Search results for: message authentication
207 Numerical Modeling of the Seismic Site Response in the Firenze Metropolitan Area
Authors: Najmeh Ayoqi, Emanuele Marchetti
Abstract:
OpenSWPC was used to model 2D and 3D seismic waveforms produced by various earthquakes in the Firenze metropolitan area. OpenSWPC is an Opens source code for simulation of seismic wave by using the finite difference method (FDM) in Message Passing Interface (MPI) environment. it considered both earthquake sources, with variable magnitude and location, as well as a pulse source in the modeling domain, which is optimal to simulate local seismic amplification effects. Multiple tests were performed to evaluate the dependence of the frequency content of output modeled waveforms on the model grid size and time steps . Moreover the effect of the velocity structure and absorbing boundary condition on waveform features (amplitude, duration and frequency content) where analysed. Eventually model results are compared with real waveform and Horizontal-to-Vertical spectral Ratio (HVSR) , showing that seismic wave modeling can provide important information on seismic assessment in the city.Keywords: openSWPC, earthquake, firenze, HVSR, seismic wave
Procedia PDF Downloads 17206 Harmonic Data Preparation for Clustering and Classification
Authors: Ali Asheibi
Abstract:
The rapid increase in the size of databases required to store power quality monitoring data has demanded new techniques for analysing and understanding the data. One suggested technique to assist in analysis is data mining. Preparing raw data to be ready for data mining exploration take up most of the effort and time spent in the whole data mining process. Clustering is an important technique in data mining and machine learning in which underlying and meaningful groups of data are discovered. Large amounts of harmonic data have been collected from an actual harmonic monitoring system in a distribution system in Australia for three years. This amount of acquired data makes it difficult to identify operational events that significantly impact the harmonics generated on the system. In this paper, harmonic data preparation processes to better understanding of the data have been presented. Underlying classes in this data has then been identified using clustering technique based on the Minimum Message Length (MML) method. The underlying operational information contained within the clusters can be rapidly visualised by the engineers. The C5.0 algorithm was used for classification and interpretation of the generated clusters.Keywords: data mining, harmonic data, clustering, classification
Procedia PDF Downloads 248205 Documentation of Traditional Knowledge on Wild Medicinal Plants of Egypt
Authors: Nahla S. Abdel-Azim, Khaled A. Shams, Elsayed A. Omer, Mahmoud M. Sakr
Abstract:
Medicinal plants play a significant role in the health care system in Egypt. Knowledge developed over the years by people is mostly unrecorded and orally passes on from one generation to the next. This knowledge is facing the danger of becoming extinct. Therefore there is an urgent need to document the medicinal and aromatic plants associated with traditional knowledge. The Egyptian Encyclopedia of wild medicinal plants (EEWMP) is the first attempt to collect most of the basic elements of the medicinal plant resources of Egypt and their traditional uses. It includes scientific data on about 500 medicinal plants in the form of monographs. Each monograph contains all available information and scientific data on the selected species including the following: names, description, distribution, parts used, habitat, conservational status, active or major chemical constituents, folk medicinal uses and heritage resources, pharmacological and biological activities, authentication, pharmaceutical products, and cultivation. The DNA bar-coding is also included (when available). A brief Arabic summary is given for every monograph. This work revealed the diversity in plant parts used in the treatment of different ailments. In addition, the traditional knowledge gathered can be considered a good starting point for effective in situ and ex-situ conservation of endangered plant species.Keywords: encyclopedia, medicinal plant, traditional medicine, wild flora
Procedia PDF Downloads 214204 Triangular Geometric Feature for Offline Signature Verification
Authors: Zuraidasahana Zulkarnain, Mohd Shafry Mohd Rahim, Nor Anita Fairos Ismail, Mohd Azhar M. Arsad
Abstract:
Handwritten signature is accepted widely as a biometric characteristic for personal authentication. The use of appropriate features plays an important role in determining accuracy of signature verification; therefore, this paper presents a feature based on the geometrical concept. To achieve the aim, triangle attributes are exploited to design a new feature since the triangle possesses orientation, angle and transformation that would improve accuracy. The proposed feature uses triangulation geometric set comprising of sides, angles and perimeter of a triangle which is derived from the center of gravity of a signature image. For classification purpose, Euclidean classifier along with Voting-based classifier is used to verify the tendency of forgery signature. This classification process is experimented using triangular geometric feature and selected global features. Based on an experiment that was validated using Grupo de Senales 960 (GPDS-960) signature database, the proposed triangular geometric feature achieves a lower Average Error Rates (AER) value with a percentage of 34% as compared to 43% of the selected global feature. As a conclusion, the proposed triangular geometric feature proves to be a more reliable feature for accurate signature verification.Keywords: biometrics, euclidean classifier, features extraction, offline signature verification, voting-based classifier
Procedia PDF Downloads 378203 A Hybrid Model for Secure Protocol Independent Multicast Sparse Mode and Dense Mode Protocols in a Group Network
Authors: M. S. Jimah, A. C. Achuenu, M. Momodu
Abstract:
Group communications over public infrastructure are prone to a lot of security issues. Existing network protocols like Protocol Independent Multicast Sparse Mode (PIM SM) and Protocol Independent Multicast Dense Mode (PIM DM) do not have inbuilt security features. Therefore, any user or node can easily access the group communication as long as the user can send join message to the source nodes, the source node then adds the user to the network group. In this research, a hybrid method of salting and hashing to encrypt information in the source and stub node was designed, and when stub nodes need to connect, they must have the appropriate key to join the group network. Object oriented analysis design (OOAD) was the methodology used, and the result shows that no extra controlled bandwidth overhead cost was added by encrypting and the hybrid model was more securing than the existing PIM SM, PIM DM and Zhang secure PIM SM.Keywords: group communications, multicast, PIM SM, PIM DM, encryption
Procedia PDF Downloads 162202 Analytical Authentication of Butter Using Fourier Transform Infrared Spectroscopy Coupled with Chemometrics
Authors: M. Bodner, M. Scampicchio
Abstract:
Fourier Transform Infrared (FT-IR) spectroscopy coupled with chemometrics was used to distinguish between butter samples and non-butter samples. Further, quantification of the content of margarine in adulterated butter samples was investigated. Fingerprinting region (1400-800 cm–1) was used to develop unsupervised pattern recognition (Principal Component Analysis, PCA), supervised modeling (Soft Independent Modelling by Class Analogy, SIMCA), classification (Partial Least Squares Discriminant Analysis, PLS-DA) and regression (Partial Least Squares Regression, PLS-R) models. PCA of the fingerprinting region shows a clustering of the two sample types. All samples were classified in their rightful class by SIMCA approach; however, nine adulterated samples (between 1% and 30% w/w of margarine) were classified as belonging both at the butter class and at the non-butter one. In the two-class PLS-DA model’s (R2 = 0.73, RMSEP, Root Mean Square Error of Prediction = 0.26% w/w) sensitivity was 71.4% and Positive Predictive Value (PPV) 100%. Its threshold was calculated at 7% w/w of margarine in adulterated butter samples. Finally, PLS-R model (R2 = 0.84, RMSEP = 16.54%) was developed. PLS-DA was a suitable classification tool and PLS-R a proper quantification approach. Results demonstrate that FT-IR spectroscopy combined with PLS-R can be used as a rapid, simple and safe method to identify pure butter samples from adulterated ones and to determine the grade of adulteration of margarine in butter samples.Keywords: adulterated butter, margarine, PCA, PLS-DA, PLS-R, SIMCA
Procedia PDF Downloads 143201 Da’wah (Proselytization) and Qur’anic Moral Excellence: An Exposition
Authors: Attahir Shehu Mainiyo, Ahmad Ibrahim Karfe
Abstract:
The Glorious Qur’an, as the central religious text of Islam, addresses various aspects of human life and provides guidance for personal and societal development. It also outlines the moral excellence of individuals and communities, focusing on spiritual, moral, and social dimensions. Da’wah is the act of inviting others to Islam, emphasizing the significance of conveying the message with kindness, patience, and understanding. Qur’anic moral excellence, as evinced in the Qur’an encompasses virtues such as compassion, honesty, humility, patience, and generosity. The Glorious Qur’an, therefore, harps on the importance of embodying these values in daily life, serving as a guide for individuals engaged in Da’wah activities to exemplify moral excellence through their actions and characters. It is in line with this backdrop that this article intends to assess the Da’wah and Qur’anic Moral Excellence. However, to achieve the objectives of the research, the article attempts to answer some basic questions. Emphasizes were laid in the Glorious on the need to invite others to the true path of Islam and the qualities of Da’i necessary for his Da’wah activities. The paper also discussed the impact of Qur’anic moral excellence on the Da’i and those invited to Islam. The paper adopts an analytical methodology and utilizes secondary data for the research.Keywords: Da'wah, Qur'an, moral, excellence
Procedia PDF Downloads 48200 Development of a Smart Liquid Level Controller
Authors: Adamu Mudi, Ibrahim Wahab Fawole, Abubakar Abba Kolo
Abstract:
In this research paper, we present a microcontroller-based liquid level controller that identifies the various levels of a liquid, carries out certain actions, and is capable of communicating with the human being and other devices through the GSM network. This project is useful in ensuring that a liquid is not wasted. It also contributes to the internet of things paradigm, which is the future of the internet. The method used in this work includes designing the circuit and simulating it. The circuit is then implemented on a solderless breadboard, after which it is implemented on a strip board. A C++ computer program is developed and uploaded into the microcontroller. This program instructs the microcontroller on how to carry out its actions. In other to determine levels of the liquid, an ultrasonic wave is sent to the surface of the liquid similar to radar or the method for detecting the level of sea bed. Message is sent to the phone of the user similar to the way computers send messages to phones of GSM users. It is concluded that the routine of observing the levels of a liquid in a tank, refilling the tank when the liquid level is too low can be entirely handled by a programmable device without wastage of the liquid or bothering a human being with such tasks.Keywords: Arduino Uno, HC-SR04 ultrasonic sensor, internet of things, IoT, SIM900 GSM module
Procedia PDF Downloads 130199 Street Art Lenses: A Glimpse into the Street Artists’ Identity and Socio-Political Perspective in Brussels
Authors: José Francisco Urrutia Reyes, Judith Espinosa Real
Abstract:
This paper is meant to re-examine the role of street art in the contemporary world. By studying this form of art in Brussels, it can be explained how murals show the socio-political reality of a given community and influence on its interaction. Through the definitions of street art, murals and street artists, and analysing their role in Brussels, it is possible to understand how this counter culture movement serves as an engine of social development, as it interacts with its surroundings sending a clear message to a wider audience. Street art impacts on its environment because it interacts with the people who occupies the day-to-day public space. This has proven to be effective in the arouse of social consciousness, up to the point of being adopted by the government of Brussels to promote social movements such as the AIDS-HIV campaign along with the Plate-Forme Prévention Sida. It can be concluded that street art has evolved since its vandalic beginnings, to become a form of art that has not lost it counter official status, but now has a critical vision that can promote social awakening. Street art is now a global trend that uses visual inputs to create a positive impact.Keywords: street art, Brussels, social impact, political perspective
Procedia PDF Downloads 362198 Initiative Programme to Reform Education in Thailand
Authors: Piyapat Chitpirom, Teerakiat Jareonsettasin, Chintida Vichitsophaphan
Abstract:
The Foundation of Virtuous Youth was established and supported by the Crown Property Bureau, with the intention to instill goodness in Thai youth. The Centre for Educational Psychology is one of the three units under the foundation. We aim to develop programmes that can be used to improve the quality of education in schools. Translation of the King’s message in keeping with the modern research from various sources, our team create 6 programmes: (1) Teacher-Student Relationship (2) Growth Mindset (3) Socratic Teaching (4) Peer Tutoring (5) Parental Involvement (6) Inclusion. After nine months of implementing the programmes in the schools, we found that there were more cooperation between student-student, teacher-student, teacher-parent, and student-parent and the school regained trust from the community. Our ideas were accepted well by the government as our director was promoted to be the Vice Minister of Education in order to implement our programmes into national education system. We consider that the key of our success is that we do practical things. We are still continuing, improving, and learning from our work with hope that the quality of Thai education will improve in near future.Keywords: education reform, educational psychology, effective teaching, teacher-student relationship
Procedia PDF Downloads 438197 Chinese College Students’ Intercultural Competence and Culture Learning Through Telecollaboration
Authors: Li Yuqing
Abstract:
Fostering the development of intercultural (communicative) competence (IC) is one way to equip our students with the linguistic and cultural skills to communicate effectively with people from diverse backgrounds, particularly English majors who are most likely to encounter multicultural work environments in the future. The purpose of this study is to compare the English majors' intercultural competence in terms of cognitive, affective, and behavioral aspects before and after a ten-week telecollaboration program between 23 English majors at a Chinese university and 23 American students enrolled in a Chinese class at an American university, and analyze their development during the program. The results indicate that subjects' cognitive, affective, and behavioral perceptions of IC improved significantly over time. In addition, the program had significant effects on the participants' “Interaction Confidence,” “Interaction Engagement,” and “Interaction Enjoyment” - three components of intercultural sensitivity - as well as their overall intercultural effectiveness (except for “Message Skills”). With the widespread use of the internet, this type of online cultural exchange has a promising future, as suggested by the findings of the current study.Keywords: intercultural competence, English majors, computer-mediated communication, telecollaboration
Procedia PDF Downloads 74196 Double Encrypted Data Communication Using Cryptography and Steganography
Authors: Adine Barett, Jermel Watson, Anteneh Girma, Kacem Thabet
Abstract:
In information security, secure communication of data across networks has always been a problem at the forefront. Transfer of information across networks is susceptible to being exploited by attackers engaging in malicious activity. In this paper, we leverage steganography and cryptography to create a layered security solution to protect the information being transmitted. The first layer of security leverages crypto- graphic techniques to scramble the information so that it cannot be deciphered even if the steganography-based layer is compromised. The second layer of security relies on steganography to disguise the encrypted in- formation so that it cannot be seen. We consider three cryptographic cipher methods in the cryptography layer, namely, Playfair cipher, Blowfish cipher, and Hills cipher. Then, the encrypted message is passed through the least significant bit (LSB) to the steganography algorithm for further encryption. Both encryption approaches are combined efficiently to help secure information in transit over a network. This multi-layered encryption is a solution that will benefit cloud platforms, social media platforms and networks that regularly transfer private information such as banks and insurance companies.Keywords: cryptography, steganography, layered security, Cipher, encryption
Procedia PDF Downloads 84195 Bank ATM Monitoring System Using IR Sensor
Authors: P. Saravanakumar, N. Raja, M. Rameshkumar, D. Mohankumar, R. Sateeshkumar, B. Maheshwari
Abstract:
This research work is designed using Microsoft VB. Net as front end and MySQL as back end. The project deals with secure the user transaction in the ATM system. This application contains the option for sending the failed transaction details to the particular customer by using the SMS. When the customer withdraws the amount from the Bank ATM system, sometimes the amount will not be dispatched but the amount will be debited to the particular account. This application is used to avoid this type of problems in the ATM system. In this proposed system using IR technique to detect the dispatched amount. IR Transmitter and IR Receiver are placed in the path of cash dispatch. It is connected each other through the IR signal. When the customers withdraw the amount in the ATM system then the amount will be dispatched or not is monitored by IR Receiver. If the amount will be dispatched then the signal will be interrupted between the IR Receiver and the IR Transmitter. At that time, the monitoring system will be reduced their particular withdraw amount on their account. If the cash will not be dispatched, the signal will not be interrupted, at that time the particular withdraw amount will not be reduced their account. If the transaction completed successfully, the transaction details such as withdraw amount and current balance can be sent to the customer via the SMS. If the transaction fails, the transaction failed message can be send to the customer.Keywords: ATM system, monitoring system, IR Transmitter, IR Receiver
Procedia PDF Downloads 310194 Transporting the Setting of the Beloved Musical, Peter Pan, to Colonial India
Authors: R. Roznowski
Abstract:
This paper is an examination of a recent Michigan State University production of the classic musical, Peter Pan. In this production, approved by the licensor, the action was moved to Colonial India transforming the musical’s message to include themes of cultural identity, racism, classism and ultimately inclusion. Major character changes and casting decisions expanded the scope of the musical while still retaining the original book and score. Major changes included reframing the Darlings as British Colonials stationed in India. The Lost Boy’s as mixed race children of British officials and their Indian nannies, the Pirates were a female 'fishing fleet' a group of women sent from England to keep the British soldiers from mixing with the locals and the Michigan State University Bhangra Dance Team played the Indians in the production. Traditional Indian theatrical techniques were also employed in the storytelling. The presentation will cover the key changes to the musical, the rehearsal process, historical accuracy and audience reaction. A final analysis of cultural appropriation versus historical reframing will be examined.Keywords: directing, history, musical theatre, producing
Procedia PDF Downloads 250193 How Much for a Dancer? Culture Policy in Japan and Czech Republic towards Dance
Authors: Lucie Hayashi
Abstract:
This paper offers a view on a different approach towards a dancer´s career in two very dissimilar countries: on one hand Japan, an economic predator at the end of last century, but suffering under economic crisis from the beginning of the new century; and the Czech Republic, a post-communist country, caught up in capitalist fever from the 1990s on the other. The government’s approach towards culture and dance in these two countries not only has a different history and nature, but also presents a different take on the ideal future development in its respective dance scenes. The level of support from the state budget echoes in all the fields of a professional dance career, dance art and the education of the public towards dance. The message of the statistic data is clear: the production of an enormous number of well trained and expensively educated dancers with no jobs for them in Japan, and a lack of good dancers ready to fill state supported theatre companies in the Czech Republic (that gladly employs Japanese dancers). The paradigm leaves a big exclamation mark on the huge influence the policy has on dance in society, and a question mark on the ideal situation.Keywords: culture policy, dance, education, employment, Czech Republic, Japan
Procedia PDF Downloads 164192 Augmented Reality in Advertising and Brand Communication: An Experimental Study
Authors: O. Mauroner, L. Le, S. Best
Abstract:
Digital technologies offer many opportunities in the design and implementation of brand communication and advertising. Augmented reality (AR) is an innovative technology in marketing communication that focuses on the fact that virtual interaction with a product ad offers additional value to consumers. AR enables consumers to obtain (almost) real product experiences by the way of virtual information even before the purchase of a certain product. Aim of AR applications in relation with advertising is in-depth examination of product characteristics to enhance product knowledge as well as brand knowledge. Interactive design of advertising provides observers with an intense examination of a specific advertising message and therefore leads to better brand knowledge. The elaboration likelihood model and the central route to persuasion strongly support this argumentation. Nevertheless, AR in brand communication is still in an initial stage and therefore scientific findings about the impact of AR on information processing and brand attitude are rare. The aim of this paper is to empirically investigate the potential of AR applications in combination with traditional print advertising. To that effect an experimental design with different levels of interactivity is built to measure the impact of interactivity of an ad on different variables o advertising effectiveness.Keywords: advertising effectiveness, augmented reality, brand communication, brand recall
Procedia PDF Downloads 302191 Management of Coronary Heart Disease through Yoga
Authors: Subramaniam Iyer
Abstract:
The most common disease that is pertaining to all human beings is heart-related. The reasons for coronary artery disease are due to lifestyle and eating habits. Due to this, many people mentally become sick, feeling that soon they will die due to their heart problems. This results in stress and anxiety, which has become common amongst all the Indians. Medicines are the commonest curative remedy in India, but it is proposed through this article some remedies through yoga. This article does not guarantee a 100% result, but it is a preventive remedy for coronary artery disease. Yoga is giving a new lease of life to many, so to tackle chronic diseases, it provides remedies that will be lifelong. It is brought to many people by Patanjali. Yoga will provide support to patients having coronary artery disease through its various relevant postures (asanas), which can be done very easily. Yoga does not send a message that if you do it regularly, you will be relieved from a particular disease. If it is performed every day, it will add vital energy for a smooth life, even if you are suffering from any chronic disease. In this article, we will be providing 6 postures (asanas), which can be performed at any time in the day, but the early morning will always be preferred (empty stomach) to get a good result. Secondly, these postures must be implemented after due consultation with your physician. If your physician disapproves, don’t do these postures as it will be harmful to your body.Keywords: coronary artery, yoga, disease, remedy, medicine
Procedia PDF Downloads 167190 Detection and Quantification of Active Pharmaceutical Ingredients as Adulterants in Garcinia cambogia Slimming Preparations Using NIR Spectroscopy Combined with Chemometrics
Authors: Dina Ahmed Selim, Eman Shawky Anwar, Rasha Mohamed Abu El-Khair
Abstract:
A rapid, simple and efficient method with minimal sample treatment was developed for authentication of Garcinia cambogia fruit peel powder, along with determining undeclared active pharmaceutical ingredients (APIs) in its herbal slimming dietary supplements using near infrared spectroscopy combined with chemometrics. Five featured adulterants, including sibutramine, metformin, orlistat, ephedrine, and theophylline are selected as target compounds. The Near infrared spectral data matrix of authentic Garcinia cambogia fruit peel and specimens degraded by intentional contamination with the five selected APIs was subjected to hierarchical clustering analysis to investigate their bundling figure. SIMCA models were established to ensure the genuiness of Garcinia cambogia fruit peel which resulted in perfect classification of all tested specimens. Adulterated samples were utilized for construction of PLSR models based on different APIs contents at minute levels of fraud practices (LOQ < 0.2% w/w).The suggested approach can be applied to enhance and guarantee the safety and quality of Garcinia fruit peel powder as raw material and in dietary supplements.Keywords: Garcinia cambogia, Quality control, NIR spectroscopy, Chemometrics
Procedia PDF Downloads 77189 A Hybrid Digital Watermarking Scheme
Authors: Nazish Saleem Abbas, Muhammad Haris Jamil, Hamid Sharif
Abstract:
Digital watermarking is a technique that allows an individual to add and hide secret information, copyright notice, or other verification message inside a digital audio, video, or image. Today, with the advancement of technology, modern healthcare systems manage patients’ diagnostic information in a digital way in many countries. When transmitted between hospitals through the internet, the medical data becomes vulnerable to attacks and requires security and confidentiality. Digital watermarking techniques are used in order to ensure the authenticity, security and management of medical images and related information. This paper proposes a watermarking technique that embeds a watermark in medical images imperceptibly and securely. In this work, digital watermarking on medical images is carried out using the Least Significant Bit (LSB) with the Discrete Cosine Transform (DCT). The proposed methods of embedding and extraction of a watermark in a watermarked image are performed in the frequency domain using LSB by XOR operation. The quality of the watermarked medical image is measured by the Peak signal-to-noise ratio (PSNR). It was observed that the watermarked medical image obtained performing XOR operation between DCT and LSB survived compression attack having a PSNR up to 38.98.Keywords: watermarking, image processing, DCT, LSB, PSNR
Procedia PDF Downloads 47188 Fixing the Identity Gap in Fashion: Magazines' Role in Consumption of Clothes
Authors: Kateryna Pilyarchuk
Abstract:
A dress has, since times immemorial, been used to communicate the wearer’s identity. When a new trend is born, fashionistas buy it not only with the purpose to beautify themselves, but also to acquire the collective identity. Fashion has become a means of narrating one’s stance and status. Thus, when one spends money on a brand, one pays for some unmaterial components associated with it. This paper will present some ways in which fashion magazines promote consumerism by drawing on women’s craving for collective identity and need to fill in their identity gap by means of a purchase. By applying the method of critical discursive psychology, it will present layers of ideology and positions that become visible in framing of the message in U.S. Harper’s Bazaar. In this context, fashion decisions that are presented to its readers will be critically evaluated from the gender perspective. It will be demonstrated that what is presented as a postfeminist choice in the neoliberal society is still, to a considerable extent, oppressive and driven by the male gaze. As the findings show, the contemporary female identities in fashion are still built on the principles of traditional femininity. Magazines and fashion discourse train women that they should fear being left out of fashion and, by extension, out of the category of the sexually appealing (from the male perspective).Keywords: collective identity, critical discursive psychology, fashion discourse, identity gap
Procedia PDF Downloads 148187 Heritage, Cultural Events and Promises for Better Future: Media Strategies for Attracting Tourism during the Arab Spring Uprisings
Authors: Eli Avraham
Abstract:
The Arab Spring was widely covered in the global media and the number of Western tourists traveling to the area began to fall. The goal of this study was to analyze which media strategies marketers in Middle Eastern countries chose to employ in their attempts to repair the negative image of the area in the wake of the Arab Spring. Several studies were published concerning image-restoration strategies of destinations during crises around the globe; however, these strategies were not part of an overarching theory, conceptual framework or model from the fields of crisis communication and image repair. The conceptual framework used in the current study was the ‘multi-step model for altering place image’, which offers three types of strategies: source, message and audience. Three research questions were used: 1.What public relations crisis techniques and advertising campaign components were used? 2. What media policies and relationships with the international media were adopted by Arab officials? 3. Which marketing initiatives (such as cultural and sports events) were promoted? This study is based on qualitative content analysis of four types of data: 1) advertising components (slogans, visuals and text); (2) press interviews with Middle Eastern officials and marketers; (3) official media policy adopted by government decision-maker (e.g. boycotting or arresting newspeople); and (4) marketing initiatives (e.g. organizing heritage festivals and cultural events). The data was located in three channels from December 2010, when the events started, to September 31, 2013: (1) Internet and video-sharing websites: YouTube and Middle Eastern countries' national tourism board websites; (2) News reports from two international media outlets, The New York Times and Ha’aretz; these are considered quality newspapers that focus on foreign news and tend to criticize institutions; (3) Global tourism news websites: eTurbo news and ‘Cities and countries branding’. Using the ‘multi-step model for altering place image,’ the analysis reveals that Middle Eastern marketers and officials used three kinds of strategies to repair their countries' negative image: 1. Source (cooperation and media relations; complying, threatening and blocking the media; and finding alternatives to the traditional media) 2. Message (ignoring, limiting, narrowing or reducing the scale of the crisis; acknowledging the negative effect of an event’s coverage and assuring a better future; promotion of multiple facets, exhibitions and softening the ‘hard’ image; hosting spotlight sporting and cultural events; spinning liabilities into assets; geographic dissociation from the Middle East region; ridicule the existing stereotype) and 3. Audience (changing the target audience by addressing others; emphasizing similarities and relevance to specific target audience). It appears that dealing with their image problems will continue to be a challenge for officials and marketers of Middle Eastern countries until the region stabilizes and its regional conflicts are resolved.Keywords: Arab spring, cultural events, image repair, Middle East, tourism marketing
Procedia PDF Downloads 285186 Heritage Tourism Balance between Historic Culture and Marketing Innovation: The Case Study of Taiwan
Authors: Lin Chih-Ken
Abstract:
This paper explores the A Li Shan hotel of Taiwan during the Japanese occupation period, after over a hundred years of time, it has been handed over to the hotel managing enterprise to retain the historic building and the culture. Applying the innovative marketing strategies, coordinate the local government traveling policy then combined local tea agriculture and forestry specialty integrated marketing, to create the special hotel located in the Alishan National Scenic Area with the characteristics of landscape, innovative marketing and history, to attract domestic tourism and visitors around the world. This study interview the hotel owner, managers, employees and guests, in addition to collected message feedback from reservation website, to apply Ambidexterity Marketing Theory and Resource Base Theory to analyze the main impact factors. The conclusion showed that the integration of several key factors and make good use of resource strength generate heterogeneous product characteristics to attracting wider range of visitors.Keywords: heritage tourism, historic hotel, marketing ambidexterity, resource base theory
Procedia PDF Downloads 265185 Energy-Efficient Contact Selection Method for CARD in Wireless Ad-Hoc Networks
Authors: Mehdi Assefi, Keihan Hataminezhad
Abstract:
One of the efficient architectures for exploring the resources in wireless ad-hoc networks is contact-based architecture. In this architecture, each node assigns a unique zone for itself and each node keeps all information from inside the zone, as well as some from outside the zone, which is called contact. Reducing the overlap between different zones of a node and its contacts increases its performance, therefore Edge Method (EM) is designed for this purpose. Contacts selected by EM do not have any overlap with their sources, but for choosing the contact a vast amount of information must be transmitted. In this article, we will offer a new protocol for contact selection, which is called PEM. The objective would be reducing the volume of transmitted information, using Non-Uniform Dissemination Probabilistic Protocols. Consumed energy for contact selection is a function of the size of transmitted information between nodes. Therefore, by reducing the content of contact selection message using the PEM will decrease the consumed energy. For evaluation of the PEM we applied the simulation method. Results indicated that PEM consumes less energy compared to EM, and by increasing the number of nodes (level of nodes), performance of PEM will improve in comparison with EM.Keywords: wireless ad-hoc networks, contact selection, method for CARD, energy-efficient
Procedia PDF Downloads 290184 Use of Visual, Animating Narrative in an Entrepreneurial Storytelling: A Case Study of Greenesignit! Card Game, Educational and Brainstorming Tool for Development of Sustainable Products
Authors: Maja S. Todorovic
Abstract:
This paper aims to promote entrepreneurial storytelling by exploring new ideas and learning practices. An entrepreneur needs to be a ‘storyteller’, an ‘epic hero’, capable of offering an emotional connection to his audience, a character with whom audience can identify with, rejoice, suffer, celebrate, fail – simply experience everything. In other words, a successful entrepreneur is giving tangible experience through his business story and that’s what makes his story and business alive. Use of mythology, eulogy, metaphor, epic, fairytales and cartoons, permeated with humor and sudden twists is a winning recipe for a business story that captures attention. In the business case of the Greenesignit! Card game, (educational and brainstorming tool for development of sustainable products) we will demonstrate how an entrepreneur successfully used visual narrative to communicate his story and at the same time as a vehicle to transmute his message in learning tool and product development.Keywords: animating narrative, entrepreneur, Greeneisgnit! card game, visual storytelling
Procedia PDF Downloads 392183 Design and Application of NFC-Based Identity and Access Management in Cloud Services
Authors: Shin-Jer Yang, Kai-Tai Yang
Abstract:
In response to a changing world and the fast growth of the Internet, more and more enterprises are replacing web-based services with cloud-based ones. Multi-tenancy technology is becoming more important especially with Software as a Service (SaaS). This in turn leads to a greater focus on the application of Identity and Access Management (IAM). Conventional Near-Field Communication (NFC) based verification relies on a computer browser and a card reader to access an NFC tag. This type of verification does not support mobile device login and user-based access management functions. This study designs an NFC-based third-party cloud identity and access management scheme (NFC-IAM) addressing this shortcoming. Data from simulation tests analyzed with Key Performance Indicators (KPIs) suggest that the NFC-IAM not only takes less time in identity identification but also cuts time by 80% in terms of two-factor authentication and improves verification accuracy to 99.9% or better. In functional performance analyses, NFC-IAM performed better in salability and portability. The NFC-IAM App (Application Software) and back-end system to be developed and deployed in mobile device are to support IAM features and also offers users a more user-friendly experience and stronger security protection. In the future, our NFC-IAM can be employed to different environments including identification for mobile payment systems, permission management for remote equipment monitoring, among other applications.Keywords: cloud service, multi-tenancy, NFC, IAM, mobile device
Procedia PDF Downloads 435182 Bandwidth Efficient Cluster Based Collision Avoidance Multicasting Protocol in VANETs
Authors: Navneet Kaur, Amarpreet Singh
Abstract:
In Vehicular Adhoc Networks, Data Dissemination is a challenging task. There are number of techniques, types and protocols available for disseminating the data but in order to preserve limited bandwidth and to disseminate maximum data over networks makes it more challenging. There are broadcasting, multicasting and geocasting based protocols. Multicasting based protocols are found to be best for conserving the bandwidth. One such protocol named BEAM exists that improves the performance of Vehicular Adhoc Networks by reducing the number of in-network message transactions and thereby efficiently utilizing the bandwidth during an emergency situation. But this protocol may result in multicar chain collision as there was no V2V communication. So, this paper proposes a new protocol named Enhanced Bandwidth Efficient Cluster Based Multicasting Protocol (EBECM) that will overcome the limitations of existing BEAM protocol. And Simulation results will show the improved performance of EBECM in terms of Routing overhead, throughput and PDR when compared with BEAM protocol.Keywords: BEAM, data dissemination, emergency situation, vehicular adhoc network
Procedia PDF Downloads 348181 Use of Oral Communication Strategies: A Study of Bangladeshi EFL Learners at the Graduate Level
Authors: Afroza Akhter Tina
Abstract:
This paper reports on an investigation into the use of specific types of oral communication strategies, namely ‘topic avoidance’, ‘message abandonment’, ‘code-switching’, ‘paraphrasing’, ‘restructuring’, and ‘stalling’ by Bangladeshi EFL learners at the graduate level. It chiefly considers the frequency of using these strategies as well as the students and teachers attitudes toward such uses. The participants of this study are 66 EFL students and 12 EFL teachers of Jahangirnagar University. Data was collected through questionnaire, oral interview, and classroom observation form. The findings reveal that the EFL students tried to employ all the strategies to various extents due to the language difficulties they encountered in their oral English performance. Among them, the mostly used strategy was ‘stalling’ or the use of fillers, followed by ‘code-switching’. The least used strategies were ‘topic avoidance’, ‘restructuring’, and ‘paraphrasing’. The findings indicate that the use of such strategies was related to the contexts of situation and data-elicitation tasks. It also reveals that the students were not formally trained to use the strategies though the majority of the teachers and students acknowledge them as helpful in communication. Finally the study suggests that an awareness of the nature and functions of these strategies can contribute to the overall improvement of the learners’ communicative competence in spoken English.Keywords: communicative strategies, competency, attitude, frequency
Procedia PDF Downloads 408180 Implementation of Successive Interference Cancellation Algorithms in the 5g Downlink
Authors: Mokrani Mohamed Amine
Abstract:
In this paper, we have implemented successive interference cancellation algorithms in the 5G downlink. We have calculated the maximum throughput in Frequency Division Duplex (FDD) mode in the downlink, where we have obtained a value equal to 836932 b/ms. The transmitter is of type Multiple Input Multiple Output (MIMO) with eight transmitting and receiving antennas. Each antenna among eight transmits simultaneously a data rate of 104616 b/ms that contains the binary messages of the three users; in this case, the Cyclic Redundancy Check CRC is negligible, and the MIMO category is the spatial diversity. The technology used for this is called Non-Orthogonal Multiple Access (NOMA) with a Quadrature Phase Shift Keying (QPSK) modulation. The transmission is done in a Rayleigh fading channel with the presence of obstacles. The MIMO Successive Interference Cancellation (SIC) receiver with two transmitting and receiving antennas recovers its binary message without errors for certain values of transmission power such as 50 dBm, with 0.054485% errors when the transmitted power is 20dBm and with 0.00286763% errors for a transmitted power of 32 dBm(in the case of user 1) as well as with 0.0114705% errors when the transmitted power is 20 dBm also with 0.00286763% errors for a power of 24 dBm(in the case of user2) by applying the steps involved in SIC.Keywords: 5G, NOMA, QPSK, TBS, LDPC, SIC, capacity
Procedia PDF Downloads 103179 Iris Feature Extraction and Recognition Based on Two-Dimensional Gabor Wavelength Transform
Authors: Bamidele Samson Alobalorun, Ifedotun Roseline Idowu
Abstract:
Biometrics technologies apply the human body parts for their unique and reliable identification based on physiological traits. The iris recognition system is a biometric–based method for identification. The human iris has some discriminating characteristics which provide efficiency to the method. In order to achieve this efficiency, there is a need for feature extraction of the distinct features from the human iris in order to generate accurate authentication of persons. In this study, an approach for an iris recognition system using 2D Gabor for feature extraction is applied to iris templates. The 2D Gabor filter formulated the patterns that were used for training and equally sent to the hamming distance matching technique for recognition. A comparison of results is presented using two iris image subjects of different matching indices of 1,2,3,4,5 filter based on the CASIA iris image database. By comparing the two subject results, the actual computational time of the developed models, which is measured in terms of training and average testing time in processing the hamming distance classifier, is found with best recognition accuracy of 96.11% after capturing the iris localization or segmentation using the Daughman’s Integro-differential, the normalization is confined to the Daugman’s rubber sheet model.Keywords: Daugman rubber sheet, feature extraction, Hamming distance, iris recognition system, 2D Gabor wavelet transform
Procedia PDF Downloads 65178 Intelligent Wireless Patient Monitoring and Tracking System
Authors: Ch. Sandeep Kumar Subudhi, S. Sivanandam
Abstract:
Our system is to monitor the human body temperature, blood pressure (BP), Pulse Rate and ECG and tracking the patient location. In our system the body temperature is detected by using LM35 temperature sensor, blood pressure is detected by the BP sensor, pulse rate is detected by the ear plug pulse sensor and the ECG is detected by the three lead ECG sensor in the working environment of the patient. The sensed information is sent to the PIC16F877 microcontroller through signal conditioning circuit. A desired amount of sensor value is set and if it is exceeded preliminary steps should be taken by indication by buzzer. The sensor information will be transmitted from the patient unit to the main controller unit with the help of Zigbee communication medium which is connected with the microcontrollers in the both units. The main controller unit will send those sensor data as well as the location of that patient by the help of GPS module to the observer/doctor. The observer/doctor can receive the SMS sent by GSM module and further decision can be taken. The message is sent to a cell phone using global system mobile (GSM) Modem. MAX232 acts as a driver between microcontroller and modem.Keywords: LM35, heart beat sensor, ECG Sensor, BP Sensor, Zigbee module, GSM module, GPS module, PIC16F877A microcontroller
Procedia PDF Downloads 382