and Spanish), or in Jopará; the last being a form where words of both languages may be mixed in a single verse. Through these forms, the lyrics alternate and combine the indigenous voice with the one introduced with colonisation, in turn reflecting how Guarani seems to constantly transit, to and from, between a position of disdain and of value within Paraguayan society. Through analysing recordings of Polkas, Paraguayas, and Guaranias, it identifies three styles of singing adopted by female singers who include these genres in their repertoires, namely Paraguayan classical folk, Paraguayan folk, and Paraguayan pop-folk. This analysis is informed by a pilot study which consisted of online interviews with several Paraguayan artists, revealing significant aspects of their backgrounds and musical influences. In addition, it draws on autoethnographic approaches, building on the experience of the music researcher and singer. From a decolonising perspective, the paper brings together the distinctive voices and sounds expressed in popular songs from a marginalised country, language, and gender.Keywords: female singers, Guarani, Paraguayan song, performance
Procedia PDF Downloads 199487 The Reach, Influence, and Acceptance of International Media Institutions in Local Language Broadcasting in Africa: A Case Study of VOA, DW, and BBC Amharic Services in Ethiopia
Authors: Aster Misganaw
Abstract:
This study investigates the reach, influence, and credibility of international broadcasters—specifically Voice of America (VOA), Deutsche Welle (DW), and British Broadcasting Corporation (BBC)—among Ethiopian audiences, comparing these perceptions to local media sources. Utilizing a mixed-methods approach that included quantitative surveys and qualitative interviews, the research reveals that the majority of respondents engage regularly with international broadcasters, with younger audiences showing a marked preference. Findings indicate that most of the participants perceive these international sources as more credible than local media, largely due to concerns over government influence on local reporting. Furthermore, the study finds that the majority of respondents believe international broadcasters significantly shape their understanding of both domestic and international issues, highlighting their critical role in public discourse. To enhance their relevance, it is recommended that international broadcasters incorporate more localized content while local media must work to improve their credibility and independence to better serve the Ethiopian public. This research contributes to the understanding of media consumption dynamics in Ethiopia, emphasizing the interplay between local and international narratives in shaping public opinion.Keywords: international media, BBC, Deutsche Welle, Ethiopian media, Voice of America, audience
Procedia PDF Downloads 12486 Development of Internet of Things (IoT) with Mobile Voice Picking and Cargo Tracing Systems in Warehouse Operations of Third-Party Logistics
Authors: Eugene Y. C. Wong
Abstract:
The increased market competition, customer expectation, and warehouse operating cost in third-party logistics have motivated the continuous exploration in improving operation efficiency in warehouse logistics. Cargo tracing in ordering picking process consumes excessive time for warehouse operators when handling enormous quantities of goods flowing through the warehouse each day. Internet of Things (IoT) with mobile cargo tracing apps and database management systems are developed this research to facilitate and reduce the cargo tracing time in order picking process of a third-party logistics firm. An operation review is carried out in the firm with opportunities for improvement being identified, including inaccurate inventory record in warehouse management system, excessive tracing time on stored products, and product misdelivery. The facility layout has been improved by modifying the designated locations of various types of products. The relationship among the pick and pack processing time, cargo tracing time, delivery accuracy, inventory turnover, and inventory count operation time in the warehouse are evaluated. The correlation of the factors affecting the overall cycle time is analysed. A mobile app is developed with the use of MIT App Inventor and the Access management database to facilitate cargo tracking anytime anywhere. The information flow framework from warehouse database system to cloud computing document-sharing, and further to the mobile app device is developed. The improved performance on cargo tracing in the order processing cycle time of warehouse operators have been collected and evaluated. The developed mobile voice picking and tracking systems brings significant benefit to the third-party logistics firm, including eliminating unnecessary cargo tracing time in order picking process and reducing warehouse operators overtime cost. The mobile tracking device is further planned to enhance the picking time and cycle count of warehouse operators with voice picking system in the developed mobile apps as future development.Keywords: warehouse, order picking process, cargo tracing, mobile app, third-party logistics
Procedia PDF Downloads 373485 Indian Brands Speak Through Colors That Is ‘Culturally Vibrant’
Authors: Ranjana Dani
Abstract:
Brand communication narratives in India has evolved today to reflect the vibrant and intriguing tone of voice inspired by a rich cultural heritage while addressing the culturally alert attitude of the contemporary global Indian. Brands are strongly associated with the organization's values, vision, and mission and portray this through specific ‘look and feel’ and ‘tone of voice’. It is within the brand’s visual language that COLOUR has evolved to become a most powerful weapon in the designer’s arsenal. Color is big business in Brand Design! A brand is a ‘collection of perceptions’, meaningful brand connect is about striving to occupy head and heart space in consumers. The persona of the young Indian reflects a deep attachment to cultural roots as seen through the characteristic of ‘Indie Pride,’ blended with the ambitious, aspirational traits of a modern ‘global citizen’.Studies on ‘Color Perceptions’ indicate a trend that amplifies this, and hence brands reflect a GLOCAL palette, a Global and Local Blend. This paper establishes this through case studies that expand the inspirations, selection processes, and use of innovative color palettes crafted by some dynamic brand designers. This throws light on the role of color as it generates visual impact and recall for successful brands.Keywords: colour palettes, brand design and business, cultural context, colour perceptions, glocal, contemporaneity
Procedia PDF Downloads 73484 Engendered Noises: The Gender Politics of Sensorial Pleasure in Neoliberal Korean Food Commercials
Authors: Eunyup Yeom
Abstract:
The roles of male and female in context of cuisine have developed into stereotypes throughout history. However¬— with Korea’s fast advancement in politics, technology, society and social standards¬— gender stereotypes have become blurred. This is not to say that such stereotypes no longer exist for they still remain present in media and advertisements embedding ‘idealistic’ ideas into the unconscious state of minds of viewers. Many media outlets, especially commercials, portray males expressing pleasure of food [that they are advertising] through audible qualities generally considered ‘rude’ and ‘unmannered’ in the Korean society. Females, on the other hand, express such pleasures only verbally. This happenstance of a stereotype is displayed bluntly in instant noodle, namely ramen, commercials. This research explores the cultural significance of a type of audible gesture that can be found in Korean speech in which is termed the Fricative Voice Gesture (FVG). There are two forms of FVGs: the reactive and the prosodic. The reactive FVG is a legitimate form of expression while the prosodic FVG works as a speech intensifier. So, in order to understand this stereotype of who is authorized to express sensorial pleasure as a reactive FVG as opposed to a prosodic FVG, information has been extracted from interviews and dissected numerous ramen/instant noodle commercials and its appearances in other mediums of media. The commercials were tediously analyzed in all aspects of dialogue, featured contents, background music, actors and/or actresses selling the product, body language, and voice gestures. To effectively understand the exact impact these commercials have on the audience, each commercial was viewed with an interviewee. In this research, there were main informants whom were all Korean students residing in South Korea. All three interviewees were able to attend interview and commercial viewing sessions via Skype. This research, overall, focuses and concludes on Harkness’s statement of how the reactive FVG is a recognizable index of the privileging of males for Korean culture norms and, in parallel, food commercials are still conforming to male ideals and fantasies.Keywords: advertisement, food politics, fricative voice gestures, gender politics
Procedia PDF Downloads 225483 Critical Thinking and Academic Writing: A Case Study
Authors: Mubina Rauf
Abstract:
Critical thinking is a highly valued outcome of university education. There is an agreement in literature that it is demonstrated through the abilities to highlight issues and assumptions, find links between ideas and concepts, make correct inferences, evaluate evidence or authority and deduce conclusions (Tsui, 2002). Although Critical thinking plays a significant role in developing all academic skills, its role in developing writing skills is significant (Kurfiss, 1988). SAW (student academic writing) is an observable output of critical thinking (Wilson K. , 2016). When students apply critical thinking to their writing, they present clear, accurate, significant and logical arguments constructing their own voice in the form of an essay or dissertation (Matsuda, 2001). This presentation will show how a rubric can be used to find evidence of critical thinking in SAW. Participants will experience how evidence-based written arguments supported by background knowledge and authorial voice can develop students into efficient critical thinkers. Participants will have an opportunity to use the rubric to find the evidence of critical thinking in SAW samples. This presentation is intended for classroom teachers with or without the basic knowledge of implementing critical thinking in academic settings. Participants will also learn tips how various features of critical thinking can be developed among students. After the session, the participants will be able to use or adapt the rubric according to their needs to find evidence of critical thinking in SAW within their context.Keywords: critical thinking, Rubric, student academic writing, argumentation, text analysis
Procedia PDF Downloads 71482 An Intelligent Text Independent Speaker Identification Using VQ-GMM Model Based Multiple Classifier System
Authors: Ben Soltane Cheima, Ittansa Yonas Kelbesa
Abstract:
Speaker Identification (SI) is the task of establishing identity of an individual based on his/her voice characteristics. The SI task is typically achieved by two-stage signal processing: training and testing. The training process calculates speaker specific feature parameters from the speech and generates speaker models accordingly. In the testing phase, speech samples from unknown speakers are compared with the models and classified. Even though performance of speaker identification systems has improved due to recent advances in speech processing techniques, there is still need of improvement. In this paper, a Closed-Set Tex-Independent Speaker Identification System (CISI) based on a Multiple Classifier System (MCS) is proposed, using Mel Frequency Cepstrum Coefficient (MFCC) as feature extraction and suitable combination of vector quantization (VQ) and Gaussian Mixture Model (GMM) together with Expectation Maximization algorithm (EM) for speaker modeling. The use of Voice Activity Detector (VAD) with a hybrid approach based on Short Time Energy (STE) and Statistical Modeling of Background Noise in the pre-processing step of the feature extraction yields a better and more robust automatic speaker identification system. Also investigation of Linde-Buzo-Gray (LBG) clustering algorithm for initialization of GMM, for estimating the underlying parameters, in the EM step improved the convergence rate and systems performance. It also uses relative index as confidence measures in case of contradiction in identification process by GMM and VQ as well. Simulation results carried out on voxforge.org speech database using MATLAB highlight the efficacy of the proposed method compared to earlier work.Keywords: feature extraction, speaker modeling, feature matching, Mel frequency cepstrum coefficient (MFCC), Gaussian mixture model (GMM), vector quantization (VQ), Linde-Buzo-Gray (LBG), expectation maximization (EM), pre-processing, voice activity detection (VAD), short time energy (STE), background noise statistical modeling, closed-set tex-independent speaker identification system (CISI)
Procedia PDF Downloads 306481 Intrusion Detection Techniques in NaaS in the Cloud: A Review
Authors: Rashid Mahmood
Abstract:
The network as a service (NaaS) usage has been well-known from the last few years in the many applications, like mission critical applications. In the NaaS, prevention method is not adequate as the security concerned, so the detection method should be added to the security issues in NaaS. The authentication and encryption are considered the first solution of the NaaS problem whereas now these are not sufficient as NaaS use is increasing. In this paper, we are going to present the concept of intrusion detection and then survey some of major intrusion detection techniques in NaaS and aim to compare in some important fields.Keywords: IDS, cloud, naas, detection
Procedia PDF Downloads 318480 The Development, Composition, and Implementation of Vocalises as a Method of Technical Training for the Adult Musical Theatre Singer
Authors: Casey Keenan Joiner, Shayna Tayloe
Abstract:
Classical voice training for the novice singer has long relied on the guidance and instruction of vocalise collections, such as those written and compiled by Marchesi, Lütgen, Vaccai, and Lamperti. These vocalise collections purport to encourage healthy vocal habits and instill technical longevity in both aspiring and established singers, though their scope has long been somewhat confined to the classical idiom. For pedagogues and students specializing in other vocal genres, such as musical theatre and CCM (contemporary commercial music,) low-impact and pertinent vocal training aids are in short supply, and much of the suggested literature derives from classical methodology. While the tenants of healthy vocal production remain ubiquitous, specific stylistic needs and technical emphases differ from genre to genre and may require a specified extension of vocal acuity. As musical theatre continues to grow in popularity at both the professional and collegiate levels, the need for specialized training grows as well. Pedagogical literature geared specifically towards musical theatre (MT) singing and vocal production, while relatively uncommon, is readily accessible to the contemporary educator. Practitioners such as Norman Spivey, Mary Saunders Barton, Claudia Friedlander, Wendy Leborgne, and Marci Rosenberg continue to publish relevant research in the field of musical theatre voice pedagogy and have successfully identified many common MT vocal faults, their subsequent diagnoses, and their eventual corrections. Where classical methodology would suggest specific vocalises or training exercises to maintain corrected vocal posture following successful fault diagnosis, musical theatre finds itself without a relevant body of work towards which to transition. By analyzing the existing vocalise literature by means of a specialized set of parameters, including but not limited to melodic variation, rhythmic complexity, vowel utilization, and technical targeting, we have composed a set of vocalises meant specifically to address the training and conditioning of adult musical theatre voices. These vocalises target many pedagogical tenants in the musical theatre genre, including but not limited to thyroarytenoid-dominant production, twang resonance, lateral vowel formation, and “belt-mix.” By implementing these vocalises in the musical theatre voice studio, pedagogues can efficiently communicate proper musical theatre vocal posture and kinesthetic connection to their students, regardless of age or level of experience. The composition of these vocalises serves MT pedagogues on both a technical level as well as a sociological one. MT is a relative newcomer on the collegiate stage and the academization of musical theatre methodologies has been a slow and arduous process. The conflation of classical and MT techniques and training methods has long plagued the world of voice pedagogy and teachers often find themselves in positions of “cross-training,” that is, teaching students of both genres in one combined voice studio. As MT continues to establish itself on academic platforms worldwide, genre-specific literature and focused studies are both rare and invaluable. To ensure that modern students receive exacting and definitive training in their chosen fields, it becomes increasingly necessary for genres such as musical theatre to boast specified literature and a collection of musical theatre-specific vocalises only aids in this effort. This collection of musical theatre vocalises is the first of its kind and provides genre-specific studios with a basis upon which to grow healthy, balanced voices built for the harsh conditions of the modern theatre stage.Keywords: voice pedagogy, targeted methodology, musical theatre, singing
Procedia PDF Downloads 155479 Participation in Decision Making and Work Outcomes: The Moderating Role of Ethical Climate
Authors: Ali Muhammad
Abstract:
The study examines the consequences of decision making in Kuwait work organization. The framework used in this study proposes that participation in decision making improves organizational ethical climate, which in turn increases employee’s trust in supervisor and trust in the organization. Furthermore, the model suggests that allowing employees to voice their opinions positively effects their perceptions of organizational justice. Providing employees with the opportunity to participate in decision making (voice), enhances their perceptions of the fairness of those decisions. Allowing employees to express their opinions and feeling about decisions being made show that the organization respect appreciates their views. This feeling of respect and appreciation reflects positively on employee’s perception of justice. Survey data were collected from a sample of 292 employees working in Kuwaiti work organizations. Pearson correlation, non-parametric tests, and structural equation models were used to analyze the data. Results of the analysis show that participation in decision making enhances employee perception of ethical climate, which in turn increases perception organizational justice and organizational trust. Implications of the findings and directions for future research are discussed.Keywords: participation in decision making, organizational trust, trust in supervisor, organizational justice, ethical climate
Procedia PDF Downloads 112478 Multimodal Biometric Cryptography Based Authentication in Cloud Environment to Enhance Information Security
Authors: D. Pugazhenthi, B. Sree Vidya
Abstract:
Cloud computing is one of the emerging technologies that enables end users to use the services of cloud on ‘pay per usage’ strategy. This technology grows in a fast pace and so is its security threat. One among the various services provided by cloud is storage. In this service, security plays a vital factor for both authenticating legitimate users and protection of information. This paper brings in efficient ways of authenticating users as well as securing information on the cloud. Initial phase proposed in this paper deals with an authentication technique using multi-factor and multi-dimensional authentication system with multi-level security. Unique identification and slow intrusive formulates an advanced reliability on user-behaviour based biometrics than conventional means of password authentication. By biometric systems, the accounts are accessed only by a legitimate user and not by a nonentity. The biometric templates employed here do not include single trait but multiple, viz., iris and finger prints. The coordinating stage of the authentication system functions on Ensemble Support Vector Machine (SVM) and optimization by assembling weights of base SVMs for SVM ensemble after individual SVM of ensemble is trained by the Artificial Fish Swarm Algorithm (AFSA). Thus it helps in generating a user-specific secure cryptographic key of the multimodal biometric template by fusion process. Data security problem is averted and enhanced security architecture is proposed using encryption and decryption system with double key cryptography based on Fuzzy Neural Network (FNN) for data storing and retrieval in cloud computing . The proposing scheme aims to protect the records from hackers by arresting the breaking of cipher text to original text. This improves the authentication performance that the proposed double cryptographic key scheme is capable of providing better user authentication and better security which distinguish between the genuine and fake users. Thus, there are three important modules in this proposed work such as 1) Feature extraction, 2) Multimodal biometric template generation and 3) Cryptographic key generation. The extraction of the feature and texture properties from the respective fingerprint and iris images has been done initially. Finally, with the help of fuzzy neural network and symmetric cryptography algorithm, the technique of double key encryption technique has been developed. As the proposed approach is based on neural networks, it has the advantage of not being decrypted by the hacker even though the data were hacked already. The results prove that authentication process is optimal and stored information is secured.Keywords: artificial fish swarm algorithm (AFSA), biometric authentication, decryption, encryption, fingerprint, fusion, fuzzy neural network (FNN), iris, multi-modal, support vector machine classification
Procedia PDF Downloads 259477 ‘A Ghost of One’s Own’: Spectral Intrusions and Trauma in the Poetry of Joanna Baillie and Anne Bannerman
Authors: Elli Karampela
Abstract:
In Specters of Marx (1993), Jacques Derrida refers to the ghost as an Other presence that occupies the space of the self and emanates from there, haunting in its shadowy pastness and threatening/striving to break free. In times of change, ghosts both reflect the dissolution of set principles and voice traumas of the past that create a sense of fear and instability. This paper observes the way female ghosts create connections with the living in the poetry of Joanna Baillie and Anne Bannerman, both integral, albeit under-researched in different ways, writers of the English Romantic period working in the aftermath of the French Revolution. Especially at the beginning of the nineteenth century, when ghost narratives were devoured by readers and enjoyed as stories that re-awakened sensation in times of revolution, there was at the same time fear of intrusion by terror’s unruly forces that threatened to turn the readers restless. The ghost was particularly dangerous because it was associated with memory and the intrusion of past trauma in the here and now. As will be seen, both Baillie and Bannerman explore the idea of the female ghost’s ‘return’ (a Freudian term that will be approached) which breaks both time and space boundaries to raise the suppressed female voice, threaten stability, and correct wrongs. As a result, the varied manifestations of female ghosts render Baillie and Bannerman active in the contemporary discourse about human rights and the reclamation of the agency.Keywords: poetry, romanticism, spectrality, trauma, women
Procedia PDF Downloads 207476 Critical Discourse Analysis of Xenophobia in UK Political Party Blogs
Authors: Nourah Almulhim
Abstract:
This paper takes a critical discourse analysis (CDA) approach to investigate discourse and ideology in political blogs, focusing in particular on the Conservative Home blog from the UK’s current governing party. The Conservative party member’s discourse strategies as the blogger, alongside the discourse used by members of the public who reply to the blog in the below-the-lines comments, will be examined. The blog discourse reflects the writer's political identity and authorial voice. The analysis of the below-the-lines comments enables members of the public to engage in creating adversative positions, introducing different language users who bring their own individual and collective identities. These language users can play the role of news reporters, political analysts, protesters or supporters of a specific agenda and current socio-political topics or events. This study takes a qualitative approach to analyze the discriminatory context towards Islam/Muslims in ' The Conservative Home' blog. A cognitive approach is adopted and an analysis of dominant discourses in the blog text and the below-the-line comments is used. The focus of the study is, firstly, on the construction of self/ collective national identity in comparison to Muslim identity, highlighting the in-group and out-group construction. Second, the type of attitudes, whether feelings or judgments, related to these social actors as they are explicated to draw on the social values. Third, the role of discursive strategies in justifying and legitimizing those Islamophobic discriminatory practices. Therefore, the analysis is based on the systematic analysis of social actors drawing on actors, actions, and arguments to explicate identity construction and its development in the different discourses. A socio-semantic categorization of social actors is implemented to draw on the discursive strategies in addition to using literature to understand these strategies. An appraisal analysis is further used to classify attitudes and elaborate on core values in both genres. Finally, the grammar of othering is applied to explain how discriminatory dichotomies of 'Us' Vs. ''Them' actions are carried in discourse. Some of the key findings of the analysis can be summarized in two main points. First, the discursive practice used to represent Muslims/Islam as different from ‘Us’ are different in both genres as the blogger uses a covert voice while the commenters generally use an overt voice. This is to say that the blogger uses a mitigated strategy to represent the Muslim identity, for example, using the noun phrase ‘British Muslim’ but then representing them as ‘radical’ and ‘terrorists'. Contrary to this is in below the lines comments, where a direct strategy with an active declarative voice is used to negatively represent the Muslim identity as ‘oppressors’ and ‘terrorists’ with no inclusion of the noun phrase ‘British Muslims’. Second, the negotiation of the ‘British’ identity and values, such as culture and democracy, are prominent in the comment section as being unique and under threat by Muslims, while in the article, these standpoints are not represented.Keywords: xenophobia, blogs, identity, critical discourse analysis
Procedia PDF Downloads 92475 Decoding Gender Disparities in AI: An Experimental Exploration Within the Realm of AI and Trust Building
Authors: Alexander Scott English, Yilin Ma, Xiaoying Liu
Abstract:
The widespread use of artificial intelligence in everyday life has triggered a fervent discussion covering a wide range of areas. However, to date, research on the influence of gender in various segments and factors from a social science perspective is still limited. This study aims to explore whether there are gender differences in human trust in AI for its application in basic everyday life and correlates with human perceived similarity, perceived emotions (including competence and warmth), and attractiveness. We conducted a study involving 321 participants using a two-subject experimental design with a two-factor (masculinized vs. feminized voice of the AI) multiplied by a two-factor (pitch level of the AI's voice) between-subject experimental design. Four contexts were created for the study and randomly assigned. The results of the study showed significant gender differences in perceived similarity, trust, and perceived emotion of the AIs, with females rating them significantly higher than males. Trust was higher in relation to AIs presenting the same gender (e.g., human female to female AI, human male to male AI). Mediation modeling tests indicated that emotion perception and similarity played a sufficiently mediating role in trust. Notably, although trust in AIs was strongly correlated with human gender, there was no significant effect on the gender of the AI. In addition, the study discusses the effects of subjects' age, job search experience, and job type on the findings.Keywords: artificial intelligence, gender differences, human-robot trust, mediation modeling
Procedia PDF Downloads 43474 reconceptualizing the place of empire in european women’s travel writing through the lens of iberian texts
Authors: Gayle Nunley
Abstract:
Between the mid-nineteenth and early twentieth century, a number of Western European women broke with gender norms of their time and undertook to write and publish accounts of their own international journeys. In addition to contributing to their contemporaries’ progressive reimagining of the space and place of female experience within the public sphere, these often orientalism-tinged texts have come to provide key source material for the analysis of gendered voice in the narration of Empire, particularly with regard to works associated with Europe’s then-ascendant imperial powers, Britain and France. Incorporation of contemporaneous writings from the once-dominant Empires of Iberian Europe introduces an important additional lens onto this process. By bringing to bear geographic notions of placedness together with discourse analysis, the examination of works by Iberian Europe’s female travelers in conjunction with those of their more celebrated Northern European peers reveals a pervasive pattern of conjoined belonging and displacement traceable throughout the broader corpus, while also underscoring the insufficiency of binary paradigms of gendered voice. The re-situating of women travelers’ participation in the European imperial project to include voices from the Iberian south creates a more robust understanding of these writers’ complex, and often unexpectedly modern, engagement with notions of gender, mobility, ‘otherness’ and contact-zone encounter acted out both within and against the imperial paradigm.Keywords: colonialism, orientalism, Spain, travel writing, women travelers
Procedia PDF Downloads 111473 On Privacy-Preserving Search in the Encrypted Domain
Authors: Chun-Shien Lu
Abstract:
Privacy-preserving query has recently received considerable attention in the signal processing and multimedia community. It is also a critical step in wireless sensor network for retrieval of sensitive data. The purposes of privacy-preserving query in both the areas of signal processing and sensor network are the same, but the similarity and difference of the adopted technologies are not fully explored. In this paper, we first review the recently developed methods of privacy-preserving query, and then describe in a comprehensive manner what we can learn from the mutual of both areas.Keywords: encryption, privacy-preserving, search, security
Procedia PDF Downloads 254472 Character Bioacoustics White-Rumped Shama Copsychus malabaricus as a Cage-Bird
Authors: Novia Liza Rahmawaty, Wilson Novarino, Muhammad Nazri Janra
Abstract:
Indonesian people love to keep songbird in cage to be competed, such as White-rumped Shama (Copsychus malabaricus). Each individual White-rumped Shama will be pitted their song and try to imitate the rhythm of the enemy with its songs. This study was conducted to see the natural song characters of White-rumped Shama and song character from birds that had been trained and comparison in three different places in West Sumatra. Individuals were recorded totaling 30 individuals in three areas in West Sumatra namely Padang, Solok and Pariaman and sound recordings of White-rumped Shama in nature were taken in HBW and Xenocanto website. Research has done conducted from June to October 2016 at place group practice of birdsongs and recorded at 16:00 to 18:00 pm. These voices were analyzed by Avisoft SAS-Lab Lite inform of oscillogram and sonogram. Measured parameters included: the length of voice, repertoire size, number of syllable type, syllable repertoire, and song repertoire. The results showed that repertoire composition of White-rumped Shama in nature less than the sound which was trained and has repeat songs composed by the same type of repertoire composition. Comparison of song character White-rumped Shama in three different places in West Sumatra, those birds in Solok had the best quality of voice or song than Padang and Pariaman. It showed by higher repertoire composition in Solok.Keywords: repertoire composition, song characters, songbird, white-rumped shama
Procedia PDF Downloads 326471 Use of Personal Rhythm to Authenticate Encrypted Messages
Authors: Carlos Gonzalez
Abstract:
When communicating using private and secure keys, there is always the doubt as to the identity of the message creator. We introduce an algorithm that uses the personal typing rhythm (keystroke dynamics) of the message originator to increase the trust of the authenticity of the message originator by the message recipient. The methodology proposes the use of a Rhythm Certificate Authority (RCA) to validate rhythm information. An illustrative example of the communication between Bob and Alice and the RCA is included. An algorithm of how to communicate with the RCA is presented. This RCA can be an independent authority or an enhanced Certificate Authority like the one used in public key infrastructure (PKI).Keywords: authentication, digital signature, keystroke dynamics, personal rhythm, public-key encryption
Procedia PDF Downloads 303470 Intrusion Detection Techniques in Mobile Adhoc Networks: A Review
Authors: Rashid Mahmood, Muhammad Junaid Sarwar
Abstract:
Mobile ad hoc networks (MANETs) use has been well-known from the last few years in the many applications, like mission critical applications. In the (MANETS) prevention method is not adequate as the security concerned, so the detection method should be added to the security issues in (MANETs). The authentication and encryption is considered the first solution of the MANETs problem where as now these are not sufficient as MANET use is increasing. In this paper we are going to present the concept of intrusion detection and then survey some of major intrusion detection techniques in MANET and aim to comparing in some important fields.Keywords: MANET, IDS, intrusions, signature, detection, prevention
Procedia PDF Downloads 377469 A Functional Analysis of a Political Leader in Terms of Marketing
Authors: Aşina Gülerarslan, M. Faik Özdengül
Abstract:
The new economic, social and political world order has led to the emergence of a wide range of persuasion strategies and practices based on an ever expanding marketing axis that involves organizations, ideas and persons as well as products and services. It is seen that since the 1990's, a wide variety of competitive marketing ideas have been offered systematically to target audiences in the field of politics as in other fields. When the components of marketing are taken into consideration, all kinds of communication efforts involving “political leaders”, who are conceptualized as products in terms of political marketing, serve a process of social persuasion, which cannot be restricted to election periods only, and a manageable “image”. In this context, image, which is concerned with how the political product is perceived, involves not only the political discourses shared with the public but also all kinds of biographical information about the leader, the leader’s specific way of living and routines and his/her attitudes and behaviors in their private lives, and all these are regarded as components of the “product image”. While on the one hand the leader’s verbal or supra-verbal references serve the way the “spirit of the product” is perceived –just as in brand positioning- they also show their self-esteem levels, in other words how they perceive themselves on the other hand. Indeed, their self-esteem levels are evaluated in three fundamental categories in the “Functional Analysis”, namely parent, child and adult, and it is revealed that the words, tone of voice and body language a person uses makes it easy to understand at what self-esteem level that person is. In this context, words, tone of voice and body language, which provide important clues as to the “self” of the person, are also an indication of how political leaders evaluate both “themselves” and “the mass/audience” in the communication they establish with their audiences. When the matter is taken from the perspective of Turkey, the levels of self-esteem in the relationships that the political leaders establish with the masses are also important in revealing how our society is seen from the perspective of a specific leader. Since the leader is a part of the marketing strategy of a political party as a product, this evaluation is significant in terms of the forms of relationships between political institutions in our country with the society. In this study, the self-esteem level in the documentary entitled “Master’s Story”, where Recep Tayyip Erdoğan’s life history is told, is analyzed in the context of words, tone of voice and body language. Within the scope of the study, at what level of self-esteem Recep Tayyip Erdoğan was in the “Master’s Story”, a documentary broadcast on Beyaz TV, was investigated using the content analysis method. First, based on the Functional Analysis Literature, a transactional approach scale was created regarding parent, adult and child self-esteem levels. On the basis of this scale, the prime minister’s self-esteem level was determined in three basic groups, namely “tone of voice”, “the words he used” and “body language”. Descriptive analyses were made to the data within the framework of these criteria and at what self-esteem level the prime minister spoke throughout the documentary was revealed.Keywords: political marketing, leader image, level of self-esteem, transactional approach
Procedia PDF Downloads 334468 Ariettes Oublieés of Claude Debussy: An Interpretive Approach of Two Songs of the Composer’s Compilation through a Comparative Study of Four Contemporary Recordings
Authors: Giannaki Natalia
Abstract:
This study examines the songs compilation of Claude Debussy Ariettes Oublieés for voice and piano and especially the songs C’est l’extase langoureuse and Chevaux des bois of the compilation in order to present some interpretational suggestions for the singer and the piano accompanist for a more complete knowledge of the style of French singing of this period. First, the historical frame of the French song (in which this compilation is integrated) is introduced, as well as the historical frame of this work, and then, the most predominant interpretational parameters of the impressionistic French song are presented from testimonies of Claude Debussy and his contemporaries. Moreover, a brief analysis of the verses that turned into music by Debussy from the collection of poems by the famous French poet Paul Verlaine for subsequent interpretative suggestions is integrated into the research. The purpose of this work is not to elucidate the work from a harmonic or morphological point of view. Instead, this research primarily attempts to delve into performance issues through a comparison of four contemporary recordings of the work, from which it will be proved whether the principles of impressionism that were established are respected and how they affect these songs, as well as how much the personal viewpoint of each interpreter intervenes. The latter intends to fill the research gap in the interpretation of Debussy's songs and to guide the performers. To conclude, it will be discovered whether there is any recording closest to a French song’s interpretation principles and how a complete interpretation of a French song should be.Keywords: Ariettes Oublieés, Claude Debussy, comparison, French song, impressionism, interpretation, performance practice, music performance, piano, recordings, singing, voice
Procedia PDF Downloads 92467 Computer Science, Mass Communications, and Social Entrepreneurship: An Interdisciplinary Approach to Teaching Interactive Storytelling for the Greater Good
Authors: Susan Cardillo
Abstract:
This research will consider ways to bridge the gap between Computer Science and Media Communications and while doing so create Social Entrepreneurship for student success. New Media, as it has been referred to, is considered content available on-demand through Internet, a digital device, usually containing some kind of interactivity and creative participation. It is the interplay between technology, images, media and communications. The next generation of the newspaper, radio, television, and film students need to have a working knowledge of the technologies that are available for the creation of their work and taught to use this knowledge to create a voice. The work is interdisciplinary; in communications, we understand the necessity of reporting and disseminating information. In documentary film we understand the instructional and historic aspects of media and technology and in the non-profit sector, we see the need for expanding outlets for good. So, the true necessity is to utilize ‘new media’ technologies to advance social causes while reporting information, teaching and creating art. Goals: The goal of this research is to give communications students a better understanding of the technology that is both, currently at their disposal, and on the horizon, so that they can use it in their media, communications and art endeavors to be a voice for their generation. There is no longer a need to be a computer scientist to have a working knowledge of communication technologies and how they will benefit our work. There are many free and easy to use applications available for the creation of interactive communications. Methodology: This is Qualitative-Case Study that puts these ideas into action. There is a survey at the end of the experiment that is qualitative in nature and allows for the participants to share ideas and feelings about the technology and approach.Keywords: interactive storytelling, web documentary, mass communications, teaching
Procedia PDF Downloads 278466 Security Threats on Wireless Sensor Network Protocols
Authors: H. Gorine, M. Ramadan Elmezughi
Abstract:
In this paper, we investigate security issues and challenges facing researchers in wireless sensor networks and countermeasures to resolve them. The broadcast nature of wireless communication makes Wireless Sensor Networks prone to various attacks. Due to resources limitation constraint in terms of limited energy, computation power and memory, security in wireless sensor networks creates different challenges than wired network security. We will discuss several attempts at addressing the issues of security in wireless sensor networks in an attempt to encourage more research into this area.Keywords: wireless sensor networks, network security, light weight encryption, threats
Procedia PDF Downloads 523465 A Case Study Approach on Co-Constructing the Idea of 'Safety' with Children
Authors: Beng Zhen Yeow
Abstract:
In most work that involves children, the voice of the children is often not heard. This is ironic since a lot of discussions might involve their welfare and safety. It might seem natural that the professionals should hear from them about what they wish for instead of deciding what is best for them. However, this, unfortunately, might be more the exception than the norm in most case and hence in many instances, children are merely 'subjects' in conversations about safety instead of active participants in the construction or creation of safety in the family. There might be many reasons why it does not happen in our work. Firstly, professionals have learnt how to 'socialise' into their professional roles and hence in the process become 'un-childlike'. Secondly, there is also a lack of professional training with regards to how to talk with children. Finally, there might be also a lack of concrete tools and techniques that are developed to facilitate the process. In this paper, the case study method is used to show how the idea of safety could be concretised and discussed with children and their family members, and hence making them active participants and co-creators of their own safety. Specific skills and techniques are highlighted through the case study. In this case, there was improvement in outcomes like no repeated offence or abuse. In addition, children were also able to advocate for their own safety after six months of intervention and how the family members were able to explicitly say what they can do to improve safety. The professionals in the safety network reported significant improvements. On top of that, the abused child who was removed due to child protection concerns, had verbalized observations of change in mother’s parenting abilities, and has requested for home leave to begin due to ownership of safety planning and having confidence to co-create safety for her siblings and herself together with the professionals in the safety network. Children becoming active participants in the co-creation of safety not only serve the purpose in allowing them to own a 'voice' but at the same time, give them greater confidence to protect themselves at home and in other contexts outside of home.Keywords: partnering for safety, collaborative social work, family and systemic psychotherapy, child protection
Procedia PDF Downloads 119464 A Building Structure Health Monitoring DeviceBased on Cost Effective 1-Axis Accelerometers
Authors: Chih Hsing Lin, Wen-Ching Chen, Ssu-Ying Chen, Chih-Chyau Yang, Chien-Ming Wu, Chun-Ming Huang
Abstract:
Critical structures such as buildings, bridges and dams require periodic inspections to ensure safe operation. The reliable inspection of structures can be achieved by combing temperature sensor and accelerometers. In this work, we propose a building structure health monitoring device (BSHMD) with using three 1-axis accelerometers, gateway, analog to digital converter (ADC), and data logger to monitoring the building structure. The proposed BSHMD achieves the features of low cost by using three 1-axis accelerometers with the data synchronization problem being solved, and easily installation and removal. Furthermore, we develop a packet acquisition program to receive the sensed data and then classify it based on time and date. Compared with 3-axis accelerometer, our proposed 1-axis accelerometers based device achieves 64.3% cost saving. Compared with previous structural monitoring device, the BSHMD achieves 89% area saving. Therefore, with using the proposed device, the realtime diagnosis system for building damage monitoring can be conducted effectively.Keywords: building structure health monitoring, cost effective, 1-axis accelerometers, real-time diagnosis
Procedia PDF Downloads 367463 Modified Montgomery for RSA Cryptosystem
Authors: Rupali Verma, Maitreyee Dutta, Renu Vig
Abstract:
Encryption and decryption in RSA are done by modular exponentiation which is achieved by repeated modular multiplication. Hence, efficiency of modular multiplication directly determines the efficiency of RSA cryptosystem. This paper designs a Modified Montgomery Modular multiplication in which addition of operands is computed by 4:2 compressor. The basic logic operations in addition are partitioned over two iterations such that parallel computations are performed. This reduces the critical path delay of proposed Montgomery design. The proposed design and RSA are implemented on Virtex 2 and Virtex 5 FPGAs. The two factors partitioning and parallelism have improved the frequency and throughput of proposed design.Keywords: RSA, montgomery modular multiplication, 4:2 compressor, FPGA
Procedia PDF Downloads 411462 Providing Security to Private Cloud Using Advanced Encryption Standard Algorithm
Authors: Annapureddy Srikant Reddy, Atthanti Mahendra, Samala Chinni Krishna, N. Neelima
Abstract:
In our present world, we are generating a lot of data and we, need a specific device to store all these data. Generally, we store data in pen drives, hard drives, etc. Sometimes we may loss the data due to the corruption of devices. To overcome all these issues, we implemented a cloud space for storing the data, and it provides more security to the data. We can access the data with just using the internet from anywhere in the world. We implemented all these with the java using Net beans IDE. Once user uploads the data, he does not have any rights to change the data. Users uploaded files are stored in the cloud with the file name as system time and the directory will be created with some random words. Cloud accepts the data only if the size of the file is less than 2MB.Keywords: cloud space, AES, FTP, NetBeans IDE
Procedia PDF Downloads 204