Search results for: internet celebrity spots
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 1838

Search results for: internet celebrity spots

1508 Modified RSA in Mobile Communication

Authors: Nagaratna Rajur, J. D. Mallapur, Y. B. Kirankumar

Abstract:

The security in mobile communication is very different from the internet or telecommunication, because of its poor user interface and limited processing capacity, as well as combination of complex network protocols. Hence, it poses a challenge for less memory usage and low computation speed based security system. Security involves all the activities that are undertaken to protect the value and on-going usability of assets and the integrity and continuity of operations. An effective network security strategies requires identifying threats and then choosing the most effective set of tools to combat them. Cryptography is a simple and efficient way to provide security in communication. RSA is an asymmetric key approach that is highly reliable and widely used in internet communication. However, it has not been efficiently implemented in mobile communication due its computational complexity and large memory utilization. The proposed algorithm modifies the current RSA to be useful in mobile communication by reducing its computational complexity and memory utilization.

Keywords: M-RSA, sensor networks, sensor applications, security

Procedia PDF Downloads 323
1507 The Third Level Digital Divide: Millennials and Post-Millennials Online Activities in South Africa

Authors: Ayanda Magida, Brian Armstrong

Abstract:

The study aimed to assess the third level of the digital divide among the millennials and post-millennials in South Africa. The millennials are people born from 1981-to 1996, that is, people between the ages of 25-40 years old and post-millennials are people born from 1997 to date. For the study, only post-millennials born between 1997-2003 were included as they were old enough to consent to participation in the study. Data was collected as part of the Ph.D. project that focuses on the relationship between income inequality, the digital divide, and social cohesion in South Africa. The digital divide has three main levels, namely the first, second and third. The first and second focus on access and usage, respectively. The third-level digital divide can be defined as the differences in the benefits associated with being online. The current paper focuses on the third level: the benefits derived by being online using four domains: economic, educational, social, and personal benefits. The economic benefits include income, employment and finance-related activities; the social benefits include socializing belonging, identity, and informal networks. The personal benefits include personal wellbeing and self-actualization. A total of 763 participants completed the survey, and 61.3% were post-millennials between the ages of 18-24 and s 38.6 % were millennials between 25 and 40. The majority of the respondents were female (62%), male (34%) and nonbinary (1%), respectively. Most of the respondents were black, followed by whites, Indians and colored, respectively. Thus, they represented the status of the demographics of the country. Most of the respondents had access to the internet and smartphone. Most expressed that they use laptops (68%) or mobile (71%) to access the internet and 54 % access the internet using wireless/Wi-Fi. There were no differences between the millennial and post-millennial economic and educational benefits of being online. However, the post-millennials were more inclined to use the internet for social and personal benefits than the millennials. This could be attributed to many factors, such as age. The post-millennials are still discovering themselves and therefore would derive social and personal benefits associated with being online. The findings confirm studies that argue that younger generations derive more benefits from being online than the older generation. Based on the findings, it is evident that the post-millennials are not using the internet or online activities for social networks and socializing but can derive economic benefits such as job looking and education benefits from being online. It can be inferred that there are no significant differences between the two groups, and it seems like the third-level digital divide is not evident among the two groups as they both have been able to derive meaningful benefits from being online. Further studies should focus on the third-level divide between the baby boomers and Generation X.

Keywords: third-level digital divide, millennials, post-millennials, online activities

Procedia PDF Downloads 78
1506 Network Mobility Support in Content-Centric Internet

Authors: Zhiwei Yan, Jong-Hyouk Lee, Yong-Jin Park, Xiaodong Lee

Abstract:

In this paper, we analyze NEtwork MObility (NEMO) supporting problems in Content-Centric Networking (CCN), and propose the CCN-NEMO which can well support the deployment of the content-centric paradigm in large-scale mobile Internet. The CCN-NEMO extends the signaling message of the basic CCN protocol, to support the mobility discovery and fast trigger of Interest re-issuing during the network mobility. Besides, the Mobile Router (MR) is extended to optimize the content searching and relaying in the local subnet. These features can be employed by the nested NEMO to maximize the advantages of content retrieving with CCN. Based on the analysis, we compare the performance on handover latency between the basic CCN and our proposed CCN-NEMO. The results show that our scheme can facilitate the content-retrieving in the NEMO scenario with improved performance.

Keywords: NEMO, CCN, mobility, handover latency

Procedia PDF Downloads 441
1505 Characteristics of Business Models of Industrial-Internet-of-Things Platforms

Authors: Peter Kress, Alexander Pflaum, Ulrich Loewen

Abstract:

The number of Internet-of-Things (IoT) platforms is steadily increasing across various industries, especially for smart factories, smart homes and smart mobility. Also in the manufacturing industry, the number of Industrial-IoT platforms is growing. Both IT players, start-ups and increasingly also established industry players and small-and-medium-enterprises introduce offerings for the connection of industrial equipment on platforms, enabled by advanced information and communication technology. Beside the offered functionalities, the established ecosystem of partners around a platform is one of the key differentiators to generate a competitive advantage. The key question is how platform operators design the business model around their platform to attract a high number of customers and partners to co-create value for the entire ecosystem. The present research tries to answer this question by determining the key characteristics of business models of successful platforms in the manufacturing industry. To achieve that, the authors selected an explorative qualitative research approach and created an inductive comparative case study. The authors generated valuable descriptive insights of the business model elements (e.g., value proposition, pricing model or partnering model) of various established platforms. Furthermore, patterns across the various cases were identified to derive propositions for the successful design of business models of platforms in the manufacturing industry.

Keywords: industrial-internet-of-things, business models, platforms, ecosystems, case study

Procedia PDF Downloads 213
1504 Proposal of Non-Destructive Inspection Function Based on Internet of Things Technology Using Drone

Authors: Byoungjoon Yu, Jihwan Park, Sujung Sin, Junghyun Im, Minsoo Park, Sehwan Park, Seunghee Park

Abstract:

In this paper, we propose a technology to monitor the soundness of an Internet-based bridge using a non-conductive inspection function. There has been a collapse accident due to the aging of the bridge structure, and it is necessary to prepare for the deterioration of the bridge. The NDT/SHM system for maintenance of existing bridge structures requires a large number of inspection personnel and expensive inspection costs, and access of expensive and large equipment to measurement points is required. Because current drone inspection equipment can only be inspected through camera, it is difficult to inspect inside damage accurately, and the results of an internal damage evaluation are subjective, and it is difficult for non-specialists to recognize the evaluation results. Therefore, it is necessary to develop NDT/SHM techniques for maintenance of new-concept bridge structures that allow for free movement and real-time evaluation of measurement results. This work is financially supported by Korea Ministry of Land, Infrastructure, and Transport (MOLIT) as 'Smart City Master and Doctor Course Grant Program' and a grant (14SCIP-B088624-01) from Construction Technology Research Program funded by Ministry of Land, Infrastructure and Transport of Korean government.

Keywords: Structural Health Monitoring, SHM, non-contact sensing, nondestructive testing, NDT, Internet of Things, autonomous self-driving drone

Procedia PDF Downloads 239
1503 An Analysis of Machine Translation: Instagram Translation vs Human Translation on the Perspective Translation Quality

Authors: Aulia Fitri

Abstract:

This aims to seek which part of the linguistics with the common mistakes occurred between Instagram translation and human translation. Instagram is a social media account that is widely used by people in the world. Everyone with the Instagram account can consume the captions and pictures that are shared by their friends, celebrity, and public figures across countries. Instagram provides the machine translation under its caption space that will assist users to understand the language of their non-native. The researcher takes samples from an Indonesian public figure whereas the account is followed by many followers. The public figure tries to help her followers from other countries understand her posts by putting up the English version after the Indonesian version. However, the research on Instagram account has not been done yet even though the account is widely used by the worldwide society. There are 20 samples that will be analysed on the perspective of translation quality and linguistics tools. As the MT, Instagram tends to give a literal translation without regarding the topic meant. On the other hand, the human translation tends to exaggerate the translation which leads a different meaning in English. This is an interesting study to discuss when the human nature and robotic-system influence the translation result.

Keywords: human translation, machine translation (MT), translation quality, linguistic tool

Procedia PDF Downloads 286
1502 Keyword Advertising: Still Need Construction in European Union; Perspective on Interflora vs. Marks and Spencer

Authors: Mohammadbagher Asghariaghamashhadi

Abstract:

Internet users normally are automatically linked to an advertisement sponsored by a bidder when Internet users enter any trademarked keyword on a search engine. This advertisement appears beside the search results. Through the process of keyword advertising, advertisers can connect with many Internet users and let them know about their goods and services. This concept has generated heated disagreements among legal scholars, trademark proprietors, advertisers, search engine owners, and consumers. Therefore, use of trademarks in keyword advertising has been one of the most debatable issues in trademark law for several years. This entirely new way of using trademarks over the Internet has provoked a discussion concerning the core concepts of trademark law. In respect to legal issues, European Union (EU) trademark law is mostly governed by the Trademark Directive and the Community Trademark Regulation. Article 5 of the directive and Article 9 of the trademark regulation determine the circumstances in which a trademark owner holds the right to prohibit a third party’s use of his/her registered sign. Harmonized EU trademark law proved to be ambiguous on whether using of a trademark is amounted to trademark infringement or not. The case law of the European Court of Justice (ECJ), with reference to this legislation, is mostly unfavorable to trademark owners. This ambivalence was also exhibited by the case law of EU Member States. European keyword advertisers simply could not tell which use of a competitor‘s trademark was lawful. In recent years, ECJ has continuously expanded the scope and reach of trademark protection in the EU. It is notable that Inconsistencies in the Court’s system of infringement criteria clearly come to the fore and this approach has been criticized by analysts who believe that the Court should have adopted a more traditional approach to the analysis of trademark infringement, which was suggested by its Advocate General, in order to arrive at the same conclusion. Regarding case law of keyword advertising within Europe, one of the most disputable cases is Interflora vs. Marks and Spencer, which is still on-going. This study examines and critically analyzes the decisions of the ECJ, the high court of England, and the Court of Appeals of England and address critically keyword advertising issue within European trademark legislation.

Keywords: ECJ, Google, Interflora, keyword advertising, Marks and Spencer, trademark infringement

Procedia PDF Downloads 325
1501 Defining a Reference Architecture for Predictive Maintenance Systems: A Case Study Using the Microsoft Azure IoT-Cloud Components

Authors: Walter Bernhofer, Peter Haber, Tobias Mayer, Manfred Mayr, Markus Ziegler

Abstract:

Current preventive maintenance measures are cost intensive and not efficient. With the available sensor data of state of the art internet of things devices new possibilities of automated data processing emerge. Current advances in data science and in machine learning enable new, so called predictive maintenance technologies, which empower data scientists to forecast possible system failures. The goal of this approach is to cut expenses in preventive maintenance by automating the detection of possible failures and to improve efficiency and quality of maintenance measures. Additionally, a centralization of the sensor data monitoring can be achieved by using this approach. This paper describes the approach of three students to define a reference architecture for a predictive maintenance solution in the internet of things domain with a connected smartphone app for service technicians. The reference architecture is validated by a case study. The case study is implemented with current Microsoft Azure cloud technologies. The results of the case study show that the reference architecture is valid and can be used to achieve a system for predictive maintenance execution with the cloud components of Microsoft Azure. The used concepts are technology platform agnostic and can be reused in many different cloud platforms. The reference architecture is valid and can be used in many use cases, like gas station maintenance, elevator maintenance and many more.

Keywords: case study, internet of things, predictive maintenance, reference architecture

Procedia PDF Downloads 223
1500 Notice and Block?

Authors: Althaf Marsoof

Abstract:

The blocking injunction, giving rise to a ‘notice and block’ regime, has become the new approach to curtail the infringement of Intellectual Property rights on the Internet. As such, the blocking injunction is an addition to the arsenal of copyright owners, and more recently has also benefited trademark owners, in their battle against piracy and counterfeiting. Yet, the blocking injunction, notwithstanding the usefulness of its ‘notice and block’ outcome, is not without limitations. In the circumstances, it is argued that ‘notice and takedown’, the approach that has been adopted by right-holders for some years, is still an important remedy against the proliferation of online content that infringe the rights of copyright and trademark owners, which is both viable and effective. Thus, it is suggested that the battle against online piracy and counterfeiting could be won only if both the blocking injunction and the practice of ‘notice and takedown’ are utilised by right-holders as complementary and simultaneous remedies.

Keywords: blocking injunctions, internet intermediaries, notice and takedown, intellectual property

Procedia PDF Downloads 392
1499 An Integrated Architecture of E-Learning System to Digitize the Learning Method

Authors: M. Touhidul Islam Sarker, Mohammod Abul Kashem

Abstract:

The purpose of this paper is to improve the e-learning system and digitize the learning method in the educational sector. The learner will login into e-learning platform and easily access the digital content, the content can be downloaded and take an assessment for evaluation. Learner can get access to these digital resources by using tablet, computer, and smart phone also. E-learning system can be defined as teaching and learning with the help of multimedia technologies and the internet by access to digital content. E-learning replacing the traditional education system through information and communication technology-based learning. This paper has designed and implemented integrated e-learning system architecture with University Management System. Moodle (Modular Object-Oriented Dynamic Learning Environment) is the best e-learning system, but the problem of Moodle has no school or university management system. In this research, we have not considered the school’s student because they are out of internet facilities. That’s why we considered the university students because they have the internet access and used technologies. The University Management System has different types of activities such as student registration, account management, teacher information, semester registration, staff information, etc. If we integrated these types of activity or module with Moodle, then we can overcome the problem of Moodle, and it will enhance the e-learning system architecture which makes effective use of technology. This architecture will give the learner to easily access the resources of e-learning platform anytime or anywhere which digitizes the learning method.

Keywords: database, e-learning, LMS, Moodle

Procedia PDF Downloads 159
1498 Low-Cost Fog Edge Computing for Smart Power Management and Home Automation

Authors: Belkacem Benadda, Adil Benabdellah, Boutheyna Souna

Abstract:

The Internet of Things (IoT) is an unprecedented creation. Electronics objects are now able to interact, share, respond and adapt to their environment on a much larger basis. Actual spread of these modern means of connectivity and solutions with high data volume exchange are affecting our ways of life. Accommodation is becoming an intelligent living space, not only suited to the people circumstances and desires, but also to systems constraints to make daily life simpler, cheaper, increase possibilities and achieve a higher level of services and luxury. In this paper we are as Internet access, teleworking, consumption monitoring, information search, etc.). This paper addresses the design and integration of a smart home, it also purposes an IoT solution that allows smart power consumption based on measurements from power-grid and deep learning analysis.

Keywords: array sensors, IoT, power grid, FPGA, embedded

Procedia PDF Downloads 88
1497 Assessment of Surface Water Quality in Belarus

Authors: Anastasiya Vouchak, Aliaksandr Volchak

Abstract:

Belarus is not short of water. However, there is a problem of water quality. Its pollution has both natural and man-made origin. This research is based on data from State Water Cadastre of the Republic of Belarus registered from 1994 to 2014. We analyzed changes in such hydro-chemical criteria as concentration of ammonium ions, suspended matter, dissolved oxygen, oil-products, nitrites, phosphates in water, dichromate value, water impurity index, 5-day biochemical oxygen demand (BOD). Pollution of water with ammonium ions was observed in Belarus rivers of the Western Dvina, Polota, Schara, Usha, Muhavets, Berzina, Plissa, Svisloch, Pripiat, Yaselda in 2006-2014. The threshold limit value (TLV) was 1.5-3 times as much. Concentration of ammonia in the Berezina exceeded 3 – 5 times the TLVs in 2006-2010. Maximum excess of TLV was registered in the Svisloch (10 km downstream of Minsk) in 2006-2007. It was over 4 mg/dm³ whereas the norm is 0.39 mg/dm³. In 1997 there were ammonia pollution spots in the Dnieper, the Berezina, and the Svisloch Rivers. Since 2006 we have observed pollution spots in the Neman, Ross, Vilia, Sozh, Gorin Rivers, the Osipovichi and Soligorsk reservoirs. Dichromate value exceeds the TLVs in 40% cases. The most polluted waters are the Muhavets, Berezina, Pripiat, Yaselda, Gorin Rivers, the Vileyka and Soligorsk reservoirs. The Western Dvina, Neman, Viliya, Schara, Svisloch, and Plissa Rivers are less polluted. The Dnieper is the cleanest in this respect. In terms of BOD, water is polluted in the Neman, Muhavets, Svisloch, Yaselda, Gorin Rivers, the Osipovichi, Zaslavl, and Soligorsk reservoirs. The Western Dvina, Polota, Sozh, Iputs Rivers and Lake Naroch are not polluted in this respect. This criterion has been decreasing in 33 out of 42 cases. The least suspended matter is in the Berezina, Sozh, Iputs Rivers and Lake Naroch. The muddiest water is in the Neman, Usha, Svisloch, Pripyat, Yaselda Rivers, the Osipovichi and Soligorsk reservoirs. Water impurity index shows reduction of this criterion at all gauge stations. Multi-year average values predominantly (66.6%) correspond to the third class of water quality, i.e. moderately polluted. They include the Western Dvina, Ross, Usha, Muhavets, Dnieper, Berezina, Plissa, Iputs, Pripyat, Yaselda, Gorin Rivers, the Osipovichi and Soligorsk reservoirs. Water in the Svisloch River downstream of Minsk is of the forth quality class, i.e. most polluted. In the rest cases (33.3%) water is relatively clean. They include the Lidea, Schara, Viliya, Sozh Rivers, Lake Lukoml, Lake Naroch, Vileyka and Zaslavl reservoirs. Multi-year average values range from 7.0 to 9.5 mg О₂/dm³. The Yaselda has the least value - 6.7 mg О₂/dm³. A shortage of dissolved oxygen was found in the Berezina (2010), the Yaselda (2007), the Plissa (2011-2014), the Soligorsk reservoir (1996). Contamination of water with oil-products was observed everywhere in 1994-1999. Some spots were found in the Western Dvina, Vilia, Usha, Dnieper in 2003-2006, in the Svisloch in 2002-2012. We are observing gradual decrease of oil pollutants in surface water. The quality of 67 % surface water is referred to as moderately polluted.

Keywords: belarus, hydro-chemical criteria, water pollution, water quality

Procedia PDF Downloads 129
1496 Policy Implications of Cashless Banking on Nigeria’s Economy

Authors: Oluwabiyi Adeola Ayodele

Abstract:

This study analysed the Policy and general issues that have arisen over time in Nigeria’ Cashless banking environment as a result of the lack of a Legal framework on Electronic banking in Nigeria. It undertook an in-depth study of the cashless banking system. It discussed the evolution, growth and development of cashless banking in Nigeria; It revealed the expected benefits of the cashless banking system; It appraised regulatory issues and other prevalent problems on cashless banking in Nigeria; and made appropriate recommendations where necessary. The study relied on primary and secondary sources of information. The primary sources included the Constitution of the Federal Republic of Nigeria, Statutes, Conventions and Judicial decisions, while the secondary sources included Books, Journals Articles, Newspapers and Internet Materials. The study revealed that cashless banking has been adopted in Nigeria but still at the developing stage. It revealed that there is no law for the regulation of cashless banking in Nigeria, what Nigeria relies on for regulation is the Central Bank of Nigeria’s Cashless Policy, 2014. The Banks and Other Financial Institutions Act Chapter B3, LFN, 2004 of Nigeria lack provision to accommodate issues on Internet banking. However, under the general principles of legality in criminal law, and by the provisions of the Nigerian Constitution, a person can only be punished for conducts that have been defined to be criminal by written laws with the penalties specifically stated in the law. Although Nigeria has potent laws for the regulation of paper banking, these laws cannot be substituted for paperless transactions. This is because the issues involved in both transactions vary. The study also revealed that the absence of law in the cashless banking environment in Nigeria will subject consumers to endless risks. This study revealed that the creation of banking markets via the Internet relies on both available technologies and appropriate laws and regulations. It revealed however that Law of some of the countries considered on cashless banking has taken care of most of the legal issues and other problems prevalent in the cashless banking environment. The study also revealed some other problems prevalent in the Nigerian cashless banking environment. The study concluded that for Nigeria to find solutions to the legal issues raised in its cashless banking environment and other problems of cashless banking, it should have a viable legal Frame work for internet banking. The study concluded that the Central Bank of Nigeria’s Policy on Cashless banking is not potent enough to tackle the challenges posed to cashless banking in Nigeria because policies only have a persuasive effect and not a binding effect. There is, therefore, a need for appropriate Laws for the regulation of cashless Banking in Nigeria. The study also concluded that there is a need to create more awareness of the system among Nigerians and solve infrastructural problems like prevalent power outage which often have been creating internet network problem.

Keywords: cashless-banking, Nigeria, policies, laws

Procedia PDF Downloads 466
1495 Analytics Model in a Telehealth Center Based on Cloud Computing and Local Storage

Authors: L. Ramirez, E. Guillén, J. Sánchez

Abstract:

Some of the main goals about telecare such as monitoring, treatment, telediagnostic are deployed with the integration of applications with specific appliances. In order to achieve a coherent model to integrate software, hardware, and healthcare systems, different telehealth models with Internet of Things (IoT), cloud computing, artificial intelligence, etc. have been implemented, and their advantages are still under analysis. In this paper, we propose an integrated model based on IoT architecture and cloud computing telehealth center. Analytics module is presented as a solution to control an ideal diagnostic about some diseases. Specific features are then compared with the recently deployed conventional models in telemedicine. The main advantage of this model is the availability of controlling the security and privacy about patient information and the optimization on processing and acquiring clinical parameters according to technical characteristics.

Keywords: analytics, telemedicine, internet of things, cloud computing

Procedia PDF Downloads 295
1494 Fast Track to the Physical Internet: A Cross-Industry Project from Upper Austria

Authors: Laura Simmer, Maria Kalt, Oliver Schauer

Abstract:

Freight transport is growing fast, but many vehicles are empty or just partially loaded. The vision and concepts of the Physical Internet (PI) proposes to eliminate these inefficiencies. Aiming for a radical sustainability improvement, the PI – inspired by the Digital Internet – is a hyperconnected global logistic system, enabling seamless asset sharing and flow consolidation. The implementation of a PI in its full expression will be a huge challenge: the industry needs innovation and implementation support including change management approaches, awareness creation and good practices diffusion, legislative actions to remove antitrust and international commerce barriers, standardization and public incentives policies. In order to take a step closer to this future the project ‘Atropine - Fast Track to the Physical Internet’ funded under the Strategic Economic and Research Program ‘Innovative Upper Austria 2020’ was set up. The two-year research project unites several research partners in this field, but also industrial partners and logistics service providers. With Atropine, the consortium wants to actively shape the mobility landscape in Upper Austria and make an innovative contribution to an energy-efficient, environmentally sound and sustainable development in the transport area. This paper should, on the one hand, clarify the questions what the project Atropine is about and, on the other hand, how a proof of concept will be reached. Awareness building plays an important role in the project as the PI requires a reorganization of the supply chain and the design of completely new forms of inter-company co-operation. New business models have to be developed and should be verified by simulation. After the simulation process one of these business models will be chosen and tested in real life with the partner companies. The developed results - simulation model and demonstrator - are used to determine how the concept of the PI can be applied in Upper Austria. Atropine shall pave the way for a full-scale development of the PI vision in the next few decades and provide the basis for pushing the industry toward a new level of co-operation with more shared resources and increased standardization.

Keywords: Atropine, inter-company co-operation, Physical Internet, shared resources, sustainable logistics

Procedia PDF Downloads 193
1493 Content Analysis of Gucci’s ‘Blackface’ Sweater Controversy across Multiple Media Platforms

Authors: John Mark King

Abstract:

Beginning on Feb. 7, 2019, the luxury brand, Gucci, was met with a firestorm on social media over fashion runway images of its black balaclava sweater, which covered the bottom half of the face and featured large, shiny bright red lips surrounding the mouth cutout. Many observers on social media and in the news media noted the garment resembled racist “blackface.” This study aimed to measure how items were framed across multiple media platforms. The unit of analysis was any headline or lead paragraph published using the search terms “Gucci” and “sweater” or “jumper” or “balaclava” during the one-year timeframe of Feb. 7, 2019, to Feb. 6, 2020. Limitations included headlines and lead paragraphs published in English and indexed in the Lexis/Nexis database. Independent variables were the nation in which the item was published and the platform (newspapers, blogs, web-based publications, newswires, magazines, or broadcast news). Dependent variables were tone toward Gucci (negative, neutral or positive) and frame (blackface/racism/racist, boycott/celebrity boycott, sweater/balaclava/jumper/fashion, apology/pulling the product/diversity initiatives by Gucci or frames unrelated to the controversy but still involving Gucci sweaters) and word count. Two coders achieved 100% agreement on all variables except tone (94.2%) and frame (96.3%). The search yielded 276 items published from 155 sources in 18 nations. The tone toward Gucci during this period was negative (69.9%). Items that were neutral (16.3%) or positive (13.8%) toward the brand were overwhelmingly related to items about other Gucci sweaters worn by celebrities or fashion reviews of other Gucci sweaters. The most frequent frame was apology/pulling the product/diversity initiatives by Gucci (35.5%). The tone was most frequently negative across all continents, including the Middle East (83.3% negative), Asia (81.8%), North America (76.6%), Australia/New Zealand (66.7%), and Europe (59.8%). Newspapers/magazines/newswires/broadcast news transcripts (72.4%) were more negative than blogs/web-based publications (63.6%). The most frequent frames used by newspapers/magazines/newswires/broadcast news transcripts were apology/pulling the product/diversity initiatives by Gucci (38.7%) and blackface/racism/racist (26.1%). Blogs/web-based publications most frequently used frames unrelated to the controversial garment, but about other Gucci sweaters (42.9%) and apology/pulling the product/diversity initiatives by Gucci (27.3%). Sources in Western nations (34.7%) and Eastern nations (47.1%) most frequently used the frame of apology/pulling the product/diversity initiatives by Gucci. Mean word count was higher for negative items (583.58) than positive items (404.76). Items framed as blackface/racism/racist or boycott/celebrity boycott had higher mean word count (668.97) than items framed as sweater/balaclava/jumper/fashion or apology/pulling the product/diversity initiatives by Gucci (498.22). The author concluded that during the year-long period, Gucci’s image was likely damaged by the release of the garment at the center of the controversy due to near-universally negative items published, but Gucci’s apology/pulling the product off the market/diversity initiatives by Gucci and items about other Gucci sweaters worn by celebrities or fashion reviews of other Gucci sweaters were the most common frames across multiple media platforms, which may have mitigated the damage to the brand.

Keywords: Blackface, branding, Gucci, media framing

Procedia PDF Downloads 123
1492 Cytokine Profiling in Cultured Endometrial Cells after Hormonal Treatment

Authors: Mark Gavriel, Ariel J. Jaffa, Dan Grisaru, David Elad

Abstract:

The human endometrium-myometrium interface (EMI) is the uterine inner barrier without a separatig layer. It is composed of endometrial epithelial cells (EEC) and endometrial stromal cells (ESC) in the endometrium and myometrial smooth muscle cells (MSMC) in the myometrium. The EMI undergoes structural remodeling during the menstruation cycle which are essential for human reproduction. Recently, we co-cultured a layer-by-layer in vitro model of EEC, ESC and MSMC on a synthetic membrane for mechanobiology experiments. We also treated the model with progesterone and β-estradiol in order to mimic the in vivo receptive uterus In the present study we analyzed the cytokines profile in a single layer of EEC the hormonal treated in vitro model of the EMI. The methodologies of this research include simple tissue-engineering . First, we cultured commercial EEC (RL95-2, ATCC® CRL-1671™) in 24-wellplate. Then, we applied an hormonal stimuli protocol with 17-β-estradiol and progesterone in time dependent concentration according to the human physiology that mimics the menstrual cycle. We collected cell supernatant samples of control, pre-ovulation, ovulation and post-ovulaton periods for analysis of the secreted proteins and cytokines. The cytokine profiling was performed using the Proteome Profiler Human XL Cytokine Array Kit (R&D Systems, Inc., USA) that can detect105 human soluble cytokines. The relative quantification of all the cytokines will be analyzed using xMAP – LUMINEX. We conducted a fishing expedition with the 4 membranes Proteome Profiler. We processed the images, quantified the spots intensity and normalized these values by the negative control and reference spots at the membrane. Analyses of the relative quantities that reflected change higher than 5% of the control points of the kit revealed the The results clearly showed that there are significant changes in the cytokine level for inflammation and angiogenesis pathways. Analysis of tissue-engineered models of the uterine wall will enable deeper investigation of molecular and biomechanical aspects of early reproductive stages (e.g. the window of implantation) or developments of pathologies.

Keywords: tissue-engineering, hormonal stimuli, reproduction, multi-layer uterine model, progesterone, β-estradiol, receptive uterine model, fertility

Procedia PDF Downloads 101
1491 Composite Approach to Extremism and Terrorism Web Content Classification

Authors: Kolade Olawande Owoeye, George Weir

Abstract:

Terrorism and extremism activities on the internet are becoming the most significant threats to national security because of their potential dangers. In response to this challenge, law enforcement and security authorities are actively implementing comprehensive measures by countering the use of the internet for terrorism. To achieve the measures, there is need for intelligence gathering via the internet. This includes real-time monitoring of potential websites that are used for recruitment and information dissemination among other operations by extremist groups. However, with billions of active webpages, real-time monitoring of all webpages become almost impossible. To narrow down the search domain, there is a need for efficient webpage classification techniques. This research proposed a new approach tagged: SentiPosit-based method. SentiPosit-based method combines features of the Posit-based method and the Sentistrenght-based method for classification of terrorism and extremism webpages. The experiment was carried out on 7500 webpages obtained through TENE-webcrawler by International Cyber Crime Research Centre (ICCRC). The webpages were manually grouped into three classes which include the ‘pro-extremist’, ‘anti-extremist’ and ‘neutral’ with 2500 webpages in each category. A supervised learning algorithm is then applied on the classified dataset in order to build the model. Results obtained was compared with existing classification method using the prediction accuracy and runtime. It was observed that our proposed hybrid approach produced a better classification accuracy compared to existing approaches within a reasonable runtime.

Keywords: sentiposit, classification, extremism, terrorism

Procedia PDF Downloads 253
1490 A Practice of Zero Trust Architecture in Financial Transactions

Authors: Liwen Wang, Yuting Chen, Tong Wu, Shaolei Hu

Abstract:

In order to enhance the security of critical financial infrastructure, this study carries out a transformation of the architecture of a financial trading terminal to a zero trust architecture (ZTA), constructs an active defense system for cybersecurity, improves the security level of trading services in the Internet environment, enhances the ability to prevent network attacks and unknown risks, and reduces the industry and security risks brought about by cybersecurity risks. This study introduces the SDP technology of ZTA, adapts and applies it to a financial trading terminal to achieve security optimization and fine-grained business grading control. The upgraded architecture of the trading terminal moves security protection forward to the user access layer, replaces VPN to optimize remote access, and significantly improves the security protection capability of Internet transactions. The study achieves 1. deep integration with the access control architecture of the transaction system; 2. no impact on the performance of terminals and gateways, and no perception of application system upgrades; 3. customized checklist and policy configuration; 4. introduction of industry-leading security technology such as single-packet authorization (SPA) and secondary authentication. This study carries out a successful application of ZTA in the field of financial trading and provides transformation ideas for other similar systems while improving the security level of financial transaction services in the Internet environment.

Keywords: zero trust, trading terminal, architecture, network security, cybersecurity

Procedia PDF Downloads 131
1489 Internet Based Teleoperation of the Quad Rotor with Force Feedback Using Smith Predictor

Authors: K. Senthil Kumar, A. Vasumalaikannan

Abstract:

In this paper, teleoperation of the quadrotor using Internet with Force feedback is addressed. Teleoperation with Force feedback is the ability to remotely control a robot, where contact (obstacle) or environment (wind gust etc) information (force feedback) is communicated from the quadrotor to the master joystick and thus giving the operator a sense of telepresence. The stability and performance of such a teleoperator is highly dependent on the amount of time delay present in the control loop. This problem is further complicated given the fact that for network based communication the time delay is itself time varying and highly non deterministic. In this paper, a novel method using Neural based Smith Predictor at the master side the stability is achieved. The performance of the system even during worst case scenario is within acceptable.

Keywords: teleoperation, quadrotor, neural smith predictor, time delay

Procedia PDF Downloads 592
1488 Internet of Things: Route Search Optimization Applying Ant Colony Algorithm and Theory of Computer Science

Authors: Tushar Bhardwaj

Abstract:

Internet of Things (IoT) possesses a dynamic network where the network nodes (mobile devices) are added and removed constantly and randomly, hence the traffic distribution in the network is quite variable and irregular. The basic but very important part in any network is route searching. We have many conventional route searching algorithms like link-state, and distance vector algorithms but they are restricted to the static point to point network topology. In this paper we propose a model that uses the Ant Colony Algorithm for route searching. It is dynamic in nature and has positive feedback mechanism that conforms to the route searching. We have also embedded the concept of Non-Deterministic Finite Automata [NDFA] minimization to reduce the network to increase the performance. Results show that Ant Colony Algorithm gives the shortest path from the source to destination node and NDFA minimization reduces the broadcasting storm effectively.

Keywords: routing, ant colony algorithm, NDFA, IoT

Procedia PDF Downloads 415
1487 Application of Wireless Sensor Networks: A Survey in Thailand

Authors: Sathapath Kilaso

Abstract:

Nowadays, Today, wireless sensor networks are an important technology that works with Internet of Things. It is receiving various data from many sensor. Then sent to processing or storing. By wireless network or through the Internet. The devices around us are intelligent, can receiving/transmitting and processing data and communicating through the system. There are many applications of wireless sensor networks, such as smart city, smart farm, environmental management, weather. This article will explore the use of wireless sensor networks in Thailand and collect data from Thai Thesis database in 2012-2017. How to Implementing Wireless Sensor Network Technology. Advantage from this study To know the usage wireless technology in many fields. This will be beneficial for future research. In this study was found the most widely used wireless sensor network in agriculture field. Especially for smart farms. And the second is the adoption of the environment. Such as weather stations and water inspection.

Keywords: wireless sensor network, smart city, survey, Adhoc Network

Procedia PDF Downloads 180
1486 Cybersecurity and Governance for Humanitarian Work: An Approach for Addressing Security Risks

Authors: Rossouw De Bruin, Sebastiaan H. Von Solms

Abstract:

The state of national security is an evolving concern. Companies, organizations, governments, states and individuals are aware of the security of their information and their assets however, they may not always be aware of the risks present. These risks are not only limited to non-existence of security procedures. Existing security can be severely flawed, especially if there is non-conformance towards policies, practices and procedures. When looking at humanitarian actions, we can easily identify these flaws. Unfortunately, humanitarian aid has to compete with factors from within the states, countries and continents they are working in. Furthermore, as technology improves, so does our connectivity to the internet and the way in which we use the internet. However, there are times when security is overlooked and humanitarian agencies are some of the agencies that do not always take security into consideration. The purpose of this paper will be to introduce the importance of cybersecurity and cybersecurity governance with respect to humanitarian work. We will also introduce and briefly discuss a model that can be used by humanitarian agencies to assess, manage and maintain their cybersecurity efforts.

Keywords: humanities, cybersecurity, cybersecurity governance, maturity, cybersecurity maturity, maturity model

Procedia PDF Downloads 239
1485 [Keynote Talk]: Formal Specification and Description Language and Message Sequence Chart to Model and Validate Session Initiation Protocol Services

Authors: Sa’ed Abed, Mohammad H. Al Shayeji, Ovais Ahmed, Sahel Alouneh

Abstract:

Session Initiation Protocol (SIP) is a signaling layer protocol for building, adjusting and ending sessions among participants including Internet conferences, telephone calls and multimedia distribution. SIP facilitates user movement by proxying and forwarding requests to the present location of the user. In this paper, we provide a formal Specification and Description Language (SDL) and Message Sequence Chart (MSC) to model and define the Internet Engineering Task Force (IETF) SIP protocol and its sample services resulted from informal SIP specification. We create an “Abstract User Interface” using case analysis so that can be applied to identify SIP services more explicitly. The issued sample SIP features are then used as case scenarios; they are revised in MSCs format and validated to their corresponding SDL models.

Keywords: modeling, MSC, SDL, SIP, validating

Procedia PDF Downloads 185
1484 Freedom of Speech and Involvement in Hatred Speech on Social Media Networks

Authors: Sara Chinnasamy, Michelle Gun, M. Adnan Hashim

Abstract:

Federal Constitution guarantees Malaysians the right to free speech and expression; yet hatred speech can be commonly found on social media platforms such as Facebook, Twitter, and Instagram. In Malaysia social media sphere, most hatred speech involves religion, race and politics. Recent cases of racial attacks on social media have created social tensions among Malaysians. Many Malaysians always argue on their rights to freedom of speech. However, there are laws that limit their expression to the public and protecting social media users from being a victim of hate speech. This paper aims to explore the attitude and involvement of Malaysian netizens towards freedom of speech and hatred speech on social media. It also examines the relationship between involvement in hatred speech among Malaysian netizens and attitude towards freedom of speech. For most Malaysians, practicing total freedom of speech in the open is unthinkable. As a result, the best channel to articulate their feelings and opinions liberally is the internet. With the advent of the internet medium, more and more Malaysians are conveying their viewpoints using the various internet channels although sensitivity of the audience is seldom taken into account. Consequently, this situation has led to pockets of social disharmony among the citizens. Although this unhealthy activity is denounced by the authority, netizens are generally of the view that they have the right to write anything they want. Using the quantitative method, survey was conducted among Malaysians aged between 18 and 50 years who are active social media users. Results from the survey reveal that despite a weak relationship level between hatred speech involvement on social media and attitude towards freedom of speech, the association is still considerably significant. As such, it can be safely presumed that hatred speech on social media occurs due to the freedom of speech that exists by way of social media channels.

Keywords: freedom of speech, hatred speech, social media, Malaysia, netizens

Procedia PDF Downloads 425
1483 Application of ICT in the Teaching and Learning of English Language in Nigerian Secondary Schools

Authors: Richard Ayobayowa Foyewa

Abstract:

This work examined the application of ICT in the teaching and learning of English language in Nigerian secondary schools. The definition of ICT was given briefly before areas in which the ICT could be applied in teaching and learning of English language were observed. Teachers’ attitudes towards the use of the computer and Internet facilities were also observed. The conclusion drawn was that ICT is very relevant in the teaching and learning of English language in Nigerian secondary schools. It was therefore recommended that teachers who are not computer literate should go for the training without further delay; government should always employ English language teachers who are computer literates. Government should make fund available in schools for the training and re-training of English language teachers in various computer programmes and in making internet facilities available in secondary schools.

Keywords: ICT, Nigerian secondary schools, teaching and learning of English

Procedia PDF Downloads 288
1482 Dynamic Transmission Modes of Network Public Opinion on Subevents Clusters of an Emergent Event

Authors: Yuan Xu, Xun Liang, Meina Zhang

Abstract:

The rise and attenuation of the public opinion broadcast of an emergent accident, in the social network, has a close relationship with the dynamic development of its subevents cluster. In this article, we take Tianjin Port explosion's subevents as an example to research the dynamic propagation discipline of Internet public opinion in a sudden accident, and analyze the overall structure of dynamic propagation to propose four different routes for subevents clusters propagation. We also generate network diagrams for the dynamic public opinion propagation, analyze each propagation type specifically. Based on this, suggestions on the supervision and guidance of Internet public opinion broadcast can be made.

Keywords: network dynamic transmission modes, emergent subevents clusters, Tianjin Port explosion, public opinion supervision

Procedia PDF Downloads 263
1481 A Comparative Study between Different Techniques of Off-Page and On-Page Search Engine Optimization

Authors: Ahmed Ishtiaq, Maeeda Khalid, Umair Sajjad

Abstract:

In the fast-moving world, information is the key to success. If information is easily available, then it makes work easy. The Internet is the biggest collection and source of information nowadays, and with every single day, the data on internet increases, and it becomes difficult to find required data. Everyone wants to make his/her website at the top of search results. This can be possible when you have applied some techniques of SEO inside your application or outside your application, which are two types of SEO, onsite and offsite SEO. SEO is an abbreviation of Search Engine Optimization, and it is a set of techniques, methods to increase users of a website on World Wide Web or to rank up your website in search engine indexing. In this paper, we have compared different techniques of Onpage and Offpage SEO, and we have suggested many things that should be changed inside webpage, outside web page and mentioned some most powerful and search engine considerable elements and techniques in both types of SEO in order to gain high ranking on Search Engine.

Keywords: auto-suggestion, search engine optimization, SEO, query, web mining, web crawler

Procedia PDF Downloads 121
1480 Internet of Things for Smart Dedicated Outdoor Air System in Buildings

Authors: Dararat Tongdee, Surapong Chirarattananon, Somchai Maneewan, Chantana Punlek

Abstract:

Recently, the Internet of Things (IoT) is the important technology that connects devices to the network and people can access real-time communication. This technology is used to report, collect, and analyze the big data for achieving a purpose. For a smart building, there are many IoT technologies that enable management and building operators to improve occupant thermal comfort, indoor air quality, and building energy efficiency. In this research, we propose monitoring and controlling performance of a smart dedicated outdoor air system (SDOAS) based on IoT platform. The SDOAS was specifically designed with the desiccant unit and thermoelectric module. The designed system was intended to monitor, notify, and control indoor environmental factors such as temperature, humidity, and carbon dioxide (CO₂) level. The SDOAS was tested under the American Society of Heating, Refrigerating and Air-Conditioning Engineers (ASHRAE 62.2) and indoor air quality standard. The system will notify the user by Blynk notification when the status of the building is uncomfortable or tolerable limits are reached according to the conditions that were set. The user can then control the system via a Blynk application on a smartphone. The experimental result indicates that the temperature and humidity of indoor fresh air in the comfort zone are approximately 26 degree Celsius and 58% respectively. Furthermore, the CO₂ level was controlled lower than 1000 ppm by indoor air quality standard condition. Therefore, the proposed system can efficiently work and be easy to use for buildings.

Keywords: internet of things, indoor air quality, smart dedicated outdoor air system, thermal comfort

Procedia PDF Downloads 173
1479 TMBCoI-SIOT: Trust Management System Based on the Community of Interest for the Social Internet of Things

Authors: Oumaima Ben Abderrahim, Mohamed Houcine Elhedhili, Leila Saidane

Abstract:

In this paper, we propose a trust management system based on clustering architecture for the social internet of things called TMBCO-SIOT. The proposed model integrates numerous factors such as direct and indirect trust; transaction factor; precaution factor; and social modeling of trust. The novelty of our approach can be summed up in two aspects. The first aspect concerns the architecture based on the community of interest (CoT) where each community is headed by an administrator (admin). However, the second aspect is the trust management system that tries to prevent On-Off attacks and mitigates dishonest recommendations using the k-means algorithm and guarantor things. The effectiveness of the proposed system is proved by simulation against malicious nodes.

Keywords: IoT, trust management system, attacks, trust, dishonest recommendations, K-means algorithm

Procedia PDF Downloads 189