Search results for: communications
265 Tsunami Vulnerability of Critical Infrastructure: Development and Application of Functions for Infrastructure Impact Assessment
Authors: James Hilton Williams
Abstract:
Recent tsunami events, including the 2011 Tohoku Tsunami, Japan, and the 2015 Illapel Tsunami, Chile, have highlighted the potential for tsunami impacts on the built environment. International research in the tsunami impacts domain has been largely focused toward impacts on buildings and casualty estimations, while only limited attention has been placed on the impacts on infrastructure which is critical for the recovery of impacted communities. New Zealand, with 75% of the population within 10 km of the coast, has a large amount of coastal infrastructure exposed to local, regional and distant tsunami sources. To effectively manage tsunami risk for New Zealand critical infrastructure, including energy, transportation, and communications, the vulnerability of infrastructure networks and components must first be determined. This research develops infrastructure asset vulnerability, functionality and repair- cost functions based on international post-event tsunami impact assessment data from technologically similar countries, including Japan and Chile, and adapts these to New Zealand. These functions are then utilized within a New Zealand based impact framework, allowing for cost benefit analyses, effective tsunami risk management strategies and mitigation options for exposed critical infrastructure to be determined, which can also be applied internationally.Keywords: impact assessment, infrastructure, tsunami impacts, vulnerability functions
Procedia PDF Downloads 160264 Importance of E-Participation by U-Society in the Development of the U-City
Authors: Jalaluddin Abdul Malek, Mohd Asruladlyi Ibrahim, Zurinah Tahir
Abstract:
This paper is to reveal developments in the areas of urban technology in Malaysia. Developments occur intend to add value intelligent city development to the ubiquitous city (U-city) or smart city. The phenomenon of change is called the development of post intelligent cities. U-City development discourse is seen from the perspective of the philosophy of the virtuous city organized by al-Farabi. The prosperity and perfection of a city is mainly caused by human personality factors, as well as its relationship with material and technological aspects of the city. The question is, to what extent to which human factors are taken into account in the concept of U-City as an added value to the intelligent city concept to realize the prosperity and perfection of the city? Previously, the intelligent city concept was developed based on global change and ICT movement, while the U-city added value to the development of intelligent cities and focused more on the development of information and communications technology (ICT). Value added is defined as the use of fiber optic technology that is wired to the use of wireless technology, such as wireless broadband. In this discourse, the debate on the concept of U-City is to the symbiosis between the U-City and the importance of local human e-participation (U-Society) for prosperity. In the context of virtuous city philosophy, it supports the thought of symbiosis so the concept of U-City can achieve sustainability, prosperity and perfection of the city.Keywords: smart city, ubiquitous city, u-society, e-participation, prosperity
Procedia PDF Downloads 272263 Review of the Legislative and Policy Issues in Promoting Infrastructure Development to Promote Automation in Telecom Industry
Authors: Marvin Ricardo Awarab
Abstract:
There has never been a greater need for telecom services. The Internet of Things (IoT), 5G networking, and edge computing are the driving forces behind this increased demand. The fierce demand offers communications service providers significant income opportunities. The telecom sector is centered on automation, and realizing a digital operation that functions as a real-time business will be crucial for the industry as a whole. Automation in telecom refers to the application of technology to create a more effective, quick, and scalable alternative to the conventional method of operating the telecom industry. With the promotion of 5G and the Internet of Things (IoT), telecom companies will continue to invest extensively in telecom automation technology. Automation offers benefits in the telecom industry; developing countries such as Namibia may not fully tap into such benefits because of the lack of funds and infrastructural resources to invest in automation. This paper fully investigates the benefits of automation in the telecom industry. Furthermore, the paper identifies hiccups that developing countries such as Namibia face in their quest to fully introduce automation in the telecom industry. Additionally, the paper proposes possible avenues that Namibia, as a developing country, adopt investing in automation infrastructural resources with the aim of reaping the full benefits of automation in the telecom industry.Keywords: automation, development, internet, internet of things, network, telecom, telecommunications policy, 5G
Procedia PDF Downloads 61262 Effects of Smartphone Social Applications on Elderly People’s Quality of Life
Authors: Seyed Ebrahim Hosseini, Shahbaz Pervez
Abstract:
As people go through aging, maintenance and improvement of the quality of life become more important for them. To know the role of smartphone technology and communications applications on quality of life, a sample group of old people living in Dar-Iran was selected for a quasi-experimental study. The participants were registered senior inhabitants from public health centers in Dar, Iran in 2022. The number of participants was 39. Participants were randomly categorized into intervention and control groups. A validated Persian version of the Control, Autonomy, Self-realisation, Pleasure scale (CASP-19) scale questionnaire was provided for them which answers were used for the quality of life assessment. The paired t-test between pre-and post-test (t= -8.45, p<.00), post-and follow-up-test (t= -2.12, p=.01), and pre-test and the follow-up test (t= -8.27, p<.00) in the intervention group revealed a considerable mean difference. Based on the results of paired t-test for the control group, this was not significant between pre-test and post-test (t= 1.26, p=.15), post-test and follow-up test (t= .33, p=.67) and pre-test and follow-up test (t= 1.85, p=.08) for quality of life. Considering the educational training associated with it, this study aimed at helping families and aging field practitioners to understand the essentiality of modern communication technology teaching in promoting a greater life quality of the elderly’s community.Keywords: Iranian elderly, quality of life, smartphone, social applications, CASP-19
Procedia PDF Downloads 145261 Protection of Minor's Privacy in Bosnian Herzegovinian Media (Legal Regulation and Current Media Reporting)
Authors: Ilija Musa
Abstract:
Positive legal regulation of juvenile privacy protection, current state of showing a child in BH media and possibilities of a child’s privacy protection by more adequate media legislature which should be arranged in accordance to recommendations of the UN Committee on the Rights of the Child for Bosnia and Herzegovina. Privacy of the minors in Bosnian-Herzegovinian media is insufficiently legally arranged. Due to the fact that there is no law on media area arrangement at the state level, electronic media are under jurisdiction of Communications regulatory agency, which at least partially, regulated the sector of radio and television broadcasting by adequate protection of child’s privacy. However, print and online media are under jurisdiction of non-governmental association Print and online media council in B&H which is not authorized to punish violators of this body’s Codex, what points out the necessity of passing the unique media law which would enable sanctioning the child’s privacy violation. The analysis of media content, which is a common violation of the child's privacy, analysis of positive legislation which regulates the media, confirmed the working hypothesis by which the minor’s protection policy in BH media is not protected at the appropriate level. Taking this into consideration, in the conclusion of this article the author gives recommendations for the regulation of legal protection of minor’s privacy in BH media.Keywords: children, media, legislation, privacy protection, Bosnia Herzegovina
Procedia PDF Downloads 487260 A Modeling Approach for Blockchain-Oriented Information Systems Design
Abstract:
The blockchain technology is regarded as the most promising technology that has the potential to trigger a technological revolution. However, besides the bitcoin industry, we have not yet seen a large-scale application of blockchain in those domains that are supposed to be impacted, such as supply chain, financial network, and intelligent manufacturing. The reasons not only lie in the difficulties of blockchain implementation, but are also root in the challenges of blockchain-oriented information systems design. As the blockchain members are self-interest actors that belong to organizations with different existing information systems. As they expect different information inputs and outputs of the blockchain application, a common language protocol is needed to facilitate communications between blockchain members. Second, considering the decentralization of blockchain organization, there is not any central authority to organize and coordinate the business processes. Thus, the information systems built on blockchain should support more adaptive business process. This paper aims to address these difficulties by providing a modeling approach for blockchain-oriented information systems design. We will investigate the information structure of distributed-ledger data with conceptual modeling techniques and ontology theories, and build an effective ontology mapping method for the inter-organization information flow and blockchain information records. Further, we will study the distributed-ledger-ontology based business process modeling to support adaptive enterprise on blockchain.Keywords: blockchain, ontology, information systems modeling, business process
Procedia PDF Downloads 449259 Futuristic Black Box Design Considerations and Global Networking for Real Time Monitoring of Flight Performance Parameters
Authors: K. Parandhama Gowd
Abstract:
The aim of this research paper is to conceptualize, discuss, analyze and propose alternate design methodologies for futuristic Black Box for flight safety. The proposal also includes global networking concepts for real time surveillance and monitoring of flight performance parameters including GPS parameters. It is expected that this proposal will serve as a failsafe real time diagnostic tool for accident investigation and location of debris in real time. In this paper, an attempt is made to improve the existing methods of flight data recording techniques and improve upon design considerations for futuristic FDR to overcome the trauma of not able to locate the block box. Since modern day communications and information technologies with large bandwidth are available coupled with faster computer processing techniques, the attempt made in this paper to develop a failsafe recording technique is feasible. Further data fusion/data warehousing technologies are available for exploitation.Keywords: flight data recorder (FDR), black box, diagnostic tool, global networking, cockpit voice and data recorder (CVDR), air traffic control (ATC), air traffic, telemetry, tracking and control centers ATTTCC)
Procedia PDF Downloads 571258 The Use of Voice in Online Public Access Catalog as Faster Searching Device
Authors: Maisyatus Suadaa Irfana, Nove Eka Variant Anna, Dyah Puspitasari Sri Rahayu
Abstract:
Technological developments provide convenience to all the people. Nowadays, the communication of human with the computer is done via text. With the development of technology, human and computer communications have been conducted with a voice like communication between human beings. It provides an easy facility for many people, especially those who have special needs. Voice search technology is applied in the search of book collections in the OPAC (Online Public Access Catalog), so library visitors will find it faster and easier to find books that they need. Integration with Google is needed to convert the voice into text. To optimize the time and the results of searching, Server will download all the book data that is available in the server database. Then, the data will be converted into JSON format. In addition, the incorporation of some algorithms is conducted including Decomposition (parse) in the form of array of JSON format, the index making, analyzer to the result. It aims to make the process of searching much faster than the usual searching in OPAC because the data are directly taken to the database for every search warrant. Data Update Menu is provided with the purpose to enable users perform their own data updates and get the latest data information.Keywords: OPAC, voice, searching, faster
Procedia PDF Downloads 344257 Motivational Antecedents that Influenced a Higher Education Institution in the Philippines to Adopt Enterprise Architecture
Authors: Ma. Eliza Jijeth V. dela Cruz
Abstract:
Technology is a recent prodigy in people’s everyday life that has taken off. It infiltrated almost every aspect of one’s lives, changing how people work, how people learn and how people perceive things. Academic Institutions, just like other organizations, have deeply modified its strategies to integrate technology into the institutional vision and corporate strategy that has never been greater. Information and Communications Technology (ICT) continues to be recognized as a major factor in organizations realizing its aims and objectives. Consequently, ICT has an important role in the mobilization of an academic institution’s strategy to support the delivery of operational, strategic or transformational objectives. This ICT strategy should align the institution with the radical changes of the ICT world through the use of Enterprise Architecture (EA). Hence, EA’s objective is to optimize the islands of legacy processes to be integrated that is receptive to change and supportive of the delivery of the strategy. In this paper, the focus is to explore the motivational antecedents during the adoption of EA in a Higher Education Institution in the Philippines for its ICT strategic plan. The seven antecedents (viewpoint, stakeholders, human traits, vision, revolutionary innovation, techniques and change components) provide understanding into EA adoption and the antecedents that influences the process of EA adoption.Keywords: Enterprise Architecture, Adoption, Antecedents, Higher Educational Institutions
Procedia PDF Downloads 110256 Future Education: Changing Paradigms
Authors: Girish Choudhary
Abstract:
Education is in a state of flux. Not only one need to acquire skills in order to cope with a fast changing global world, an explosive growth in technology, on the other hand is providing a new wave of teaching tools - computer aided video instruction, hypermedia, multimedia, CD-ROMs, Internet connections, and collaborative software environments. The emerging technology incorporates the group qualities of interactive, classroom-based learning while providing individual students the flexibility to participate in an educational programme at their own time and place. The technology facilitating self learning also seems to provide a cost effective solution to the dilemma of delivering education to masses. Online education is a unique learning domain that provides for many to many communications as well. The computer conferencing software defines the boundaries of the virtual classroom. The changing paradigm provides access of instruction to a large proportion of society, promises a qualitative change in the quality of learning and echoes a new way of thinking in educational theory that promotes active learning and open new learning approaches. Putting it to practice is challenging and may fundamentally alter the nature of educational institutions. The subsequent part of paper addresses such questions viz. 'Do we need to radically re-engineer the curriculum and foster an alternate set of skills in students?' in the onward journey.Keywords: on-line education, self learning, energy and power engineering, future education
Procedia PDF Downloads 328255 A Case Study on Barriers in Total Productive Maintenance Implementation in the Abu Dhabi Power Industry
Authors: A. Alseiari, P. Farrell
Abstract:
Maintenance has evolved into an imperative function, and contributes significantly to efficient and effective equipment performance. Total Productive Maintenance (TPM) is an ideal approach to support the development and implementation of operation performance improvement. It systematically aims to understand the function of equipment, the service quality relationship with equipment and the probable critical equipment failure conditions. Implementation of TPM programmes need strategic planning and there has been little research applied in this area within Middle-East power plants. In the power sector of Abu Dhabi, technologically and strategically, the power industry is extremely important, and it thus needs effective and efficient equipment management support. The aim of this paper is to investigate barriers to successful TPM implementation in the Abu Dhabi power industry. The study has been conducted in the context of a leading power company in the UAE. Semi-structured interviews were conducted with 16 employees, including maintenance and operation staff, and senior managers. The findings of this research identified seven key barriers, thus: managerial; organisational; cultural; financial; educational; communications; and auditing. With respect to the understanding of these barriers and obstacles in TPM implementation, the findings can contribute towards improved equipment operations and maintenance in power organisations.Keywords: Abu Dhabi Power Industry, TPM implementation, key barriers, organisational culture, critical success factors
Procedia PDF Downloads 244254 Information Technology and the Challenges Facing the Legal Profession in Nigeria
Authors: Odoh Ben Uruchi
Abstract:
Information Technology is an outcome of the nexus between the computer technology and the communication technology which has grown as silver fiber in Nigeria. Information Technology represents the fourth generation of human communication after sight, oral and written communications. The internet, as with all path-breaking technological developments gives us all the ample privileges to act as a global community; advertise and operate across all frontiers; over boarders and beyond the control of any government. The security concerns, computer abuse and the side effects of this technology have moved to the forefront of the consciousness of law enforcement agencies. Unfortunately, Nigeria is one of the very few countries in the world to have not legislated Cyber Laws, although several unsuccessful attempts have been made in recent times at providing the legal framework for regulating the activities in Nigerian cyberspace. Traditional legal systems have led to great difficulty in keeping pace with the rapid growth of the internet and its impact throughout Nigeria. The only existing legal frameworks are constantly being challenged by technological advancement. This has created a need to constantly update and adapt the way in which we organize ourselves as Legal Practitioners in order to maintain overall control of its domestic and national interests. This paper seeks to appraise the challenges facing the legal profession in Nigeria because of want of Cyber Laws. In doing this, the paper shall highlight the loopholes in the existing laws and recommends the way forward.Keywords: information technology, challenges, legal profession, Nigeria
Procedia PDF Downloads 515253 Emotions in Health Tweets: Analysis of American Government Official Accounts
Authors: García López
Abstract:
The Government Departments of Health have the task of informing and educating citizens about public health issues. For this, they use channels like Twitter, key in the search for health information and the propagation of content. The tweets, important in the virality of the content, may contain emotions that influence the contagion and exchange of knowledge. The goal of this study is to perform an analysis of the emotional projection of health information shared on Twitter by official American accounts: the disease control account CDCgov, National Institutes of Health, NIH, the government agency HHSGov, and the professional organization PublicHealth. For this, we used Tone Analyzer, an International Business Machines Corporation (IBM) tool specialized in emotion detection in text, corresponding to the categorical model of emotion representation. For 15 days, all tweets from these accounts were analyzed with the emotional analysis tool in text. The results showed that their tweets contain an important emotional load, a determining factor in the success of their communications. This exposes that official accounts also use subjective language and contain emotions. The predominance of emotion joy over sadness and the strong presence of emotions in their tweets stimulate the virality of content, a key in the work of informing that government health departments have.Keywords: emotions in tweets, emotion detection in the text, health information on Twitter, American health official accounts, emotions on Twitter, emotions and content
Procedia PDF Downloads 142252 Performance Analysis of PAPR Reduction in OFDM Systems based on Partial Transmit Sequence (PTS) Technique
Authors: Alcardo Alex Barakabitze, Tan Xiaoheng
Abstract:
Orthogonal Frequency Division Multiplexing (OFDM) is a special case of Multi-Carrier Modulation (MCM) technique which transmits a stream of data over a number of lower data rate subcarriers. OFDM splits the total transmission bandwidth into a number of orthogonal and non-overlapping subcarriers and transmit the collection of bits called symbols in parallel using these subcarriers. This paper explores the Peak to Average Power Reduction (PAPR) using the Partial Transmit Sequence technique. We provide the distribution analysis and the basics of OFDM signals and then show how the PAPR increases as the number of subcarriers increases. We provide the performance analysis of CCDF and PAPR expressed in decibels through MATLAB simulations. The simulation results show that, in PTS technique, the performance of PAPR reduction in OFDM systems improves significantly as the number of sub-blocks increases. However, by keeping the same number of sub-blocks variation, oversampling factor and the number of OFDM blocks’ iteration for generating the CCDF, the OFDM systems with 128 subcarriers have an improved performance in PAPR reduction compared to OFDM systems with 256, 512 or >512 subcarriers.Keywords: OFDM, peak to average power reduction (PAPR), bit error rate (BER), subcarriers, wireless communications
Procedia PDF Downloads 513251 RSU Aggregated Message Delivery for VANET
Authors: Auxeeliya Jesudoss, Ashraph Sulaiman, Ratnakar Kotnana
Abstract:
V2V communication brings up several questions of scalability issues although message sharing in vehicular ad-hoc networks comprises of both Vehicle-to-Vehicle communications (V2V) and Vehicle to Infrastructure communication (V2I). It is not an easy task for a vehicle to verify all signatures of the messages sent by its neighboring vehicles in a timely manner, without resulting in message loss. Moreover, the communication overhead of a vehicle to authenticate another vehicle would increase together with the security of the system. Another issue to be addressed is the continuous mobility of vehicles which requires at least some information on the node’s own position to be revealed to the neighboring vehicles. This may facilitate the attacker to congregate information on a node’s position or its mobility patterns. In order to tackle these issues, this paper introduces a RSU aggregated message deliverance scheme called RAMeD. With RAMeD, roadside units (RSUs) are responsible for verifying the identity of the vehicles entering in its range, collect messages from genuine vehicles and to aggregate similar messages into groups before sending them to all the vehicles in its communication range. This aggregation will tremendously improve the rate of message delivery and reduce the message lose ratio by avoiding similar messages being sent to the vehicles redundantly. The proposed protocol is analyzed extensively to evaluate its merits and efficiency for vehicular communication.Keywords: vehicular ad-hoc networks, V2V, V2I, VANET communication, scalability, message aggregation
Procedia PDF Downloads 407250 The Relationship between Public Relations and Media Relations: The Case of Hotel Enterprises
Authors: Burcu Oksuz, Volkan Altıintas, Zulfiye Acar Senturk
Abstract:
Though in the academic literature, it is emphasized that Public Relations (PR) should not be seen only as media relations, in practise, the media relations has a very dominant position at the communication studies carried out by many companies. There are many PR practitioners who have journalism background. However the number of the practitioners who have started to work in the sector after having PR education at the universities has been highly increasing. Therefore, it can be said that previous journalist dominance has diminished at the public relations sector in Turkey. However, by virtue of the fact that some companies and practitioners consider the media coverage the first priority of PR, this much is certain that the dominant position of media relations is ongoing. On the other hand, still many companies measure the success of their PR by how much place their companies have taken. This situation creates major pressure on the PR practitioners to have close relations with the media members and to make them write articles about their companies. Thereupon, PR practitioners have to take the time for the media relations and the media relations comes into prominence more than the other PR functions. The aim of this study is to reveal the PR functions at the companies and to evaluate the position of the media relations in the PR studies. Therefore, it is aimed to find out at what extend the discourse of “Public relations is not media relations” is accepted in practice and actualised. Accordingly, a research about 15 hotel enterprises which are located in the city of İzmir will be carried out. İzmir as one of the most important tourism destinations has many hotels. The PR/corporate communications managers will be interviewed profoundly within the scope of this study and PR functions performed by hotels will be discussed in details in consideration of the datum obtained.Keywords: media relations, public relations, public relations practitioners, Turkey
Procedia PDF Downloads 383249 Financing from Customers for SMEs and Managing Financial Risks: The Role of Customer Relationships
Authors: Yongsheng Guo, Mengyu Lu
Abstract:
This study investigates how Chinese SMEs manage financial risks in financing from customers from the perspectives of ethics and national culture. A grounded theory approach is adopted to identify the causal conditions, actions/interactions, and consequences. 32 interviews were conducted, and systematic coding methods were used to identify themes and categories. This study found that Chinese ethical principles, including integrity, friendship, and reciprocity, and cultural traits, including collectivism, acquaintance society, and long-term orientation, provide conditions for financing from customers. The SMEs establish trust-based relationships with customers through personal communications and social networks and reduce financial risk through diversification, frequent operations, and enterprise reputations. Both customers and SMEs can get benefits like financial resources and customer experiences. This study creates a theoretical framework that connects the causal conditions, processes, and outcomes, providing a deeper understanding of financing from customers. A resource and process capability theory of SMEs and a customer capital and customer value model are proposed to connect accounting and finance concepts. Suggestions are proposed for the authorities as more guidance and regulations are needed for this informal finance.Keywords: CRM, culture, ethics, SME, risk management
Procedia PDF Downloads 43248 An Improved Data Aided Channel Estimation Technique Using Genetic Algorithm for Massive Multi-Input Multiple-Output
Authors: M. Kislu Noman, Syed Mohammed Shamsul Islam, Shahriar Hassan, Raihana Pervin
Abstract:
With the increasing rate of wireless devices and high bandwidth operations, wireless networking and communications are becoming over crowded. To cope with such crowdy and messy situation, massive MIMO is designed to work with hundreds of low costs serving antennas at a time as well as improve the spectral efficiency at the same time. TDD has been used for gaining beamforming which is a major part of massive MIMO, to gain its best improvement to transmit and receive pilot sequences. All the benefits are only possible if the channel state information or channel estimation is gained properly. The common methods to estimate channel matrix used so far is LS, MMSE and a linear version of MMSE also proposed in many research works. We have optimized these methods using genetic algorithm to minimize the mean squared error and finding the best channel matrix from existing algorithms with less computational complexity. Our simulation result has shown that the use of GA worked beautifully on existing algorithms in a Rayleigh slow fading channel and existence of Additive White Gaussian Noise. We found that the GA optimized LS is better than existing algorithms as GA provides optimal result in some few iterations in terms of MSE with respect to SNR and computational complexity.Keywords: channel estimation, LMMSE, LS, MIMO, MMSE
Procedia PDF Downloads 190247 Assessment of the Frontline Services of the National Museum of the Philippines: Basis for an Improved Client-Oriented Service Package
Authors: Geneva Oaferina
Abstract:
The Philippines is striving to deliver professional and improved public services. The country is committed to making more effective use of its resources to fulfill its sectoral and development goals. Within the heritage field, the museum needs to have a strong focus on seeking excellence in its services to its many publics. The National Museum of the Philippines is mandated as an educational, scientific, and cultural institution. It is important that the museum is more accessible, understandable, and relevant to the public, and at the same time, it provides a quality experience for an improved client-oriented service package. This study assessed the service delivery of the National Museum using the modified HISTOQUAL model. The HISTOQUAL dimensions (Responsiveness, Tangibles, Communications, Consumables, and Empathy) were adapted that identify the service quality features in the museum sector from the poorest to the most outstanding factor that will be subject to improvement, as well as those factors that represent strong points of the museum’s services and which are important to the museum visitors. This also identified the gaps encountered by the respondents that caused such inconvenience and default on achieving the sectoral and organizational goals of the museum. As an output of the study, the researcher formulated the service package and adapted the HISTOQUAL dimensions and statements from the assessment through documentary analysis and data analysis/interpretation.Keywords: museum, frontline, inclusivity, HISTOQUAL
Procedia PDF Downloads 100246 Investigating Message Timing Side Channel Attacks on Networks on Chip with Ring Topology
Authors: Mark Davey
Abstract:
Communications on a Network on Chip (NoC) produce timing information, i.e., network injection delays, packet traversal times, throughput metrics, and other attributes relating to the traffic being sent across the chip. The security requirements of a platform encompass each node to operate with confidentiality, integrity, and availability (ISO 27001). Inherently, a shared NoC interconnect is exposed to analysis of timing patterns created by contention for the network components, i.e., links and switches/routers. This phenomenon is defined as information leakage, which represents a ‘side channel’ of sensitive information that can be correlated to platform activity. The key algorithm presented in this paper evaluates how an adversary can control two platform neighbouring nodes of a target node to obtain sensitive information about communication with the target node. The actual information obtained is the period value of a periodic task communication. This enacts a breach of the expected confidentiality of a node operating in a multiprocessor platform. An experimental investigation of the side channel is undertaken to judge the level and significance of inferred information produced by access times to the NoC. Results are presented with a series of expanding task set scenarios to evaluate the efficacy of the side channel detection algorithm as the network load increases.Keywords: embedded systems, multiprocessor, network on chip, side channel
Procedia PDF Downloads 70245 Two-Dimensional Transition Metal Dichalcogenides for Photodetection and Biosensing
Authors: Mariam Badmus, Bothina Manasreh
Abstract:
Transition metal dichalcogenides (TMDs) have gained significant attention as two-dimensional (2D) materials due to their intrinsic band gaps and unique properties, which make them ideal candidates for electronic and photonic applications. Unlike graphene, which lacks a band gap, TMDs (MX₂, where M is a transition metal and X is a chalcogen such as sulfur, selenium, or tellurium) exhibit semiconductor behavior and can be exfoliated into monolayers, enhancing their properties. The properties of these materials are investigated using density functional theory, a quantum mechanical computational method to solve Schrodinger equation for many body problems to calculate electron density of the atoms involved on which the energy and properties of a system depend. They show promise for use in photodetectors, biosensors, memory devices, and other technologies in communications, health, and energy sectors. In particular, metallic TMDs, which lack an intrinsic band gap, benefit from doping with transition metals, this improves their electronic and optical properties. Doping monolayer TMDs yields more significant improvements than doping bulk materials. Notably, doping with metals such as vanadium enhances the magnetization of TMDs, expanding their potential applications in spintronics. This work highlights the effects of doping on TMDs and explores strategies for optimizing their performance for advanced technological applications.Keywords: concentration, doping, magnetization, monolayer
Procedia PDF Downloads 7244 Implementing Online Applications to Allow Marketing Personnel to Share Their Experiences
Authors: Ishak Kamal Baskhayroun
Abstract:
This study examines consumer attitudes toward mobile marketing, especially toward SMS marketing. Unlike similar studies, this study does not focus on the young, but includes consumers who are in the 18-70 age range to the field research. According to the results, it has been concluded that most participants think SMS marketing is disturbing. Most important problems with SMS marketing are about getting subscribed to message lists without the permission of the receiver; the high number of messages sent; and the irrelevancy of the message content. The emergence of sponsorship as a new marketing communication tool and a source of competitive advantage in the marketplace has changed the entire marketing communication process. Sponsorship has overtaken other marketing communication tools in terms of growth and expenditure. This paper seeks to evaluate the role of sponsorship in marketing communication tools. The study recommends that proper measures be taken before the company embarks into sponsorship programs. This is necessary because investment in sponsorship does not always guarantee sustainable competitive advantage in the marketplace.Mobile phones are one of the direct marketing tools that can be used to reach today’s hard to reach consumers. Mobile phones are very personal devices and they are always carried with the consumer, where ever they go. This creates an opportunity for marketers to create personalized marketing communications messages and send them on the right time and place.Keywords: employee organizational performance, internal marketing, internal customer, direct marketing, mobile phones mobile marketing, sms advertising, marketing sponsorship, marketing communication theories, marketing communication tools corporate responsibility
Procedia PDF Downloads 56243 The Connection Between the International Law and the Legal Consultation on the Social Media
Authors: Amir Farouk Ahmed Ali Hussin
Abstract:
Social media, such as Facebook, LinkedIn and Ex-Twitter have experienced exponential growth and a remarkable adoption rate in recent years. They give fantastic means of online social interactions and communications with family, friends, and colleagues from around the corner or across the globe, and they have become an important part of daily digital interactions for more than one and a half billion users around the world. The personal information sharing practices that social network providers encourage have led to their success as innovative social interaction platforms. Moreover, these practices have outcome in concerns with respect to privacy and security from different stakeholders. Guiding these privacy and security concerns in social networks is a must for these networks to be sustainable. Real security and privacy tools may not be enough to address existing concerns. Some points should be followed to protect users from the existing risks. In this research, we have checked the various privacy and security issues and concerns pertaining to social media. However, we have classified these privacy and security issues and presented a thorough discussion of the effects of these issues and concerns on the future of the social networks. In addition, we have presented a set of points as precaution measures that users can consider to address these issues.Keywords: international legal, consultation mix, legal research, small and medium-sized enterprises, strategic International law, strategy alignment, house of laws, deployment, production strategy, legal strategy, business strategy
Procedia PDF Downloads 62242 Social Media Creating Communication Gap among Individuals
Authors: Muneeza Anwar, Muniba Raza, Zunahs Khalid
Abstract:
The study discusses the communication gap that has been created due to excessive use of social networking websites such as Facebook, WhatsApp, Viber etc. In this growing world of technology and awareness among people about social media it has also increased its usage. The objective of this study is to measure the ways the internet is affecting the communications among individuals through social media and to check whether this is affecting the society in a positive manner. The study signifies the theoretical and practical aspects of communication gaps among the individuals through social media. The study is conducted to check whether social networking websites are the main causes of creating communication gap among individuals. In this world of fast growing technology every day, there is a new invention, affecting the lives of people both directly and indirectly. Moreover with the usage of technology people keep updating about themselves, about different events happening around their surrounding by creating events, uploading pictures, checking in different place, and creating awareness among people who are not aware of people about what is happening. From the study, we deduced how social media is affecting individual’s life. The findings suggest that social media is although creating communication gaps among people but is also bridging them. Showing that social media is one of the causes that is creating communication gap among the individuals. Communication gap has although increased on a daily basis but on average it has remained the same as they are communicating on social networking websites but eventually decreasing the communication on personal grounds.Keywords: communication gaps, usage of social networking websites, interaction with friends and family, social media
Procedia PDF Downloads 482241 De-Learning Language at Preschool: A Case of Nepal
Authors: Meenakshi Dahal
Abstract:
Generally, children start verbal communication by the age of eighteen months. Though they have difficulties in constructing complete sentences, they try to make their thought s understandable to the audience. By the age of 36 months, when they enroll in preschool, their Language and communication skills are enhanced. Children need plenty of classroom experiences that will help them to develop their oral language skills. Oral language is the primary means through which each individual child is enabled to structure, evaluate, describe and to express his/her experiences. In the context of multi lingual and multi-cultural country like Nepal, the languages used in preschool and the communities vary. In such a case, the language of instruction in the preschool is different from the language used by the children to communicate at home. Using qualitative research method the socio-cultural aspect of the language learning has been analyzed. This has been done by analyzing and exploring preschool activities as well as the language of instruction and communication in the preschools in rural Nepal. It is found that the language of instruction is different from the language of communications primarily used by the children. Teachers seldom use local language resulting in difficulties for the children to understand. Instead of recognizing their linguistic, social and cultural capitals teachers conform to using the Nepali language which the children are not familiar with. Children have to adapt to new language structures and patterns of usage resulting them to be slow in oral language and communication in the preschool. The paper concludes that teachers have to recognize the linguistic capitals of the children and schools need to be responsible to facilitate this process for all children, whatever their language background.Keywords: children, language, preschool, socio-culture
Procedia PDF Downloads 392240 A Cloud-Based Spectrum Database Approach for Licensed Shared Spectrum Access
Authors: Hazem Abd El Megeed, Mohamed El-Refaay, Norhan Magdi Osman
Abstract:
Spectrum scarcity is a challenging obstacle in wireless communications systems. It hinders the introduction of innovative wireless services and technologies that require larger bandwidth comparing to legacy technologies. In addition, the current worldwide allocation of radio spectrum bands is already congested and can not afford additional squeezing or optimization to accommodate new wireless technologies. This challenge is a result of accumulative contributions from different factors that will be discussed later in this paper. One of these factors is the radio spectrum allocation policy governed by national regulatory authorities nowadays. The framework for this policy allocates specified portion of radio spectrum to a particular wireless service provider on exclusive utilization basis. This allocation is executed according to technical specification determined by the standard bodies of each Radio Access Technology (RAT). Dynamic access of spectrum is a framework for flexible utilization of radio spectrum resources. In this framework there is no exclusive allocation of radio spectrum and even the public safety agencies can share their spectrum bands according to a governing policy and service level agreements. In this paper, we explore different methods for accessing the spectrum dynamically and its associated implementation challenges.Keywords: licensed shared access, cognitive radio, spectrum sharing, spectrum congestion, dynamic spectrum access, spectrum database, spectrum trading, reconfigurable radio systems, opportunistic spectrum allocation (OSA)
Procedia PDF Downloads 425239 Malware Beaconing Detection by Mining Large-scale DNS Logs for Targeted Attack Identification
Authors: Andrii Shalaginov, Katrin Franke, Xiongwei Huang
Abstract:
One of the leading problems in Cyber Security today is the emergence of targeted attacks conducted by adversaries with access to sophisticated tools. These attacks usually steal senior level employee system privileges, in order to gain unauthorized access to confidential knowledge and valuable intellectual property. Malware used for initial compromise of the systems are sophisticated and may target zero-day vulnerabilities. In this work we utilize common behaviour of malware called ”beacon”, which implies that infected hosts communicate to Command and Control servers at regular intervals that have relatively small time variations. By analysing such beacon activity through passive network monitoring, it is possible to detect potential malware infections. So, we focus on time gaps as indicators of possible C2 activity in targeted enterprise networks. We represent DNS log files as a graph, whose vertices are destination domains and edges are timestamps. Then by using four periodicity detection algorithms for each pair of internal-external communications, we check timestamp sequences to identify the beacon activities. Finally, based on the graph structure, we infer the existence of other infected hosts and malicious domains enrolled in the attack activities.Keywords: malware detection, network security, targeted attack, computational intelligence
Procedia PDF Downloads 263238 Recent Developments in Artificial Intelligence and Information Communications Technology
Authors: Dolapo Adeyemo
Abstract:
Technology can be designed specifically for geriatrics and persons with disabilities or ICT accessibility solutions. Both solutions stand to benefit from advances in Artificial intelligence, which are computer systems that perform tasks that require human intelligence. Tasks such as decision making, visual perception, speech recognition, and even language translation are useful in both situation and will provide significant benefits to people with temporarily or permanent disabilities. This research’s goal is to review innovations focused on the use of artificial intelligence that bridges the accessibility gap in technology from a user-centered perspective. A mixed method approach that utilized a comprehensive review of academic literature on the subject combined with semi structure interviews of users, developers, and technology product owners. The internet of things and artificial intelligence technology is creating new opportunities in the assistive technology space and proving accessibility to existing technology. Device now more adaptable to the needs of the user by learning the behavior of users as they interact with the internet. Accessibility to devices have witnessed significant enhancements that continue to benefit people with disabilities. Examples of other advances identified are prosthetic limbs like robotic arms supported by artificial intelligence, route planning software for the visually impaired, and decision support tools for people with disabilities and even clinicians that provide care.Keywords: ICT, IOT, accessibility solutions, universal design
Procedia PDF Downloads 86237 Health Promotion Programs for Fifteen Years Decreased Loneliness and Increased Happiness for Elementary School Children in Yuzawa Town, Japan
Authors: Takeo Shibata, Arihito Endo, Chika Hiraga, Akemi Kunimatsu, Yoko Shimizu
Abstract:
Introduction: A health promotion program, Yuzawa family health plan, was initiated in 2002. It has been held for fifteen years. Yuzawa Town is famous with hot springs and ski resorts. We evaluated the changes in mental status in elementary school children. Methods: questionnaires survey had been held every five years. 196 questionnaires were corrected (94 boys and 102 girls). Changes for their anxieties, loneliness, confiding, problem-solving, risk breaching, communications, happiness, and life satisfaction were evaluated by chi-square test. Results: The rate of loneliness and life dissatisfactions decreased. The rates of happiness, confiding in grandparents, and risk breaching, increased. Especially, happiness rates increased for boys, loneliness rate decreased for girls, confiding in grandparents and risk breaching rate increased for girls. Conclusion: Our health promotion programs could increase mental health status in elementary school children.Keywords: health promotion, mental status, elementary school, loneliness, happiness
Procedia PDF Downloads 274236 Achieving High Renewable Energy Penetration in Western Australia Using Data Digitisation and Machine Learning
Authors: A. D. Tayal
Abstract:
The energy industry is undergoing significant disruption. This research outlines that, whilst challenging; this disruption is also an emerging opportunity for electricity utilities. One such opportunity is leveraging the developments in data analytics and machine learning. As the uptake of renewable energy technologies and complimentary control systems increases, electricity grids will likely transform towards dense microgrids with high penetration of renewable generation sources, rich in network and customer data, and linked through intelligent, wireless communications. Data digitisation and analytics have already impacted numerous industries, and its influence on the energy sector is growing, as computational capabilities increase to manage big data, and as machines develop algorithms to solve the energy challenges of the future. The objective of this paper is to address how far the uptake of renewable technologies can go given the constraints of existing grid infrastructure and provides a qualitative assessment of how higher levels of renewable energy penetration can be facilitated by incorporating even broader technological advances in the fields of data analytics and machine learning. Western Australia is used as a contextualised case study, given its abundance and diverse renewable resources (solar, wind, biomass, and wave) and isolated networks, making a high penetration of renewables a feasible target for policy makers over coming decades.Keywords: data, innovation, renewable, solar
Procedia PDF Downloads 363