Search results for: sense of security
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 4496

Search results for: sense of security

2036 Easily Memorable Strong Password Generation and Retrieval

Authors: Shatadru Das, Natarajan Vijayarangan

Abstract:

In this paper, a system and method for generating and recovering an authorization code has been designed and analyzed. The system creates an authorization code by accepting a base-sentence from a user. Based on the characters present in this base-sentence, the system computes a base-sentence matrix. The system also generates a plurality of patterns. The user can either select the pattern from the multiple patterns suggested by the system or can create his/her own pattern. The system then performs multiplications between the base-sentence matrix and the selected pattern matrix at different stages in the path forward, for obtaining a strong authorization code. In case the user forgets the base sentence, the system has a provision to manage and retrieve 'forgotten authorization code'. This is done by fragmenting the base sentence into different matrices and storing the fragmented matrices into a repository after computing matrix multiplication with a security question-answer approach and with a secret key provided by the user.

Keywords: easy authentication, key retrieval, memorable passwords, strong password generation

Procedia PDF Downloads 403
2035 Integration of Smart Grid Technologies with Smart Phones for Energy Monitoring and Management

Authors: Arjmand Khaliq, Pemra Sohaib

Abstract:

There is increasing trend of use of smart devices in the present age. The growth of computing techniques and advancement in hardware has also brought the use of sensors and smart devices to a high degree during the course of time. So use of smart devices for control, management communication and optimization has become very popular. This paper gives proposed methodology which involves sensing and switching unite for load, two way communications between utility company and smart phones of consumers using cellular techniques and price signaling resulting active participation of user in energy management .The goal of this proposed control methodology is active participation of user in energy management with accommodation of renewable energy resource. This will provide load adjustment according to consumer’s choice, increased security and reliability for consumer, switching of load according to consumer need and monitoring and management of energy.

Keywords: cellular networks, energy management, renewable energy source, smart grid technology

Procedia PDF Downloads 416
2034 Promoting Biofuels in India: Assessing Land Use Shifts Using Econometric Acreage Response Models

Authors: Y. Bhatt, N. Ghosh, N. Tiwari

Abstract:

Acreage response function are modeled taking account of expected harvest prices, weather related variables and other non-price variables allowing for partial adjustment possibility. At the outset, based on the literature on price expectation formation, we explored suitable formulations for estimating the farmer’s expected prices. Assuming that farmers form expectations rationally, the prices of food and biofuel crops are modeled using time-series methods for possible ARCH/GARCH effects to account for volatility. The prices projected on the basis of the models are then inserted to proxy for the expected prices in the acreage response functions. Food crop acreages in different growing states are found sensitive to their prices relative to those of one or more of the biofuel crops considered. The required percentage improvement in food crop yields is worked to offset the acreage loss.

Keywords: acreage response function, biofuel, food security, sustainable development

Procedia PDF Downloads 304
2033 Socio-Motor Experience between Affectivity and Movement from Harry Potter to Lord of the Rings

Authors: Manuela Gamba, Niki Mandolesi

Abstract:

Teenagers today have little knowledge about how to move or play together. The adults who are part of sports culture must find an effective way to foster this essential ability. Our research in Italy uses a 'holistic model' based on fantasy literature to explore the relationships between the game identities and self-identities of young people and the achievement of psycho-motor, emotional and social well-being in the realms of sport and education. Physical activity projects were carried out in schools and extra-curricular associations in Rome, combining outdoor activities and distance learning. This holistic and malleable game model is inspired by fantasy accounts of the journeys taken in The Lord of Rings and Harry Potter books. We know that many have a lot of resistance to the idea of using fantasy and play as a pedagogical tool, but the results obtained in this experience are surprising. Our interventions and investigations focused on promoting self-esteem, awareness, a sense of belonging, social integration, cooperation, well-being, and informed decision making: a basis for healthy and effective citizenship. For teenagers, creative thinking is the right stimulus to involve and compare the story of characters to their own journey through social and self-reflective identity analysis. We observed how important it is to engage students emotionally as well as cognitively and that enabling them to play with identity through relationships with peers. There is a need today for a multidisciplinary synthesis of analog and digital values, especially in response to recent distance-living experiences. There is a need for a global reconceptualization of free time and nature in the human experience.

Keywords: awareness, creativity, identity, play

Procedia PDF Downloads 195
2032 Localization of Near Field Radio Controlled Unintended Emitting Sources

Authors: Nurbanu Guzey, S. Jagannathan

Abstract:

Locating radio controlled (RC) devices using their unintended emissions has a great interest considering security concerns. Weak nature of these emissions requires near field localization approach since it is hard to detect these signals in far field region of array. Instead of only angle estimation, near field localization also requires range estimation of the source which makes this method more complicated than far field models. Challenges of locating such devices in a near field region and real time environment are analyzed in this paper. An ESPRIT like near field localization scheme is utilized for both angle and range estimation. 1-D search with symmetric subarrays is provided. Two 7 element uniform linear antenna arrays (ULA) are employed for locating RC source. Experiment results of location estimation for one unintended emitting walkie-talkie for different positions are given.

Keywords: localization, angle of arrival (AoA), range estimation, array signal processing, ESPRIT, Uniform Linear Array (ULA)

Procedia PDF Downloads 529
2031 Facial Biometric Privacy Using Visual Cryptography: A Fundamental Approach to Enhance the Security of Facial Biometric Data

Authors: Devika Tanna

Abstract:

'Biometrics' means 'life measurement' but the term is usually associated with the use of unique physiological characteristics to identify an individual. It is important to secure the privacy of digital face image that is stored in central database. To impart privacy to such biometric face images, first, the digital face image is split into two host face images such that, each of it gives no idea of existence of the original face image and, then each cover image is stored in two different databases geographically apart. When both the cover images are simultaneously available then only we can access that original image. This can be achieved by using the XM2VTS and IMM face database, an adaptive algorithm for spatial greyscale. The algorithm helps to select the appropriate host images which are most likely to be compatible with the secret image stored in the central database based on its geometry and appearance. The encryption is done using GEVCS which results in a reconstructed image identical to the original private image.

Keywords: adaptive algorithm, database, host images, privacy, visual cryptography

Procedia PDF Downloads 134
2030 Enhancing Financial Security: Real-Time Anomaly Detection in Financial Transactions Using Machine Learning

Authors: Ali Kazemi

Abstract:

The digital evolution of financial services, while offering unprecedented convenience and accessibility, has also escalated the vulnerabilities to fraudulent activities. In this study, we introduce a distinct approach to real-time anomaly detection in financial transactions, aiming to fortify the defenses of banking and financial institutions against such threats. Utilizing unsupervised machine learning algorithms, specifically autoencoders and isolation forests, our research focuses on identifying irregular patterns indicative of fraud within transactional data, thus enabling immediate action to prevent financial loss. The data we used in this study included the monetary value of each transaction. This is a crucial feature as fraudulent transactions may have distributions of different amounts than legitimate ones, such as timestamps indicating when transactions occurred. Analyzing transactions' temporal patterns can reveal anomalies (e.g., unusual activity in the middle of the night). Also, the sector or category of the merchant where the transaction occurred, such as retail, groceries, online services, etc. Specific categories may be more prone to fraud. Moreover, the type of payment used (e.g., credit, debit, online payment systems). Different payment methods have varying risk levels associated with fraud. This dataset, anonymized to ensure privacy, reflects a wide array of transactions typical of a global banking institution, ranging from small-scale retail purchases to large wire transfers, embodying the diverse nature of potentially fraudulent activities. By engineering features that capture the essence of transactions, including normalized amounts and encoded categorical variables, we tailor our data to enhance model sensitivity to anomalies. The autoencoder model leverages its reconstruction error mechanism to flag transactions that deviate significantly from the learned normal pattern, while the isolation forest identifies anomalies based on their susceptibility to isolation from the dataset's majority. Our experimental results, validated through techniques such as k-fold cross-validation, are evaluated using precision, recall, and the F1 score alongside the area under the receiver operating characteristic (ROC) curve. Our models achieved an F1 score of 0.85 and a ROC AUC of 0.93, indicating high accuracy in detecting fraudulent transactions without excessive false positives. This study contributes to the academic discourse on financial fraud detection and provides a practical framework for banking institutions seeking to implement real-time anomaly detection systems. By demonstrating the effectiveness of unsupervised learning techniques in a real-world context, our research offers a pathway to significantly reduce the incidence of financial fraud, thereby enhancing the security and trustworthiness of digital financial services.

Keywords: anomaly detection, financial fraud, machine learning, autoencoders, isolation forest, transactional data analysis

Procedia PDF Downloads 63
2029 Drama Education: Towards Building Multicultural Adolescent Peer Relationships

Authors: Tahnee West

Abstract:

Drama education is increasingly understood as a useful tool in promoting positive social change and cultural awareness. The effects of both positive and negative peer relationships are also a researched facet of education systems. Despite this, very little research has been conducted in the intersection of these two areas, even given current, significant public interest surrounding multicultural relationships. This research addresses a problem faced by educators and students: facilitating meaningful multicultural relationships. The research explores the following question in an Australian context: in what ways does Drama education affect peer relationships between culturally diverse students? In doing so, the study explores the various challenges and experiences of a multicultural group of adolescents, in terms of forming and maintaining effective intercultural friendships, while participating in a series of drama workshops. The project presents a starting point for providing educators with strategies for inclusivity and relationship development amongst diverse student populations. Findings show that Drama education can positively affect culturally diverse young people’s peer relationships; interactions between participants and data collected in focus groups throughout the eight-week Drama program show a steady improvement in sense of trust, support, tolerance, empathy, familiarity with other participants, and enjoyment. Data also points to a positive correlation between the Drama activities and improved conflict resolution and communication skills, as well as an improved understanding of the other participants’ cultures. Diversities and commonalities within the group were explored, with similarities encouraging social cohesion, and decreasing cultural ‘cliques’.

Keywords: cultural diversity, drama education, friendship, multicultural, peer relationships

Procedia PDF Downloads 147
2028 Into Composer’s Mind: Understanding the Process of Translating Emotions into Music

Authors: Sanam Preet Singh

Abstract:

Music in comparison to any other art form is more reactive and alive. It has the capacity to directly interact with the listener's mind and generate an emotional response. All the major research conducted in the area majorly relied on the listener’s perspective to draw an understanding of music and its effects. There is a very small number of studies which focused on the source from which music originates, the music composers. This study aims to understand the process of how music composers understand and perceive emotions and how they translate them into music, in simpler terms how music composers encode their compositions to express determining emotions. One-to-one in-depth semi structured interviews were conducted, with 8 individuals both male and female, who were professional to intermediate-level music composers and Thematic analysis was conducted to derive the themes. The analysis showed that there is no single process on which music composers rely, rather there are combinations of multiple micro processes, which constitute the understanding and translation of emotions into music. In terms of perception of emotions, the role of processes such as Rumination, mood influence and escapism was discovered in the analysis. Unique themes about the understanding of their top down and bottom up perceptions were also discovered. Further analysis also revealed the role of imagination and emotional trigger explaining how music composers make sense of emotions. The translation process of emotions revealed the role of articulation and instrumentalization, in encoding or translating emotions to a composition. Further, applications of the trial and error method, nature influences and flow in the translation process are also discussed. In the end themes such as parallels between musical patterns and emotions, comfort zones and relatability also emerged during the analysis.

Keywords: comfort zones, escapism, flow, rumination

Procedia PDF Downloads 92
2027 A Model for Adaptive Online Quiz: QCitra

Authors: Rosilah Hassan, Karam Dhafer Mayoof, Norngainy Mohd Tawil, Shamshubaridah Ramlee

Abstract:

Application of adaptive online quiz system and a design are performed in this paper. The purpose of adaptive quiz system is to establish different questions automatically for each student and measure their competence on a definite area of discipline. This model determines students competencies in cases like distant-learning which experience challenges frequently. Questions are specialized to allow clear deductions about student gains; they are able to identify student competencies more effectively. Also, negative effects of questions requiring higher knowledge than competency over student’s morale and self-confidence are dismissed. The advantage of the system in the quiz management requires less total time for measuring and is more flexible. Self sufficiency of the system in terms of repeating, planning and assessment of the measurement process allows itself to be used in the individual education sets. Adaptive quiz technique prevents students from distraction and motivation loss, which is led by the questions with quite lower hardness level than student’s competency.

Keywords: e-learning, adaptive system, security, quiz database

Procedia PDF Downloads 456
2026 The Politicization of Foreign Aid and Its Effect on Afghanistan, 2001-2016

Authors: Narender Banwala

Abstract:

The study critically evaluates that the politics of foreign aid and its effect on Afghanistan. The study argues that dynamics of foreign aid to Afghanistan are not driven solely by the Afghan political, social, and economic realities but much more by the ephemeral political goals of international donor countries. The objective of this paper is to find out the political reality of foreign aid given to Afghanistan in a post 9/11 era. The study analyses the gap between the donor countries' interests and the Afghan government's priorities in aid coordination and management. The aid given to Afghanistan has been accompanied by the political interests of the major powers and therefore violated the core principles of humanitarianism, i.e., humanity, impartiality, neutrality, and independence. This research attempts to explain the areas which are of high priority, extremely vulnerable, and have been a neglected part since 2001. The study focuses on how as a result of politicization, foreign aid could not yield the expected results even after prolong presence of international donors in Afghanistan. Methodologically, the study includes both qualitative and quantitative data, which are collected by interviews with government officials and other government documents.

Keywords: Afganistan, aid, politics, security

Procedia PDF Downloads 130
2025 Optimization of Our Eyes Cooperation as the Counter-Terrorism Strategy in Association of South East Asian Nations

Authors: Chastiti Mediafira Wulolo

Abstract:

Our Eyes is a cooperation pact in the field of intelligence information exchanges initiated by the Indonesian Ministry of Defense, which has been signed by Indonesia, Philippines, Malaysia, Brunei Darussalam, Thailand, and Singapore. This cooperation mostly engages the military acts as a central role, but this pact still requires the involvement of various parties such as police and other linear institution. This paper will use a qualitative content analysis method by doing some deep analyzing the pattern of cooperation itself. As the implementation of translantic counter-terrorism cooperation, this research will address how the role of Our Eyes can be optimized as a form of government’s response towards the contemporary threat in the Dynamics of Strategic Environmental Security in the Asia Pacific Region. Optimizing the role of this cooperation will also acquire from the previous counter-terrorism cooperation in ASEAN region, so it expects that Our Eyes collaboration can be the most effective cooperation in overcoming terrorism issues in ASEAN, eventually in Asia Pacific.

Keywords: our eyes, Defense Ministry of Indonesia, ASEAN, counter-terrorism

Procedia PDF Downloads 188
2024 Investigating the Factors Affecting on One Time Passwords Technology Acceptance: A Case Study in Banking Environment

Authors: Sajad Shokohuyar, Mahsa Zomorrodi Anbaji, Saghar Pouyan Shad

Abstract:

According to fast technology growth, modern banking tries to decrease going to banks’ branches and increase customers’ consent. One of the problems which banks face is securing customer’s password. The banks’ solution is one time password creation system. In this research by adapting from acceptance of technology model theory, assesses factors that are effective on banking in Iran especially in using one time password machine by one of the private banks of Iran customers. The statistical population is all of this bank’s customers who use electronic banking service and one time password technology and the questionnaires were distributed among members of statistical population in 5 selected groups of north, south, center, east and west of Tehran. Findings show that confidential preservation, education, ease of utilization and advertising and informing has positive relations and distinct hardware and age has negative relations.

Keywords: security, electronic banking, one time password, information technology

Procedia PDF Downloads 458
2023 Human Motion Capture: New Innovations in the Field of Computer Vision

Authors: Najm Alotaibi

Abstract:

Human motion capture has become one of the major area of interest in the field of computer vision. Some of the major application areas that have been rapidly evolving include the advanced human interfaces, virtual reality and security/surveillance systems. This study provides a brief overview of the techniques and applications used for the markerless human motion capture, which deals with analyzing the human motion in the form of mathematical formulations. The major contribution of this research is that it classifies the computer vision based techniques of human motion capture based on the taxonomy, and then breaks its down into four systematically different categories of tracking, initialization, pose estimation and recognition. The detailed descriptions and the relationships descriptions are given for the techniques of tracking and pose estimation. The subcategories of each process are further described. Various hypotheses have been used by the researchers in this domain are surveyed and the evolution of these techniques have been explained. It has been concluded in the survey that most researchers have focused on using the mathematical body models for the markerless motion capture.

Keywords: human motion capture, computer vision, vision-based, tracking

Procedia PDF Downloads 323
2022 Life Locked Up in Immigration Detention: An Exploratory Study of Education in Australian Refugee Prisons

Authors: Carly Hawkins

Abstract:

Forced migration is at unprecedented levels globally, and many countries have implemented harsh policies regarding people seeking asylum. Australia legislates one of the harshest and most controversial responses in the world, sending any asylum seeker arriving by boat to indefinite offshore immigration detention. This includes children, families and unaccompanied minors. Asylum seekers and refugees are detained indefinitely by the Australian government in the Pacific Island countries of Papua New Guinea and Nauru. Global research on the impact of immigration detention has primarily focused on mental health and psychological concerns for both adults and children. Research into Australian immigration detention has largely overlooked the schooling and education of children detained in Nauru, despite refugee children spending more than five years in detention, a significant portion of a child’s life. This research focused on the experience of education for children detained offshore in Nauru from 2013-2019. 21 qualitative interviews were conducted with children, parents and service providers between 2021-2022. Interviews explored experiences of schooling, power structures, and barriers and support to education. Findings show that a lack of belonging and lack of agency negatively affected school engagement. A sense of hopelessness and uncertainty also affected their motivation to attend school, with many children missing school for months and years. The research indicates that Australia’s current policy of offshore detention has been detrimental to children’s educational experiences.

Keywords: asylum seeker, children, education, immigration detention, policy, refugee, school

Procedia PDF Downloads 81
2021 Developing an Exhaustive and Objective Definition of Social Enterprise through Computer Aided Text Analysis

Authors: Deepika Verma, Runa Sarkar

Abstract:

One of the prominent debates in the social entrepreneurship literature has been to establish whether entrepreneurial work for social well-being by for-profit organizations can be classified as social entrepreneurship or not. Of late, the scholarship has reached a consensus. It concludes that there seems little sense in confining social entrepreneurship to just non-profit organizations. Boosted by this research, increasingly a lot of businesses engaged in filling the social infrastructure gaps in developing countries are calling themselves social enterprise. These organizations are diverse in their ownership, size, objectives, operations and business models. The lack of a comprehensive definition of social enterprise leads to three issues. Firstly, researchers may face difficulty in creating a database for social enterprises because the choice of an entity as a social enterprise becomes subjective or based on some pre-defined parameters by the researcher which is not replicable. Secondly, practitioners who use ‘social enterprise’ in their vision/mission statement(s) may find it difficult to adjust their business models accordingly especially during the times when they face the dilemma of choosing social well-being over business viability. Thirdly, social enterprise and social entrepreneurship attract a lot of donor funding and venture capital. In the paucity of a comprehensive definitional guide, the donors or investors may find assigning grants and investments difficult. It becomes necessary to develop an exhaustive and objective definition of social enterprise and examine whether the understanding of the academicians and practitioners about social enterprise match. This paper develops a dictionary of words often associated with social enterprise or (and) social entrepreneurship. It further compares two lexicographic definitions of social enterprise imputed from the abstracts of academic journal papers and trade publications extracted from the EBSCO database using the ‘tm’ package in R software.

Keywords: EBSCO database, lexicographic definition, social enterprise, text mining

Procedia PDF Downloads 400
2020 Assessing of Social Comfort of the Russian Population with Big Data

Authors: Marina Shakleina, Konstantin Shaklein, Stanislav Yakiro

Abstract:

The digitalization of modern human life over the last decade has facilitated the acquisition, storage, and processing of data, which are used to detect changes in consumer preferences and to improve the internal efficiency of the production process. This emerging trend has attracted academic interest in the use of big data in research. The study focuses on modeling the social comfort of the Russian population for the period 2010-2021 using big data. Big data provides enormous opportunities for understanding human interactions at the scale of society with plenty of space and time dynamics. One of the most popular big data sources is Google Trends. The methodology for assessing social comfort using big data involves several steps: 1. 574 words were selected based on the Harvard IV-4 Dictionary adjusted to fit the reality of everyday Russian life. The set of keywords was further cleansed by excluding queries consisting of verbs and words with several lexical meanings. 2. Search queries were processed to ensure comparability of results: the transformation of data to a 10-point scale, elimination of popularity peaks, detrending, and deseasoning. The proposed methodology for keyword search and Google Trends processing was implemented in the form of a script in the Python programming language. 3. Block and summary integral indicators of social comfort were constructed using the first modified principal component resulting in weighting coefficients values of block components. According to the study, social comfort is described by 12 blocks: ‘health’, ‘education’, ‘social support’, ‘financial situation’, ‘employment’, ‘housing’, ‘ethical norms’, ‘security’, ‘political stability’, ‘leisure’, ‘environment’, ‘infrastructure’. According to the model, the summary integral indicator increased by 54% and was 4.631 points; the average annual rate was 3.6%, which is higher than the rate of economic growth by 2.7 p.p. The value of the indicator describing social comfort in Russia is determined by 26% by ‘social support’, 24% by ‘education’, 12% by ‘infrastructure’, 10% by ‘leisure’, and the remaining 28% by others. Among 25% of the most popular searches, 85% are of negative nature and are mainly related to the blocks ‘security’, ‘political stability’, ‘health’, for example, ‘crime rate’, ‘vulnerability’. Among the 25% most unpopular queries, 99% of the queries were positive and mostly related to the blocks ‘ethical norms’, ‘education’, ‘employment’, for example, ‘social package’, ‘recycling’. In conclusion, the introduction of the latent category ‘social comfort’ into the scientific vocabulary deepens the theory of the quality of life of the population in terms of the study of the involvement of an individual in the society and expanding the subjective aspect of the measurements of various indicators. Integral assessment of social comfort demonstrates the overall picture of the development of the phenomenon over time and space and quantitatively evaluates ongoing socio-economic policy. The application of big data in the assessment of latent categories gives stable results, which opens up possibilities for their practical implementation.

Keywords: big data, Google trends, integral indicator, social comfort

Procedia PDF Downloads 206
2019 The Role of Access Control Techniques in Creating a Safe Cyberspace for Children

Authors: Sara Muslat Alsahali, Nout Mohammed Alqahtani

Abstract:

Digital technology has changed the world, and with the increasing number of children accessing the Internet, it has now become an integral part of children's lives from their early years. With the rapid development of digital technology, the risks children face on the internet also evolve from cyberbullying to misuse, sexual exploitation, and abuse of their private information over the Internet. Digital technology, with its advantages and disadvantages, is now a fact of our life. Therefore, knowledge of how to reduce its risks and maximize its benefits will help shape the growth and future of a new generation of digital citizens. This paper will discuss access control techniques that help to create secure cyberspace where children can be safe without depriving them of their rights and freedom to use the internet and preventing them from its benefits. Also, it sheds light on its challenges and problems by classifying the methods of parental controlling into two possibilities asynchronous and synchronous techniques and choosing YouTube as a case study of access control techniques.

Keywords: access control, cyber security, kids, parental monitoring

Procedia PDF Downloads 140
2018 Improving Cyber Resilience in Mobile Field Hospitals: Towards an Assessment Model

Authors: Nasir Baba Ahmed, Nicolas Daclin, Marc Olivaux, Gilles Dusserre

Abstract:

The Mobile field hospital is critical in terms of managing emergencies in crisis. It is a sub-section of the main hospitals and the health sector, tasked with delivering responsive, immediate, and efficient medical services during a crisis. With the aim to prevent further crisis, the assessment of the cyber assets follows different methods, to distinguish its strengths and weaknesses, and in turn achieve cyber resiliency. The work focuses on assessments of cyber resilience in field hospitals with trends growing in both the field hospital and the health sector in general. This creates opportunities for the adverse attackers and the response improvement objectives for attaining cyber resilience, as the assessments allow users and stakeholders to know the level of risks with regards to its cyber assets. Thus, the purpose is to show the possible threat vectors which open up opportunities, with contrast to current trends in the assessment of the mobile field hospitals’ cyber assets.

Keywords: assessment framework, cyber resilience, cyber security, mobile field hospital

Procedia PDF Downloads 163
2017 Nutrition and Food Safety as Strategic Assets

Authors: Daniel C. S. Lim, W. Y. Tan

Abstract:

The world is facing a growing food crisis. The concerns of food nutritional value, food safety and food security are becoming increasingly real. There is also a direct relationship to the risk of diseases, particularly chronic diseases, to the food we consume. So, there are increasing concerns about the modern day food ecosystem creating foods that can provide the nutritional components for organ function sustenance, as well as, taking a serious view on diet-related diseases. This paper addresses some of the above concerns and gives an overview of the current global situation relating to food nutrition and safety. The paper reviews nutritional aspects of food today compared to those of the last century, compares whole foods found in supermarkets versus those organically grown, as well as population behaviour towards food choices. It provides scientific insights into the effects of some of the global trends such as climate change and other changes environmental changes, and presents what individuals and corporations are doing to use the latest nutritional technologies as strategic assets. Finally, it briefly highlights some of the innovative solutions that are being applied to address several of the above concerns.

Keywords: food crisis, food safety, global trends, nutritional aspects

Procedia PDF Downloads 390
2016 Processes of Identity Construction for Generation 1.5 Students in Canada

Authors: Timothy Mossman

Abstract:

The number of adolescent children accompanying their immigrant parents to Canada has steadily increased since the 1990s. Much of the applied linguistics literature on these so-called ‘Generation 1.5’ youth has focused on their deficiencies as academic writers in US Rhetoric and Composition and ESL contexts in higher education and the stigma of ESL in US K-12 contexts. However, the literature on Generation 1.5 students and identity in Canadian higher education is limited. This qualitative study investigates the processes of identity construction of three Generation 1.5 students studying at a university in Metro Vancouver to find out what types of identities and representations of self and other they make relevant, the meanings they attribute to their identities, and what motivates them to construct these identities. The study analyzes the accounts and experiences of the participants in interviews, focus groups, and texts and as ‘culture-in-action,’ positing that they constructed identities as social categories associated with the languages and social practices of their countries of birth, in liminal spaces among a continuum between Canada and their countries of birth, and a spectrum of related cultural representations. Ideas and beliefs associated with broader ‘macro’ social structures in Canadian society related to language, culture, legitimacy, immigration, power, distinction, and racism were shown to be transcended in and through their representations of themselves and others. Data suggest that moving to Canada caused participants to experience discontinuities between their cultures, languages, and social practices, and in some cases a conflicting sense of self. The study brings implications for finding ways to understand the complexity of immigrant students, avoid reifying and generalizing about them, and not see them as stuck-in-between or lacking.

Keywords: culture-in-action, generation 1.5, identity, membership categorization analysis

Procedia PDF Downloads 153
2015 Drawings Reveal Beliefs of Japanese University Students

Authors: Sakae Suzuki

Abstract:

Although Japanese students study English for six years in secondary schools, they demonstrate little success with it when they enter higher education. Learners’ beliefs can predict the future behavior of students, so it may be effective to investigate how learners’ beliefs limit their success and how beliefs might be nudged in a positive direction. While many researchers still depend on a questionnaire called BALLI to reveal explicit beliefs, alternative approaches, especially those designed to reveal implicit beliefs, might be helpful for promoting learning. The present study seeks to identify beliefs with a discursive approach using visual metaphors and narratives. Employing a sociocultural framework, this study investigates how students’ beliefs are revealed by drawings of themselves and their surrounding environments and artifacts while they are engaged in language learning. Research questions are: (1) Can we identify beliefs through an analysis of students’ visual narratives? (2) What environments and artifacts can be found in students’ drawings, and what do they mean? (3) To what extent do students see language learning as a solitary, rather than a social, activity? Participants are university students majoring in science and technology in Japan. The questionnaire was administered to 70 entering students in April, 2014. Data included students drawings of themselves as learners of English as well as written descriptions of students’ backgrounds, English-learning experiences, and analogies and metaphors that they used in written descriptions of themselves as learners. Data will be analyzed qualitatively and quantitatively. Anticipated results include students’ perceptions of themselves as language learners, including their sense of agency, awareness of artifacts, and social contexts of language learning. Comments will be made on implications for teaching, as well as the use of visual narratives as research tools, and recommended further research.

Keywords: drawings, learners' beliefs, metaphors, BALLI

Procedia PDF Downloads 492
2014 An Attack on the Lucas Based El-Gamal Cryptosystem in the Elliptic Curve Group Over Finite Field Using Greater Common Divisor

Authors: Lee Feng Koo, Tze Jin Wong, Pang Hung Yiu, Nik Mohd Asri Nik Long

Abstract:

Greater common divisor (GCD) attack is an attack that relies on the polynomial structure of the cryptosystem. This attack required two plaintexts differ from a fixed number and encrypted under same modulus. This paper reports a security reaction of Lucas Based El-Gamal Cryptosystem in the Elliptic Curve group over finite field under GCD attack. Lucas Based El-Gamal Cryptosystem in the Elliptic Curve group over finite field was exposed mathematically to the GCD attack using GCD and Dickson polynomial. The result shows that the cryptanalyst is able to get the plaintext without decryption by using GCD attack. Thus, the study concluded that it is highly perilous when two plaintexts have a slight difference from a fixed number in the same Elliptic curve group over finite field.

Keywords: decryption, encryption, elliptic curve, greater common divisor

Procedia PDF Downloads 258
2013 Iris Detection on RGB Image for Controlling Side Mirror

Authors: Norzalina Othman, Nurul Na’imy Wan, Azliza Mohd Rusli, Wan Noor Syahirah Meor Idris

Abstract:

Iris detection is a process where the position of the eyes is extracted from the face images. It is a current method used for many applications such as for security purpose and drowsiness detection. This paper proposes the use of eyes detection in controlling side mirror of motor vehicles. The eyes detection method aims to make driver easy to adjust the side mirrors automatically. The system will determine the midpoint coordinate of eyes detection on RGB (color) image and the input signal from y-coordinate will send it to controller in order to rotate the angle of side mirror on vehicle. The eye position was cropped and the coordinate of midpoint was successfully detected from the circle of iris detection using Viola Jones detection and circular Hough transform methods on RGB image. The coordinate of midpoint from the experiment are tested using controller to determine the angle of rotation on the side mirrors.

Keywords: iris detection, midpoint coordinates, RGB images, side mirror

Procedia PDF Downloads 429
2012 Implementation of the Quality Management System and Development of Organizational Learning: Case of Three Small and Medium-Sized Enterprises in Morocco

Authors: Abdelghani Boudiaf

Abstract:

The profusion of studies relating to the concept of organizational learning shows the importance that has been given to this concept in the management sciences. A few years ago, companies leaned towards ISO 9001 certification; this requires the implementation of the quality management system (QMS). In order for this objective to be achieved, companies must have a set of skills, which pushes them to develop learning through continuous training. The results of empirical research have shown that implementation of the QMS in the company promotes the development of learning. It should also be noted that several types of learning are developed in this sense. Given the nature of skills development is normative in the context of the quality demarche, companies are obliged to qualify and improve the skills of their human resources. Continuous training is the keystone to develop the necessary learning. To carry out continuous training, companies need to be able to identify their real needs by developing training plans based on well-defined engineering. The training process goes obviously through several stages. Initially, training has a general aspect, that is to say, it focuses on topics and actions of a general nature. Subsequently, this is done in a more targeted and more precise way to accompany the evolution of the QMS and also to make the changes decided each time (change of working method, change of practices, change of objectives, change of mentality, etc.). To answer our problematic we opted for the method of qualitative research. It should be noted that the case study method crosses several data collection techniques to explain and understand a phenomenon. Three cases of companies were studied as part of this research work using different data collection techniques related to this method.

Keywords: changing mentalities, continuing training, organizational learning, quality management system, skills development

Procedia PDF Downloads 112
2011 A Comparative Analysis of Hyper-Parameters Using Neural Networks for E-Mail Spam Detection

Authors: Syed Mahbubuz Zaman, A. B. M. Abrar Haque, Mehedi Hassan Nayeem, Misbah Uddin Sagor

Abstract:

Everyday e-mails are being used by millions of people as an effective form of communication over the Internet. Although e-mails allow high-speed communication, there is a constant threat known as spam. Spam e-mail is often called junk e-mails which are unsolicited and sent in bulk. These unsolicited emails cause security concerns among internet users because they are being exposed to inappropriate content. There is no guaranteed way to stop spammers who use static filters as they are bypassed very easily. In this paper, a smart system is proposed that will be using neural networks to approach spam in a different way, and meanwhile, this will also detect the most relevant features that will help to design the spam filter. Also, a comparison of different parameters for different neural network models has been shown to determine which model works best within suitable parameters.

Keywords: long short-term memory, bidirectional long short-term memory, gated recurrent unit, natural language processing, natural language processing

Procedia PDF Downloads 208
2010 Performance Investigation of Thermal Insulation Materials for Walls: A Case Study in Nicosia (Turkish Republic of North Cyprus)

Authors: L. Vafaei, McDominic Eze

Abstract:

The performance of thermal energy in homes and buildings is a significant factor in terms of energy efficiency of a building. In a large sense, the performance of thermal energy is dependent on many factors of which the amount of thermal insulation is at one end a considerable factor, as likewise the essence of mass and the wall thickness and also the thermal resistance of wall material. This study is aimed at illustrating the different wall system in Turkish Republic of North Cyprus (TRNC), acknowledge the problem and suggest a solution through comparing the effect of thermal radiation two model rooms- L1 (Ytong wall) and L2 (heat insulated wall using stone wool) set up for experimentation. The model room has four face walls. The study consists of two stage, the first test is to access the effect of solar radiation for south facing wall and the second stage is to test the thermal performance of Ytong and heat insulated wall, the effects of climatic condition during winter. The heat insulated wall contains material hollow brick, stone wool, and gypsum while the Ytong wall contains cement concrete, for the outer surface and the inner surface and Ytong stone. The total heat of the wall was determined, 7T-Type thermocouple was used with a data logger system to record the data, temperature change recorded at an interval of 10 minutes. The result obtained was that Ytong wall save more energy than the heat insulated wall at night while heat insulated wall saves energy during the day when intensity is at maximum.

Keywords: heat insulation, hollow bricks, south facing, Ytong bricks wall

Procedia PDF Downloads 267
2009 A Multiple Case Study of How Bilingual-Bicultural Teachers' Language Shame and Loss Affects Teaching English Language Learners

Authors: Lisa Winstead, Penny Congcong Wang

Abstract:

This two-year multiple case study of eight Spanish-English speaking teachers explores bilingual-bicultural Latino teachers’ lived experiences as English Language Learners and, more recently, as adult teachers who work with English Language Learners in mainstream schools. Research questions explored include: How do bilingual-bicultural teachers perceive their native language use and sense of self within society from childhood to adulthood? Correspondingly, what are bilingual teachers’ perceptions of how their own language learning experience might affect teaching students of similar linguistic and cultural backgrounds? This study took place in an urban area in the Pacific Southwest of the United States. Participants were K-8 teachers and enrolled in a Spanish-English bilingual authorization program. Data were collected from journals, focus group interviews, field notes, and class artifacts. Within case and cross-case analysis revealed that the participants were shamed about their language use as children which contributed to their primary language loss. They similarly reported how experiences of mainstream educator and administrator language shaming invalidated their ability to provide support for Latino heritage ELLs, despite their bilingual-bicultural expertise. However, participants reported that counter-narratives from the bilingual authorization program, parents, community and church organizations, and cultural responsive teachers were effective in promoting their language retention, pride, and feelings of well-being.

Keywords: teacher education, bilingual education, English language learners, emergent bilinguals, social justice, language shame, language loss, translanguaging

Procedia PDF Downloads 191
2008 Political Regimes, Political Stability and Debt Dependence in African Countries of Franc Zone: A Logistic Modeling

Authors: Nounamo Nguedie Yann Harold

Abstract:

The factors behind the debt have been the subject of several studies in the literature. Pioneering studies based on the 'double deficit' approach linked indebtedness to the imbalance between savings and investment, the budget deficit and the current account deficit. Most studies on identifying factors that may stimulate or reduce the level of external public debt agree that the following variables are important explanatory variables in leveraging debt: the budget deficit, trade opening, current account and exchange rate, import, export, interest rate, term variation exchange rate, economic growth rate and debt service, capital flight, and over-indebtedness. Few studies addressed the impact of political factors on the level of external debt. In general, however, the IMF's stabilization programs in developing countries following the debt crisis have resulted in economic recession and the advent of political crises that have resulted in changes in governments. In this sense, political institutions are recognised as factors of accumulation of external debt in most developing countries. This paper assesses the role of political factors on the external debt level of African countries in the Franc Zone over the period 1985-2016. Data used come from World Bank and ICRG. Using a logit in panel, the results show that the more a country is politically stable, the lower the external debt compared to the gross domestic product. Political stability multiplies 1.18% the chances of being in the sustainable debt zone. For example, countries with good political institutions experience less severe external debt burdens than countries with bad political institutions.

Keywords: African countries, external debt, Franc Zone, political factors

Procedia PDF Downloads 223
2007 Foreign Football League and Its Socio-Economic Implications in Nigeria

Authors: Usman Dutse, Eldah Ephraim Buba, Dalhatu Sa’idu

Abstract:

The popularity of foreign football leagues are getting a soaring in Africa. Nigerian youths are following these leagues with high sense of dedication and devotion. The paper examines the factors behind the growing popularity of foreign football league in Nigeria and its socio economic implications on the country. Primary data were largely used for the study and collected through the use of questionnaire and interview. The data collected were analysed with the use of descriptive and qualitative methods of analysis. The findings made from the analysis indicates that the reasons why foreign league is popular in Nigeria is because the quality of national league in Nigeria is poor, the matches are not mostly televised, corruption/match fixing is common; for the above mentioned reasons national football league become uninteresting compared to foreign leagues. It was also confirmed that the overwhelming popularity of foreign league has the following social effects: friendship and acquaintance are created between supporters of the same club via social media and viewing centres, it has increased the knowledge and awareness of youth about the economics and politics of international sports. However, it has also brewed rivalry between supporters of clubs, drugs are sold in viewing centres and it sometimes serves as a meeting point for miscreants and criminals. Some of the economic effects were also identified as follows: small entrepreneurs establish commercial viewing centres and they employ other supporting staff to operate. On the strength of the above findings, the following were recommended: There is the urgent need to reform our national league to an acceptable standard; improve the quality of the team, the facilities and media coverage of the matches. This might make Nigerians to channel some of the love for foreign leagues to the local leagues.

Keywords: foreign, league, socioeconomic, implications

Procedia PDF Downloads 258