Search results for: time sensitive networking
19720 Analyzing the Perception of Social Networking Sites as a Learning Tool among University Students: Case Study of a Business School in India
Authors: Bhaskar Basu
Abstract:
Universities and higher education institutes are finding it increasingly difficult to engage students fruitfully through traditional pedagogic tools. Web 2.0 technologies comprising social networking sites (SNSs) offer a platform for students to collaborate and share information, thereby enhancing their learning experience. Despite the potential and reach of SNSs, its use has been limited in academic settings promoting higher education. The purpose of this paper is to assess the perception of social networking sites among business school students in India and analyze its role in enhancing quality of student experiences in a business school leading to the proposal of an agenda for future research. In this study, more than 300 students of a reputed business school were involved in a survey of their preferences of different social networking sites and their perceptions and attitudes towards these sites. A questionnaire with three major sections was designed, validated and distributed among a sample of students, the research method being descriptive in nature. Crucial questions were addressed to the students concerning time commitment, reasons for usage, nature of interaction on these sites, and the propensity to share information leading to direct and indirect modes of learning. It was further supplemented with focus group discussion to analyze the findings. The paper notes the resistance in the adoption of new technology by a section of business school faculty, who are staunch supporters of the classical “face-to-face” instruction. In conclusion, social networking sites like Facebook and LinkedIn provide new avenues for students to express themselves and to interact with one another. Universities could take advantage of the new ways in which students are communicating with one another. Although interactive educational options such as Moodle exist, social networking sites are rarely used for academic purposes. Using this medium opens new ways of academically-oriented interactions where faculty could discover more about students' interests, and students, in turn, might express and develop more intellectual facets of their lives. hitherto unknown intellectual facets. This study also throws up the enormous potential of mobile phones as a tool for “blended learning” in business schools going forward.Keywords: business school, India, learning, social media, social networking, university
Procedia PDF Downloads 26419719 Facebook Spam and Spam Filter Using Artificial Neural Networks
Authors: A. Fahim, Mutahira N. Naseem
Abstract:
SPAM is any unwanted electronic message or material in any form posted to many people. As the world is growing as global world, social networking sites play an important role in making world global providing people from different parts of the world a platform to meet and express their views. Among different social networking sites facebook become the leading one. With increase in usage different users start abusive use of facebook by posting or creating ways to post spam. This paper highlights the potential spam types nowadays facebook users faces. This paper also provide the reason how user become victim to spam attack. A methodology is proposed in the end discusses how to handle different types of spam.Keywords: artificial neural networks, facebook spam, social networking sites, spam filter
Procedia PDF Downloads 37219718 Fake Accounts Detection in Twitter Based on Minimum Weighted Feature Set
Authors: Ahmed ElAzab, Amira M. Idrees, Mahmoud A. Mahmoud, Hesham Hefny
Abstract:
Social networking sites such as Twitter and Facebook attracts over 500 million users across the world, for those users, their social life, even their practical life, has become interrelated. Their interaction with social networking has affected their life forever. Accordingly, social networking sites have become among the main channels that are responsible for vast dissemination of different kinds of information during real time events. This popularity in Social networking has led to different problems including the possibility of exposing incorrect information to their users through fake accounts which results to the spread of malicious content during life events. This situation can result to a huge damage in the real world to the society in general including citizens, business entities, and others. In this paper, we present a classification method for detecting fake accounts on Twitter. The study determines the minimized set of the main factors that influence the detection of the fake accounts on Twitter, then the determined factors have been applied using different classification techniques, a comparison of the results for these techniques has been performed and the most accurate algorithm is selected according to the accuracy of the results. The study has been compared with different recent research in the same area, this comparison has proved the accuracy of the proposed study. We claim that this study can be continuously applied on Twitter social network to automatically detect the fake accounts, moreover, the study can be applied on different Social network sites such as Facebook with minor changes according to the nature of the social network which are discussed in this paper.Keywords: fake accounts detection, classification algorithms, twitter accounts analysis, features based techniques
Procedia PDF Downloads 41519717 Networking the Biggest Challenge in Hybrid Cloud Deployment
Authors: Aishwarya Shekhar, Devesh Kumar Srivastava
Abstract:
Cloud computing has emerged as a promising direction for cost efficient and reliable service delivery across data communication networks. The dynamic location of service facilities and the virtualization of hardware and software elements are stressing the communication networks and protocols, especially when data centres are interconnected through the internet. Although the computing aspects of cloud technologies have been largely investigated, lower attention has been devoted to the networking services without involving IT operating overhead. Cloud computing has enabled elastic and transparent access to infrastructure services without involving IT operating overhead. Virtualization has been a key enabler for cloud computing. While resource virtualization and service abstraction have been widely investigated, networking in cloud remains a difficult puzzle. Even though network has significant role in facilitating hybrid cloud scenarios, it hasn't received much attention in research community until recently. We propose Network as a Service (NaaS), which forms the basis of unifying public and private clouds. In this paper, we identify various challenges in adoption of hybrid cloud. We discuss the design and implementation of a cloud platform.Keywords: cloud computing, networking, infrastructure, hybrid cloud, open stack, naas
Procedia PDF Downloads 42719716 Research on Sensitivity of Geological Disasters in Road Area Based on Analytic Hierarchy Process
Authors: Li Yongyi
Abstract:
In order to explore the distribution of geological disasters within the expressway area of Shaanxi Province, the Analytic Hierarchy Process theory is applied based on the geographic information system technology platform, and the ground elevation, rainfall, vegetation coverage and other indicators are selected for analysis, and the expressway area is sensitive Sexual evaluation. The results show that the highway area disasters in Shaanxi Province are mainly distributed in the southern mountainous areas and are dominated by landslides; the disaster area ratio basically increases with the increase in ground elevation, surface slope, surface undulation, rainfall, and vegetation coverage. The increase in the distance from the river shows a decreasing trend; after grading the disaster sensitivity within 5km of the expressway, the extremely sensitive area, the highly sensitive area, the medium sensitive area, the low sensitive area, and the extremely low sensitive area respectively account for 8.17%、15.80%、22.99%、26.22%、26.82%. Highly sensitive road areas are mainly distributed in southern Shaanxi.Keywords: highway engineering, sensitivity, analytic hierarchy process, geological hazard, road area
Procedia PDF Downloads 10119715 Design and Implementation of Campus Wireless Networking for Sharing Resources in Federal Polytechnic Bauchi, Bauchi State, Nigeria
Authors: Hassan Abubakar
Abstract:
This paper will serve as a guide to good design and implementation of wireless networking for campus institutions in Nigeria. It can be implemented throughout the primary, secondary and tertiary institutions. This paper describe the some technical functions, standard configurations and layouts of the 802.11 wireless LAN(Local Area Network) that can be implemented across the campus network. The paper also touches upon the wireless infrastructure standards involved with enhanced services, such as voice over wireless and wireless guest hotspot. The paper also touch the benefits derived from implementing campus wireless network and share some lights on how to arrive at the success in increasing the performance of wireless and using the campus wireless to share resources like software applications, printer and documents.Keywords: networking, standards, wireless local area network (WLAN), radio frequency (RF), campus
Procedia PDF Downloads 41619714 Molecular Biomonitoring of Bacterial Pathogens in Wastewater
Authors: Desouky Abd El Haleem, Sahar Zaki
Abstract:
This work was conducted to develop a one-step multiplex PCR system for rapid, sensitive, and specific detection of three different bacterial pathogens, Escherichia coli, Pseudomonas aeruginosa, and Salmonella spp, directly in wastewater without prior isolation on selective media. As a molecular confirmatory test after isolation of the pathogens by classical microbiological methods, PCR-RFLP of their amplified 16S rDNA genes was performed. It was observed that the developed protocols have significance impact in the ability to detect sensitively, rapidly and specifically the three pathogens directly in water within short-time, represents a considerable advancement over more time-consuming and less-sensitive methods for identification and characterization of these kinds of pathogens.Keywords: multiplex PCR, bacterial pathogens, Escherichia coli, Pseudomonas aeruginosa, Salmonella spp.
Procedia PDF Downloads 44819713 Quality and Quantity in the Strategic Network of Higher Education Institutions
Authors: Juha Kettunen
Abstract:
This study analyzes the quality and the size of the strategic network of higher education institutions. The study analyses the concept of fitness for purpose in quality assurance. It also analyses the transaction costs of networking that have consequences on the number of members in the network. Empirical evidence is presented of the Consortium on Applied Research and Professional Education, which is a European strategic network of six higher education institutions. The results of the study support the argument that the number of members in the strategic network should be relatively small to provide high quality results. The practical importance is that networking has been able to promote international research and development projects. The results of this study are important for those who want to design and improve international networks in higher education.
Keywords: balanced scorecard, higher education, social networking, strategic planning
Procedia PDF Downloads 34819712 Cryptography and Cryptosystem a Panacea to Security Risk in Wireless Networking
Authors: Modesta E. Ezema, Chikwendu V. Alabekee, Victoria N. Ishiwu, Ifeyinwa NwosuArize, Chinedu I. Nwoye
Abstract:
The advent of wireless networking in computing technology cannot be overemphasized, it opened up easy accessibility to information resources, networking made easier and brought internet accessibility to our doorsteps, but despite all these, some mishap came in with it that is causing mayhem in today ‘s overall information security. The cyber criminals will always compromise the integrity of a message that is not encrypted or that is encrypted with a weak algorithm.In other to correct the mayhem, this study focuses on cryptosystem and cryptography. This ensures end to end crypt messaging. The study of various cryptographic algorithms, as well as the techniques and applications of the cryptography for efficiency, were all considered in the work., present and future applications of cryptography were dealt with as well as Quantum Cryptography was exposed as the current and the future area in the development of cryptography. An empirical study was conducted to collect data from network users.Keywords: algorithm, cryptography, cryptosystem, network
Procedia PDF Downloads 34919711 Real, Ideal, or False Self- Presentation among Young Adult and Middle Adult Facebook Users
Authors: Maria Joan Grafil, Hannah Wendam, Christine Joyce Yu
Abstract:
The use of social networking sites had been a big part of life of most people. One of the most popular among these is Facebook. Users range from young adults to late adults. While it is more popular among emerging and young adults, this social networking site gives people opportunities to express the self. Via Facebook, people have the opportunity to think about what they prefer to show others. This study identified which among the multiple facets of the self (real self, false self or ideal self) is dominantly presented by young adults and middle adults in using the social networking site Facebook. South Metro Manila was the locale of this study where 100 young adult participants (aged 18-25) were students from nearby universities and the 100 middle adult participants (aged 35-45) were working residents within the area. Participants were comprised of 53% females and 47% males. The data was gathered using a self-report questionnaire to determine which online self-presentation (real self-presentation, false self-presentation, or ideal self-presentation) of the participants has greater extent when engaging in the social networking site Facebook. Using means comparison, results showed that both young adults and middle adults engaged primarily in real self-presentation.Keywords: false self, ideal self, middle adult, real self, self presentation, young adult
Procedia PDF Downloads 28819710 On Adaptive and Auto-Configurable Apps
Authors: Prisa Damrongsiri, Kittinan Pongpianskul, Mario Kubek, Herwig Unger
Abstract:
Apps are today the most important possibility to adapt mobile phones and computers to fulfill the special needs of their users. Location- and context-sensitive programs are hereby the key to support the interaction of the user with his/her environment and also to avoid an overload with a plenty of dispensable information. The contribution shows, how a trusted, secure and really bi-directional communication and interaction among users and their environment can be established and used, e.g. in the field of home automation.Keywords: apps, context-sensitive, location-sensitive, self-configuration, mobile computing, smart home
Procedia PDF Downloads 39619709 Effect of Cellulase Pretreatment for n-Hexane Extraction of Oil from Garden Cress Seeds
Authors: Boutemak Khalida, Dahmani Siham
Abstract:
Garden cress (Lepidium Sativum L.) belonging to the family Brassicaceae, is edible growing annual herb. Its various parts (roots, leaves and seeds) have been used to treat various human ailments. Its seed extracts have been screened for various biological activities like hypotensive, antimicrobial, bronchodilator, hypoglycaemic and antianemic. The aim of the present study is to optimize the process parameters (cellulase concentration and incubation time) of enzymatic pre-treatment of the garden cress seeds and to evaluate the effect of cellulase pre-treatment of the crushed seeds on the oil yield, physico-chemical properties and antibacterial activity and comparing to non-enzymatic method. The optimum parameters of cellulase pre-treatment were as follows: cellulase of 0,1% w/w and incubation time of 2h. After enzymatic pre-treatment, the oil was extracted by n-hexane for 1.5 h, the oil yield was 4,01% for cellulase pre-treatment as against 10,99% in the control sample. The decrease in yield might be caused a result of mucilage. Garden cress seeds are covered with a layer of mucilage which gels on contact with water. At the same time, the antibacterial activity was carried out using agar diffusion method against 4 food-borne pathogens (Escherichia coli, Salmonella typhi,Staphylococcus aureus, Bacillus subtilis). The results showed that bacterial strains are very sensitive to the oil with cellulase pre-treatment. Staphylococcus aureus is extremely sensitive with the largest zone of inhibition (40 mm), Escherichia coli and salmonella typhi had a very sensitive to the oil with a zone of inhibition (26 mm). Bacillus subtilizes is averagely sensitive which gave an inhibition of 16 mm. But it does not exhibit sensivity to the oil without enzymatic pre-treatment with a zone inhibition (< 8 mm). Enzymatic pre-treatment could be useful for antimicrobial activity of the oil, and hold a good potential for use in food and pharmaceutical industries.Keywords: Lepidium sativum L., cellulase, enzymatic pretreatment, antibacterial activity.
Procedia PDF Downloads 46119708 Analyzing Social and Political Constraints in Development Aid Projects in Post Conflict Region of SWAT, Pakistan
Authors: Faizan Sultan
Abstract:
Non-government organizations (NGOs) in Pakistan have the potential to deliver services such as health, education, and rural development through targeting the most vulnerable communities of society. Having this significant importance, NGOs are facing numerous challenges in service delivery. So, there is a need to identify the challenges NGOs face in community development, particularly post-conflict development. The current study has analyzed the social and political constraints in development projects in the post-conflict region of the Swat district of Khyber Pakhtunkhwa. The objectives of this study are “What are the social and political constraints faced by the nongovernmental organizations in the implementation of development aid Projects in post-conflict development of Swat and to examine the challenges in coordination mechanism between government departments, NGOs, and community in reconstruction activities”. This research is based upon both the quantitative and qualitative data that is being gathered from the NGO representatives, government officials, and community members who were involved in post-conflict development interventions in the Swat region. A purposive sampling technique was used to select respondents from the community members/activists (25 in number) and government and NGO officials (10 in number). Based on analysis against our objectives, NGOs have faced numerous constraints such as Insecurity, Negative Perceptions about NGOs, restrictions on women's mobility, government policies and regulations, lack of coordination and networking, trust deficit, and political interference while implementing their project interventions. These findings concluded that constraints have affected project implementation to a greater extent, including women's participation, involvement of marginalized populations, and equal distribution of resources. In the Swat region, NGOs cannot openly discuss sensitive projects such as human rights, gender-based projects, or women empowerment as these issues are very sensitive to the local community due to their cultural values. The community may not allow their females to go outside their homes as this region is a male-dominated society. Similarly, lack of communication and poor networking for the arrangements of the project meetings were also the major constraints.Keywords: national disaster management authority, millennium development goals, provincial disaster management authority, provincial reconstruction, rehabilitation and settlement authority
Procedia PDF Downloads 5919707 Social Media Creating Communication Gap among Individuals
Authors: Muneeza Anwar, Muniba Raza, Zunahs Khalid
Abstract:
The study discusses the communication gap that has been created due to excessive use of social networking websites such as Facebook, WhatsApp, Viber etc. In this growing world of technology and awareness among people about social media it has also increased its usage. The objective of this study is to measure the ways the internet is affecting the communications among individuals through social media and to check whether this is affecting the society in a positive manner. The study signifies the theoretical and practical aspects of communication gaps among the individuals through social media. The study is conducted to check whether social networking websites are the main causes of creating communication gap among individuals. In this world of fast growing technology every day, there is a new invention, affecting the lives of people both directly and indirectly. Moreover with the usage of technology people keep updating about themselves, about different events happening around their surrounding by creating events, uploading pictures, checking in different place, and creating awareness among people who are not aware of people about what is happening. From the study, we deduced how social media is affecting individual’s life. The findings suggest that social media is although creating communication gaps among people but is also bridging them. Showing that social media is one of the causes that is creating communication gap among the individuals. Communication gap has although increased on a daily basis but on average it has remained the same as they are communicating on social networking websites but eventually decreasing the communication on personal grounds.Keywords: communication gaps, usage of social networking websites, interaction with friends and family, social media
Procedia PDF Downloads 48319706 The Impacts of Cultural Event on Networking: Liverpool's Cultural Sector in the Aftermath of 2008
Authors: Yi-De Liu
Abstract:
The aim of this paper is to discuss how the construct of networking and social capital can be used to understand the effect events can have on the cultural sector. Based on case study, this research sought the views of those working in the cultural sector on Liverpool’s year as the European Capital of Culture (ECOC). Methodologically, this study involves literature review to prompt theoretical sensitivity, the collection of primary data via online survey (n= 42) and follow-up telephone interviews (n= 8) to explore the emerging findings in more detail. The findings point to a number of ways in which the ECOC constitutes a boost for networking and its effects on city’s cultural sector, including organisational learning, aspiration and leadership. The contributions of this study are two-fold: (1) Evaluating the long-term effects on network formation in the cultural sector following major event; (2) conceptualising the impact assessment of organisational social capital for future ECOC or similar events.Keywords: network, social capital, cultural impact, european capital of culture
Procedia PDF Downloads 20419705 The Role of Social Networking in Activating the Participation of Youth in the Community
Authors: Raya Hamed Hial Al Maamari
Abstract:
The gulf societies have been undergoing radical changes because of the technology transfer. It altered the humanities attitudes. Especially, youth habits so they become a fond of using social networking. This study aimed to find out the ratio of social networking in Directing youth to participate with government institutions in decision-making and improving their societies. The study considered a descriptive study, social survey method was used on a sample of 100 young men from different gulf countries, using an electronic questionnaire, with some interviews with famous leaders of youth groups. Finally, the researchers suggested many effective views to activate youth efforts using social networks as an effective manner to plan for the development policy and Implemented accurately in the community. The findings illustrated that social networks play a vital role in encouraging youth to participate Enthusiastically in providing the service. As it notices these networks contain large numbers of youth. Therefore, the influences become widely and feasible. Moreover, the study indicated the fact that most of youth teamwork started in these social networks. Then, it has been growing to the real society.Keywords: social work, volunteering, youth, community
Procedia PDF Downloads 34619704 AMBICOM: An Ambient Computing Middleware Architecture for Heterogeneous Environments
Authors: Ekrem Aksoy, Nihat Adar, Selçuk Canbek
Abstract:
Ambient Computing or Ambient Intelligence (AmI) is emerging area in computer science aiming to create intelligently connected environments and Internet of Things. In this paper, we propose communication middleware architecture for AmI. This middleware architecture addresses problems of communication, networking, and abstraction of applications, although there are other aspects (e.g. HCI and Security) within general AmI framework. Within this middleware architecture, any application developer might address HCI and Security issues with extensibility features of this platform.Keywords: AmI, ambient computing, middleware, distributed-systems, software-defined networking
Procedia PDF Downloads 28419703 Security Architecture for Cloud Networking: A Survey
Authors: Vishnu Pratap Singh Kirar
Abstract:
In the cloud computing hierarchy IaaS is the lowest layer, all other layers are built over it. Thus it is the most important layer of cloud and requisite more importance. Along with advantages IaaS faces some serious security related issue. Mainly Security focuses on Integrity, confidentiality and availability. Cloud computing facilitate to share the resources inside as well as outside of the cloud. On the other hand, cloud still not in the state to provide surety to 100% data security. Cloud provider must ensure that end user/client get a Quality of Service. In this report we describe possible aspects of cloud related security.Keywords: cloud computing, cloud networking, IaaS, PaaS, SaaS, cloud security
Procedia PDF Downloads 53019702 Users’ Information Disclosure Determinants in Social Networking Sites: A Systematic Literature Review
Authors: Wajdan Al Malwi, Karen Renaud, Lewis Mackenzie
Abstract:
The privacy paradox describes a phenomenon whereby there is no connection between stated privacy concerns and privacy behaviours. We need to understand the underlying reasons for this paradox if we are to help users to preserve their privacy more effectively. In particular, the Social Networking System (SNS) domain offers a rich area of investigation due to the risks of unwise information disclosure decisions. Our study thus aims to untangle the complicated nature and underlying mechanisms of online privacy-related decisions in SNSs. In this paper, we report on the findings of a Systematic Literature Review (SLR) that revealed a number of factors that are likely to influence online privacy decisions. Our deductive analysis approach was informed by Communicative Privacy Management (CPM) theory. We uncovered a lack of clarity around privacy attitudes and their link to behaviours, which makes it challenging to design privacy-protecting SNS platforms and to craft legislation to ensure that users’ privacy is preserved.Keywords: privacy paradox, self-disclosure, privacy attitude, privacy behavior, social networking sites
Procedia PDF Downloads 15519701 Improved Estimation Strategies of Sensitive Characteristics Using Scrambled Response Techniques in Successive Sampling
Authors: S. Suman, G. N. Singh
Abstract:
This research work is an effort to analyse the consequences of scrambled response technique to estimate the current population mean in two-occasion successive sampling when the characteristic of interest is sensitive in nature. The generalized estimation procedures have been proposed using sensitive auxiliary variables under additive and multiplicative scramble models. The properties of resultant estimators have been deeply examined. Simulation, as well as empirical studies, are carried out to evaluate the performances of the proposed estimators with respect to other competent estimators. The results of our studies suggest that the proposed estimation procedures are highly effective under the presence of non-response situation. The result of this study also suggests that additive scrambled response model is a better choice in the perspective of cost of the survey and privacy of the respondents.Keywords: scrambled response, sensitive characteristic, successive sampling, optimum replacement strategy
Procedia PDF Downloads 17719700 Self in Networks: Public Sphere in the Era of Globalisation
Authors: Sanghamitra Sadhu
Abstract:
A paradigm shift from capitalism to information technology is discerned in the era globalisation. The idea of public sphere, which was theorized in terms of its decline in the wake of the rise of commercial mass media has now emerged as a transnational or global sphere with the discourse being dominated by the ‘network society’. In other words, the dynamic of globalisation has brought about ‘a spatial turn’ in the social and political sciences which is also manifested in the public sphere, Especially the global public sphere. The paper revisits the Habermasian concept of the public sphere and focuses on the various social networking sites with their plausibility to create a virtual global public sphere. Situating Habermas’s notion of the bourgeois public sphere in the present context of global public sphere, it considers the changing dimensions of the public sphere across time and examines the concept of the ‘public’ with its shifting transformation from the concrete collective to the fluid ‘imagined’ category. The paper addresses the problematic of multimodal self-portraiture in the social networking sites as well as various online diaries/journals with an attempt to explore the nuances of the networked self.Keywords: globalisation, network society, public sphere, self-fashioning, identity, autonomy
Procedia PDF Downloads 41619699 Detecting and Thwarting Interest Flooding Attack in Information Centric Network
Authors: Vimala Rani P, Narasimha Malikarjunan, Mercy Shalinie S
Abstract:
Data Networking was brought forth as an instantiation of information-centric networking. The attackers can send a colossal number of spoofs to take hold of the Pending Interest Table (PIT) named an Interest Flooding attack (IFA) since the in- interests are recorded in the PITs of the intermediate routers until they receive corresponding Data Packets are go beyond the time limit. These attacks can be detrimental to network performance. PIT expiration rate or the Interest satisfaction rate, which cannot differentiate the IFA from attacks, is the criterion Traditional IFA detection techniques are concerned with. Threshold values can casually affect Threshold-based traditional methods. This article proposes an accurate IFA detection mechanism based on a Multiple Feature-based Extreme Learning Machine (MF-ELM). Accuracy of the attack detection can be increased by presenting the entropy of Internet names, Interest satisfaction rate and PIT usage as features extracted in the MF-ELM classifier. Furthermore, we deploy a queue-based hostile Interest prefix mitigation mechanism. The inference of this real-time test bed is that the mechanism can help the network to resist IFA with higher accuracy and efficiency.Keywords: information-centric network, pending interest table, interest flooding attack, MF-ELM classifier, queue-based mitigation strategy
Procedia PDF Downloads 20519698 Router 1X3 - RTL Design and Verification
Authors: Nidhi Gopal
Abstract:
Routing is the process of moving a packet of data from source to destination and enables messages to pass from one computer to another and eventually reach the target machine. A router is a networking device that forwards data packets between computer networks. It is connected to two or more data lines from different networks (as opposed to a network switch, which connects data lines from one single network). This paper mainly emphasizes upon the study of router device, its top level architecture, and how various sub-modules of router i.e. Register, FIFO, FSM and Synchronizer are synthesized, and simulated and finally connected to its top module.Keywords: data packets, networking, router, routing
Procedia PDF Downloads 81219697 A Survey of Dynamic QoS Methods in Sofware Defined Networking
Authors: Vikram Kalekar
Abstract:
Modern Internet Protocol (IP) networks deploy traditional and modern Quality of Service (QoS) management methods to ensure the smooth flow of network packets during regular operations. SDN (Software-defined networking) networks have also made headway into better service delivery by means of novel QoS methodologies. While many of these techniques are experimental, some of them have been tested extensively in controlled environments, and few of them have the potential to be deployed widely in the industry. With this survey, we plan to analyze the approaches to QoS and resource allocation in SDN, and we will try to comment on the possible improvements to QoS management in the context of SDN.Keywords: QoS, policy, congestion, flow management, latency, delay index terms-SDN, delay
Procedia PDF Downloads 19319696 Minimization of Denial of Services Attacks in Vehicular Adhoc Networking by Applying Different Constraints
Authors: Amjad Khan
Abstract:
The security of Vehicular ad hoc networking is of great importance as it involves serious life threats. Thus to provide secure communication amongst Vehicles on road, the conventional security system is not enough. It is necessary to prevent the network resources from wastage and give them protection against malicious nodes so that to ensure the data bandwidth availability to the legitimate nodes of the network. This work is related to provide a non conventional security system by introducing some constraints to minimize the DoS (Denial of services) especially data and bandwidth. The data packets received by a node in the network will pass through a number of tests and if any of the test fails, the node will drop those data packets and will not forward it anymore. Also if a node claims to be the nearest node for forwarding emergency messages then the sender can effectively identify the true or false status of the claim by using these constraints. Consequently the DoS(Denial of Services) attack is minimized by the instant availability of data without wasting the network resources.Keywords: black hole attack, grey hole attack, intransient traffic tempering, networking
Procedia PDF Downloads 28419695 Social Networking Application: What Is Their Quality and How Can They Be Adopted in Open Distance Learning Environments?
Authors: Asteria Nsamba
Abstract:
Social networking applications and tools have become compelling platforms for generating and sharing knowledge across the world. Social networking applications and tools refer to a variety of social media platforms which include Facebook, Twitter WhatsApp, blogs and Wikis. The most popular of these platforms are Facebook, with 2.41 billion active users on a monthly basis, followed by WhatsApp with 1.6 billion users and Twitter with 330 million users. These communication platforms have not only impacted social lives but have also impacted students’ learning, across different delivery modes in higher education: distance, conventional and blended learning modes. With this amount of interest in these platforms, knowledge sharing has gained importance within the context in which it is required. In open distance learning (ODL) contexts, social networking platforms can offer students and teachers the platform on which to create and share knowledge, and form learning collaborations. Thus, they can serve as support mechanisms to increase interactions and reduce isolation and loneliness inherent in ODL. Despite this potential and opportunity, research indicates that many ODL teachers are not inclined to using social media tools in learning. Although it is unclear why these tools are uncommon in these environments, concerns raised in the literature have indicated that many teachers have not mastered the art of teaching with technology. Using technological, pedagogical content knowledge (TPCK) and product quality theory, and Bloom’s Taxonomy as lenses, this paper is aimed at; firstly, assessing the quality of three social media applications: Facebook, Twitter and WhatsApp, in order to determine the extent to which they are suitable platforms for teaching and learning, in terms of content generation, information sharing and learning collaborations. Secondly, the paper demonstrates the application of teaching, learning and assessment using Bloom’s Taxonomy.Keywords: distance education, quality, social networking tools, TPACK
Procedia PDF Downloads 12419694 Developing Model for Fuel Consumption Optimization in Aviation Industry
Authors: Somesh Kumar Sharma, Sunanad Gupta
Abstract:
The contribution of aviation to society and economy is undisputedly significant. The aviation industry drives economic and social progress by contributing prominently to tourism, commerce and improved quality of life. Identifying the amount of fuel consumed by an aircraft while moving in both airspace and ground networks is critical to air transport economics. Aviation fuel is a major operating cost parameter of the aviation industry and at the same time it is prone to various constraints. This article aims to develop a model for fuel consumption of aviation product. The paper tailors the information for the fuel consumption optimization in terms of information development, information evaluation and information refinement. The information is evaluated and refined using statistical package R and Factor Analysis which is further validated with neural networking. The study explores three primary dimensions which are finally summarized into 23 influencing variables in contrast to 96 variables available in literature. The 23 variables explored in this study should be considered as highly influencing variables for fuel consumption which will contribute significantly towards fuel optimization.Keywords: fuel consumption, civil aviation industry, neural networking, optimization
Procedia PDF Downloads 34019693 The Influence of Strategic Networks and Logistics Integration on Company Performance among Small and Medium Enterprises
Authors: Jeremiah Madzimure
Abstract:
In order to stay competitive in business and improve performance, Small and Medium Enterprises (SMEs) need to make use of business networking and logistics integration. Strategic networking and logistics integration in business companies have become critical as they allow supplier partnering, exchange of vital information/ access to valuable resources allowing innovation, gaining access to additional resources, sharing risks and costs which is required for enhancing company performance. The purpose of this study was to examine the influence of strategic networks and logistics integration on company performance: the case of small and medium enterprises in South Africa. A quantitative research design was adopted in this study, and 137 SMEs owners and managers completed and returned the survey questionnaire. Confirmatory Factor Analysis (CFA) was conducted using the Analysis of Moment Structures (AMOS), version 24.0 to assess psychometric properties of the measurement scales. Path modelling techniques were used to test the proposed hypothesis. Three research hypotheses were postulated. The results indicate that strategic networks had a positive and significant influence on logistics integration and company performance. As well logistics integration had a strong positive and significant influence on company performance. This study provides a useful model for analysing the relationship between strategic networks and logistics integration on company performance. Moreover, the findings of the study provide useful insights into how SMEs should benefit from business networking and logistics integration so as to improve their performance. The implications of the study are discussed, and finally, limitations and recommendations are indicated.Keywords: strategic networking, logistics integration, company performance, SMEs
Procedia PDF Downloads 29719692 Research and Application of Consultative Committee for Space Data Systems Wireless Communications Standards for Spacecraft
Authors: Cuitao Zhang, Xiongwen He
Abstract:
According to the new requirements of the future spacecraft, such as networking, modularization and non-cable, this paper studies the CCSDS wireless communications standards, and focuses on the low data-rate wireless communications for spacecraft monitoring and control. The application fields and advantages of wireless communications are analyzed. Wireless communications technology has significant advantages in reducing the weight of the spacecraft, saving time in spacecraft integration, etc. Based on this technology, a scheme for spacecraft data system is put forward. The corresponding block diagram and key wireless interface design of the spacecraft data system are given. The design proposal of the wireless node and information flow of the spacecraft are also analyzed. The results show that the wireless communications scheme is reasonable and feasible. The wireless communications technology can meet the future spacecraft demands in networking, modularization and non-cable.Keywords: Consultative Committee for Space Data Systems (CCSDS) standards, information flow, non-cable, spacecraft, wireless communications
Procedia PDF Downloads 32819691 Runtime Monitoring Using Policy-Based Approach to Control Information Flow for Mobile Apps
Authors: Mohamed Sarrab, Hadj Bourdoucen
Abstract:
Mobile applications are verified to check the correctness or evaluated to check the performance with respect to specific security properties such as availability, integrity, and confidentiality. Where they are made available to the end users of the mobile application is achievable only to a limited degree using software engineering static verification techniques. The more sensitive the information, such as credit card data, personal medical information or personal emails being processed by mobile application, the more important it is to ensure the confidentiality of this information. Monitoring non-trusted mobile application during execution in an environment where sensitive information is present is difficult and unnerving. The paper addresses the issue of monitoring and controlling the flow of confidential information during non-trusted mobile application execution. The approach concentrates on providing a dynamic and usable information security solution by interacting with the mobile users during the run-time of mobile application in response to information flow events.Keywords: mobile application, run-time verification, usable security, direct information flow
Procedia PDF Downloads 381