Search results for: anonymous
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 128

Search results for: anonymous

128 Fears of Strangers: Causes of Anonymity Rejection on Virtual World

Authors: Proud Arunrangsiwed

Abstract:

This research is a collaborative narrative research, which is mixed with issues of selected papers and researcher's experience as an anonymous user on social networking sites. The objective of this research is to understand the reasons of the regular users who reject to contact with anonymous users, and to study the communication traditions used in the selected studies. Anonymous users are rejected by regular users, because of the fear of cyber bully, the fear of unpleasant behaviors, and unwillingness of changing communication norm. The suggestion for future research design is to use longitudinal design or quantitative design; and the theory in rhetorical tradition should be able to help develop a strong trust message.

Keywords: anonymous, anonymity, online identity, trust message, reliability

Procedia PDF Downloads 337
127 Secure Network Coding-Based Named Data Network Mutual Anonymity Transfer Protocol

Authors: Tao Feng, Fei Xing, Ye Lu, Jun Li Fang

Abstract:

NDN is a kind of future Internet architecture. Due to the NDN design introduces four privacy challenges,Many research institutions began to care about the privacy issues of naming data network(NDN).In this paper, we are in view of the major NDN’s privacy issues to investigate privacy protection,then put forwards more effectively anonymous transfer policy for NDN.Firstly,based on mutual anonymity communication for MP2P networks,we propose NDN mutual anonymity protocol.Secondly,we add interest package authentication mechanism in the protocol and encrypt the coding coefficient, security of this protocol is improved by this way.Finally, we proof the proposed anonymous transfer protocol security and anonymity.

Keywords: NDN, mutual anonymity, anonymous routing, network coding, authentication mechanism

Procedia PDF Downloads 417
126 The Role of Virtual Group Anonymity in the Generation, Selection, and Refinement of Ideas

Authors: Jonali Baruah, Keesha Green

Abstract:

This experimental study examines the effects of anonymity in video meeting groups across the stages of innovation (idea generation, selection, and refinement) on various measures of creativity. A sample of 92 undergraduate students participated in small groups of three to four members to complete creativity, decision-making, and idea-refinement task in either anonymous or identified conditions. The study followed two anonymity (anonymous and identified) X 3 stages of innovation (idea generation, idea selection, and idea refinement) in a mixed factorial design. Results revealed that the anonymous groups produced ideas of the highest average quality in the refinement phase of innovation. The results of this study enhanced our understanding of the productivity and creativity of groups in computer-mediated communication.

Keywords: creativity, anonymity, idea-generation, idea-refinement, innovation

Procedia PDF Downloads 96
125 Anonymity and Irreplaceability: Gross Anatomical Practices in Japanese Medical Education

Authors: Ayami Umemura

Abstract:

Without exception, all the bodies dissected in the gross anatomical practices are bodies that have lived irreplaceable lives, laughing and talking with family and friends. While medical education aims to cultivate medical knowledge that is universally applicable to all human bodies, it relies on a unique, irreplaceable, and singular entity. In this presentation, we will explore the ``irreplaceable relationship'' that is cultivated between medical students and anonymous cadavers during gross anatomical practices, drawing on Emmanuel Levinas's ``ethics of the face'' and Martin Buber's discussion of “I-Thou.'' Through this, we aim to present ``a different ethic'' that emerges only in the context of face-to-face relationships, which differs from the generalized, institutionalized, mass-produced ethics like seen in so-called ``ethics codes.'' Since the 1990s, there has been a movement around the world to use gross anatomical practices as an "educational tool" for medical professionalism and medical ethics, and some educational institutions have started disclosing the actual names, occupations, and places of birth of corpses to medical students. These efforts have also been criticized because they lack medical calmness. In any case, the issue here is that this information is all about the past that medical students never know directly. The critical fact that medical students are building relationships from scratch and spending precious time together without any information about the corpses before death is overlooked. Amid gross anatomical practices, a medical student is exposed to anonymous cadavers with faces and touching and feeling them. In this presentation, we will examine a collection of essays written by medical students on gross anatomical practices collected by the Japanese Association for Volunteer Body Donation from medical students across the country since 1978. There, we see the students calling out to the corpse, being called out to, being encouraged, superimposing the carcasses on their own immediate family, regretting parting, and shedding tears. Then, medical students can be seen addressing the dead body in the second person singular, “you.” These behaviors reveal an irreplaceable relationship between the anonymous cadavers and the medical students. The moment they become involved in an irreplaceable relationship between “I and you,” an accidental and anonymous encounter becomes inevitable. When medical students notice being the inevitable takers of voluntary and addressless gifts, they pledge to become “Good Doctors” owing the anonymous persons. This presentation aims to present “a different ethic” based on uniqueness and irreplaceability that comes from the faces of the others embedded in each context, which is different from “routine” and “institutionalized” ethics. That can only be realized ``because of anonymity''.

Keywords: anonymity, irreplaceability, uniqueness, singularlity, emanuel levinas, martin buber, alain badiou, medical education

Procedia PDF Downloads 36
124 How to Reach Adolescents Vulnerable for Suicidal Behaviour: A Qualitative Study

Authors: Birgit Reime, Sonja Gscheidle, Toni Hübener, Lara Hübener

Abstract:

Suicide in individuals under 30 years is a global public health concern. The objective of this study was to identify strategies for the prevention of suicide and suicidal behavior preferred by adolescents and young adults who are vulnerable to suicidal behavior and by relevant experts. Using semi-structured interviews with n= 17 adolescents and young adults (18-25 years of age) and with n= 11 experts from relevant fields, we have applied an inductive approach and applied thematic content analysis. Six strategies for suicide prevention in young individuals were reported. These were digital solutions with appealing designs, anonymous support, trained peer support, spiritual support, improving existing structures, and raising suicide literacy. Accessibility of anonymous digital support may contribute to suicide prevention in young people.

Keywords: suicide prevention, adolescents, E-health, Germany

Procedia PDF Downloads 148
123 Need for Cognition: An Important, Neglected Personality Variable in the Development of Spirituality Within the Context of Twelve Step Recovery from Addictive Disorders

Authors: Paul E. Priester

Abstract:

The Twelve Step approach to recovery from substance use and addictive disorders is considered an evidence-based model that assists many who recover from a chronic, progressive, fatal disease. Two key processes that contribute to the success of obtaining recovery from substance use disorders (SUD) are meeting engagement and the development of spiritual beliefs. Beyond establishing that there is a positive relationship between the development of spiritual beliefs in recovery from SUD’s, there has been a paucity of research exploring individual differences among individuals in this development of spiritual beliefs. One such personality variable that deserves exploration is that of the need for cognition. The need for cognition is a personality variable that explains the cognitive style of individuals. Individuals with a high need for cognition enjoy examining the complexities of a situation before coming to a conclusion. While individuals with a low need for cognition do not value or spend time cognitively dissecting a situation or decision. It is important to point out that a high need for cognition does not necessarily imply a high level of cognitive ability. Indeed, one could make the argument that a low need for cognition individual is not “wasting” cognitive energy in perseverating the multitude of aspects of a particular decision. This paper will present two case studies demonstrating the development of spiritual beliefs that enabled long-term recovery from SUD. The first case study presents an agnostic individual with a low need for cognition cognitive style in his development of spirituality in support of his recovery from alcoholism within the context of Alcoholics Anonymous. The second case study represents an adamant atheist with a high need for cognition cognitive style. This second individual is an intravenous cocaine addict and alcoholic who recovers through the development of spirituality within the contexts of Alcoholics Anonymous and Narcotics Anonymous. The two case studies will be contrasted with each other, noting how the individuals’ cognitive style mediated the development of spirituality that supported their long-term recovery from alcoholism and addiction.

Keywords: spirituality, twelve step recovery, need for cognition, individual differences in recovery from addictions

Procedia PDF Downloads 47
122 Fostering Students' Engagement with Historical Issues Surrounding the Field of Graphic Design

Authors: Sara Corvino

Abstract:

The aim of this study is to explore the potential of inclusive learning and assessment strategies to foster students' engagement with historical debates surrounding the field of graphic design. The goal is to respond to the diversity of L4 Graphic Design students, at Nottingham Trent University, in a way that instead of 'lowering standards' can benefit everyone. This research tests, measures, and evaluates the impact of a specific intervention, an assessment task, to develop students' critical visual analysis skills and stimulate a deeper engagement with the subject matter. Within the action research approach, this work has followed a case study research method to understand students' views and perceptions of a specific project. The primary methods of data collection have been: anonymous electronic questionnaire and a paper-based anonymous critical incident questionnaire. NTU College of Business Law and Social Sciences Research Ethics Committee granted the Ethical approval for this research in November 2019. Other methods used to evaluate the impact of this assessment task have been Evasys's report and students' performance. In line with the constructivist paradigm, this study embraces an interpretative and contextualized analysis of the collected data within the triangulation analytical framework. The evaluation of both qualitative and quantitative data demonstrates that active learning strategies and the disruption of thinking patterns can foster greater students' engagement and can lead to meaningful learning.

Keywords: active learning, assessment for learning, graphic design, higher education, student engagement

Procedia PDF Downloads 151
121 Cognition in Context: Investigating the Impact of Persuasive Outcomes across Face-to-Face, Social Media and Virtual Reality Environments

Authors: Claire Tranter, Coral Dando

Abstract:

Gathering information from others is a fundamental goal for those concerned with investigating crime, and protecting national and international security. Persuading an individual to move from an opposing to converging viewpoint, and an understanding on the cognitive style behind this change can serve to increase understanding of traditional face-to-face interactions, as well as synthetic environments (SEs) often used for communication across varying geographical locations. SEs are growing in usage, and with this increase comes an increase in crime being undertaken online. Communication technologies can allow people to mask their real identities, supporting anonymous communication which can raise significant challenges for investigators when monitoring and managing these conversations inside SEs. To date, the psychological literature concerning how to maximise information-gain in SEs for real-world interviewing purposes is sparse, and as such this aspect of social cognition is not well understood. Here, we introduce an overview of a novel programme of PhD research which seeks to enhance understanding of cross-cultural and cross-gender communication in SEs for maximising information gain. Utilising a dyadic jury paradigm, participants interacted with a confederate who attempted to persuade them to the opposing verdict across three distinct environments: face-to-face, instant messaging, and a novel virtual reality environment utilising avatars. Participants discussed a criminal scenario, acting as a two-person (male; female) jury. Persuasion was manipulated by the confederate claiming an opposing viewpoint (guilty v. not guilty) to the naïve participants from the outset. Pre and post discussion data, and observational digital recordings (voice and video) of participant’ discussion performance was collected. Information regarding cognitive style was also collected to ascertain participants need for cognitive closure and biases towards jumping to conclusions. Findings revealed that individuals communicating via an avatar in a virtual reality environment reacted in a similar way, and thus equally persuasive, when compared to individuals communicating face-to-face. Anonymous instant messaging however created a resistance to persuasion in participants, with males showing a significant decline in persuasive outcomes compared to face to face. The findings reveal new insights particularly regarding the interplay of persuasion on gender and modality, with anonymous instant messaging enhancing resistance to persuasion attempts. This study illuminates how varying SE can support new theoretical and applied understandings of how judgments are formed and modified in response to advocacy.

Keywords: applied cognition, persuasion, social media, virtual reality

Procedia PDF Downloads 124
120 Materials and Techniques of Anonymous Egyptian Polychrome Cartonnage Mummy Mask: A Multiple Analytical Study

Authors: Hanaa A. Al-Gaoudi, Hassan Ebeid

Abstract:

The research investigates the materials and processes used in the manufacturing of an Egyptian polychrome cartonnage mummy mask with the aim of dating this object and establishing trade patterns of certain materials that were used and available at the time of ancient Egypt. This anonymous-source object was held in the basement storage of the Egyptian Museum in Cairo (EMC) and has never been on display. Furthermore, there is no information available regarding its owner, provenance, date, and even the time of its possession by the museum. Moreover, the object is in a very poor condition where almost two-thirds of the mask was bent and has never received any previous conservation treatment. This research has utilized well-established multi-analytical methods to identify the considerable diversity of materials that have been used in the manufacturing of this object. These methods include Computed Tomography Scan (CT scan) to acquire detailed pictures of the inside physical structure and condition of the bended layers. Dino-Lite portable digital microscope, scanning electron microscopy with energy dispersive X-ray spectrometer (SEM-EDX), and the non-invasive imaging technique of multispectral imaging (MSI) to obtain information about the physical characteristics and condition of the painted layers and to examine the microstructure of the materials. Portable XRF Spectrometer (PXRF) and X-Ray powder diffraction (XRD) to identify mineral phases and the bulk element composition in the gilded layer, ground, and pigments; Fourier-transform infrared (FTIR) to identify organic compounds and their molecular characterization; accelerator mass spectrometry (AMS 14C) to date the object. Preliminary results suggest that there are no human remains inside the object, and the textile support is linen fibres with tabby weave 1/1 and these fibres are in a very bad condition. Several pigments have been identified, such as Egyptian blue, Magnetite, Egyptian green frit, Hematite, Calcite, and Cinnabar; moreover, the gilded layers are pure gold and the binding media in the pigments is Arabic gum and animal glue in the textile support layer.

Keywords: analytical methods, Egyptian museum, mummy mask, pigments, textile

Procedia PDF Downloads 96
119 Early Prediction of Disposable Addresses in Ethereum Blockchain

Authors: Ahmad Saleem

Abstract:

Ethereum is the second largest crypto currency in blockchain ecosystem. Along with standard transactions, it supports smart contracts and NFT’s. Current research trends are focused on analyzing the overall structure of the network its growth and behavior. Ethereum addresses are anonymous and can be created on fly. The nature of Ethereum network and addresses make it hard to predict their behavior. The activity period of an ethereum address is not much analyzed. Using machine learning we can make early prediction about the disposability of the address. In this paper we analyzed the lifetime of the addresses. We also identified and predicted the disposable addresses using machine learning models and compared the results.

Keywords: blockchain, Ethereum, cryptocurrency, prediction

Procedia PDF Downloads 69
118 Finite Element Analysis of Rom Silo Subjected to 5000 Tons Monotic Loads at an Anonymous Mine in Zimbabwe

Authors: T. Mushiri, K. Tengende, C. Mbohwa, T. Garikayi

Abstract:

This paper introduces finite element analysis of Run off Mine (ROM) silo subjected to dynamic loading. The proposed procedure is based on the use of theoretical equations to come up with pressure and forces exerted by Platinum Group Metals (PGMs) ore to the silo wall. Finite Element Analysis of the silo involves the use of CAD software (AutoCAD) for3D creation and CAE software (T-FLEX) for the simulation work with an optimization routine to minimize the mass and also ensure structural stiffness and stability. In this research an efficient way to design and analysis of a silo in 3D T-FLEX (CAD) program was created the silo to stay within the constrains and so as to know the points of failure due dynamic loading.

Keywords: reinforced concrete silo, finite element analysis, T-FLEX software, AutoCAD

Procedia PDF Downloads 451
117 Willingness and Attitude towards Organ Donation of Nurses in Taiwan

Authors: ShuYing Chung, Minchuan Huang, Iping Chen

Abstract:

Taking the medical staff in an emergency ward of a medical center in Central Taiwan as the research object, the questionnaire data were collected by anonymous and voluntary reporting methods with structured questionnaire to explore the actual situation, willingness and attitude of organ donation. Only 80 valid questionnaires were collected. Among the 8 questions, the average correct rate was 5.9 + 1.2, and the correct rate was 73.13%. The willingness of organ donation that 7.5% of the people are not willing; 92.5% of the people are willing, of which 62.5% have considered but have not yet decided; 21.3% are willing but have not signed the consent of organ donation; They have signed the consent of organ donation 8.7%. The average total score (standard deviation) of attitude towards organ donation was 36.2. There is no significant difference between the demographic variables and the awareness and willingness of organ donation, but there is a significant correlation between the marital status and the attitude of organ donation.

Keywords: clinical psychology, organ donation, doctors affecting psychological disorders, commitment

Procedia PDF Downloads 111
116 A Grounded Theory of Educational Leadership Development Using Generative Dialogue

Authors: Elizabeth Hartney, Keith Borkowsky, Jo Axe, Doug Hamilton

Abstract:

The aim of this research is to develop a grounded theory of educational leadership development, using an approach to initiating and maintaining professional growth in school principals and vice principals termed generative dialogue. The research was conducted in a relatively affluent, urban school district in Western Canada. Generative dialogue interviews were conducted by a team of consultants, and anonymous data in the form of handwritten notes were voluntarily submitted to the research team. The data were transcribed and analyzed using grounded theory. The results indicate that a key focus of educational leadership development is focused on navigating relationships within the school setting and that the generative dialogue process is helpful for principals and vice principals to explore how they might do this. Applicability and limitations of the study are addressed.

Keywords: generative dialogue, school principals, grounded theory, leadership development

Procedia PDF Downloads 306
115 Improving University Operations with Data Mining: Predicting Student Performance

Authors: Mladen Dragičević, Mirjana Pejić Bach, Vanja Šimičević

Abstract:

The purpose of this paper is to develop models that would enable predicting student success. These models could improve allocation of students among colleges and optimize the newly introduced model of government subsidies for higher education. For the purpose of collecting data, an anonymous survey was carried out in the last year of undergraduate degree student population using random sampling method. Decision trees were created of which two have been chosen that were most successful in predicting student success based on two criteria: Grade Point Average (GPA) and time that a student needs to finish the undergraduate program (time-to-degree). Decision trees have been shown as a good method of classification student success and they could be even more improved by increasing survey sample and developing specialized decision trees for each type of college. These types of methods have a big potential for use in decision support systems.

Keywords: data mining, knowledge discovery in databases, prediction models, student success

Procedia PDF Downloads 383
114 Half-Human: Examining Right-Wing Authoritarianism and Social Dominance Orientation Effects on Dehumanization Tendencies

Authors: Brianna Ross, John Sollers, Christopher Edwards

Abstract:

In the age of heightened social and political discourse, there is a tendency for individuals and media sources to use dehumanization as a tool to influence group thoughts and attitudes. When considering individual interactions, there is a need to determine what characteristics increase or predict dehumanization. The present study investigated dehumanization tendencies related to social dominance orientation (SDO) and right-wing authoritarianism (RWA) while factoring in political affiliation. Two-hundred and seven individuals participated in an anonymous study to reveal that there was a significant relationship between high SDO and high RWA scores. There was also a significant correlation between the dehumanization of Black Lives Matter and SDO. These findings suggest that those who are “double high” (scoring highly on both SDO and RWA are more likely to dehumanize others, particularly social groups they disagree with. Acknowledging that there are significant changes occurring in the sociopolitical atmosphere, it is essential that researchers understand dehumanization tendencies in modern society to better define the concept of othering and its consequences on social interaction.

Keywords: dehumanization, social dominance orientation, right-wing authoritarianism, political affiliation

Procedia PDF Downloads 111
113 Thai Teenage Prostitution Online

Authors: Somdech Rungsrisawat

Abstract:

The purposes of this research are to investigate Thai teens’ attitude toward prostitution on the internet, to discover the causes of teenage prostitution and to study the relationship between teenage promiscuity and the causes of teenage prostitution. This study is a mixed research which utilized both qualitative and quantitative approach. The population of this study included teenagers and early adults between 14-21 years old who were studying in high schools, colleges, or universities. A total of 600 respondents was sampled for interviews using a questionnaire, and 48 samples were chosen for an in-depth interview. The findings revealed that the majority of respondents recognized that teenage prostitution on line was real. The reasons for choosing the internet to contact with customers included easy, convenient, safe, and anonymous. Moreover, the internet allowed teen prostitutes to contact customers anywhere and anytime. The correlation showed that promiscuity was related to the trend of teen prostitution. Other factors that contributed to increasing widespread teen prostitution online included their need for quick money to buy luxurious products and to support their extravagant behavior.

Keywords: internet, prostitutes, online, Thai teens

Procedia PDF Downloads 272
112 Decentralized Data Marketplace Framework Using Blockchain-Based Smart Contract

Authors: Meshari Aljohani, Stephan Olariu, Ravi Mukkamala

Abstract:

Data is essential for enhancing the quality of life. Its value creates chances for users to profit from data sales and purchases. Users in data marketplaces, however, must share and trade data in a secure and trusted environment while maintaining their privacy. The first main contribution of this paper is to identify enabling technologies and challenges facing the development of decentralized data marketplaces. The second main contribution is to propose a decentralized data marketplace framework based on blockchain technology. The proposed framework enables sellers and buyers to transact with more confidence. Using a security deposit, the system implements a unique approach for enforcing honesty in data exchange among anonymous individuals. Before the transaction is considered complete, the system has a time frame. As a result, users can submit disputes to the arbitrators which will review them and respond with their decision. Use cases are presented to demonstrate how these technologies help data marketplaces handle issues and challenges.

Keywords: blockchain, data, data marketplace, smart contract, reputation system

Procedia PDF Downloads 134
111 The Economic Implications of Cryptocurrency and Its Potential to Disrupt Traditional Financial Systems as a Store of Value

Authors: G. L. Rithika, Arvind B. S., Akash R., Ananda Vinayak, Hema M. S.

Abstract:

Cryptocurrencies were first launched in the year 2009 and have been a great asset to own. Cryptocurrencies are a representation of a completely distinct decentralization model for money. They also contribute to the elimination of currency monopolies and the liberation of money from control. The fact that no government agency can determine a coin's value or flow is what cryptocurrency advocates believe makes them safe and secure. The aim of this paper is to analyze the economic implications of cryptocurrency and how it would disrupt traditional financial systems. This paper analyses the growth of Cryptocurrency over the years and the potential threats of cryptocurrency to financial systems. Our analysis shows that although the DeFi design, like the traditional financial system, may have the ability to lower transaction costs, there are multiple layers where rents might build up because of endogenous competition limitations. The permissionless and anonymous design of DeFi poses issues for ensuring tax compliance, anti-money laundering laws and regulations, and preventing financial misconduct.

Keywords: cryptocurrencies, bitcoin, blockchain technology, traditional financial systems, decentralisation, regulatory framework

Procedia PDF Downloads 14
110 Perception of Inclusion in Higher Education

Authors: Hoi Nga Ng, Kam Weng Boey, Chi Wai Kwan

Abstract:

Supporters of Inclusive education proclaim that all students, regardless of disabilities or special educational needs (SEN), have the right to study in the normal school setting. It is asserted that students with SEN would benefit in academic performance and psychosocial adjustment via participation in common learning activities within the ordinary school system. When more and more students of SEN completed their early schooling, institute of higher education become the setting where students of SEN continue their learning. This study aimed to investigate the school well-being, social relationship, and academic self-concept of students of SEN in higher education. The Perception of Inclusion Questionnaire (PIQ) was used as the measuring instruments. PIQ was validated and incorporated in a questionnaire designed for online survey. Participation was voluntary and anonymous. A total of 90 students with SEN and 457 students without SEN responded to the online survey. Results showed no significant differences in school well-being and social relationship between students with and without SEN, but students with SEN, particularly those with learning and development impairment and those with mental illness and emotional problems, were significantly poorer in academic self-concept. Implications of the findings were discussed.

Keywords: ccademic self-concept, school well-being, social relationship, special educational needs

Procedia PDF Downloads 149
109 Equation to an Unknown (1980): Visibility, Community, and Rendering Queer Utopia

Authors: Ted Silva

Abstract:

Dietrich de Velsa's Équation à un inconnu / Equation to an Unknown hybridizes art cinema style with the sexually explicit aesthetics of pornography to envision a uniquely queer world unmoored by heteronormative influence. This stylization evokes the memory of a queer history that once approximated such a prospect. With this historical and political context in mind, this paper utilizes formal analysis to assess how the film frames queer sexual encounters as tender acts of care, sometimes literally mending physical wounds. However, Equation to Unknown also highlights the transience of these sexual exchanges. By emphasizing the homogeneity of the protagonist’s sexual conquests, the film reveals that these practices have a darker meaning when the men reject the individualized connection to pursue purely visceral gratification. Given the lack of diversity or even recognizable identifying factors, the men become more anonymous to each other the more they pair up. Ultimately, Equation to an Unknown both celebrates and problematizes its vision of a queer utopia, highlighting areas in the community wherein intimacy and care flourish and locating those spots in which they are neglected.

Keywords: pornography studies, queer cinema, French cinema, history

Procedia PDF Downloads 61
108 Anonymous Editing Prevention Technique Using Gradient Method for High-Quality Video

Authors: Jiwon Lee, Chanho Jung, Si-Hwan Jang, Kyung-Ill Kim, Sanghyun Joo, Wook-Ho Son

Abstract:

Since the advances in digital imaging technologies have led to development of high quality digital devices, there are a lot of illegal copies of copyrighted video content on the internet. Thus, we propose a high-quality (HQ) video watermarking scheme that can prevent these illegal copies from spreading out. The proposed scheme is applied spatial and temporal gradient methods to improve the fidelity and detection performance. Also, the scheme duplicates the watermark signal temporally to alleviate the signal reduction caused by geometric and signal-processing distortions. Experimental results show that the proposed scheme achieves better performance than previously proposed schemes and it has high fidelity. The proposed scheme can be used in broadcast monitoring or traitor tracking applications which need fast detection process to prevent illegally recorded video content from spreading out.

Keywords: editing prevention technique, gradient method, luminance change, video watermarking

Procedia PDF Downloads 418
107 Use of Social Networks and Mobile Technologies in Education

Authors: Václav Maněna, Roman Dostál, Štěpán Hubálovský

Abstract:

Social networks play an important role in the lives of children and young people. Along with the high penetration of mobile technologies such as smartphones and tablets among the younger generation, there is an increasing use of social networks already in elementary school. The paper presents the results of research, which was realized at schools in the Hradec Králové region. In this research, the authors focused on issues related to communications on social networks for children, teenagers and young people in the Czech Republic. This research was conducted at selected elementary, secondary and high schools using anonymous questionnaires. The results are evaluated and compared with the results of the research, which has been realized in 2008. The authors focused on the possibilities of using social networks in education. The paper presents the possibility of using the most popular social networks in education, with emphasis on increasing motivation for learning. The paper presents comparative analysis of social networks, with regard to the possibility of using in education as well.

Keywords: social networks, motivation, e-learning, mobile technology

Procedia PDF Downloads 287
106 Coping Orientation of Academic Community in the Time of COVID-19 Pandemic: A Pilot Survey Study

Authors: Fereshteh Ahmadi, Önver Cetrez, Said Zandi, Sharareh Akhavan

Abstract:

In this paper, we have mapped the coping methods used to address the coronavirus pandemic by members of the academic community. We conducted an anonymous survey of a convenient sample of 674 faculty/staff members and students from September to December 2020. A modified version of the RCOPE scale was used for data collection. The results indicate that both religious and existential coping methods were used by respondents. The study also indicates that even though 71% of in-formants believed in God or another religious figure, 61% reported that they had tried to gain control of the situation directly without the help of God or another religious figure. The ranking of the coping strategies used indicates that the first five methods used by informants were all non-religious coping methods (i.e., secular existential coping methods): regarding life as a part of a greater whole, regarding nature as an important resource, listening to the sound of surrounding nature, being alone and con-templating, and walking/engaging in any activities outdoors giving a spiritual feeling. Our results contribute to the new area of research on academic community’s coping with pandemic-related stress and challenges.

Keywords: academic staff, academics, coping strategies, coronavirus epidemic, higher education.

Procedia PDF Downloads 53
105 Revealing Corruption through Strategic Narration in Mandla Langa’s Memory of Stones (2000)

Authors: Dzunisani Sibuyi

Abstract:

This article demonstrates how corruption is revealed in Mandla Langa’s Memory of Stones (2000) through the deployment of narrational strategies by applying narrative theories by Gerard Genette’s Narrative Discourse and Narrative Discourse Revisited, as well as Mikhail Bakhtin’s Dialogic Imagination to the text. This is accomplished by analysing Langa’s use of extradiegetic-heterodiegetic and intradiegetic-homodiegetic narrational strategies respectively employed by the anonymous narrator and character narrator Mpanza. The narration provided by these narrators is multi-voiced in its approach to the events depicting corruption from various completing and explanatory perspectives. In addition, Langa also employs narrative techniques of narrating times such as simultaneous, subsequent, and interpolated narration to highlight corruption taking place, which is highlighted by situating the story in its presentness moments coinciding with the corruption action. As a result, by emphasising the events portraying the plight of the main characters and their struggle to resist and defeat corrupt leaders, the narration strategically reveals corruption.

Keywords: narrational strategies, narrating voice, dialogism, corruption, Gérard Genette, Mandla Langa, Mikhail Bakhtin, time(s) of the narration

Procedia PDF Downloads 75
104 Statistical Shape Analysis of the Human Upper Airway

Authors: Ramkumar Gunasekaran, John Cater, Vinod Suresh, Haribalan Kumar

Abstract:

The main objective of this project is to develop a statistical shape model using principal component analysis that could be used for analyzing the shape of the human airway. The ultimate goal of this project is to identify geometric risk factors for diagnosis and management of Obstructive Sleep Apnoea (OSA). Anonymous CBCT scans of 25 individuals were obtained from the Otago Radiology Group. The airways were segmented between the hard-palate and the aryepiglottic fold using snake active contour segmentation. The point data cloud of the segmented images was then fitted with a bi-cubic mesh, and pseudo landmarks were placed to perform PCA on the segmented airway to analyze the shape of the airway and to find the relationship between the shape and OSA risk factors. From the PCA results, the first four modes of variation were found to be significant. Mode 1 was interpreted to be the overall length of the airway, Mode 2 was related to the anterior-posterior width of the retroglossal region, Mode 3 was related to the lateral dimension of the oropharyngeal region and Mode 4 was related to the anterior-posterior width of the oropharyngeal region. All these regions are subjected to the risk factors of OSA.

Keywords: medical imaging, image processing, FEM/BEM, statistical modelling

Procedia PDF Downloads 481
103 Exploring Syntactic and Semantic Features for Text-Based Authorship Attribution

Authors: Haiyan Wu, Ying Liu, Shaoyun Shi

Abstract:

Authorship attribution is to extract features to identify authors of anonymous documents. Many previous works on authorship attribution focus on statistical style features (e.g., sentence/word length), content features (e.g., frequent words, n-grams). Modeling these features by regression or some transparent machine learning methods gives a portrait of the authors' writing style. But these methods do not capture the syntactic (e.g., dependency relationship) or semantic (e.g., topics) information. In recent years, some researchers model syntactic trees or latent semantic information by neural networks. However, few works take them together. Besides, predictions by neural networks are difficult to explain, which is vital in authorship attribution tasks. In this paper, we not only utilize the statistical style and content features but also take advantage of both syntactic and semantic features. Different from an end-to-end neural model, feature selection and prediction are two steps in our method. An attentive n-gram network is utilized to select useful features, and logistic regression is applied to give prediction and understandable representation of writing style. Experiments show that our extracted features can improve the state-of-the-art methods on three benchmark datasets.

Keywords: authorship attribution, attention mechanism, syntactic feature, feature extraction

Procedia PDF Downloads 104
102 Walmart Sales Forecasting using Machine Learning in Python

Authors: Niyati Sharma, Om Anand, Sanjeev Kumar Prasad

Abstract:

Assuming future sale value for any of the organizations is one of the major essential characteristics of tactical development. Walmart Sales Forecasting is the finest illustration to work with as a beginner; subsequently, it has the major retail data set. Walmart uses this sales estimate problem for hiring purposes also. We would like to analyzing how the internal and external effects of one of the largest companies in the US can walk out their Weekly Sales in the future. Demand forecasting is the planned prerequisite of products or services in the imminent on the basis of present and previous data and different stages of the market. Since all associations is facing the anonymous future and we do not distinguish in the future good demand. Hence, through exploring former statistics and recent market statistics, we envisage the forthcoming claim and building of individual goods, which are extra challenging in the near future. As a result of this, we are producing the required products in pursuance of the petition of the souk in advance. We will be using several machine learning models to test the exactness and then lastly, train the whole data by Using linear regression and fitting the training data into it. Accuracy is 8.88%. The extra trees regression model gives the best accuracy of 97.15%.

Keywords: random forest algorithm, linear regression algorithm, extra trees classifier, mean absolute error

Procedia PDF Downloads 120
101 Blocking of Random Chat Apps at Home Routers for Juvenile Protection in South Korea

Authors: Min Jin Kwon, Seung Won Kim, Eui Yeon Kim, Haeyoung Lee

Abstract:

Numerous anonymous chat apps that help people to connect with random strangers have been released in South Korea. However, they become a serious problem for young people since young people often use them for channels of prostitution or sexual violence. Although ISPs in South Korea are responsible for making inappropriate content inaccessible on their networks, they do not block traffic of random chat apps since 1) the use of random chat apps is entirely legal. 2) it is reported that they use HTTP proxy blocking so that non-HTTP traffic cannot be blocked. In this paper, we propose a service model that can block random chat apps at home routers. A service provider manages a blacklist that contains blocked apps’ information. Home routers that subscribe the service filter the traffic of the apps out using deep packet inspection. We have implemented a prototype of the proposed model, including a centralized server providing the blacklist, a Raspberry Pi-based home router that can filter traffic of the apps out, and an Android app used by the router’s administrator to locally customize the blacklist.

Keywords: deep packet inspection, internet filtering, juvenile protection, technical blocking

Procedia PDF Downloads 321
100 Acoustic Analysis for Comparison and Identification of Normal and Disguised Speech of Individuals

Authors: Surbhi Mathur, J. M. Vyas

Abstract:

Although the rapid development of forensic speaker recognition technology has been conducted, there are still many problems to be solved. The biggest problem arises when the cases involving disguised voice samples come across for the purpose of examination and identification. Such type of voice samples of anonymous callers is frequently encountered in crimes involving kidnapping, blackmailing, hoax extortion and many more, where the speaker makes a deliberate effort to manipulate their natural voice in order to conceal their identity due to the fear of being caught. Voice disguise causes serious damage to the natural vocal parameters of the speakers and thus complicates the process of identification. The sole objective of this doctoral project is to find out the possibility of rendering definite opinions in cases involving disguised speech by experimentally determining the effects of different disguise forms on personal identification and percentage rate of speaker recognition for various voice disguise techniques such as raised pitch, lower pitch, increased nasality, covering the mouth, constricting tract, obstacle in mouth etc by analyzing and comparing the amount of phonetic and acoustic variation in of artificial (disguised) and natural sample of an individual, by auditory as well as spectrographic analysis.

Keywords: forensic, speaker recognition, voice, speech, disguise, identification

Procedia PDF Downloads 338
99 Harnessing the Power of Feedback to Assist Progress: A Process-Based Approach of Providing Feedback to L2 Composition Students in the United Arab Emirates

Authors: Brad Curabba

Abstract:

Utilising active, process-based learning methods to improve critical thinking and writing skills of second language (L2) writers brings unique challenges. To comprehensively satisfy different learners' needs, when commenting on student work, instructors can embed multiple feedback methods so that the capstone of their abilities as writers can be achieved. This research project assesses faculty and student perceptions regarding the effectiveness of various feedback practices used in process-based writing classrooms with L2 students at the American University of Sharjah (AUS). In addition, the research explores the challenges encountered by faculty during the provision of feedback practices. The quantitative research findings are based on two concurrent electronically distributed anonymous surveys; one aimed at students who have just completed a process-based writing course, and the other at instructors who delivered these courses. The student sample is drawn from multiple sections of Academic Writing I and II, and the faculty survey was distributed among the Department of Writing Studies (DWS) faculty. Our findings strongly suggest that all methods of feedback are deemed equally important by both students and faculty. Students, in particular, find process writing and its feedback practices to have greatly contributed to their writing proficiency.

Keywords: process writing, feedback, formative feedback, composition, reflection

Procedia PDF Downloads 108