Search results for: mm-wave communications
272 Design of Mobile Teaching for Students Collaborative Learning in Distance Higher Education
Authors: Lisbeth Amhag
Abstract:
The aim of the study is to describe and analyze the design of mobile teaching for students collaborative learning in distance higher education with a focus on mobile technologies as online webinars (web-based seminars or conferencing) by using laptops, smart phones, or tablets. These multimedia tools can provide face-to-face interactions, recorded flipped classroom videos and parallel chat communications. The data collection consists of interviews with 22 students and observations of online face-to-face webinars, as well two surveys. Theoretically, the study joins the research tradition of Computer Supported Collaborative learning, CSCL, as well as Computer Self-Efficacy, CSE concerned with individuals’ media and information literacy. Important conclusions from the study demonstrated mobile interactions increased student centered learning. As the students were appreciating the working methods, they became more engaged and motivated. The mobile technology using among student also contributes to increased flexibility between space and place, as well as media and information literacy.Keywords: computer self-efficacy, computer supported collaborative learning, distance and open learning, educational design and technologies, media and information literacy, mobile learning
Procedia PDF Downloads 358271 An Efficient Discrete Chaos in Generalized Logistic Maps with Applications in Image Encryption
Authors: Ashish Ashish
Abstract:
In the last few decades, the discrete chaos of difference equations has gained a massive attention of academicians and scholars due to its tremendous applications in each and every branch of science, such as cryptography, traffic control models, secure communications, weather forecasting, and engineering. In this article, a generalized logistic discrete map is established and discrete chaos is reported through period doubling bifurcation, period three orbit and Lyapunov exponent. It is interesting to see that the generalized logistic map exhibits superior chaos due to the presence of an extra degree of freedom of an ordered parameter. The period doubling bifurcation and Lyapunov exponent are demonstrated for some particular values of parameter and the discrete chaos is determined in the sense of Devaney's definition of chaos theoretically as well as numerically. Moreover, the study discusses an extended chaos based image encryption and decryption scheme in cryptography using this novel system. Surprisingly, a larger key space for coding and more sensitive dependence on initial conditions are examined for encryption and decryption of text messages, images and videos which secure the system strongly from external cyber attacks, coding attacks, statistic attacks and differential attacks.Keywords: chaos, period-doubling, logistic map, Lyapunov exponent, image encryption
Procedia PDF Downloads 151270 Internet Optimization by Negotiating Traffic Times
Authors: Carlos Gonzalez
Abstract:
This paper describes a system to optimize the use of the internet by clients requiring downloading of videos at peak hours. The system consists of a web server belonging to a provider of video contents, a provider of internet communications and a software application running on a client’s computer. The client using the application software will communicate to the video provider a list of the client’s future video demands. The video provider calculates which videos are going to be more in demand for download in the immediate future, and proceeds to request the internet provider the most optimal hours to do the downloading. The times of the downloading will be sent to the application software, which will use the information of pre-established hours negotiated between the video provider and the internet provider to download those videos. The videos will be saved in a special protected section of the user’s hard disk, which will only be accessed by the application software in the client’s computer. When the client is ready to see a video, the application will search the list of current existent videos in the area of the hard disk; if it does exist, it will use this video directly without the need for internet access. We found that the best way to optimize the download traffic of videos is by negotiation between the internet communication provider and the video content provider.Keywords: internet optimization, video download, future demands, secure storage
Procedia PDF Downloads 136269 The Associations of Family Support with Sexual Behaviour and Repeat Induced Abortion among Chinese Adolescents
Authors: Jiashu Shen
Abstract:
Background: The abortion rate has increased significantly, which is harmful especially to adolescents, making repeat induced abortion (RIA) among adolescents a social problem. This study aims to investigate the associations of family support with sexual behavior and repeat induced abortion among Chinese adolescents Methods: This study based on a national hospital-based sample with 945 girls aged 15-19 who underwent induced abortion in 43 hospitals. Multivariate logistic regressions were performed to estimated odds ratio for the risk factors. Results: Adolescences living with parents were less inclined to undergo RIA, especially if they were rural (adjusted odds ratio=0.48 95%CI 0.31-0.72) and local (adjusted odds ratio =0.39 95%=0.23-0.66). Those with parental financial support were likely to have less sexual partnersand take contraceptives more regularly. Those with higher self-perceived importance in family were more likely to take contraceptives during the first sexual intercourse in higher age, and with higher first abortion age and less sexual partners. Conclusion: In mainland China, living with parents, parental financial support, high self-perceived importance in family and adequate family sexuality communications may contribute to lower incidence of RIA.Keywords: Chinese adolescent, family support, repeat induced abortion, sexual behavior
Procedia PDF Downloads 120268 Application of Intelligent City and Hierarchy Intelligent Buildings in Kuala Lumpur
Authors: Jalalludin Abdul Malek, Zurinah Tahir
Abstract:
When the Multimedia Super Corridor (MSC) was launched in 1995, it became the catalyst for the implementation of the intelligent city concept, an area that covers about 15 x 50 kilometres from Kuala Lumpur City Centre (KLCC), Putrajaya and Kuala Lumpur International Airport (KLIA). The concept of intelligent city means that the city has an advanced infrastructure and infostructure such as information technology, advanced telecommunication systems, electronic technology and mechanical technology to be utilized for the development of urban elements such as industries, health, services, transportation and communications. For example, the Golden Triangle of Kuala Lumpur has also many intelligent buildings developed by the private sector such as the KLCC Tower to implement the intelligent city concept. Consequently, the intelligent buildings in the Golden Triangle can be linked directly to the Putrajaya Intelligent City and Cyberjaya Intelligent City within the confines of the MSC. However, the reality of the situation is that there are not many intelligent buildings within the Golden Triangle Kuala Lumpur scope which can be considered of high-standard intelligent buildings as referred to by the Intelligence Quotient (IQ) building standard. This increases the need to implement the real ‘intelligent city’ concept. This paper aims to show the strengths and weaknesses of the intelligent buildings in the Golden Triangle by taking into account aspects of 'intelligence' in the areas of technology and infrastructure of buildings.Keywords: intelligent city concepts, intelligent building, Golden Triangle, Kuala Lumpur
Procedia PDF Downloads 297267 Electric Vehicle Market Penetration Impact on Greenhouse Gas Emissions for Policy-Making: A Case Study of United Arab Emirates
Authors: Ahmed Kiani
Abstract:
The United Arab Emirates is clearly facing a multitude of challenges in curbing its greenhouse gas emissions to meet its pre-allotted framework of Kyoto protocol and COP21 targets due to its hunger for modernization, industrialization, infrastructure growth, soaring population and oil and gas activity. In this work, we focus on the bonafide zero emission electric vehicles market penetration in the country’s transport industry for emission reduction. We study the global electric vehicle market trends, the complementary battery technologies and the trends by manufacturers, emission standards across borders and prioritized advancements which will ultimately dictate the terms of future conditions for the United Arab Emirate transport industry. Based on our findings and analysis at every stage of current viability and state-of-transport-affairs, we postulate policy recommendations to local governmental entities from a supply and demand perspective covering aspects of technology, infrastructure requirements, change in power dynamics, end user incentives program, market regulators behavior and communications amongst key stakeholders.Keywords: electric vehicles, greenhouse gas emission reductions, market analysis, policy recommendations
Procedia PDF Downloads 309266 Modification Encryption Time and Permutation in Advanced Encryption Standard Algorithm
Authors: Dalal N. Hammod, Ekhlas K. Gbashi
Abstract:
Today, cryptography is used in many applications to achieve high security in data transmission and in real-time communications. AES has long gained global acceptance and is used for securing sensitive data in various industries but has suffered from slow processing and take a large time to transfer data. This paper suggests a method to enhance Advance Encryption Standard (AES) Algorithm based on time and permutation. The suggested method (MAES) is based on modifying the SubByte and ShiftRrows in the encryption part and modification the InvSubByte and InvShiftRows in the decryption part. After the implementation of the proposal and testing the results, the Modified AES achieved good results in accomplishing the communication with high performance criteria in terms of randomness, encryption time, storage space, and avalanche effects. The proposed method has good randomness to ciphertext because this method passed NIST statistical tests against attacks; also, (MAES) reduced the encryption time by (10 %) than the time of the original AES; therefore, the modified AES is faster than the original AES. Also, the proposed method showed good results in memory utilization where the value is (54.36) for the MAES, but the value for the original AES is (66.23). Also, the avalanche effects used for calculating diffusion property are (52.08%) for the modified AES and (51.82%) percentage for the original AES.Keywords: modified AES, randomness test, encryption time, avalanche effects
Procedia PDF Downloads 247265 Tsunami Vulnerability of Critical Infrastructure: Development and Application of Functions for Infrastructure Impact Assessment
Authors: James Hilton Williams
Abstract:
Recent tsunami events, including the 2011 Tohoku Tsunami, Japan, and the 2015 Illapel Tsunami, Chile, have highlighted the potential for tsunami impacts on the built environment. International research in the tsunami impacts domain has been largely focused toward impacts on buildings and casualty estimations, while only limited attention has been placed on the impacts on infrastructure which is critical for the recovery of impacted communities. New Zealand, with 75% of the population within 10 km of the coast, has a large amount of coastal infrastructure exposed to local, regional and distant tsunami sources. To effectively manage tsunami risk for New Zealand critical infrastructure, including energy, transportation, and communications, the vulnerability of infrastructure networks and components must first be determined. This research develops infrastructure asset vulnerability, functionality and repair- cost functions based on international post-event tsunami impact assessment data from technologically similar countries, including Japan and Chile, and adapts these to New Zealand. These functions are then utilized within a New Zealand based impact framework, allowing for cost benefit analyses, effective tsunami risk management strategies and mitigation options for exposed critical infrastructure to be determined, which can also be applied internationally.Keywords: impact assessment, infrastructure, tsunami impacts, vulnerability functions
Procedia PDF Downloads 161264 Importance of E-Participation by U-Society in the Development of the U-City
Authors: Jalaluddin Abdul Malek, Mohd Asruladlyi Ibrahim, Zurinah Tahir
Abstract:
This paper is to reveal developments in the areas of urban technology in Malaysia. Developments occur intend to add value intelligent city development to the ubiquitous city (U-city) or smart city. The phenomenon of change is called the development of post intelligent cities. U-City development discourse is seen from the perspective of the philosophy of the virtuous city organized by al-Farabi. The prosperity and perfection of a city is mainly caused by human personality factors, as well as its relationship with material and technological aspects of the city. The question is, to what extent to which human factors are taken into account in the concept of U-City as an added value to the intelligent city concept to realize the prosperity and perfection of the city? Previously, the intelligent city concept was developed based on global change and ICT movement, while the U-city added value to the development of intelligent cities and focused more on the development of information and communications technology (ICT). Value added is defined as the use of fiber optic technology that is wired to the use of wireless technology, such as wireless broadband. In this discourse, the debate on the concept of U-City is to the symbiosis between the U-City and the importance of local human e-participation (U-Society) for prosperity. In the context of virtuous city philosophy, it supports the thought of symbiosis so the concept of U-City can achieve sustainability, prosperity and perfection of the city.Keywords: smart city, ubiquitous city, u-society, e-participation, prosperity
Procedia PDF Downloads 274263 Review of the Legislative and Policy Issues in Promoting Infrastructure Development to Promote Automation in Telecom Industry
Authors: Marvin Ricardo Awarab
Abstract:
There has never been a greater need for telecom services. The Internet of Things (IoT), 5G networking, and edge computing are the driving forces behind this increased demand. The fierce demand offers communications service providers significant income opportunities. The telecom sector is centered on automation, and realizing a digital operation that functions as a real-time business will be crucial for the industry as a whole. Automation in telecom refers to the application of technology to create a more effective, quick, and scalable alternative to the conventional method of operating the telecom industry. With the promotion of 5G and the Internet of Things (IoT), telecom companies will continue to invest extensively in telecom automation technology. Automation offers benefits in the telecom industry; developing countries such as Namibia may not fully tap into such benefits because of the lack of funds and infrastructural resources to invest in automation. This paper fully investigates the benefits of automation in the telecom industry. Furthermore, the paper identifies hiccups that developing countries such as Namibia face in their quest to fully introduce automation in the telecom industry. Additionally, the paper proposes possible avenues that Namibia, as a developing country, adopt investing in automation infrastructural resources with the aim of reaping the full benefits of automation in the telecom industry.Keywords: automation, development, internet, internet of things, network, telecom, telecommunications policy, 5G
Procedia PDF Downloads 63262 Effects of Smartphone Social Applications on Elderly People’s Quality of Life
Authors: Seyed Ebrahim Hosseini, Shahbaz Pervez
Abstract:
As people go through aging, maintenance and improvement of the quality of life become more important for them. To know the role of smartphone technology and communications applications on quality of life, a sample group of old people living in Dar-Iran was selected for a quasi-experimental study. The participants were registered senior inhabitants from public health centers in Dar, Iran in 2022. The number of participants was 39. Participants were randomly categorized into intervention and control groups. A validated Persian version of the Control, Autonomy, Self-realisation, Pleasure scale (CASP-19) scale questionnaire was provided for them which answers were used for the quality of life assessment. The paired t-test between pre-and post-test (t= -8.45, p<.00), post-and follow-up-test (t= -2.12, p=.01), and pre-test and the follow-up test (t= -8.27, p<.00) in the intervention group revealed a considerable mean difference. Based on the results of paired t-test for the control group, this was not significant between pre-test and post-test (t= 1.26, p=.15), post-test and follow-up test (t= .33, p=.67) and pre-test and follow-up test (t= 1.85, p=.08) for quality of life. Considering the educational training associated with it, this study aimed at helping families and aging field practitioners to understand the essentiality of modern communication technology teaching in promoting a greater life quality of the elderly’s community.Keywords: Iranian elderly, quality of life, smartphone, social applications, CASP-19
Procedia PDF Downloads 146261 Protection of Minor's Privacy in Bosnian Herzegovinian Media (Legal Regulation and Current Media Reporting)
Authors: Ilija Musa
Abstract:
Positive legal regulation of juvenile privacy protection, current state of showing a child in BH media and possibilities of a child’s privacy protection by more adequate media legislature which should be arranged in accordance to recommendations of the UN Committee on the Rights of the Child for Bosnia and Herzegovina. Privacy of the minors in Bosnian-Herzegovinian media is insufficiently legally arranged. Due to the fact that there is no law on media area arrangement at the state level, electronic media are under jurisdiction of Communications regulatory agency, which at least partially, regulated the sector of radio and television broadcasting by adequate protection of child’s privacy. However, print and online media are under jurisdiction of non-governmental association Print and online media council in B&H which is not authorized to punish violators of this body’s Codex, what points out the necessity of passing the unique media law which would enable sanctioning the child’s privacy violation. The analysis of media content, which is a common violation of the child's privacy, analysis of positive legislation which regulates the media, confirmed the working hypothesis by which the minor’s protection policy in BH media is not protected at the appropriate level. Taking this into consideration, in the conclusion of this article the author gives recommendations for the regulation of legal protection of minor’s privacy in BH media.Keywords: children, media, legislation, privacy protection, Bosnia Herzegovina
Procedia PDF Downloads 491260 A Modeling Approach for Blockchain-Oriented Information Systems Design
Abstract:
The blockchain technology is regarded as the most promising technology that has the potential to trigger a technological revolution. However, besides the bitcoin industry, we have not yet seen a large-scale application of blockchain in those domains that are supposed to be impacted, such as supply chain, financial network, and intelligent manufacturing. The reasons not only lie in the difficulties of blockchain implementation, but are also root in the challenges of blockchain-oriented information systems design. As the blockchain members are self-interest actors that belong to organizations with different existing information systems. As they expect different information inputs and outputs of the blockchain application, a common language protocol is needed to facilitate communications between blockchain members. Second, considering the decentralization of blockchain organization, there is not any central authority to organize and coordinate the business processes. Thus, the information systems built on blockchain should support more adaptive business process. This paper aims to address these difficulties by providing a modeling approach for blockchain-oriented information systems design. We will investigate the information structure of distributed-ledger data with conceptual modeling techniques and ontology theories, and build an effective ontology mapping method for the inter-organization information flow and blockchain information records. Further, we will study the distributed-ledger-ontology based business process modeling to support adaptive enterprise on blockchain.Keywords: blockchain, ontology, information systems modeling, business process
Procedia PDF Downloads 449259 Futuristic Black Box Design Considerations and Global Networking for Real Time Monitoring of Flight Performance Parameters
Authors: K. Parandhama Gowd
Abstract:
The aim of this research paper is to conceptualize, discuss, analyze and propose alternate design methodologies for futuristic Black Box for flight safety. The proposal also includes global networking concepts for real time surveillance and monitoring of flight performance parameters including GPS parameters. It is expected that this proposal will serve as a failsafe real time diagnostic tool for accident investigation and location of debris in real time. In this paper, an attempt is made to improve the existing methods of flight data recording techniques and improve upon design considerations for futuristic FDR to overcome the trauma of not able to locate the block box. Since modern day communications and information technologies with large bandwidth are available coupled with faster computer processing techniques, the attempt made in this paper to develop a failsafe recording technique is feasible. Further data fusion/data warehousing technologies are available for exploitation.Keywords: flight data recorder (FDR), black box, diagnostic tool, global networking, cockpit voice and data recorder (CVDR), air traffic control (ATC), air traffic, telemetry, tracking and control centers ATTTCC)
Procedia PDF Downloads 572258 The Use of Voice in Online Public Access Catalog as Faster Searching Device
Authors: Maisyatus Suadaa Irfana, Nove Eka Variant Anna, Dyah Puspitasari Sri Rahayu
Abstract:
Technological developments provide convenience to all the people. Nowadays, the communication of human with the computer is done via text. With the development of technology, human and computer communications have been conducted with a voice like communication between human beings. It provides an easy facility for many people, especially those who have special needs. Voice search technology is applied in the search of book collections in the OPAC (Online Public Access Catalog), so library visitors will find it faster and easier to find books that they need. Integration with Google is needed to convert the voice into text. To optimize the time and the results of searching, Server will download all the book data that is available in the server database. Then, the data will be converted into JSON format. In addition, the incorporation of some algorithms is conducted including Decomposition (parse) in the form of array of JSON format, the index making, analyzer to the result. It aims to make the process of searching much faster than the usual searching in OPAC because the data are directly taken to the database for every search warrant. Data Update Menu is provided with the purpose to enable users perform their own data updates and get the latest data information.Keywords: OPAC, voice, searching, faster
Procedia PDF Downloads 344257 Motivational Antecedents that Influenced a Higher Education Institution in the Philippines to Adopt Enterprise Architecture
Authors: Ma. Eliza Jijeth V. dela Cruz
Abstract:
Technology is a recent prodigy in people’s everyday life that has taken off. It infiltrated almost every aspect of one’s lives, changing how people work, how people learn and how people perceive things. Academic Institutions, just like other organizations, have deeply modified its strategies to integrate technology into the institutional vision and corporate strategy that has never been greater. Information and Communications Technology (ICT) continues to be recognized as a major factor in organizations realizing its aims and objectives. Consequently, ICT has an important role in the mobilization of an academic institution’s strategy to support the delivery of operational, strategic or transformational objectives. This ICT strategy should align the institution with the radical changes of the ICT world through the use of Enterprise Architecture (EA). Hence, EA’s objective is to optimize the islands of legacy processes to be integrated that is receptive to change and supportive of the delivery of the strategy. In this paper, the focus is to explore the motivational antecedents during the adoption of EA in a Higher Education Institution in the Philippines for its ICT strategic plan. The seven antecedents (viewpoint, stakeholders, human traits, vision, revolutionary innovation, techniques and change components) provide understanding into EA adoption and the antecedents that influences the process of EA adoption.Keywords: Enterprise Architecture, Adoption, Antecedents, Higher Educational Institutions
Procedia PDF Downloads 111256 Future Education: Changing Paradigms
Authors: Girish Choudhary
Abstract:
Education is in a state of flux. Not only one need to acquire skills in order to cope with a fast changing global world, an explosive growth in technology, on the other hand is providing a new wave of teaching tools - computer aided video instruction, hypermedia, multimedia, CD-ROMs, Internet connections, and collaborative software environments. The emerging technology incorporates the group qualities of interactive, classroom-based learning while providing individual students the flexibility to participate in an educational programme at their own time and place. The technology facilitating self learning also seems to provide a cost effective solution to the dilemma of delivering education to masses. Online education is a unique learning domain that provides for many to many communications as well. The computer conferencing software defines the boundaries of the virtual classroom. The changing paradigm provides access of instruction to a large proportion of society, promises a qualitative change in the quality of learning and echoes a new way of thinking in educational theory that promotes active learning and open new learning approaches. Putting it to practice is challenging and may fundamentally alter the nature of educational institutions. The subsequent part of paper addresses such questions viz. 'Do we need to radically re-engineer the curriculum and foster an alternate set of skills in students?' in the onward journey.Keywords: on-line education, self learning, energy and power engineering, future education
Procedia PDF Downloads 328255 A Case Study on Barriers in Total Productive Maintenance Implementation in the Abu Dhabi Power Industry
Authors: A. Alseiari, P. Farrell
Abstract:
Maintenance has evolved into an imperative function, and contributes significantly to efficient and effective equipment performance. Total Productive Maintenance (TPM) is an ideal approach to support the development and implementation of operation performance improvement. It systematically aims to understand the function of equipment, the service quality relationship with equipment and the probable critical equipment failure conditions. Implementation of TPM programmes need strategic planning and there has been little research applied in this area within Middle-East power plants. In the power sector of Abu Dhabi, technologically and strategically, the power industry is extremely important, and it thus needs effective and efficient equipment management support. The aim of this paper is to investigate barriers to successful TPM implementation in the Abu Dhabi power industry. The study has been conducted in the context of a leading power company in the UAE. Semi-structured interviews were conducted with 16 employees, including maintenance and operation staff, and senior managers. The findings of this research identified seven key barriers, thus: managerial; organisational; cultural; financial; educational; communications; and auditing. With respect to the understanding of these barriers and obstacles in TPM implementation, the findings can contribute towards improved equipment operations and maintenance in power organisations.Keywords: Abu Dhabi Power Industry, TPM implementation, key barriers, organisational culture, critical success factors
Procedia PDF Downloads 245254 Information Technology and the Challenges Facing the Legal Profession in Nigeria
Authors: Odoh Ben Uruchi
Abstract:
Information Technology is an outcome of the nexus between the computer technology and the communication technology which has grown as silver fiber in Nigeria. Information Technology represents the fourth generation of human communication after sight, oral and written communications. The internet, as with all path-breaking technological developments gives us all the ample privileges to act as a global community; advertise and operate across all frontiers; over boarders and beyond the control of any government. The security concerns, computer abuse and the side effects of this technology have moved to the forefront of the consciousness of law enforcement agencies. Unfortunately, Nigeria is one of the very few countries in the world to have not legislated Cyber Laws, although several unsuccessful attempts have been made in recent times at providing the legal framework for regulating the activities in Nigerian cyberspace. Traditional legal systems have led to great difficulty in keeping pace with the rapid growth of the internet and its impact throughout Nigeria. The only existing legal frameworks are constantly being challenged by technological advancement. This has created a need to constantly update and adapt the way in which we organize ourselves as Legal Practitioners in order to maintain overall control of its domestic and national interests. This paper seeks to appraise the challenges facing the legal profession in Nigeria because of want of Cyber Laws. In doing this, the paper shall highlight the loopholes in the existing laws and recommends the way forward.Keywords: information technology, challenges, legal profession, Nigeria
Procedia PDF Downloads 516253 Emotions in Health Tweets: Analysis of American Government Official Accounts
Authors: García López
Abstract:
The Government Departments of Health have the task of informing and educating citizens about public health issues. For this, they use channels like Twitter, key in the search for health information and the propagation of content. The tweets, important in the virality of the content, may contain emotions that influence the contagion and exchange of knowledge. The goal of this study is to perform an analysis of the emotional projection of health information shared on Twitter by official American accounts: the disease control account CDCgov, National Institutes of Health, NIH, the government agency HHSGov, and the professional organization PublicHealth. For this, we used Tone Analyzer, an International Business Machines Corporation (IBM) tool specialized in emotion detection in text, corresponding to the categorical model of emotion representation. For 15 days, all tweets from these accounts were analyzed with the emotional analysis tool in text. The results showed that their tweets contain an important emotional load, a determining factor in the success of their communications. This exposes that official accounts also use subjective language and contain emotions. The predominance of emotion joy over sadness and the strong presence of emotions in their tweets stimulate the virality of content, a key in the work of informing that government health departments have.Keywords: emotions in tweets, emotion detection in the text, health information on Twitter, American health official accounts, emotions on Twitter, emotions and content
Procedia PDF Downloads 142252 Performance Analysis of PAPR Reduction in OFDM Systems based on Partial Transmit Sequence (PTS) Technique
Authors: Alcardo Alex Barakabitze, Tan Xiaoheng
Abstract:
Orthogonal Frequency Division Multiplexing (OFDM) is a special case of Multi-Carrier Modulation (MCM) technique which transmits a stream of data over a number of lower data rate subcarriers. OFDM splits the total transmission bandwidth into a number of orthogonal and non-overlapping subcarriers and transmit the collection of bits called symbols in parallel using these subcarriers. This paper explores the Peak to Average Power Reduction (PAPR) using the Partial Transmit Sequence technique. We provide the distribution analysis and the basics of OFDM signals and then show how the PAPR increases as the number of subcarriers increases. We provide the performance analysis of CCDF and PAPR expressed in decibels through MATLAB simulations. The simulation results show that, in PTS technique, the performance of PAPR reduction in OFDM systems improves significantly as the number of sub-blocks increases. However, by keeping the same number of sub-blocks variation, oversampling factor and the number of OFDM blocks’ iteration for generating the CCDF, the OFDM systems with 128 subcarriers have an improved performance in PAPR reduction compared to OFDM systems with 256, 512 or >512 subcarriers.Keywords: OFDM, peak to average power reduction (PAPR), bit error rate (BER), subcarriers, wireless communications
Procedia PDF Downloads 514251 RSU Aggregated Message Delivery for VANET
Authors: Auxeeliya Jesudoss, Ashraph Sulaiman, Ratnakar Kotnana
Abstract:
V2V communication brings up several questions of scalability issues although message sharing in vehicular ad-hoc networks comprises of both Vehicle-to-Vehicle communications (V2V) and Vehicle to Infrastructure communication (V2I). It is not an easy task for a vehicle to verify all signatures of the messages sent by its neighboring vehicles in a timely manner, without resulting in message loss. Moreover, the communication overhead of a vehicle to authenticate another vehicle would increase together with the security of the system. Another issue to be addressed is the continuous mobility of vehicles which requires at least some information on the node’s own position to be revealed to the neighboring vehicles. This may facilitate the attacker to congregate information on a node’s position or its mobility patterns. In order to tackle these issues, this paper introduces a RSU aggregated message deliverance scheme called RAMeD. With RAMeD, roadside units (RSUs) are responsible for verifying the identity of the vehicles entering in its range, collect messages from genuine vehicles and to aggregate similar messages into groups before sending them to all the vehicles in its communication range. This aggregation will tremendously improve the rate of message delivery and reduce the message lose ratio by avoiding similar messages being sent to the vehicles redundantly. The proposed protocol is analyzed extensively to evaluate its merits and efficiency for vehicular communication.Keywords: vehicular ad-hoc networks, V2V, V2I, VANET communication, scalability, message aggregation
Procedia PDF Downloads 408250 The Relationship between Public Relations and Media Relations: The Case of Hotel Enterprises
Authors: Burcu Oksuz, Volkan Altıintas, Zulfiye Acar Senturk
Abstract:
Though in the academic literature, it is emphasized that Public Relations (PR) should not be seen only as media relations, in practise, the media relations has a very dominant position at the communication studies carried out by many companies. There are many PR practitioners who have journalism background. However the number of the practitioners who have started to work in the sector after having PR education at the universities has been highly increasing. Therefore, it can be said that previous journalist dominance has diminished at the public relations sector in Turkey. However, by virtue of the fact that some companies and practitioners consider the media coverage the first priority of PR, this much is certain that the dominant position of media relations is ongoing. On the other hand, still many companies measure the success of their PR by how much place their companies have taken. This situation creates major pressure on the PR practitioners to have close relations with the media members and to make them write articles about their companies. Thereupon, PR practitioners have to take the time for the media relations and the media relations comes into prominence more than the other PR functions. The aim of this study is to reveal the PR functions at the companies and to evaluate the position of the media relations in the PR studies. Therefore, it is aimed to find out at what extend the discourse of “Public relations is not media relations” is accepted in practice and actualised. Accordingly, a research about 15 hotel enterprises which are located in the city of İzmir will be carried out. İzmir as one of the most important tourism destinations has many hotels. The PR/corporate communications managers will be interviewed profoundly within the scope of this study and PR functions performed by hotels will be discussed in details in consideration of the datum obtained.Keywords: media relations, public relations, public relations practitioners, Turkey
Procedia PDF Downloads 383249 Financing from Customers for SMEs and Managing Financial Risks: The Role of Customer Relationships
Authors: Yongsheng Guo, Mengyu Lu
Abstract:
This study investigates how Chinese SMEs manage financial risks in financing from customers from the perspectives of ethics and national culture. A grounded theory approach is adopted to identify the causal conditions, actions/interactions, and consequences. 32 interviews were conducted, and systematic coding methods were used to identify themes and categories. This study found that Chinese ethical principles, including integrity, friendship, and reciprocity, and cultural traits, including collectivism, acquaintance society, and long-term orientation, provide conditions for financing from customers. The SMEs establish trust-based relationships with customers through personal communications and social networks and reduce financial risk through diversification, frequent operations, and enterprise reputations. Both customers and SMEs can get benefits like financial resources and customer experiences. This study creates a theoretical framework that connects the causal conditions, processes, and outcomes, providing a deeper understanding of financing from customers. A resource and process capability theory of SMEs and a customer capital and customer value model are proposed to connect accounting and finance concepts. Suggestions are proposed for the authorities as more guidance and regulations are needed for this informal finance.Keywords: CRM, culture, ethics, SME, risk management
Procedia PDF Downloads 44248 An Improved Data Aided Channel Estimation Technique Using Genetic Algorithm for Massive Multi-Input Multiple-Output
Authors: M. Kislu Noman, Syed Mohammed Shamsul Islam, Shahriar Hassan, Raihana Pervin
Abstract:
With the increasing rate of wireless devices and high bandwidth operations, wireless networking and communications are becoming over crowded. To cope with such crowdy and messy situation, massive MIMO is designed to work with hundreds of low costs serving antennas at a time as well as improve the spectral efficiency at the same time. TDD has been used for gaining beamforming which is a major part of massive MIMO, to gain its best improvement to transmit and receive pilot sequences. All the benefits are only possible if the channel state information or channel estimation is gained properly. The common methods to estimate channel matrix used so far is LS, MMSE and a linear version of MMSE also proposed in many research works. We have optimized these methods using genetic algorithm to minimize the mean squared error and finding the best channel matrix from existing algorithms with less computational complexity. Our simulation result has shown that the use of GA worked beautifully on existing algorithms in a Rayleigh slow fading channel and existence of Additive White Gaussian Noise. We found that the GA optimized LS is better than existing algorithms as GA provides optimal result in some few iterations in terms of MSE with respect to SNR and computational complexity.Keywords: channel estimation, LMMSE, LS, MIMO, MMSE
Procedia PDF Downloads 191247 Assessment of the Frontline Services of the National Museum of the Philippines: Basis for an Improved Client-Oriented Service Package
Authors: Geneva Oaferina
Abstract:
The Philippines is striving to deliver professional and improved public services. The country is committed to making more effective use of its resources to fulfill its sectoral and development goals. Within the heritage field, the museum needs to have a strong focus on seeking excellence in its services to its many publics. The National Museum of the Philippines is mandated as an educational, scientific, and cultural institution. It is important that the museum is more accessible, understandable, and relevant to the public, and at the same time, it provides a quality experience for an improved client-oriented service package. This study assessed the service delivery of the National Museum using the modified HISTOQUAL model. The HISTOQUAL dimensions (Responsiveness, Tangibles, Communications, Consumables, and Empathy) were adapted that identify the service quality features in the museum sector from the poorest to the most outstanding factor that will be subject to improvement, as well as those factors that represent strong points of the museum’s services and which are important to the museum visitors. This also identified the gaps encountered by the respondents that caused such inconvenience and default on achieving the sectoral and organizational goals of the museum. As an output of the study, the researcher formulated the service package and adapted the HISTOQUAL dimensions and statements from the assessment through documentary analysis and data analysis/interpretation.Keywords: museum, frontline, inclusivity, HISTOQUAL
Procedia PDF Downloads 100246 Investigating Message Timing Side Channel Attacks on Networks on Chip with Ring Topology
Authors: Mark Davey
Abstract:
Communications on a Network on Chip (NoC) produce timing information, i.e., network injection delays, packet traversal times, throughput metrics, and other attributes relating to the traffic being sent across the chip. The security requirements of a platform encompass each node to operate with confidentiality, integrity, and availability (ISO 27001). Inherently, a shared NoC interconnect is exposed to analysis of timing patterns created by contention for the network components, i.e., links and switches/routers. This phenomenon is defined as information leakage, which represents a ‘side channel’ of sensitive information that can be correlated to platform activity. The key algorithm presented in this paper evaluates how an adversary can control two platform neighbouring nodes of a target node to obtain sensitive information about communication with the target node. The actual information obtained is the period value of a periodic task communication. This enacts a breach of the expected confidentiality of a node operating in a multiprocessor platform. An experimental investigation of the side channel is undertaken to judge the level and significance of inferred information produced by access times to the NoC. Results are presented with a series of expanding task set scenarios to evaluate the efficacy of the side channel detection algorithm as the network load increases.Keywords: embedded systems, multiprocessor, network on chip, side channel
Procedia PDF Downloads 71245 Two-Dimensional Transition Metal Dichalcogenides for Photodetection and Biosensing
Authors: Mariam Badmus, Bothina Manasreh
Abstract:
Transition metal dichalcogenides (TMDs) have gained significant attention as two-dimensional (2D) materials due to their intrinsic band gaps and unique properties, which make them ideal candidates for electronic and photonic applications. Unlike graphene, which lacks a band gap, TMDs (MX₂, where M is a transition metal and X is a chalcogen such as sulfur, selenium, or tellurium) exhibit semiconductor behavior and can be exfoliated into monolayers, enhancing their properties. The properties of these materials are investigated using density functional theory, a quantum mechanical computational method to solve Schrodinger equation for many body problems to calculate electron density of the atoms involved on which the energy and properties of a system depend. They show promise for use in photodetectors, biosensors, memory devices, and other technologies in communications, health, and energy sectors. In particular, metallic TMDs, which lack an intrinsic band gap, benefit from doping with transition metals, this improves their electronic and optical properties. Doping monolayer TMDs yields more significant improvements than doping bulk materials. Notably, doping with metals such as vanadium enhances the magnetization of TMDs, expanding their potential applications in spintronics. This work highlights the effects of doping on TMDs and explores strategies for optimizing their performance for advanced technological applications.Keywords: concentration, doping, magnetization, monolayer
Procedia PDF Downloads 10244 Implementing Online Applications to Allow Marketing Personnel to Share Their Experiences
Authors: Ishak Kamal Baskhayroun
Abstract:
This study examines consumer attitudes toward mobile marketing, especially toward SMS marketing. Unlike similar studies, this study does not focus on the young, but includes consumers who are in the 18-70 age range to the field research. According to the results, it has been concluded that most participants think SMS marketing is disturbing. Most important problems with SMS marketing are about getting subscribed to message lists without the permission of the receiver; the high number of messages sent; and the irrelevancy of the message content. The emergence of sponsorship as a new marketing communication tool and a source of competitive advantage in the marketplace has changed the entire marketing communication process. Sponsorship has overtaken other marketing communication tools in terms of growth and expenditure. This paper seeks to evaluate the role of sponsorship in marketing communication tools. The study recommends that proper measures be taken before the company embarks into sponsorship programs. This is necessary because investment in sponsorship does not always guarantee sustainable competitive advantage in the marketplace.Mobile phones are one of the direct marketing tools that can be used to reach today’s hard to reach consumers. Mobile phones are very personal devices and they are always carried with the consumer, where ever they go. This creates an opportunity for marketers to create personalized marketing communications messages and send them on the right time and place.Keywords: employee organizational performance, internal marketing, internal customer, direct marketing, mobile phones mobile marketing, sms advertising, marketing sponsorship, marketing communication theories, marketing communication tools corporate responsibility
Procedia PDF Downloads 58243 The Connection Between the International Law and the Legal Consultation on the Social Media
Authors: Amir Farouk Ahmed Ali Hussin
Abstract:
Social media, such as Facebook, LinkedIn and Ex-Twitter have experienced exponential growth and a remarkable adoption rate in recent years. They give fantastic means of online social interactions and communications with family, friends, and colleagues from around the corner or across the globe, and they have become an important part of daily digital interactions for more than one and a half billion users around the world. The personal information sharing practices that social network providers encourage have led to their success as innovative social interaction platforms. Moreover, these practices have outcome in concerns with respect to privacy and security from different stakeholders. Guiding these privacy and security concerns in social networks is a must for these networks to be sustainable. Real security and privacy tools may not be enough to address existing concerns. Some points should be followed to protect users from the existing risks. In this research, we have checked the various privacy and security issues and concerns pertaining to social media. However, we have classified these privacy and security issues and presented a thorough discussion of the effects of these issues and concerns on the future of the social networks. In addition, we have presented a set of points as precaution measures that users can consider to address these issues.Keywords: international legal, consultation mix, legal research, small and medium-sized enterprises, strategic International law, strategy alignment, house of laws, deployment, production strategy, legal strategy, business strategy
Procedia PDF Downloads 63