CINXE.COM

Search results for: privacy patterns

<!DOCTYPE html> <html lang="en" dir="ltr"> <head> <!-- Google tag (gtag.js) --> <script async src="https://www.googletagmanager.com/gtag/js?id=G-P63WKM1TM1"></script> <script> window.dataLayer = window.dataLayer || []; function gtag(){dataLayer.push(arguments);} gtag('js', new Date()); gtag('config', 'G-P63WKM1TM1'); </script> <!-- Yandex.Metrika counter --> <script type="text/javascript" > (function(m,e,t,r,i,k,a){m[i]=m[i]||function(){(m[i].a=m[i].a||[]).push(arguments)}; m[i].l=1*new Date(); for (var j = 0; j < document.scripts.length; j++) {if (document.scripts[j].src === r) { return; }} k=e.createElement(t),a=e.getElementsByTagName(t)[0],k.async=1,k.src=r,a.parentNode.insertBefore(k,a)}) (window, document, "script", "https://mc.yandex.ru/metrika/tag.js", "ym"); ym(55165297, "init", { clickmap:false, trackLinks:true, accurateTrackBounce:true, webvisor:false }); </script> <noscript><div><img src="https://mc.yandex.ru/watch/55165297" style="position:absolute; left:-9999px;" alt="" /></div></noscript> <!-- /Yandex.Metrika counter --> <!-- Matomo --> <!-- End Matomo Code --> <title>Search results for: privacy patterns</title> <meta name="description" content="Search results for: privacy patterns"> <meta name="keywords" content="privacy patterns"> <meta name="viewport" content="width=device-width, initial-scale=1, minimum-scale=1, maximum-scale=1, user-scalable=no"> <meta charset="utf-8"> <link href="https://cdn.waset.org/favicon.ico" type="image/x-icon" rel="shortcut icon"> <link href="https://cdn.waset.org/static/plugins/bootstrap-4.2.1/css/bootstrap.min.css" rel="stylesheet"> <link href="https://cdn.waset.org/static/plugins/fontawesome/css/all.min.css" rel="stylesheet"> <link href="https://cdn.waset.org/static/css/site.css?v=150220211555" rel="stylesheet"> </head> <body> <header> <div class="container"> <nav class="navbar navbar-expand-lg navbar-light"> <a class="navbar-brand" href="https://waset.org"> <img src="https://cdn.waset.org/static/images/wasetc.png" alt="Open Science Research Excellence" title="Open Science Research Excellence" /> </a> <button class="d-block d-lg-none navbar-toggler ml-auto" type="button" data-toggle="collapse" data-target="#navbarMenu" aria-controls="navbarMenu" aria-expanded="false" aria-label="Toggle navigation"> <span class="navbar-toggler-icon"></span> </button> <div class="w-100"> <div class="d-none d-lg-flex flex-row-reverse"> <form method="get" action="https://waset.org/search" class="form-inline my-2 my-lg-0"> <input class="form-control mr-sm-2" type="search" placeholder="Search Conferences" value="privacy patterns" name="q" aria-label="Search"> <button class="btn btn-light my-2 my-sm-0" type="submit"><i class="fas fa-search"></i></button> </form> </div> <div class="collapse navbar-collapse mt-1" id="navbarMenu"> <ul class="navbar-nav ml-auto align-items-center" id="mainNavMenu"> <li class="nav-item"> <a class="nav-link" href="https://waset.org/conferences" title="Conferences in 2024/2025/2026">Conferences</a> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/disciplines" title="Disciplines">Disciplines</a> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/committees" rel="nofollow">Committees</a> </li> <li class="nav-item dropdown"> <a class="nav-link dropdown-toggle" href="#" id="navbarDropdownPublications" role="button" data-toggle="dropdown" aria-haspopup="true" aria-expanded="false"> Publications </a> <div class="dropdown-menu" aria-labelledby="navbarDropdownPublications"> <a class="dropdown-item" href="https://publications.waset.org/abstracts">Abstracts</a> <a class="dropdown-item" href="https://publications.waset.org">Periodicals</a> <a class="dropdown-item" href="https://publications.waset.org/archive">Archive</a> </div> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/page/support" title="Support">Support</a> </li> </ul> </div> </div> </nav> </div> </header> <main> <div class="container mt-4"> <div class="row"> <div class="col-md-9 mx-auto"> <form method="get" action="https://publications.waset.org/abstracts/search"> <div id="custom-search-input"> <div class="input-group"> <i class="fas fa-search"></i> <input type="text" class="search-query" name="q" placeholder="Author, Title, Abstract, Keywords" value="privacy patterns"> <input type="submit" class="btn_search" value="Search"> </div> </div> </form> </div> </div> <div class="row mt-3"> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Commenced</strong> in January 2007</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Frequency:</strong> Monthly</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Edition:</strong> International</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Paper Count:</strong> 3304</div> </div> </div> </div> <h1 class="mt-3 mb-3 text-center" style="font-size:1.6rem;">Search results for: privacy patterns</h1> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">3214</span> Securing the Electronic Commerce - The Way Forward: A Comparative Ananlysis</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Sarthak%20Mishra">Sarthak Mishra</a>, <a href="https://publications.waset.org/abstracts/search?q=Astha%20Sinha"> Astha Sinha</a> </p> <p class="card-text"><strong>Abstract:</strong></p> There’s no doubt about the convenience of making commercial and business transactions over the Internet under the new business model known as the e-Commerce. The term 'Electronic commerce' or e-Commerce refers to the use of an electronic medium to carry out commercial transactions. E-Commerce is one of the parts of Information Science framework and its uses are gradually becoming popular. Thus, the threat of security issues in Information Science has now become an important subject of discussion amongst the concerned users. These two issues i.e. security and privacy are required to be looked into through social, organizational, technical and economic perspectives. The current paper analyses the effect of these two issues in the arena of e-commerce. Here, no specification has been discussed rather an attempt has been made to provide a general overview. Further, attempts have been made to discuss the security and privacy issues in relation to the E-Commerce financial transactions. We shall also discuss in particular different steps required to be taken before online shopping and also shall discuss the purpose of security and privacy in E-Commerce and why it has currently become the need of the present hour. Lastly, an attempt has been made to discuss the plausible future course of development of this practice and its impact upon the global economy and if any changes should be bought about to ensure a smooth evolution of the practice. This paper has adopted a descriptive methodology to undertake its major area of study, wherein the major source of information has been via the secondary resources. Also, the study is of a comparative nature wherein the position of the various national regimes have compared with regards to the research question. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=business-business%20transaction%20%28B2B%29" title="business-business transaction (B2B)">business-business transaction (B2B)</a>, <a href="https://publications.waset.org/abstracts/search?q=business-consumer%20transaction%20%28B2C%29" title=" business-consumer transaction (B2C)"> business-consumer transaction (B2C)</a>, <a href="https://publications.waset.org/abstracts/search?q=e-commerce" title=" e-commerce"> e-commerce</a>, <a href="https://publications.waset.org/abstracts/search?q=online%20transaction" title=" online transaction"> online transaction</a>, <a href="https://publications.waset.org/abstracts/search?q=privacy%20and%20security%20threats" title=" privacy and security threats"> privacy and security threats</a> </p> <a href="https://publications.waset.org/abstracts/53081/securing-the-electronic-commerce-the-way-forward-a-comparative-ananlysis" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/53081.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">232</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">3213</span> A Review of Encryption Algorithms Used in Cloud Computing</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Derick%20M.%20Rakgoale">Derick M. Rakgoale</a>, <a href="https://publications.waset.org/abstracts/search?q=Topside%20E.%20Mathonsi"> Topside E. Mathonsi</a>, <a href="https://publications.waset.org/abstracts/search?q=Vusumuzi%20Malele"> Vusumuzi Malele</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Cloud computing offers distributed online and on-demand computational services from anywhere in the world. Cloud computing services have grown immensely over the past years, especially in the past year due to the Coronavirus pandemic. Cloud computing has changed the working environment and introduced work from work phenomenon, which enabled the adoption of technologies to fulfill the new workings, including cloud services offerings. The increased cloud computing adoption has come with new challenges regarding data privacy and its integrity in the cloud environment. Previously advanced encryption algorithms failed to reduce the memory space required for cloud computing performance, thus increasing the computational cost. This paper reviews the existing encryption algorithms used in cloud computing. In the future, artificial neural networks (ANN) algorithm design will be presented as a security solution to ensure data integrity, confidentiality, privacy, and availability of user data in cloud computing. Moreover, MATLAB will be used to evaluate the proposed solution, and simulation results will be presented. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=cloud%20computing" title="cloud computing">cloud computing</a>, <a href="https://publications.waset.org/abstracts/search?q=data%20integrity" title=" data integrity"> data integrity</a>, <a href="https://publications.waset.org/abstracts/search?q=confidentiality" title=" confidentiality"> confidentiality</a>, <a href="https://publications.waset.org/abstracts/search?q=privacy" title=" privacy"> privacy</a>, <a href="https://publications.waset.org/abstracts/search?q=availability" title=" availability"> availability</a> </p> <a href="https://publications.waset.org/abstracts/158690/a-review-of-encryption-algorithms-used-in-cloud-computing" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/158690.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">133</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">3212</span> Setting Ground for Improvement of Knowledge Managament System in the Educational Organization</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Mladen%20Djuric">Mladen Djuric</a>, <a href="https://publications.waset.org/abstracts/search?q=Ivan%20Janicijevic"> Ivan Janicijevic</a>, <a href="https://publications.waset.org/abstracts/search?q=Sasa%20Lazarevic"> Sasa Lazarevic</a> </p> <p class="card-text"><strong>Abstract:</strong></p> One of the organizational issues is how to develop and shape decision making and knowledge management systems which will continually avoid traps of both paralyses by analyses“ and extinction by instinct“, the concepts that are a kind of tolerant limits anti-patterns which define what we can call decision making and knowledge management patterns control zone. This paper discusses potentials for development of a core base for recognizing, capturing, and analyzing anti-patterns in the educational organization, thus creating a space for improving decision making and knowledge management processes in education. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=anti-patterns" title="anti-patterns">anti-patterns</a>, <a href="https://publications.waset.org/abstracts/search?q=decision%20making" title=" decision making"> decision making</a>, <a href="https://publications.waset.org/abstracts/search?q=education" title=" education"> education</a>, <a href="https://publications.waset.org/abstracts/search?q=knowledge%20management" title=" knowledge management "> knowledge management </a> </p> <a href="https://publications.waset.org/abstracts/19272/setting-ground-for-improvement-of-knowledge-managament-system-in-the-educational-organization" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/19272.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">632</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">3211</span> Marketing in the Age of Artificial Intelligence: Implications for Consumption Patterns of Halal Food</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Djermani%20Farouk">Djermani Farouk</a>, <a href="https://publications.waset.org/abstracts/search?q=Sri%20Rahayu%20Hijrah%20Hati"> Sri Rahayu Hijrah Hati</a>, <a href="https://publications.waset.org/abstracts/search?q=Fenitra%20Maminirin"> Fenitra Maminirin</a>, <a href="https://publications.waset.org/abstracts/search?q=Permata%20Wulandari"> Permata Wulandari</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This study investigates the implications of Artificial Intelligence Marketing (AIM) marketing mix (PRD) Product, (PRC) Price, (PRM), Promotion and (PLC) Place on consumption patterns of halal food (CPHF). A quantitative approach was adopted in this study and responses were obtained from 350 Indonesian consumers. Using Partial Least Squares-Structural Equation Modeling (PLS-SEM), the results show that there is a direct support of marketing mix (PRD, PRC, PLC) to AIM and CPHF, while PRM does not play a significant role in CPHF. In addition, the findings reveal that AIM mediates significantly the relationship between PLC, PRC and PRM and CPHF, while AIM indicates no mediation between PRD and CPHF. Indonesian consumer’s exhibit serious concerns with consumption patterns of halal food. it is recommended that managers focus their attention on marketing strategies to predict consumer behavior in terms of consumption patterns of halal food through the integration of AIM. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=marketing%20mix" title="marketing mix">marketing mix</a>, <a href="https://publications.waset.org/abstracts/search?q=consumption%20patterns" title=" consumption patterns"> consumption patterns</a>, <a href="https://publications.waset.org/abstracts/search?q=artificial%20intelligence%20marketing" title=" artificial intelligence marketing"> artificial intelligence marketing</a>, <a href="https://publications.waset.org/abstracts/search?q=Halal%20food" title=" Halal food"> Halal food</a> </p> <a href="https://publications.waset.org/abstracts/190071/marketing-in-the-age-of-artificial-intelligence-implications-for-consumption-patterns-of-halal-food" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/190071.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">33</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">3210</span> Fair Federated Learning in Wireless Communications</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Shayan%20Mohajer%20Hamidi">Shayan Mohajer Hamidi</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Federated Learning (FL) has emerged as a promising paradigm for training machine learning models on distributed data without the need for centralized data aggregation. In the realm of wireless communications, FL has the potential to leverage the vast amounts of data generated by wireless devices to improve model performance and enable intelligent applications. However, the fairness aspect of FL in wireless communications remains largely unexplored. This abstract presents an idea for fair federated learning in wireless communications, addressing the challenges of imbalanced data distribution, privacy preservation, and resource allocation. Firstly, the proposed approach aims to tackle the issue of imbalanced data distribution in wireless networks. In typical FL scenarios, the distribution of data across wireless devices can be highly skewed, resulting in unfair model updates. To address this, we propose a weighted aggregation strategy that assigns higher importance to devices with fewer samples during the aggregation process. By incorporating fairness-aware weighting mechanisms, the proposed approach ensures that each participating device's contribution is proportional to its data distribution, thereby mitigating the impact of data imbalance on model performance. Secondly, privacy preservation is a critical concern in federated learning, especially in wireless communications where sensitive user data is involved. The proposed approach incorporates privacy-enhancing techniques, such as differential privacy, to protect user privacy during the model training process. By adding carefully calibrated noise to the gradient updates, the proposed approach ensures that the privacy of individual devices is preserved without compromising the overall model accuracy. Moreover, the approach considers the heterogeneity of devices in terms of computational capabilities and energy constraints, allowing devices to adaptively adjust the level of privacy preservation to strike a balance between privacy and utility. Thirdly, efficient resource allocation is crucial for federated learning in wireless communications, as devices operate under limited bandwidth, energy, and computational resources. The proposed approach leverages optimization techniques to allocate resources effectively among the participating devices, considering factors such as data quality, network conditions, and device capabilities. By intelligently distributing the computational load, communication bandwidth, and energy consumption, the proposed approach minimizes resource wastage and ensures a fair and efficient FL process in wireless networks. To evaluate the performance of the proposed fair federated learning approach, extensive simulations and experiments will be conducted. The experiments will involve a diverse set of wireless devices, ranging from smartphones to Internet of Things (IoT) devices, operating in various scenarios with different data distributions and network conditions. The evaluation metrics will include model accuracy, fairness measures, privacy preservation, and resource utilization. The expected outcomes of this research include improved model performance, fair allocation of resources, enhanced privacy preservation, and a better understanding of the challenges and solutions for fair federated learning in wireless communications. The proposed approach has the potential to revolutionize wireless communication systems by enabling intelligent applications while addressing fairness concerns and preserving user privacy. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=federated%20learning" title="federated learning">federated learning</a>, <a href="https://publications.waset.org/abstracts/search?q=wireless%20communications" title=" wireless communications"> wireless communications</a>, <a href="https://publications.waset.org/abstracts/search?q=fairness" title=" fairness"> fairness</a>, <a href="https://publications.waset.org/abstracts/search?q=imbalanced%20data" title=" imbalanced data"> imbalanced data</a>, <a href="https://publications.waset.org/abstracts/search?q=privacy%20preservation" title=" privacy preservation"> privacy preservation</a>, <a href="https://publications.waset.org/abstracts/search?q=resource%20allocation" title=" resource allocation"> resource allocation</a>, <a href="https://publications.waset.org/abstracts/search?q=differential%20privacy" title=" differential privacy"> differential privacy</a>, <a href="https://publications.waset.org/abstracts/search?q=optimization" title=" optimization"> optimization</a> </p> <a href="https://publications.waset.org/abstracts/167868/fair-federated-learning-in-wireless-communications" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/167868.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">75</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">3209</span> The Forensic Swing of Things: The Current Legal and Technical Challenges of IoT Forensics</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Pantaleon%20Lutta">Pantaleon Lutta</a>, <a href="https://publications.waset.org/abstracts/search?q=Mohamed%20Sedky"> Mohamed Sedky</a>, <a href="https://publications.waset.org/abstracts/search?q=Mohamed%20Hassan"> Mohamed Hassan</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The inability of organizations to put in place management control measures for Internet of Things (IoT) complexities persists to be a risk concern. Policy makers have been left to scamper in finding measures to combat these security and privacy concerns. IoT forensics is a cumbersome process as there is no standardization of the IoT products, no or limited historical data are stored on the devices. This paper highlights why IoT forensics is a unique adventure and brought out the legal challenges encountered in the investigation process. A quadrant model is presented to study the conflicting aspects in IoT forensics. The model analyses the effectiveness of forensic investigation process versus the admissibility of the evidence integrity; taking into account the user privacy and the providers&rsquo; compliance with the laws and regulations. Our analysis concludes that a semi-automated forensic process using machine learning, could eliminate the human factor from the profiling and surveillance processes, and hence resolves the issues of data protection (privacy and confidentiality). <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=cloud%20forensics" title="cloud forensics">cloud forensics</a>, <a href="https://publications.waset.org/abstracts/search?q=data%20protection%20Laws" title=" data protection Laws"> data protection Laws</a>, <a href="https://publications.waset.org/abstracts/search?q=GDPR" title=" GDPR"> GDPR</a>, <a href="https://publications.waset.org/abstracts/search?q=IoT%20forensics" title=" IoT forensics"> IoT forensics</a>, <a href="https://publications.waset.org/abstracts/search?q=machine%20Learning" title=" machine Learning"> machine Learning</a> </p> <a href="https://publications.waset.org/abstracts/121576/the-forensic-swing-of-things-the-current-legal-and-technical-challenges-of-iot-forensics" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/121576.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">150</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">3208</span> Proposal Method of Prediction of the Early Stages of Dementia Using IoT and Magnet Sensors</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Jo%C3%A3o%20Filipe%20Papel">João Filipe Papel</a>, <a href="https://publications.waset.org/abstracts/search?q=Tatsuji%20Munaka"> Tatsuji Munaka</a> </p> <p class="card-text"><strong>Abstract:</strong></p> With society's aging and the number of elderly with dementia rising, researchers have been actively studying how to support the elderly in the early stages of dementia with the objective of allowing them to have a better life quality and as much as possible independence. To make this possible, most researchers in this field are using the Internet Of Things to monitor the elderly activities and assist them in performing them. The most common sensor used to monitor the elderly activities is the Camera sensor due to its easy installation and configuration. The other commonly used sensor is the sound sensor. However, we need to consider privacy when using these sensors. This research aims to develop a system capable of predicting the early stages of dementia based on monitoring and controlling the elderly activities of daily living. To make this system possible, some issues need to be addressed. First, the issue related to elderly privacy when trying to detect their Activities of Daily Living. Privacy when performing detection and monitoring Activities of Daily Living it's a serious concern. One of the purposes of this research is to achieve this detection and monitoring without putting the privacy of the elderly at risk. To make this possible, the study focuses on using an approach based on using Magnet Sensors to collect binary data. The second is to use the data collected by monitoring Activities of Daily Living to predict the early stages of Dementia. To make this possible, the research team suggests developing a proprietary ontology combined with both data-driven and knowledge-driven. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=dementia" title="dementia">dementia</a>, <a href="https://publications.waset.org/abstracts/search?q=activity%20recognition" title=" activity recognition"> activity recognition</a>, <a href="https://publications.waset.org/abstracts/search?q=magnet%20sensors" title=" magnet sensors"> magnet sensors</a>, <a href="https://publications.waset.org/abstracts/search?q=ontology" title=" ontology"> ontology</a>, <a href="https://publications.waset.org/abstracts/search?q=data%20driven%20and%20knowledge%20driven" title=" data driven and knowledge driven"> data driven and knowledge driven</a>, <a href="https://publications.waset.org/abstracts/search?q=IoT" title=" IoT"> IoT</a>, <a href="https://publications.waset.org/abstracts/search?q=activities%20of%20daily%20living" title=" activities of daily living"> activities of daily living</a> </p> <a href="https://publications.waset.org/abstracts/158318/proposal-method-of-prediction-of-the-early-stages-of-dementia-using-iot-and-magnet-sensors" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/158318.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">104</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">3207</span> The Role of Online Social Networks in Social Movements: Social Polarization and Violations against Social Unity and Privacy of Individuals in Turkey</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Tolga%20Yaz%C4%B1c%C4%B1">Tolga Yazıcı</a> </p> <p class="card-text"><strong>Abstract:</strong></p> As a matter of the fact that online social networks like Twitter, Facebook and MySpace have experienced an extensive growth in recent years. Social media offers individuals with a tool for communicating and interacting with one another. These social networks enable people to stay in touch with other people and express themselves. This process makes the users of online social networks active creators of content rather than being only consumers of traditional media. That’s why millions of people show strong desire to learn the methods and tools of digital content production and necessary communication skills. However, the booming interest in communication and interaction through online social networks and high level of eagerness to invent and implement the ways to participate in content production raise some privacy and security concerns. This presentation aims to open the assumed revolutionary, democratic and liberating nature of the online social media up for discussion by reviewing some recent political developments in Turkey. Firstly, the role of Internet and online social networks in mobilizing collective movements through social interactions and communications will be questioned. Secondly, some cases from Gezi and Okmeydanı Protests and also December 17-25 period will be presented in order to illustrate misinformation and manipulation in social media and violation of individual privacy through online social networks in order to damage social unity and stability contradictory to democratic nature of online social networking. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=online%20social%20media%20networks" title="online social media networks">online social media networks</a>, <a href="https://publications.waset.org/abstracts/search?q=democratic%20participation" title=" democratic participation"> democratic participation</a>, <a href="https://publications.waset.org/abstracts/search?q=social%20movements" title=" social movements"> social movements</a>, <a href="https://publications.waset.org/abstracts/search?q=social%20polarization" title=" social polarization"> social polarization</a>, <a href="https://publications.waset.org/abstracts/search?q=privacy%20of%20individuals" title=" privacy of individuals"> privacy of individuals</a>, <a href="https://publications.waset.org/abstracts/search?q=Turkey" title=" Turkey"> Turkey</a> </p> <a href="https://publications.waset.org/abstracts/12189/the-role-of-online-social-networks-in-social-movements-social-polarization-and-violations-against-social-unity-and-privacy-of-individuals-in-turkey" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/12189.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">341</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">3206</span> Data Protection, Data Privacy, Research Ethics in Policy Process Towards Effective Urban Planning Practice for Smart Cities</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Eugenio%20Ferrer%20Santiago">Eugenio Ferrer Santiago</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The growing complexities of the modern world on high-end gadgets, software applications, scams, identity theft, and Artificial Intelligence (AI) make the “uninformed” the weak and vulnerable to be victims of cybercrimes. Artificial Intelligence is not a new thing in our daily lives; the principles of database management, logical programming, and garbage in and garbage out are all connected to AI. The Philippines had in place legal safeguards against the abuse of cyberspace, but self-regulation of key industry players and self-protection by individuals are primordial to attain the success of these initiatives. Data protection, Data Privacy, and Research Ethics must work hand in hand during the policy process in the course of urban planning practice in different environments. This paper focuses on the interconnection of data protection, data privacy, and research ethics in coming up with clear-cut policies against perpetrators in the urban planning professional practice relevant in sustainable communities and smart cities. This paper shall use expository methodology under qualitative research using secondary data from related literature, interviews/blogs, and the World Wide Web resources. The claims and recommendations of this paper will help policymakers and implementers in the policy cycle. This paper shall contribute to the body of knowledge as a simple treatise and communication channel to the reading community and future researchers to validate the claims and start an intellectual discourse for better knowledge generation for the good of all in the near future. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=data%20privacy" title="data privacy">data privacy</a>, <a href="https://publications.waset.org/abstracts/search?q=data%20protection" title=" data protection"> data protection</a>, <a href="https://publications.waset.org/abstracts/search?q=urban%20planning" title=" urban planning"> urban planning</a>, <a href="https://publications.waset.org/abstracts/search?q=research%20ethics" title=" research ethics"> research ethics</a> </p> <a href="https://publications.waset.org/abstracts/182034/data-protection-data-privacy-research-ethics-in-policy-process-towards-effective-urban-planning-practice-for-smart-cities" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/182034.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">59</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">3205</span> Mouthing Patterns in Indian Sign Language</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Neha%20Kulshreshtha">Neha Kulshreshtha</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This paper examines the patterns of 'Mouthing', a non-manual marker, and its distribution in Indian Sign Language (ISL). Linguistic research in Indian Sign Language is an emerging field where much is needed to be done. The little research which has happened focuses on the structure of ISL in terms of physical or manual markers, therefore a study of mouthing patterns would give an insight into the distribution of this particular non-manual marker. Data has been collected with the help of native ISL users through various techniques in which natural signs can be captured, for example, storytelling, informal conversations etc. The aim of the study is to find out the various situations where mouthing is used. Sometimes, the mouthing is not actually the articulation of the word as spoken in the local languages. The paper aims to find out whether the mouthing patterns in ISL are influenced by any local language or they are independent of any influence from the local language or both. Mouthing patterns have been studied in many sign languages and an investigation into ISL will reveal whether it falls in pattern with the other sign languages. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=Indian%20sign%20language" title="Indian sign language">Indian sign language</a>, <a href="https://publications.waset.org/abstracts/search?q=mouthing" title=" mouthing"> mouthing</a>, <a href="https://publications.waset.org/abstracts/search?q=non-manual%20marker" title=" non-manual marker"> non-manual marker</a>, <a href="https://publications.waset.org/abstracts/search?q=spoken%20language%20influence" title=" spoken language influence"> spoken language influence</a> </p> <a href="https://publications.waset.org/abstracts/78826/mouthing-patterns-in-indian-sign-language" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/78826.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">265</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">3204</span> Jurisdictional Issues between Competition Law and Data Protection Law in Protection of Privacy of Online Consumers</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Pankhudi%20Khandelwal">Pankhudi Khandelwal</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The revenue models of digital giants such as Facebook and Google, use targeted advertising for revenues. Such a model requires huge amounts of consumer data. While the data protection law deals with the protection of personal data, however, this data is acquired by the companies on the basis of consent, performance of a contract, or legitimate interests. This paper analyses the role that competition law can play in evading these loopholes for the protection of data and privacy of online consumers. Digital markets have certain distinctive features such as network effects and feedback loop, which gives incumbents of these markets a first-mover advantage. This creates a situation where the winner takes it all, thus creating entry barriers and concentration in the market. It has been also seen that this dominant position is then used by the undertakings for leveraging in other markets. This can be harmful to the consumers in form of less privacy, less choice, and stifling innovation, as seen in the cases of Facebook Cambridge Analytica, Google Shopping, and Google Android. Therefore, the article aims to provide a legal framework wherein the data protection law and competition law can come together to provide a balance in regulating digital markets. The issue has become more relevant in light of the Facebook decision by German competition authority, where it was held that Facebook had abused its dominant position by not complying with data protection rules, which constituted an exploitative practice. The paper looks into the jurisdictional boundaries that the data protection and competition authorities can work from and suggests ex ante regulation through data protection law and ex post regulation through competition law. It further suggests a change in the consumer welfare standard where harm to privacy should be considered as an indicator of low quality. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=data%20protection" title="data protection">data protection</a>, <a href="https://publications.waset.org/abstracts/search?q=dominance" title=" dominance"> dominance</a>, <a href="https://publications.waset.org/abstracts/search?q=ex%20ante%20regulation" title=" ex ante regulation"> ex ante regulation</a>, <a href="https://publications.waset.org/abstracts/search?q=ex%20post%20regulation" title=" ex post regulation"> ex post regulation</a> </p> <a href="https://publications.waset.org/abstracts/122758/jurisdictional-issues-between-competition-law-and-data-protection-law-in-protection-of-privacy-of-online-consumers" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/122758.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">183</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">3203</span> The Impact of Cryptocurrency Classification on Money Laundering: Analyzing the Preferences of Criminals for Stable Coins, Utility Coins, and Privacy Tokens</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Mohamed%20Saad">Mohamed Saad</a>, <a href="https://publications.waset.org/abstracts/search?q=Huda%20Ismail"> Huda Ismail</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The purpose of this research is to examine the impact of cryptocurrency classification on money laundering crimes and to analyze how the preferences of criminals differ according to the type of digital currency used. Specifically, we aim to explore the roles of stablecoins, utility coins, and privacy tokens in facilitating or hindering money laundering activities and to identify the key factors that influence the choices of criminals in using these cryptocurrencies. To achieve our research objectives, we used a dataset for the most highly traded cryptocurrencies (32 currencies) that were published on the coin market cap for 2022. In addition to conducting a comprehensive review of the existing literature on cryptocurrency and money laundering, with a focus on stablecoins, utility coins, and privacy tokens, Furthermore, we conducted several Multivariate analyses. Our study reveals that the classification of cryptocurrency plays a significant role in money laundering activities, as criminals tend to prefer certain types of digital currencies over others, depending on their specific needs and goals. Specifically, we found that stablecoins are more commonly used in money laundering due to their relatively stable value and low volatility, which makes them less risky to hold and transfer. Utility coins, on the other hand, are less frequently used in money laundering due to their lack of anonymity and limited liquidity. Finally, privacy tokens, such as Monero and Zcash, are increasingly becoming a preferred choice among criminals due to their high degree of privacy and untraceability. In summary, our study highlights the importance of understanding the nuances of cryptocurrency classification in the context of money laundering and provides insights into the preferences of criminals in using digital currencies for illegal activities. Based on our findings, our recommendation to the policymakers is to address the potential misuse of cryptocurrencies for money laundering. By implementing measures to regulate stable coins, strengthening cross-border cooperation, fostering public-private partnerships, and increasing cooperation, policymakers can help prevent and detect money laundering activities involving digital currencies. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=crime" title="crime">crime</a>, <a href="https://publications.waset.org/abstracts/search?q=cryptocurrency" title=" cryptocurrency"> cryptocurrency</a>, <a href="https://publications.waset.org/abstracts/search?q=money%20laundering" title=" money laundering"> money laundering</a>, <a href="https://publications.waset.org/abstracts/search?q=tokens." title=" tokens."> tokens.</a> </p> <a href="https://publications.waset.org/abstracts/165802/the-impact-of-cryptocurrency-classification-on-money-laundering-analyzing-the-preferences-of-criminals-for-stable-coins-utility-coins-and-privacy-tokens" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/165802.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">87</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">3202</span> Using Eye-Tracking to Investigate TEM Validity and Design</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Cao%20Xi">Cao Xi</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This paper reports a study which used eye-tracking to examine the cognitive validity of TEM 8(Test for English Majors, Band 8). The study investigated test takers' reading patterns on four -item types using eye-tracking, and interviews. Thirty participants completed 22 items on a computer, with the Tobii X2 Eye Tracker recording their eye movements on screen. Eleven students further participated in a recall interview while viewing video footage of their gaze patterns on the test. The findings will indicate that first, different reading item types will employ different cognitive processes; then different reading patterns for stronger and weaker test takers’on each item types. The implication of this study is to provide recommendations for the use of eye tracking technology in language research. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=eye%20tracking" title="eye tracking">eye tracking</a>, <a href="https://publications.waset.org/abstracts/search?q=reading%20patterns" title=" reading patterns"> reading patterns</a>, <a href="https://publications.waset.org/abstracts/search?q=test%20for%20english%20majors" title=" test for english majors"> test for english majors</a>, <a href="https://publications.waset.org/abstracts/search?q=cognitive%20validity" title=" cognitive validity"> cognitive validity</a> </p> <a href="https://publications.waset.org/abstracts/145848/using-eye-tracking-to-investigate-tem-validity-and-design" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/145848.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">160</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">3201</span> Blockchain for IoT Security and Privacy in Healthcare Sector</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Umair%20Shafique">Umair Shafique</a>, <a href="https://publications.waset.org/abstracts/search?q=Hafiz%20Usman%20Zia"> Hafiz Usman Zia</a>, <a href="https://publications.waset.org/abstracts/search?q=Fiaz%20Majeed"> Fiaz Majeed</a>, <a href="https://publications.waset.org/abstracts/search?q=Samina%20Naz"> Samina Naz</a>, <a href="https://publications.waset.org/abstracts/search?q=Javeria%20Ahmed"> Javeria Ahmed</a>, <a href="https://publications.waset.org/abstracts/search?q=Maleeha%20Zainab"> Maleeha Zainab</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The Internet of Things (IoT) has become a hot topic for the last couple of years. This innovative technology has shown promising progress in various areas, and the world has witnessed exponential growth in multiple application domains. Researchers are working to investigate its aptitudes to get the best from it by harnessing its true potential. But at the same time, IoT networks open up a new aspect of vulnerability and physical threats to data integrity, privacy, and confidentiality. It's is due to centralized control, data silos approach for handling information, and a lack of standardization in the IoT networks. As we know, blockchain is a new technology that involves creating secure distributed ledgers to store and communicate data. Some of the benefits include resiliency, integrity, anonymity, decentralization, and autonomous control. The potential for blockchain technology to provide the key to managing and controlling IoT has created a new wave of excitement around the idea of putting that data back into the hands of the end-users. In this manuscript, we have proposed a model that combines blockchain and IoT networks to address potential security and privacy issues in the healthcare domain. Then we try to describe various application areas, challenges, and future directions in the healthcare sector where blockchain platforms merge with IoT networks. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=IoT" title="IoT">IoT</a>, <a href="https://publications.waset.org/abstracts/search?q=blockchain" title=" blockchain"> blockchain</a>, <a href="https://publications.waset.org/abstracts/search?q=cryptocurrency" title=" cryptocurrency"> cryptocurrency</a>, <a href="https://publications.waset.org/abstracts/search?q=healthcare" title=" healthcare"> healthcare</a>, <a href="https://publications.waset.org/abstracts/search?q=consensus" title=" consensus"> consensus</a>, <a href="https://publications.waset.org/abstracts/search?q=data" title=" data"> data</a> </p> <a href="https://publications.waset.org/abstracts/148647/blockchain-for-iot-security-and-privacy-in-healthcare-sector" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/148647.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">180</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">3200</span> Nordic Study on Public Acceptance of Drones</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Virpi%20Oksman">Virpi Oksman</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Drones are new phenomenon in public spaces. Adoption of this kind of new technologies requires public acceptance. Drones and other unmanned aerial systems may have various impacts on people’s living environments, and the public is exposed to possible disadvantages of drones. Public acceptance may be expressed as positive or negative attitude by majority of the citizens towards the new technology or service or as rapid adoption of it in everyday life. In various parts of the globe, in cities and in rural areas, drones as emerging technologies are perceived quite differently. Public acceptance studies of drones have been conducted mostly in highly urbanized environments like in Singapore and in European cities. This paper presents results of a Nordic survey study (N=1000) conducted in Sweden and in Finland. The survey aims at understanding the level of acceptance of different uses of drones in public spaces and the main concerns and benefits related to emerging UAM technologies. The study shows that even though the general attitude towards drones is quite positive, privacy and safety, and noise levels are the main concerns by Nordic citizens. Also, for what purpose and by whom the drones are operated affects the acceptability significantly. The study concludes, that there is need for regulations that safeguard public interests. In addition, considering privacy in design, and quiet environmentally friendly drones support public acceptance of drones. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=public%20acceptance" title="public acceptance">public acceptance</a>, <a href="https://publications.waset.org/abstracts/search?q=privacy" title=" privacy"> privacy</a>, <a href="https://publications.waset.org/abstracts/search?q=safety" title=" safety"> safety</a>, <a href="https://publications.waset.org/abstracts/search?q=survey" title=" survey"> survey</a> </p> <a href="https://publications.waset.org/abstracts/145524/nordic-study-on-public-acceptance-of-drones" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/145524.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">166</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">3199</span> A Study of New Window Typology for Palestinian Residential Building for More Sustainable Building</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Nisreen%20Ardda">Nisreen Ardda</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Fenestrations are one of the main building envelope elements that play an important role in home social-ecological l factors. They play a vital role in providing natural lighting and ventilation, visual, thermal, and acoustical comfort, and also provide weather-tightness, privacy, a feeling of openness. In most home buildings, fenestrations are controlled manually by the occupants, which significantly impacts occupants' comfort and energy use. Culture plays a central role in the Palestinians window operation behavior. Improved windows design that provides the desired privacy while maintaining the appropriate function of fenestration (natural lighting, thermal comfort, and visual openness) is becoming a necessity. Therefore, this paper proposes a window typology to achieve the social and environmental factors in residential buildings in the West Bank. The window typology and reference building were designed in Rivet 2021, and natural ventilation was carried out in Design Builder 4.3.0.039. The results showed that the proposed typology provides the desired privacy and the feeling of openness without compromising natural ventilation as the existing window did. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=window%20design" title="window design">window design</a>, <a href="https://publications.waset.org/abstracts/search?q=passive%20design" title=" passive design"> passive design</a>, <a href="https://publications.waset.org/abstracts/search?q=sustainable%20built%20environment" title=" sustainable built environment"> sustainable built environment</a>, <a href="https://publications.waset.org/abstracts/search?q=building%20material" title=" building material"> building material</a> </p> <a href="https://publications.waset.org/abstracts/141764/a-study-of-new-window-typology-for-palestinian-residential-building-for-more-sustainable-building" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/141764.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">186</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">3198</span> Isolation Preserving Medical Conclusion Hold Structure via C5 Algorithm</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Swati%20Kishor%20Zode">Swati Kishor Zode</a>, <a href="https://publications.waset.org/abstracts/search?q=Rahul%20Ambekar"> Rahul Ambekar</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Data mining is the extraction of fascinating examples on the other hand information from enormous measure of information and choice is made as indicated by the applicable information extracted. As of late, with the dangerous advancement in internet, stockpiling of information and handling procedures, privacy preservation has been one of the major (higher) concerns in data mining. Various techniques and methods have been produced for protection saving data mining. In the situation of Clinical Decision Support System, the choice is to be made on the premise of the data separated from the remote servers by means of Internet to diagnose the patient. In this paper, the fundamental thought is to build the precision of Decision Support System for multiple diseases for different maladies and in addition protect persistent information while correspondence between Clinician side (Client side) also, the Server side. A privacy preserving protocol for clinical decision support network is proposed so that patients information dependably stay scrambled amid diagnose prepare by looking after the accuracy. To enhance the precision of Decision Support System for various malady C5.0 classifiers and to save security, a Homomorphism encryption algorithm Paillier cryptosystem is being utilized. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=classification" title="classification">classification</a>, <a href="https://publications.waset.org/abstracts/search?q=homomorphic%20encryption" title=" homomorphic encryption"> homomorphic encryption</a>, <a href="https://publications.waset.org/abstracts/search?q=clinical%20decision%20support" title=" clinical decision support"> clinical decision support</a>, <a href="https://publications.waset.org/abstracts/search?q=privacy" title=" privacy "> privacy </a> </p> <a href="https://publications.waset.org/abstracts/32625/isolation-preserving-medical-conclusion-hold-structure-via-c5-algorithm" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/32625.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">330</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">3197</span> Neuro-Fuzzy Based Model for Phrase Level Emotion Understanding</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Vadivel%20Ayyasamy">Vadivel Ayyasamy</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The present approach deals with the identification of Emotions and classification of Emotional patterns at Phrase-level with respect to Positive and Negative Orientation. The proposed approach considers emotion triggered terms, its co-occurrence terms and also associated sentences for recognizing emotions. The proposed approach uses Part of Speech Tagging and Emotion Actifiers for classification. Here sentence patterns are broken into phrases and Neuro-Fuzzy model is used to classify which results in 16 patterns of emotional phrases. Suitable intensities are assigned for capturing the degree of emotion contents that exist in semantics of patterns. These emotional phrases are assigned weights which supports in deciding the Positive and Negative Orientation of emotions. The approach uses web documents for experimental purpose and the proposed classification approach performs well and achieves good F-Scores. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=emotions" title="emotions">emotions</a>, <a href="https://publications.waset.org/abstracts/search?q=sentences" title=" sentences"> sentences</a>, <a href="https://publications.waset.org/abstracts/search?q=phrases" title=" phrases"> phrases</a>, <a href="https://publications.waset.org/abstracts/search?q=classification" title=" classification"> classification</a>, <a href="https://publications.waset.org/abstracts/search?q=patterns" title=" patterns"> patterns</a>, <a href="https://publications.waset.org/abstracts/search?q=fuzzy" title=" fuzzy"> fuzzy</a>, <a href="https://publications.waset.org/abstracts/search?q=positive%20orientation" title=" positive orientation"> positive orientation</a>, <a href="https://publications.waset.org/abstracts/search?q=negative%20orientation" title=" negative orientation "> negative orientation </a> </p> <a href="https://publications.waset.org/abstracts/62118/neuro-fuzzy-based-model-for-phrase-level-emotion-understanding" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/62118.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">378</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">3196</span> Study on Security and Privacy Issues of Mobile Operating Systems Based on Malware Attacks</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Huang%20Dennis">Huang Dennis</a>, <a href="https://publications.waset.org/abstracts/search?q=Aurelio%20Aziel"> Aurelio Aziel</a>, <a href="https://publications.waset.org/abstracts/search?q=Burra%20Venkata%20Durga%20Kumar"> Burra Venkata Durga Kumar</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Nowadays, smartphones and mobile operating systems have been popularly widespread in our daily lives. As people use smartphones, they tend to store more private and essential data on their devices, because of this it is very important to develop more secure mobile operating systems and cloud storage to secure the data. However, several factors can cause security risks in mobile operating systems such as malware, malicious app, phishing attacks, ransomware, and more, all of which can cause a big problem for users as they can access the user's private data. Those problems can cause data loss, financial loss, identity theft, and other serious consequences. Other than that, during the pandemic, people will use their mobile devices more and do all sorts of transactions online, which may lead to more victims of online scams and inexperienced users being the target. With the increase in attacks, researchers have been actively working to develop several countermeasures to enhance the security of operating systems. This study aims to provide an overview of the security and privacy issues in mobile operating systems, identifying the potential risk of operating systems, and the possible solutions. By examining these issues, we want to provide an easy understanding to users and researchers to improve knowledge and develop more secure mobile operating systems. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=mobile%20operating%20system" title="mobile operating system">mobile operating system</a>, <a href="https://publications.waset.org/abstracts/search?q=security" title=" security"> security</a>, <a href="https://publications.waset.org/abstracts/search?q=privacy" title=" privacy"> privacy</a>, <a href="https://publications.waset.org/abstracts/search?q=Malware" title=" Malware"> Malware</a> </p> <a href="https://publications.waset.org/abstracts/168876/study-on-security-and-privacy-issues-of-mobile-operating-systems-based-on-malware-attacks" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/168876.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">88</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">3195</span> Analysis of Street Utilization Patterns in Makurdi, Benue State, Nigeria</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=I.%20D.%20Mngutyo">I. D. Mngutyo</a>, <a href="https://publications.waset.org/abstracts/search?q=T.%20T.%20Gyuse"> T. T. Gyuse</a>, <a href="https://publications.waset.org/abstracts/search?q=D.%20S.%20A.%20Alaci"> D. S. A. Alaci</a>, <a href="https://publications.waset.org/abstracts/search?q=J.%20Atser"> J. Atser</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Streets are public spaces that are meaningful to all people because of lack of restriction on streets. Studies show that conditions, activities and people contribute to the success of public spaces. Also, self-organization potential in activity patterns offers a prospect for the revitalization of an urban area. This potential is mostly ignored hence many African streets appear disorganized giving African urban areas an unplanned look. Therefore, this study aims to analyze street utilization patterns and explore the relationship between the pattern of street use and condition of streets in Makurdi.These activity patterns form a data base for the revitalization of public space. Three major and minor arterials streets in nine out of the eleven wards that make up the built up part of Makurdi were purposively selected as units for measurement. A street activity audit was done on streets for activities that can be observed. For activities that cannot be easily observed 4 questionnaires were randomly administered on each of the three streets giving a total of 108 questionnaires. Multivariate statistical tools such as factor analysis and regression will be used to show emerging streets activity patterns and spatial variation among the nine wards. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=streets" title="streets">streets</a>, <a href="https://publications.waset.org/abstracts/search?q=utilization%20patterns" title=" utilization patterns"> utilization patterns</a>, <a href="https://publications.waset.org/abstracts/search?q=revitalization" title=" revitalization"> revitalization</a>, <a href="https://publications.waset.org/abstracts/search?q=urban%20design" title=" urban design"> urban design</a>, <a href="https://publications.waset.org/abstracts/search?q=urban" title=" urban"> urban</a>, <a href="https://publications.waset.org/abstracts/search?q=areas" title=" areas"> areas</a>, <a href="https://publications.waset.org/abstracts/search?q=developing%20countries" title=" developing countries"> developing countries</a> </p> <a href="https://publications.waset.org/abstracts/39770/analysis-of-street-utilization-patterns-in-makurdi-benue-state-nigeria" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/39770.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">441</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">3194</span> The Admissibility of Evidence Obtained in Contravention of the Right to Privacy in a Criminal Trial: A Comparative Study of Poland and Germany</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Konstancja%20Syller">Konstancja Syller</a> </p> <p class="card-text"><strong>Abstract:</strong></p> International law and European regulations remain hardly silent about the admissibility of evidence obtained illegally in a criminal trial. However, Article 6 of the European Convention on Human Rights guarantees the right to a fair trial, it does not normalise a proceeding status of specified sources or means of proof outright. Therefore, it is the preserve of national legislation and national law enforcement authorities to decide on this matter. In most countries, especially in Germany and Poland, a rather complex normative approach to the issue of proof obtained in violation of the right to privacy is evident, which pursues in practise to many interpretive doubts. In Germany the jurisprudence has a significant impact within the range of the matter mentioned above. The Constitutional Court and the Supreme Court of Germany protect the right to privacy quite firmly - they ruled on inadmissibility of obtaining a proof in the form of a diary or a journal as a protection measure of constitutional guaranteed right. At the same time, however, the Supreme Court is not very convinced with reference to the issue of whether materials collected as a result of an inspection, call recordings or listening to the premises, which were carried out in breach of law, can be used in a criminal trial. Generally speaking, German courts indicate a crucial importance of the principle of Truth and the principle of proportionality, which both enable a judgement to be made as to the possibility of using an evidence obtained unlawfully. Comparing, in Poland there is almost no jurisprudence of the Constitutional Tribunal relating directly to the issue of illegal evidence. It is somehow surprising, considering the doctrinal analysis of the admissibility of using such proof in a criminal trial is performed in relation to standards resulted from the Constitution. Moreover, a crucial de lega lata legal provision, which enables allowing a proof obtained in infringement of the provisions in respect of criminal proceedings or through a forbidden act, is widely criticised within the legal profession ant therefore many courts give it their own interpretation at odds with legislator’s intentions. The comparison of two civil law legal systems’ standards regarding to the admissibility of an evidence obtained in contravention of the right to privacy in a criminal trial, taking also into account EU legislation and judicature, is the conclusive aim of this article. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=criminal%20trial" title="criminal trial">criminal trial</a>, <a href="https://publications.waset.org/abstracts/search?q=evidence" title=" evidence"> evidence</a>, <a href="https://publications.waset.org/abstracts/search?q=Germany" title=" Germany"> Germany</a>, <a href="https://publications.waset.org/abstracts/search?q=right%20to%20privacy" title=" right to privacy"> right to privacy</a>, <a href="https://publications.waset.org/abstracts/search?q=Poland" title=" Poland"> Poland</a> </p> <a href="https://publications.waset.org/abstracts/131119/the-admissibility-of-evidence-obtained-in-contravention-of-the-right-to-privacy-in-a-criminal-trial-a-comparative-study-of-poland-and-germany" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/131119.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">156</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">3193</span> The Effect of Artificial Intelligence on International Law, Legal Security and Privacy Issues</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Akram%20Waheb%20Nasef%20Alzordoky">Akram Waheb Nasef Alzordoky</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The wars and armed conflicts have frequently ended in violations of global humanitarian law and regularly devote the maximum severe global crimes, which include war crimes, crimes towards humanity, aggression and genocide. But, simplest inside the XX century, the guideline changed into an articulated idea of establishing a frame of worldwide criminal justice so that you can prosecute those crimes and their perpetrators. The first steps on this subject were made with the aid of setting up the worldwide army tribunals for warfare crimes at Nuremberg and Tokyo, and the formation of ad hoc tribunals for the former Yugoslavia and Rwanda. Ultimately, the global criminal courtroom was established in Rome in 1998 with the aim of justice and that allows you to give satisfaction to the sufferers of crimes and their families. The aim of the paper was to provide an ancient and comparative analysis of the establishments of worldwide criminal justice primarily based on which those establishments de lege lata fulfilled the goals of individual criminal responsibility and justice. Moreover, the authors endorse de lege ferenda that the everlasting global crook Tribunal, in addition to the potential case, additionally takes over the current ICTY and ICTR cases. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=social%20networks%20privacy%20issues" title="social networks privacy issues">social networks privacy issues</a>, <a href="https://publications.waset.org/abstracts/search?q=social%20networks%20security%20issues" title=" social networks security issues"> social networks security issues</a>, <a href="https://publications.waset.org/abstracts/search?q=social%20networks%20privacy%20precautions%20measures" title=" social networks privacy precautions measures"> social networks privacy precautions measures</a>, <a href="https://publications.waset.org/abstracts/search?q=social%20networks%20security%20precautions%20measures" title=" social networks security precautions measures"> social networks security precautions measures</a> </p> <a href="https://publications.waset.org/abstracts/190127/the-effect-of-artificial-intelligence-on-international-law-legal-security-and-privacy-issues" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/190127.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">21</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">3192</span> Acceptance of Health Information Application in Smart National Identity Card (SNIC) Using a New I-P Framework</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Ismail%20Bile%20Hassan">Ismail Bile Hassan</a>, <a href="https://publications.waset.org/abstracts/search?q=Masrah%20Azrifah%20Azmi%20Murad"> Masrah Azrifah Azmi Murad</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This study discovers a novel framework of individual level technology adoption known as I-P (Individual- Privacy) towards Smart National Identity Card health information application. Many countries introduced smart national identity card (SNIC) with various applications such as health information application embedded inside it. However, the degree to which citizens accept and use some of the embedded applications in smart national identity remains unknown to many governments and application providers as well. Moreover, the previous studies revealed that the factors of trust, perceived risk, privacy concern and perceived credibility need to be incorporated into more comprehensive models such as extended Unified Theory of Acceptance and Use of Technology known as UTAUT2. UTAUT2 is a mainly widespread and leading theory existing in the information system literature up to now. This research identifies factors affecting the citizens’ behavioural intention to use health information application embedded in SNIC and extends better understanding on the relevant factors that the government and the application providers would need to consider in predicting citizens’ new technology acceptance in the future. We propose a conceptual framework by combining the UTAUT2 and Privacy Calculus Model constructs and also adding perceived credibility as a new variable. The proposed framework may provide assistance to any government planning, decision, and policy makers involving e-government projects. The empirical study may be conducted in the future to provide proof and empirically validate this I-P framework. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=unified%20theory%20of%20acceptance%20and%20use%20of%20technology%20%28UTAUT%29%20model" title="unified theory of acceptance and use of technology (UTAUT) model">unified theory of acceptance and use of technology (UTAUT) model</a>, <a href="https://publications.waset.org/abstracts/search?q=UTAUT2%20model" title=" UTAUT2 model"> UTAUT2 model</a>, <a href="https://publications.waset.org/abstracts/search?q=smart%20national%20identity%20card%20%28SNIC%29" title=" smart national identity card (SNIC)"> smart national identity card (SNIC)</a>, <a href="https://publications.waset.org/abstracts/search?q=health%20information%20application" title=" health information application"> health information application</a>, <a href="https://publications.waset.org/abstracts/search?q=privacy%20calculus%20model%20%28PCM%29" title=" privacy calculus model (PCM)"> privacy calculus model (PCM)</a> </p> <a href="https://publications.waset.org/abstracts/10398/acceptance-of-health-information-application-in-smart-national-identity-card-snic-using-a-new-i-p-framework" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/10398.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">468</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">3191</span> The Environmental Influence on Slow Learners&#039; Learning Achievement</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Niphattha%20Hannapha">Niphattha Hannapha</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This paper examines how the classroom environment influences slow learners’ learning achievement; it focuses on how seating patterns affect students’ behaviours and which patterns best contribute to students’ learning performance. The researcher studied how slow learners’ characteristics and seating patterns influenced their behaviours and performance at Ban Hin Lad School. As a nonparticipant observation, the target groups included 15 slow learners from Prathomsueksa (Grades) 4 and 5. Students’ behaviours were recorded during their learning activities in order to minimize their reading and written expression disorder in Thai language tutorials. The result showed four seating patterns and two behaviors which obstructed students’ learning. The average of both behaviours mostly occurred when students were seated with patterns 1 (the seat facing the door, with the corridor alongside) and 3 (the seat alongside the door, facing the aisle) respectively. Seating patterns 1 and 3 demonstrated visibility (the front and side) of a walking path with two-way movement. However, seating patterns 2 (seating with the door alongside and the aisle at the back) and 4 (sitting with the door at the back and the aisle alongside) demonstrated visibility (the side) of a walking path with one-way movement. In Summary, environmental design is important to enhance concentration in slow learners who have reading and writing disabilities. This study suggests that students should be seated where they can have the least visibility of movement to help them increase continuous learning. That means they can have a better chance of developing reading and writing abilities in comparison with other patterns of seating. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=slow%20learning" title="slow learning">slow learning</a>, <a href="https://publications.waset.org/abstracts/search?q=interior%20design" title=" interior design"> interior design</a>, <a href="https://publications.waset.org/abstracts/search?q=interior%20environment" title=" interior environment"> interior environment</a>, <a href="https://publications.waset.org/abstracts/search?q=classroom" title=" classroom"> classroom</a> </p> <a href="https://publications.waset.org/abstracts/76865/the-environmental-influence-on-slow-learners-learning-achievement" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/76865.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">214</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">3190</span> Examination of the Main Behavioral Patterns of Male and Female Students in Islamic Azad University </h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Sobhan%20Sobhani">Sobhan Sobhani </a> </p> <p class="card-text"><strong>Abstract:</strong></p> This study examined the behavioral patterns of student and their determinants according to the "symbolic interaction" sociological perspective in the form of 7 hypotheses. Behavioral patterns of students were classified in 8 categories: religious, scientific, political, artistic, sporting, national, parents and teachers. They were evaluated by student opinions by a five-point Likert rating scale. The statistical population included all male and female students of Islamic Azad University, Behabahan branch, among which 600 patients (268 females and 332 males) were selected randomly. The following statistical methods were used: frequency and percentage, mean, t-test, Pearson correlation coefficient and multi-way analysis of variance. The results obtained from statistical analysis showed that: 1-There is a significant difference between male and female students in terms of disposition to religious figures, artists, teachers and parents. 2-There is a significant difference between students of urban and rural areas in terms of assuming behavioral patterns of religious, political, scientific, artistic, national figures and teachers. 3-The most important criterion for selecting behavioral patterns of students is intellectual understanding with the pattern. 4-The most important factor influencing the behavioral patterns of male and female students is parents followed by friends. 5-Boys are affected by teachers, the Internet and satellite programs more than girls. Girls assume behavioral patterns from books more than boys. 6-There is a significant difference between students in human sciences, technical, medical and engineering disciplines in terms of selecting religious and political figures as behavioral patterns. 7-There is a significant difference between students belonging to different subcultures in terms of assuming behavioral patterns of religious, scientific and cultural figures. 8-Between the first and fourth year students in terms of selecting behavioral patterns, there is a significant difference only in selecting religious figures. 9-There is a significant negative correlation between the education level of parents and the selection of religious and political figures and teachers. 10-There is a significant negative correlation between family income and the selection of political and religious figures. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=behavioral%20patterns" title="behavioral patterns">behavioral patterns</a>, <a href="https://publications.waset.org/abstracts/search?q=behavioral%20patterns" title=" behavioral patterns"> behavioral patterns</a>, <a href="https://publications.waset.org/abstracts/search?q=male%20and%20female%20students" title=" male and female students"> male and female students</a>, <a href="https://publications.waset.org/abstracts/search?q=Islamic%20Azad%20University" title=" Islamic Azad University"> Islamic Azad University</a> </p> <a href="https://publications.waset.org/abstracts/6586/examination-of-the-main-behavioral-patterns-of-male-and-female-students-in-islamic-azad-university" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/6586.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">365</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">3189</span> Several Spectrally Non-Arbitrary Ray Patterns of Order 4</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Ling%20Zhang">Ling Zhang</a>, <a href="https://publications.waset.org/abstracts/search?q=Feng%20Liu"> Feng Liu</a> </p> <p class="card-text"><strong>Abstract:</strong></p> A matrix is called a ray pattern matrix if its entries are either 0 or a ray in complex plane which originates from 0. A ray pattern <em>A </em>of order <em>n </em>is called spectrally arbitrary if the complex matrices in the ray pattern class of <em>A</em> give rise to all possible <em>n</em>th degree complex polynomial. Otherwise, it is said to be spectrally non-arbitrary ray pattern<em>.</em> We call that a spectrally arbitrary ray pattern <em>A </em>of order <em>n </em>is minimally spectrally arbitrary if any nonzero entry of <em>A</em> is replaced, then <em>A </em>is not spectrally arbitrary. In this paper, we find that is not spectrally arbitrary when n equals to 4 for any &theta; which is greater than or equal to 0 and less than or equal to n. In this article, we give several ray patterns A(&theta;) of order n that are not spectrally arbitrary for some &theta; which is greater than or equal to 0 and less than or equal to n. by using the nilpotent-Jacobi method. One example is given in our paper. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=spectrally%20arbitrary" title="spectrally arbitrary">spectrally arbitrary</a>, <a href="https://publications.waset.org/abstracts/search?q=nilpotent%20matrix" title=" nilpotent matrix "> nilpotent matrix </a>, <a href="https://publications.waset.org/abstracts/search?q=ray%20patterns" title=" ray patterns"> ray patterns</a>, <a href="https://publications.waset.org/abstracts/search?q=sign%20patterns" title=" sign patterns"> sign patterns</a> </p> <a href="https://publications.waset.org/abstracts/108116/several-spectrally-non-arbitrary-ray-patterns-of-order-4" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/108116.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">184</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">3188</span> Data Monetisation by E-commerce Companies: A Need for a Regulatory Framework in India</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Anushtha%20Saxena">Anushtha Saxena</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This paper examines the process of data monetisation bye-commerce companies operating in India. Data monetisation is collecting, storing, and analysing consumers’ data to use further the data that is generated for profits, revenue, etc. Data monetisation enables e-commerce companies to get better businesses opportunities, innovative products and services, a competitive edge over others to the consumers, and generate millions of revenues. This paper analyses the issues and challenges that are faced due to the process of data monetisation. Some of the issues highlighted in the paper pertain to the right to privacy, protection of data of e-commerce consumers. At the same time, data monetisation cannot be prohibited, but it can be regulated and monitored by stringent laws and regulations. The right to privacy isa fundamental right guaranteed to the citizens of India through Article 21 of The Constitution of India. The Supreme Court of India recognized the Right to Privacy as a fundamental right in the landmark judgment of Justice K.S. Puttaswamy (Retd) and Another v. Union of India . This paper highlights the legal issue of how e-commerce businesses violate individuals’ right to privacy by using the data collected, stored by them for economic gains and monetisation and protection of data. The researcher has mainly focused on e-commerce companies like online shopping websitesto analyse the legal issue of data monetisation. In the Internet of Things and the digital age, people have shifted to online shopping as it is convenient, easy, flexible, comfortable, time-consuming, etc. But at the same time, the e-commerce companies store the data of their consumers and use it by selling to the third party or generating more data from the data stored with them. This violatesindividuals’ right to privacy because the consumers do not know anything while giving their data online. Many times, data is collected without the consent of individuals also. Data can be structured, unstructured, etc., that is used by analytics to monetise. The Indian legislation like The Information Technology Act, 2000, etc., does not effectively protect the e-consumers concerning their data and how it is used by e-commerce businesses to monetise and generate revenues from that data. The paper also examines the draft Data Protection Bill, 2021, pending in the Parliament of India, and how this Bill can make a huge impact on data monetisation. This paper also aims to study the European Union General Data Protection Regulation and how this legislation can be helpful in the Indian scenarioconcerning e-commerce businesses with respect to data monetisation. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=data%20monetization" title="data monetization">data monetization</a>, <a href="https://publications.waset.org/abstracts/search?q=e-commerce%20companies" title=" e-commerce companies"> e-commerce companies</a>, <a href="https://publications.waset.org/abstracts/search?q=regulatory%20framework" title=" regulatory framework"> regulatory framework</a>, <a href="https://publications.waset.org/abstracts/search?q=GDPR" title=" GDPR"> GDPR</a> </p> <a href="https://publications.waset.org/abstracts/148776/data-monetisation-by-e-commerce-companies-a-need-for-a-regulatory-framework-in-india" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/148776.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">120</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">3187</span> Learning the Dynamics of Articulated Tracked Vehicles</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Mario%20Gianni">Mario Gianni</a>, <a href="https://publications.waset.org/abstracts/search?q=Manuel%20A.%20Ruiz%20Garcia"> Manuel A. Ruiz Garcia</a>, <a href="https://publications.waset.org/abstracts/search?q=Fiora%20Pirri"> Fiora Pirri</a> </p> <p class="card-text"><strong>Abstract:</strong></p> In this work, we present a Bayesian non-parametric approach to model the motion control of ATVs. The motion control model is based on a Dirichlet Process-Gaussian Process (DP-GP) mixture model. The DP-GP mixture model provides a flexible representation of patterns of control manoeuvres along trajectories of different lengths and discretizations. The model also estimates the number of patterns, sufficient for modeling the dynamics of the ATV. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=Dirichlet%20processes" title="Dirichlet processes">Dirichlet processes</a>, <a href="https://publications.waset.org/abstracts/search?q=gaussian%20mixture%20models" title=" gaussian mixture models"> gaussian mixture models</a>, <a href="https://publications.waset.org/abstracts/search?q=learning%20motion%20patterns" title=" learning motion patterns"> learning motion patterns</a>, <a href="https://publications.waset.org/abstracts/search?q=tracked%20robots%20for%20urban%20search%20and%20rescue" title=" tracked robots for urban search and rescue"> tracked robots for urban search and rescue</a> </p> <a href="https://publications.waset.org/abstracts/45613/learning-the-dynamics-of-articulated-tracked-vehicles" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/45613.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">449</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">3186</span> Governance, Risk Management, and Compliance Factors Influencing the Adoption of Cloud Computing in Australia</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Tim%20Nedyalkov">Tim Nedyalkov</a> </p> <p class="card-text"><strong>Abstract:</strong></p> A business decision to move to the cloud brings fundamental changes in how an organization develops and delivers its Information Technology solutions. The accelerated pace of digital transformation across businesses and government agencies increases the reliance on cloud-based services. They are collecting, managing, and retaining large amounts of data in cloud environments makes information security and data privacy protection essential. It becomes even more important to understand what key factors drive successful cloud adoption following the commencement of the Privacy Amendment Notifiable Data Breaches (NDB) Act 2017 in Australia as the regulatory changes impact many organizations and industries. This quantitative correlational research investigated the governance, risk management, and compliance factors contributing to cloud security success. The factors influence the adoption of cloud computing within an organizational context after the commencement of the NDB scheme. The results and findings demonstrated that corporate information security policies, data storage location, management understanding of data governance responsibilities, and regular compliance assessments are the factors influencing cloud computing adoption. The research has implications for organizations, future researchers, practitioners, policymakers, and cloud computing providers to meet the rapidly changing regulatory and compliance requirements. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=cloud%20compliance" title="cloud compliance">cloud compliance</a>, <a href="https://publications.waset.org/abstracts/search?q=cloud%20security" title=" cloud security"> cloud security</a>, <a href="https://publications.waset.org/abstracts/search?q=data%20governance" title=" data governance"> data governance</a>, <a href="https://publications.waset.org/abstracts/search?q=privacy%20protection" title=" privacy protection"> privacy protection</a> </p> <a href="https://publications.waset.org/abstracts/148053/governance-risk-management-and-compliance-factors-influencing-the-adoption-of-cloud-computing-in-australia" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/148053.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">116</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">3185</span> Secure Data Sharing of Electronic Health Records With Blockchain</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Kenneth%20Harper">Kenneth Harper</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The secure sharing of Electronic Health Records (EHRs) is a critical challenge in modern healthcare, demanding solutions to enhance interoperability, privacy, and data integrity. Traditional standards like Health Information Exchange (HIE) and HL7 have made significant strides in facilitating data exchange between healthcare entities. However, these approaches rely on centralized architectures that are often vulnerable to data breaches, lack sufficient privacy measures, and have scalability issues. This paper proposes a framework for secure, decentralized sharing of EHRs using blockchain technology, cryptographic tokens, and Non-Fungible Tokens (NFTs). The blockchain's immutable ledger, decentralized control, and inherent security mechanisms are leveraged to improve transparency, accountability, and auditability in healthcare data exchanges. Furthermore, we introduce the concept of tokenizing patient data through NFTs, creating unique digital identifiers for each record, which allows for granular data access controls and proof of data ownership. These NFTs can also be employed to grant access to authorized parties, establishing a secure and transparent data sharing model that empowers both healthcare providers and patients. The proposed approach addresses common privacy concerns by employing privacy-preserving techniques such as zero-knowledge proofs (ZKPs) and homomorphic encryption to ensure that sensitive patient information can be shared without exposing the actual content of the data. This ensures compliance with regulations like HIPAA and GDPR. Additionally, the integration of Fast Healthcare Interoperability Resources (FHIR) with blockchain technology allows for enhanced interoperability, enabling healthcare organizations to exchange data seamlessly and securely across various systems while maintaining data governance and regulatory compliance. Through real-world case studies and simulations, this paper demonstrates how blockchain-based EHR sharing can reduce operational costs, improve patient outcomes, and enhance the security and privacy of healthcare data. This decentralized framework holds great potential for revolutionizing healthcare information exchange, providing a transparent, scalable, and secure method for managing patient data in a highly regulated environment. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=blockchain" title="blockchain">blockchain</a>, <a href="https://publications.waset.org/abstracts/search?q=electronic%20health%20records%20%28ehrs%29" title=" electronic health records (ehrs)"> electronic health records (ehrs)</a>, <a href="https://publications.waset.org/abstracts/search?q=fast%20healthcare%20interoperability%20resources%20%28fhir%29" title=" fast healthcare interoperability resources (fhir)"> fast healthcare interoperability resources (fhir)</a>, <a href="https://publications.waset.org/abstracts/search?q=health%20information%20exchange%20%28hie%29" title=" health information exchange (hie)"> health information exchange (hie)</a>, <a href="https://publications.waset.org/abstracts/search?q=hl7" title=" hl7"> hl7</a>, <a href="https://publications.waset.org/abstracts/search?q=interoperability" title=" interoperability"> interoperability</a>, <a href="https://publications.waset.org/abstracts/search?q=non-fungible%20tokens%20%28nfts%29" title=" non-fungible tokens (nfts)"> non-fungible tokens (nfts)</a>, <a href="https://publications.waset.org/abstracts/search?q=privacy-preserving%20techniques" title=" privacy-preserving techniques"> privacy-preserving techniques</a>, <a href="https://publications.waset.org/abstracts/search?q=tokens" title=" tokens"> tokens</a>, <a href="https://publications.waset.org/abstracts/search?q=secure%20data%20sharing" title=" secure data sharing"> secure data sharing</a>, <a href="https://publications.waset.org/abstracts/search?q=" title=""></a> </p> <a href="https://publications.waset.org/abstracts/191930/secure-data-sharing-of-electronic-health-records-with-blockchain" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/191930.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">21</span> </span> </div> </div> <ul class="pagination"> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=privacy%20patterns&amp;page=3" rel="prev">&lsaquo;</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=privacy%20patterns&amp;page=1">1</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=privacy%20patterns&amp;page=2">2</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=privacy%20patterns&amp;page=3">3</a></li> <li class="page-item active"><span class="page-link">4</span></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=privacy%20patterns&amp;page=5">5</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=privacy%20patterns&amp;page=6">6</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=privacy%20patterns&amp;page=7">7</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=privacy%20patterns&amp;page=8">8</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=privacy%20patterns&amp;page=9">9</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=privacy%20patterns&amp;page=10">10</a></li> <li class="page-item disabled"><span class="page-link">...</span></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=privacy%20patterns&amp;page=110">110</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=privacy%20patterns&amp;page=111">111</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=privacy%20patterns&amp;page=5" rel="next">&rsaquo;</a></li> </ul> </div> </main> <footer> <div id="infolinks" class="pt-3 pb-2"> <div class="container"> <div style="background-color:#f5f5f5;" class="p-3"> <div class="row"> <div class="col-md-2"> <ul class="list-unstyled"> About <li><a href="https://waset.org/page/support">About Us</a></li> <li><a href="https://waset.org/page/support#legal-information">Legal</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/WASET-16th-foundational-anniversary.pdf">WASET celebrates its 16th foundational anniversary</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Account <li><a href="https://waset.org/profile">My Account</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Explore <li><a href="https://waset.org/disciplines">Disciplines</a></li> <li><a href="https://waset.org/conferences">Conferences</a></li> <li><a href="https://waset.org/conference-programs">Conference Program</a></li> <li><a href="https://waset.org/committees">Committees</a></li> <li><a href="https://publications.waset.org">Publications</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Research <li><a href="https://publications.waset.org/abstracts">Abstracts</a></li> <li><a href="https://publications.waset.org">Periodicals</a></li> <li><a href="https://publications.waset.org/archive">Archive</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Open Science <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Science-Philosophy.pdf">Open Science Philosophy</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Science-Award.pdf">Open Science Award</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Society-Open-Science-and-Open-Innovation.pdf">Open Innovation</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Postdoctoral-Fellowship-Award.pdf">Postdoctoral Fellowship Award</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Scholarly-Research-Review.pdf">Scholarly Research Review</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Support <li><a href="https://waset.org/page/support">Support</a></li> <li><a href="https://waset.org/profile/messages/create">Contact Us</a></li> <li><a href="https://waset.org/profile/messages/create">Report Abuse</a></li> </ul> </div> </div> </div> </div> </div> <div class="container text-center"> <hr style="margin-top:0;margin-bottom:.3rem;"> <a href="https://creativecommons.org/licenses/by/4.0/" target="_blank" class="text-muted small">Creative Commons Attribution 4.0 International License</a> <div id="copy" class="mt-2">&copy; 2024 World Academy of Science, Engineering and Technology</div> </div> </footer> <a href="javascript:" id="return-to-top"><i class="fas fa-arrow-up"></i></a> <div class="modal" id="modal-template"> <div class="modal-dialog"> <div class="modal-content"> <div class="row m-0 mt-1"> <div class="col-md-12"> <button type="button" class="close" data-dismiss="modal" aria-label="Close"><span aria-hidden="true">&times;</span></button> </div> </div> <div class="modal-body"></div> </div> </div> </div> <script src="https://cdn.waset.org/static/plugins/jquery-3.3.1.min.js"></script> <script src="https://cdn.waset.org/static/plugins/bootstrap-4.2.1/js/bootstrap.bundle.min.js"></script> <script src="https://cdn.waset.org/static/js/site.js?v=150220211556"></script> <script> jQuery(document).ready(function() { /*jQuery.get("https://publications.waset.org/xhr/user-menu", function (response) { jQuery('#mainNavMenu').append(response); });*/ jQuery.get({ url: "https://publications.waset.org/xhr/user-menu", cache: false }).then(function(response){ jQuery('#mainNavMenu').append(response); }); }); </script> </body> </html>

Pages: 1 2 3 4 5 6 7 8 9 10