Search results for: communication difficulties
2012 High-Capacity Image Steganography using Wavelet-based Fusion on Deep Convolutional Neural Networks
Authors: Amal Khalifa, Nicolas Vana Santos
Abstract:
Steganography has been known for centuries as an efficient approach for covert communication. Due to its popularity and ease of access, image steganography has attracted researchers to find secure techniques for hiding information within an innocent looking cover image. In this research, we propose a novel deep-learning approach to digital image steganography. The proposed method, DeepWaveletFusion, uses convolutional neural networks (CNN) to hide a secret image into a cover image of the same size. Two CNNs are trained back-to-back to merge the Discrete Wavelet Transform (DWT) of both colored images and eventually be able to blindly extract the hidden image. Based on two different image similarity metrics, a weighted gain function is used to guide the learning process and maximize the quality of the retrieved secret image and yet maintaining acceptable imperceptibility. Experimental results verified the high recoverability of DeepWaveletFusion which outperformed similar deep-learning-based methods.Keywords: deep learning, steganography, image, discrete wavelet transform, fusion
Procedia PDF Downloads 932011 Performance Evaluation of a Minimum Mean Square Error-Based Physical Sidelink Share Channel Receiver under Fading Channel
Authors: Yang Fu, Jaime Rodrigo Navarro, Jose F. Monserrat, Faiza Bouchmal, Oscar Carrasco Quilis
Abstract:
Cellular Vehicle to Everything (C-V2X) is considered a promising solution for future autonomous driving. From Release 16 to Release 17, the Third Generation Partnership Project (3GPP) has introduced the definitions and services for 5G New Radio (NR) V2X. Experience from previous generations has shown that establishing a simulator for C-V2X communications is an essential preliminary step to achieve reliable and stable communication links. This paper proposes a complete framework of a link-level simulator based on the 3GPP specifications for the Physical Sidelink Share Channel (PSSCH) of the 5G NR Physical Layer (PHY). In this framework, several algorithms in the receiver part, i.e., sliding window in channel estimation and Minimum Mean Square Error (MMSE)-based equalization, are developed. Finally, the performance of the developed PSSCH receiver is validated through extensive simulations under different assumptions.Keywords: C-V2X, channel estimation, link-level simulator, sidelink, 3GPP
Procedia PDF Downloads 1332010 Low Cost Real Time Robust Identification of Impulsive Signals
Authors: R. Biondi, G. Dys, G. Ferone, T. Renard, M. Zysman
Abstract:
This paper describes an automated implementable system for impulsive signals detection and recognition. The system uses a Digital Signal Processing device for the detection and identification process. Here the system analyses the signals in real time in order to produce a particular response if needed. The system analyses the signals in real time in order to produce a specific output if needed. Detection is achieved through normalizing the inputs and comparing the read signals to a dynamic threshold and thus avoiding detections linked to loud or fluctuating environing noise. Identification is done through neuronal network algorithms. As a setup our system can receive signals to “learn” certain patterns. Through “learning” the system can recognize signals faster, inducing flexibility to new patterns similar to those known. Sound is captured through a simple jack input, and could be changed for an enhanced recording surface such as a wide-area recorder. Furthermore a communication module can be added to the apparatus to send alerts to another interface if needed.Keywords: sound detection, impulsive signal, background noise, neural network
Procedia PDF Downloads 3222009 The Duty of Application and Connection Providers Regarding the Supply of Internet Protocol by Court Order in Brazil to Determine Authorship of Acts Practiced on the Internet
Authors: João Pedro Albino, Ana Cláudia Pires Ferreira de Lima
Abstract:
Humanity has undergone a transformation from the physical to the virtual world, generating an enormous amount of data on the world wide web, known as big data. Many facts that occur in the physical world or in the digital world are proven through records made on the internet, such as digital photographs, posts on social media, contract acceptances by digital platforms, email, banking, and messaging applications, among others. These data recorded on the internet have been used as evidence in judicial proceedings. The identification of internet users is essential for the security of legal relationships. This research was carried out on scientific articles and materials from courses and lectures, with an analysis of Brazilian legislation and some judicial decisions on the request of static data from logs and Internet Protocols (IPs) from application and connection providers. In this article, we will address the determination of authorship of data processing on the internet by obtaining the IP address and the appropriate judicial procedure for this purpose under Brazilian law.Keywords: IP address, digital forensics, big data, data analytics, information and communication technology
Procedia PDF Downloads 1242008 Improving the Performances of the nMPRA Architecture by Implementing Specific Functions in Hardware
Authors: Ionel Zagan, Vasile Gheorghita Gaitan
Abstract:
Minimizing the response time to asynchronous events in a real-time system is an important factor in increasing the speed of response and an interesting concept in designing equipment fast enough for the most demanding applications. The present article will present the results regarding the validation of the nMPRA (Multi Pipeline Register Architecture) architecture using the FPGA Virtex-7 circuit. The nMPRA concept is a hardware processor with the scheduler implemented at the processor level; this is done without affecting a possible bus communication, as is the case with the other CPU solutions. The implementation of static or dynamic scheduling operations in hardware and the improvement of handling interrupts and events by the real-time executive described in the present article represent a key solution for eliminating the overhead of the operating system functions. The nMPRA processor is capable of executing a preemptive scheduling, using various algorithms without a software scheduler. Therefore, we have also presented various scheduling methods and algorithms used in scheduling the real-time tasks.Keywords: nMPRA architecture, pipeline processor, preemptive scheduling, real-time system
Procedia PDF Downloads 3702007 Bitplanes Image Encryption/Decryption Using Edge Map (SSPCE Method) and Arnold Transform
Authors: Ali A. Ukasha
Abstract:
Data security needed in data transmission, storage, and communication to ensure the security. The single step parallel contour extraction (SSPCE) method is used to create the edge map as a key image from the different Gray level/Binary image. Performing the X-OR operation between the key image and each bit plane of the original image for image pixel values change purpose. The Arnold transform used to changes the locations of image pixels as image scrambling process. Experiments have demonstrated that proposed algorithm can fully encrypt 2D Gary level image and completely reconstructed without any distortion. Also shown that the analyzed algorithm have extremely large security against some attacks like salt & pepper and JPEG compression. Its proof that the Gray level image can be protected with a higher security level. The presented method has easy hardware implementation and suitable for multimedia protection in real time applications such as wireless networks and mobile phone services.Keywords: SSPCE method, image compression, salt and peppers attacks, bitplanes decomposition, Arnold transform, lossless image encryption
Procedia PDF Downloads 5012006 Coping with Geological Hazards during Construction of Hydroelectric Projects in Himalaya
Authors: B. D. Patni, Ashwani Jain, Arindom Chakraborty
Abstract:
The world’s highest mountain range has been forming since the collision of Indian Plate with Asian Plate 40-50 million years ago. The Indian subcontinent has been deeper and deeper in to the rest of Asia resulting upliftment of Himalaya & Tibetan Plateau. The complex domain has become a major challenge for construction of hydro electric projects. The Himalayas are geologically complex & seismically active. Shifting of Indian Plate northwardly and increasing the amount of stresses in the fragile domain which leads to deformation in the form of several fold, faults and upliftment. It is difficult to undergo extensive geological investigation to ascertain the geological problems to be encountered during construction. Inaccessibility of the terrain, high rock cover, unpredictable ground water condition etc. are the main constraints. The hydroelectric projects located in Himalayas have faced many geological and geo-hydrological problems while construction of surface and subsurface works. Based on the experience, efforts have been made to identify the expected geological problems during and after construction of the projects. These have been classified into surface and subsurface problems which include existence of inhomogeneous deep overburden in the river bed or buried valley, abrupt change in bed rock profile, Occurrences of fault zones/shear zones/fractured rock in dam foundation and slope instability in the abutments. The tunneling difficulties are many such as squeezing ground condition, popping, rock bursting, high temperature gradient, heavy ingress of water, existence of shear seams/shear zones and emission of obnoxious gases. However, these problems were mitigated by adopting suitable remedial measures as per site requirement. The support system includes shotcrete, wire mesh, rock bolts, steel ribs, fore-poling, pre-grouting, pipe-roofing, MAI anchors, toe wall, retaining walls, reinforced concrete dowels, drainage drifts, anchorage cum drainage shafts, soil nails, concrete cladding and shear keys. Controlled drilling & blasting, heading & benching, proper drainage network and ventilation system are other remedial measures adopted to overcome such adverse situations. The paper highlights the geological uncertainties and its remedial measures in Himalaya, based on the analysis and evaluation of 20 hydroelectric projects during construction.Keywords: geological problems, shear seams, slope, drilling & blasting, shear zones
Procedia PDF Downloads 4032005 Coming Closer to Communities of Practice through Situated Learning: The Case Study of Polish-English, English-Polish Undergraduate BA Level Language for Specific Purposes of Translation Class
Authors: Marta Lisowska
Abstract:
The growing trend of market specialization imposes upon translators the need for proficiency in the working knowledge of specialist discourse. The notion of specialization differs from a broad general category to a highly specialized narrow field. The specialised discourse is used in the channel of communication based upon distinctive features typical for communities of practice whose co-existence is codified and hermetically locked against outsiders. Consequently, any translator deprived of professional discourse competence and social skills is incapable of providing competent translation product from source language into target language. In this paper, we report on research that explores the pedagogical practices aiming to bridge the dichotomy between the professionals and the specialist translators, while accounting for the reality of the world of professional communities entered by undergraduates on two levels: the text-based generic, and the social one. Drawing from the functional social constructivist approach, seen here as situated learning, this paper reports on the case of English-Polish, Polish-English undergraduate BA Level LSP of law translation class run in line with the simulated classroom-based and the reality-based (apprenticeship) approach. This blended method serves the purpose of introducing the young trainees to the professional world. The research provides new insights into how the LSP translation undergraduates become legitimized through discursive and social participation and engagement. The undergraduates, situated peripherally at the outset, experience their own transformation towards becoming members of these professional groups. With subjective evaluation, the trainees take a stance on this dual mode class and development of their skills. Comparing and contrasting their own work done in line with two models of translation teaching: authentic and near-authentic, the undergraduates answer research questions devised by a questionnaire survey The responses take us closer to how students feel about their LSP translation competence development. The major findings show how the trainees perceive the benefits and hardships of their functional translation class. In terms of skills, they related to communication as the most enhanced one; they highly valued the fact of being ‘exposed’ to a variety of texts (cf. multi literalism), team work, learning how to schedule work, IT skills boost and the ability to learn how to work individually. Another finding indicates that students struggled most with specialized language, and co-working with other students. The short-term research shows the momentum when the undergraduate LSP translation trainees entered the path of transformation i.e. gained consciousness of ‘how it is’ to be a participant-translator of real-life communities of practice, gaining pragmatic dint of the social and linguistic skills understood here as discursive competence (text > genre > discourse > professional practice). The undergraduates need to be aware of the work they have to do and challenges they are to face before arriving at the expert level of professional translation competence.Keywords: communities of practice in LSP translation teaching, learning LSP translation as situated experience, peripheral participation, professional discourse for LSP translation teaching, professional translation competence
Procedia PDF Downloads 972004 Effect of Internet Addiction on Dietary Behavior and Lifestyle Characteristics among University Students
Authors: Hafsa Kamran, Asma Afreen, Zaheer Ahmed
Abstract:
Internet addiction, an emerging mental health disorder from last two decades, is manifested by the inability in the controlled use of internet leading to academics, social, physiological and/or psychological difficulties. The present study aimed to assess the levels of internet addiction among university students in Lahore and to explore the effects of internet addiction on their dietary behavior and lifestyle. It was an analytical cross-sectional study. Data was collected from October to December 2016 from students of four universities selected through two-stage sampling method. The numbers of participants were 500 and 13 questionnaires were rejected due to incomplete information. Levels of Internet Addiction (IA) were calculated using Young Internet Addiction Test (YIAT). Data was also collected on students’ demographics, lifestyle factors and dietary behavior using self-reported questionnaire. Data was analyzed using SPSS (version 21). Chi-square test was applied to evaluate the relationship between variables. Results of the study revealed that 10% of the population had severe internet addiction while moderate Internet Addiction was present in 42%. High prevalence was found among males (11% vs. 8%), private sector university students (p = 0.008) and engineering students (p = 0.000). The lifestyle habits of internet addicts were significantly of poorer quality than normal users (p = 0.05). Internet addiction was found associated with lesser physically activity (p = 0.025), had shorter duration of physical activity (p = 0.016), had more disorganized sleep pattern (p = 0.023), had less duration of sleep (p = 0.019), reported being more tired and sleepy in class (p = 0.033) and spending more time on internet as compared to normal users. Severe and moderate internet addicts also found to be more overweight and obese than normal users (p = 0.000). The dietary behavior of internet addicts was significantly poorer than normal users. Internet addicts were found to skip breakfast more than a normal user (p = 0.039). Common reasons for meal skipping were lack of time and snacking between meals (p = 0.000). They also had increased meal size (p = 0.05) and habit of snacking while using the internet (p = 0.027). Fast food (p = 0.016) and fried items (p = 0.05) were most consumed snacks, while carbonated beverages (p = 0.019) were most consumed beverages among internet addicts. Internet Addicts were found to consume less than recommended daily servings of dairy (p = 0.008) and fruits (p = 0.000) and more servings of meat group (p = 0.025) than their no internet addict counterparts. In conclusion, in this study, it was demonstrated that internet addicts have unhealthy dietary behavior and inappropriate lifestyle habits. University students should be educated regarding the importance of balanced diet and healthy lifestyle, which are critical for effectual primary prevention of numerous chronic degenerative diseases. Furthermore, it is necessary to raise awareness concerning adverse effects of internet addiction among youth and their parents.Keywords: dietary behavior, internet addiction, lifestyle, university students
Procedia PDF Downloads 2012003 Test and Evaluation of Patient Tracking Platform in an Earthquake Simulation
Authors: Nahid Tavakoli, Mohammad H. Yarmohammadian, Ali Samimi
Abstract:
In earthquake situation, medical response communities such as field and referral hospitals are challenged with injured victims’ identification and tracking. In our project, it was developed a patient tracking platform (PTP) where first responders triage the patients with an electronic tag which report the location and some information of each patient during his/her movement. This platform includes: 1) near field communication (NFC) tags (ISO 14443), 2) smart mobile phones (Android-base version 4.2.2), 3) Base station laptops (Windows), 4) server software, 5) Android software to use by first responders, 5) disaster command software, and 6) system architecture. Our model has been completed through literature review, Delphi technique, focus group, design the platform, and implement in an earthquake exercise. This paper presents consideration for content, function, and technologies that must apply for patient tracking in medical emergencies situations. It is demonstrated the robustness of the patient tracking platform (PTP) in tracking 6 patients in a simulated earthquake situation in the yard of the relief and rescue department of Isfahan’s Red Crescent.Keywords: test and evaluation, patient tracking platform, earthquake, simulation
Procedia PDF Downloads 1412002 The Role of Human Capital in Rural Development: A Critical Look at Ethiopian Education Policy
Authors: Blen Telayneh Melese
Abstract:
Rural development, the unending quest of a developing country, cannot be succeeded in deprived of human capital development. Human capital, the economic pillars of a country's development, appeals a policy-based supports while fulfilling what is expected. Ethiopia, one of the rural countries with untouched and forgotten land and human force, owes historical experiences of educational policy intending for mobilization of its citizen for the advancement of the overall economy. Rural Ethiopia as well has been the focus of those educational policies, considering the economic resources entrenched with in. In this literature review paper, Ethiopian educational policy and its contribution to human capital development, as well as its role in generating quality human labor force, is assessed concisely. The author argues that the foundation of rural development such as technology, knowledge, infrastructure, market chain, communication and etc., can only be achieved through enhanced education policy that conciliates the existing reality of rural communities. Ethiopia still needs an education policy that enables it to generate a human capital that is oriented with the rural areas economic opportunities and challenges.Keywords: Ethiopia, rural development, human capital development, education policy
Procedia PDF Downloads 3612001 A Survey on Traditional Mac Layer Protocols in Cognitive Wireless Mesh Networks
Authors: Anusha M., V. Srikanth
Abstract:
Maximizing spectrum usage and numerous applications of the wireless communication networks have forced to a high interest of available spectrum. Cognitive Radio control its receiver and transmitter features exactly so that they can utilize the vacant approved spectrum without impacting the functionality of the principal licensed users. The Use of various channels assists to address interferences thereby improves the whole network efficiency. The MAC protocol in cognitive radio network explains the spectrum usage by interacting with multiple channels among the users. In this paper we studied about the architecture of cognitive wireless mesh network and traditional TDMA dependent MAC method to allocate channels dynamically. The majority of the MAC protocols suggested in the research are operated on Common-Control-Channel (CCC) to handle the services between Cognitive Radio secondary users. In this paper, an extensive study of Multi-Channel Multi-Radios or frequency range channel allotment and continually synchronized TDMA scheduling are shown in summarized way.Keywords: TDMA, MAC, multi-channel, multi-radio, WMN’S, cognitive radios
Procedia PDF Downloads 5622000 Youth Involvement in Cybercrime in Nigeria: A Case Study of Ikeja Local Government Area
Authors: Niyi Adegoke, Saanumi Jimmy Omolou
Abstract:
The prevalence rate of youth involving in cybercrime is alarming, which calls for concern among the government, parents, NGO and religious bodies, hence this paper aims at examining youth involvement in cybercrime in Nigeria. Achievement motivation theory was used to explain the activities of cyber-criminals in Nigerian society. A descriptive survey method was adopted for the study. The sample for the study was one hundred and fifty (150) respondents randomly selected from the population of the study. A questionnaire was used to gather information and data from the respondents. Data collected through the questionnaire were analyzed using percentage tool for the respondents’ bio-data while chi-square was employed to test the hypotheses. Findings from the study have revealed that parental negligence, unemployment, peer influence, and quest for materialism were responsible for cyber-crimes in Nigeria. The study concludes with the following recommendations among which are: creating employment opportunities for the youths and ensure good governance and accountability among other things will go a long way to solve the problem of cybercrime in our society.Keywords: cybercrime, youth, Nigeria, unemployment, information communication technology
Procedia PDF Downloads 2301999 Design and Implementation of Pseudorandom Number Generator Using Android Sensors
Authors: Mochamad Beta Auditama, Yusuf Kurniawan
Abstract:
A smartphone or tablet require a strong randomness to establish secure encrypted communication, encrypt files, etc. Therefore, random number generation is one of the main keys to provide secrecy. Android devices are equipped with hardware-based sensors, such as accelerometer, gyroscope, etc. Each of these sensors provides a stochastic process which has a potential to be used as an extra randomness source, in addition to /dev/random and /dev/urandom pseudorandom number generators. Android sensors can provide randomness automatically. To obtain randomness from Android sensors, each one of Android sensors shall be used to construct an entropy source. After all entropy sources are constructed, output from these entropy sources are combined to provide more entropy. Then, a deterministic process is used to produces a sequence of random bits from the combined output. All of these processes are done in accordance with NIST SP 800-22 and the series of NIST SP 800-90. The operation conditions are done 1) on Android user-space, and 2) the Android device is placed motionless on a desk.Keywords: Android hardware-based sensor, deterministic process, entropy source, random number generation/generators
Procedia PDF Downloads 3761998 Gender Differences in E-Society: The Case of Slovenia
Authors: Mitja Dečman
Abstract:
The ever-increasing presence and use of information and communication technology (ICT) influences the different social relationships of today's society. Gender differences are especially important from the viewpoint of modern society since ICT can either deepen the existing inequalities or diminish them. In a developed Western world, gender equality has been a well-focused area for decades in many parts of society including education, employment or politics and has led to a decrease in the inequality of women and men in these and other areas. The area of digital equality, or inequality for that matter, is one of the areas where gender differences still exist in many countries of the world. The research presented in this paper focuses on Slovenia, one of the smallest EU member states, being an average achiever in the area of e-society according to the many different European benchmarking indexes. On the other hand, Slovenia is working in an alignment with many European gender equality guidelines and showing good results. The results of our research are based on the analysis of survey data from 2014 to 2017 dealing with Slovenian citizens and their households and the use of ICT. Considering gender issues, the synthesis showed that cultural differences influence some measured ICT indicators but on the other hand the differences are low and only sometimes statistically significant.Keywords: digital divide, gender inequality, Slovenia, e-society
Procedia PDF Downloads 1681997 Investigating the English Speech Processing System of EFL Japanese Older Children
Authors: Hiromi Kawai
Abstract:
This study investigates the nature of EFL older children’s L2 perceptive and productive abilities using classroom data, in order to find a pedagogical solution to the teaching of L2 sounds at an early stage of learning in a formal school setting. It is still inconclusive whether older children with only EFL formal school instruction at the initial stage of L2 learning are able to attain native-like perception and production in English within the very limited amount of exposure to the target language available. Based on the notion of the lack of study of EFL Japanese children’s acquisition of English segments, the researcher uses a model of L1 speech processing which was developed for investigating L1 English children’s speech and literacy difficulties using a psycholinguistic framework. The model is composed of input channel, output channel, and lexical representation, and examines how a child receives information from spoken or written language, remembers and stores it within the lexical representations and how the child selects and produces spoken or written words. Concerning language universality and language specificity in the language acquisitional process, the aim of finding any sound errors in L1 English children seemed to conform to the author’s intention to find abilities of English sounds in older Japanese children at the novice level of English in an EFL setting. 104 students in Grade 5 (between the ages of 10 and 11 years old) of an elementary school in Tokyo participated in this study. Four tests to measure their perceptive ability and three oral repetition tests to measure their productive ability were conducted with/without reference to lexical representation. All the test items were analyzed to calculate item facility (IF) indices, and correlational analyses and Structural Equation Modeling (SEM) were conducted to examine the relationship between the receptive ability and the productive ability. IF analysis showed that (1) the participants were better at perceiving a segment than producing a segment, (2) they had difficulty in auditory discrimination of paired consonants when one of them does not exist in the Japanese inventory, (3) they had difficulty in both perceiving and producing English vowels, and (4) their L1 loan word knowledge had an influence on their ability to perceive and produce L2 sounds. The result of the Multiple Regression Modeling showed that the two production tests could predict the participants’ auditory ability of real words in English. The result of SEM showed that the hypothesis that perceptive ability affects productive ability was supported. Based on these findings, the author discusses the possible explicit method of teaching English segments to EFL older children in a formal school setting.Keywords: EFL older children, english segments, perception, production, speech processing system
Procedia PDF Downloads 2441996 [Keynote Talk]: Computer-Assisted Language Learning (CALL) for Teaching English to Speakers of Other Languages (TESOL/ESOL) as a Foreign Language (TEFL/EFL), Second Language (TESL/ESL), or Additional Language (TEAL/EAL)
Authors: Andrew Laghos
Abstract:
Computer-assisted language learning (CALL) is defined as the use of computers to help learn languages. In this study we look at several different types of CALL tools and applications and how they can assist Adults and Young Learners in learning the English language as a foreign, second or additional language. It is important to identify the roles of the teacher and the learners, and what the learners’ motivations are for learning the language. Audio, video, interactive multimedia games, online translation services, conferencing, chat rooms, discussion forums, social networks, social media, email communication, songs and music video clips are just some of the many ways computers are currently being used to enhance language learning. CALL may be used for classroom teaching as well as for online and mobile learning. Advantages and disadvantages of CALL are discussed and the study ends with future predictions of CALL.Keywords: computer-assisted language learning (CALL), teaching English as a foreign language (TEFL/EFL), adult learners, young learners
Procedia PDF Downloads 4351995 Use of Focus Group Interviews to Design a Health Impact Measurement Tool: A Volunteering Case Study
Authors: Valentine Seymour
Abstract:
Environmental volunteering organisations use questionnaires to explore the relationship between environmental volunteers and their health. To the author’s best knowledge, no one has explored volunteers’ health perception, which could be considered when designing a health impact measurement tool used to increase effective communication. This paper examines environmental volunteers' perceptions of health, knowledge which can be used to design a health impact measurement tool. This study uses focus group interviews, content analysis, and a general inductive approach to explore the health perceptions of volunteers who engage in environmental volunteering activities from the perspective of UK charity The Conservation Volunteers. Findings showed that volunteer groups presented were relatively similar in how they defined the term health, with their overall conceptual model closely resembling that of the World Health Organization 1948 definition. This suggests that future health impact measurement tools in the environmental volunteering sector could base their design around the World Health Organization’s definition.Keywords: health perception, impact measurement, mental models, tool development
Procedia PDF Downloads 1541994 Aphasia, Silence and the Non-Verbalisation of Performance (in Music)
Authors: Navonil Hazra
Abstract:
The paper discusses how and why aphasia can be understood as the language of nonverbal communication in musical performance and also looks for the elements that are required to classify it as a nonverbal language. Since music is regarded as a nonverbal medium that cannot be engaged in any language, it is concerned about how aphasia might be called the language of nonverbalization. The paper also talks about how it portrays the magnificence of a performance, and how it expresses its likings or dislikes. Regarding the reasons for aphasia, the paper talks about the seizure factor and elucidates on seizure subjects as well. Furthermore, it discusses collective seizures and individual seizures. It also tries to consider aphasia as a-posteriori rather than a-priori looking at it from the lens of ‘Pure Reason’. Along with aphasia, the paper tries to make a critique of silence and the possibilities of looking at silence differently, also looking at the ontology of silence and sound. This paper also critically examines silence and the significance of gestures in performance. It also investigates whether gestures are accompanied by silence, establishing the notion of agential silence. This paper also talks about the place and role of memory in the formulation and analysis of a performance, as well as the plaguing and reclamation of memory, how memory alters the linear course of time and taunts us to look for alternative models of temporalities. This paper discusses the concept of 'auditory labour', with active and passive listening.Keywords: aphasia, gestures, memory, silence
Procedia PDF Downloads 451993 A Framework for Strategy Development in Small Companies: A Case Study of a Telecommunication Firm
Authors: Maryam Goodarzi, Mahdieh Sheikhi, Mehdi Goodarzi
Abstract:
This study intends to offer an appropriate strategy development framework for a telecommunication firm (as a case study) which works on Information and Communication Technology (ICT) projects, development of telecommunication networks, and maintenance of local networks, according to its dominant condition. In this approach, first, the objectives were set and the mission was defined. Then, the capability was assessed by SWOT matrix. Using SPACE matrix, the strategy of the company was determined. The strategic direction is set and an appropriate and superior strategy was developed and offered employing QSPM matrix. The theoretical framework or conceptual model of the present study first involves 4 stages of framework development and then from stage 3 (assessing capability) onward, a strategic management model by Fred R. David. In this respect, the tools and methods offered in the framework are appropriate for all kinds of organizations, particularly small firms, and help strategists identify, evaluate, and select strategies.Keywords: strategy formulation, firm mission, strategic direction, space diagram, quantitative strategic planning matrix, SWOT matrix
Procedia PDF Downloads 3761992 Designing for Wearable Interactions: Exploring Care Design for Design Anthropology and Participatory Design
Authors: Wei-Chen Chang, Yu-Cheng Pei
Abstract:
This research examines wearable interaction design to mediate the design anthropology and participatory design found in technology and fashion. We will discuss the principles of design anthropology and participatory design using a wearable and fashion product process to transmit the ‘people-situation-reason-object’ method and analyze five sense applied examples that provide new thinking for designers engaged in future industry. Design anthropology and Participatory Design attempt to engage physiological and psychological design through technology-function, meaning-form and fashion aesthetics to achieve cognition between user and environment. The wearable interaction provides technological characteristics and semantic ideas transmitted to craft-cultural, collective, cheerful and creative performance. It is more confident and innovative attempt, that is able to achieve a joyful, fundamental interface. This study takes two directions for cultural thinking as the basis to establish a set of life-craft designs with interactive experience objects by users that assist designers in examining the sensual feelings to initiate a new lifestyle value.Keywords: design anthropology, wearable design, design communication, participatory design
Procedia PDF Downloads 2381991 An Epistemic Approach to Confidence Through Objectivity in Assurance of Safety-Critical Complex Systems
Authors: Odd Ivar Haugen
Abstract:
This paper presents a framework for assessing the objectivity of the assurance effort for safety-critical complex systems. Assurance is the process of building justified confidence that a system will behave as expected. Objectivity, as a property of the inquiry process, is key to generating this confidence. The framework identifies three main dimensions of objectivity: the methods and processes used to generate system and assurance artefacts, the reasoning and values underlying those artefacts, and the social processes that enable agreement on their validity. Each dimension contributes to overall objectivity, however, not as a set of independent dimensions. Objectivity is not a binary but a matter of degree, and different levels are required depending on the criticality of the system. The framework provides guidance on how to apply the concept of objectivity to different aspects of the assurance effort, from identifying stakeholders and their concerns to communicating risk. Requirement identification and refinement, verification, and risk communication are illustrations of its use in various assurance activities. Overall, this work offers a systematic approach to building justified confidence in the safety of complex engineered systems.Keywords: assurance, objectivity, risk, uncertainty, knowledge, system safety
Procedia PDF Downloads 161990 Minimization of Denial of Services Attacks in Vehicular Adhoc Networking by Applying Different Constraints
Authors: Amjad Khan
Abstract:
The security of Vehicular ad hoc networking is of great importance as it involves serious life threats. Thus to provide secure communication amongst Vehicles on road, the conventional security system is not enough. It is necessary to prevent the network resources from wastage and give them protection against malicious nodes so that to ensure the data bandwidth availability to the legitimate nodes of the network. This work is related to provide a non conventional security system by introducing some constraints to minimize the DoS (Denial of services) especially data and bandwidth. The data packets received by a node in the network will pass through a number of tests and if any of the test fails, the node will drop those data packets and will not forward it anymore. Also if a node claims to be the nearest node for forwarding emergency messages then the sender can effectively identify the true or false status of the claim by using these constraints. Consequently the DoS(Denial of Services) attack is minimized by the instant availability of data without wasting the network resources.Keywords: black hole attack, grey hole attack, intransient traffic tempering, networking
Procedia PDF Downloads 2851989 Digital Maturity Framework: A Tool to Manage the Information Technologies and Develop Activities of Innovation in Companies
Authors: Paulina Solórzano Salgado, Luis Rodrigo Valencia Pérez, Alberto de Jesús Pastrana Palma
Abstract:
In this research, it is presented a digital maturity framework, which contributes to the development of small and medium-sized enterprises (SMEs) in the commercial sector. This proposal is based on three important concepts: Marketing activities in the enterprise, information and communication technologies ICT, as well as Innovation. Prior to the development of this framework, was formulated a quantitative assessment tool through a literature review, and was validated with a method used by experts, and which determines the relationship of digital marketing and innovation activities in companies. The instrument was applied to 64 Mexican companies from the Made in Mexico database, which allowed both descriptive results and correlation results. These contributed to the development of the methodology, and confirming that the management of digital marketing has a positive relation with innovation activities of companies. Also, that analytics in digital marketing is a source for its development. In this paper, the management stages and activities are presented to be developed by companies in order to generate knowledge, which will allow them to reach its digital maturity.Keywords: digital marketing, digital maturity, innovation, SMEs
Procedia PDF Downloads 4731988 Aspects of Semiotics in Contemporary Design: A Case Study on Dice Brand
Authors: Laila Zahran Mohammed Alsibani
Abstract:
The aim of the research is to understand the aspects of semiotics in contemporary designs by redesigning an Omani donut brand with localized cultural identity. To do so, visual identity samples of Dice brand of donuts in Oman has been selected to be a case study. This study conducted based on semiotic theory by using mixed method research tools which are: documentation analysis, interview and survey. The literature review concentrates on key areas of semiotics in visual elements used in the brand designs. Also, it spotlights on the categories of semiotics in visual design. In addition, this research explores the visual cues in brand identity. The objectives of the research are to investigate the aspects of semiotics in providing meaning to visual cues and to identify visual cues for each visual element. It is hoped that this study will have the contribution to a better understanding of the different ways of using semiotics in contemporary designs. Moreover, this research can be a review of further studies in understanding and explaining current and future design trends. Future research can also focus on how brand-related signs are perceived by consumers.Keywords: brands, semiotics, visual arts, visual communication
Procedia PDF Downloads 1621987 The Truth about Good and Evil: A Mixed-Methods Approach to Color Theory
Authors: Raniya Alsharif
Abstract:
The color theory of good and evil is the association of colors to the omnipresent concept of good and evil, where human behavior and perception can be highly influenced by seeing black and white, making these connotations almost dangerously distinctive where they can be very hard to distinguish. This theory is a human construct that dates back to ancient Egypt and has been used since then in almost all forms of communication and expression, such as art, fashion, literature, and religious manuscripts, helping the implantation of preconceived ideas that influence behavior and society. This is a mixed-methods research that uses both surveys to collect quantitative data related to the theory and a vignette to collect qualitative data by using a scenario where participants aged between 18-25 will style two characters of good and bad characteristics with color contrasting clothes, both yielding results about the nature of the preconceived perceptions associated with ‘black and white’ and ‘good and evil’, illustrating the important role of media and communications in human behavior and subconscious, and also uncover how far this theory goes in the age of social media enlightenment.Keywords: color perception, interpretivism, thematic analysis, vignettes
Procedia PDF Downloads 1261986 The Current Application of BIM - An Empirical Study Focusing on the BIM-Maturity Level
Authors: Matthias Stange
Abstract:
Building Information Modelling (BIM) is one of the most promising methods in the building design process and plays an important role in the digitalization of the Architectural, Engineering, and Construction (AEC) Industry. The application of BIM is seen as the key enabler for increasing productivity in the construction industry. The model-based collaboration using the BIM method is intended to significantly reduce cost increases, schedule delays, and quality problems in the planning and construction of buildings. Numerous qualitative studies based on expert interviews support this theory and report perceived benefits from the use of BIM in terms of achieving project objectives related to cost, schedule, and quality. However, there is a large research gap in analysing quantitative data collected from real construction projects regarding the actual benefits of applying BIM based on representative sample size and different application regions as well as different project typologies. In particular, the influence of the project-related BIM maturity level is completely unexplored. This research project examines primary data from 105 construction projects worldwide using quantitative research methods. Projects from the areas of residential, commercial, and industrial construction as well as infrastructure and hydraulic engineering were examined in application regions North America, Australia, Europe, Asia, MENA region, and South America. First, a descriptive data analysis of 6 independent project variables (BIM maturity level, application region, project category, project type, project size, and BIM level) were carried out using statistical methods. With the help of statisticaldata analyses, the influence of the project-related BIM maturity level on 6 dependent project variables (deviation in planning time, deviation in construction time, number of planning collisions, frequency of rework, number of RFIand number of changes) was investigated. The study revealed that most of the benefits of using BIM perceived through numerous qualitative studies have not been confirmed. The results of the examined sample show that the application of BIM did not have an improving influence on the dependent project variables, especially regarding the quality of the planning itself and the adherence to the schedule targets. The quantitative research suggests the conclusion that the BIM planning method in its current application has not (yet) become a recognizable increase in productivity within the planning and construction process. The empirical findings indicate that this is due to the overall low level of BIM maturity in the projects of the examined sample. As a quintessence, the author suggests that the further implementation of BIM should primarily focus on an application-oriented and consistent development of the project-related BIM maturity level instead of implementing BIM for its own sake. Apparently, there are still significant difficulties in the interweaving of people, processes, and technology.Keywords: AEC-process, building information modeling, BIM maturity level, project results, productivity of the construction industry
Procedia PDF Downloads 741985 The Analysis of Gizmos Online Program as Mathematics Diagnostic Program: A Story from an Indonesian Private School
Authors: Shofiayuningtyas Luftiani
Abstract:
Some private schools in Indonesia started integrating the online program Gizmos in the teaching-learning process. Gizmos was developed to supplement the existing curriculum by integrating it into the instructional programs. The program has some features using an inquiry-based simulation, in which students conduct exploration by using a worksheet while teachers use the teacher guidelines to direct and assess students’ performance In this study, the discussion about Gizmos highlights its features as the assessment media of mathematics learning for secondary school students. The discussion is based on the case study and literature review from the Indonesian context. The purpose of applying Gizmos as an assessment media refers to the diagnostic assessment. As a part of the diagnostic assessment, the teachers review the student exploration sheet, analyze particularly in the students’ difficulties and consider findings in planning future learning process. This assessment becomes important since the teacher needs the data about students’ persistent weaknesses. Additionally, this program also helps to build student’ understanding by its interactive simulation. Currently, the assessment over-emphasizes the students’ answers in the worksheet based on the provided answer keys while students perform their skill in translating the question, doing the simulation and answering the question. Whereas, the assessment should involve the multiple perspectives and sources of students’ performance since teacher should adjust the instructional programs with the complexity of students’ learning needs and styles. Consequently, the approach to improving the assessment components is selected to challenge the current assessment. The purpose of this challenge is to involve not only the cognitive diagnosis but also the analysis of skills and error. Concerning the selected setting for this diagnostic assessment that develops the combination of cognitive diagnosis, skills analysis and error analysis, the teachers should create an assessment rubric. The rubric plays the important role as the guide to provide a set of criteria for the assessment. Without the precise rubric, the teacher potentially ineffectively documents and follows up the data about students at risk of failure. Furthermore, the teachers who employ the program of Gizmos as the diagnostic assessment might encounter some obstacles. Based on the condition of assessment in the selected setting, the obstacles involve the time constrain, the reluctance of higher teaching burden and the students’ behavior. Consequently, the teacher who chooses the Gizmos with those approaches has to plan, implement and evaluate the assessment. The main point of this assessment is not in the result of students’ worksheet. However, the diagnostic assessment has the two-stage process; the process to prompt and effectively follow-up both individual weaknesses and those of the learning process. Ultimately, the discussion of Gizmos as the media of the diagnostic assessment refers to the effort to improve the mathematical learning process.Keywords: diagnostic assessment, error analysis, Gizmos online program, skills analysis
Procedia PDF Downloads 1831984 A 5G Architecture Based to Dynamic Vehicular Clustering Enhancing VoD Services Over Vehicular Ad hoc Networks
Authors: Lamaa Sellami, Bechir Alaya
Abstract:
Nowadays, video-on-demand (VoD) applications are becoming one of the tendencies driving vehicular network users. In this paper, considering the unpredictable vehicle density, the unexpected acceleration or deceleration of the different cars included in the vehicular traffic load, and the limited radio range of the employed communication scheme, we introduce the “Dynamic Vehicular Clustering” (DVC) algorithm as a new scheme for video streaming systems over VANET. The proposed algorithm takes advantage of the concept of small cells and the introduction of wireless backhauls, inspired by the different features and the performance of the Long Term Evolution (LTE)- Advanced network. The proposed clustering algorithm considers multiple characteristics such as the vehicle’s position and acceleration to reduce latency and packet loss. Therefore, each cluster is counted as a small cell containing vehicular nodes and an access point that is elected regarding some particular specifications.Keywords: video-on-demand, vehicular ad-hoc network, mobility, vehicular traffic load, small cell, wireless backhaul, LTE-advanced, latency, packet loss
Procedia PDF Downloads 1421983 Spatially Referenced Checklist Model Dedicated to Professional Actors for a Good Evaluation and Management of Networks
Authors: Abdessalam Hijab, Hafida Boulekbache, Eric Henry
Abstract:
The objective of this article is to explain the use of geographic information system (GIS) and information and communication technologies (ICTs) in the real-time processing and analysis of data on the status of an urban sanitation network by integrating professional actors in sanitation for sustainable management in urban areas. Indeed, it is a smart geo-collaboration based on the complementarity of ICTs and GIS. This multi-actor reflection was built with the objective of contributing to the development of complementary solutions to the existing technologies to better protect the urban environment, with the help of a checklist with the spatial reference "E-Géo-LD" dedicated to the "professional/professional" actors in sanitation, for intelligent monitoring of liquid sanitation networks in urban areas. In addition, this research provides a good understanding and assimilation of liquid sanitation schemes in the "Lamkansa" sampling area of the city of Casablanca, and spatially evaluates these schemes. Downstream, it represents a guide to assess the environmental impacts of the liquid sanitation scheme.Keywords: ICT, GIS, spatial checklist, liquid sanitation, environment
Procedia PDF Downloads 237