Search results for: intercultural communications
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 757

Search results for: intercultural communications

487 Detection Characteristics of the Random and Deterministic Signals in Antenna Arrays

Authors: Olesya Bolkhovskaya, Alexey Davydov, Alexander Maltsev

Abstract:

In this paper approach to incoherent signal detection in multi-element antenna array are researched and modeled. Two types of useful signals with unknown wavefront were considered. First one is deterministic (Barker code), the second one is random (Gaussian distribution). The derivation of the sufficient statistics took into account the linearity of the antenna array. The performance characteristics and detecting curves are modeled and compared for different useful signals parameters and for different number of elements of the antenna array. Results of researches in case of some additional conditions can be applied to a digital communications systems.

Keywords: antenna array, detection curves, performance characteristics, quadrature processing, signal detection

Procedia PDF Downloads 405
486 Efficacy of Social-emotional Learning Programs Amongst First-generation Immigrant Children in Canada and The United States- A Scoping Review

Authors: Maria Gabrielle "Abby" Dalmacio

Abstract:

Social-emotional learning is a concept that is garnering more importance when considering the development of young children. The aim of this scoping literature review is to explore the implementation of social-emotional learning programs conducted with first-generation immigrant young children ages 3-12 years in North America. This review of literature focuses on social-emotional learning programs taking place in early childhood education centres and elementary school settings that include the first-generation immigrant children population to determine if and how their understanding of social-emotional learning skills may be impacted by the curriculum being taught through North American educational pedagogy. Research on early childhood education and social-emotional learning reveals the lack of inter-cultural adaptability in social emotional learning programs and the potential for immigrant children as being assessed as developmentally delayed due to programs being conducted through standardized North American curricula. The results of this review point to a need for more research to be conducted with first-generation immigrant children to help reform social-emotional learning programs to be conducive for each child’s individual development. There remains to be a gap of knowledge in the current literature on social-emotional learning programs and how educators can effectively incorporate the intercultural perspectives of first-generation immigrant children in early childhood education.

Keywords: early childhood education, social-emotional learning, first-generation immigrant children, north america, inter-cultural perspectives, cultural diversity, early educational frameworks

Procedia PDF Downloads 100
485 Social Media Effects on Driving: An Exploratory Study Applied to Drivers in Kuwait

Authors: Bashaiar Alsanaa

Abstract:

Social media have totally converged with social life all around the globe. Using social media applications and mobile phones have become somewhat of an addiction to most people. Driving while using mobile applications falls under such addiction when usage is not of urgency. This study aims to investigate the impact of using such applications while driving in the small, rich state of Kuwait, where most people juggle more than one phone for different purposes. Positive and negative effects will be explored in detail as well as causes for these effects and possible reasons. A full range of recommendations will be presented so as to give other countries a specific case study upon which to build solutions and remedies to this emerging and dangerous social phenomenon.

Keywords: communications, driving, mobile, social media

Procedia PDF Downloads 332
484 Evaluating the Impact of Cloud Computing on Collaboration Service in Knowledge Management Systems

Authors: Hamid Reza Nikkhah, Abbas Toloei Eshlaghi, Hossein Ali Momeni

Abstract:

One of the most important services of Knowledge Management Systems (KMS) is collaboration service which plays a decisive role in organization efficiency. Cloud computing as one of the latest IT technologies has brought a new paradigm in delivering services and communications. In this research, we evaluate the impact of cloud computing on the collaboration service of KMS and for doing so, four variables of cloud computing and three variables of the collaboration service were detected to be assessed.It was found that cloud computing has a far-fetching direct impact on the collaboration service.

Keywords: cloud computing, collaboration service, knowledge management systems, cloud computing

Procedia PDF Downloads 521
483 Penguins Search Optimization Algorithm for Chaotic Synchronization System

Authors: Sofiane Bououden, Ilyes Boulkaibet

Abstract:

In terms of security of the information signal, the meta-heuristic Penguins Search Optimization Algorithm (PeSOA) is applied to synchronize chaotic encryption communications in the case of sensitive dependence on initial conditions in chaotic generator oscillator. The objective of this paper is the use of the PeSOA algorithm to exploring search space with random and iterative processes for synchronization of symmetric keys in both transmission and reception. Simulation results show the effectiveness of the PeSOA algorithm in generating symmetric keys of the encryption process and synchronizing.

Keywords: meta-heuristic, PeSOA, chaotic systems, encryption, synchronization optimization

Procedia PDF Downloads 195
482 The Buccal Fat Pad for Closure of Oroantral Communication

Authors: Stefano A. Denes, Riccardo Tieghi, Giovanni Elia

Abstract:

The buccal fat pad is a well-established tool in oral and maxillofacial surgery and its use has proved of value for the closure of oroantral communications. Oroantral communication may be a common complication after sequestrectomy in "Bisphosphonate-related osteonecrosis of the jaws". We report a clinical case of a 70-year-old female patient in bisphosphonate therapy presented with right maxillary sinusitis and oroantral communication after implants insertion. The buccal fat pad was used to close the defect. The case had an uneventful postoperative healing without dehiscence, infection and necrosis. We postulate that the primary closure of the site with buccal fat pad may ensure a sufficient blood supply and adequate protection for an effective bone-healing response to occur.

Keywords: buccal fat pad, oroantral communication, oral surgery, dehiscence

Procedia PDF Downloads 351
481 On the Inequality between Queue Length and Virtual Waiting Time in Open Queueing Networks under Conditions of Heavy Traffic

Authors: Saulius Minkevicius, Edvinas Greicius

Abstract:

The paper is devoted to the analysis of queueing systems in the context of the network and communications theory. We investigate the inequality in an open queueing network and its applications to the theorems in heavy traffic conditions (fluid approximation, functional limit theorem, and law of the iterated logarithm) for a queue of customers in an open queueing network.

Keywords: fluid approximation, heavy traffic, models of information systems, open queueing network, queue length of customers, queueing theory

Procedia PDF Downloads 286
480 Evolution and Obstacles Encountered in the Realm of Sports Tourism in Pakistan

Authors: Muhammad Saleem

Abstract:

Tourism stands as one of the swiftly expanding sectors globally, contributing to 10% of the overall worldwide GDP. It holds a vital role in generating income, fostering employment opportunities, alleviating poverty, facilitating foreign exchange earnings, and advancing intercultural understanding. This industry encompasses a spectrum of activities, encompassing transportation, communication, hospitality, catering, entertainment, and advertising. The objective of this study is to assess the evolution and obstacles encountered by sports tourism in Pakistan. In pursuit of this objective, relevant literature has been scrutinized, while data has been acquired from 60 respondents, employing a simple random sampling approach for analysis. The survey comprised close-ended inquiries directed towards all participants. Analytical tools such as mean, mode, median, graphs, and percentages have been employed for data analysis. The findings revealed through robust analysis, indicate that the mean, mode, and median tools consistently yield results surpassing the 70% mark, underscoring that heightened development within sports tourism significantly augments its progress. Effective governance demonstrates a favorable influence on sports tourism, with increased government-provided safety and security potentially amplifying its expansion, thus attracting a higher number of tourists and consequently propelling the growth of the sports tourism sector. This study holds substantial significance for both academic scholars and industry practitioners within Pakistan's tourism landscape, as previous explorations in this realm have been relatively limited.

Keywords: obstacles-spots, evolution-tourism, sports-pakistan, sports-obstacles-pakistan

Procedia PDF Downloads 56
479 From Research to Practice: Upcycling Cinema Icons

Authors: Mercedes Rodriguez Sanchez, Laura Luceño Casals

Abstract:

With the rise of social media, creative people and brands everywhere are constantly generating content. The students with Bachelor's Degrees in Fashion Design use platforms such as Instagram or TikTok to look for inspiration and entertainment, as well as a way to develop their own ideas and share them with a wide audience. Information and Communications Technologies (ICT) have become a central aspect of higher education, virtually affecting every aspect of the student experience. Following the current trend, during the first semester of the second year, a collaborative project across two subjects –Design Management and History of Fashion Design– was implemented. After an introductory class focused on the relationship between fashion and cinema, as well as a brief history of 20th-century fashion, the students freely chose a work team and an iconic look from a movie costume. They researched the selected movie and its sociocultural context, analyzed the costume and the work of the designer, and studied the style, fashion magazines and most popular films of the time. Students then redesigned and recreated the costume, for which they were compelled to recycle the materials they had available at home as an unavoidable requirement of the activity. Once completed the garment, students delivered in-class, team-based presentations supported by the final design, a project summary poster and a making-of video, which served as a documentation tool of the costume design process. The methodologies used include Challenge-Based Learning (CBL), debates, Internet research, application of Information and Communications Technologies, and viewing clips of classic films, among others. After finishing the projects, students were asked to complete two electronic surveys to measure the acquisition of transversal and specific competencies of each subject. Results reveal that this activity helped the students' knowledge acquisition, a deeper understanding of both subjects and their skills development. The classroom dynamic changed. The multidisciplinary approach encouraged students to collaborate with their peers, while educators were better able to keep students' interest and promote an engaging learning process. As a result, the activity discussed in this paper confirmed the research hypothesis: it is positive to propose innovative teaching projects that combine academic research with playful learning environments.

Keywords: cinema, cooperative learning, fashion design, higher education, upcycling

Procedia PDF Downloads 78
478 The Translation of Code-Switching in African Literature: Comparing the Two German Translations of Ngugi Wa Thiongo’s "Petals of Blood"

Authors: Omotayo Olalere

Abstract:

The relevance of code-switching for intercultural communication through literary translation cannot be overemphasized. The translation of code-switching and its implications for translations studies have been studied in the context of African literature. In these cases, code-switching was examined in the more general terms of its usage in source text and not particularly in Ngugi’s novels and its translations. In addition, the functions of translation and code-switching in the lyrics of some popular African songs have been studied, but this study is related more with oral performance than with written literature. As such, little has been done on the German translation of code-switching in African works. This study intends to fill this lacuna by examining the concept of code-switching in the German translations in Ngugi’s Petals of Blood. The aim is to highlight the significance of code-switching as a phenomenon in this African (Ngugi’s) novel written in English and to also focus on its representation in the two German translations. The target texts to be used are Verbrannte Blueten and Land der flammenden Blueten. “Abrogration“ as a concept will play an important role in the analysis of the data. Findings will show that the ideology of a translator plays a huge role in representing the concept of “abrogration” in the translation of code-switching in the selected source text. The study will contribute to knowledge in translation studies by bringing to limelight the need to foreground aspects of language contact in translation theory and practice, particularly in the African context. Relevant translation theories adopted for the study include Bandia’s (2008) postcolonial theory of translation and Snell-Hornby”s (1988) cultural translation theory.

Keywords: code switching, german translation, ngugi wa thiong’o, petals of blood

Procedia PDF Downloads 91
477 Sports as a Powerful Tool in Building Peace among Countries of the World

Authors: Mohammed Usman Sani

Abstract:

Worldwide it is observed that sport plays an important role in our communities and is capable of bringing about the need for peaceful coexistence within and among nations which include tolerating one another, building team spirit, showing loyalty and fair play. In addition, sport builds character and the development of skills, which are necessary in fulfilling a desirable and happy life among nations. Sport builds discipline, endurance, courage and self-motivation among nations. Sports for Peace was set up to answer the question of whether sport can foster common ideals. In sports as a powerful tool in building peace, athletes all over the world come together to promote the core values of sport, such as fair play, tolerance, the Olympic ideal of freedom and intercultural understanding. Sport as a powerful tool is used to address varieties of social issues that is widely accepted in countries mostly affected by poverty, violence and conflict. In building peace through sports among nations, a wide range of individuals and nonprofit organizations which includes the United Nations (UN) and international development agencies have accepted sport as an important social catalyst. This paper therefore seeks to define sports, sports and its fundamental rights, sports as a powerful tool, and ways in which sport may bring about peace building among countries and finally the status of Sport Development and Peace initiatives in Nigeria. It concluded that the international community has acknowledged the importance of sport in peace building efforts among nations. It further recommended that countries should engage in the design and delivery of sports, adhering to generally accepted principles of openness and sustainability through sports collaboration, sports partnerships and coordinated effort.

Keywords: building, peace, powerful tool, sports

Procedia PDF Downloads 273
476 Spectral Efficiency Improvement in 5G Systems by Polyphase Decomposition

Authors: Wilson Enríquez, Daniel Cardenas

Abstract:

This article proposes a filter bank format combined with the mathematical tool called polyphase decomposition and the discrete Fourier transform (DFT) with the purpose of improving the performance of the fifth-generation communication systems (5G). We started with a review of the literature and the study of the filter bank theory and its combination with DFT in order to improve the performance of wireless communications since it reduces the computational complexity of these communication systems. With the proposed technique, several experiments were carried out in order to evaluate the structures in 5G systems. Finally, the results are presented in graphical form in terms of bit error rate against the ratio bit energy/noise power spectral density (BER vs. Eb / No).

Keywords: multi-carrier system (5G), filter bank, polyphase decomposition, FIR equalizer

Procedia PDF Downloads 201
475 Real-Time Aerial Marine Surveillance System for Safe Navigation

Authors: Vinesh Thiruchelvam, Umar Mumtaz Chowdry, Sathish Kumar Selvaperumal

Abstract:

The prime purpose of the project is to provide a sophisticated system for surveillance specialized for the Port Authorities in the Maritime Industry. The current aerial surveillance does not have a wide dimensioning view. The channels of communication is shared and not exclusive allowing for communications errors or disturbance mainly due to traffic. The scope is to analyze the various aspects as real-time aerial and marine surveillance is one of the most important methods which could ensure the domain security of the sailors. The system will improve real time data as obtained for the controller base station. The key implementation will be based on camera speed, angle and adherence to a sustainable power utilization module.

Keywords: SMS, real time, GUI, maritime industry

Procedia PDF Downloads 498
474 The Role of ICT in Engaging Youth in Agricultural Transformation of Africa

Authors: Adebola Adedugbe

Abstract:

Agriculture is the mainstay of most countries in Africa. It employs up to 90 percent of the rural workforce, who are mostly youth and women. Engaging youths in Information and Communications Technology (ICT) in agriculture is critical to economic and agricultural development of the African continent. The objective of this paper is to identify and mobilize the potentials of young Africans in agriculture through ICT and recognize their role as the dominant driver for sustainable agricultural development in Africa. This paper identifies the role of ICT as a tool for attracting youths to agriculture. The development of ICT is important in stimulating youths in SME’s to compete favorably and effectively as a way to fight poverty through job and wealth creation. It is one of the strategies for promoting entrepreneurship by increasing the availability and diversity of online information.

Keywords: Africa, agriculture, ICT, tool, youth

Procedia PDF Downloads 450
473 Security of Internet of Things: Challenges, Requirements and Future Directions

Authors: Amjad F. Alharbi, Bashayer A. Alotaibi, Fahd S. Alotaibi

Abstract:

The emergence of Internet of Things (IoT) technology provides capabilities for a huge number of smart devices, services and people to be communicate with each other for exchanging data and information over existing network. While as IoT is progressing, it provides many opportunities for new ways of communications as well it introduces many security and privacy threats and challenges which need to be considered for the future of IoT development. In this survey paper, an IoT security issues as threats and current challenges are summarized. The security architecture for IoT are presented from four main layers. Based on these layers, the IoT security requirements are presented to insure security in the whole system. Furthermore, some researches initiatives related to IoT security are discussed as well as the future direction for IoT security are highlighted.

Keywords: Internet of Things (IoT), IoT security challenges, IoT security requirements, IoT security architecture

Procedia PDF Downloads 375
472 Exploring the Cross-Cultural Practice of Transnational Community in Taiwan

Authors: Ya-Hsuan Wang

Abstract:

This project of intercultural education aimed to explore pluricultural people’s interpretation and evaluation of the transnational community in Taiwan. Based on transnationalism and transculturalism, this study concerns the human right issues for immigrants and pluricultural people. Research participants as immigrants in Taiwan were asked about their typical thinking styles in the transnational community, their cultural integration in terms of transnational behaviors, and their collective memory of the transnational community. Interview questions included what key factors were involved in their identity negotiation, what roles the transnational community and collective memory would be for their identity negotiation and what were the positive or negative aspects impacting cross-border identity. Based on the experiences of pluricultural people and transnational communities, this project expected to enhance the depth and width of developing transcultural knowledge in textbook reform on History in K-12 schools. It is to transform cross-border identity into knowledge embedded with local culture in response to globalization and localization. The purpose of this paper is to portrait the cross-cultural practice of transnational community for Taiwan’s immigrants. It is to report their external socio-cultural expectation of ethnic economics, to understand their internal life course of national identity, and to clarify transnational community in relation to their cross-border identity. In conclusion, the cross-cultural practice of transnational community combined the external contexts such as ethnic economic interaction among transnational communities, social report and ethnic industry, and the internal contexts such as ethnic identity, language use, and collective memory in ethnic history.

Keywords: cross-cultural practice, immigrants, pluricultural people, transnational community

Procedia PDF Downloads 196
471 Chinese Leaders Abroad: Case in the Netherlands

Authors: Li Lin, Hein Roelfsema

Abstract:

To achieve aggressive expansion goals, many Chinese companies are seeking resources and market around the world. To an increasing extent, Chinese enterprises recognized the Netherlands as their gateway to Europe Market. Yet, large cultural gaps (e.g. individualism/collectivism, power distance) may influence expat leaders’ influencing process, in turn affect intercultural teamwork. Lessons and suggestions from Chinese expat leaders could provide profound knowledge for managerial practice and future research. The current research focuses on the cultural difference between China and the Netherlands, along with leadership tactics for coping and handling differences occurring in the international business work. Exclusive 47 in-depth interviews with Chinese expat leaders were conducted. Within each interview, respondents were asked what were the main issues when working with Dutch employees, and what they believed as the keys to successful leadership in Dutch-Chinese cross-cultural workplaces. Consistent with previous research, the findings highlight the need to consider the cultural context within which leadership adapts. In addition, the findings indicated the importance of recognizing and applying the cultural advantages from which leadership originates. The results address observation ability as a crucial key for Chinese managers to lead Dutch/international teams. Moreover, setting a common goal help a leader to overcome the challenges due to cultural differences. Based on the analysis, we develop a process model to illustrate the dynamic mechanisms. Our study contributes to the better understanding of transference of management practices, and has important practical implications for managing Dutch employees.

Keywords: Chinese managers, Dutch employees, leadership, interviews

Procedia PDF Downloads 343
470 Case Study about Women Driving in Saudi Arabia Announced in 2018: Netnographic and Data Mining Study

Authors: Majdah Alnefaie

Abstract:

The ‘netnographic study’ and data mining have been used to monitor the public interaction on Social Media Sites (SMSs) to understand what the motivational factors influence the Saudi intentions regarding allowing women driving in Saudi Arabia in 2018. The netnographic study monitored the publics’ textual and visual communications in Twitter, Snapchat, and YouTube. SMSs users’ communications method is also known as electronic word of mouth (eWOM). Netnography methodology is still in its initial stages as it depends on manual extraction, reading and classification of SMSs users text. On the other hand, data mining is come from the computer and physical sciences background, therefore it is much harder to extract meaning from unstructured qualitative data. In addition, the new development in data mining software does not support the Arabic text, especially local slang in Saudi Arabia. Therefore, collaborations between social and computer scientists such as ‘netnographic study’ and data mining will enhance the efficiency of this study methodology leading to comprehensive research outcome. The eWOM communications between individuals on SMSs can promote a sense that sharing their preferences and experiences regarding politics and social government regulations is a part of their daily life, highlighting the importance of using SMSs as assistance in promoting participation in political and social. Therefore, public interactions on SMSs are important tools to comprehend people’s intentions regarding the new government regulations in the country. This study aims to answer this question, "What factors influence the Saudi Arabians' intentions of Saudi female's car-driving in 2018". The study utilized qualitative method known as netnographic study. The study used R studio to collect and analyses 27000 Saudi users’ comments from 25th May until 25th June 2018. The study has developed data collection model that support importing and analysing the Arabic text in the local slang. The data collection model in this study has been clustered based on different type of social networks, gender and the study main factors. The social network analysis was employed to collect comments from SMSs owned by governments’ originations, celebrities, vloggers, social activist and news SMSs accounts. The comments were collected from both males and females SMSs users. The sentiment analysis shows that the total number of positive comments Saudi females car driving was higher than negative comments. The data have provided the most important factors influenced the Saudi Arabians’ intention of Saudi females car driving including, culture and environment, freedom of choice, equal opportunities, security and safety. The most interesting finding indicted that women driving would play a role in increasing the individual freedom of choice. Saudi female will be able to drive cars to fulfill her daily life and family needs without being stressed due to the lack of transportation. The study outcome will help Saudi government to improve woman quality of life by increasing the ability to find more jobs and studies, increasing income through decreasing the spending on transport means such as taxi and having more freedom of choice in woman daily life needs. The study enhances the importance of using use marketing research to measure the public opinions on the new government regulations in the country. The study has explained the limitations and suggestions for future research.

Keywords: netnographic study, data mining, social media, Saudi Arabia, female driving

Procedia PDF Downloads 153
469 Internet of Assets: A Blockchain-Inspired Academic Program

Authors: Benjamin Arazi

Abstract:

Blockchain is the technology behind cryptocurrencies like Bitcoin. It revolutionizes the meaning of trust in the sense of offering total reliability without relying on any central entity that controls or supervises the system. The Wall Street Journal states: “Blockchain Marks the Next Step in the Internet’s Evolution”. Blockchain was listed as #1 in Linkedin – The Learning Blog “most in-demand hard skills needed in 2020”. As stated there: “Blockchain’s novel way to store, validate, authorize, and move data across the internet has evolved to securely store and send any digital asset”. GSMA, a leading Telco organization of mobile communications operators, declared that “Blockchain has the potential to be for value what the Internet has been for information”. Motivated by these seminal observations, this paper presents the foundations of a Blockchain-based “Internet of Assets” academic program that joins under one roof leading application areas that are characterized by the transfer of assets over communication lines. Two such areas, which are pillars of our economy, are Fintech – Financial Technology and mobile communications services. The next application in line is Healthcare. These challenges are met based on available extensive professional literature. Blockchain-based assets communication is based on extending the principle of Bitcoin, starting with the basic question: If digital money that travels across the universe can ‘prove its own validity’, can this principle be applied to digital content. A groundbreaking positive answer here led to the concept of “smart contract” and consequently to DLT - Distributed Ledger Technology, where the word ‘distributed’ relates to the non-existence of reliable central entities or trusted third parties. The terms Blockchain and DLT are frequently used interchangeably in various application areas. The World Bank Group compiled comprehensive reports, analyzing the contribution of DLT/Blockchain to Fintech. The European Central Bank and Bank of Japan are engaged in Project Stella, “Balancing confidentiality and auditability in a distributed ledger environment”. 130 DLT/Blockchain focused Fintech startups are now operating in Switzerland. Blockchain impact on mobile communications services is treated in detail by leading organizations. The TM Forum is a global industry association in the telecom industry, with over 850 member companies, mainly mobile operators, that generate US$2 trillion in revenue and serve five billion customers across 180 countries. From their perspective: “Blockchain is considered one of the digital economy’s most disruptive technologies”. Samples of Blockchain contributions to Fintech (taken from a World Bank document): Decentralization and disintermediation; Greater transparency and easier auditability; Automation & programmability; Immutability & verifiability; Gains in speed and efficiency; Cost reductions; Enhanced cyber security resilience. Samples of Blockchain contributions to the Telco industry. Establishing identity verification; Record of transactions for easy cost settlement; Automatic triggering of roaming contract which enables near-instantaneous charging and reduction in roaming fraud; Decentralized roaming agreements; Settling accounts per costs incurred in accordance with agreement tariffs. This clearly demonstrates an academic education structure where fundamental technologies are studied in classes together with these two application areas. Advanced courses, treating specific implementations then follow separately. All are under the roof of “Internet of Assets”.

Keywords: blockchain, education, financial technology, mobile telecommunications services

Procedia PDF Downloads 180
468 A Microwave and Millimeter-Wave Transmit/Receive Switch Subsystem for Communication Systems

Authors: Donghyun Lee, Cam Nguyen

Abstract:

Multi-band systems offer a great deal of benefit in modern communication and radar systems. In particular, multi-band antenna-array radar systems with their extended frequency diversity provide numerous advantages in detection, identification, locating and tracking a wide range of targets, including enhanced detection coverage, accurate target location, reduced survey time and cost, increased resolution, improved reliability and target information. An accurate calibration is a critical issue in antenna array systems. The amplitude and phase errors in multi-band and multi-polarization antenna array transceivers result in inaccurate target detection, deteriorated resolution and reduced reliability. Furthermore, the digital beam former without the RF domain phase-shifting is less immune to unfiltered interference signals, which can lead to receiver saturation in array systems. Therefore, implementing integrated front-end architecture, which can support calibration function with low insertion and filtering function from the farthest end of an array transceiver is of great interest. We report a dual K/Ka-band T/R/Calibration switch module with quasi-elliptic dual-bandpass filtering function implementing a Q-enhanced metamaterial transmission line. A unique dual-band frequency response is incorporated in the reception and calibration path of the proposed switch module utilizing the composite right/left-handed meta material transmission line coupled with a Colpitts-style negative generation circuit. The fabricated fully integrated T/R/Calibration switch module in 0.18-μm BiCMOS technology exhibits insertion loss of 4.9-12.3 dB and isolation of more than 45 dB in the reception, transmission and calibration mode of operation. In the reception and calibration mode, the dual-band frequency response centered at 24.5 and 35 GHz exhibits out-of-band rejection of more than 30 dB compared to the pass bands below 10.5 GHz and above 59.5 GHz. The rejection between the pass bands reaches more than 50 dB. In all modes of operation, the IP1-dB is between 4 and 11 dBm. Acknowledgement: This paper was made possible by NPRP grant # 6-241-2-102 from the Qatar National Research Fund (a member of Qatar Foundation). The statements made herein are solely the responsibility of the authors.

Keywords: microwaves, millimeter waves, T/R switch, wireless communications, wireless communications

Procedia PDF Downloads 160
467 Drama Education: Towards Building Multicultural Adolescent Peer Relationships

Authors: Tahnee West

Abstract:

Drama education is increasingly understood as a useful tool in promoting positive social change and cultural awareness. The effects of both positive and negative peer relationships are also a researched facet of education systems. Despite this, very little research has been conducted in the intersection of these two areas, even given current, significant public interest surrounding multicultural relationships. This research addresses a problem faced by educators and students: facilitating meaningful multicultural relationships. The research explores the following question in an Australian context: in what ways does Drama education affect peer relationships between culturally diverse students? In doing so, the study explores the various challenges and experiences of a multicultural group of adolescents, in terms of forming and maintaining effective intercultural friendships, while participating in a series of drama workshops. The project presents a starting point for providing educators with strategies for inclusivity and relationship development amongst diverse student populations. Findings show that Drama education can positively affect culturally diverse young people’s peer relationships; interactions between participants and data collected in focus groups throughout the eight-week Drama program show a steady improvement in sense of trust, support, tolerance, empathy, familiarity with other participants, and enjoyment. Data also points to a positive correlation between the Drama activities and improved conflict resolution and communication skills, as well as an improved understanding of the other participants’ cultures. Diversities and commonalities within the group were explored, with similarities encouraging social cohesion, and decreasing cultural ‘cliques’.

Keywords: cultural diversity, drama education, friendship, multicultural, peer relationships

Procedia PDF Downloads 143
466 The Use of Mobile Phones as a Direct Marketing Tool and Consumer Attitudes

Authors: Abdülcelil Mücahid Zengin, Göksel Şimşek

Abstract:

Mobile phones are one of the direct marketing tools that can be used to reach todays hard to reach consumers. Mobile phones are very personal devices and they are always carried with the consumer, where ever they go. This creates an opportunity for marketers to create personalized marketing communications messages and send them on the right time and place. This study examines consumer attitudes toward mobile marketing, especially toward SMS marketing. Unlike similar studies, this study does not focus on the young, but includes consumers who are in the 18-70 age range to the field research. According to the results, it has been concluded that most participants think SMS marketing is disturbing. Most important problems with SMS marketing are about getting subscribed to message lists without the permission of the receiver; the high number of messages sent; and the irrelevancy of the message content.

Keywords: direct marketing, mobile phones mobile marketing, sms advertising, sms marketing

Procedia PDF Downloads 348
465 Iqbal's Philosophy of Action in the Light of Contemporary Philosophy of Action

Authors: Sevcan Ozturk

Abstract:

The aim of this paper is to analyze the twentieth-century Muslim philosopher Muhammad Iqbal’s philosophy of action in the light of the main issues of contemporary philosophy of action. Iqbal is one of the most celebrated and eminent figures of modern Islamic thought. However, a review of the works on Iqbal shows that most of the central concepts of his philosophy have not received enough attention. His notion of ‘action’ in its philosophical context is one of these concepts. One of the main characteristics of Iqbal’s approach is that he develops his discussion around the main themes of contemporary philosophy of action, which includes ontological and conceptual questions regarding the nature of human actions. He also discusses that action is the only way to develop human personality, and that the human being can only achieve immortality promised by Islam through his actions. Therefore, while presenting an approach that can be read in the light of contemporary philosophy of action, which has become one of the significant parts of modern philosophical discussions in the west particularly since the nineteenth century, he, at the same time, develops his own philosophy of action in the light of Islamic resources. Consequently, these two main characteristics of his discussion of the notion of action make his philosophy of action an important contribution to contemporary philosophy of action, a field that ignores the discussions of Muslim philosophers on action. Therefore, this paper aims at highlighting Iqbal’s contribution to the modern debate of action by analysing Iqbal’s notion of action in the light of the contemporary issues of philosophy of action. This will, first of all, include an examination of contemporary action theory. Although the main discussions of contemporary philosophy of action will provide the methodology of this study, the main paradigms of Iqbal’s approach to the notion of action will also be considered during the examination of the discussions of philosophy of action. Then, Iqbal’s own philosophy of action will be established in the light of the contemporary philosophy of action. It is hoped that this paper will cultivate a dialogue between Iqbal scholars and those working in the field of philosophy of action, and that it will be a contribution to the fields of Iqbal studies, philosophy of action, and intercultural philosophy.

Keywords: action, development of personality, Muhammad Iqbal, philosophy of action

Procedia PDF Downloads 371
464 Optimizing Communications Overhead in Heterogeneous Distributed Data Streams

Authors: Rashi Bhalla, Russel Pears, M. Asif Naeem

Abstract:

In this 'Information Explosion Era' analyzing data 'a critical commodity' and mining knowledge from vertically distributed data stream incurs huge communication cost. However, an effort to decrease the communication in the distributed environment has an adverse influence on the classification accuracy; therefore, a research challenge lies in maintaining a balance between transmission cost and accuracy. This paper proposes a method based on Bayesian inference to reduce the communication volume in a heterogeneous distributed environment while retaining prediction accuracy. Our experimental evaluation reveals that a significant reduction in communication can be achieved across a diverse range of dataset types.

Keywords: big data, bayesian inference, distributed data stream mining, heterogeneous-distributed data

Procedia PDF Downloads 161
463 Hidden Critical Risk in the Construction Industry’s Technological Adoption: Cybercrime

Authors: Nuruddeen Usman, Usman Mohammed Gidado, Muhammad Ahmad Ibrahim

Abstract:

Construction industry is one of the sectors that are eyeing adoption of ICT for its development due to the advancement in technology. Though, many manufacturing sectors had been using it, but construction industry was left behind, especially in the developing nation like Nigeria. On account of that, the objective of this study is to conceptually and quantitatively synthesise whether the slow adoption of ICT by the construction industries can be attributable to cybercrime threats. The result of the investigation found that, the risk of cybercrime, and lack of adequate cyber security policies that can enforce and punish defaulters are among the things that hinder ICT adoption of the Nigerian construction industries. Therefore, there is need for the nations to educate their citizens on cybercrime risk, and to establish cybercrime police units that can be monitoring and controlling all online communications.

Keywords: construction industry, cybercrime, information and communication technology adoption, risk

Procedia PDF Downloads 509
462 Security Issues in Long Term Evolution-Based Vehicle-To-Everything Communication Networks

Authors: Mujahid Muhammad, Paul Kearney, Adel Aneiba

Abstract:

The ability for vehicles to communicate with other vehicles (V2V), the physical (V2I) and network (V2N) infrastructures, pedestrians (V2P), etc. – collectively known as V2X (Vehicle to Everything) – will enable a broad and growing set of applications and services within the intelligent transport domain for improving road safety, alleviate traffic congestion and support autonomous driving. The telecommunication research and industry communities and standardization bodies (notably 3GPP) has finally approved in Release 14, cellular communications connectivity to support V2X communication (known as LTE – V2X). LTE – V2X system will combine simultaneous connectivity across existing LTE network infrastructures via LTE-Uu interface and direct device-to-device (D2D) communications. In order for V2X services to function effectively, a robust security mechanism is needed to ensure legal and safe interaction among authenticated V2X entities in the LTE-based V2X architecture. The characteristics of vehicular networks, and the nature of most V2X applications, which involve human safety makes it significant to protect V2X messages from attacks that can result in catastrophically wrong decisions/actions include ones affecting road safety. Attack vectors include impersonation attacks, modification, masquerading, replay, MiM attacks, and Sybil attacks. In this paper, we focus our attention on LTE-based V2X security and access control mechanisms. The current LTE-A security framework provides its own access authentication scheme, the AKA protocol for mutual authentication and other essential cryptographic operations between UEs and the network. V2N systems can leverage this protocol to achieve mutual authentication between vehicles and the mobile core network. However, this protocol experiences technical challenges, such as high signaling overhead, lack of synchronization, handover delay and potential control plane signaling overloads, as well as privacy preservation issues, which cannot satisfy the adequate security requirements for majority of LTE-based V2X services. This paper examines these challenges and points to possible ways by which they can be addressed. One possible solution, is the implementation of the distributed peer-to-peer LTE security mechanism based on the Bitcoin/Namecoin framework, to allow for security operations with minimal overhead cost, which is desirable for V2X services. The proposed architecture can ensure fast, secure and robust V2X services under LTE network while meeting V2X security requirements.

Keywords: authentication, long term evolution, security, vehicle-to-everything

Procedia PDF Downloads 167
461 Design Dual Band Band-Pass Filter by Using Stepped Impedance

Authors: Fawzia Al-Sakeer, Hassan Aldeeb

Abstract:

Development in the communications field is proceeding at an amazing speed, which has led researchers to improve and develop electronic circuits by increasing their efficiency and reducing their size to reduce the weight of electronic devices. One of the most important of these circuits is the band-pass filter, which is what made us carry out this research, which aims to use an alternate technology to design a dual band-pass filter by using a stepped impedance microstrip transmission line. We designed a filter that works at two center frequency bands by designing with the ADS program, and the results were excellent, as we obtained the two design frequencies, which are 1 and 3GHz, and the values of insertion loss S11, which was more than 21dB with a small area.

Keywords: band pass filter, dual band band-pass filter, ADS, microstrip filter, stepped impedance

Procedia PDF Downloads 68
460 A New Protocol Ensuring Users' Privacy in Pervasive Environment

Authors: Mohammed Nadir Djedid, Abdallah Chouarfia

Abstract:

Transparency of the system and its integration into the natural environment of the user are some of the important features of pervasive computing. But these characteristics that are considered as the strongest points of pervasive systems are also their weak points in terms of the user’s privacy. The privacy in pervasive systems involves more than the confidentiality of communications and concealing the identity of virtual users. The physical presence and behavior of the user in the pervasive space cannot be completely hidden and can reveal the secret of his/her identity and affect his/her privacy. This paper shows that the application of major techniques for protecting the user’s privacy still insufficient. A new solution named Shadow Protocol is proposed, which allows the users to authenticate and interact with the surrounding devices within an ubiquitous computing environment while preserving their privacy.

Keywords: pervasive systems, identification, authentication, privacy

Procedia PDF Downloads 482
459 Egyptian and Irish Female Protagonists: A Comparative Study of Al-Hakim's Song of Death and Synge's Riders to the Sea

Authors: Ahmed Mohammed Ghaleb, Ehab Saleh Alnuzaili

Abstract:

This paper attempts to generally examine Tawfiq Al-Hakim's Song of Death (1950) and John Millington Synge's Riders to the Sea (1904) by comparatively bringing the two plays under focus. Strikingly, the similarities between the two plays appear in the plot, picturization of the characters, tragic intensity, structural perfection, and the economy of language. Plot structure, albeit a simple one in both plays, is enriched by the playwrights' effective use of language, symbols, imagery, and tragic irony. Neither of the two plays has the traditional five-act structure; they are one-act plays. From a feminist point of view, the domination of female characters is observed in both plays. The female protagonists are the main focus of the two plays. Their brave characters and struggle are highly depicted. While Al-Hakim's protagonist is presented as a victim of tribal customs, Synge's protagonist is shown as a victim of nature. Both plays can be described as 'feminine tragedies' using the words of Oona Frwaley. Although the two plays appeared in totally different historical periods of time, both share considerable similarities, thematic as well as linguistic, which result in a concern to investigate them. The paper, basically, aims at asserting the commonalities between human beings and creating awareness of intercultural negotiations and connections. It attempts to bridge the cultural, intellectual, and social gap between Arab and Irish drama by exploring the common elements of the two plays. Thus, the paper presents a critical and comparative study of both plays highlighting the portrayal of the female protagonists.

Keywords: economy of language, imagery, protagonist, symbols, tragic intensity, tragic irony

Procedia PDF Downloads 212
458 Care: A Cluster Based Approach for Reliable and Efficient Routing Protocol in Wireless Sensor Networks

Authors: K. Prasanth, S. Hafeezullah Khan, B. Haribalakrishnan, D. Arun, S. Jayapriya, S. Dhivya, N. Vijayarangan

Abstract:

The main goal of our approach is to find the optimum positions for the sensor nodes, reinforcing the communications in points where certain lack of connectivity is found. Routing is the major problem in sensor network’s data transfer between nodes. We are going to provide an efficient routing technique to make data signal transfer to reach the base station soon without any interruption. Clustering and routing are the two important key factors to be considered in case of WSN. To carry out the communication from the nodes to their cluster head, we propose a parameterizable protocol so that the developer can indicate if the routing has to be sensitive to either the link quality of the nodes or the their battery levels.

Keywords: clusters, routing, wireless sensor networks, three phases, sensor networks

Procedia PDF Downloads 505