Search results for: identity based encryption
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 28521

Search results for: identity based encryption

28431 Quantum Dots with Microwave Propagation in Future Quantum Internet Protocol for Mobile Telephony

Authors: A. B. R. Hazarika

Abstract:

In the present paper, Quantum dots of ZnS are used to study the faster microwave propagation in space and on earth which will be difficult to bypass as quantum key encryption-decryption is difficult to decode. The present study deals with Quantum internet protocol which is much faster, safer and secure in microwave propagation than the present Internet Protocol v6, which forms the aspect of our study. Assimilation of hardware, Quantum dots with Quantum protocol theory beautifies the aspect of the study. So far to author’s best knowledge, the study on mobile telephony with Quantum dots long-term evolution (QDLTE) has not been studied earlier, which forms the aspect of the study found that the Bitrate comes out to be 102.4 Gbps.

Keywords: encryption, decryption, internet protocol, microwave, mobile telephony, quantum key encryption, quantum dots

Procedia PDF Downloads 143
28430 Modernization Causing Loss of Cultural Identity: A Case Study of Maheshkhali, Bangladesh

Authors: Sarika Siraj

Abstract:

Nothing talks more about the identity of a place than its cultural heritage. More often than ever, it is the architecture of the place that embodies its cultural heritage. With these thoughts in mind, this paper looks closely into the present scene of earthen architecture of Bangladesh and the changes it has been going through due to modernity. Along with the gradual erasure of this sustainable practice, a loss of cultural identity can be observed in present times. This paper intends to examine the loss along with the reasons, taking the village of Maheshkhali, located in south east Bangladesh, as a case study for this research. Based on the empirical findings, this paper will contextualize sustainability as well as discuss western development as a creator of new cultural identities in eastern countries.

Keywords: cultural identity, sustainability, architecture, heritage

Procedia PDF Downloads 57
28429 Design of Collaborative Web System: Based on Case Study of PBL Support Systems

Authors: Kawai Nobuaki

Abstract:

This paper describes the design and implementation of web system for continuable and viable collaboration. This study proposes the improvement of the system based on a result of a certain practice. As contemporary higher education information environments transform, this study highlights the significance of university identity and college identity that are formed continuously through independent activities of the students. Based on these discussions, the present study proposes a practical media environment design which facilitates the processes of organizational identity formation based on a continuous and cyclical model. Even if users change by this system, the communication system continues operation and cooperation. The activity becomes the archive and produces new activity. Based on the result, this study elaborates a plan with a re-design by a system from the viewpoint of second-order cybernetics. Systems theory is a theoretical foundation for our study.

Keywords: collaborative work, learning management system, second-order cybernetics, systems theory, user generated contents, viable system model

Procedia PDF Downloads 187
28428 Migration and Identity Erosion: An Exploratory Study of First Generation Nigerian-Americans

Authors: Lolade Siyonbola

Abstract:

Nigerians are often celebrated as being the most educated cultural group in America. The cultural values and history that have led to this reality are particular to a generation that came of age post colonialism. Many of these cultural values have been passed down from post-colonial parent to millennial child, but most have not. This study, based on interviews and surveys of Nigerian millennials and their parents in the United States, explores the degree to which identity has been eroded in the millennial generation due to a lack of imparted cultural values and knowledge from the previous generation. Most of the subjects do not speak their native language or identify with their cultural heritage sufficiently to build ties with their native land. Most are experiencing some degree of identity crisis, and therefore limited self-actualization, with little to no support; as there are few successful tools available to this population. If governmental programs to reverse these trends are not implemented within this generation, the implications to the individual, family and home nation (Nigeria), will be felt for generations to come.

Keywords: identity, culture, self-actualization, social identity theory, migration, transnationalism, value systems

Procedia PDF Downloads 349
28427 Creation of S-Box in Blowfish Using AES

Authors: C. Rekha, G. N. Krishnamurthy

Abstract:

This paper attempts to develop a different approach for key scheduling algorithm which uses both Blowfish and AES algorithms. The main drawback of Blowfish algorithm is, it takes more time to create the S-box entries. To overcome this, we are replacing process of S-box creation in blowfish, by using key dependent S-box creation from AES without affecting the basic operation of blowfish. The method proposed in this paper uses good features of blowfish as well as AES and also this paper demonstrates the performance of blowfish and new algorithm by considering different aspects of security namely Encryption Quality, Key Sensitivity, and Correlation of horizontally adjacent pixels in an encrypted image.

Keywords: AES, blowfish, correlation coefficient, encryption quality, key sensitivity, s-box

Procedia PDF Downloads 200
28426 A Privacy Protection Scheme Supporting Fuzzy Search for NDN Routing Cache Data Name

Authors: Feng Tao, Ma Jing, Guo Xian, Wang Jing

Abstract:

Named Data Networking (NDN) replaces IP address of traditional network with data name, and adopts dynamic cache mechanism. In the existing mechanism, however, only one-to-one search can be achieved because every data has a unique name corresponding to it. There is a certain mapping relationship between data content and data name, so if the data name is intercepted by an adversary, the privacy of the data content and user’s interest can hardly be guaranteed. In order to solve this problem, this paper proposes a one-to-many fuzzy search scheme based on order-preserving encryption to reduce the query overhead by optimizing the caching strategy. In this scheme, we use hash value to ensure the user’s query safe from each node in the process of search, so does the privacy of the requiring data content.

Keywords: NDN, order-preserving encryption, fuzzy search, privacy

Procedia PDF Downloads 450
28425 'Value-Based Re-Framing' in Identity-Based Conflicts: A Skill for Mediators in Multi-Cultural Societies

Authors: Hami-Ziniman Revital, Ashwall Rachelly

Abstract:

The conflict resolution realm has developed tremendously during the last half-decade. Three main approaches should be mentioned: an Alternative Dispute Resolution (ADR) suggesting processes such as Arbitration or Interests-based Negotiation was developed as an answer to obligations and rights-based conflicts. The Pragmatic mediation approach focuses on the gap between interests and needs of disputants. The Transformative mediation approach focusses on relations and suits identity-based conflicts. In the current study, we examine the conflictual relations between religious and non-religious Jews in Israel and the impact of three transformative mechanisms: Inter-group recognition, In-group empowerment and Value-based reframing on the relations between the participants. The research was conducted during four facilitated joint mediation classes. A unique finding was found. Using both transformative mechanisms and the Contact Hypothesis criteria, we identify transformation in participants’ relations and a considerable change from anger, alienation, and suspiciousness to an increased understanding, affection and interpersonal concern towards the out-group members. Intergroup Recognition, In-group empowerment, and Values-based reframing were the skills discovered as the main enablers of the change in the relations and the research participants’ fostered mutual recognition of the out-group values and identity-based issues. We conclude this transformation was possible due to a constant intergroup contact, based on the Contact Hypothesis criteria. In addition, as Interests-based mediation uses “Reframing” as a skill to acknowledge both mutual and opposite needs of the disputants, we suggest the use of “Value-based Reframing” in intergroup identity-based conflicts, as a skill contributes to the empowerment and the recognition of both mutual and different out-group values. We offer to implement those insights and skills to assist conflict resolution facilitators in various intergroup identity-based conflicts resolution efforts and to establish further research and knowledge.

Keywords: empowerment, identity-based conflict, intergroup recognition, intergroup relations, mediation skills, multi-cultural society, reframing, value-based recognition

Procedia PDF Downloads 317
28424 The Georgians’ Discourses of National Identity in the Context of Europeanisation

Authors: Lia Tsuladze

Abstract:

The paper discusses the Georgians’ online discourses of national identity in the context of Europeanisation focusing on two periods - initialing of the EU-Georgia Association Agreement in November 2013 and signing it in June 2014. Discussing how the Georgians’ aspiration to integrate with the EU is combined with their perception of Europeanisation as a threat to the national identity, the author explores how the national sentiment is expressed in the above discourses while performed for the local vs. international audiences.

Keywords: Europeanisation, frontstage, backstage discourses, Georgia, national identity

Procedia PDF Downloads 478
28423 Role of Physical Appearance in Associating People with a Group Identity

Authors: Gurleen Kaur

Abstract:

Being tall-short, fat-thin, black-white, etc. is an inevitable part of how people perceive you. This association of people with your external appearance carves out an identity for you. This paper will look at the reasons why people relate a person to a particular categorization on the basis of his/her physical appearance. The paper delves into reasons for this categorization into groups: Subconscious grouping, personal gain, ease of relating to the group, and social acceptance. Development of certain unique physical features also leads to a person relating himself to a collective identity. Thus, this paper will support the fact that physical appearance plays a crucial role in categorization of people into groups and hence forming a group identity for them. This paper is divided into three parts. The first part will discuss what physical appearance is and how is it linked to our daily lives. The second part will talk about why it works i.e. why this factor of external appearance is important in formation of identity. The last part will talk about the factors which lead to categorization of identity because of physical appearance.

Keywords: group identity, physical appearance, subconscious grouping, collective identity

Procedia PDF Downloads 399
28422 Examining the Functional and Practical Aspects of Iranian Painting as a Visual-Identity Language in Iranian Graphics

Authors: Arezoo Seifollahi

Abstract:

One of the topics that is receiving a lot of attention in artistic circles and among Iran today and has been the subject of many conversations is the issue of Iranian graphics. In this research, the functional and practical aspects of Iranian painting as a visual-identity language in Iranian graphics have been investigated by relying on Iranian cultural and social posters in order to gain an understanding of the trend of contemporary graphic art in Iran and to help us reach the identity of graphics. In order to arrive at Iranian graphics, first, the issue of identity and what it is has been examined, and then this category has been addressed in Iran and throughout the history of this country in order to reveal the characteristics of the identity that has come to us today under the name of Iranian identity cognition. In the following, the search for Iranian identity in the art of this land, especially the art of painting, and then the art of contemporary painting and the search for identity in it have been discussed. After that, Iranian identity has been investigated in Iranian graphics. To understand Iranian graphics, after a brief description of its contemporary history, this art is examined at the considered time point. By using the inductive method of examining the posters of each course and taking into account the related cultural and social conditions, we tried to get a general and comprehensive understanding of the graphic features of each course.

Keywords: Iranian painting, graphic visual language, Iranian identity, social cultural poster

Procedia PDF Downloads 19
28421 Globalization and Women's Social Identity in Iran: A Case Study of Educated Women in the 'World City' of Yazd

Authors: Mohammad Tefagh

Abstract:

The process of globalization has transformed many social and cultural phenomena and has entered the world into a new era and arena. This phenomenon has introduced new methods, ideas, and identity interactions to human beings and has caused great changes in individual and social identity. Women have also been affected by globalization. Globalization has made the presence of women more and more effective and has caused identity changes and changes in the dimensions of identity in them. The purpose of this study is to investigate the impact of globalization of culture on changes in the social identity of educated women in the global city of Yazd. This study will discuss identity change and identity reconstruction due to globalization. The method of this study is qualitative, and the research data is obtained through in-depth interviews with 15 Yazdi-educated women at the Ph.D. level. The method of data analysis is thematic analysis. Findings of the research show that educated Yazdi women have changed their identity due to new communication processes and globalization, including faster, easier, and cheaper communication with other women in the world near and far. Women's social identity has also changed in the face of elements of globalization in various dimensions such as national, gender, religious, and group identities. The analysis of the interviews revealed the confronting elements such as using new cultural goods and communication technologies, membership in social networks, and increasing awareness of environmental change.

Keywords: globalization, social identity, educated women, Yazd

Procedia PDF Downloads 296
28420 Comparison of Blockchain Ecosystem for Identity Management

Authors: K. S. Suganya, R. Nedunchezhian

Abstract:

In recent years, blockchain technology has been found to be the most significant discovery in this digital era, after the discovery of the Internet and Cloud Computing. Blockchain is a simple, distributed public ledger that contains all the user’s transaction details in a block. The global copy of the block is then shared among all its peer-peer network users after validation by the Blockchain miners. Once a block is validated and accepted, it cannot be altered by any users making it a trust-free transaction. It also resolves the problem of double-spending by using traditional cryptographic methods. Since the advent of bitcoin, blockchain has been the backbone for all its transactions. But in recent years, it has found its roots and uses in many fields like Smart Contracts, Smart City management, healthcare, etc. Identity management against digital identity theft has become a major concern among financial and other organizations. To solve this digital identity theft, blockchain technology can be employed with existing identity management systems, which maintain a distributed public ledger containing details of an individual’s identity containing information such as Digital birth certificates, Citizenship number, Bank details, voter details, driving license in the form of blocks verified on the blockchain becomes time-stamped, unforgeable and publicly visible for any legitimate users. The main challenge in using blockchain technology to prevent digital identity theft is ensuring the pseudo-anonymity and privacy of the users. This survey paper will exert to study the blockchain concepts, consensus protocols, and various blockchain-based Digital Identity Management systems with their research scope. This paper also discusses the role of Blockchain in COVID-19 pandemic management by self-sovereign identity and supply chain management.

Keywords: blockchain, consensus protocols, bitcoin, identity theft, digital identity management, pandemic, COVID-19, self-sovereign identity

Procedia PDF Downloads 98
28419 Adolescent Gamers: The Relationship between Berzonsky’s Style of Identity and Immersion: Pilot Study

Authors: Monika Paleczna, Barbara Szmigielska

Abstract:

Adolescence is a developmental period, covering the period from 10 to 20 years of age, in which young people face many challenges. One of the most important tasks of the adolescence period is getting a structured identity. The development of identity is possible by undertaking various activities. Nowadays, virtual activities are very common among young people. One of the main adolescents’ activities in the online environment is playing computer games. The main aim of this work is to answer the question about the relationship between the identity style of adolescents and immersion, -a phenomenon often observed while playing computer games. The concept of identity created by Berzonsky is considered as one of the best-defined concepts of identity. He defines identity as both a structure and a process and distinguishes three styles of identity: informational, normative, and diffuse/avoidant. Immersion is a concept that can be applied in a broad context, but in the game environment, it is a specific psychological experience of being involved in a computer game. It refers to the relocation of the attention resources to the game world, with a limited or impossible perception of stimuli from reality. Considering how much time adolescents spend playing computer games, the question about the relationship between their identity and the immersion in the game seems to be extremely interesting. Fifty adolescents aged 15-17 participated in the study. They played a computer game and completed the Identity Style Inventory and the Immersion Questionaire.

Keywords: identity, immersion, computer games, adolescence

Procedia PDF Downloads 247
28418 The Appearance of Identity in the Urban Landscape by Enjoying the Natural Factors

Authors: Mehrdad Karimi, Farshad Negintaji

Abstract:

This study has examined the appearance of identity in the urban landscape and its effects on the natural factors. For this purpose, the components of place identity, emotional attachment, place dependence and social bond which totally constitute place attachment, measures it in three domains of cognitive (place identity), affective (emotional attachment) and behavioral (place dependence and social bond). In order to measure the natural factors, three components of the absolute elements, living entities, natural elements have been measured. The study is descriptive and the statistical population has been Yasouj, a city in Iran. To analyze the data the SPSS software has been used. The results in two level of descriptive and inferential statistics have been investigated. In the inferential statistics, Pearson correlation coefficient test has been used to evaluate the research hypotheses. In this study, the variable of identity is in high level and the natural factors are also in high level. These results indicate a positive relationship between place identity and natural factors. Development of environment and reaching the quality level of the personality or identity will develop the individual and society.

Keywords: identity, place identity, landscape, urban landscape, landscaping

Procedia PDF Downloads 492
28417 Secret Sharing in Visual Cryptography Using NVSS and Data Hiding Techniques

Authors: Misha Alexander, S. B. Waykar

Abstract:

Visual Cryptography is a special unbreakable encryption technique that transforms the secret image into random noisy pixels. These shares are transmitted over the network and because of its noisy texture it attracts the hackers. To address this issue a Natural Visual Secret Sharing Scheme (NVSS) was introduced that uses natural shares either in digital or printed form to generate the noisy secret share. This scheme greatly reduces the transmission risk but causes distortion in the retrieved secret image through variation in settings and properties of digital devices used to capture the natural image during encryption / decryption phase. This paper proposes a new NVSS scheme that extracts the secret key from randomly selected unaltered multiple natural images. To further improve the security of the shares data hiding techniques such as Steganography and Alpha channel watermarking are proposed.

Keywords: decryption, encryption, natural visual secret sharing, natural images, noisy share, pixel swapping

Procedia PDF Downloads 384
28416 Design and Application of NFC-Based Identity and Access Management in Cloud Services

Authors: Shin-Jer Yang, Kai-Tai Yang

Abstract:

In response to a changing world and the fast growth of the Internet, more and more enterprises are replacing web-based services with cloud-based ones. Multi-tenancy technology is becoming more important especially with Software as a Service (SaaS). This in turn leads to a greater focus on the application of Identity and Access Management (IAM). Conventional Near-Field Communication (NFC) based verification relies on a computer browser and a card reader to access an NFC tag. This type of verification does not support mobile device login and user-based access management functions. This study designs an NFC-based third-party cloud identity and access management scheme (NFC-IAM) addressing this shortcoming. Data from simulation tests analyzed with Key Performance Indicators (KPIs) suggest that the NFC-IAM not only takes less time in identity identification but also cuts time by 80% in terms of two-factor authentication and improves verification accuracy to 99.9% or better. In functional performance analyses, NFC-IAM performed better in salability and portability. The NFC-IAM App (Application Software) and back-end system to be developed and deployed in mobile device are to support IAM features and also offers users a more user-friendly experience and stronger security protection. In the future, our NFC-IAM can be employed to different environments including identification for mobile payment systems, permission management for remote equipment monitoring, among other applications.

Keywords: cloud service, multi-tenancy, NFC, IAM, mobile device

Procedia PDF Downloads 409
28415 The Disposable Identities; Enabling Trust-by-Design to Build Sustainable Data-Driven Value

Authors: Lorna Goulden, Kai M. Hermsen, Jari Isohanni, Mirko Ross, Jef Vanbockryck

Abstract:

This article introduces disposable identities, with reference use cases and explores possible technical approaches. The proposed approach, when fully developed as an open-source toolkit, enables developers of mobile or web apps to employ a self-sovereign identity and data privacy framework, in order to rebuild trust in digital services by providing greater transparency, decentralized control, and GDPR compliance. With a user interface for the management of self-sovereign identity, digital authorizations, and associated data-driven transactions, the advantage of Disposable Identities is that they may also contain verifiable data such as the owner’s photograph, official or even biometric identifiers for more proactive prevention of identity abuse. These Disposable Identities designed for decentralized privacy management can also be time, purpose and context-bound through a secure digital contract; with verification functionalities based on tamper-proof technology.

Keywords: dentity, trust, self-sovereign, disposable identity, privacy toolkit, decentralised identity, verifiable credential, cybersecurity, data driven business, PETs, GDPRdentity, trust, self-sovereign, disposable identity, privacy toolkit, decentralised identity, verifiable credential, cybersecurity, data driven business, PETs, GDPRI

Procedia PDF Downloads 195
28414 Explore Customers' Perceptions of U.K. Fast Fashion Retailers' Identities

Authors: Ranis Cheng

Abstract:

Corporate identity is an asset of a company that is unique, valuable and provides a source of competitive advantage. This research taking a holistic view to explore all dimensions of corporate identity and influence of each on customers’ shopping experience in the fast fashion retail sector in the U.K. Unfortunately these issues have not been explored sufficiently in the extant literature, especially in the area of the identity gap. To date, there is still a lack of empirical research on corporate identity, especially in the retail sector despite the importance of the concept to all organisations. Furthermore, although customer group is one of the essential audiences of organisations and the importance of customers in corporate identity management cannot be ignored, to date limited studies have been conducted in order to understand how customers interpret and perceive corporate identity (perceived identity). Therefore, this research investigates customers’ perceptions of corporate identity in the fast fashion retail sector. 1) To explore customers’ perceptions of fast fashion retailers’ corporate identities; 2) To uncover the important constructs of corporate identity which contribute to the U.K. fast fashion retail sector. 40 semi-structured interviews with the fast fashion consumers have been carried out to identify their perceptions of fast fashion retailers' corporate identities. Secondary research on retailers' websites and press releases have been evaluated to identify their desired corporate identities. The findings have revealed that there are significant gaps between how fast fashion retailers present their identities and how their consumers perceive them. This has posed customers' negative perceptions towards the retailers and their shopping experience as a whole. This study has studied how the corporate identity constructs could be applied in the fashion context and has helped retailers to shed lights on how to minimise the gap between desired and perceived identity.

Keywords: corporate identity, fast fashion, fashion retailing, identity gap

Procedia PDF Downloads 252
28413 Use of Personal Rhythm to Authenticate Encrypted Messages

Authors: Carlos Gonzalez

Abstract:

When communicating using private and secure keys, there is always the doubt as to the identity of the message creator. We introduce an algorithm that uses the personal typing rhythm (keystroke dynamics) of the message originator to increase the trust of the authenticity of the message originator by the message recipient. The methodology proposes the use of a Rhythm Certificate Authority (RCA) to validate rhythm information. An illustrative example of the communication between Bob and Alice and the RCA is included. An algorithm of how to communicate with the RCA is presented. This RCA can be an independent authority or an enhanced Certificate Authority like the one used in public key infrastructure (PKI).

Keywords: authentication, digital signature, keystroke dynamics, personal rhythm, public-key encryption

Procedia PDF Downloads 269
28412 The Relationship between the Feeling of Distributive Justice and National Identity of the Youth

Authors: Leila Batmany

Abstract:

This research studies the relationship between the feeling of distributive justice and national identity of the youth. The present analysis intends to experimentally investigate the various dimensions of the justice feeling and its effect on the national identity components. The study has taken justice into consideration from four different points of view on the basis of availability of valuable social sources such as power, wealth, knowledge and status in the political, economic, and cultural and status justice respectively. Furthermore, the national identity has been considered as the feeling of honour, attachment and commitment towards national society and its seven components i.e. history, language, culture, political system, religion, geographical territory and society. The 'field study' has been used as the method for the research with the individual as unit, taking 368 young between the age of 18 and 29 living in Tehran, chosen randomly according to Cochran formula. The individual samples have been randomly chosen among five districts in north, south, west, east, and centre of Tehran, based on the multistage cluster sampling. The data collection has been performed with the use of questionnaire and interview. The most important results are as follows: i) The feeling of economic justice is the weakest one among the youth. ii) The strongest and the weakest dimensions of the national identity are, respectively, the historical and the social dimension. iii) There is a positive and meaningful relationship between the feeling political and statues justice and then national identity, whereas no meaningful relationship exists between the economic and cultural justice and the national identity. iv) There is a positive and meaningful relationship between the feeling of justice in all dimensions and legitimacy of the political system. There is also such a relationship between the legitimacy of the political system and national identity. v) Generally, there is a positive and meaningful relationship between the feeling of distributive justice and national identity among the youth. vi) It is through the legitimacy of the political system that justice feeling can have an influence on the national identity.

Keywords: distributive justice, national identity, legitimacy of political system, Cochran formula, multistage cluster sampling

Procedia PDF Downloads 104
28411 ACBM: Attention-Based CNN and Bi-LSTM Model for Continuous Identity Authentication

Authors: Rui Mao, Heming Ji, Xiaoyu Wang

Abstract:

Keystroke dynamics are widely used in identity recognition. It has the advantage that the individual typing rhythm is difficult to imitate. It also supports continuous authentication through the keyboard without extra devices. The existing keystroke dynamics authentication methods based on machine learning have a drawback in supporting relatively complex scenarios with massive data. There are drawbacks to both feature extraction and model optimization in these methods. To overcome the above weakness, an authentication model of keystroke dynamics based on deep learning is proposed. The model uses feature vectors formed by keystroke content and keystroke time. It ensures efficient continuous authentication by cooperating attention mechanisms with the combination of CNN and Bi-LSTM. The model has been tested with Open Data Buffalo dataset, and the result shows that the FRR is 3.09%, FAR is 3.03%, and EER is 4.23%. This proves that the model is efficient and accurate on continuous authentication.

Keywords: keystroke dynamics, identity authentication, deep learning, CNN, LSTM

Procedia PDF Downloads 127
28410 Comparative Analysis of Identity Semiotics in Iran’s Modern and Traditional House Design

Authors: Maryam Ghasemi

Abstract:

One of the most significant components that provide comfort and protection is having a shelter called a house. Even if components and regions are changed or restored to meet new functions, the house's identity must be preserved. In the contemporary era, houses are increasingly being built regardless of cultural identity. This misunderstanding caused a sense of unease. This study analyses archaic and modern architecture to find semiotic areas and qualities in the latter, using the former as a reference. This study's technique used an exploratory assessment of architectural components from both periods. The Abbasid residence and the Ekbatan architectural complex were used as case studies. The identity of Iranian architecture does not correlate with current buildings. The other part is privacy, which is a missing link between traditional and modern Iranian architecture because it is directly related to the identities of homes based on the cultures of their residents.

Keywords: housing, traditional, contemporary, privacy, semiotic

Procedia PDF Downloads 79
28409 Exploring the Formation of High School Students’ Science Identity: A Qualitative Study

Authors: Sitong. Chen, Bing Wei

Abstract:

As a sociocultural concept, identity has increasingly gained attention in educational research, and the notion of students’ science identity has been widely discussed in the field of science education. Science identity was proved to be a key indicator of students’ learning engagement, persistence, and career intentions in science-related and STEM fields. Thus, a great deal of educational effort has been made to promote students’ science identity in former studies. However, most of this research was focused on students’ identity development during undergraduate and graduate periods, except for a few studies exploring high school students’ identity formation. High school has been argued as a crucial period for promoting science identity. This study applied a qualitative method to explore how high school students have come to form their science identities in previous learning and living experiences. Semi-structured interviews were conducted with 8 newly enrolled undergraduate students majoring in science-related fields. As suggested by the narrative data from interviews, students’ formation of science identities was driven by their five interrelated experiences: growing self-recognition as a science person, achieving success in learning science, getting recognized by influential others, being interested in science subjects, and informal science experiences in various contexts. Specifically, students’ success and achievement in science learning could facilitate their interest in science subjects and others’ recognition. And their informal experiences could enhance their interest and performance in formal science learning. Furthermore, students’ success and interest in science, as well as recognition from others together, contribute to their self-recognition. Based on the results of this study, some practical implications were provided for science teachers and researchers in enhancing high school students’ science identities.

Keywords: high school students, identity formation, learning experiences, living experiences, science identity

Procedia PDF Downloads 27
28408 Ethnic Identity as an Asset: Linking Ethnic Identity, Perceived Social Support, and Mental Health among Indigenous Adults in Taiwan

Authors: A.H.Y. Lai, C. Teyra

Abstract:

In Taiwan, there are 16 official indigenous groups, accounting for 2.3% of the total population. Like other indigenous populations worldwide, indigenous peoples in Taiwan have poorer mental health because of their history of oppression and colonisation. Amid the negative narratives, the ethnic identity of cultural minorities is their unique psychological and cultural asset. Moreover, positive socialisation is found to be related to strong ethnic identity. Based on Phinney’s theory on ethnic identity development and social support theory, this study adopted a strength-based approach conceptualising ethnic identity as the central organising principle that linked perceived social support and mental health among indigenous adults in Taiwan. Aims. Overall aim is to examine the effect of ethnic identity and social support on mental health. Specific aims were to examine : (1) the association between ethnic identity and mental health; (2) the association between perceived social support and mental health ; (3) the indirect effect of ethnic identity linking perceived social support and mental health. Methods. Participants were indigenous adults in Taiwan (n=200; mean age=29.51; Female=31%, Male=61%, Others=8%). A cross-sectional quantitative design was implemented using data collected in the year 2020. Respondent-driven sampling was used. Standardised measurements were: Ethnic Identity Scale(6-item); Social Support Questionnaire-SF(6 items); Patient Health Questionnaire(9-item); and Generalised Anxiety Disorder(7-item). Covariates were age, gender and economic satisfaction. A four-stage structural equation modelling (SEM) with robust maximin likelihood estimation was employed using Mplus8.0. Step 1: A measurement model was built and tested using confirmatory factor analysis (CFA). Step 2: Factor covariates were re-specified as direct effects in the SEM. Covariates were added. The direct effects of (1) ethnic identity and social support on depression and anxiety and (2) social support on ethnic identity were tested. The indirect effect of ethnic identity was examined with the bootstrapping technique. Results. The CFA model showed satisfactory fit statistics: x^2(df)=869.69(608), p<.05; Comparative ft index (CFI)/ Tucker-Lewis fit index (TLI)=0.95/0.94; root mean square error of approximation (RMSEA)=0.05; Standardized Root Mean Squared Residual (SRMR)=0.05. Ethnic identity is represented by two latent factors: ethnic identity-commitment and ethnic identity-exploration. Depression, anxiety and social support are single-factor latent variables. For the SEM, model fit statistics were: x^2(df)=779.26(527), p<.05; CFI/TLI=0.94/0.93; RMSEA=0.05; SRMR=0.05. Ethnic identity-commitment (b=-0.30) and social support (b=-0.33) had direct negative effects on depression, but ethnic identity-exploration did not. Ethnic identity-commitment (b=-0.43) and social support (b=-0.31) had direct negative effects on anxiety, while identity-exploration (b=0.24) demonstrated a positive effect. Social support had direct positive effects on ethnic identity-exploration (b=0.26) and ethnic identity-commitment (b=0.31). Mediation analysis demonstrated the indirect effect of ethnic identity-commitment linking social support and depression (b=0.22). Implications: Results underscore the role of social support in preventing depression via ethnic identity commitment among indigenous adults in Taiwan. Adopting the strength-based approach, mental health practitioners can mobilise indigenous peoples’ commitment to their group to promote their well-being.

Keywords: ethnic identity, indigenous population, mental health, perceived social support

Procedia PDF Downloads 82
28407 A Review of Encryption Algorithms Used in Cloud Computing

Authors: Derick M. Rakgoale, Topside E. Mathonsi, Vusumuzi Malele

Abstract:

Cloud computing offers distributed online and on-demand computational services from anywhere in the world. Cloud computing services have grown immensely over the past years, especially in the past year due to the Coronavirus pandemic. Cloud computing has changed the working environment and introduced work from work phenomenon, which enabled the adoption of technologies to fulfill the new workings, including cloud services offerings. The increased cloud computing adoption has come with new challenges regarding data privacy and its integrity in the cloud environment. Previously advanced encryption algorithms failed to reduce the memory space required for cloud computing performance, thus increasing the computational cost. This paper reviews the existing encryption algorithms used in cloud computing. In the future, artificial neural networks (ANN) algorithm design will be presented as a security solution to ensure data integrity, confidentiality, privacy, and availability of user data in cloud computing. Moreover, MATLAB will be used to evaluate the proposed solution, and simulation results will be presented.

Keywords: cloud computing, data integrity, confidentiality, privacy, availability

Procedia PDF Downloads 95
28406 Influences on Occupational Identity through Trans and Gender Diverse Identity: A Qualitative Study about Work Experiences of Trans and Gender Diverse Individuals

Authors: Robin C. Ladwig

Abstract:

Work experiences and satisfaction as well as the feeling of belonging has been narrowly explored from the perspective of trans and gender diverse individuals. Hence, the study investigates the relationship of values, attitudes, and norms of occupational environments and the working identity of trans and gender diverse people of the Australian workforce. Based on 22 semi-structured interviews with trans and gender diverse individuals regarding their work and career experiences, a first insight about their feeling of belonging through commonality in the workplace could be established. Communality between the values, attitudes and norms of a trans and gender diverse individuals working identities and profession, organization and working environment could increase the feeling of belonging. Further reflection and evaluation of trans and gender diverse identities in the workplace need to be considered to create an equitable and inclusive workplace of the future. Consequently, an essential development step for the future of work and its fundamental values of diversity, inclusion, and belonging will consist of the acknowledgement and inclusion of trans and gender diverse people as part of a broader social identity of the workplace.

Keywords: belonging, future of work, working identity, trans and gender diverse identity

Procedia PDF Downloads 101
28405 Interpreting Form Based Code in Historic Residential Corridor

Authors: Diljan C. K.

Abstract:

Every location on the planet has a history and culture that give it its own identity and character, making it distinct from others. urbanised world, it is fashionable to remould its original character and impression in a contemporary style. The new character and impression of places show a complete detachment from their roots. The heritage and cultural values of the place are replaced by new impressions, and as a result, they eventually lose their identity and character and never have sustenance. In this situation, form-based coding acts as a tool in the urban design process, helping to come up with solutions that strongly bind individuals to their neighbourhood and are closely related to culture through the physical spaces they are associated with. Form-based code was made by pioneers of new urbanism in 1987 in the United States of America. Since then, it has been used in various projects inside and outside the USA with varied scales, from the design of a single building to the design of a whole community. This research makes an effort to interpret the form-based code in historic corridors to establish the association of physical form and space with the public realm to uphold the context and culture. Many of the historic corridors are undergoing a tremendous transformation in their physical form, avoiding their culture and context. This will lead to it losing its identity in form and function. If the case of Valiyashala in Trivandrum is taken as the case, which is transforming its form and will lead to the loss of its identity, the form-based code will be a suitable tool to strengthen its historical value. The study concludes by analysing the existing code (KMBR) of Valiyashala and form-based code to find the requirements in form-based code for Valiyashala.

Keywords: form based code, urban conservation, heritage, historic corridor

Procedia PDF Downloads 86
28404 Exploring the Cross-Cultural Practice of Transnational Community in Taiwan

Authors: Ya-Hsuan Wang

Abstract:

This project of intercultural education aimed to explore pluricultural people’s interpretation and evaluation of the transnational community in Taiwan. Based on transnationalism and transculturalism, this study concerns the human right issues for immigrants and pluricultural people. Research participants as immigrants in Taiwan were asked about their typical thinking styles in the transnational community, their cultural integration in terms of transnational behaviors, and their collective memory of the transnational community. Interview questions included what key factors were involved in their identity negotiation, what roles the transnational community and collective memory would be for their identity negotiation and what were the positive or negative aspects impacting cross-border identity. Based on the experiences of pluricultural people and transnational communities, this project expected to enhance the depth and width of developing transcultural knowledge in textbook reform on History in K-12 schools. It is to transform cross-border identity into knowledge embedded with local culture in response to globalization and localization. The purpose of this paper is to portrait the cross-cultural practice of transnational community for Taiwan’s immigrants. It is to report their external socio-cultural expectation of ethnic economics, to understand their internal life course of national identity, and to clarify transnational community in relation to their cross-border identity. In conclusion, the cross-cultural practice of transnational community combined the external contexts such as ethnic economic interaction among transnational communities, social report and ethnic industry, and the internal contexts such as ethnic identity, language use, and collective memory in ethnic history.

Keywords: cross-cultural practice, immigrants, pluricultural people, transnational community

Procedia PDF Downloads 172
28403 Security of Database Using Chaotic Systems

Authors: Eman W. Boghdady, A. R. Shehata, M. A. Azem

Abstract:

Database (DB) security demands permitting authorized users and prohibiting non-authorized users and intruders actions on the DB and the objects inside it. Organizations that are running successfully demand the confidentiality of their DBs. They do not allow the unauthorized access to their data/information. They also demand the assurance that their data is protected against any malicious or accidental modification. DB protection and confidentiality are the security concerns. There are four types of controls to obtain the DB protection, those include: access control, information flow control, inference control, and cryptographic. The cryptographic control is considered as the backbone for DB security, it secures the DB by encryption during storage and communications. Current cryptographic techniques are classified into two types: traditional classical cryptography using standard algorithms (DES, AES, IDEA, etc.) and chaos cryptography using continuous (Chau, Rossler, Lorenz, etc.) or discreet (Logistics, Henon, etc.) algorithms. The important characteristics of chaos are its extreme sensitivity to initial conditions of the system. In this paper, DB-security systems based on chaotic algorithms are described. The Pseudo Random Numbers Generators (PRNGs) from the different chaotic algorithms are implemented using Matlab and their statistical properties are evaluated using NIST and other statistical test-suits. Then, these algorithms are used to secure conventional DB (plaintext), where the statistical properties of the ciphertext are also tested. To increase the complexity of the PRNGs and to let pass all the NIST statistical tests, we propose two hybrid PRNGs: one based on two chaotic Logistic maps and another based on two chaotic Henon maps, where each chaotic algorithm is running side-by-side and starting from random independent initial conditions and parameters (encryption keys). The resulted hybrid PRNGs passed the NIST statistical test suit.

Keywords: algorithms and data structure, DB security, encryption, chaotic algorithms, Matlab, NIST

Procedia PDF Downloads 244
28402 The Competing Roles of Educator, Music Teacher, and Musician in Professional Identity Development: A Longitudinal Autoethnography

Authors: Thomas LaRocca

Abstract:

This study explores the development of a public-school music teacher’s professional identity within three domains: as an educator in the profession at large, as a music teacher in a school, and as a professional musician. An autoethnographic method is employed by calling upon undergraduate student teaching reflections, graduate writing assignments and presentations, cover letters for employment, professional correspondence, and reflective memos. These artifacts provide a reference for phenomenological insights into the values, hopes, and criticisms within each domain over time –all of which provide a window into the overall ontological perspective of one’s professional life at different moments in their career. While the topic of music teacher identity has been examined using autoethnographical methods before, by accessing materials over the course of ten years, the study is able to investigate the ‘how’ of identity development in a temporal context; from undergraduate student to established professional. Additionally, while the field offers a considerable amount of work surrounding the child and adolescent identity development, there are unmined opportunities to examine identity development in the adult years, especially surrounding adult professional life. Employing a postpositivist approach with social constructionism as a backdrop, this study examines adult identity formation and the contradictions, resonances, and priorities within each domain, between each domain, and perceived expectations of the professional community. What is revealed is a journey of self-improvement motivated by failure and success, marked by negotiation and sacrifice; as each domain competes for mental and temporal resources, identity is viewed as not just who one is, but also as what one leaves behind. These insights offer a window into the ontology of identity of a music educator and may provide considerations for differentiating professional development based on what stage educators are at in their careers.

Keywords: identity, longitudinal autoethnography, music teacher education, music teacher ontology

Procedia PDF Downloads 111