Search results for: secret message
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 456

Search results for: secret message

276 Teaching the Binary System via Beautiful Facts from the Real Life

Authors: Salem Ben Said

Abstract:

In recent times the decimal number system to which we are accustomed has received serious competition from the binary number system. In this note, an approach is suggested to teaching and learning the binary number system using examples from the real world. More precisely, we will demonstrate the utility of the binary system in describing the optimal strategy to win the Chinese Nim game, and in telegraphy by decoding the hidden message on Perseverance’s Mars parachute written in the language of binary system. Finally, we will answer the question, “why do modern computers prefer the ternary number system instead of the binary system?”. All materials are provided in a format that is conductive to classroom presentation and discussion.

Keywords: binary number system, Nim game, telegraphy, computers prefer the ternary system

Procedia PDF Downloads 149
275 Efficient Signcryption Scheme with Provable Security for Smart Card

Authors: Jayaprakash Kar, Daniyal M. Alghazzawi

Abstract:

The article proposes a novel construction of signcryption scheme with provable security which is most suited to implement on smart card. It is secure in random oracle model and the security relies on Decisional Bilinear Diffie-Hellmann Problem. The proposed scheme is secure against adaptive chosen ciphertext attack (indistiguishbility) and adaptive chosen message attack (unforgebility). Also, it is inspired by zero-knowledge proof. The two most important security goals for smart card are Confidentiality and authenticity. These functions are performed in one logical step in low computational cost.

Keywords: random oracle, provable security, unforgebility, smart card

Procedia PDF Downloads 566
274 E-learning: An Effective Approach for Enhancing Social and Behavior Change Communication Capacity in Bangladesh

Authors: Mohammad K. Abedin, Mohammad Shahjahan, Zeenat Sultana, Tawfique Jahan, Jesmin Akter

Abstract:

To strengthen social and behavior change communication (SBCC) capacity of Ministry of Health and Family Welfare (MoHFW) of the Government of Bangladesh, BCCP/BKMI developed two eLearning courses providing opportunities for professional development of SBCC Program Managers who have no access to training or refreshers training. The two eLearning courses – Message and Material Development (MMD) and Monitoring and Evaluation (MandE) of SBCC programs – went online in September 2015, where all users could register their participation so results could be monitored. Methodology: To assess the uses of these courses a randomly selected sample was collected to run a pre and post-test analyses and a phone survey were conducted. Systematic random sampling was used to select a sample of 75 MandE and 25 MMD course participants from a sampling frame of 179 and 51 respectively. Results: As of September 2016, more than 179 learners have completed the MandE course, and 49 learners have completed the MMD course. The users of these courses are program managers, university faculty members, and students. Encouraging results were revealed from the analysis of pre and post-test scores and a phone survey three months after course completion. Test scores suggested a substantial increase in knowledge. The pre-test scores findings suggested that about 19% learners scored high on the MandE. The post-test scores finding indicated a high score (92%) of the sample across 4 modules of MandE. For MMD course in pre-test scoring, 30% of the learners scored high, and 100% scored high at the post-test. It was found that all the learners in the phone survey have discussed the courses. Most of the sharing occurred with colleagues and friends, usually through face to face (70%) interaction. The learners reported that they did recommend the two courses to concerned people. About 67% MandE and 76% MMD learners stated that the concepts that they had to learn during the course were put into practice in their work settings. The respondents for both MandE and MMD courses have provided a valuable set of suggestions that would further strengthen the courses. Conclusions: The study showed that the initiative offered ample opportunities to build capacity in various ways in which the eLearning courses were used. It also highlighted the importance of scaling up these efforts to further strengthen the outcomes.

Keywords: e-learning course, message & material development, monitoring & evaluation, social and behavior change communication

Procedia PDF Downloads 266
273 Evaluation and Analysis of the Secure E-Voting Authentication Preparation Scheme

Authors: Nidal F. Shilbayeh, Reem A. Al-Saidi, Ahmed H. Alsswey

Abstract:

In this paper, we presented an evaluation and analysis of E-Voting Authentication Preparation Scheme (EV-APS). EV-APS applies some modified security aspects that enhance the security measures and adds a strong wall of protection, confidentiality, non-repudiation and authentication requirements. Some of these modified security aspects are Kerberos authentication protocol, PVID scheme, responder certificate validation, and the converted Ferguson e-cash protocol. Authentication and privacy requirements have been evaluated and proved. Authentication guaranteed only eligible and authorized voters were permitted to vote. Also, the privacy guaranteed that all votes will be kept secret. Evaluation and analysis of some of these security requirements have been given. These modified aspects will help in filtering the counter buffer from unauthorized votes by ensuring that only authorized voters are permitted to vote.

Keywords: e-voting preparation stage, blind signature protocol, Nonce based authentication scheme, Kerberos Authentication Protocol, pseudo voter identity scheme PVID

Procedia PDF Downloads 265
272 A NoSQL Based Approach for Real-Time Managing of Robotics's Data

Authors: Gueidi Afef, Gharsellaoui Hamza, Ben Ahmed Samir

Abstract:

This paper deals with the secret of the continual progression data that new data management solutions have been emerged: The NoSQL databases. They crossed several areas like personalization, profile management, big data in real-time, content management, catalog, view of customers, mobile applications, internet of things, digital communication and fraud detection. Nowadays, these database management systems are increasing. These systems store data very well and with the trend of big data, a new challenge’s store demands new structures and methods for managing enterprise data. The new intelligent machine in the e-learning sector, thrives on more data, so smart machines can learn more and faster. The robotics are our use case to focus on our test. The implementation of NoSQL for Robotics wrestle all the data they acquire into usable form because with the ordinary type of robotics; we are facing very big limits to manage and find the exact information in real-time. Our original proposed approach was demonstrated by experimental studies and running example used as a use case.

Keywords: NoSQL databases, database management systems, robotics, big data

Procedia PDF Downloads 318
271 Markov-Chain-Based Optimal Filtering and Smoothing

Authors: Garry A. Einicke, Langford B. White

Abstract:

This paper describes an optimum filter and smoother for recovering a Markov process message from noisy measurements. The developments follow from an equivalence between a state space model and a hidden Markov chain. The ensuing filter and smoother employ transition probability matrices and approximate probability distribution vectors. The properties of the optimum solutions are retained, namely, the estimates are unbiased and minimize the variance of the output estimation error, provided that the assumed parameter set are correct. Methods for estimating unknown parameters from noisy measurements are discussed. Signal recovery examples are described in which performance benefits are demonstrated at an increased calculation cost.

Keywords: optimal filtering, smoothing, Markov chains

Procedia PDF Downloads 292
270 Political Manipulation in Global Discourse

Authors: Gohar Madoyan, Kristine Harutyunyan, Gevorg Barseghyan

Abstract:

It is common knowledge that linguistic manipulation is and has always been a powerful instrument of political discourse. Politicians from different countries and through centuries have successfully used linguistic means to persuade the public. Yet, this persuasion should be linguistically unobtrusive. Small changes in wording may result in a huge difference in perception by the audience. Thus, manipulation is a strategy that is mostly used to convey a certain message to the manipulators, who should be aware of the vulnerabilities of their audience and who must use them to achieve control. Political manipulation, though commonly observed in the 21st century, can easily be traced back to ancient rhetoric, which warns us to choose words carefully while addressing the audience. On the other hand, modern manipulative techniques have become more sophisticated, making use of all scientific advances.

Keywords: manipulators, politics, persuasion, political discourse, linguo-stylistic analysis, rhetoric

Procedia PDF Downloads 43
269 Educating through Design: Eco-Architecture as a Form of Public Awareness

Authors: Carmela Cucuzzella, Jean-Pierre Chupin

Abstract:

Eco-architecture today is being assessed and judged increasingly on the basis of its environmental performance and its dedication to urgent stakes of sustainability. Architects have responded to environmental imperatives in novel ways since the 1960s. In the last two decades, however, different forms of eco-architecture practices have emerged that seem to be as dedicated to the issues of sustainability, as to their ability to 'communicate' their ecological features. The hypothesis is that some contemporary eco-architecture has been developing a characteristic 'explanatory discourse', of which it is possible to identify in buildings around the world. Some eco-architecture practices do not simply demonstrate their alignment with pressing ecological issues, rather, these buildings seem to be also driven by the urgent need to explain their ‘greenness’. The design aims specifically to teach visitors of the eco-qualities. These types of architectural practices are referred to in this paper as eco-didactic. The aim of this paper is to identify and assess this distinctive form of environmental architecture practice that aims to teach. These buildings constitute an entirely new form of design practice that places eco-messages squarely in the public realm. These eco-messages appear to have a variety of purposes: (i) to raise awareness of unsustainable quotidian habits, (ii) to become means of behavioral change, (iii) to publicly announce their responsibility through the designed eco-features, or (iv) to engage the patrons of the building into some form of sustainable interaction. To do this, a comprehensive review of Canadian eco-architecture is conducted since 1998. Their potential eco-didactic aspects are analysed through a lens of three vectors: (1) cognitive visitor experience: between the desire to inform and the poetics of form (are parts of the design dedicated to inform the visitors of the environmental aspects?); (2) formal architectural qualities: between the visibility and the invisibility of environmental features (are these eco-features clearly visible by the visitors?); and (3) communicative method for delivering eco-message: this transmission of knowledge is accomplished somewhere between consensus and dissensus as a method for disseminating the eco-message (do visitors question the eco-features or are they accepted by visitors as features that are environmental?). These architectural forms distinguish themselves in their crossing of disciplines, specifically, architecture, environmental design, and art. They also differ from other architectural practices in terms of how they aim to mobilize different publics within various urban landscapes The diversity of such buildings, from how and what they aim to communicate, to the audience they wish to engage, are all key parameters to better understand their means of knowledge transfer. Cases from the major cities across Canada are analysed, aiming to illustrate this increasing worldwide phenomenon.

Keywords: eco-architecture, public awareness, community engagement, didacticism, communication

Procedia PDF Downloads 92
268 Performance Analysis of Ad-Hoc Network Routing Protocols

Authors: I. Baddari, A. Riahla, M. Mezghich

Abstract:

Today in the literature, we discover a lot of routing algorithms which some have been the subject of normalization. Two great classes Routing algorithms are defined, the first is the class reactive algorithms and the second that of algorithms proactive. The aim of this work is to make a comparative study between some routing algorithms. Two comparisons are considered. The first will focus on the protocols of the same class and second class on algorithms of different classes (one reactive and the other proactive). Since they are not based on analytical models, the exact evaluation of some aspects of these protocols is challenging. Simulations have to be done in order to study their performances. Our simulation is performed in NS2 (Network Simulator 2). It identified a classification of the different routing algorithms studied in a metrics such as loss of message, the time transmission, mobility, etc.

Keywords: ad-hoc network routing protocol, simulation, NS2, delay, packet loss, wideband, mobility

Procedia PDF Downloads 354
267 Method Comprising One to One Web Based Real Time Communications

Authors: Lata Kiran Dey, Rajendra Kumar, Biren Karmakar

Abstract:

Web Real Time Communications is a collection of standards, protocols, which provides real-time communications capabilities between web browsers and devices. This paper outlines the design and further implementation of web real-time communications on secure web applications having audio and video call capabilities. This proposed application may put up a system that will be able to work over both desktops as well as the mobile browser. Though, WebRTC also gives a set of JavaScript standard RTC APIs, which primarily works over the real-time communication framework. This helps to build a suitable communication application, which enables the audio, video, and message transfer in between the today’s modern browsers having WebRTC support.

Keywords: WebRTC, SIP, RTC, JavaScript, SRTP, secure web sockets, browser

Procedia PDF Downloads 104
266 Holistic Approach for Natural Results in Facial Aesthetics

Authors: R. Denkova

Abstract:

Nowadays, aesthetic and psychological researches in some countries show that the aesthetic ideal for women is built by the same pattern of big volumes – lips, cheek, facial disproportions. They all look like made of a matrix. And they lose their unique and emotional aspects of beauty. How to escape this matrix and find the balance? The secret to being a unique injector is good assessment, creating a treatment plan and flawless injection strategy. The newest concepts in this new injection era which meet the requirements of a modern society and deliver balanced and natural looking results are based on the concept of injecting not the consequence, but the reason. Three case studies are presented with full face assessment, treatment plan and before/after pictures. Using different approaches and techniques of the MD codes concept, lights and shadows concept in order to preserve the emotional beauty and identity of the women. In conclusion, the cases demonstrate that beauty exists even beyond the matrix and it is the injector’s mission and responsibility is to preserve and highlight the natural beauty and unique identity of every different patient.

Keywords: beyond the matrix, emotional beauty, face assessment, injector, treatment plan

Procedia PDF Downloads 97
265 Constructing White-Box Implementations Based on Threshold Shares and Composite Fields

Authors: Tingting Lin, Manfred von Willich, Dafu Lou, Phil Eisen

Abstract:

A white-box implementation of a cryptographic algorithm is a software implementation intended to resist extraction of the secret key by an adversary. To date, most of the white-box techniques are used to protect block cipher implementations. However, a large proportion of the white-box implementations are proven to be vulnerable to affine equivalence attacks and other algebraic attacks, as well as differential computation analysis (DCA). In this paper, we identify a class of block ciphers for which we propose a method of constructing white-box implementations. Our method is based on threshold implementations and operations in composite fields. The resulting implementations consist of lookup tables and few exclusive OR operations. All intermediate values (inputs and outputs of the lookup tables) are masked. The threshold implementation makes the distribution of the masked values uniform and independent of the original inputs, and the operations in composite fields reduce the size of the lookup tables. The white-box implementations can provide resistance against algebraic attacks and DCA-like attacks.

Keywords: white-box, block cipher, composite field, threshold implementation

Procedia PDF Downloads 126
264 An Authentication Protocol for Quantum Enabled Mobile Devices

Authors: Natarajan Venkatachalam, Subrahmanya V. R. K. Rao, Vijay Karthikeyan Dhandapani, Swaminathan Saravanavel

Abstract:

The quantum communication technology is an evolving design which connects multiple quantum enabled devices to internet for secret communication or sensitive information exchange. In future, the number of these compact quantum enabled devices will increase immensely making them an integral part of present communication systems. Therefore, safety and security of such devices is also a major concern for us. To ensure the customer sensitive information will not be eavesdropped or deciphered, we need a strong authentications and encryption mechanism. In this paper, we propose a mutual authentication scheme between these smart quantum devices and server based on the secure exchange of information through quantum channel which gives better solutions for symmetric key exchange issues. An important part of this work is to propose a secure mutual authentication protocol over the quantum channel. We show that our approach offers robust authentication protocol and further our solution is lightweight, scalable, cost-effective with optimized computational processing overheads.

Keywords: quantum cryptography, quantum key distribution, wireless quantum communication, authentication protocol, quantum enabled device, trusted third party

Procedia PDF Downloads 137
263 The Magnitude Scale Evaluation of Cross-Platform Internet Public Opinion

Authors: Yi Wang, Xun Liang

Abstract:

This paper introduces a model of internet public opinion waves, which describes the message propagation and measures the influence of a detected event. We collect data on public opinion propagation from different platforms on the internet, including micro-blogs and news. Then, we compare the spread of public opinion to the seismic waves and correspondently define the P-wave and S-wave and other essential attributes and characteristics in the process. Further, a model is established to evaluate the magnitude scale of the events. In the end, a practical example is used to analyze the influence of network public opinion and test the reasonability and effectiveness of the proposed model.

Keywords: internet public opinion waves (IPOW), magnitude scale, cross-platform, information propagation

Procedia PDF Downloads 255
262 Code Switching: A Case Study Of Lebanon

Authors: Wassim Bekai

Abstract:

Code switching, as its name states, is altering between two or more languages in one sentence. The speaker tends to use code switching in his/her speech for better clarification of his/her message to the receiver. It is commonly used in sociocultural countries such as Lebanon because of the various cultures that have come across its lands through history, considering Lebanon is geographically located in the heart of the world, and hence between many cultures and languages. In addition, Lebanon was occupied by Turkish authorities for about 400 years, and later on by the French mandate, where both of these countries forced their languages in official papers and in the Lebanese educational system. In this paper, the importance of code switching in the Lebanese workplace will be examined, stressing the efficiency and amount of the production resulting from code switching in the workplace (factories, universities among other places) in addition to exploring the social, education, religious and cultural factors behind this phenomenon in Lebanon.

Keywords: code switching, Lebanon, cultural, factors

Procedia PDF Downloads 245
261 Active Treatment of Water Chemistry for Swimming Pools Using Novel Automated System (NAS)

Authors: Saeed Asiri

Abstract:

The Novel Automated System (NAS) has the control system of the level of chlorine and acid (i.e. pH level) through a feedback in three forms of synchronous alerts. The feedback is in the form of an alert voice, a visible color, and a message on a digital screen. In addition, NAS contains a slide-in container in which chemicals are used to treat the problems of chlorine and acid levels independently. Moreover, NAS has a net in front of it to clean the pool on the surface of the water from leaves and wastes and so on which is controlled through a remote control. The material used is a lightweight aluminum with mechanical and electric parts integrated with each other. In fact, NAS is qualified to serve as an assistant security guard for swimming pools because it has the characteristics that make it unique and smart.

Keywords: novel automated system, pool safety, maintenance, pH level, digital screen

Procedia PDF Downloads 40
260 Use of Indian Food Mascot Design as an Advertising Tool in Maintaining and Growing the Brand Name

Authors: Preeti Yadav, Dandeswar Bisoyi, Debkumar Chakrabarti

Abstract:

Mascots provide memories to viewers, and numerous promotional campaigns with different appearances, continue to trigger viewers and capture their interest. This study investigates the effect of Indian food mascot designs and influence on enhancing communication; thereby, building long-term brand recognition by the consumers. This paper presents a descriptive approach to Indian food mascot design as an advertising tool, and its research adopts a quantitative methodology. The study confirms that mascots have an ability to communicate a message in an effective manner; all though they are simple in terms of design and fashion trend, they have the capability to build positive reactions.

Keywords: food mascot, brand recognitions, advertising, humour

Procedia PDF Downloads 150
259 Applying Tourist Gaze in Structuring of Global Tourism in Solo City

Authors: Eko Nursanty, Joesron Alie Syahbana, Atik Suprapti

Abstract:

Tourist gaze is a set of experiences that experienced by a tourist in attempt to familiarize himself with the certain local tourism site’s condition. It is started from looking for information prior arriving at the location, then during the visit and gaining unique experience with the local inhabitant, and then experiencing the ingenuity of the location, finally to bring impression that keeps on attaching despite leaving from it. This research attempted to grab the message of tourist gaze in the process of structuring which is conducted in the global tourism in the cities in Indonesia, particularly Solo as the study case of the research. The method employed is the field observation of qualitative research. The expected result is to relate the tourist gaze theory with the development of ongoing global tourism.

Keywords: tourist gaze, tourism, city branding, Solo

Procedia PDF Downloads 498
258 The Markers -mm and dämmo in Amharic: Developmental Approach

Authors: Hayat Omar

Abstract:

Languages provide speakers with a wide range of linguistic units to organize and deliver information. There are several ways to verbally express the mental representations of events. According to the linguistic tools they have acquired, speakers select the one that brings out the most communicative effect to convey their message. Our study focuses on two markers, -mm and dämmo, in Amharic (Ethiopian Semitic language). Our aim is to examine, from a developmental perspective, how they are used by speakers. We seek to distinguish the communicative and pragmatic functions indicated by means of these markers. To do so, we created a corpus of sixty narrative productions of children from 5-6, 7-8 to 10-12 years old and adult Amharic speakers. The experimental material we used to collect our data is a series of pictures without text 'Frog, Where are you?'. Although -mm and dämmo are each used in specific contexts, they are sometimes analyzed as being interchangeable. The suffix -mm is complex and multifunctional. It marks the end of the negative verbal structure, it is found in the relative structure of the imperfect, it creates new words such as adverbials or pronouns, it also serves to coordinate words, sentences and to mark the link between macro-propositions within a larger textual unit. -mm was analyzed as marker of insistence, topic shift marker, element of concatenation, contrastive focus marker, 'bisyndetic' coordinator. On the other hand, dämmo has limited function and did not attract the attention of many authors. The only approach we could find analyzes it in terms of 'monosyndetic' coordinator. The paralleling of these two elements made it possible to understand their distinctive functions and refine their description. When it comes to marking a referent, the choice of -mm or dämmo is not neutral, depending on whether the tagged argument is newly introduced, maintained, promoted or reintroduced. The presence of these morphemes explains the inter-phrastic link. The information is seized by anaphora or presupposition: -mm goes upstream while dämmo arrows downstream, the latter requires new information. The speaker uses -mm or dämmo according to what he assumes to be known to his interlocutors. The results show that -mm and dämmo, although all the speakers use them both, do not always have the same scope according to the speaker and vary according to the age. dämmo is mainly used to mark a contrastive topic to signal the concomitance of events. It is more commonly used in young children’s narratives (F(3,56) = 3,82, p < .01). Some values of -mm (additive) are acquired very early while others are rather late and increase with age (F(3,56) = 3,2, p < .03). The difficulty is due not only because of its synthetic structure but primarily because it is multi-purpose and requires a memory work. It highlights the constituent on which it operates to clarify how the message should be interpreted.

Keywords: acquisition, cohesion, connection, contrastive topic, contrastive focus, discourse marker, pragmatics

Procedia PDF Downloads 105
257 Bioarm, a Prothesis without Surgery

Authors: J. Sagouis, A. Chamel, E. Carre, C. Casasreales, G. Rudnik, M. Cerdan

Abstract:

Robotics provides answers to amputees. The most expensive solutions surgically connect the prosthesis to nerve endings. There are also several types of non-invasive technologies that recover nerve messages passing through the muscles. After analyzing these messages, myoelectric prostheses perform the desired movement. The main goal is to avoid all surgeries, which can be heavy and offer cheaper alternatives. For an amputee, we use valid muscles to recover the electrical signal involved in a muscle movement. EMG sensors placed on the muscle allows us to measure a potential difference, which our program transforms into control for a robotic arm with two degrees of freedom. We have shown the feasibility of non-invasive prostheses with two degrees of freedom. Signal analysis and an increase in degrees of freedom is still being improved.

Keywords: prosthesis, electromyography (EMG), robotic arm, nerve message

Procedia PDF Downloads 225
256 The Book of Lies: The Christian Bible's Colonialism over and Appropriation of Occultism

Authors: Samantha Huff

Abstract:

This research seeks to examine the relationship between occultism and the traditional religion of Christianity. The focus of this particular project is to deconstruct occultism and occult religion: how it develops, where it is applied, how and when it is applied. The next step is to make connections between the structure of occultism and the structure of Christianity. Do Christianity and the Occult appear, textually, the same way? What does that mean culturally? This project seeks to examine the historical similarities of occultism and Christianity practices and tradition, and how, as a whole, Christianity appropriates and colonializes occultism through examination into the Christian Bible and popular occult texts: The Book of the Law by Aleister Crowley and The Secret Doctrine: The Synthesis of Science, Religion, and Philosophy by Helena Petrovna Blavatsky. Through examining occultism and Christianity and applying it to popular cultural theories (Ritual Space by Nick Couldry, Muted Group Theory by Shirley Ardener, and Mythologies by Roland Barethes), it is entirely possible to see how Christianity appropriates occultism and uses their stronghold on society as a means to colonialize occult traditions and practices.

Keywords: appropriation, Christianity, colonialism, cultural theory, muted group theory, mythologies, occultism, ritual space

Procedia PDF Downloads 128
255 From the “Movement Language” to Communication Language

Authors: Mahmudjon Kuchkarov, Marufjon Kuchkarov

Abstract:

The origin of ‘Human Language’ is still a secret and the most interesting subject of historical linguistics. The core element is the nature of labeling or coding the things or processes with symbols and sounds. In this paper, we investigate human’s involuntary Paired Sounds and Shape Production (PSSP) and its contribution to the development of early human communication. Aimed at twenty-six volunteers who provided many physical movements with various difficulties, the research team investigated the natural, repeatable, and paired sounds and shape productions during human activities. The paper claims the involvement of Paired Sounds and Shape Production (PSSP) in the phonetic origin of some modern words and the existence of similarities between elements of PSSP with characters of the classic Latin alphabet. The results may be used not only as a supporting idea for existing theories but to create a closer look at some fundamental nature of the origin of the languages as well.

Keywords: body shape, body language, coding, Latin alphabet, merging method, movement language, movement sound, natural sound, origin of language, pairing, phonetics, sound and shape production, word origin, word semantic

Procedia PDF Downloads 155
254 Increasing The Role of Civil Society through LAPOR!: National Complaint Handling System in Indonesia

Authors: Izzati Nabiyla Risfa

Abstract:

The role of civil society has become an important issue in national and international level nowadays. Government all over the world started to realize that the involvement of civil society can boost up public services and better policy making. Global Policy Forum stated that there are five good reasons for civil society to be engaged in global governance; (1) to conferring legitimacy on policy decisions; (2) to increasing the pool of policy ideas; (3) to support less powerful governments; (4) countering a lack of political will; and (5) helping states to put nationalism aside. Indonesia also keeps up with this good trend. In November 2011, Indonesian Government set up LAPOR! (means “to report” in Indonesian), an online portal for complaints about public services, which is accessible through its website lapor.ukp.go.id. LAPOR! also accessible through social media (Twitter, Facebook) and text message. This program is an initiative from the government to provide an integrated and accessible portal for the Indonesian public to submit complaints and inquiries as a means of enhancing public participation in national development programs. LAPOR! aims to catalyze public participation as well as to have a more coordinated national complaint handling mechanism. The goal of this program is to increase the role of civil society in order to develop better public services. Thus, LAPOR! works in a simplest way possible. Public can submit any complaints or report their problem concerning development programs and public services simply through the website, short message services to 1708 and mobile applications for BlackBerry and Android. LAPOR! will then transfer every validated input to relevant institutions to be featured and responded on the website. LAPOR! is now integrated with 81 Ministries, 5 local government, and 44 State Owned Enterprise. Public can also give comments, likes or share them through Facebook and Twitter to have a discussion and to ensure the completeness of the reports. LAPOR! has unexpectedly contributed to various successful cases concerning public services. So far the portal has over 280,704 registered users, receiving an average of 1,000 reports every day. Government's response rate increase time to time, with 81% of complaints and inquiries have been solved or are being investigated. This paper will examine the effectiveness of LAPOR! as a tools to increase the role of civil society in order to develop better public services in Indonesia. Beside their promising story, there still are various difficulties that need to be solved. With qualitative approach as methodology for this research, writers will also explore potential improvement of LAPOR! so it can perform effectively as a leading national complaint handling system in Indonesia.

Keywords: civil society, government, Indonesia, public services

Procedia PDF Downloads 446
253 Science Explorer Modules as a Communication Approach to Encourage High School Students to Pursue Science Careers

Authors: Mark Ivan Roblas

Abstract:

The Science Explorer is a mobile learning science facility in the Philippines. It is a bus that travels to different provinces in the country bringing interactive science modules facilitated by scientists from the industry and academe. The project aims to entice students to get into careers in science through interactive science modules and interaction with real-life scientists. This article looks into the effectiveness of its modules as a communication source and message to encourage high school students to get into careers in the future. The study revealed that as the Science Explorer modules are able to retain students to stay in science careers of their choice and even convert some to choose from non-science to a science degree, it still lacks in penetrating the belief system of the students and influencing them to take a scientific career path.

Keywords: informal science, mobile science, science careers, science education

Procedia PDF Downloads 186
252 Examining How the Institutional Policies Affect LGBT Residents Living in Long-Term Care

Authors: Peter Brink

Abstract:

Much of the research examining sexuality in long-term care focus on individual experiences, specifically their past, present, and future lived experiences. We know little about long-term care home policies, how they relate to the LGBT community, or how accommodating long-term care homes are to the LGBT+ community. In many ways, residents who identify as LGBT+ have been invisible in long-term care homes. Up until the not-to-distant past, homosexuality was illegal, and discrimination was acceptable. Canada’s LGBT population has also suffered because of the HIV/AIDS epidemic. For these and other reasons, members of the LGBT community might resist entering long-term care or attempt to keep their sexuality secret. The goal of any long-term care home is to be a welcoming place, to display signs of inclusion, and to help residents and staff feel that they are embraced. From the perspective of the long-term care home, it is possible that many of these facilities do not necessarily see the need to mention gender identity or sexual orientation in their welcoming materials. However, from the perspective of the invisible minority, it may be important that these homes be more than just welcoming. This study examined the role of institutional policies in long-term care for residents who identify as LGBT.

Keywords: long-term care, LGBT, HIV/AIDS, policy

Procedia PDF Downloads 81
251 Palace Diplomacy: The Means and the End to the Chinese Control of African Economy

Authors: Toyin Cotties Adetiba

Abstract:

Notably, China is a major global economy, thus increasing debate parlance of foreign policy that sees China as a superpower. China’s investment in Africa is visibly seen in African markets with substantial involvement of its multinationals in key commercial sectors such as infrastructure, telecoms, and agriculture. Not minding its positive economic impact on Africa, the debate around the China-African relationship has continued to be filled with some sort of inconsistency and ambiguity. This work engaged a qualitative research method while answering the question of whether the socioeconomic marriage of convenience between African states and China, is a means and the end to the Chinese control of African economy? Can China-Africa’s relationship engender Africa’s economic development or is it a threat to Africa’s development? The paper argued that through the secret dealings of the Chinese companies with African leaders, couched as palace diplomacy, the Chinese have cornered African economy. Concluding that there is need for the reform of the approaches to curtailing socio-economic and political corruption in Africa in the form of applications of ideas molded and refined to transparency in dealing with the Chinese, while economic institutions in African is empowered to effectively fight corruption.

Keywords: Africans, corruption, diplomacy, companies, development

Procedia PDF Downloads 120
250 Price Control: A Comprehensive Step to Control Corruption in the Society

Authors: Muhammad Zia Ullah Baig, Atiq Uz Zama

Abstract:

The motivation of the project is to facilitate the governance body, as well as the common man in his/her daily life consuming product rates, to easily monitor the expense, to control the budget with the help of single SMS (message), e-mail facility, and to manage governance body by task management system. The system will also be capable of finding irregularities being done by the concerned department in mitigating the complaints generated by the customer and also provide a solution to overcome problems. We are building a system that easily controls the price control system of any country, we will feeling proud to give this system free of cost to Indian Government also. The system is able to easily manage and control the price control department of government all over the country. Price control department run in different cities under City District Government, so the system easily run in different cities with different SMS Code and decentralize Database ensure the non-functional requirement of system (scalability, reliability, availability, security, safety). The customer request for the government official price list with respect to his/her city SMS code (price list of all city available on website or application), the server will forward the price list through a SMS, if the product is not available according to the price list the customer generate a complaint through an SMS or using website/smartphone application, complaint is registered in complaint database and forward to inspection department when the complaint is entertained, the inspection department will forward a message about the complaint to customer. Inspection department physically checks the seller who does not follow the price list, but the major issue of the system is corruption, may be inspection officer will take a bribe and resolve the complaint (complaint is fake) in that case the customer will not use the system. The major issue of the system is to distinguish the fake and real complain and fight for corruption in the department. To counter the corruption, our strategy is to rank the complain if the same type of complaint is generated the complaint is in high rank and the higher authority will also notify about that complain, now the higher authority of department have reviewed the complaint and its history, the officer who resolve that complaint in past and the action against the complaint, these data will help in decision-making process, if the complaint was resolved because the officer takes bribe, the higher authority will take action against that officer. When the price of any good is decided the market/former representative is also there, with the mutual understanding of both party the price is decided, the system facilitate the decision-making process. The system shows the price history of any goods, inflation rate, available supply, demand, and the gap between supply and demand, these data will help to allot for the decision-making process.

Keywords: price control, goods, government, inspection, department, customer, employees

Procedia PDF Downloads 384
249 Reclaiming the House with Use of Web 2.0 Tools: Democratic Candidates and Social Media during Midterm Elections in 2018

Authors: Norbert Tomaszewski

Abstract:

Modern politicians tend to resign from the traditional media as Web 2.0 tools allow them to interact with a much bigger audience while spending less money on their campaign. Current studies on this subject prove that in order to win the elections, the candidate needs to show his personal side during the campaign to appeal to the voter as an average citizen. Because of that, the internet user may engage in the politician's campaign by spreading his message along with his followers. The aim of the study is to determine how did the Democratic candidates use the Web 2.0 tools during the 2018 midterm elections campaign and whether they managed to succeed. Taking into consideration the fact that the United States as a country, has always set important milestones for the political marketing as a field of science, the result of the research can set some examples on how to manage the modern internet campaign in less developed countries.

Keywords: political campaign, midterm elections, social media, Web 2.0

Procedia PDF Downloads 124
248 Efficient Bargaining versus Right to Manage in the Era of Liberalization

Authors: Panagiota Koliousi, Natasha Miaouli

Abstract:

We compare product and labour market liberalization under the two trade union bargaining models: the Right-to-Manage (RTM) model and the Efficient Bargaining (EB) model. The vehicle is a dynamic general equilibrium (DGE) model that incorporates two types of agents (capitalists and workers), imperfectly competitive product and labour markets. The model is solved numerically employing common parameter values and data from the euro area. A key message is that product market deregulation is favourable under any labour market structure while opting for labour market deregulation one should provide special attention to the structure of the labour market such as the bargaining system of unions. If the prevailing way of bargaining is the RTM model then restructuring both markets is beneficial for all agents.

Keywords: market structure, structural reforms, trade unions, unemployment

Procedia PDF Downloads 176
247 Streaming Communication Component for Multi-Robots

Authors: George Oliveira, Luana D. Fronza, Luiza Medeiros, Patricia D. M. Plentz

Abstract:

The research presented in this article is part of a wide project that proposes a scheduling system for multi-robots in intelligent warehouses employing multi-robot path-planning (MPP) and multi-robot task allocation (MRTA) to reconcile multiple restrictions (task delivery time, task priorities, charging capacity, and robots battery capacity). We present the software component capable of interconnecting an open streaming processing architecture and robot operating system (ROS), ensuring communication and message exchange between robots and the environment in which they are inserted. Simulation results show the good performance of our proposed technique for connecting ROS and streaming platforms.

Keywords: complex distributed systems, mobile robots, smart warehouses, streaming platforms

Procedia PDF Downloads 147