Search results for: privacy patterns
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 3074

Search results for: privacy patterns

2924 The Patterns Designation by the Inspiration from Flower at Suan Sunandha Palace

Authors: Nawaporn Srisarankullawong

Abstract:

This research is about the creating the design by the inspiration of the flowers, which were once planted in Suan Sunandha Palace. The researcher have conducted the research regarding the history of Suan Sunandha Palace and the flowers which have been planted in the palace’s garden, in order to use this research to create the new designs in the future. The objective are as follows; 1. To study the shape and the pattern of the flowers in Suan Sunandha Palace, in order to select a few of them as the model to create the new design. 2. In order to create the flower design from the flowers in Suan Sunandha Palace by using the current photograph of the flowers which were once used to be planted inside the palace and using adobe Illustrator and Adobe Photoshop programs to create the patterns and the model. The result of the research: From the research, the researcher had selected three types of flowers to crate the pattern model; they are Allamanda, Orchids and Flamingo Plant. The details of the flowers had been reduced in order to show the simplicity and create the pattern model to use them for models, so three flowers had created three pattern models and they had been developed into six patterns, using universal artist techniques, so the pattern created are modern and they can be used for further decoration.

Keywords: patterns design, Suan Sunandha Palace, pattern of the flowers, visual arts and design

Procedia PDF Downloads 344
2923 Big Data Analytics and Data Security in the Cloud via Fully Homomorphic Encryption

Authors: Waziri Victor Onomza, John K. Alhassan, Idris Ismaila, Noel Dogonyaro Moses

Abstract:

This paper describes the problem of building secure computational services for encrypted information in the Cloud Computing without decrypting the encrypted data; therefore, it meets the yearning of computational encryption algorithmic aspiration model that could enhance the security of big data for privacy, confidentiality, availability of the users. The cryptographic model applied for the computational process of the encrypted data is the Fully Homomorphic Encryption Scheme. We contribute theoretical presentations in high-level computational processes that are based on number theory and algebra that can easily be integrated and leveraged in the Cloud computing with detail theoretic mathematical concepts to the fully homomorphic encryption models. This contribution enhances the full implementation of big data analytics based cryptographic security algorithm.

Keywords: big data analytics, security, privacy, bootstrapping, homomorphic, homomorphic encryption scheme

Procedia PDF Downloads 338
2922 Climate Teleconnections and Their Influence on the Spread of Dengue

Authors: Edilene Machado, Carolina Karoly, Amanda Britz, Luciane Salvi, Claudineia Brazil

Abstract:

Climate teleconnections refer to the climatic relationships between geographically distant regions, where changes in one location can influence weather patterns in another. These connections can occur through atmospheric and oceanic processes, leading to variations in temperature, precipitation, and other climatic elements. Studying teleconnections is crucial for better understanding the mechanisms that govern global climate and the potential consequences of climate change. A notable example of a teleconnection is the El Niño-Southern Oscillation (ENSO), which involves the interaction between the Equatorial Pacific Ocean and the atmosphere. During El Niño episodes, there is anomalous warming of the surface waters in the Equatorial Pacific, resulting in significant changes in global climate patterns. These changes can affect rainfall distribution, wind patterns, and temperatures in different parts of the world. The cold phase of ENSO, known as La Niña, is often associated with reduced precipitation and below-average temperatures in the state of Rio Grande do Sul, Brazil. Therefore, the objective of this research is to identify patterns between El Niño-Southern Oscillation (ENSO) events in their different phases and dengue transmission. Meteorological data and dengue case records for the city of Porto Alegre, in the southern region of Brazil, were used for the development of this research. The study highlighted that the highest incidence of dengue cases occurred during the cold phase of the El Niño-Southern Oscillation (ENSO).

Keywords: climate patterns, climate teleconnections, climate variability, dengue, El Niño-Southern oscillation

Procedia PDF Downloads 53
2921 Dual-Network Memory Model for Temporal Sequences

Authors: Motonobu Hattori

Abstract:

In neural networks, when new patters are learned by a network, they radically interfere with previously stored patterns. This drawback is called catastrophic forgetting. We have already proposed a biologically inspired dual-network memory model which can much reduce this forgetting for static patterns. In this model, information is first stored in the hippocampal network, and thereafter, it is transferred to the neocortical network using pseudo patterns. Because, temporal sequence learning is more important than static pattern learning in the real world, in this study, we improve our conventional dual-network memory model so that it can deal with temporal sequences without catastrophic forgetting. The computer simulation results show the effectiveness of the proposed dual-network memory model.

Keywords: catastrophic forgetting, dual-network, temporal sequences, hippocampal

Procedia PDF Downloads 240
2920 Personal Data Protection: A Legal Framework for Health Law in Turkey

Authors: Veli Durmus, Mert Uydaci

Abstract:

Every patient who needs to get a medical treatment should share health-related personal data with healthcare providers. Therefore, personal health data plays an important role to make health decisions and identify health threats during every encounter between a patient and caregivers. In other words, health data can be defined as privacy and sensitive information which is protected by various health laws and regulations. In many cases, the data are an outcome of the confidential relationship between patients and their healthcare providers. Globally, almost all nations have own laws, regulations or rules in order to protect personal data. There is a variety of instruments that allow authorities to use the health data or to set the barriers data sharing across international borders. For instance, Directive 95/46/EC of the European Union (EU) (also known as EU Data Protection Directive) establishes harmonized rules in European borders. In addition, the General Data Protection Regulation (GDPR) will set further common principles in 2018. Because of close policy relationship with EU, this study provides not only information on regulations, directives but also how they play a role during the legislative process in Turkey. Even if the decision is controversial, the Board has recently stated that private or public healthcare institutions are responsible for the patient call system, for doctors to call people waiting outside a consultation room, to prevent unlawful processing of personal data and unlawful access to personal data during the treatment. In Turkey, vast majority private and public health organizations provide a service that ensures personal data (i.e. patient’s name and ID number) to call the patient. According to the Board’s decision, hospital or other healthcare institutions are obliged to take all necessary administrative precautions and provide technical support to protect patient privacy. However, this application does not effectively and efficiently performing in most health services. For this reason, it is important to draw a legal framework of personal health data by stating what is the main purpose of this regulation and how to deal with complicated issues on personal health data in Turkey. The research is descriptive on data protection law for health care setting in Turkey. Primary as well as secondary data has been used for the study. The primary data includes the information collected under current national and international regulations or law. Secondary data include publications, books, journals, empirical legal studies. Consequently, privacy and data protection regimes in health law show there are some obligations, principles and procedures which shall be binding upon natural or legal persons who process health-related personal data. A comparative approach presents there are significant differences in some EU member states due to different legal competencies, policies, and cultural factors. This selected study provides theoretical and practitioner implications by highlighting the need to illustrate the relationship between privacy and confidentiality in Personal Data Protection in Health Law. Furthermore, this paper would help to define the legal framework for the health law case studies on data protection and privacy.

Keywords: data protection, personal data, privacy, healthcare, health law

Procedia PDF Downloads 184
2919 Recurrent Patterns of Netspeak among Selected Nigerians on WhatsApp Platform: A Quest for Standardisation

Authors: Lily Chimuanya, Esther Ajiboye, Emmanuel Uba

Abstract:

One of the consequences of online communication is the birth of new orthography genres characterised by novel conventions of abbreviation and acronyms usually referred to as Netspeak. Netspeak, also known as internet slang, is a style of writing mainly used in online communication to limit the length of text characters and to save time. The aim of this study is to evaluate how second language users of the English language have internalised this new convention of writing; identify the recurrent patterns of Netspeak; and assess the consistency of the use of the identified patterns in relation to their meanings. The study is corpus-based, and data drawn from WhatsApp chart pages of selected groups of Nigerian English speakers show a large occurrence of inconsistencies in the patterns of Netspeak and their meanings. The study argues that rather than emphasise the negative impact of Netspeak on the communicative competence of second language users, studies should focus on suggesting models as yardsticks for standardising the usage of Netspeak and indeed all other emerging language conventions resulting from online communication. This stance stems from the inevitable global language transformation that is eminent with the coming of age of information technology.

Keywords: abbreviation, acronyms, Netspeak, online communication, standardisation

Procedia PDF Downloads 353
2918 Quantifying User-Related, System-Related, and Context-Related Patterns of Smartphone Use

Authors: Andrew T. Hendrickson, Liven De Marez, Marijn Martens, Gytha Muller, Tudor Paisa, Koen Ponnet, Catherine Schweizer, Megan Van Meer, Mariek Vanden Abeele

Abstract:

Quantifying and understanding the myriad ways people use their phones and how that impacts their relationships, cognitive abilities, mental health, and well-being is increasingly important in our phone-centric society. However, most studies on the patterns of phone use have focused on theory-driven tests of specific usage hypotheses using self-report questionnaires or analyses of smaller datasets. In this work we present a series of analyses from a large corpus of over 3000 users that combine data-driven and theory-driven analyses to identify reliable smartphone usage patterns and clusters of similar users. Furthermore, we compare the stability of user clusters across user- and system-initiated sessions, as well as during the hypothesized ritualized behavior times directly before and after sleeping. Our results indicate support for some hypothesized usage patterns but present a more complete and nuanced view of how people use smartphones.

Keywords: data mining, experience sampling, smartphone usage, health and well being

Procedia PDF Downloads 134
2917 The Primitive Code-Level Design Patterns for Distributed Programming

Authors: Bing Li

Abstract:

The primitive code-level design patterns (PDP) are the rudimentary programming elements to develop any distributed systems in the generic distributed programming environment, GreatFree. The PDP works with the primitive distributed application programming interfaces (PDA), the distributed modeling, and the distributed concurrency for scaling-up. They not only hide developers from underlying technical details but also support sufficient adaptability to a variety of distributed computing environments. Programming with them, the simplest distributed system, the lightweight messaging two-node client/server (TNCS) system, is constructed rapidly with straightforward and repeatable behaviors, copy-paste-replace (CPR). As any distributed systems are made up of the simplest ones, those PDAs, as well as the PDP, are generic for distributed programming.

Keywords: primitive APIs, primitive code-level design patterns, generic distributed programming, distributed systems, highly patterned development environment, messaging

Procedia PDF Downloads 150
2916 Evolving Jurisprudence of Rape Laws in India: A Study of Last One Decade

Authors: Drutika Upadhyay

Abstract:

Rape is one of the most heinous crimes committed against the body of a woman violating her privacy and dignity. The Right to Privacy and the Right to Live with Dignity constitute the very essence of the Right to Life and Personal Liberty, a Fundamental Right guaranteed under Article 21 of the Indian Constitution. The study is conducted with the primary objective of analyzing the efficacy of rape laws in India. The study begins by explaining the origin, meaning, and kinds of rape recognised under Indian jurisprudence. Further, it explains various statutory and penal provisions relating to rape and the loopholes in such provisions. It focuses on the procedure followed during investigation and trial and also aims at developing an understanding of the rights of the victim and the sentence in cases of rape. The study also throws some light upon the amendments made to the criminal law and the recommendations of the Law Commission of India to meet the demands of the changing criminal justice delivery system. The outcome of the study suggests that the laws relating to rape have proved to be a major failure owing to the lack of proper implementation. Also, the lack of education among the masses leads to gender biasness, which is the ultimate cause for the commission of such crime. At last, the author concludes that the present criminal law system of the country contains various lacunae that need to be filled in so as to make the criminal justice system more stringent. Further, the scope of the definition of ‘rape’ needs to be widened in order to include such other acts of non-consensual and sexual nature that are currently not included in the definition. The author has adopted a non-doctrinal and analytical approach and relied upon the secondary sources of data for the purpose of the study. The scope of the study is limited to the crime committed against women.

Keywords: amendment, criminal law, fundamental right, personal liberty, privacy, rape

Procedia PDF Downloads 105
2915 Drivers, Patterns and Economic Consequences of Cities’ Globalization

Authors: Denis Ushakov

Abstract:

Cities are the main actors of global production and trade, and dominant share of international business activity is now concentrating within a frame of global urban net. This trend transforms mechanisms and patterns of market economy institutes’ (such as competition, division of labor, international movement of capital and labor force) functioning; stimulates an appearance of new economical (development of rural areas), social (urbanization) and political (political and economical unity of the big countries) problems. All these reasons identified relevance and importance of purpose of this study – to consider a modern role of cities’ business systems in the global economy, to identify sources for global urban competitive advantages, to clear inter-cities economic relationships and patterns of cities’ positioning within a frame of global net.

Keywords: globalization, urban business system, global city, transnationalization, networking

Procedia PDF Downloads 271
2914 Major Dietary Patterns in Relationship with Anthropometric Indices in North West of Iran

Authors: Arezou Rezazadeh, Nasrin Omidvar, Hassan Eini-Zinab, Mahmoud Ghazi-Tabatabaie, Reza Majdzadeh, Saeid Ghavamzadeh, Sakineh Nouri-Saeidlou

Abstract:

Dietary pattern analysis method can reflect more information about the nutritional etiology of chronic diseases such as obesity. The aim of this study was to determine the relationship between major dietary patterns and anthropometric measures in men and women living in the city of Urmia. In this cross-sectional study, 723 participants (427 women and 296 men), aged 20–64 in Urmia city were selected from all four zones of Urmia city, in the north-west of Iran. Anthropometrics (weight, height, waist and hip circumference) were measured with standard methods. Body Mass Index (BMI) was calculated by dividing weight (in kilograms) by the square of height (in meter). Dietary intake information was collected by a semi-quantitative food frequency questionnaire in the last year. Dietary patterns were determined using principal component analysis. The relationship between dietary patterns and obesity was analyzed by logistic regression. Three major dietary patterns (DPs) were identified that were named ‘Traditional Higher SES (THS)’, ‘Traditional Low SES (TLS)’ and ‘Transitional’. THS DP was positively and Transitional DP was negatively associated with BMI and waist circumference (W.C), however, after adjusting for confounding variables (age, gender, ethnicity, energy intake, physical activity and SES), the associations were not significant. The TLS was not significantly associated with BMI, but after adjusting for confounders, a significant positive association was detected with W.C and Waist to hip ratio (WHR). Findings showed that both traditional patterns were positively and the western type transitional pattern was reversely associated with anthropometric indices. But this relationship was highly affected by demographic, socioeconomic and energy input and output determinants. The results indicate the inevitable effect of environmental factors on the relationship between dietary patterns and anthropometric indices.

Keywords: anthropometric indices, dietary pattern, Iran, North-west

Procedia PDF Downloads 134
2913 Effectiveness of Integrative Behavioral Couples Therapy on the Communication Patterns of Couples Applying for Divorce

Authors: Sakineh Abbasi Bourondaragh

Abstract:

The aim of this research is effectiveness of integrative behavioral couples therapy on the communication patterns of couples applying for divorce. We selected (N=20) reports from Tabriz Family Judicial Complex (FJC) of couples which have conflict in their marital relationships. All of reports were released during 2012. First, they were randomly divided into two experimental and control groups and all the couples were given pre-test. They participated in twelve therapy sessions. Then the experimental group was exposed to an experimental intervention, but the control group was not received experimental intervention. The subjects were treated. At the end of treatment, a post-test was performed about subjects (each of two groups).The results showed that integrative behavioral couple therapy could increase and improve communication patterns. The findings also showed that integrative behavioral couples therapy had increased mutual constructive pattern and decreased demand/withdraw pattern and mutual avoidance pattern of CPQ sub-scale. Steady change indicator showed that the difference is clinically meaningful.

Keywords: integrative behavioral couple therapy, communication patterns, cognitive sciences, Family Judicial Complex

Procedia PDF Downloads 294
2912 Visualization of the Mobility Patterns of Public Bike Sharing System in Seoul

Authors: Young-Hyun Seo, Hosuk Shin, Eun-Hak Lee, Seung-Young Kho

Abstract:

This study analyzed and visualized the rental and return data of the public bike sharing system in Seoul, Ttareungyi, from September 2015 to October 2017. With the surge of system users, the number of times of collection and distribution in 2017 increased by three times compared to 2016. The city plans to deploy about 20,000 public bicycles by the end of 2017 to expand the system. Based on about 3.3 million historical data, we calculated the average trip time and the number of trips from one station to another station. The mobility patterns between stations are graphically displayed using R and Tableau. Demand for public bike sharing system is heavily influenced by day and weather. As a result of plotting the number of rentals and returns of some stations on weekdays and weekends at intervals of one hour, there was a difference in rental patterns. As a result of analysis of the rental and return patterns by time of day, there were a lot of returns at the morning peak and more rentals at the afternoon peak at the center of the city. It means that stock of bikes varies largely in the time zone and public bikes should be rebalanced timely. The result of this study can be applied as a primary data to construct the demand forecasting function of the station when establishing the rebalancing strategy of the public bicycle.

Keywords: demand forecasting, mobility patterns, public bike sharing system, visualization

Procedia PDF Downloads 165
2911 Security Risks Assessment: A Conceptualization and Extension of NFC Touch-And-Go Application

Authors: Ku Aina Afiqah Ku Adzman, Manmeet Mahinderjit Singh, Zarul Fitri Zaaba

Abstract:

NFC operates on low-range 13.56 MHz frequency within a distance from 4cm to 10cm, and the applications can be categorized as touch and go, touch and confirm, touch and connect, and touch and explore. NFC applications are vulnerable to various security and privacy attacks such due to its physical nature; unprotected data stored in NFC tag and insecure communication between its applications. This paper aims to determine the likelihood of security risks happening in an NFC technology and application. We present an NFC technology taxonomy covering NFC standards, types of application and various security and privacy attack. Based on observations and the survey presented to evaluate the risk assessment within the touch and go application demonstrates two security attacks that are high risks namely data corruption and DOS attacks. After the risks are determined, risk countermeasures by using AHP is adopted. The guideline and solutions to these two high risks, attacks are later applied to a secure NFC-enabled Smartphone Attendance System.

Keywords: Near Field Communication (NFC), risk assessment, multi-criteria decision making, Analytical Hierarchy Process (AHP)

Procedia PDF Downloads 273
2910 VCloud: A Security Framework for VANET

Authors: Wiseborn Manfe Danquah, D. Turgay Altilar

Abstract:

Vehicular Ad-hoc Network (VANET) is an integral component of Intelligent Transport Systems (ITS) that has enjoyed a lot of attention from the research community and the automotive industry. This is mainly due to the opportunities and challenges it presents. Vehicular Ad-hoc Network being a class of Mobile Ad-hoc Networks (MANET) has all the security concerns existing in traditional MANET as well as new security and privacy concerns introduced by the unique vehicular communication environment. This paper provides a survey of the possible attacks in vehicular environment, as well as security and privacy concerns in VANET. It also provides an insight into the development of a comprehensive cloud framework to provide a more robust and secured communication among vehicular nodes and road side units. Our proposal, a Metropolitan Based Public Interconnected Vehicular Cloud (MIVC) infrastructure seeks to provide a more reliable and secured vehicular communication network.

Keywords: mobile Ad-hoc networks, vehicular ad hoc network, cloud, ITS, road side units (RSU), metropolitan interconnected vehicular cloud (MIVC)

Procedia PDF Downloads 323
2909 Two Steady States and Two Movement Patterns under the Balanced Budget Rule: An Economy with Divisible Labor

Authors: Fujio Takata

Abstract:

When governments levy taxes on labor income on the basis of a balanced budget rule, two steady states in an economy exist, of which one can cause two movement patterns, namely, indeterminacy paths and a saddle path. However, in this paper, we assume an economy with divisible labor, in which labor adjustment is made by an intensive margin. We demonstrate that there indeed exist the two paths in the economy and that there exists a critical condition dividing them. This is proved by establishing the relationship between a finite elasticity of labor with regard to real wages and the share of capital in output. Consequently, we deduce the existence of an upper limit in the share of capital in output for indeterminacy to occur. The largest possible value of that share is less than 0.5698.

Keywords: balanced budget rule, divisible labor, labor income taxation, two movement patterns

Procedia PDF Downloads 126
2908 Assessment the Manner of Obtaining Hierarchies and Privacy of Traditional Houses Entrance in Providing a Safe Place-Case Study: Traditional Houses in Shiraz

Authors: Zahra A. Barzegar, Maryam B. Golboo

Abstract:

In this paper, the manner of obtaining hierarchies and privacy entry of traditional houses in providing a safe place in the city of Shiraz will be evaluated by qualitative–descriptive methods and 6 old houses are the case study. The houses of Shiraz, as the houses in other cities in Iran are a response to climate and physical features. The old part of Shiraz has a compressed and dense texture in which the houses are in narrow and tight alleys. In this regard, the principles of traditional house entrance design have been introduced. The results show that every house has a private entrance. Direction of the entry of most houses is toward the south and with a turn to the South-East side. Entrance to yard path in all the cases is not straight, and this had been done by using 90 degrees rotates of the corridor leading to the yard. Vestibule provides a private place for the house and entrance stairway to the rooftop is located inside it.

Keywords: entrance, components of entrance, hierarchy, frontage, Shiraz houses

Procedia PDF Downloads 284
2907 Big Data Analytics and Data Security in the Cloud via Fully Homomorphic Encyption Scheme

Authors: Victor Onomza Waziri, John K. Alhassan, Idris Ismaila, Noel Dogonyara

Abstract:

This paper describes the problem of building secure computational services for encrypted information in the Cloud. Computing without decrypting the encrypted data; therefore, it meets the yearning of computational encryption algorithmic aspiration model that could enhance the security of big data for privacy or confidentiality, availability and integrity of the data and user’s security. The cryptographic model applied for the computational process of the encrypted data is the Fully Homomorphic Encryption Scheme. We contribute a theoretical presentations in a high-level computational processes that are based on number theory that is derivable from abstract algebra which can easily be integrated and leveraged in the Cloud computing interface with detail theoretic mathematical concepts to the fully homomorphic encryption models. This contribution enhances the full implementation of big data analytics based on cryptographic security algorithm.

Keywords: big data analytics, security, privacy, bootstrapping, Fully Homomorphic Encryption Scheme

Procedia PDF Downloads 442
2906 Implications of Circular Economy on Users Data Privacy: A Case Study on Android Smartphones Second-Hand Market

Authors: Mariia Khramova, Sergio Martinez, Duc Nguyen

Abstract:

Modern electronic devices, particularly smartphones, are characterised by extremely high environmental footprint and short product lifecycle. Every year manufacturers release new models with even more superior performance, which pushes the customers towards new purchases. As a result, millions of devices are being accumulated in the urban mine. To tackle these challenges the concept of circular economy has been introduced to promote repair, reuse and recycle of electronics. In this case, electronic devices, that previously ended up in landfills or households, are getting the second life, therefore, reducing the demand for new raw materials. Smartphone reuse is gradually gaining wider adoption partly due to the price increase of flagship models, consequently, boosting circular economy implementation. However, along with reuse of communication device, circular economy approach needs to ensure the data of the previous user have not been 'reused' together with a device. This is especially important since modern smartphones are comparable with computers in terms of performance and amount of data stored. These data vary from pictures, videos, call logs to social security numbers, passport and credit card details, from personal information to corporate confidential data. To assess how well the data privacy requirements are followed on smartphones second-hand market, a sample of 100 Android smartphones has been purchased from IT Asset Disposition (ITAD) facilities responsible for data erasure and resell. Although devices should not have stored any user data by the time they leave ITAD, it has been possible to retrieve the data from 19% of the sample. Applied techniques varied from manual device inspection to sophisticated equipment and tools. These findings indicate significant barrier in implementation of circular economy and a limitation of smartphone reuse. Therefore, in order to motivate the users to donate or sell their old devices and make electronic use more sustainable, data privacy on second-hand smartphone market should be significantly improved. Presented research has been carried out in the framework of sustainablySMART project, which is part of Horizon 2020 EU Framework Programme for Research and Innovation.

Keywords: android, circular economy, data privacy, second-hand phones

Procedia PDF Downloads 108
2905 Regulating Issues concerning Data Protection in Cloud Computing: Developing a Saudi Approach

Authors: Jumana Majdi Qutub

Abstract:

Rationale: Cloud computing has rapidly developed the past few years. Because of the importance of providing protection for personal data used in cloud computing, the role of data protection in promoting trust and confidence in users’ data has become an important policy priority. This research examines key regulatory challenges rose by the growing use and importance of cloud computing with focusing on protection of individuals personal data. Methodology: Describing and analyzing governance challenges facing policymakers and industry in Saudi Arabia, with an account of anticipated governance responses. The aim of the research is to describe and define the regulatory challenges on cloud computing for policy making in Saudi Arabia and comparing it with potential complied issues rose in respect of transported data to EU member state. In addition, it discusses information privacy issues. Finally, the research proposes policy recommendation that would resolve concerns surrounds the privacy and effectiveness of clouds computing frameworks for data protection. Results: There are still no clear regulation in Saudi Arabia specialized in legalizing cloud computing and specialty regulations in transferring data internationally and locally. Decision makers need to review the applicable law in Saudi Arabia that protect information in cloud computing. This should be from an international and a local view in order to identify all requirements surrounding this area. It is important to educate cloud computing users about their information value and rights before putting it in the cloud to avoid further legal complications, such as making an educational program to prevent giving personal information to a bank employee. Therefore, with many kinds of cloud computing services, it is important to have it covered by the law in all aspects.

Keywords: cloud computing, cyber crime, data protection, privacy

Procedia PDF Downloads 232
2904 Association of Work Pattern with the Well-Being and Happiness: Evidence from Married Women Working in Delhi, India

Authors: Kanchan Negi

Abstract:

Background: Modern work culture has driven demands for people to work long hours and weekends and take work to home at times. Research on the health effects of these exhaustive temporal work patterns is scant or contradictory. This study examines the relationship between work patterns and well-being (including happiness) in a sample of working women. Method: Primary data of 360 currently married women working in the education, health, banking and IT sector in Delhi, India, were analysed. Logistic regression was used to estimate physical and psychological well-being and happiness across work characteristics. Results: Relative to 35–40 hours/week, working longer related to poor well-being (ß=0.75, 95% CI 0.12 to 1.39). Compared with not working weekends, working most or all weekends is related to poor physical (ß=0.34, 95% CI 0.08 to 0.61) and psychological well-being (ß=0.50, 95% CI 0.20 to 0.79). Rigid work patterns (ß=0.17, 95% CI −0.09 to 0.42) are also related to poor well-being. Conclusion: Decreased well-being and unhappiness are significantly linked to strenuous and rigid work patterns, suggesting that modern work culture may contribute to poor well-being. Flexible timings, compensatory holidays, work-from-home, and daycare facilities for young ones must be welcomed by companies to ease the dual burden of homemakers and career makers.

Keywords: happiness, well-being, work pattern, working women

Procedia PDF Downloads 157
2903 Effects of Word Formation Dissimilarities on Youruba Learners of English

Authors: Pelumi Olowofoyeku

Abstract:

English as a language has great reach and influence; it is taught all over the world. For instance, in Nigeria, English language is been taught and learned as a second language; therefore second learners of English in Nigeria have certain problems they contend with. Because of the dissimilarities in word formation patterns of English and Yoruba languages, Yoruba learners of English mostly found in the south west of Nigeria, and some parts of Kwara, Kogi, and Edo states of Nigeria have problems with word formation patterns in English. The objectives of this paper therefore, are: to identify the levels of word formation dissimilarities in English and Yoruba languages and to examine the effects of these dissimilarities on the Yoruba learners of English. The data for this paper were graded words purposely selected and presented to selected students of Adeniran Ogunsanya College of Education, Oto-Ijanikin, Lagos, who are Yoruba learners of English. These respondents were randomly selected to form words which are purposively selected to test the effects of word formation dissimilarities between Yoruba (the respondent’s first language) and English language on the respondents. The dissimilarities are examined using contrastive analysis tools. This paper reveals that there are differences in the word formation patterns of Yoruba and English languages. The writer believes that there is need for language teachers to undertake comparative studies of the two languages involved for methodological reasons. The author then suggests that teachers should identify the problem areas and systematically teach their students. The paper concludes that although English and Yoruba word formation patterns differ very significantly in many respects, there exist language universals in all languages which language educators should take advantage of in teaching.

Keywords: word formation patterns, graded words, ESL, Yoruba learners

Procedia PDF Downloads 471
2902 Urban Sustainability and Sustainable Mobility, Lessons Learned from the Case of Chile

Authors: Jorge Urrutia-Mosquera, Luz Flórez-Calderón, Yasna Cortés

Abstract:

We assessed the state of progress in terms of urban sustainability indicators and studied the impact of current land use conditions and the level of spatial accessibility to basic urban amenities on travel patterns and sustainable mobility in Santiago de Chile. We determined the spatial impact of urban facilities on sustainable travel patterns through the statistical analysis, data visualisation, and weighted regression models. The results show a need to diversify land use in more than 60% of the communes, although in 85% of the communes, accessibility to public spaces is guaranteed. The findings also suggest improving access to early education facilities, as only 26% of the communes meet the sustainability standard, negatively impacting travel in sustainable modes. It is also observed that the level of access to urban facilities generates spatial heterogeneity in the city, which negatively affects travel patterns in terms of time over 60 minutes and modes of travel in private vehicles. The results obtained allow us to identify opportunities for public policy intervention to promote and adopt sustainable mobility.

Keywords: land use, urban sustainability, travel patterns, spatial heterogeneity, GWR model, sustainable mobility

Procedia PDF Downloads 40
2901 Blockchain in Saudi E-Government: A Systematic Literature Review

Authors: Haitham Assiri, Priyadarsi Nanda

Abstract:

The world is gradually entering the fourth industrial revolution. E-Government services are scaling government operations across the globe. However, as promising as an e-Government system would be, it is also susceptible to malicious attacks if not properly secured. This study found out that, in Saudi Arabia, the e-Government website, Yesser is vulnerable to external attacks. Obviously, this can lead to a breach of data integrity and privacy. In this paper, a Systematic Literature Review was conducted to explore possible ways the Kingdom of Saudi Arabia can take necessary measures to strengthen its e-Government system using Blockchain. Blockchain is one of the emerging technologies shaping the world through its applications in finance, elections, healthcare, etc. It secures systems and brings more transparency. A total of 28 papers were selected for this SLR, and 19 of the papers significantly showed that blockchain could enhance the security and privacy of Saudi’s e-government system. Other papers also concluded that blockchain is effective, albeit with the integration of other technologies like IoT, AI and big data. These papers have been analysed to sieve out the findings and set the stage for future research into the subject.

Keywords: blockchain, data integrity, e-government, security threats

Procedia PDF Downloads 215
2900 A Mathematical Agent-Based Model to Examine Two Patterns of Language Change

Authors: Gareth Baxter

Abstract:

We use a mathematical model of language change to examine two recently observed patterns of language change: one in which most speakers change gradually, following the mean of the community change, and one in which most individuals use predominantly one variant or another, and change rapidly if they change at all. The model is based on Croft’s Utterance Selection account of language change, which views language change as an evolutionary process, in which different variants (different ‘ways of saying the same thing’) compete for usage in a population of speakers. Language change occurs when a new variant replaces an older one as the convention within a given population. The present model extends a previous simpler model to include effects related to speaker aging and interspeaker variation in behaviour. The two patterns of individual change (one more centralized and the other more polarized) were recently observed in historical language changes, and it was further observed that slower changes were more associated with the centralized pattern, while quicker changes were more polarized. Our model suggests that the two patterns of change can be explained by different balances between the preference of speakers to use one variant over another and the degree of accommodation to (propensity to adapt towards) other speakers. The correlation with the rate of change appears naturally in our model, and results from the fact that both differential weighting of variants and the degree of accommodation affect the time for change to occur, while also determining the patterns of change. This work represents part of an ongoing effort to examine phenomena in language change through the use of mathematical models. This offers another way to evaluate qualitative explanations that cannot be practically tested (or cannot be tested at all) in a real-world, large-scale speech community.

Keywords: agent based modeling, cultural evolution, language change, social behavior modeling, social influence

Procedia PDF Downloads 208
2899 Convective Boiling of CO₂ in Macro and Mini-Channels

Authors: Adonis Menezes, Julio C. Passos

Abstract:

The present work deals with the theoretical and experimental investigation of the convective boiling of CO₂ in macro and mini-channels. A review of the state of the art of convective boiling studies in mini-channels and conventional channels for operating with CO₂ was carried out, with special attention to the flow patterns and pressure drop maps in single-phase and two-phase flows. To carry out an experimental analysis of the convective boiling of CO₂, a properly instrumented experimental bench was built, which allows a parametric analysis for different thermodynamic conditions, such as mass velocities between 200 and 1300 kg/(m².s), pressures between 20 and 70bar, temperature monitoring at the entrance of the mini-channels, heat flow and pressure drop in the test section. The visualization of flow patterns was possible with the use of a high-speed CMOS camera. The results obtained are in line with those found in the literature, both for flow patterns and for the heat transfer coefficient.

Keywords: carbon dioxide, convective boiling, CO₂, mini-channels

Procedia PDF Downloads 138
2898 Preliminary Knowledge Extraction from Beethoven’s Sonatas: from Musical Referential Patterns to Emotional Normative Ratings

Authors: Christina Volioti, Sotiris Manitsaris, Eleni Katsouli, Vasiliki Tsekouropoulou, Leontios J. Hadjileontiadis

Abstract:

The piano sonatas of Beethoven represent part of the Intangible Cultural Heritage. The aims of this research were to further explore this intangibility by placing emphasis on defining emotional normative ratings for the “Waldstein” (Op. 53) and “Tempest” (Op. 31) Sonatas of Beethoven. To this end, a musicological analysis was conducted on these particular sonatas and referential patterns in these works of Beethoven were defined. Appropriate interactive questionnaires were designed in order to create a statistical normative rating that describes the emotional status when an individual listens to these musical excerpts. Based on these ratings, it is possible for emotional annotations for these same referential patterns to be created and integrated into the music score.

Keywords: emotional annotations, intangible cultural heritage, musicological analysis, normative ratings

Procedia PDF Downloads 147
2897 Time Efficient Color Coding for Structured-Light 3D Scanner

Authors: Po-Hao Huang, Pei-Ju Chiang

Abstract:

The structured light 3D scanner is commonly used for measuring the 3D shape of an object. Through projecting designed light patterns on the object, deformed patterns can be obtained and used for the geometric shape reconstruction. At present, Gray code is the most reliable and commonly used light pattern in the structured light 3D scanner. However, the trade-off between scanning efficiency and accuracy is a long-standing and challenging problem. The design of light patterns plays a significant role in the scanning efficiency and accuracy. Thereby, we proposed a novel encoding method integrating color information and Gray-code to improve the scanning efficiency. We will demonstrate that with the proposed method, the scanning time can be reduced to approximate half of the one needed by Gray-code without reduction of precision.

Keywords: gray-code, structured light scanner, 3D shape acquisition, 3D reconstruction

Procedia PDF Downloads 430
2896 Applying Business Model Patterns: A Case Study in Latin American Building Industry

Authors: James Alberto Ortega Morales, Nelson Andrés Martínez Marín

Abstract:

The bulding industry is one of the most important sectors all around the world in terms of contribution to index like GDP and labor. On the other hand, it is a major contributor to Greenhouse Gases (GHG) and waste generation contributing to global warming. In this sense, it is necessary to establish sustainable practices both from the strategic point of view to the operations point of view as well in all business and industries. Business models don’t scape to this reality attending it´s mediator role between strategy and operations. Business models can turn from the traditional practices searching economic benefits to sustainable bussines models that generate both economic value and value for society and the environment. Recent advances in the analysis of sustainable business models find different classifications that allow finding potential triple bottom line (economic, social and environmental) solutions applicable in every business sector. Into the metioned Advances have been identified, 11 groups and 45 patterns of sustainable business models have been identified; such patterns can be found either in the business models as a whole or found concurrently in their components. This article presents the analysis of a case study, seeking to identify the components and elements that are part of it, using the ECO CANVAS conceptual model. The case study allows showing the concurrent existence of different patterns of business models for sustainability empirically, serving as an example and inspiration for other Latin American companies interested in integrating sustainability into their new and existing business models.

Keywords: sustainable business models, business sustainability, business model patterns, case study, construction industry

Procedia PDF Downloads 82
2895 Evaluation and Analysis of the Secure E-Voting Authentication Preparation Scheme

Authors: Nidal F. Shilbayeh, Reem A. Al-Saidi, Ahmed H. Alsswey

Abstract:

In this paper, we presented an evaluation and analysis of E-Voting Authentication Preparation Scheme (EV-APS). EV-APS applies some modified security aspects that enhance the security measures and adds a strong wall of protection, confidentiality, non-repudiation and authentication requirements. Some of these modified security aspects are Kerberos authentication protocol, PVID scheme, responder certificate validation, and the converted Ferguson e-cash protocol. Authentication and privacy requirements have been evaluated and proved. Authentication guaranteed only eligible and authorized voters were permitted to vote. Also, the privacy guaranteed that all votes will be kept secret. Evaluation and analysis of some of these security requirements have been given. These modified aspects will help in filtering the counter buffer from unauthorized votes by ensuring that only authorized voters are permitted to vote.

Keywords: e-voting preparation stage, blind signature protocol, Nonce based authentication scheme, Kerberos Authentication Protocol, pseudo voter identity scheme PVID

Procedia PDF Downloads 267