Search results for: shared secret
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 1084

Search results for: shared secret

904 A NoSQL Based Approach for Real-Time Managing of Robotics's Data

Authors: Gueidi Afef, Gharsellaoui Hamza, Ben Ahmed Samir

Abstract:

This paper deals with the secret of the continual progression data that new data management solutions have been emerged: The NoSQL databases. They crossed several areas like personalization, profile management, big data in real-time, content management, catalog, view of customers, mobile applications, internet of things, digital communication and fraud detection. Nowadays, these database management systems are increasing. These systems store data very well and with the trend of big data, a new challenge’s store demands new structures and methods for managing enterprise data. The new intelligent machine in the e-learning sector, thrives on more data, so smart machines can learn more and faster. The robotics are our use case to focus on our test. The implementation of NoSQL for Robotics wrestle all the data they acquire into usable form because with the ordinary type of robotics; we are facing very big limits to manage and find the exact information in real-time. Our original proposed approach was demonstrated by experimental studies and running example used as a use case.

Keywords: NoSQL databases, database management systems, robotics, big data

Procedia PDF Downloads 318
903 Exploring the Effectiveness of End-Of-Life Patient Decision Add in the ICU

Authors: Ru-Yu Lien, Shih-Hsin Hung, Shu-Fen Lu, Ju-Jen Shie, Wen-Ju Yang, Yuann-Meei Tzeng, Chien-Ying Wang

Abstract:

Background: The quality of care in intensive care units (ICUs) is crucial, especially for terminally ill patients. Shared decision-making (SDM) with families is essential to ensure appropriate care and reduce suffering. Aim: This study explores the effectiveness of an end-of-life decision support Patient Decision Aid (PDA) in an ICU setting. Methods: This study employed a cross-sectional research design conducted in an ICU from August 2020 to June 2023. Participants included family members of end-of-life patients aged 20 or older. A total of 319 participants. Family members of end-of-life patients received the PDA, and data were collected after they made medical decisions. Data collection involved providing family members with a PDA during family meetings. A post-PDA questionnaire with 17 questions assessed PDA effectiveness and anxiety levels. Statistical analysis was performed using SPSS 22.0. Results: The PDA significantly reduced anxiety levels among family members (p < 0.001). It helped them organize their thoughts, prepare for discussions with doctors, and understand critical decision factors. Most importantly, it influenced decision outcomes, with a shift towards palliative care and withdrawal of life-sustaining treatment. Conclusion: This study highlights the importance of family-centered end-of-life care in ICUs. PDAs promote informed decision-making, reduce conflicts, and enhance patient and family involvement. These tools align patient values and goals with medical recommendations, ultimately leading to decisions that prioritize comfort and quality of life. Implementing PDAs in healthcare systems can ensure that patients' care aligns with their values.

Keywords: shared decision-making, patient decision aid, end-of-life care, intensive care unit, family-centered care

Procedia PDF Downloads 47
902 Choosing an Optimal Epsilon for Differentially Private Arrhythmia Analysis

Authors: Arin Ghazarian, Cyril Rakovski

Abstract:

Differential privacy has become the leading technique to protect the privacy of individuals in a database while allowing useful analysis to be done and the results to be shared. It puts a guarantee on the amount of privacy loss in the worst-case scenario. Differential privacy is not a toggle between full privacy and zero privacy. It controls the tradeoff between the accuracy of the results and the privacy loss using a single key parameter called

Keywords: arrhythmia, cardiology, differential privacy, ECG, epsilon, medi-cal data, privacy preserving analytics, statistical databases

Procedia PDF Downloads 122
901 Holistic Approach for Natural Results in Facial Aesthetics

Authors: R. Denkova

Abstract:

Nowadays, aesthetic and psychological researches in some countries show that the aesthetic ideal for women is built by the same pattern of big volumes – lips, cheek, facial disproportions. They all look like made of a matrix. And they lose their unique and emotional aspects of beauty. How to escape this matrix and find the balance? The secret to being a unique injector is good assessment, creating a treatment plan and flawless injection strategy. The newest concepts in this new injection era which meet the requirements of a modern society and deliver balanced and natural looking results are based on the concept of injecting not the consequence, but the reason. Three case studies are presented with full face assessment, treatment plan and before/after pictures. Using different approaches and techniques of the MD codes concept, lights and shadows concept in order to preserve the emotional beauty and identity of the women. In conclusion, the cases demonstrate that beauty exists even beyond the matrix and it is the injector’s mission and responsibility is to preserve and highlight the natural beauty and unique identity of every different patient.

Keywords: beyond the matrix, emotional beauty, face assessment, injector, treatment plan

Procedia PDF Downloads 97
900 Understanding Student Engagement through Sentiment Analytics of Response Times to Electronically Shared Feedback

Authors: Yaxin Bi, Peter Nicholl

Abstract:

The rapid advancement of Information and communication technologies (ICT) is extremely influencing every aspect of Higher Education. It has transformed traditional teaching, learning, assessment and feedback into a new era of Digital Education. This also introduces many challenges in capturing and understanding student engagement with their studies in Higher Education. The School of Computing at Ulster University has developed a Feedback And Notification (FAN) Online tool that has been used to send students links to personalized feedback on their submitted assessments and record students’ frequency of review of the shared feedback as well as the speed of collection. The feedback that the students initially receive is via a personal email directing them through to the feedback via a URL link that maps to the feedback created by the academic marker. This feedback is typically a Word or PDF report including comments and the final mark for the work submitted approximately three weeks before. When the student clicks on the link, the student’s personal feedback is viewable in the browser and they can view the contents. The FAN tool provides the academic marker with a report that includes when and how often a student viewed the feedback via the link. This paper presents an investigation into student engagement through analyzing the interaction timestamps and frequency of review by the student. We have proposed an approach to modeling interaction timestamps and use sentiment classification techniques to analyze the data collected over the last five years for a set of modules. The data studied is across a number of final years and second-year modules in the School of Computing. The paper presents the details of quantitative analysis methods and describes further their interactions with the feedback overtime on each module studied. We have projected the students into different groups of engagement based on sentiment analysis results and then provide a suggestion of early targeted intervention for the set of students seen to be under-performing via our proposed model.

Keywords: feedback, engagement, interaction modelling, sentiment analysis

Procedia PDF Downloads 69
899 Secure Network Coding against Content Pollution Attacks in Named Data Network

Authors: Tao Feng, Xiaomei Ma, Xian Guo, Jing Wang

Abstract:

Named Data Network (NDN) is one of the future Internet architecture, all nodes (i.e., hosts, routers) are allowed to have a local cache, used to satisfy incoming requests for content. However, depending on caching allows an adversary to perform attacks that are very effective and relatively easy to implement, such as content pollution attack. In this paper, we use a method of secure network coding based on homomorphic signature system to solve this problem. Firstly ,we use a dynamic public key technique, our scheme for each generation authentication without updating the initial secret key used. Secondly, employing the homomorphism of hash function, intermediate node and destination node verify the signature of the received message. In addition, when the network topology of NDN is simple and fixed, the code coefficients in our scheme are generated in a pseudorandom number generator in each node, so the distribution of the coefficients is also avoided. In short, our scheme not only can efficiently prevent against Intra/Inter-GPAs, but also can against the content poisoning attack in NDN.

Keywords: named data networking, content polloution attack, network coding signature, internet architecture

Procedia PDF Downloads 301
898 Constructing White-Box Implementations Based on Threshold Shares and Composite Fields

Authors: Tingting Lin, Manfred von Willich, Dafu Lou, Phil Eisen

Abstract:

A white-box implementation of a cryptographic algorithm is a software implementation intended to resist extraction of the secret key by an adversary. To date, most of the white-box techniques are used to protect block cipher implementations. However, a large proportion of the white-box implementations are proven to be vulnerable to affine equivalence attacks and other algebraic attacks, as well as differential computation analysis (DCA). In this paper, we identify a class of block ciphers for which we propose a method of constructing white-box implementations. Our method is based on threshold implementations and operations in composite fields. The resulting implementations consist of lookup tables and few exclusive OR operations. All intermediate values (inputs and outputs of the lookup tables) are masked. The threshold implementation makes the distribution of the masked values uniform and independent of the original inputs, and the operations in composite fields reduce the size of the lookup tables. The white-box implementations can provide resistance against algebraic attacks and DCA-like attacks.

Keywords: white-box, block cipher, composite field, threshold implementation

Procedia PDF Downloads 126
897 An Authentication Protocol for Quantum Enabled Mobile Devices

Authors: Natarajan Venkatachalam, Subrahmanya V. R. K. Rao, Vijay Karthikeyan Dhandapani, Swaminathan Saravanavel

Abstract:

The quantum communication technology is an evolving design which connects multiple quantum enabled devices to internet for secret communication or sensitive information exchange. In future, the number of these compact quantum enabled devices will increase immensely making them an integral part of present communication systems. Therefore, safety and security of such devices is also a major concern for us. To ensure the customer sensitive information will not be eavesdropped or deciphered, we need a strong authentications and encryption mechanism. In this paper, we propose a mutual authentication scheme between these smart quantum devices and server based on the secure exchange of information through quantum channel which gives better solutions for symmetric key exchange issues. An important part of this work is to propose a secure mutual authentication protocol over the quantum channel. We show that our approach offers robust authentication protocol and further our solution is lightweight, scalable, cost-effective with optimized computational processing overheads.

Keywords: quantum cryptography, quantum key distribution, wireless quantum communication, authentication protocol, quantum enabled device, trusted third party

Procedia PDF Downloads 137
896 Exploring Affordable Care Practs in Nigeria’s Health Insurance Discourse

Authors: Emmanuel Chinaguh, Kehinde Adeosun

Abstract:

Nigerians die untimely, with 55.75 years of life expectancy, which is 17.45 below the world average of 73.2 (Worldometer, 2020). This is due, among other factors, to the country's limited access to high-quality healthcare. To increase access to good and affordable healthcare services, the National Health Insurance Authority (NHIA) Bill 2022 – which repealed the National Health Insurance Scheme Act 2004 – was passed into law. Applying Jacob Mey’s (2001) pragmatics act (pract) theory, this study explores how NHIA seeks to actualise these healthcare goals by characterising the general situational prototype or pragmemes and pragmatic acts in institutional communications. Data was sourced from the NHIA operational guidelines, which has 147 pages and four sections, and shared posters on NHIA Nigeria Twitter Handle with 14,200 followers. Digital humanities tools, like AntConc and Voyant, were engaged in the data analysis for text encoding and data visualisation. This study identifies these discourse tokens in the data: advertisement and programmes, standards and accreditation, records and information, and offences and penalties. Advertisement and programmes pract facilitating, propagating, prospecting, advising and informing; standards and accreditation, and records and information pract stating, informing and instructing; and offences and penalties pract stating and sanctioning. These practs combined to advance the goals of affordable care and universal accessibility to quality healthcare services. The pragmatic acts were marked by these pragmatic tools: shared situational knowledge (SSK), relevance (REL), reference (REF) and inference (INF). This paper adds to the understanding of health insurance discourse in Nigeria as a mediated social practice that promotes the health of Nigerians.

Keywords: affordable care, NHIA, Nigeria’s health insurance discourse, pragmatic acts.

Procedia PDF Downloads 48
895 Lies and Pretended Fairness of Police Officers in Sharing

Authors: Eitan Elaad

Abstract:

The current study aimed to examine lying and pretended fairness by police personnel in sharing situations. Forty Israeli police officers and 40 laypeople from the community, all males, self-assessed their lie-telling ability, rated the frequency of their lies, evaluated the acceptability of lying, and indicated using rational and intuitive thinking while lying. Next, according to the ultimatum game procedure, participants were asked to share 100 points with an imagined target, either a male policeman or a male non-policeman. Participants allocated points to the target person bearing in mind that the other person must accept or reject their offer. Participants' goal was to retain as many points as possible, and to this end, they could tell the target person that fewer than 100 points were available for distribution. We defined concealment or lying as the difference between the available 100 points and the sum of points designated for sharing. Results indicated that police officers lied less to their fellow police targets than non-police targets, whereas laypeople lied less to non-police targets than imagined police targets. The ratio between the points offered to the imagined target person and the points endowed by the participant as available for sharing defined pretended fairness.Enhanced pretended fairness indicates higher motivation to display fair sharing even if the fair sharing is fictitious. Police officers presented higher pretended fairness to police targets than laypeople, whereas laypeople set off more fairness to non-police targets than police officers. We discussed the results concerning occupation solidarity and loyalty among police personnel. Specifically, police work involves uncertainty, danger and risk, coercive authority, and the use of force, which isolates the police from the community and dictates strong bonds of solidarity between police personnel. No wonder police officers shared more points (lied less) to fellow police targets than non-police targets. On the other hand, police legitimacy or the belief that the police are acting honestly in the best interest of the citizens constitutes citizens' attitudes toward the police. The relatively low number of points shared for distribution by laypeople to police targets indicates difficulties with the legitimacy of the Israeli police.

Keywords: lying, fairness, police solidarity, police legitimacy, sharing, ultimatum game

Procedia PDF Downloads 92
894 The Book of Lies: The Christian Bible's Colonialism over and Appropriation of Occultism

Authors: Samantha Huff

Abstract:

This research seeks to examine the relationship between occultism and the traditional religion of Christianity. The focus of this particular project is to deconstruct occultism and occult religion: how it develops, where it is applied, how and when it is applied. The next step is to make connections between the structure of occultism and the structure of Christianity. Do Christianity and the Occult appear, textually, the same way? What does that mean culturally? This project seeks to examine the historical similarities of occultism and Christianity practices and tradition, and how, as a whole, Christianity appropriates and colonializes occultism through examination into the Christian Bible and popular occult texts: The Book of the Law by Aleister Crowley and The Secret Doctrine: The Synthesis of Science, Religion, and Philosophy by Helena Petrovna Blavatsky. Through examining occultism and Christianity and applying it to popular cultural theories (Ritual Space by Nick Couldry, Muted Group Theory by Shirley Ardener, and Mythologies by Roland Barethes), it is entirely possible to see how Christianity appropriates occultism and uses their stronghold on society as a means to colonialize occult traditions and practices.

Keywords: appropriation, Christianity, colonialism, cultural theory, muted group theory, mythologies, occultism, ritual space

Procedia PDF Downloads 128
893 A Case Study on Expanding Access to Higher Education of Students with Hearing Impairment

Authors: Afaf Manzoor, Abdul Hameed

Abstract:

Children with hearing impairment face several challenges in accessing primary and secondary education in general and higher education in particular in Pakistan. A large number of these children are excluded from formal education system through segregated special institutions. The enrollment rate of these children at school level is very low and it continues decreasing as they move on the ladder of education. Negligible number of students with hearing impairment gets any chance to be enrolled at tertiary or higher education institutes. The segregated system of education at primary and secondary level makes it even more difficult to adjust in an inclusive classroom at a higher level not only for students with hearing impairment but for their teachers and peers as well. A false belief of teachers and parents about low academic profile of students with hearing impairment is one of the major challenges to overcome for their participation at higher education. This case study was conducted to document an innovative step taken by the Department of Special Education Needs, University of Management & Technology, Lahore Pakistan. The prime objective of this study was to assess the satisfaction level of students with hearing impairment in BS 4 Years and MA Special Education programs at Lahore campus. Structured interviews were of 40 students with hearing impairment to assess the satisfaction on service delivery (admission process, classroom pedagogy, content, assessment/results, access to other services centers i.e. library, cafeteria, hostel, co-curricular activities) and campus life. Their peers without disabilities were also interviewed to assess their acceptance level. The findings of the study revealed positive results about their educational as well as social inclusion in the university. The students also shared their fears at the time of admission and how fear eventually faded out with the passage of time due to the proper academic support system. The findings of the study will be shared in detail with the audience during the presentation.

Keywords: students with hearing impairment, higher education, inclusive education, marginalization

Procedia PDF Downloads 277
892 Efficient Storage in Cloud Computing by Using Index Replica

Authors: Bharat Singh Deora, Sushma Satpute

Abstract:

Cloud computing is based on resource sharing. Like other resources which can be shareable, storage is a resource which can be shared. We can use collective resources of storage from different locations and maintain a central index table for storage details. The storage combining of different places can form a suitable data storage which is operated from one location and is very economical. Proper storage of data should improve data reliability & availability and bandwidth utilization. Also, we are moving the contents of one storage to other according to our need.

Keywords: cloud computing, cloud storage, Iaas, PaaS, SaaS

Procedia PDF Downloads 305
891 A Study of the Use of Arguments in Nominalizations as Instanciations of Grammatical Metaphors Finished in -TION in Academic Texts of Native Speakers

Authors: Giovana Perini-Loureiro

Abstract:

The purpose of this research was to identify whether the nominalizations terminating in -TION in the academic discourse of native English speakers contain the arguments required by their input verbs. In the perspective of functional linguistics, ideational metaphors, with nominalization as their most pervasive realization, are lexically dense, and therefore frequent in formal texts. Ideational metaphors allow the academic genre to instantiate objectification, de-personalization, and the ability to construct a chain of arguments. The valence of those nouns present in nominalizations tends to maintain the same elements of the valence from its original verbs, but these arguments are not always expressed. The initial hypothesis was that these arguments would also be present alongside the nominalizations, through anaphora or cataphora. In this study, a qualitative analysis of the occurrences of the five more frequent nominalized terminations in -TION in academic texts was accomplished, and thus a verification of the occurrences of the arguments required by the original verbs. The assembling of the concordance lines was done through COCA (Corpus of Contemporary American English). After identifying the five most frequent nominalizations (attention, action, participation, instruction, intervention), the concordance lines were selected at random to be analyzed, assuring the representativeness and reliability of the sample. It was possible to verify, in all the analyzed instances, the presence of arguments. In most instances, the arguments were not expressed, but recoverable, either in the context or in the shared knowledge among the interactants. It was concluded that the realizations of the arguments which were not expressed alongside the nominalizations are part of a continuum, starting from the immediate context with anaphora and cataphora; up to a knowledge shared outside the text, such as specific area knowledge. The study also has implications for the teaching of academic writing, especially with regards to the impact of nominalizations on the thematic and informational flow of the text. Grammatical metaphors are essential to academic writing, hence acknowledging the occurrence of its arguments is paramount to achieve linguistic awareness and the writing prestige required by the academy.

Keywords: corpus, functional linguistics, grammatical metaphors, nominalizations, academic English

Procedia PDF Downloads 121
890 Distributed Energy Resources in Low-Income Communities: a Public Policy Proposal

Authors: Rodrigo Calili, Anna Carolina Sermarini, João Henrique Azevedo, Vanessa Cardoso de Albuquerque, Felipe Gonçalves, Gilberto Jannuzzi

Abstract:

The diffusion of Distributed Energy Resources (DER) has caused structural changes in the relationship between consumers and electrical systems. The Photovoltaic Distributed Generation (PVDG), in particular, is an essential strategy for achieving the 2030 Agenda goals, especially SDG 7 and SDG 13. However, it is observed that most projects involving this technology in Brazil are restricted to the wealthiest classes of society, not yet reaching the low-income population, aligned with theories of energy justice. Considering the research for energy equality, one of the policies adopted by governments is the social electricity tariff (SET), which provides discounts on energy tariffs/bills. However, just granting this benefit may not be effective, and it is possible to merge it with DER technologies, such as the PVDG. Thus, this work aims to evaluate the economic viability of the policy to replace the social electricity tariff (the current policy aimed at the low-income population in Brazil) by PVDG projects. To this end, a proprietary methodology was developed that included: mapping the stakeholders, identifying critical variables, simulating policy options, and carrying out an analysis in the Brazilian context. The simulation answered two key questions: in which municipalities low-income consumers would have lower bills with PVDG compared to SET; which consumers in a given city would have increased subsidies, which are now provided for solar energy in Brazil and for the social tariff. An economic model was created for verifying the feasibility of the proposed policy in each municipality in the country, considering geographic issues (tariff of a particular distribution utility, radiation from a specific location, etc.). To validate these results, four sensitivity analyzes were performed: variation of the simultaneity factor between generation and consumption, variation of the tariff readjustment rate, zeroing CAPEX, and exemption from state tax. The behind-the-meter modality of generation proved to be more promising than the construction of a shared plant. However, although the behind-the-meter modality presents better results than the shared plant, there is a greater complexity in adopting this modality due to issues related to the infrastructure of the most vulnerable communities (e.g., precarious electrical networks, need to reinforce roofs). Considering the shared power plant modality, many opportunities are still envisaged since the risk of investing in such a policy can be mitigated. Furthermore, this modality can be an alternative due to the mitigation of the risk of default, as it allows greater control of users and facilitates the process of operation and maintenance. Finally, it was also found, that in some regions of Brazil, the continuity of the SET presents more economic benefits than its replacement by PVDG. However, the proposed policy offers many opportunities. For future works, the model may include other parameters, such as cost with low-income populations’ engagement, and business risk. In addition, other renewable sources of distributed generation can be studied for this purpose.

Keywords: low income, subsidy policy, distributed energy resources, energy justice

Procedia PDF Downloads 77
889 Design for Sustainability

Authors: Qiuying Li, Fan Chen

Abstract:

It is a shared opinion that sustainable development requires continuously updated, meaning that apparent changes in the way we usually produce our buildings are strongly needed. In China’s construction field, the associated environmental, health problems are quite prominent.Especially low sustainable performance (as opposed to Green creation) flooding the real estate boom and high-speed urban and rural urbanization. Currently, we urgently need to improve the existing design basis,objectives,scope and procedures,optimization design portfolio.More new evaluation system designed to facilitate the building to enhance the overall level.

Keywords: design for sustainability, design and materials, ecomaterials, sustainable architecture and urban design

Procedia PDF Downloads 485
888 The Contribution of Experience Scapes to Building Resilience in Communities: A Comparative Case Study Approach in Germany and the Netherlands

Authors: Jorn Fricke, Frans Melissen

Abstract:

Citizens in urban areas are prone to increased levels of stress due to urbanization, inadequate and overburdened infrastructure and services, and environmental degradation. Moreover, communities are fragile and subject to shocks and stresses through various social and political processes. A loss of (a sense of) community is often seen as related to increasing political and civic disintegration. Feelings of community can manifest themselves in various ways but underlying all these manifestations is the need for trust between people. One of the main drivers of trust between individuals is (shared) experiences. It is these shared experiences that may play an important role in building resilience, i.e., the ability of a community and its members to adapt to and deal with stresses, as well as ensure the ongoing development of a community. So far, experience design, as a discipline and academic field, has mainly focused on designing products or services. However, people-to-people experiences are the ones that play a pivotal role in building inclusiveness, safety, and resilience in communities. These experiences represent challenging objects of design as they develop in an interactive space of spontaneity, serendipity, and uniqueness that is based on intuition, freedom of expression, and interaction. Therefore, there is a need for research to identify which elements are required in designing the social and physical environment (or ‘experience scape’) to increase the chance for people-to-people experiences to be successful and what elements are required for these experiences to help in building resilience in urban communities that can resist shocks and stresses. By means of a comparative case study approach in urban areas in Germany and the Netherlands, using a range of qualitative research methods such as in-depth interviews, focus groups, participant observation, storytelling techniques, and life stories, this research identifies relevant actors and their roles in creating building blocks of optimal experience scrapes for building resilience in communities.

Keywords: community development, experiences, experience scapes, resilience

Procedia PDF Downloads 155
887 Shared Decision Making in Oropharyngeal Cancer: The Development of a Decision Aid for Resectable Oropharyngeal Carcinoma, a Mixed Methods Study

Authors: Anne N. Heirman, Lisette van der Molen, Richard Dirven, Gyorgi B. Halmos, Michiel W.M. van den Brekel

Abstract:

Background: Due to the rising incidence of oropharyngeal squamous cell cancer (OPSCC), many patients are challenged with choosing between transoral(robotic) surgery and radiotherapy, with equal survival and oncological outcomes. Also, functional outcomes are of little difference over the years. With this study, the wants and needs of patients and caregivers are identified to develop a comprehensible patient decision aid (PDA). Methods: The development of this PDA is based on the International Patient Decision Aid Standards criteria. In phase 1, relevant literature was reviewed and compared to current counseling papers. We interviewed ten post-treatment patients and ten doctors from four head and neck centers in the Netherlands, which were transcribed verbatim and analyzed. With these results, the first draft of the PDA was developed. Phase 2 beholds testing the first draft for comprehensibility and usability. Phase 3 beholds testing for feasibility. After this phase, the final version of the PDA was developed. Results: All doctors and patients agreed a PDA was needed. Phase 1 showed that 50% of patients felt well-informed after standard care and 35% missed information about treatment possibilities. Side effects and functional outcomes were rated as the most important for decision-making. With this information, the first version was developed. Doctors and patients stated (phase 2) that they were satisfied with the comprehensibility and usability, but there was too much text. The PDA underwent text reduction revisions and got more graphics. After revisions, all doctors found the PDA feasible and would contribute to regular counseling. Patients were satisfied with the results and wished they would have seen it before their treatment. Conclusion: Decision-making for OPSCC should focus on differences in side-effects and functional outcomes. Patients and doctors found the PDA to be of great value. Future research will explore the benefits of the PDA in clinical practice.

Keywords: head-and-neck oncology, oropharyngeal cancer, patient decision aid, development, shared decision making

Procedia PDF Downloads 119
886 Enhancing Healthcare Data Protection and Security

Authors: Joseph Udofia, Isaac Olufadewa

Abstract:

Everyday, the size of Electronic Health Records data keeps increasing as new patients visit health practitioner and returning patients fulfil their appointments. As these data grow, so is their susceptibility to cyber-attacks from criminals waiting to exploit this data. In the US, the damages for cyberattacks were estimated at $8 billion (2018), $11.5 billion (2019) and $20 billion (2021). These attacks usually involve the exposure of PII. Health data is considered PII, and its exposure carry significant impact. To this end, an enhancement of Health Policy and Standards in relation to data security, especially among patients and their clinical providers, is critical to ensure ethical practices, confidentiality, and trust in the healthcare system. As Clinical accelerators and applications that contain user data are used, it is expedient to have a review and revamp of policies like the Payment Card Industry Data Security Standard (PCI DSS), the Health Insurance Portability and Accountability Act (HIPAA), the Fast Healthcare Interoperability Resources (FHIR), all aimed to ensure data protection and security in healthcare. FHIR caters for healthcare data interoperability, FHIR caters to healthcare data interoperability, as data is being shared across different systems from customers to health insurance and care providers. The astronomical cost of implementation has deterred players in the space from ensuring compliance, leading to susceptibility to data exfiltration and data loss on the security accuracy of protected health information (PHI). Though HIPAA hones in on the security accuracy of protected health information (PHI) and PCI DSS on the security of payment card data, they intersect with the shared goal of protecting sensitive information in line with industry standards. With advancements in tech and the emergence of new technology, it is necessary to revamp these policies to address the complexity and ambiguity, cost barrier, and ever-increasing threats in cyberspace. Healthcare data in the wrong hands is a recipe for disaster, and we must enhance its protection and security to protect the mental health of the current and future generations.

Keywords: cloud security, healthcare, cybersecurity, policy and standard

Procedia PDF Downloads 44
885 From the “Movement Language” to Communication Language

Authors: Mahmudjon Kuchkarov, Marufjon Kuchkarov

Abstract:

The origin of ‘Human Language’ is still a secret and the most interesting subject of historical linguistics. The core element is the nature of labeling or coding the things or processes with symbols and sounds. In this paper, we investigate human’s involuntary Paired Sounds and Shape Production (PSSP) and its contribution to the development of early human communication. Aimed at twenty-six volunteers who provided many physical movements with various difficulties, the research team investigated the natural, repeatable, and paired sounds and shape productions during human activities. The paper claims the involvement of Paired Sounds and Shape Production (PSSP) in the phonetic origin of some modern words and the existence of similarities between elements of PSSP with characters of the classic Latin alphabet. The results may be used not only as a supporting idea for existing theories but to create a closer look at some fundamental nature of the origin of the languages as well.

Keywords: body shape, body language, coding, Latin alphabet, merging method, movement language, movement sound, natural sound, origin of language, pairing, phonetics, sound and shape production, word origin, word semantic

Procedia PDF Downloads 155
884 Examining How the Institutional Policies Affect LGBT Residents Living in Long-Term Care

Authors: Peter Brink

Abstract:

Much of the research examining sexuality in long-term care focus on individual experiences, specifically their past, present, and future lived experiences. We know little about long-term care home policies, how they relate to the LGBT community, or how accommodating long-term care homes are to the LGBT+ community. In many ways, residents who identify as LGBT+ have been invisible in long-term care homes. Up until the not-to-distant past, homosexuality was illegal, and discrimination was acceptable. Canada’s LGBT population has also suffered because of the HIV/AIDS epidemic. For these and other reasons, members of the LGBT community might resist entering long-term care or attempt to keep their sexuality secret. The goal of any long-term care home is to be a welcoming place, to display signs of inclusion, and to help residents and staff feel that they are embraced. From the perspective of the long-term care home, it is possible that many of these facilities do not necessarily see the need to mention gender identity or sexual orientation in their welcoming materials. However, from the perspective of the invisible minority, it may be important that these homes be more than just welcoming. This study examined the role of institutional policies in long-term care for residents who identify as LGBT.

Keywords: long-term care, LGBT, HIV/AIDS, policy

Procedia PDF Downloads 81
883 Palace Diplomacy: The Means and the End to the Chinese Control of African Economy

Authors: Toyin Cotties Adetiba

Abstract:

Notably, China is a major global economy, thus increasing debate parlance of foreign policy that sees China as a superpower. China’s investment in Africa is visibly seen in African markets with substantial involvement of its multinationals in key commercial sectors such as infrastructure, telecoms, and agriculture. Not minding its positive economic impact on Africa, the debate around the China-African relationship has continued to be filled with some sort of inconsistency and ambiguity. This work engaged a qualitative research method while answering the question of whether the socioeconomic marriage of convenience between African states and China, is a means and the end to the Chinese control of African economy? Can China-Africa’s relationship engender Africa’s economic development or is it a threat to Africa’s development? The paper argued that through the secret dealings of the Chinese companies with African leaders, couched as palace diplomacy, the Chinese have cornered African economy. Concluding that there is need for the reform of the approaches to curtailing socio-economic and political corruption in Africa in the form of applications of ideas molded and refined to transparency in dealing with the Chinese, while economic institutions in African is empowered to effectively fight corruption.

Keywords: Africans, corruption, diplomacy, companies, development

Procedia PDF Downloads 120
882 Supporting Regulation and Shared Attention to Facilitate the Foundations for Development of Children and Adolescents with Complex Individual Profiles

Authors: Patsy Tan, Dana Baltutis

Abstract:

This presentation demonstrates the effectiveness of music therapy in co-treatment with speech pathology and occupational therapy as an innovative way when working with children and adolescents with complex individual differences to facilitate communication, emotional, motor and social skills development. Each child with special needs and their carer has an individual profile which encompasses their visual-spatial, auditory, language, learning, mental health, family dynamic, sensory-motor, motor planning and sequencing profiles. The most common issues among children with special needs, especially those diagnosed with Autism Spectrum Disorder, are in the areas of regulation, communication, and social-emotional development. The ability of children living with challenges to communicate and use language and understand verbal and non-verbal information, as well as move their bodies to explore and interact with their environments in social situations, depends on the children being regulated both internally and externally and trusting their communication partners and understanding what is happening in the moment. For carers, it is about understanding the tempo, rhythm, pacing, and timing of their own individual profile, as well as the profile of the child they are interacting with, and how these can sync together. In this study, music therapy is used in co-treatment sessions with a speech pathologist and/or an occupational therapist using the DIRFloortime approach to facilitate the regulation, attention, engagement, reciprocity and social-emotional capacities of children presenting with complex individual differences. Documented changes in 10 domains of children’s development over a 12-month period using the Individual Music Therapy Assessment Profile (IMTAP) were observed. Children were assessed biannually, and results show significant improvements in the social-emotional, musicality and receptive language domains indicating that co-treatment with a music therapist using the DIRFloortime framework is highly effective. This presentation will highlight strategies that facilitate regulation, social-emotional and communication development for children and adolescents with complex individual profiles.

Keywords: communication, shared attention, regulation, social emotional

Procedia PDF Downloads 221
881 A Dynamic Curriculum as a Platform for Continuous Competence Development

Authors: Niina Jallinoja, Anu Moisio

Abstract:

Focus on adult learning is vital to overcome economic challenges as well as to respond to the demand for new competencies and sustained productivity in the digitalized world economy. Employees of all ages must be able to carry on continuous professional development to remain competitive in the labor market. According to EU policies, countries should offer more flexible opportunities for adult learners who study online and in so-called ‘second chance’ qualification programmes. Traditionally, adult education in Finland has comprised of not only liberal adult education but also the government funding to study for Bachelor, Master's, and Ph.D. degrees in Finnish Universities and Universities of Applied Sciences (UAS). From the beginning of 2021, public funding is allocated not only to degrees but also to courses to achieve new competencies for adult learners in Finland. Consequently, there will be degree students (often younger of age) and adult learners studying in the same evening, online and blended courses. The question is thus: How are combined studies meeting the different needs of degree students and adult learners? Haaga-Helia University of Applied Sciences (UAS), located in the metropolitan area of Finland, is taking up the challenge of continuous learning for adult learners. Haaga-Helia has been reforming the bachelor level education and respective shorter courses from 2019 in the biggest project in its history. By the end of 2023, Haaga-Helia will have a flexible, modular curriculum for the bachelor's degrees of hospitality management, business administration, business information technology, journalism and sports management. Building on the shared key competencies, degree students will have the possibility to build individual study paths more flexibly, thanks to the new modular structure of the curriculum. They will be able to choose courses across all degrees, and thus, build their own unique competence combinations. All modules can also be offered as separate courses or learning paths to non-degree students, both publicly funded and as commercial services for employers. Consequently, there will be shared course implementations for degree studies and adult learners with various competence requirements. The newly designed courses are piloted in parallel of the designing of the curriculum in Haaga-Helia during 2020 and 2021. Semi-structured online surveys are composed among the participants for the key competence courses. The focus of the research is to understand how students in the bachelor programme and adult learners from Open UAE perceive the learning experience in such a diverse learning group. A comparison is also executed between learning methods of in-site teaching, online implementation, blended learning and virtual self-learning courses to understand how the pedagogy is meeting the learning objectives of these two different groups. The new flexible curricula and the study modules are to be designed to fill the most important competence gaps that exist in the Finnish labor markets. The new curriculum will be dynamic and constantly evolving over time according to the future competence needs in the labor market. This type of approach requires constant dialogue between Haaga-Helia and workplaces during and after designing of the shared curriculum.

Keywords: ccompetence development, continuous learning, curriculum, higher education

Procedia PDF Downloads 100
880 Carl Schmitt in the Age of Immanence: A Critical Reading

Authors: Manuel Iretzberger

Abstract:

This paper aims to uncover the ideological aspects in the political thought of Carl Schmitt, who is enjoying an ever-increasing popularity in various academic fields, following in the wake of rising interest in questions of sovereignty and legitimacy. Given Schmitt’s biography, i.e. his role as the ‘Crown Jurist of the Third Reich’ (Gurian), an extraordinarily thorough examination is necessary; however, instead of merely ‘deconstructing’ his works, certain ontological truths he might have attained, shall be taken seriously. To this end, his notions of politics and the state of exception are scrutinized, which are indeed considered intriguing, yet prove to be enigmatic and impalpable at the core when read closely. In order to explain this conjuncture, both Schmitt’s philosophy of history and his ‘secret discussion’ (Agamben) with Walter Benjamin are depicted. As it turns out – it is argued – his concept of the Political has to be conceived of as embedded in a much broader context: In a post-transcendental, immanent age, he regards traditional modes of representation as no longer feasible and clings to authoritarianism as a surrogate – his Catholicism plays a decisive role here, forcing him to inject normatively biased assumptions into his political writings. Seeing Schmitt perform ‘rearguard action’ not only serves to disarm his work of most of its menacing aura, it also allows drawing conclusions about ways of legitimatizing democratic rule in modern times, as the paper tries to outline in its last section.

Keywords: Benjamin, history, immanence, Schmitt, sovereignty

Procedia PDF Downloads 266
879 Upon Further Reflection: More on the History, Tripartite Role, and Challenges of the Professoriate

Authors: Jeffrey R. Mueller

Abstract:

This paper expands on the role of the professor by detailing the origins of the profession, adding some of the unique contributions of North American Universities, as well as some of the best practice recommendations, to the unique tripartite role of the professor. It describes current challenges to the profession including the ever-controversial student rating of professors. It continues with the significance of empowerment to the role of the professor. It concludes with a predictive prescription for the future of the professoriate and the role of the university-level educational administrator toward that end.

Keywords: professoriate history, tripartite role, challenges, empowerment, shared governance, administratization

Procedia PDF Downloads 377
878 Multilingual Practices in the UK: Kabyles’ Situational Language Choice in a Linguistically Diverse Setting.

Authors: Souhila Belabbas

Abstract:

This paper focuses on the Kabyles’ multilingual practices in the UK, within the Kabyle/Amazigh Cultural Organisation in London, on online platforms and at home. The Kabyles have roots in northern Algeria and associate their language, Kabyle, with a pre-Arabized history of northern Africa. Drawing on ethnographic research with this community, this study brings together their post-migration language preservation activisms as well as their dynamic multilingual practices and situational language choice into a dialogue. This shows the enduring significance of the heritage language for social, cultural and historical identity. It also demonstrates that the current survival of the “mother tongue” hinges on multilingual and multi-sited language activisms, which bear the hallmarks of both new creativities and diminishing fluencies in multilingual spaces. These multilingual repertoires also included a range of ideological stances, expressed as cultural, moral, and political attitudes to the “mother tongue” and to other, potentially more dominant, languages in their lives, involving both inclusive and exclusive instances. The Kabyles in the UK practice everyday forms of multilingualism in the dynamic terms whilst making strong identity claims to an endangered heritage language. Crucially, their language contact experiences were not a post-migration novelty but part of their pre-migration lifeworlds. The participants involved in this study shared a commitment to Kabyle identity activism. They expressed this differently, varyingly foregrounding cultural, social or political issues. These differences were related to their North-African cultural background, live, gender, religious and/or political affiliation, as well as to their different migratory trajectories. Among these ethno-conscious individuals, the use of Kabyle was often particularly vibrant in informal domains of casual conversations and mixed in with French, English and often Arabic. During community events and festivals, though, many made special efforts to converse in Kabyle as if to make a point about their commitment to a shared identity.

Keywords: ethnography, language ideology, language choice, heritage language, migration trajectories, multilingual repertoires

Procedia PDF Downloads 35
877 Multilingual Practices in the UK: Kabyles’ Situational Language Choice in a Linguistically Diverse Setting

Authors: Souhila Belabbas

Abstract:

This paper focuses on the Kabyles’ multilingual practices in the UK, within the Kabyle/Amazigh Cultural Organisation in London, on online platforms and at home. The Kabyles have roots in northern Algeria and associate their language, Kabyle, with a pre-Arabized history of northern Africa. Drawing on ethnographic research with this community, this study brings together their post-migration language preservation activisms as well as their dynamic multilingual practices and situational language choice into a dialogue. This shows the enduring significance of the heritage language for social, cultural and historical identity. It also demonstrates that the current survival of the “mother tongue” hinges on multilingual and multi-sited language activisms, which bear the hallmarks of both new creativities and diminishing fluencies in multilingual spaces. These multilingual repertoires also included a range of ideological stances, expressed as cultural, moral, and political attitudes to the “mother tongue” and to other, potentially more dominant, languages in their lives, involving both inclusive and exclusive instances. The Kabyles in the UK practice everyday forms of multilingualism in the dynamic terms whilst making strong identity claims to an endangered heritage language. Crucially, their language contact experiences were not a post-migration novelty but part of their pre-migration lifeworlds. The participants involved in this study shared a commitment to Kabyle identity activism. They expressed this differently, varyingly foregrounding cultural, social or political issues. These differences were related to their North-African cultural background, live, gender, religious and/or political affiliation, as well as to their different migratory trajectories. Among these ethno-conscious individuals, the use of Kabyle was often particularly vibrant in informal domains of casual conversations and mixed in with French, English and often Arabic. During community events and festivals, though, many made special efforts to converse in Kabyle as if to make a point about their commitment to a shared identity.

Keywords: ethnography, language ideology, language choice, heritage language, migration trajectories, multilingual repertoires

Procedia PDF Downloads 44
876 Survey of Access Controls in Cloud Computing

Authors: Monirah Alkathiry, Hanan Aljarwan

Abstract:

Cloud computing is one of the most significant technologies that the world deals with, in different sectors with different purposes and capabilities. The cloud faces various challenges in securing data from unauthorized access or modification. Consequently, security risks and levels have greatly increased. Therefore, cloud service providers (CSPs) and users need secure mechanisms that ensure that data are kept secret and safe from any disclosures or exploits. For this reason, CSPs need a number of techniques and technologies to manage and secure access to the cloud services to achieve security goals, such as confidentiality, integrity, identity access management (IAM), etc. Therefore, this paper will review and explore various access controls implemented in a cloud environment that achieve different security purposes. The methodology followed in this survey was conducting an assessment, evaluation, and comparison between those access controls mechanisms and technologies based on different factors, such as the security goals it achieves, usability, and cost-effectiveness. This assessment resulted in the fact that the technology used in an access control affects the security goals it achieves as well as there is no one access control method that achieves all security goals. Consequently, such a comparison would help decision-makers to choose properly the access controls that meet their requirements.

Keywords: access controls, cloud computing, confidentiality, identity and access management

Procedia PDF Downloads 101
875 Driving What’s Next: The De La Salle Lipa Social Innovation in Quality Education Initiatives

Authors: Dante Jose R. Amisola, Glenford M. Prospero

Abstract:

'Driving What’s Next' is a strong campaign of the new administration of De La Salle Lipa in promoting social innovation in quality education. The new leadership directs social innovation in quality education in the institutional directions and initiatives to address real-world challenges with real-world solutions. This research under study aims to qualify the commitment of the institution to extend the Lasallian quality human and Christian education to all, as expressed in the Institution’s new mission-vision statement. The Classic Grounded Theory methodology is employed in the process of generating concepts in reference to the documents, a series of meetings, focus group discussions and other related activities that account for the conceptualization and formulation of the new mission-vision along with the new education innovation framework. Notably, Driving What’s Next is the emergent theory that encapsulates the commitment of giving quality human and Christian education to all. It directs the new leadership in driving social innovation in quality education initiatives. Correspondingly, Driving What’s Next is continually resolved through four interrelated strategies also termed as the institution's four strategic directions, namely: (1) driving social innovation in quality education, (2) embracing our shared humanity and championing social inclusion and justice initiatives, (3) creating sustainable futures and (4) engaging diverse stakeholders in our shared mission. Significantly, the four strategic directions capture and integrate the 17 UN sustainable development goals, making the innovative curriculum locally and globally relevant. To conclude, the main concern of the new administration and how it is continually resolved, provide meaningful and fun learning experiences and promote a new way of learning in the light of the 21st century skills among the members of the academic community including stakeholders and extended communities at large, which are defined as: learning together and by association (collaboration), learning through engagement (communication), learning by design (creativity) and learning with social impact (critical thinking).

Keywords: DLSL four strategic directions , DLSL Lipa mission-vision, driving what's next, social innovation in quality education

Procedia PDF Downloads 183