Search results for: information and communication technology.
18212 The Role Of Digital Technology In Crime Prevention
Authors: Muhammad Ashfaq
Abstract:
Main theme: This prime focus of this study is on the role of digital technology in crime prevention, with special focus on Cellular Forensic Unit, Capital City Police Peshawar-Khyber Pakhtunkhwa-Pakistan. Objective(s) of the study: The prime objective of this study is to provide statistics, strategies and pattern of analysis used for crime prevention in Cellular Forensic Unit of Capital City Police Peshawar, Khyber Pakhtunkhwa-Pakistan. Research Method and Procedure: Qualitative method of research has been used in the study for obtaining secondary data from research wing and Information Technology (IT) section of Peshawar police. Content analysis was the method used for the conduction of the study. This study is delimited to Capital City Police and Cellular Forensic Unit Peshawar-KP, Pakistan. information technologies. Major finding(s): It is evident that the old traditional approach will never provide solutions for better management in controlling crimes. The best way to control crimes and promotion of proactive policing is to adopt new technologies. The study reveals that technology have transformed police more effective and vigilant as compared to traditional policing. The heinous crimes like abduction, missing of an individual, snatching, burglaries and blind murder cases are now traceable with the help of technology. Recommendation(s): From the analysis of the data, it is reflected that Information Technology (IT) expert should be recruited along with research analyst to timely assist and facilitate operational as well as investigation units of police.A mobile locator should be Provided to Cellular Forensic Unit to timely apprehend the criminals .Latest digital analysis software should be provided to equip the Cellular Forensic Unit.Keywords: crime prevention, digital technology, pakistan, police
Procedia PDF Downloads 6518211 Miniature Fast Steering Mirrors for Space Optical Communication on NanoSats and CubeSats
Authors: Sylvain Chardon, Timotéo Payre, Hugo Grardel, Yann Quentel, Mathieu Thomachot, Gérald Aigouy, Frank Claeyssen
Abstract:
With the increasing digitalization of society, access to data has become vital and strategic for individuals and nations. In this context, the number of satellite constellation projects is growing drastically worldwide and is a next-generation challenge of the New Space industry. So far, existing satellite constellations have been using radio frequencies (RF) for satellite-to-ground communications, inter-satellite communications, and feeder link communication. However, RF has several limitations, such as limited bandwidth and low protection level. To address these limitations, space optical communication will be the new trend, addressing both very high-speed and secured encrypted communication. Fast Steering Mirrors (FSM) are key components used in optical communication as well as space imagery and for a large field of functions such as Point Ahead Mechanisms (PAM), Raster Scanning, Beam Steering Mirrors (BSM), Fine Pointing Mechanisms (FPM) and Line of Sight stabilization (LOS). The main challenges of space FSM development for optical communication are to propose both a technology and a supply chain relevant for high quantities New Space approach, which requires secured connectivity for high-speed internet, Earth planet observation and monitoring, and mobility applications. CTEC proposes a mini-FSM technology offering a stroke of +/-6 mrad and a resonant frequency of 1700 Hz, with a mass of 50 gr. This FSM mechanism is a good candidate for giant constellations and all applications on board NanoSats and CubeSats, featuring a very high level of miniaturization and optimized for New Space high quantities cost efficiency. The use of piezo actuators offers a high resonance frequency for optimal control, with almost zero power consumption in step and stay pointing, and with very high-reliability figures > 0,995 demonstrated over years of recurrent manufacturing for Optronics applications at CTEC.Keywords: fast steering mirror, feeder link, line of sight stabilization, optical communication, pointing ahead mechanism, raster scan
Procedia PDF Downloads 8018210 Assessment of Digital Literacy Skills of Librarians in Tertiary Institutions Inniger State
Authors: Mustapha Abdulkadir Gana, Jibrin Attahiru Alhassan, Adamu Musa Baba
Abstract:
The exponential growth of information sources, resources and the continued Communication Technology (ICT) sophistication of libraries all over the world call for capable and ICT compliant librarians in Nigeria, this article assesses the digital literacy skills of librarians in tertiary institutions in Niger state. The survey research method was applied in the study using a random sampling technique to draw the sample. Fifty-eight copies of the questionnaire were administered while forty-nine copies were completed, returned, and used in the study, which represents 84% of the response rate. Two research questions were answered, and data were analyzed using Statistical Package for the Social Sciences (SPSS). The finding uncovered that the librarians lack the requisite digital literacy skills to access the wealth of digital information resources available. The study recommends some steps to turn around the situations amongst; librarians must be empowered with all necessary digital literacy skills, embark on rigorous training and retraining programs, workshops, conferences, and seminars, there should also be a coherent training policy for the librarians on a sustainable basis to increase their requisite digital literacy skills.Keywords: digital, information, literacy, skills
Procedia PDF Downloads 15118209 Enhancing Goal Achievement through Improved Communication Skills
Abstract:
An extensive body of research studies suggest that students, teachers, and supervisors can enhance the likelihood of reaching their goals by improving their communication skills. It is highly important to learn how and when to provide different kinds of feedback, e.g. anticipatory, corrective and positive) will gain better result and higher morale. The purpose of this mixed methods research is twofold: 1) To find out what factors affect effective communication among different stakeholders and how these factors affect student learning2) What are the good practices for improving communication among different stakeholders and improve student achievement. This presentation first begins with an introduction to the recent research on Marshall’s Nonviolent Communication Techniques (NVC), including four important components: observations, feelings, needs, requests. These techniques can be effectively applied at all levels of communication. To develop an in-depth understanding of the relationship among different techniques within, this research collected, compared, and combined qualitative and quantitative data to better improve communication and support student learning.Keywords: education, communication, psychology, student learning, language teaching
Procedia PDF Downloads 5118208 Design and Implementation of 2D Mesh Network on Chip Using VHDL
Authors: Boudjedra Abderrahim, Toumi Salah, Boutalbi Mostefa, Frihi Mohammed
Abstract:
Nowadays, using the advancement of technology in semiconductor device fabrication, many transistors can be integrated to a single chip (VLSI). Although the growth chip density potentially eases systems-on-chip (SoCs) integrating thousands of processing element (PE) such as memory, processor, interfaces cores, system complexity, high-performance interconnect and scalable on-chip communication architecture become most challenges for many digital and embedded system designers. Networks-on-chip (NoCs) becomes a new paradigm that makes possible integrating heterogeneous devices and allows many communication constraints and performances. In this paper, we are interested for good performance and low area for implementation and a behavioral modeling of network on chip mesh topology design using VHDL hardware description language with performance evaluation and FPGA implementation results.Keywords: design, implementation, communication system, network on chip, VHDL
Procedia PDF Downloads 37818207 Enhancement of Learning Style in Kolej Poly-Tech MARA (KPTM) via Mobile EEF Learning System (MEEFLS)
Authors: M. E. Marwan, A. R. Madar, N. Fuad
Abstract:
Mobile communication provides access to the outside world without borders everywhere and at any time. The learning method that related to mobile communication technology is known as mobile learning (M-learning). It is a method that communicates learning materials with mobile device technology. The purpose of this method is to increase the interest in learning among students and assist them in obtaining learning materials at Kolej Poly-Tech MARA (KPTM) in order to improve the student’s performance in their study and to encourage educators to diversify the teaching practices. This paper discusses the student’s awareness for enhancement of learning style using mobile technologies and their readiness to apply the elements of mobile learning in learning to improve performance and interest in learning among students. An application called Mobile EEF Learning System (MEEFLS) has been developed as a tool to be used as a pilot test in KPTM.Keywords: awareness, mobile learning, MEEFLS, teaching and learning, readiness
Procedia PDF Downloads 37918206 Management Control Systems in Post-Incubation: An Investigation of Closed Down High-Technology Start-Ups
Authors: Jochen Edmund Kerschenbauer, Roman Salinger, Daniel Strametz
Abstract:
Insufficient informal communication systems can lead to the first crisis (‘Crisis of Leadership’) for start-ups. Management Control Systems (MCS) are one way for high-technology start-ups to successfully overcome these problems. So far the literature has investigated the incubation of a start-up, but focused less on the post-incubation stage. This paper focuses on the use of MCS in post-incubation and, if failed start-ups agree, on how MCS are used. We conducted 14 semi-structured interviews for this purpose, to obtain our results. The overall conclusion is that the majority of the companies were closed down due to a combination of strategic, operative and financial reasons.Keywords: closed down, high-technology, incubation, levers of control, management control systems, post-incubation, start-ups
Procedia PDF Downloads 109318205 Technology and Terror
Authors: Janet D. Fish
Abstract:
This paper will analyze how advanced information technology communications platform’s such as you tube, twitter, Facebook, and websites are being used in marketing cultural diversity on a global scale. The scope of this topic will encompass the use of marketing terror as a tool of educational understanding, accepting, and incorporating other ethnic groups into extremist Islamic cultural practices with an end goal of cultural assimilation. This paper will examine the impacts of various influences, such as globalism and technology on common public values and cultural diversity. Additionally, multiculturalism in public administration settings will be examined across cultures. Communications are a primary focus of review for this paper, the purpose of this review is to see how different technological platforms are currently being used as major tools of influence within the public sector. Technology and terror must become a primary concern for new public administrators in a modern world. While its existence is acknowledged, boundaries of legal recourse are currently few. Public administrators must understand the depth and reach of the future consequences of an unchecked process in the realm of technology and terror on a global scale.Keywords: inclusionism, exclusionism, technology, terror
Procedia PDF Downloads 38618204 Use of Information and Communication Technologies in Enhancing Health Care Delivery for Human Immunodeficiency Virus Patients in Bamenda Health District
Authors: Abanda Wilfred Chick
Abstract:
Background: According to World Health Organization (WHO), the role of Information and Communication Technologies (ICT) in health sectors of developing nations has been demonstrated to have had a great improvement of fifty percent reduction in mortality and or twenty-five-fifty percent increase in productivity. The objective of this study was to assess the use of information and communication technologies in enhancing health care delivery for Human Immunodeficiency Virus (HIV) patients in Bamenda Health District. Methods: This was a descriptive-analytical cross-sectional study in which 388 participants were consecutively selected amongst health personnel and HIV patients from public and private health institutions involved in Human Immunodeficiency Virus management. Data on socio-demographic variables, the use of information and communication technologies tools, and associated challenges were collected using structured questionnaires. Descriptive statistics with a ninety-five percent confidence interval were used to summarize findings, while Cramer’s V test, logistic regression, and Chi-square test were used to measure the association between variables, Epi info version7.2, MS Excel, and SPSS version 25.0 were utilized for data entry and statistical analysis respectively. Results: Of the participants, one-quarter were health personnel, and three-quarters were HIV patients. For both groups of participants, there was a significant relationship between the use of ICT and demographic information such as level of education, marital status, and age (p<0.05). For the impediments to using ICT tools, a greater proportion identified the high cost of airtime or internet bundles, followed by an average proportion that indicated inadequate training on ICT tools; for health personnel, the majority said inadequate training on ICT tools/applications and half said unavailability of electricity. Conclusion: Not up to half of the HIV patients effectively make use of ICT tools/applications to receive health care. Of health personnel, three quarters use ICTs, and only one quarter effectively use mobile phones and one-third of computers, respectively, to render care to HIV patients.Keywords: ICT tools, HIV patients, health personnel, health care delivery
Procedia PDF Downloads 8418203 A System Functions Set-Up through Near Field Communication of a Smartphone
Authors: Jaemyoung Lee
Abstract:
We present a method to set up system functions through a near filed communication (NFC) of a smartphone. The short communication distance of the NFC which is usually less than 4 cm could prevent any interferences from other devices and establish a secure communication channel between a system and the smartphone. The proposed set-up method for system function values is demonstrated for a blacbox system in a car. In demonstration, system functions of a blackbox which is manipulated through NFC of a smartphone are controls of image quality, sound level, shock sensing level to store images, etc. The proposed set-up method for system function values can be used for any devices with NFC.Keywords: system set-up, near field communication, smartphone, android
Procedia PDF Downloads 33618202 A Double Differential Chaos Shift Keying Scheme for Ultra-Wideband Chaotic Communication Technology Applied in Low-Rate Wireless Personal Area Network
Authors: Ghobad Gorji, Hasan Golabi
Abstract:
The goal of this paper is to describe the design of an ultra-wideband (UWB) system that is optimized for the low-rate wireless personal area network application. To this aim, we propose a system based on direct chaotic communication (DCC) technology. Based on this system, a 2-GHz wide chaotic signal is directly generated into the lower band of the UWB spectrum, i.e., 3.1–5.1 GHz. For this system, two simple modulation schemes, namely chaotic on-off keying (COOK) and differential chaos shift keying (DCSK), were studied before, and their performance was evaluated. We propose a modulation scheme, namely Double DCSK, to improve the performance of UWB DCC. Different characteristics of these systems, with Monte Carlo simulations based on the Additive White Gaussian Noise (AWGN) and the IEEE 802.15.4a standard channel models, are compared.Keywords: UWB, DCC, IEEE 802.15.4a, COOK, DCSK
Procedia PDF Downloads 7418201 Internet as a Marketing Tool for Tourism Promotion
Authors: Emeka Okonkwo
Abstract:
The Information Technology (IT) has prevailed over all functions of strategic and operational management. The Internet (a product of information technology) has increasingly become a popular medium for marketing. This paper examines the potentials of Internet for tourism marketing. To achieve this, the paper x-rays the characteristics of tourism marketing and examines the application of the Internet in tourism marketing. It is argued that the use of Internet for tourism marketing will not only reach a broad audience and reduce the cost of transaction (by conventional methods used by travel agents in times past), but, will also alleviate the problems of identification, authentication and confirmation of travels/package tours by tourists as well as promotion of tourism industry.Keywords: internet, marketing, tourism, tourism management
Procedia PDF Downloads 41818200 Criminal Laws Associated with Cyber-Medicine and Telemedicine in Current Law Systems in the World
Authors: Shahryar Eslamitabar
Abstract:
Currently, the internet plays an important role in the various scientific, commercial and service practices. Thanks to information and communication technology, the healthcare industry via the internet, generally known as cyber-medicine, can offer professional medical service in a wider geographical area. Having some appealing benefits such as convenience in offering healthcare services, improved accessibility to the services, enhanced information exchange, cost-effectiveness, time-saving, etc. Tele-health has increasingly developed innovative models of healthcare delivery. However, it presents many potential hazards to cyber-patients, inherent in the use of the system. First, there are legal issues associated with the communication and transfer of information on the internet. These include licensure, malpractice, liabilities and jurisdictions as well as privacy, confidentiality and security of personal data as the most important challenge brought about by this system. Additional items of concern are technological and ethical. Although, there are some rules to deal with pitfalls associated with cyber-medicine practices in the USA and some European countries, yet for all developments, it is being practiced in a legal vacuum in many countries. In addition to the domestic legislations to deal with potential problems arisen from the system, it is also imperative that some international or regional agreement should be developed to achieve the harmonization of laws among countries and states. This article discusses some implications posed by the practice of cyber-medicine in the healthcare system according to the experience of some developed countries using a comparative study of laws. It will also review the status of tele-health laws in Iran. Finally, it is intended to pave the way to outline a plan for countries like Iran, with newly-established judicial system for health laws, to develop appropriate regulations through providing some recommendations.Keywords: tele-health, cyber-medicine, telemedicine, criminal laws, legislations, time-saving
Procedia PDF Downloads 66118199 Implementation of an IoT Sensor Data Collection and Analysis Library
Authors: Jihyun Song, Kyeongjoo Kim, Minsoo Lee
Abstract:
Due to the development of information technology and wireless Internet technology, various data are being generated in various fields. These data are advantageous in that they provide real-time information to the users themselves. However, when the data are accumulated and analyzed, more various information can be extracted. In addition, development and dissemination of boards such as Arduino and Raspberry Pie have made it possible to easily test various sensors, and it is possible to collect sensor data directly by using database application tools such as MySQL. These directly collected data can be used for various research and can be useful as data for data mining. However, there are many difficulties in using the board to collect data, and there are many difficulties in using it when the user is not a computer programmer, or when using it for the first time. Even if data are collected, lack of expert knowledge or experience may cause difficulties in data analysis and visualization. In this paper, we aim to construct a library for sensor data collection and analysis to overcome these problems.Keywords: clustering, data mining, DBSCAN, k-means, k-medoids, sensor data
Procedia PDF Downloads 37818198 Cooperative Jamming for Implantable Medical Device Security
Authors: Kim Lytle, Tim Talty, Alan Michaels, Jeff Reed
Abstract:
Implantable medical devices (IMDs) are medically necessary devices embedded in the human body that monitor chronic disorders or automatically deliver therapies. Most IMDs have wireless capabilities that allow them to share data with an offboard programming device to help medical providers monitor the patient’s health while giving the patient more insight into their condition. However, serious security concerns have arisen as researchers demonstrated these devices could be hacked to obtain sensitive information or harm the patient. Cooperative jamming can be used to prevent privileged information leaks by maintaining an adequate signal-to-noise ratio at the intended receiver while minimizing signal power elsewhere. This paper uses ray tracing to demonstrate how a low number of friendly nodes abiding by Bluetooth Low Energy (BLE) transmission regulations can enhance IMD communication security in an office environment, which in turn may inform how companies and individuals can protect their proprietary and personal information.Keywords: implantable biomedical devices, communication system security, array signal processing, ray tracing
Procedia PDF Downloads 11418197 When does technology alignment influence supply chain performance
Authors: Joseph Akyeh, Abdul Samed Muntaka, Emmanuel Anin, Dorcas Nuertey
Abstract:
Purpose: This study develops and tests arguments that the relationship between technology alignment and supply chain performance is conditional upon levels of technology championing. Methodology: The proposed relationships are tested on a sample of 217 hospitals in a major sub-Saharan African economy. Findings: Findings from the study indicate that technology alignment has a positive and significant effect on supply chain performance. The study further finds that while technology championing strengthens the direct effects of technology alignment on supply chain performance. Theoretical Contributions: A theoretical contribution from this study is the finding that when technology alignment drives supply chain performance is more complex than previously thought it depends on whether or not technology alignment is first championed by top management. Originality: Though some studies have been conducted on technology alignment and health supply chain performance, to the best of the researcher’s knowledge, no previous study has examined the moderating role of technology championing the link between technology alignment and supply chain performance.Keywords: technology alignment, supply chain performance, technology championing, structural equation modelling
Procedia PDF Downloads 5018196 A Cooperative Transmission Scheme Using Two Sources Based on OFDM System
Authors: Bit-Na Kwon, Dong-Hyun Ha, Hyoung-Kyu Song
Abstract:
In wireless communication, space-time block code (STBC), cyclic delay diversity (CDD) and space-time cyclic delay diversity (STCDD) are used as the spatial diversity schemes and have been widely studied for the reliable communication. If these schemes are used, the communication system can obtain the improved performance. However, the quality of the system is degraded when the distance between a source and a destination is distant in wireless communication system. In this paper, the cooperative transmission scheme using two sources is proposed and improves the performance of the wireless communication system.Keywords: OFDM, Cooperative communication, CDD, STBC, STCDD
Procedia PDF Downloads 46818195 Enabling Enterprise Information System Interoperability: A Future Perspective
Authors: Mahdi Alkaeed, Adeel Ehsan
Abstract:
Enterprise information systems (EIS) act as the backbone of organizations that belong to different domains. These systems not only play a major role in the efficient usage of resources and time but also throw light on the future roadmap for the enterprise. In today's rapidly expanding world of business and technology, enterprise systems from various heterogenous environments have to exchange information at some point, be it within the same organization or between different organizations. This reality strengthens the importance of interoperability between these systems, which is one of the key enablers of systems collaboration. Both information technology infrastructure and business processes have to be aligned with each other to achieve this effect. This will be difficult to attain if traditional tightly coupled architecture is used. Instead, a more loosely coupled service-oriented architecture has to be used. That would enable an effective interoperability level between different EIS. This paper discusses and presents the current work that has been done in the field of EIS interoperability. Along the way, it also discusses the challenges, solutions to tackle those challenges presented in the studied literature, and limitations, if any.Keywords: enterprise systems interoperability, collaboration and integration, service-based architecture, open system architecture
Procedia PDF Downloads 11218194 Transforming Health Information from Manual to Digital (Electronic) World: A Reference and Guide
Authors: S. Karthikeyan, Naveen Bindra
Abstract:
Introduction: To update ourselves and understand the concept of latest electronic formats available for Health care providers and how it could be used and developed as per standards. The idea is to correlate between the patients Manual Medical Records keeping and maintaining patients Electronic Information in a Health care setup in this world. Furthermore this stands with adapting to the right technology depending upon the organization and improve our quality and quantity of Healthcare providing skills. Objective: The concept and theory is to explain the terms of Electronic Medical Record (EMR), Electronic Health Record (EHR) and Personal Health Record (PHR) and selecting the best technical among the available Electronic sources and software before implementing. It is to guide and make sure the technology used by the end users without any doubts and difficulties. The idea is to evaluate is to admire the uses and barriers of EMR-EHR-PHR. Aim and Scope: The target is to achieve the health care providers like Physicians, Nurses, Therapists, Medical Bill reimbursements, Insurances and Government to assess the patient’s information on easy and systematic manner without diluting the confidentiality of patient’s information. Method: Health Information Technology can be implemented with the help of Organisations providing with legal guidelines and help to stand by the health care provider. The main objective is to select the correct embedded and affordable database management software and generating large-scale data. The parallel need is to know how the latest software available in the market. Conclusion: The question lies here is implementing the Electronic information system with healthcare providers and organisation. The clinicians are the main users of the technology and manage us to ‘go paperless’. The fact is that day today changing technologically is very sound and up to date. Basically the idea is to tell how to store the data electronically safe and secure. All three exemplifies the fact that an electronic format has its own benefit as well as barriers.Keywords: medical records, digital records, health information, electronic record system
Procedia PDF Downloads 45918193 A Systematic Mapping of the Use of Information and Communication Technology (ICT)-Based Remote Agricultural Extension for Women Smallholders
Authors: Busiswa Madikazi
Abstract:
This systematic mapping study explores the underrepresentation of women's contributions to farming in the Global South within the development of Information and Communication Technologies (ICT)-based extension methods. Despite women farmers constituting 70% of the agricultural labour force, their productivity is hindered by various constraints, including illiteracy, household commitments, and limited access to credit and markets. A systematic mapping approach was employed with the aim of identifying evidence gaps in existing ICT extension for women farmers. The data collection protocol follows a structured approach, incorporating key criteria for inclusion, exclusion, search strategy, and coding and the PICO strategy (Population, Intervention, Comparator, and Outcome). The results yielded 119 articles that qualified for inclusion. The findings highlight that mobile phone apps (WhatsApp) and radio/television programming are the primary extension methods employed while integrating ICT with training, field visits, and demonstrations are underutilized. Notably, the study emphasizes the inadequate attention to critical issues such as food security, gender equality, and attracting youth to farming within ICT extension efforts. These findings indicate a significant policy and practice gap, neglecting community-driven approaches that cater to women's specific needs and enhance their agricultural production. Map highlights the importance of refocusing ICT extension efforts to address women farmers’ unique challenges, thereby contributing to their empowerment and improving agricultural practices.Keywords: agricultural extension, ICT, women farmers, smallholders
Procedia PDF Downloads 6318192 Interpolation Issue in PVNPG-14M Application for Technical Control of Artillery Fire
Authors: Martin Blaha, Ladislav Potužák, Daniel Holesz
Abstract:
This paper focused on application support for technical control of artillery units – PVNPG-14M, especially on interpolation issue. Artillery units of the Army of the Czech Republic, reflecting the current global security neighborhood, can be used outside the Czech Republic. The paper presents principles, evolution and calculation in the process of complete preparation. The paper presents expertise using of application of current artillery communication and information system and suggests the perspective future system. The paper also presents problems in process of complete preparing of fire especially problems in permanently information (firing table) and calculated values. The paper presents problems of current artillery communication and information system and suggests requirements of the future system.Keywords: Fire for Effect, Application, Fire Control, Interpolation method, Software development.
Procedia PDF Downloads 32118191 Implementation of Statistical Parameters to Form an Entropic Mathematical Models
Authors: Gurcharan Singh Buttar
Abstract:
It has been discovered that although these two areas, statistics, and information theory, are independent in their nature, they can be combined to create applications in multidisciplinary mathematics. This is due to the fact that where in the field of statistics, statistical parameters (measures) play an essential role in reference to the population (distribution) under investigation. Information measure is crucial in the study of ambiguity, assortment, and unpredictability present in an array of phenomena. The following communication is a link between the two, and it has been demonstrated that the well-known conventional statistical measures can be used as a measure of information.Keywords: probability distribution, entropy, concavity, symmetry, variance, central tendency
Procedia PDF Downloads 15618190 A Comparative Analysis of Asymmetric Encryption Schemes on Android Messaging Service
Authors: Mabrouka Algherinai, Fatma Karkouri
Abstract:
Today, Short Message Service (SMS) is an important means of communication. SMS is not only used in informal environment for communication and transaction, but it is also used in formal environments such as institutions, organizations, companies, and business world as a tool for communication and transactions. Therefore, there is a need to secure the information that is being transmitted through this medium to ensure security of information both in transit and at rest. But, encryption has been identified as a means to provide security to SMS messages in transit and at rest. Several past researches have proposed and developed several encryption algorithms for SMS and Information Security. This research aims at comparing the performance of common Asymmetric encryption algorithms on SMS security. The research employs the use of three algorithms, namely RSA, McEliece, and RABIN. Several experiments were performed on SMS of various sizes on android mobile device. The experimental results show that each of the three techniques has different key generation, encryption, and decryption times. The efficiency of an algorithm is determined by the time that it takes for encryption, decryption, and key generation. The best algorithm can be chosen based on the least time required for encryption. The obtained results show the least time when McEliece size 4096 is used. RABIN size 4096 gives most time for encryption and so it is the least effective algorithm when considering encryption. Also, the research shows that McEliece size 2048 has the least time for key generation, and hence, it is the best algorithm as relating to key generation. The result of the algorithms also shows that RSA size 1024 is the most preferable algorithm in terms of decryption as it gives the least time for decryption.Keywords: SMS, RSA, McEliece, RABIN
Procedia PDF Downloads 16318189 Gulfnet: The Advent of Computer Networking in Saudi Arabia and Its Social Impact
Authors: Abdullah Almowanes
Abstract:
The speed of adoption of new information and communication technologies is often seen as an indicator of the growth of knowledge- and technological innovation-based regional economies. Indeed, technological progress and scientific inquiry in any society have undergone a particularly profound transformation with the introduction of computer networks. In the spring of 1981, the Bitnet network was launched to link thousands of nodes all over the world. In 1985 and as one of the first adopters of Bitnet, Saudi Arabia launched a Bitnet-based network named Gulfnet that linked computer centers, universities, and libraries of Saudi Arabia and other Gulf countries through high speed communication lines. In this paper, the origins and the deployment of Gulfnet are discussed as well as social, economical, political, and cultural ramifications of the new information reality created by the network. Despite its significance, the social and cultural aspects of Gulfnet have not been investigated in history of science and technology literature to a satisfactory degree before. The presented research is based on an extensive archival research aimed at seeking out and analyzing of primary evidence from archival sources and records. During its decade and a half-long existence, Gulfnet demonstrated that the scope and functionality of public computer networks in Saudi Arabia have to be fine-tuned for compliance with Islamic culture and political system of the country. It also helped lay the groundwork for the subsequent introduction of the Internet. Since 1980s, in just few decades, the proliferation of computer networks has transformed communications world-wide.Keywords: Bitnet, computer networks, computing and culture, Gulfnet, Saudi Arabia
Procedia PDF Downloads 24518188 Communication Barriers and Challenges for Accessing Autism Care: Conventional Versus Alternative Medicine
Authors: M. D. Antoine
Abstract:
Despite the widespread use of complementary and alternative medicine (CAM) for autistic children, little is known about the communication flow between the different parties involved in autism care (e.g., parents/caregivers, conventional providers, alternative practitioners). This study aimed to describe how communication occurs through the first year following an autism spectrum disorder (ASD) diagnosis to identify challenges and potential barriers to communication within the healthcare system in Ottawa, Canada. From an ecological perspective, we collected qualitative data through 12 semi-structured interviews with six parents/caregivers, three conventional providers (e.g., family doctor, neurodevelopmental pediatrician, psychologist), and three alternative practitioners (e.g., naturopath, occupational therapist, speech and language pathologist) operating in Ottawa. We interpreted the data using thematic analysis. Findings revealed communication challenges between the parents/caregivers and conventional providers while they experience better communication flow with fewer challenges in alternative care settings. However, parents/caregivers are the only links between the health professionals of both streams. From the five contexts examined: organizational, interpersonal, media, cultural, and political-legal, we found four themes (provider knowledge, care integration, flexible care, and time constraints) underlining specific barriers to communication flow between the parties involved in the care of autistic children. The increasing interest in alternative medicine is forcing changes in the healthcare system. Communications occur outside the norms making openings for better communication and information-sharing increasingly essential. Within the identified themes in the current study, the necessity for better communication between all parties involved in the care of autistic children is evident. More ASD and CAM-related training for providers would support effective parent/caregiver-provider communication. The findings of the current study contribute to a better understanding of the role of communication in the care management of autism, which has implications for effective autism care.Keywords: alternative medicine, autism care management, autism spectrum disorder, conventional medicine, parent-provider communication
Procedia PDF Downloads 17618187 Enhancing goal Achivement through Improved Communication Skills
Abstract:
An extensive body of research studies suggest that students, teachers, and supervisors can enhance the likelihood of reaching their goals by improving their communication skills. It is highly important to learn how and when to provide different kinds of feedback, e.g. anticipatory, corrective and positive) will gain better result and higher morale. The purpose of this mixed methods research is twofold: 1) To find out what factors affect effective communication among different stakeholders and how these factors affect student learning 2) What are the good practices for improving communication among different stakeholders and improve student achievement. This presentation first begins with an introduction to the recent research on Marshall’s Nonviolent Communication Techniques (NVC), including four important components: observations, feelings, needs, requests. These techniques can be effectively applied at all levels of communication. To develop an in-depth understanding of the relationship among different techniques within, this research collected, compared, and combined qualitative and quantitative data to better improve communication and support student learning.Keywords: communication, education, language learning, goal achievement, academic success
Procedia PDF Downloads 7118186 The Emergence of Information and Communication Technologies Acting as a Challenge for Media Literacy
Authors: Geetu Gahlawat, Manisha Singh
Abstract:
In the recent years, the concept of media literacy is being extended from its traditional focus on print and audio-visual media to encompass the internet and other new media within academic and policy discourses. This article throws revolves around three significant queries which are to be dealt by the academia, general public and the policy-makers: What is media literacy? How is it changing? And what is the significance of media literacy? At the beginning of the article, the definition 'media literacy' is the ability to access, analyse, evaluate and create messages across a variety of contexts are given and then this is further being tested in connection with the internet and other information and communication technologies.Having advocated this skills-based approach to media literacy in relation to the internet, the article identifies some outstanding issues for new media literacy crucial to any policy of promoting media literacy among the population. The outcome is better understanding of media literacy and also the impact of ICT on media literacy by the public as well as media literate people.Keywords: media literacy, ICT, internet, education
Procedia PDF Downloads 60718185 An Approach towards Smart Future: Ict Infrastructure Integrated into Urban Water Networks
Authors: Ahsan Ali, Mayank Ostwal, Nikhil Agarwal
Abstract:
Abstract—According to a World Bank report, millions of people across the globe still do not have access to improved water services. With uninterrupted growth of cities and urban inhabitants, there is a mounting need to safeguard the sustainable expansion of cities. Efficient functioning of the urban components and high living standards of the residents are needed to be ensured. The water and sanitation network of an urban development is one of its most essential parts of its critical infrastructure. The growth in urban population is leading towards increased water demand, and thus, the local water resources are severely strained. 'Smart water' is referred to water and waste water infrastructure that is able to manage the limited resources and the energy used to transport it. It enables the sustainable consumption of water resources through co-ordinate water management system, by integrating Information Communication Technology (ICT) solutions, intended at maximizing the socioeconomic benefits without compromising the environmental values. This paper presents a case study from a medium sized city in North-western Pakistan. Currently, water is getting contaminated due to the proximity between water and sewer pipelines in the study area, leading to public health issues. Due to unsafe grey water infiltration, the scarce ground water is also getting polluted. This research takes into account the design of smart urban water network by integrating ICT (Information and Communication Technology) with urban water network. The proximity between the existing water supply network and sewage network is analyzed and a design of new water supply system is proposed. Real time mapping of the existing urban utility networks will be projected with the help of GIS applications. The issue of grey water infiltration is addressed by providing sustainable solutions with the help of locally available materials, keeping in mind the economic condition of the area. To deal with the current growth of urban population, it is vital to develop new water resources. Hence, distinctive and cost effective procedures to harness rain water would be suggested as a part of the research study experiment.Keywords: GIS, smart water, sustainability, urban water management
Procedia PDF Downloads 21518184 Survey on Malware Detection
Authors: Doaa Wael, Naswa Abdelbaky
Abstract:
Malware is malicious software that is built to cause destructive actions and damage information systems and networks. Malware infections increase rapidly, and types of malware have become more sophisticated, which makes the malware detection process more difficult. On the other side, the Internet of Things IoT technology is vulnerable to malware attacks. These IoT devices are always connected to the internet and lack security. This makes them easy for hackers to access. These malware attacks are becoming the go-to attack for hackers. Thus, in order to deal with this challenge, new malware detection techniques are needed. Currently, building a blockchain solution that allows IoT devices to download any file from the internet and to verify/approve whether it is malicious or not is the need of the hour. In recent years, blockchain technology has stood as a solution to everything due to its features like decentralization, persistence, and anonymity. Moreover, using blockchain technology overcomes some difficulties in malware detection and improves the malware detection ratio over-than the techniques that do not utilize blockchain technology. In this paper, we study malware detection models which are based on blockchain technology. Furthermore, we elaborate on the effect of blockchain technology in malware detection, especially in the android environment.Keywords: malware analysis, blockchain, malware attacks, malware detection approaches
Procedia PDF Downloads 8718183 Reverse Logistics Information Management Using Ontological Approach
Authors: F. Lhafiane, A. Elbyed, M. Bouchoum
Abstract:
Reverse Logistics (RL) Process is considered as complex and dynamic network that involves many stakeholders such as: suppliers, manufactures, warehouse, retails, and costumers, this complexity is inherent in such process due to lack of perfect knowledge or conflicting information. Ontologies, on the other hand, can be considered as an approach to overcome the problem of sharing knowledge and communication among the various reverse logistics partners. In this paper, we propose a semantic representation based on hybrid architecture for building the Ontologies in an ascendant way, this method facilitates the semantic reconciliation between the heterogeneous information systems (ICT) that support reverse logistics Processes and product data.Keywords: Reverse Logistics, information management, heterogeneity, ontologies, semantic web
Procedia PDF Downloads 492