Search results for: broadcast messages
224 The Social Media, Reading Culture and Vocabulary Expansion: Three Universities from Northern Nigeria
Authors: Nasir Umar Abdullahi
Abstract:
The social media profoundly causes the reading culture to decline in Nigeria, where the English language is a second language (SL), a language of instruction (LI), as well as the target language (TL). This is because the university students have, over the years, failed to make extensive reading their closest companion, with much emphasis on reading the European novels, newspapers, magazines, etc., so as to learn language from its original or native speakers for linguistic competence. Instead, they squander the most part of their day and nocturnal hours, sending and receiving messages through social media. The end result is their vocabulary become stagnant or ebbs, and that they cannot acquire the Cox head’s 570 vocabulary, let alone the Nation’s 2000 vocabulary to use the language fluently in writing, reading, listening, and speaking and to further compete with the native speaker in varying degrees of language usages. Be that as it may, if the social media is a monster in worsening the decline in reading culture, which degenerates in the Northern part of the country in contradistinction to the Southern part, it boosts it as well, for aside the social media language, slangs, cliché, for instance, students improve their vocabulary power, and at the same time it allows the students to privately and leisurely put the language into use, by using practically some of the vocabulary they have acquired to chart, to comment, socialize to adjudge, etc. This is what this paper tries to explore in Umaru Musa Yar’adua University Al-qalam University and the Federal University Dutin-ma.Keywords: social media, reading, vocabulary, universities
Procedia PDF Downloads 131223 An Exploratory Survey Questionnaire to Understand What Emotions Are Important and Difficult to Communicate for People with Dysarthria and Their Methodology of Communicating
Authors: Lubna Alhinti, Heidi Christensen, Stuart Cunningham
Abstract:
People with speech disorders may rely on augmentative and alternative communication (AAC) technologies to help them communicate. However, the limitations of the current AAC technologies act as barriers to the optimal use of these technologies in daily communication settings. The ability to communicate effectively relies on a number of factors that are not limited to the intelligibility of the spoken words. In fact, non-verbal cues play a critical role in the correct comprehension of messages and having to rely on verbal communication only, as is the case with current AAC technology, may contribute to problems in communication. This is especially true for people’s ability to express their feelings and emotions, which are communicated to a large part through non-verbal cues. This paper focuses on understanding more about the non-verbal communication ability of people with dysarthria, with the overarching aim of this research being to improve AAC technology by allowing people with dysarthria to better communicate emotions. Preliminary survey results are presented that gives an understanding of how people with dysarthria convey emotions, what emotions that are important for them to get across, what emotions that are difficult for them to convey, and whether there is a difference in communicating emotions when speaking to familiar versus unfamiliar people.Keywords: alternative and augmentative communication technology, dysarthria, speech emotion recognition, VIVOCA
Procedia PDF Downloads 163222 Applying Different Stenography Techniques in Cloud Computing Technology to Improve Cloud Data Privacy and Security Issues
Authors: Muhammad Muhammad Suleiman
Abstract:
Cloud Computing is a versatile concept that refers to a service that allows users to outsource their data without having to worry about local storage issues. However, the most pressing issues to be addressed are maintaining a secure and reliable data repository rather than relying on untrustworthy service providers. In this study, we look at how stenography approaches and collaboration with Digital Watermarking can greatly improve the system's effectiveness and data security when used for Cloud Computing. The main requirement of such frameworks, where data is transferred or exchanged between servers and users, is safe data management in cloud environments. Steganography is the cloud is among the most effective methods for safe communication. Steganography is a method of writing coded messages in such a way that only the sender and recipient can safely interpret and display the information hidden in the communication channel. This study presents a new text steganography method for hiding a loaded hidden English text file in a cover English text file to ensure data protection in cloud computing. Data protection, data hiding capability, and time were all improved using the proposed technique.Keywords: cloud computing, steganography, information hiding, cloud storage, security
Procedia PDF Downloads 191221 Linguistic Symbols Principle Construction in Cultural Creative Product Design
Authors: Pei-Jun Xue, Ming-Yu Hsiao
Abstract:
Language is the emblem of a culture, representing the extension of cultural life. In addition, it is also an important tool for communication and message transmission. It carries not only information but also covers the self-conscious of the information constructor as well as the situational experiences of users from different backgrounds. Moreover, design can be regarded as a language, a dynamic process of coding and decoding. With the designers’ experiences in everyday life, they bring them into the products’ experiences. Considered from the aspects of atmosphere and the five senses, a designer should consider and reconsider how to communicate the messages effectively to suit the users’ needs. In the process of language learning, we should understand the construction behind it and the rules of the compositions of language codes. Regarding the understanding of the design of works or the form of product construction, it is necessary for us to understand the coding system during the process of product construction. The form (signifiers) and meanings (signified) of Chinese characters are closely related. At the same time, it is also a process of simplifying the complicated to the simple. This study discusses the chinese characters that used in the cultural symbols construction, and analysis of existing products by Peirce's semiotic triangles. Through people's cognition of Chinese characters and constitute method, help to understand the way of construction product symbol.Keywords: cultural-creative product design, cultural product, cultural symbols, linguistic symbols
Procedia PDF Downloads 449220 Analysis of Spamming Threats and Some Possible Solutions for Online Social Networking Sites (OSNS)
Authors: Dilip Singh Sisodia, Shrish Verma
Abstract:
Spamming is the most common issue seen nowadays in the Internet especially in Online Social Networking Sites (like Facebook, Twitter, and Google+ etc.). Spam messages keep wasting Internet bandwidth and the storage space of servers. On social network sites; spammers often disguise themselves by creating fake accounts and hijacking user’s accounts for personal gains. They behave like normal user and they continue to change their spamming strategy. To prevent this, most modern spam-filtering solutions are deployed on the receiver side; they are good at filtering spam for end users. In this paper we are presenting some spamming techniques their behaviour and possible solutions. We have analyzed how Spammers enters into online social networking sites (OSNSs) and how they target it and the techniques they use for it. The five discussed techniques of spamming techniques which are clickjacking, social engineered attacks, cross site scripting, URL shortening, and drive by download. We have used elgg framework for demonstration of some of spamming threats and respective implementation of solutions.Keywords: online social networking sites, spam, attacks, internet, clickjacking / likejacking, drive-by-download, URL shortening, networking, socially engineered attacks, elgg framework
Procedia PDF Downloads 347219 An Efficient Discrete Chaos in Generalized Logistic Maps with Applications in Image Encryption
Authors: Ashish Ashish
Abstract:
In the last few decades, the discrete chaos of difference equations has gained a massive attention of academicians and scholars due to its tremendous applications in each and every branch of science, such as cryptography, traffic control models, secure communications, weather forecasting, and engineering. In this article, a generalized logistic discrete map is established and discrete chaos is reported through period doubling bifurcation, period three orbit and Lyapunov exponent. It is interesting to see that the generalized logistic map exhibits superior chaos due to the presence of an extra degree of freedom of an ordered parameter. The period doubling bifurcation and Lyapunov exponent are demonstrated for some particular values of parameter and the discrete chaos is determined in the sense of Devaney's definition of chaos theoretically as well as numerically. Moreover, the study discusses an extended chaos based image encryption and decryption scheme in cryptography using this novel system. Surprisingly, a larger key space for coding and more sensitive dependence on initial conditions are examined for encryption and decryption of text messages, images and videos which secure the system strongly from external cyber attacks, coding attacks, statistic attacks and differential attacks.Keywords: chaos, period-doubling, logistic map, Lyapunov exponent, image encryption
Procedia PDF Downloads 151218 Hierarchical Filtering Method of Threat Alerts Based on Correlation Analysis
Authors: Xudong He, Jian Wang, Jiqiang Liu, Lei Han, Yang Yu, Shaohua Lv
Abstract:
Nowadays, the threats of the internet are enormous and increasing; however, the classification of huge alert messages generated in this environment is relatively monotonous. It affects the accuracy of the network situation assessment, and also brings inconvenience to the security managers to deal with the emergency. In order to deal with potential network threats effectively and provide more effective data to improve the network situation awareness. It is essential to build a hierarchical filtering method to prevent the threats. In this paper, it establishes a model for data monitoring, which can filter systematically from the original data to get the grade of threats and be stored for using again. Firstly, it filters the vulnerable resources, open ports of host devices and services. Then use the entropy theory to calculate the performance changes of the host devices at the time of the threat occurring and filter again. At last, sort the changes of the performance value at the time of threat occurring. Use the alerts and performance data collected in the real network environment to evaluate and analyze. The comparative experimental analysis shows that the threat filtering method can effectively filter the threat alerts effectively.Keywords: correlation analysis, hierarchical filtering, multisource data, network security
Procedia PDF Downloads 201217 An Analysis of Language Borrowing among Algerian University Students Using Online Facebook Conversations
Authors: Messaouda Annab
Abstract:
The rapid development of technology has led to an important context in which different languages and structures are used in the same conversations. This paper investigates the practice of language borrowing within social media platform, namely, Facebook among Algerian Vernacular Arabic (AVA) students. In other words, this study will explore how Algerian students have incorporated lexical English borrowing in their online conversations. This paper will examine the relationships between language, culture and identity among a multilingual group. The main objective is to determine the cultural and linguistic functions that borrowing fulfills in social media and to explain the possible factors underlying English borrowing. The nature of the study entails the use of an online research method that includes ten online Facebook conversations in the form of private messages collected from Bachelor and Masters Algerian students recruited from the English department at the University of Oum El-Bouaghi. The analysis of data revealed that social media platform provided the users with opportunities to shift from one language to another. This practice was noticed in students’ online conversations. English borrowing was the most relevant language performance in accordance with Arabic which is the mother tongue of the chosen sample. The analysis has assumed that participants are skilled in more than one language.Keywords: borrowing, language performance, linguistic background, social media
Procedia PDF Downloads 158216 Enhancement of Transaction's Authentication for the Europay, MasterCard, and Visa Contactless Card Payments
Authors: Ossama Al-Maliki
Abstract:
Europay, MasterCard, and Visa (EMV) is one of the most popular payment protocol in the world. The EMV protocol supports Chip and PIN Transactions, Chip and Signature transactions, and Contactless transactions. This protocol suffers from tens of £ millions of lost per year due to many fraudulent payments. This is due to several reported vulnerable points in the protocols used for such payments that allow skimming, replay, cloning, Mole Point of Sale (POS), relay, and other attacks to be conducted. In this paper, we are focusing on the EMV contactless specification and we have proposed two proposal solutions to the addition of a localization factor to enhance the payment authentication of such transactions designed to prevent relay, cloning, and Mole-POS attacks. Our proposed solution is a back-end localization scheme to help the Issuer-Bank compare the location of the genuine cardholder in relation to the used POS. Our scheme uses 'something you have' which is the Cardholder Smartphone (CSP) to provide the location of the cardholder at the time of the transaction and without impacting the contactless payment time/protocol. The Issuer-bank obtain the CSP Location using tried and tested localization techniques, and independently of the cardholder. Both of our proposal solutions do not require infrastructure changes, and it uses existing EMV/SP protocol messages to communicate our scheme information.Keywords: NFC, RFID, contactless card, authentication, location, EMV
Procedia PDF Downloads 242215 Survey Based Data Security Evaluation in Pakistan Financial Institutions against Malicious Attacks
Authors: Naveed Ghani, Samreen Javed
Abstract:
In today’s heterogeneous network environment, there is a growing demand for distrust clients to jointly execute secure network to prevent from malicious attacks as the defining task of propagating malicious code is to locate new targets to attack. Residual risk is always there no matter what solutions are implemented or whet so ever security methodology or standards being adapted. Security is the first and crucial phase in the field of Computer Science. The main aim of the Computer Security is gathering of information with secure network. No one need wonder what all that malware is trying to do: It's trying to steal money through data theft, bank transfers, stolen passwords, or swiped identities. From there, with the help of our survey we learn about the importance of white listing, antimalware programs, security patches, log files, honey pots, and more used in banks for financial data protection but there’s also a need of implementing the IPV6 tunneling with Crypto data transformation according to the requirements of new technology to prevent the organization from new Malware attacks and crafting of its own messages and sending them to the target. In this paper the writer has given the idea of implementing IPV6 Tunneling Secessions on private data transmission from financial organizations whose secrecy needed to be safeguarded.Keywords: network worms, malware infection propagating malicious code, virus, security, VPN
Procedia PDF Downloads 358214 Translation of Scientific and Technological Terms into Hausa Language: A Guide to Hausa Language Translator in an Electronic Media (Radio)
Authors: Surajo Ladan
Abstract:
There is no doubt nowadays, the media plays a crucial role in the development of languages. Media practitioners influence and set our linguistic norms to a greater extent. Their strategic position makes them influential than school teachers as linguistic pacesetters and models. This is so because of the direct access to the general public that media enjoys being public, oriented and at the same time being patronized by the public, the media is regarded as an authority as far as language use is concerned. In the modern world, listening to the news has become part and parcel of our daily lives. Easy communication has made the world a global village. Contact between countries and people are increasing daily. In Nigeria and indeed the whole of West Africa, radio is the most widely spread out of the three types of media (radio, television, and print). This is because of its (radio) cheapness and less cumbersome and flexibility. Therefore, the positive or negative effect of radio on the lives of a typical Nigerian or African cannot be over emphasized. Hausa language, on the other hand, is one of the most widely spoken languages in West Africa and, of course, the lingua franca in the Northern part of Nigeria and Southern Niger. The language has been in use to a large extent by almost all the popular foreign media houses of BBC, VOA, Deutsche Welle Radio, Radio France International, Radio China, etc. The many people in Nigeria and West Africa depend so much on the news in this language. In fact even government programmes, mobilization, education and sensitization of the populace are done in this language through the broadcast media. It is against this background, for effective and efficient work of this nature it requires the services of a trained translator for the purpose of translating scientific and technological terms. The main thrust of this paper was necessitated for the fact that no nation develops using foreign or borrowed language. This is in lined with UNESCO declaration of 1953 where it says 'the best Language of Instruction (LOI) is the vernacular or the Mother Tongue (MT) of the learner'. This idea is in the right direction especially nowadays that the developing nations have come to terms with realities that their destiny is really in their own hands, not in the hands of the so-called developed nations.Keywords: translation, scientific, technological, language, radio, media
Procedia PDF Downloads 374213 Explicitation as a Non-Professional Translation Universal: Evidence from the Translation of Promotional Material
Authors: Julieta Alos
Abstract:
Following the explicitation hypothesis, it has been proposed that explicitation is a translation universal, i.e., one of those features that characterize translated texts, and cannot be traced back to interference from a particular language. The explicitation hypothesis has been enthusiastically endorsed by some scholars, and firmly rejected by others. Focusing on the translation of promotional material from English into Arabic, specifically in the luxury goods market, the aims of this study are twofold: First, to contribute to the debate regarding the notion of explicitation in order to advance our understanding of what has become a contentious concept. Second, to add to the growing body of literature on non-professional translation by shedding light on this particular aspect of it. To this end, our study uses a combination of qualitative and quantitative methods to explore a corpus of brochures pertaining to the luxury industry, translated into Arabic at the local marketing agencies promoting the brands in question, by bilingual employees who have no translation training. Our data reveals a preference to avoid creative language choices in favor of more direct advertising messages, suggestive of a general tendency towards explicitation in non-professional translation, beyond what is dictated by the grammatical and stylistic constraints of Arabic. We argue, further, that this translation approach is at odds with the principles of luxury advertising, which emphasize implicitness and ambiguity, and view language as an extension of the creative process involved in the production of the luxury item.Keywords: English-Arabic translation, explicitation, non-professional translation, promotional texts
Procedia PDF Downloads 375212 An Improved Image Steganography Technique Based on Least Significant Bit Insertion
Authors: Olaiya Folorunsho, Comfort Y. Daramola, Joel N. Ugwu, Lawrence B. Adewole, Olufisayo S. Ekundayo
Abstract:
In today world, there is a tremendous rise in the usage of internet due to the fact that almost all the communication and information sharing is done over the web. Conversely, there is a continuous growth of unauthorized access to confidential data. This has posed a challenge to information security expertise whose major goal is to curtail the menace. One of the approaches to secure the safety delivery of data/information to the rightful destination without any modification is steganography. Steganography is the art of hiding information inside an embedded information. This research paper aimed at designing a secured algorithm with the use of image steganographic technique that makes use of Least Significant Bit (LSB) algorithm for embedding the data into the bit map image (bmp) in order to enhance security and reliability. In the LSB approach, the basic idea is to replace the LSB of the pixels of the cover image with the Bits of the messages to be hidden without destroying the property of the cover image significantly. The system was implemented using C# programming language of Microsoft.NET framework. The performance evaluation of the proposed system was experimented by conducting a benchmarking test for analyzing the parameters like Mean Squared Error (MSE) and Peak Signal to Noise Ratio (PSNR). The result showed that image steganography performed considerably in securing data hiding and information transmission over the networks.Keywords: steganography, image steganography, least significant bits, bit map image
Procedia PDF Downloads 266211 Beyond Replicating Linguistic Elements: Novel Concept Combinations in Multilingual Children
Authors: Xiao-lei Wang
Abstract:
The Novel Concept Combination (NCC) refers to the unique ability of multilingual children to creatively merge and integrate different linguistic and cultural elements to form innovative and original concepts. Children raised with more than one language often exhibit this skill in their daily communication, such as creating innovative metaphors that enrich their communication, showcasing their creativity in conveying the essence of their messages. This paper explores NCC abilities in multilingual children by focusing on two male trilingual siblings exposed to Chinese, French, and English from birth. The siblings were observed for 19 years in their daily context. Seventy-six hours of video-recorded data were used for this study (38 hours for each participant). A coding scheme developed by Wang et al. was employed to code the recorded data. The results suggest that these multilingual siblings proportionally increased their NCC skills over the years, emerging at age 3 and peaking at age 15. The characteristic of their NCC lies in their capacity to not merely replicate linguistic elements of different languages but to recreate, reshape, and reconstruct novel ideas in communication, enriching their interactions. The paper also addresses the educational implications for educators and parents, emphasizing the importance of valuing these novel ideas in everyday environments to encourage NCC development. This, in turn, contributes to cognitive and social development.Keywords: multilingual children, novel concept combination, multilingual creativity, linguistic richness
Procedia PDF Downloads 67210 A Study of Social Media Users’ Switching Behavior
Authors: Chiao-Chen Chang, Yang-Chieh Chin
Abstract:
Social media has created a change in the way the network community is clustered, especially from the location of the community, from the original virtual space to the intertwined network, and thus the communication between people will change from face to face communication to social media-based communication model. However, social media users who have had a fixed engagement may have an intention to switch to another service provider because of the emergence of new forms of social media. For example, some of Facebook or Twitter users switched to Instagram in 2014 because of social media messages or image overloads, and users may seek simpler and instant social media to become their main social networking tool. This study explores the impact of system features overload, information overload, social monitoring concerns, problematic use and privacy concerns as the antecedents on social media fatigue, dissatisfaction, and alternative attractiveness; further influence social media switching. This study also uses the online questionnaire survey method to recover the sample data, and then confirm the factor analysis, path analysis, model fit analysis and mediating analysis with the structural equation model (SEM). Research findings demonstrated that there were significant effects on multiple paths. Based on the research findings, this study puts forward the implications of theory and practice.Keywords: social media, switching, social media fatigue, alternative attractiveness
Procedia PDF Downloads 140209 Applying Audience Development Programs in Museums for Raising Community Awareness towards Cultural Heritage Preservation: A Case Study of Alexandria National Museum
Authors: Samar F. Elkasrawy
Abstract:
Museums play a significant role in their communities with respect to culture, history, environment, and social development. They are considered as important sites for families, tourists, school groups, cultural visitors and individuals, looking to enjoy, learn and expand their horizons. Aim of audience development programs is to support individuals and organizations to work together to deliver messages that will raise museums' profile for both existing and potential visitors. They recognize the particular role that museums play for communities, the audiences they seek to reach, the experience they seek to offer and the extent and nature of their collections. This study aims at using both the qualitative and quantitative approach to explore the important role that audience development programs in museums can play in raising awareness in their communities concerning cultural heritage preservation and tourism. The Alexandria National Museum is considered as a valuable case study. In depth interviews with museum managers and staff was conducted as well as an online questionnaire. The study also includes suggestions and guidelines for applying audience development programs in Egyptian museums.Keywords: Alexandria National Museum, audience development programs, cultural heritage, tourism and preservation awareness
Procedia PDF Downloads 263208 Performance of High Efficiency Video Codec over Wireless Channels
Authors: Mohd Ayyub Khan, Nadeem Akhtar
Abstract:
Due to recent advances in wireless communication technologies and hand-held devices, there is a huge demand for video-based applications such as video surveillance, video conferencing, remote surgery, Digital Video Broadcast (DVB), IPTV, online learning courses, YouTube, WhatsApp, Instagram, Facebook, Interactive Video Games. However, the raw videos posses very high bandwidth which makes the compression a must before its transmission over the wireless channels. The High Efficiency Video Codec (HEVC) (also called H.265) is latest state-of-the-art video coding standard developed by the Joint effort of ITU-T and ISO/IEC teams. HEVC is targeted for high resolution videos such as 4K or 8K resolutions that can fulfil the recent demands for video services. The compression ratio achieved by the HEVC is twice as compared to its predecessor H.264/AVC for same quality level. The compression efficiency is generally increased by removing more correlation between the frames/pixels using complex techniques such as extensive intra and inter prediction techniques. As more correlation is removed, the chances of interdependency among coded bits increases. Thus, bit errors may have large effect on the reconstructed video. Sometimes even single bit error can lead to catastrophic failure of the reconstructed video. In this paper, we study the performance of HEVC bitstream over additive white Gaussian noise (AWGN) channel. Moreover, HEVC over Quadrature Amplitude Modulation (QAM) combined with forward error correction (FEC) schemes are also explored over the noisy channel. The video will be encoded using HEVC, and the coded bitstream is channel coded to provide some redundancies. The channel coded bitstream is then modulated using QAM and transmitted over AWGN channel. At the receiver, the symbols are demodulated and channel decoded to obtain the video bitstream. The bitstream is then used to reconstruct the video using HEVC decoder. It is observed that as the signal to noise ratio of channel is decreased the quality of the reconstructed video decreases drastically. Using proper FEC codes, the quality of the video can be restored up to certain extent. Thus, the performance analysis of HEVC presented in this paper may assist in designing the optimized code rate of FEC such that the quality of the reconstructed video is maximized over wireless channels.Keywords: AWGN, forward error correction, HEVC, video coding, QAM
Procedia PDF Downloads 149207 Cross-Cultural Communications Issues in International Business
Authors: Burova Anna
Abstract:
The current reality, changes in the world system, and the accelerating process of internationalization of the economies of the Middle East, Asia, and Africa dictate new challenges and opportunities. As cultural identity comes to the fore, understanding and developing cross-cultural competencies for effective collaboration becomes essential. Today, we are experiencing both -the integration of the world's economies and cultural disintegration, as each country feels the need for its own cultural, political, and economic sovereignty. Global and effective economic ties are critically needed at this stage of our common historical development. The role of intercultural aspects and sociocultural characteristics of our partners and colleagues cannot be exaggerated. This article presents an analysis of the most common intercultural conflicts in the general corporate environment and current ways of preventing as well as resolving them. A comparative analysis of business communications has revealed certain features of interaction. Based on contextual “landmarks” and points of fundamental disagreement in the perception of verbal and non-verbal messages of representatives of different national cultures, practical conclusions were drawn, and specific recommendations were formed to overcome weaknesses and develop strengths to establish closer and more effective economic and business ties in the international community.Keywords: cross-cultural business communications, management of cross-cultural teams, intercultural conflicts prevention, intercultural competencies development, management, cross-culture
Procedia PDF Downloads 57206 Robotic Solution for Nuclear Facility Safety and Monitoring System
Authors: Altab Hossain, Shakerul Islam, Golamur R. Khan, Abu Zafar M. Salahuddin
Abstract:
An effective identification of breakdowns is of premier importance for the safe and reliable operation of Nuclear Power Plants (NPP) and its associated facilities. A great number of monitoring and diagnosis methodologies are applied and used worldwide in areas such as industry, automobiles, hospitals, and power plant to detect and reduce human disasters. The potential consequences of several hazardous activities may harm the society using nuclear and its associated facilities. Hence, one of the most popular and effective methods to ensure safety and monitor the entire nuclear facility and imply risk-free operation without human interference during the hazardous situation is using a robot. Therefore, in this study, an advanced autonomous robot has been designed and developed that can monitor several parameters in the NPP to ensure the safety and do some risky job in case of nuclear disaster. The robot consisted of autonomous track following unit, data processing and transmitting unit can follow a straight line and take turn as the bank greater than 90 degrees. The developed robot can analyze various parameters such as temperature, altitude, radiation, obstacle, humidity, detecting fire, measuring distance, ultrasonic scan and taking the heat of any particular object. It has an ability to broadcast live stream and can record the document to its own server memory. There is a separate control unit constructed with a baseboard which processes the recorded data and a transmitter which transmits the processed data. To make the robot user-friendly, the code is developed such a way that a user can control any of robotic arm as per types of work. To control at any place and without the track, there is an advanced code has been developed to take manual overwrite. Through this process, administrator who has logged in permission to Dynamic Host Client Protocol (DHCP) can make the handover of the control of the robot. In this process, this robot is provided maximum nuclear security from being hacked. Not only NPP, this robot can be used to maximize the real-time monitoring system of any nuclear facility as well as nuclear material transportation and decomposition system.Keywords: nuclear power plant, radiation, dynamic host client protocol, nuclear security
Procedia PDF Downloads 209205 Exploring Cultural Safety for Individuals from Culturally and Linguistically Diverse Backgrounds Participating in Breast Screening
Authors: Philippa Sambevski
Abstract:
Breast cancer is the most common cancer diagnosed in Australian women. The incidence of breast cancer for Aboriginal and Torres Strait Islander (ATSI) women is lower than for non-indigenous women. However, the mortality rate for ATSI women is higher. The participation rate of ATSI women in BreastScreen Australia is below the general population. In this thematic literature review, the author collates viable strategies to increase breast screening rates among culturally and linguistically diverse individuals and provide culturally competent care. Barriers to accessing BreastScreen for ATSI women include language or communication limits, isolation, and a lack of culturally sensitive information. Culturally competent strategies require healthcare workers with an appropriate cultural and social background, clear messages, and the embedding of cultural respect within healthcare organisations. Cultural safety is determined by partnering with local indigenous groups, recognising the consumer experience, and allowing people to raise their concerns. The corresponding academic poster identifies strategies for healthcare workers to provide culturally competent care in a BreastScreen setting.Keywords: breast screen, closing the gap, Australia, cultural safety, Aboriginal and Torres Strait Islander
Procedia PDF Downloads 113204 The Ontological Memory in Bergson as a Conceptual Tool for the Analysis of the Digital Conjuncture
Authors: Douglas Rossi Ramos
Abstract:
The current digital conjuncture, called by some authors as 'Internet of Things' (IoT), 'Web 2.0' or even 'Web 3.0', consists of a network that encompasses any communication of objects and entities, such as data, information, technologies, and people. At this juncture, especially characterized by an "object socialization," communication can no longer be represented as a simple informational flow of messages from a sender, crossing a channel or medium, reaching a receiver. The idea of communication must, therefore, be thought of more broadly in which it is possible to analyze the process communicative from interactions between humans and nonhumans. To think about this complexity, a communicative process that encompasses both humans and other beings or entities communicating (objects and things), it is necessary to constitute a new epistemology of communication to rethink concepts and notions commonly attributed to humans such as 'memory.' This research aims to contribute to this epistemological constitution from the discussion about the notion of memory according to the complex ontology of Henri Bergson. Among the results (the notion of memory in Bergson presents itself as a conceptual tool for the analysis of posthumanism and the anthropomorphic conjuncture of the new advent of digital), there was the need to think about an ontological memory, analyzed as a being itself (being itself of memory), as a strategy for understanding the forms of interaction and communication that constitute the new digital conjuncture, in which communicating beings or entities tend to interact with each other. Rethinking the idea of communication beyond the dimension of transmission in informative sequences paves the way for an ecological perspective of the digital dwelling condition.Keywords: communication, digital, Henri Bergson, memory
Procedia PDF Downloads 164203 Sufism as Therapy of Terrorism and Extremism with Special Reference to the Teaching of Khawaja Ghulam Fareed and Bulleh Shah
Authors: Arshad Munir, Naseem Akhtar
Abstract:
The determination of the Sufi is to effort towards unity. His main purpose is to bring humanity, separated as it is into so many different units, closer together in the deeper understanding of life. His mission is to bring about brotherhood among races, nations and faiths and to respect one another's faith, scripture and teacher. Sufi is to confer sympathy on these lives, to impart love, compassion and kindheartedness on all creations. The Sufi message is the resonance of the same Divine message which has always come and will always come to inform humanity. It is the continuation of all the pronounced religions which have come at several times and it is amalgamation of them all, which was the wish of all the prophets. Pakistan, who came into being in the name of Islam unfortunately, have linked with terrorism. It is a disgrace that in contemporary day Pakistan, mullahism and the recent cancer of Talibanisation are gradually eating into what had kept us integral as a society. Terrorism has grown-up to develop a prime safety pressure to the area. The terrorism has deadly caused decrease in overseas and local investment, exports, physical infrastructure, and wealth stock ultimately leading to damage of the socio-economic status of Pakistan. Main reasons are ignorance about the actual teaching of Islam both by Muslim and non-Muslim, exploitation by the religious and political influential, sectarianism and extremism, lack of tolerance and broadmindedness and reaction and retortion by the sufferer. The key treatment and therapy of the abovementioned illnesses exist in the messages of Sufism.Keywords: sufism, love, Pakistan, terrorism
Procedia PDF Downloads 302202 Mirrors and Lenses: Multiple Views on Recognition in Holocaust Literature
Authors: Kirsten A. Bartels
Abstract:
There are a number of similarities between survivor literature and Holocaust fiction for children and young adults. The paper explores three facets of the parallels of recognition found specifically between Livia Bitton-Jackson’s memoir of her experience during the Holocaust as an inmate in Auschwitz, I Have Lived a Thousand Years (1999) and Morris Glietzman series of Holocaust fiction. While Bitton-Jackson reflects on her past and Glietzman designs a fictive character, both are judicious with what they are willing to impart, only providing information about their appearance or themselves when it impacts others or when it serves a necessary purpose to the story. Another similarity lies in another critical aspect of many works of Holocaust literature – the idea of being ‘representatively Jewish’. The authors come to this idea from different angles, perhaps best explained as the difference between showing and telling, for Bitton-Jackson provides personal details, and Gleitzman constructed Felix arguably with this idea in mind. Interwoven through their journeys is a shift in perspectives on being recognized -- from wanting to be seen as individuals to being seen as Jew. With this, being Jewish takes on different meaning, both youths struggle with being labeled as something they do not truly understand, and may have not truly identified with, from a label, to a death warrant. With survivor literature viewed as the most credible and worthwhile type of Holocaust literature and Holocaust fiction is often seen as the least (with children’s and young-adult being the lowest form) the similarities in approaches to telling the stories may go overlooked or be undervalued. This paper serves as an exploration in the some of parallel messages shared between the two.Keywords: holocaust fiction, Holocaust literature, representatively Jewish, survivor literature
Procedia PDF Downloads 168201 A Study on Children's Literature for Multiracial Asian American Children
Authors: Kaori Mori Want
Abstract:
American society is a racially diverse society and there are children books that tell the importance of respecting racial differences. Through reading books, children understand the world around them little by little along with their direct interaction with the world in reality. They find role models in books, strive to be like role models, and grow confidence in who they are. Books thus nurture the mind of children. On the other hand, because of their small presence, children books for multiracial Asian American children are scarce. Multiracial Asian American population is increasing but they are still minority in number. The lack of children’s books for these children may deprive the opportunities of them to embrace their multiraciality positively because they cannot find someone like them in any books. Children books for multiracial Asian American are still not that many, but a few have been being published recently. This paper introduces children books for multiracial Asian American children, and examines how they address issues pertaining to these children, and how they could nurture their self-esteem. Many states of the US used to ban interracial marriages and interracial families and their children once were discriminated against in American society. There was even a theory called the hybrid degeneracy theory which claimed that mixed race children were inferior mentally and physically. In this negative social environment, some multiracial Asian American people report that they had trouble embracing their multiracial identity positively. Yet, children books for these children are full of positive messages. This paper will argue the importance of children books for the mental growth of multiracial Asian American children, and how these books can contribute to the development of multiculturalism in the US in general.Keywords: critical mixed race studies in the US, hapa children literature, interracial marriage, multiraciality
Procedia PDF Downloads 360200 Unravelling the Interplay: Chinese Government Tweets, Anti-US Propaganda Cartoons and Social Media Dynamics in US-China Relations
Authors: Mitchell Gallagher
Abstract:
This investigation explores the relationship between Chinese government ministers' tweets and publicized anti-US propaganda political cartoons by Chinese state media. Defining "anti-US" tweets as expressions with negative impressions about the United States, its policies, or cultural values, the study considers their context-dependent nature. Analyzing social media's growing role, this research probes the Chinese government's attitudes toward the United States. While China traditionally adhered to a non-interference stance, instances of verbal and visual retorts occurred, driven by efforts to enhance soft power and counter unfavorable portrayals. To navigate global challenges, China embraced proactive image construction, utilizing political cartoons as a messaging tool. As Sino-American political relations continue deteriorating, it has become increasingly commonplace for Chinese officials to circulate anti-US messages and negative impressions of the United States via tweets. The present study is committed to inspecting the nature and frequency of political cartoons casting the United States in an unfavorable light, with the aim of gaining a comprehensive understanding the degree to which the Chinese government and state-affiliated media are aligned in their corresponding messaging.Keywords: China, political cartoons, propaganda, twitter, social media
Procedia PDF Downloads 72199 Potential Positive Impacts of Online Communities on Mental Health of Women Who Have Experienced Miscarriage
Authors: Mahtab Talafian
Abstract:
With the advent of technology over the last decades, participation in online communities and discussion forums has become increasingly popular. Many studies have been done on the negative role of the online world on human beings’ psychological well-being and mental health, while relatively less attention has been given to the potentially positive role of technology in promoting mental health. Miscarriage is a common and emotionally challenging experience for women, and online communities seem to be a potential source of support for them. This study aimed to firstly find the most common types of support communicated in online communities of women who have miscarried and, secondly, investigate if there is a relationship between participation in online communities and mental health outcomes after miscarriage. In this study, three research methodologies, including content analysis, survey and interview, were employed to answer the research questions. With the analysis of 158 messages, including postings and comments in the online community of Mumsnet, it can be concluded that informational support and emotional support are the most prevalent types of support women share in the online community. Analysis of data gathered from the survey of 19 women who had experienced a miscarriage during the last year showed that participation in online communities makes a significant improvement in their mental health. Interviews also highlighted the helpful role of the online community in relieving emotional disorders, such as trauma, hopelessness, loneliness, stress, depression and anxiety about miscarriage.Keywords: mental health, miscarriage, online community, support
Procedia PDF Downloads 73198 Intelligent Chatbot Generating Dynamic Responses Through Natural Language Processing
Authors: Aarnav Singh, Jatin Moolchandani
Abstract:
The proposed research work aims to build a query-based AI chatbot that can answer any question related to any topic. A chatbot is software that converses with users via text messages. In the proposed system, we aim to build a chatbot that generates a response based on the user’s query. For this, we use natural language processing to analyze the query and some set of texts to form a concise answer. The texts are obtained through web-scrapping and filtering all the credible sources from a web search. The objective of this project is to provide a chatbot that is able to provide simple and accurate answers without the user having to read through a large number of articles and websites. Creating an AI chatbot that can answer a variety of user questions on a variety of topics is the goal of the proposed research project. This chatbot uses natural language processing to comprehend user inquiries and provides succinct responses by examining a collection of writings that were scraped from the internet. The texts are carefully selected from reliable websites that are found via internet searches. This project aims to provide users with a chatbot that provides clear and precise responses, removing the need to go through several articles and web pages in great detail. In addition to exploring the reasons for their broad acceptance and their usefulness across many industries, this article offers an overview of the interest in chatbots throughout the world.Keywords: Chatbot, Artificial Intelligence, natural language processing, web scrapping
Procedia PDF Downloads 65197 A Comparative Analysis of Asymmetric Encryption Schemes on Android Messaging Service
Authors: Mabrouka Algherinai, Fatma Karkouri
Abstract:
Today, Short Message Service (SMS) is an important means of communication. SMS is not only used in informal environment for communication and transaction, but it is also used in formal environments such as institutions, organizations, companies, and business world as a tool for communication and transactions. Therefore, there is a need to secure the information that is being transmitted through this medium to ensure security of information both in transit and at rest. But, encryption has been identified as a means to provide security to SMS messages in transit and at rest. Several past researches have proposed and developed several encryption algorithms for SMS and Information Security. This research aims at comparing the performance of common Asymmetric encryption algorithms on SMS security. The research employs the use of three algorithms, namely RSA, McEliece, and RABIN. Several experiments were performed on SMS of various sizes on android mobile device. The experimental results show that each of the three techniques has different key generation, encryption, and decryption times. The efficiency of an algorithm is determined by the time that it takes for encryption, decryption, and key generation. The best algorithm can be chosen based on the least time required for encryption. The obtained results show the least time when McEliece size 4096 is used. RABIN size 4096 gives most time for encryption and so it is the least effective algorithm when considering encryption. Also, the research shows that McEliece size 2048 has the least time for key generation, and hence, it is the best algorithm as relating to key generation. The result of the algorithms also shows that RSA size 1024 is the most preferable algorithm in terms of decryption as it gives the least time for decryption.Keywords: SMS, RSA, McEliece, RABIN
Procedia PDF Downloads 163196 Online Delivery Approaches of Post Secondary Virtual Inclusive Media Education
Authors: Margot Whitfield, Andrea Ducent, Marie Catherine Rombaut, Katia Iassinovskaia, Deborah Fels
Abstract:
Learning how to create inclusive media, such as closed captioning (CC) and audio description (AD), in North America is restricted to the private sector, proprietary company-based training. We are delivering (through synchronous and asynchronous online learning) the first Canadian post-secondary, practice-based continuing education course package in inclusive media for broadcast production and processes. Despite the prevalence of CC and AD taught within the field of translation studies in Europe, North America has no comparable field of study. This novel approach to audio visual translation (AVT) education develops evidence-based methodology innovations, stemming from user study research with blind/low vision and Deaf/hard of hearing audiences for television and theatre, undertaken at Ryerson University. Knowledge outcomes from the courses include a) Understanding how CC/AD fit within disability/regulatory frameworks in Canada. b) Knowledge of how CC/AD could be employed in the initial stages of production development within broadcasting. c) Writing and/or speaking techniques designed for media. d) Hands-on practice in captioning re-speaking techniques and open source technologies, or in AD techniques. e) Understanding of audio production technologies and editing techniques. The case study of the curriculum development and deployment, involving first-time online course delivery from academic and practitioner-based instructors in introductory Captioning and Audio Description courses (CDIM 101 and 102), will compare two different instructors' approaches to learning design, including the ratio of synchronous and asynchronous classroom time and technological engagement tools on meeting software platform such as breakout rooms and polling. Student reception of these two different approaches will be analysed using qualitative thematic and quantitative survey analysis. Thus far, anecdotal conversations with students suggests that they prefer synchronous compared with asynchronous learning within our hands-on online course delivery method.Keywords: inclusive media theory, broadcasting practices, AVT post secondary education, respeaking, audio description, learning design, virtual education
Procedia PDF Downloads 183195 Representation of Pashtuns in the Context of Terrorism: A Comparative Study of Bollywood and Lollywood Movies After 9/11
Authors: Aamir Ayub, Yasir Shehzad, Shakeel Ahmad
Abstract:
This research paper aims to understand how the Pashtuns have been represented in relationship to terrorism in post-9/11 Bollywood and Lollywood movies. It focuses particularly on ‘Torbaaz’ from Bollywood and ‘Waar’ from Lollywood in order to define the nature of Pashtun characterization, the functioning of intelligence agencies, as well as the socio-political side of the represented narratives. In this research, the analytical approach developed is applied to contemplate how these films represent or fail to represent Pashtun identity, taking into consideration the cultural, historical and social dimensions. The study also aims to examine the effects of the media, particularly on the different ethnic groups’ perceptions of terrorism. In this case, it covers how the movie relates actual events in society – specifically, socio-political – to the messages in the film regarding the Pashtun people and their portrayal. Such elements may constitute the portrayal of intelligence agencies and their fight against terrorism, state-security dynamics, and the Pashtun society. In conclusion, this research paper focuses on the representation of Pashtuns in films after 9/11 and addresses the issue concerning the representation of ethnic groups in the method of the theme of terrorism. It provides ideas about the role of media in influencing the mind of the society and their attitude towards certain communities after geopolitics upheavals.Keywords: pashtun representation, terrorism, 9/11 attacks, socio-political implications, ethnic representation in media
Procedia PDF Downloads 21