Search results for: identity based encryption
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 28584

Search results for: identity based encryption

28434 A Bridge to Success: Building Academic Identity in Foundation Programs

Authors: Krystyna Golkowska

Abstract:

Recent years have witnessed rapid growth of Transnational Education (TNE), especially in Asia and the Middle East. Exporting North American curricula into different socio-cultural contexts brings with it numerous advantages as well as challenges that have yet to be fully explored. This article focuses on Foundation programs, bridge programs between local high schools and tertiary level education on North-American branch campuses in the Persian Gulf. Based on a case study of Foundation students in Qatar, it explores ways of preparing TNE students for academic success by helping them to develop not only their skills and subject knowledge but also their academic identity.

Keywords: academic identity, foundation program, gulf, transnational education

Procedia PDF Downloads 292
28433 Reflections on the Role of Cultural Identity in a Bilingual Education Program

Authors: Lina Tenjo, Ilba Rodríguez

Abstract:

The role of cultural identity in bilingual programs has been barely discussed in regards to SLA. This research focuses on providing relevant information that helps in having more knowledge about the experiences that an elementary student has during the second language learning process in a bilingual program within a multicultural context. This study explores the experience of 18 students in a dual language program, in a public elementary school in Northern Virginia, USA. It examines their dual language experience and the different ways this experience contributes to the formation of their cultural identity. The findings were studied with the purpose of determining the relationship between participants and certain aspects of cultural identity in a multicultural context. The reflections that originate from the voices of children are the key source that helps us to better understand the particular needs that young learners have during their participation in a DLP.

Keywords: acculturation, bilingual education, culture, dual language program, identity, second language acquisition

Procedia PDF Downloads 311
28432 Reversible Information Hitting in Encrypted JPEG Bitstream by LSB Based on Inherent Algorithm

Authors: Vaibhav Barve

Abstract:

Reversible information hiding has drawn a lot of interest as of late. Being reversible, we can restore unique computerized data totally. It is a plan where mystery data is put away in digital media like image, video, audio to maintain a strategic distance from unapproved access and security reason. By and large JPEG bit stream is utilized to store this key data, first JPEG bit stream is encrypted into all around sorted out structure and then this secret information or key data is implanted into this encrypted region by marginally changing the JPEG bit stream. Valuable pixels suitable for information implanting are computed and as indicated by this key subtle elements are implanted. In our proposed framework we are utilizing RC4 algorithm for encrypting JPEG bit stream. Encryption key is acknowledged by framework user which, likewise, will be used at the time of decryption. We are executing enhanced least significant bit supplanting steganography by utilizing genetic algorithm. At first, the quantity of bits that must be installed in a guaranteed coefficient is versatile. By utilizing proper parameters, we can get high capacity while ensuring high security. We are utilizing logistic map for shuffling of bits and utilization GA (Genetic Algorithm) to find right parameters for the logistic map. Information embedding key is utilized at the time of information embedding. By utilizing precise picture encryption and information embedding key, the beneficiary can, without much of a stretch, concentrate the incorporated secure data and totally recoup the first picture and also the original secret information. At the point when the embedding key is truant, the first picture can be recouped pretty nearly with sufficient quality without getting the embedding key of interest.

Keywords: data embedding, decryption, encryption, reversible data hiding, steganography

Procedia PDF Downloads 268
28431 Developing a Model for the Relation between Heritage and Place Identity

Authors: A. Arjomand Kermani, N. Charbgoo, M. Alalhesabi

Abstract:

In the situation of great acceleration of changes and the need for new developments in the cities on one hand and conservation and regeneration approaches on the other hand, place identity and its relation with heritage context have taken on new importance. This relation is generally mutual and complex one. The significant point in this relation is that the process of identifying something as heritage rather than just historical  phenomena, brings that which may be inherited into the realm of identity. In planning and urban design as well as environmental psychology and phenomenology domain, place identity and its attributes and components were studied and discussed. However, the relation between physical environment (especially heritage) and identity has been neglected in the planning literature. This article aims to review the knowledge on this field and develop a model on the influence and relation of these two major concepts (heritage and identity). To build this conceptual model, we draw on available literature in environmental psychology as well as planning on place identity and heritage environment using a descriptive-analytical methodology to understand how they can inform the planning strategies and governance policies. A cross-disciplinary analysis is essential to understand the nature of place identity and heritage context and develop a more holistic model of their relationship in order to be employed in planning process and decision making. Moreover, this broader and more holistic perspective would enable both social scientists and planners to learn from one another’s expertise for a fuller understanding of community dynamics. The result indicates that a combination of these perspectives can provide a richer understanding—not only of how planning impacts our experience of place, but also how place identity can impact community planning and development.

Keywords: heritage, inter-disciplinary study, place identity, planning

Procedia PDF Downloads 404
28430 Developed Text-Independent Speaker Verification System

Authors: Mohammed Arif, Abdessalam Kifouche

Abstract:

Speech is a very convenient way of communication between people and machines. It conveys information about the identity of the talker. Since speaker recognition technology is increasingly securing our everyday lives, the objective of this paper is to develop two automatic text-independent speaker verification systems (TI SV) using low-level spectral features and machine learning methods. (i) The first system is based on a support vector machine (SVM), which was widely used in voice signal processing with the aim of speaker recognition involving verifying the identity of the speaker based on its voice characteristics, and (ii) the second is based on Gaussian Mixture Model (GMM) and Universal Background Model (UBM) to combine different functions from different resources to implement the SVM based.

Keywords: speaker verification, text-independent, support vector machine, Gaussian mixture model, cepstral analysis

Procedia PDF Downloads 25
28429 A New Block Cipher for Resource-Constrained Internet of Things Devices

Authors: Muhammad Rana, Quazi Mamun, Rafiqul Islam

Abstract:

In the Internet of Things (IoT), many devices are connected and accumulate a sheer amount of data. These Internet-driven raw data need to be transferred securely to the end-users via dependable networks. Consequently, the challenges of IoT security in various IoT domains are paramount. Cryptography is being applied to secure the networks for authentication, confidentiality, data integrity and access control. However, due to the resource constraint properties of IoT devices, the conventional cipher may not be suitable in all IoT networks. This paper designs a robust and effective lightweight cipher to secure the IoT environment and meet the resource-constrained nature of IoT devices. We also propose a symmetric and block-cipher based lightweight cryptographic algorithm. The proposed algorithm increases the complexity of the block cipher, maintaining the lowest computational requirements possible. The proposed algorithm efficiently constructs the key register updating technique, reduces the number of encryption rounds, and adds a new layer between the encryption and decryption processes.

Keywords: internet of things, cryptography block cipher, S-box, key management, security, network

Procedia PDF Downloads 76
28428 Exploiting Identity Grievances: Al-Shabaab Propaganda Targeting Individuals Abroad

Authors: Mustafa Mabruk

Abstract:

Groups such as Al-Shabaab have managed to radicalize many individuals abroad, including the first American citizen to ever be radicalized. Yet the pathways of radicalization for these foreign individuals are understudied. Moreover, current measures to prevent foreign radicalization are ineffective, with privacy, screening and profiling implications that render current counter-radicalization efforts counterproductive. Such measures exhibit strictness, political bias, and harshness. As confirmed by recent studies, such counter-radicalization issues exacerbate existing grievances and channel fresh recruits to Al-Shabaab. Addressing these challenges is paramount, requiring alternative strategies to effectively reduce radicalization without triggering further harm. The development of counter-narratives emerges as a potential measure with minimal risk of exacerbating grievances, yet the development of such counter-narratives necessitates a thorough understanding of the radicalization pathways of foreign individuals that are understudied. This study investigates the success of Al-Shabaab in recruiting individuals abroad by analyzing their propaganda in conjunction with analyzing identity-focused theories of radicalization, including Framing Theory and Social Identity Theory. Qualitative content analysis is used to analyze various propaganda material, including tweets, speeches, and webpages. The analysis reveals that issues of identity are of major significance in the radicalization patterns identified and that grievances of Muslims worldwide are used to exploit identity-related grievances. Based on these findings, the paper argues that such evidence enhances our understanding of potential deradicalization pathways and present counter-narratives based on Islamic scripture.

Keywords: counter-narratives, foreign radicalization, identity grievances, propaganda analysis

Procedia PDF Downloads 17
28427 Bridging the Gap and Widening the Divide

Authors: Lerato Dixon, Thorsten Chmura

Abstract:

This paper explores whether ethnic identity in Zimbabwe leads to discriminatory behaviour and the degree to which a norm-based intervention can shift this discriminatory behaviour. Social Identity Theory suggests that group identity can lead to favouritism towards the in-group and discriminatory behaviour towards the out-group. Agents yield higher utility from maintaining positive self-esteem by confirming with group behaviour. This paper focuses on the two majority ethnic groups in Zimbabwe – the Ndebele and Shona. Racial identities are synonymous with the language spoken. Zimbabwe’s history highlights how identity formation took place. As following independence, political parties became recognised as either Ndebele or Shona-speaking. It is against this backdrop that this study investigates the degree to which norm-based nudge can alter behaviour. This paper uses experimental methods to analyse discriminatory behaviour between two naturally occurring ethnic groups in Zimbabwe. In addition, we investigate if social norm-based interventions can shift discriminatory behaviour to understand if the divide between these two identity groups can be further divided or healed. Participants are randomly assigned into three groups to receive information regarding a social norm. We compare the effect of a proscriptive social norm-based intervention, stating what shouldn't be done and prescriptive social norms as interventions, stating what should be done. Specifically, participants are either shown the socially appropriate (Heal) norm, the socially inappropriateness (Divide) norm regarding interethnic marriages or no norm-based intervention. Following the random assignment into intervention groups, participants take part in the Trust Game. We conjecture that discrimination will shift in accordance with the prevailing social norm. Instead, we find evidence of interethnic discriminatory behaviour. We also find that trust increases when interacting with Ndebele, Shona and Zimbabwean participants following the Heal intervention. However, if the participant is Shona, the Heal intervention decreases trust toward in-groups and Zimbabwean co-players. On the other hand, if the participant is Shona, the Divide treatment significantly increases trust toward Ndebele participants. In summary, we find evidence that norm-based interventions significantly change behaviour. However, the prescriptive norm-based intervention (Heal) decreases trust toward the in-group, out-group and national identity group if the participant is Shona – therefore having an adverse effect. In contrast, the proscriptive Divide treatment increases trust if the participant is Shona towards Ndebele co-players. We conclude that norm-based interventions have a ‘rebound’ effect by altering behaviour in the opposite direction.

Keywords: discrimination, social identity, social norm-based intervention, zimbabwe

Procedia PDF Downloads 223
28426 Secure Message Transmission Using Meaningful Shares

Authors: Ajish Sreedharan

Abstract:

Visual cryptography encodes a secret image into shares of random binary patterns. If the shares are exerted onto transparencies, the secret image can be visually decoded by superimposing a qualified subset of transparencies, but no secret information can be obtained from the superposition of a forbidden subset. The binary patterns of the shares, however, have no visual meaning and hinder the objectives of visual cryptography. In the Secret Message Transmission through Meaningful Shares a secret message to be transmitted is converted to grey scale image. Then (2,2) visual cryptographic shares are generated from this converted gray scale image. The shares are encrypted using A Chaos-Based Image Encryption Algorithm Using Wavelet Transform. Two separate color images which are of the same size of the shares, taken as cover image of the respective shares to hide the shares into them. The encrypted shares which are covered by meaningful images so that a potential eavesdropper wont know there is a message to be read. The meaningful shares are transmitted through two different transmission medium. During decoding shares are fetched from received meaningful images and decrypted using A Chaos-Based Image Encryption Algorithm Using Wavelet Transform. The shares are combined to regenerate the grey scale image from where the secret message is obtained.

Keywords: visual cryptography, wavelet transform, meaningful shares, grey scale image

Procedia PDF Downloads 429
28425 Profiling on the Holistic Identity of Malaysian Gifted Learners

Authors: Rorlinda Yusof, Siti Aishah Hassan, Afifah Mohamad Radzi, Mohd Hakimie Zainal Abidin, Amran Rasli, Inderbir Sandhu

Abstract:

The purpose of this study is to examine the self-identities of gifted and talented students and the relationship between self-identity and academic accomplishment. A random sample of 300 students enrolled in a secondary education programme at the Pusat GENIUS@pintar Negara was chosen as respondents of a 151-item holistic-identity component development tool. The validity of the instrument was assessed using Principal Components Analysis and Factor Analysis via an inter-Item Correlation Matrix (Loading values 0.44 to 0.86), which resulted in the formation of eight dimensions. The Cronbach's Alpha was calculated to determine the instrument's reliability (the overall result was 0.98). The results showed that students' holistic-identity profiles were relatively high (mean=4.09, standard deviation=0.449). In addition, spiritual identity received the greatest mean score (4.34) out of the eight components of identity investigated, while leadership identity received the lowest mean score (3.88). A conceptual framework for Islamic school leadership is recommended to implement spiritual values without differentiation to harmonize spiritual and intellectual intelligence among all the students. Some benchmarking studies with other centres for gifted and talented students are recommended for further research.

Keywords: holistic self-identity, academic achievement, self-development programme, counselling services, gifted and talented students

Procedia PDF Downloads 85
28424 Personal Identity and Group Identity under Threat following Exclusion: A Study in Singapore and in the Netherlands

Authors: Z. N. Huwaë, E.M. W. Tong, Y. H. M. See

Abstract:

In the present study, the researchers examined whether people from collectivistic cultures perceive a more group identity threat following social exclusion, whereas a more personal identity threat would be the case for those from individualistic cultures. In doing so, they investigated whether threatened identities depend on whether people are excluded by ingroup members (same ethnic background) or outgroup members (another ethnic background), as exclusion studies have shown mixed results when it comes to being excluded by ingroup versus outgroup members. For this purpose, students in Singapore and in the Netherlands participated in an online ball-tossing game (Cyberball) where they were excluded or included by other players with either the same or other ethnicity. Tentative results showed that both Singaporean and Dutch participants reported a more threat to their group identity than to their personal identity following exclusion and this did not depend on who excluded them. These tentative findings suggest that threatened identities following exclusion may not depend on cultural factors or on the source of exclusion.

Keywords: cultures, exclusion, experiment, group membership, identities

Procedia PDF Downloads 92
28423 National Identity in Connecting the Community through Mural Art for Petronas Dagangan Berhad

Authors: Nadiah Mohamad, Wan Samiati Andriana Wan Mohd Daud, M. Suhaimi Tohid, Mohd Fazli Othman, Mohamad Rizal Salleh

Abstract:

This is a collaborative project of the mural art between The Department of Fine Art from Universiti Teknologi MARA (UiTM) and Petronas Dagangan Berhad (PDB), the most leading retailer and marketer of downstream oil and gas products in Malaysia. Five different states in the Peninsular of Malaysia that has been identified in showcasing the National Identity of Malaysia at each Petronas gas station, this also includes the Air Keroh in Melaka, Pasir Pekan in Kelantan, Pontian in Johor, Simpang Pulai in Perak, and also Wakaf Bharu in Terengganu. This project is to analyze the element of national identity that has been demonstrated at the Petronas's Mural. The ultimate aim of the mural is to let the community and local people to be aware about what Malaysians are consists and proud of and how everyone is able to connect with the idea through visual art. The method that is being explained in this research is by using visual data through research and also self-experience in collecting the visual data in identifying what images is considered as the national identity and idea development and visual analysis is being transferred based upon the visual data collection. In this stage, elements and principles of design will be the key in highlighting what is necessary for a work of art. In conclusion, visual image of the National Identity of Malaysia is able to connect to the audience from local and also to the people from outside the country to learn and understand the beauty and diversity of Malaysia as a unique country with art through the wall of five Petronas gas station.

Keywords: community, fine art, mural art, national identity

Procedia PDF Downloads 173
28422 Processes of Identities Formation and Transformation among Professional Skilled Mexican Migrants in the United States

Authors: M. Laura Vazquez Maggio, Lilia Dominguez Villalobos, Jan Luka Frey

Abstract:

This paper contributes to the understanding of the dynamic and the relational nature of identities formation among skilled middle-class migrants. Following the idea that identities are never singular, multifaceted and have a necessarily processual character, the authors specifically analyze three dimensions of the identity of qualified Mexican migrants in the US and the interplay between them. Drawing on semi-structured interviews with skilled Mexican middle-class migrants in the US, the paper explores how skilled Mexican migrants preserve their ethno-national identity (their ‘Mexicanness’) in reaction to a hostile socio-political reception context in the US. It further shows how these migrants recreate their class identity and show tendencies to distance themselves from what they perceive as lower-class Mexican migrants and the dominant popular Mexican and Latin-American cultural expressions. In a final step, it examines how the lived experience of migration itself impacts the migrants’ identities, their concept of self and feelings/modes of being and belonging.

Keywords: ethno-national identity, middle class identity, middle-class migration, migrants’ identity, skilled migration

Procedia PDF Downloads 119
28421 A Design of Elliptic Curve Cryptography Processor based on SM2 over GF(p)

Authors: Shiji Hu, Lei Li, Wanting Zhou, DaoHong Yang

Abstract:

The data encryption, is the foundation of today’s communication. On this basis, how to improve the speed of data encryption and decryption is always a problem that scholars work for. In this paper, we proposed an elliptic curve crypto processor architecture based on SM2 prime field. In terms of hardware implementation, we optimized the algorithms in different stages of the structure. In finite field modulo operation, we proposed an optimized improvement of Karatsuba-Ofman multiplication algorithm, and shorten the critical path through pipeline structure in the algorithm implementation. Based on SM2 recommended prime field, a fast modular reduction algorithm is used to reduce 512-bit wide data obtained from the multiplication unit. The radix-4 extended Euclidean algorithm was used to realize the conversion between affine coordinate system and Jacobi projective coordinate system. In the parallel scheduling of point operations on elliptic curves, we proposed a three-level parallel structure of point addition and point double based on the Jacobian projective coordinate system. Combined with the scalar multiplication algorithm, we added mutual pre-operation to the point addition and double point operation to improve the efficiency of the scalar point multiplication. The proposed ECC hardware architecture was verified and implemented on Xilinx Virtex-7 and ZYNQ-7 platforms, and each 256-bit scalar multiplication operation took 0.275ms. The performance for handling scalar multiplication is 32 times that of CPU(dual-core ARM Cortex-A9).

Keywords: Elliptic curve cryptosystems, SM2, modular multiplication, point multiplication.

Procedia PDF Downloads 67
28420 Identity Management in Virtual Worlds Based on Biometrics Watermarking

Authors: S. Bader, N. Essoukri Ben Amara

Abstract:

With the technological development and rise of virtual worlds, these spaces are becoming more and more attractive for cybercriminals, hidden behind avatars and fictitious identities. Since access to these spaces is not restricted or controlled, some impostors take advantage of gaining unauthorized access and practicing cyber criminality. This paper proposes an identity management approach for securing access to virtual worlds. The major purpose of the suggested solution is to install a strong security mechanism to protect virtual identities represented by avatars. Thus, only legitimate users, through their corresponding avatars, are allowed to access the platform resources. Access is controlled by integrating an authentication process based on biometrics. In the request process for registration, a user fingerprint is enrolled and then encrypted into a watermark utilizing a cancelable and non-invertible algorithm for its protection. After a user personalizes their representative character, the biometric mark is embedded into the avatar through a watermarking procedure. The authenticity of the avatar identity is verified when it requests authorization for access. We have evaluated the proposed approach on a dataset of avatars from various virtual worlds, and we have registered promising performance results in terms of authentication accuracy, acceptation and rejection rates.

Keywords: identity management, security, biometrics authentication and authorization, avatar, virtual world

Procedia PDF Downloads 245
28419 Examining Kokugaku as a Pattern of Defining Identity in Global Comparison

Authors: Mária Ildikó Farkas

Abstract:

Kokugaku of the Edo period can be seen as a key factor of defining cultural (and national) identity in the 18th and early 19th century based on Japanese cultural heritage. Kokugaku focused on Japanese classics, on exploring, studying and reviving (or even inventing) ancient Japanese language, literature, myths, history and also political ideology. ‘Japanese culture’ as such was distinguished from Chinese (and all other) cultures, ‘Japanese identity’ was thus defined. Meiji scholars used kokugaku conceptions of Japan to construct a modern national identity based on the premodern and culturalist conceptions of community. The Japanese cultural movement of the 18-19th centuries (kokugaku) of defining cultural and national identity before modernization can be compared not to the development of Western Europe (where national identity strongly attached to modern nation states) or other parts of Asia (where these emerged after the Western colonization), but rather with the ‘national awakening’ movements of the peoples of East Central Europe, a comparison which have not been dealt with in the secondary literature yet. The role of a common language, culture, history and myths in the process of defining cultural identity – following mainly Miroslav Hroch’s comparative and interdisciplinary theory of national development – can be examined compared to the movements of defining identity of the peoples of East Central Europe (18th-19th c). In the shadow of a cultural and/or political ‘monolith’ (China for Japan and Germany for Central Europe), before modernity, ethnic groups or communities started to evolve their own identities with cultural movements focusing on their own language and culture, thus creating their cultural identity, and in the end, a new sense of community, the nation. Comparing actual texts (‘narratives’) of the kokugaku scholars and Central European writers of the nation building period (18th and early 19th centuries) can reveal the similarities of the discourses of deliberate searches for identity. Similar motives of argument can be identified in these narratives: ‘language’ as the primary bearer of collective identity, the role of language in culture, ‘culture’ as the main common attribute of the community; and similar aspirations to explore, search and develop native language, ‘genuine’ culture, ‘original’ traditions. This comparative research offering ‘development patterns’ for interpretation can help us understand processes that may be ambiguously considered ‘backward’ or even ‘deleterious’ (e.g. cultural nationalism) or just ‘unique’. ‘Cultural identity’ played a very important role in the formation of national identity during modernization especially in the case of non-Western communities, who had to face the danger of losing their identities in the course of ‘Westernization’ accompanying modernization.

Keywords: cultural identity, Japanese modernization, kokugaku, national awakening

Procedia PDF Downloads 240
28418 Regional Identity Construction of Acehnese English Teachers in Professional Practice

Authors: Ugahara Bin Mahyuddin Yunus

Abstract:

In English Language Teaching, it cannot be denied that the backgrounds of English teachers do affect the way they teach English to their students, which in turn will affect their students’ English learning itself. Thus, it is very important to understand who the English teachers are so that how they teach English to their students can be understood. One of their backgrounds that is essential to be highlighted is their culture. Certainly, they wittingly or not will bring the perspectives and values of their culture into their daily teaching practices. In other words, their cultural identities do shape how they teach their students. Cultural identities themselves actually consist of some elements, one of which is regional identity. Indeed, the culture of the region in which English teachers identify with has impact on their beliefs and actions during teaching. For this reason, this study aims to understand how the regional identity of English teachers influence the way they teach English to their students. This study is a qualitative study conducted in a multilingual and multicultural setting, namely Aceh, Indonesia. Here, four Acehnese English teachers were involved as the research participants. In addition, this study adopted poststructuralist perspective to identity as the theoretical framework. Three research instruments were used in this study, namely semi-structured interviews, classroom observation, and teacher journal. The data gained from these instruments were then analyzed by using thematic analysis. Obviously, the research about the regional identity of English teachers in English Language Teaching has been studied worldwide. However, little is still known about it in Indonesian context, let alone Indonesia itself is a super diverse country with 34 regions. As a result, this study presents a good opportunity to advance the knowledge of how the regional identity construction of English teachers in this setting is. The findings of the study revealed that their regional identity construction in teaching was highly influenced by their indigenous language and religious faith. Even, how they teach English in classroom, in fact, is related to these two things. The conclusion that can be drawn from this study is for these English teachers, in fact, their regional identity itself constitutes their use of local language and religious identity, which are considered by them as their core identity.

Keywords: English language teaching, English teachers, identity construction, regional identity

Procedia PDF Downloads 222
28417 Symbolic Status of Architectural Identity: Example of Famagusta Walled City

Authors: Rafooneh Mokhtarshahi Sani

Abstract:

This study explores how the residents of a conserved urban area have used goods and ideas as resources to maintain an enviable architectural identity. Whereas conserved urban quarters are seen as role model for maintaining architectural identity, the article describes how their residents try to give a contemporary modern image to their homes. It is argued that despite the efforts of authorities and decision makers to keep and preserve the traditional architectural identity in conserved urban areas, people have already moved on and have adjusted their homes with their preferred architectural taste. Being through such conflict of interests, have put the future of architectural identity in such places at risk. The thesis is that, on the one hand, such struggle over a desirable symbolic status in identity formation is taking place, and, on the other, it is continuously widening the gap between the real and ideal identity in the built environment. The study then analytically connects the concept of symbolic status to current identity debates. As an empirical research, this study uses systematic social and physical observation methods to describe and categorize the characteristics of settlements in Walled City of Famagusta, which symbolically represent the modern houses. The Walled City is a cultural heritage site, which most of its urban context has been conserved. Traditional houses in this area demonstrate the identity of North Cyprus architecture. The conserved residential buildings, however, either has been abandoned or went through changes by their users to present the ideal image of contemporary life. In the concluding section, the article discusses the differences between the symbolic status of people and authorities in defining a culturally valuable contemporary home. And raises the question of whether we can talk at all about architectural identity in terms of conserving the traditional style, and how we may do so on the basis of dynamic nature of identity and the necessity of its acceptance by the users.

Keywords: symbolic status, architectural identity, conservation, facades, Famagusta walled city

Procedia PDF Downloads 328
28416 Investigating Cultural Identities in Contemporary Greek Art: the Case of Greek Artists in Paris in 1980s

Authors: Sapfo Mortaki

Abstract:

Over the years, Greeks were leaving their homeland looking for better luck, including artists - painters and sculptors. Until mid-1940's, few were the ones who lived, worked, studied and were distinguished abroad. After the end of the Second World War, the group exit towards the cultural centers of the West commences. Since the mid-1970s, and especially in the early 1980s, Modern Greek Diaspora has undergone a new period. The creation of the European Community affects both the character of the immigration of artists as well as the creation of their identity within cultural pluralism. Since 1980 the situation in Greece changed significantly, and the contacts of artists with their homeland became greatly enhanced. Based on the above, this paper examines the cultural identity of the Greek artists in Paris during the 1980s, in comparison to the creation of the identity of the artists of the previous migratory movements, since this decade constitutes a critical point. Their cultural presence in Paris, as reflected in French and Greek daily press and journals of the period, is also investigated. At the same time, their connection with Greece and their contribution to the development and evolution of Contemporary Greek Art is discussed.

Keywords: artistic migration in Paris, cultural identity, cultural interaction, greek artists, greek contemporary art

Procedia PDF Downloads 305
28415 Encryption Image via Mutual Singular Value Decomposition

Authors: Adil Al-Rammahi

Abstract:

Image or document encryption is needed through e- government data base. Really in this paper we introduce two matrices images, one is the public, and the second is the secret (original). The analyses of each matrix is achieved using the transformation of singular values decomposition. So each matrix is transformed or analyzed to three matrices say row orthogonal basis, column orthogonal basis, and spectral diagonal basis. Product of the two row basis is calculated. Similarly the product of the two column basis is achieved. Finally we transform or save the files of public, row product and column product. In decryption stage, the original image is deduced by mutual method of the three public files.

Keywords: image cryptography, singular values decomposition

Procedia PDF Downloads 403
28414 Model Estimation and Error Level for Okike’s Merged Irregular Transposition Cipher

Authors: Okike Benjamin, Garba E. J. D.

Abstract:

The researcher has developed a new encryption technique known as Merged Irregular Transposition Cipher. In this cipher method of encryption, a message to be encrypted is split into parts and each part encrypted separately. Before the encrypted message is transmitted to the recipient(s), the positions of the split in the encrypted messages could be swapped to ensure more security. This work seeks to develop a model by considering the split number, S and the average number of characters per split, L as the message under consideration is split from 2 through 10. Again, after developing the model, the error level in the model would be determined.

Keywords: merged irregular transposition, error level, model estimation, message splitting

Procedia PDF Downloads 287
28413 Analyzing the Factors That Influence Students' Professional Identity Using Hierarchical Regression Analysis to Ease Higher Education Transition

Authors: Alba Barbara-i-Molinero, Rosalia Cascon Pereira, Ana Beatriz Hernandez Lara

Abstract:

Our general motivation in undertaking this study is to propose alternative measures to lighten students experienced tensions during the transitions from high school to higher education based on the concept of professional identity strength. In order to do so, we measured the influence that three different factors external motivational conditionals, educational experience conditionals and personal motivation conditionals exerted over students’ professional identity strength and proposed the measures considering the obtained results. By using hierarchical regression analysis we addressed this issue, across disciplines and bachelor degrees, allowing us to gain also deeper insight into first-year university students PID. Our findings suggest that students’ from the different disciplines are influenced by personal motivational conditionals; while students from sciences are also influenced by external motivational conditionals. Based on the obtained results we propose three different alternative educational and recruitment strategies which aim to increase students’ professional identity strength and reduce the tensions generated during high school-university transitions. From this study theoretical contributions regarding the differences in the influence of these factors on students from different bachelor degrees arise; and practical implications for universities, derived from the proposed strategies.

Keywords: professional identity, transitions, higher education, strategies

Procedia PDF Downloads 152
28412 Cultural Identity in Environmental Protection Areas of Nova Friburgo: Heritage, Tourism, and Traditions

Authors: Camila Dazzi, Crisitiane Passos de Mattos, Thiago Leite

Abstract:

The paper discusses the cultural identity of the communities located in Environmental Protection Area (APAs), in the mountainous region of Rio de Janeiro, constituted almost entirely by descendants of Swiss immigrants who arrived in Brazil in the nineteenth century. The communication is the result of an extension project named "Cultural Identity in Environmental Protection Areas of Nova Friburgo." The objectives of this project were framed in the identification of local history, cultural demonstrations, crafts, religious events, festivals, the "know-how" and traditions. While an extension project, developed by students and teachers of a Bachelor of Tourism Management program, the work provided a more practical action: awareness the communities that inhabit the APAs on the possible implementation of the cultural community-based tourism, a sustainable alternative for economic development, involving local people as propagators of local culture, and tourism as a way of valuing and safeguarding of Intangible Heritage.

Keywords: tourism and cultural heritage, tourism and cultural impacts, tourism and cultural change, cultural identity

Procedia PDF Downloads 517
28411 From Tionghoa to Tjina: Historical Tracing on the Identity Politics in Demonization of Ethnic Chinese in Indonesia

Authors: Michael J. Kristiono

Abstract:

This paper attempts to investigate the reasons behind the negative sentiments directed towards Chinese Indonesians from International Relations (IR) perspective. By tracing back the treatment of the New Order government towards ethnic Chinese, it was found that such demonization initially happened due to two politically motivated reasons. Firstly, as part of de-Soekarnoization done by the New Order, the Chinese were outcast because Chinese identity does not conform to the 'Indonesian identity', which was in essence, the Javanese identity. Secondly, the condition reflected the change in Indonesian foreign policy which drifted apart from People’s Republic of China (PRC) as the latter was suspected to be involved in September 30 Movement. Then, this paper argues that due to those reasons, coupled by blatant maltreatment from the New Order Government, Chinese Indonesians were constructed as the Others, that is, as non-Indonesians. Such construct has been deeply embedded such that reconciliation attempts done by the Reformation Era government were not sufficient enough to stop ethnic discrimination towards Chinese Indonesians from happening even until the present.

Keywords: Chinese Indonesians, ethnic discrimination, identity, New Order

Procedia PDF Downloads 309
28410 Examining the Influences of Exchange Programmes on Youths' National Identity: A Hong Kong Case Study

Authors: Annie Y. N. Cheng

Abstract:

Since the handover of Hong Kong to China, 'National Identity' has become a vital focus promoted by the HKSAR government. According to the poll by the University of Hong Kong’s Public Opinion Programme (2010 – 2015), young people aged between 18 and 29 have the least and decreasing recognition, an average 5.5%, of their Chinese identity. Past research has shown that student participation in exchange programmes and study tours provides the possibility of new formulations of national identity. Since the Policy Address 2008, the HKSAR government has been actively expanding and exploring the feasibility of Mainland exchange programmes to enhance our youths’ understanding of Chineseness and to strengthen their national identity. Schools have been sponsored or subsidized with the costs of Mainland exchange activities through various grants and channels. Considering the significantly increasing number of Hong Kong youths who have participated in these Mainland exchange programmes and study tours, however, the effectiveness of these activities is understudied. At present, there is the lack of systematic research on the impacts of these activities and the ways in which they influence our students’ perceptions of national identity. Using case study approach, this study aims to examine students’ perceptions of their national identity; and evaluate whether the Mainland exchange programmes or study tours have influences on students’ perceptions of national identity. Results show that the influences on national identity varied which were dependent on the objectives and destinations of the programmes. The findings of this study can provide significant feedback for schools to organize meaningful Mainland exchange activities or study tours and inform policy makers how to formulate effective strategies for promoting such exchange activities.

Keywords: Hong Kong youth, mainland exchange programme, national identity, study tours

Procedia PDF Downloads 366
28409 Wasif Jawharriyeh and the Identity-Forming Spaces of Late Ottoman Jerusalem

Authors: Feyza Daloglu

Abstract:

This paper scrutinizes the Ottoman years of Wasif Jawharriyeh’s memoir, The Storyteller of Jerusalem, within the framework of citadinite, employed by the Open Jerusalem Project. Open Jerusalem Project uses the term citadinite to describe “the dynamic identity relationship city dwellers have with each other and their urban environment.” While Jerusalem and Jerusalemite identity have usually been analyzed within religious, national, or colonial frameworks, citadinite offers a fresh perspective by turning its lens to the urban identity of its citizens in the 19th and 20th centuries to overcome the shortcomings of usual frameworks. Wasif Jawharriyeh is a proud Jerusalemite and a Greek Orthodox Arab, who spent his childhood and teenage years under the Ottoman Empire. His memoir reveals a great deal of urbanity and a strong sense of Jerusalemite identity which appears to be favored over other forms of identities - Arab, Christian - in the late empire years. Through citadinite, this paper aims to discuss aspects of Jerusalemite identity and key points of urban life in the late Ottoman holy city with the guidance of a very lively and social Ottoman citizen and at that time a young musician, Wasif Jawharriyeh.

Keywords: arab memoir, cityscape, jerusalem identity, ottoman city, urban life

Procedia PDF Downloads 94
28408 Towards an Eastern Philosophy of Religion: on the Contradictory Identity of Philosophy and Religion

Authors: Carlo Cogliati

Abstract:

The study of the relationship of philosophical reason with the religious domain has been very much a concern for many of the Western philosophical and theological traditions. In this essay, I will suggest a proposal for an Eastern philosophy of religion based on Nishida’s contradictory identity of the two: philosophy soku hi (is, and yes is not) religion. This will pose a challenge to the traditional Western contents and methods of the discipline. This paper aims to serve three purposes. First, I will critically assess Charlesworth’s typology of the relation between philosophy and religion in the West: philosophy as/for/against/about/after religion. I will also engage Harrison’s call for a global philosophy of religion(s) and argue that, although it expands the scope and the range of the questions to address, it is still Western in its method. Second, I will present Nishida’s logic of absolutely contradictory self-identity as the instrument to transcend the dichotomous pair of identity and contradiction: ‘A is A’ and ‘A is not A’. I will then explain how this ‘concrete’ logic of the East, as opposed to the ‘formal’ logic of the West, exhibits at best the bilateral dynamic relation between philosophy and religion. Even as Nishida argues for the non-separability of the two, he is also aware and committed to their mutual non-reducibility. Finally, I will outline the resulting new relation between God and creatures. Nishida in his philosophy soku hi religion replaces the traditional Western dualistic concept of God with the Eastern non-dualistic understanding of God as “neither transcendent nor immanent, and at the same time both transcendent and immanent.” God is therefore a self-identity of contradiction, nowhere and yet everywhere present in the world of creatures. God as absolute being is also absolute nothingness: the world of creatures is the expression of God’s absolute self-negation. The overreaching goal of this essay is to offer an alternative to traditional Western approaches to philosophy of religion based on Nishida’s logic of absolutely contradictory self-identity, as an example of philosophical and religious counter(influence). The resulting relationship between philosophy and religion calls for a revision of traditional concepts and methods. The outcome is not to reformulate the Eastern predilection to not sharply distinguish philosophical thought from religious enlightenment rather to bring together philosophy and religion in the place of identity and difference.

Keywords: basho, Nishida Kitaro, shukyotetsugaku, soku hi, zettai mujunteki jikodoitsu no ronri

Procedia PDF Downloads 166
28407 Pattern in Splitting Sequence in Okike’s Merged Irregular Transposition Cipher for Encrypting Cyberspace Messages

Authors: Okike Benjamin, E. J. D. Garba

Abstract:

The protection of sensitive information against unauthorized access or fraudulent changes has been of prime concern throughout the centuries. Modern communication techniques, using computers connected through networks, make all data even more vulnerable to these threats. The researchers in this work propose a new encryption technique to be known as Merged Irregular Transposition Cipher. In this proposed encryption technique, a message to be encrypted will first of all be split into multiple parts depending on the length of the message. After the split, different keywords are chosen to encrypt different parts of the message. After encrypting all parts of the message, the positions of the encrypted message could be swapped to other position thereby making it very difficult to decrypt by any unauthorized user.

Keywords: information security, message splitting, pattern, sequence

Procedia PDF Downloads 261
28406 The Greek Diaspora in Australia: Identity and Transnational Identity

Authors: Panayiota Romios

Abstract:

As the use of 'diaspora' has proliferated in the last decade, its meaning has been stretched in various directions. Current diaspora frames of identity representation do not adequately capture the complexities of everyday lived experiences of transnational individuals and groups. This paper presents the findings of a qualitative research project conducted in Melbourne, Australia with second generation Greek Australians. It analyses the forms of intercultural identities of the second generation Greek Australians returning to Australia post-2008, after living in Greece for an extended period of time. The discussion highlights key characteristics in relation to diaspora-homeland ties, seeking to denaturalise the commonplace assumptions and imaginations about the cultures and identities of Greek Australian diaspora communities and probe the relevance of identity markers such a country of origin, nationality, ethnicity, ethnic origin, language and mother tongue. The definition of diaspora experienced in this transnational lexicon is interestingly quite distinct from original articulations and also from others returning ‘home’.

Keywords: diaspora, identity, migration, displacement

Procedia PDF Downloads 329
28405 Walkability and Urban Social Identity

Authors: Reihaneh Rafiemanzelat

Abstract:

One of the most recent fields of investigation in urban issues focuses on the walkability in urban spaces. The paper aims to establish the theoretical relationship between the people's link with definite urban public spaces and the social identity processes derived from the relation with these places. The theoretical aspects which are examined for this purpose are: the concept of walkability and its developments and the social identity theories derived from walkable spaces. In fact, the paper presents the main results obtained from an empirical investigation which concern to the genesis of urban social identity in particular street as one of the main elements of public spaces in cities. İsmet İnönü Blvd which known as Salamis Street in Famagusta, North Cyprus is one of the main street in city whit high level of physical and social activities all the time. The urban social identity of users was analyzed, focusing on three main factors: walkability of space, social identification, and image of the space. These three factors were analyzed in relation to a series of items in the initial questionnaire, evaluation of existing natural resources, and environmental attitudes.

Keywords: walkability, urban public space, pedestrian, social activity, social identity

Procedia PDF Downloads 406