When the world was engulfed by a COVID-19 pandemic crisis, various activities could not be carried out normally. Activities may continue from home during a crisis by the use of a smartphone through the internet, because almost all people have their own smartphone, without requiring additional purchase of hardware. For formal learning, people can take the opportunity to use social media platforms to undertake conversations easily by using smart phones, even tablets. Teenagers or adults who are still studying in higher education institutions can undertake continuous learning for their work assignments. For example, they can use these tools to communicate through social media such as the WhatsApp, Telegram, Zoom, Microsoft Team, and Edmodo apps to connect with friends and lecturers. This research reveals trends of digital social media security and usability in the time of the COVID-19 pandemic situation, such as working from home, establishing a start-up, improving business processes and conducting online business within the digital ecosystem. The result is interesting and there are many uses of social media which have been addressed in this study during the COVID-19 pandemic for business purposes. The various social media platforms have different features that are available for use by subscribers, and also make it easier for people to do business. This is mainly due to the fact that they open up the global market and also make it cheaper to advertise. The government as well as the private sector has been in the forefront when it comes to the use of social media. Maintaining a good online presence is one of the key aspects that determine the success of start-up companies. This is due to the fact that most customers usually rely on the customer reviews in determining the ability of a company to meet the needs of clients. The main reason why most companies set up a customer relations department that is mandated with the responsibility of responding to customer feedback on various online platforms. On the other hand, the increased use of social media has brought new challenges when it comes to the security of information. Users must, therefore, secure their servers and technology from external and internal threats. One of the strategies used is the use of passwords to log into a portal where each person authorized to access the portal is provided with a password that is unique and known only by the user. The study has covered all these areas in detail including the use of database management systems in an organization or individual.
<p style="text-align: justify;">This research aims to analyze the effects of intelligence quotient, emotional quotient, spiritual quotient, and adversity quotient on the graduates quality of vocational higher education. Data were collected from 217 cadets at Surabaya Shipping Polytechnic who already took an internship as respondents using stratified cluster random technique. This is a correlational and quantitative study using a questionnaire developed from several existing scales and analyzed using Structural Equation Models (SEM) to determine the path of effects and to create the best structural model of intelligence-based graduates quality (IESA-Q). The results indicate that there are direct and indirect effects of intelligence quotient, emotional quotient, spiritual quotient, and adversity quotient on graduates quality, meaning that each quotient has a positive effect on graduate’s quality. The process to create the professional and ethical quality of Surabaya Shipping Polytechnic graduate is dominated by Emotional Quotient (25,2%) and Spiritual Quotient (21,4%), while Intelligence Quotient (IQ) becomes the support as it effects the development process of all quotients, Emotional Quotient (EQ), Spiritual Quotient (SQ), and also Adversity Quotient (AQ). Therefore, based on the findings of this study, the student acceptance requirements are emphasized on IQ and EQ as a basis to develop other quotients in order to generate graduates with good quality. Learning is designed on IQ, EQ, SQ, AQ to control and to evaluate process and product outcomes.</p>
In recent years, by merit of convenient and unique features, bio-authentication techniques have been applied to identify and authenticate a person based on his/her spoken words and/or sentences. Among these techniques, speaker recognition/identification is the most convenient one, providing a secure and strong authentication solution viable for a wide range of applications.In this paper, to safeguard real-world objects, like buildings, we develop a speaker identification system named mel frequency cepstral coefficients (MFCC)-based speaker identification system for access control (MSIAC for short), which identifies a speaker U by first collecting U's voice signals and converting the signals to frequency domain. An MFCC-based human auditory filtering model is utilized to adjust the energy levels of different frequencies as U's voice quantified features. Next, a Gaussian mixture model is employed to represent the distribution of the logarithmic features as U's specific acoustic model. When a person, eg, x, would like to access a real-world object protected by the MSIAC, x's acoustic model is compared with known-people's acoustic models. Based on the identification result, the MSIAC will determine whether the access will be accepted or denied. KEYWORDS acoustic model, Fourier transformation, Gaussian mixture model, mel frequency cepstral coefficients, speaker identification 1 | INTRODUCTIONIn this information era, numerous high-tech products gradually enter our everyday lives and significantly change our living habits and patterns. The biometrics identification technology that provides us with easier and more convenient methods to identify people has gradually replaced some existing authentication techniques, which use passwords or pin numbers to authenticate users. But the passwords or pin numbers may be forgotten or forged and are no longer considered to offer a high level of security. The face recognition systems used at airport halls 1 and the voice assistant SIRI of iPhone 2 are two examples of the biometric identification systems.On the one hand, voice has been the most direct and natural method for us to express ideas, communicate with others, and do something for interaction. Therefore, recognizing people's identities from user's dialogue voice and contents and then providing the corresponding services should be a better method to practically make our daily lives easier. Up to present, speech recognition technology 3 has been well developed and applied to our living activities. But speaker recognition technology 4 is still far away from its practical applications. The reasons are that (i) there are too many parameters needed to be processed for speaker recognition; (ii) it is hard to collect voice features completely; and (iii) the identification process is complicated and takes a long time for calculation. Thus, it is difficult to be applied to those applications that need immediate response. Furthermore, the studies of speaker identification nowadays are partial, rather than whole. For example, the Hidden ...
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
customersupport@researchsolutions.com
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.