Search results for: wireless networking
517 Integration of Social Media in Teaching and Learning Activities: A Case Study
Authors: A. Nagaletchimee Annamalai
Abstract:
The study investigated on how a small group of pre-service teachers and lecturers used social media to interact and collaborate to complete their tasks. The study is a qualitative case study that explored the lecturers’ reflections and pre-service teachers’ interviews. The lecturers were given the option to choose Facebook or any other social media as their teaching and learning platforms. However, certain guidelines based on were given to lecturers to conduct their teaching and learning activities. The findings revealed that although Facebook was a popular social networking site, it was not a preferred educational platform. Lecturers preferred to use WhatsApp, Canvas, and email. The focus group interview found positive and negative experiences of the pre-service teachers. The study suggested several pedagogical implications and importantly highlighted the need for changes in curriculum to ensure lecturers leverage the potential of technology in education.Keywords: social media, interactions, collaboration, online learning environment
Procedia PDF Downloads 182516 Technology Angels and Entrepreneurs: Insights from a Study in Poland
Authors: Rafal Morawczynski
Abstract:
The paper presents results of a study of technology angels in Poland, who are important for the development of the high technology industries. For entrepreneurs, they offer not only capital but also expertise, engagement, and networking. A technology angel is a relatively new type of investor who invests in high-tech start-ups and supports their founders (entrepreneurs) in the development process of a new venture. Conclusions are drawn from a comparison between 8 technology angels and 7 'classical' business angels. Results present features and behaviors of technology angels that distinguish them from traditional (typical, classic) business angels. As this type of investor actively cooperates with entrepreneurs, the study focuses mainly on their perception of venture founders and several aspects of this cooperation: perception of entrepreneurs’ characteristics by angels, correction of expectations toward corporate governance, and 'value adding' activities.Keywords: business angels, entrepreneurs, Poland, start-up, technology entrepreneurship, venture capital
Procedia PDF Downloads 188515 A Novel Design of a Low Cost Wideband Wilkinson Power Divider
Authors: A. Sardi, J. Zbitou, A. Errkik, L. El Abdellaoui, A. Tajmouati, M. Latrach
Abstract:
This paper presents analysis and design of a wideband Wilkinson power divider for wireless applications. The design is accomplished by transforming the lengths and impedances of the quarter wavelength sections of the conventional Wilkinson power divider into U-shaped sections. The designed power divider is simulated by using ADS Agilent technologies and CST microwave studio software. It is shown that the proposed power divider has simple topology and good performances in terms of insertion loss, port matching and isolation at all operating frequencies (1.8 GHz, 2.45 GHz and 3.55 GHz).Keywords: ADS agilent technologies, CST microwave studio, microstrip, wideband, wilkinson power divider
Procedia PDF Downloads 370514 Analysis of Network Performance Using Aspect of Quantum Cryptography
Authors: Nisarg A. Patel, Hiren B. Patel
Abstract:
Quantum cryptography is described as a point-to-point secure key generation technology that has emerged in recent times in providing absolute security. Researchers have started studying new innovative approaches to exploit the security of Quantum Key Distribution (QKD) for a large-scale communication system. A number of approaches and models for utilization of QKD for secure communication have been developed. The uncertainty principle in quantum mechanics created a new paradigm for QKD. One of the approaches for use of QKD involved network fashioned security. The main goal was point-to-point Quantum network that exploited QKD technology for end-to-end network security via high speed QKD. Other approaches and models equipped with QKD in network fashion are introduced in the literature as. A different approach that this paper deals with is using QKD in existing protocols, which are widely used on the Internet to enhance security with main objective of unconditional security. Our work is towards the analysis of the QKD in Mobile ad-hoc network (MANET).Keywords: cryptography, networking, quantum, encryption and decryption
Procedia PDF Downloads 184513 Security Features for Remote Healthcare System: A Feasibility Study
Authors: Tamil Chelvi Vadivelu, Nurazean Maarop, Rasimah Che Yusoff, Farhana Aini Saludin
Abstract:
Implementing a remote healthcare system needs to consider many security features. Therefore, before any deployment of the remote healthcare system, a feasibility study from the security perspective is crucial. Remote healthcare system using WBAN technology has been used in other countries for medical purposes but in Malaysia, such projects are still not yet implemented. This study was conducted qualitatively. The interview results involving five healthcare practitioners are further elaborated. The study has addressed four important security features in order to incorporate remote healthcare system using WBAN in Malaysian government hospitals.Keywords: remote healthcare, IT security, security features, wireless sensor application
Procedia PDF Downloads 305512 Design of Circular Patch Antenna in Terahertz Band for Medical Applications
Authors: Moulfi Bouchra, Ferouani Souheyla, Ziani Kerarti Djalal, Moulessehoul Wassila
Abstract:
The wireless body network (WBAN) is the most interesting network these days and especially with the appearance of contagious illnesses such as covid 19, which require surveillance in the house. In this article, we have designed a circular microstrip antenna. Gold is the material used respectively for the patch and the ground plane and Gallium (εr=12.94) is chosen as the dielectric substrate. The dimensions of the antenna are 82.10*62.84 μm2 operating at a frequency of 3.85 THz. The proposed, designed antenna has a return loss of -46.046 dB and a gain of 3.74 dBi, and it can measure various physiological parameters and sensors that help in the overall monitoring of an individual's health condition.Keywords: circular patch antenna, Terahertz transmission, WBAN applications, real-time monitoring
Procedia PDF Downloads 307511 Improved Cooperative Communication Scheme in the Edge of Cell Coverage
Authors: Myoung-Jin Kim, Yeong-Seop Ahn, Hyun-Jee Yang, Hyoung-Kyu Song
Abstract:
This paper proposes the new cooperative communication scheme for the wireless communication system. When the receiver is located in the edge of coverage, the signal from the transmitter is distorted by the inter-cell interference (ICI) and power reduction by distance. In order to improve communication performance, the proposed scheme adds the relay. By using the relay, the receiver receives the signal from the transmitter and relay at the same time. Therefore, the new cooperative communication scheme obtains diversity gain and is improved by the relay.Keywords: cooperative communication, diversity gain, OFDM, MIMO
Procedia PDF Downloads 609510 Proposal of Data Collection from Probes
Authors: M. Kebisek, L. Spendla, M. Kopcek, T. Skulavik
Abstract:
In our paper we describe the security capabilities of data collection. Data are collected with probes located in the near and distant surroundings of the company. Considering the numerous obstacles e.g. forests, hills, urban areas, the data collection is realized in several ways. The collection of data uses connection via wireless communication, LAN network, GSM network and in certain areas data are collected by using vehicles. In order to ensure the connection to the server most of the probes have ability to communicate in several ways. Collected data are archived and subsequently used in supervisory applications. To ensure the collection of the required data, it is necessary to propose algorithms that will allow the probes to select suitable communication channel.Keywords: communication, computer network, data collection, probe
Procedia PDF Downloads 360509 A System to Detect Inappropriate Messages in Online Social Networks
Authors: Shivani Singh, Shantanu Nakhare, Kalyani Nair, Rohan Shetty
Abstract:
As social networking is growing at a rapid pace today it is vital that we work on improving its management. Research has shown that the content present in online social networks may have significant influence on impressionable minds. If such platforms are misused, it will lead to negative consequences. Detecting insults or inappropriate messages continues to be one of the most challenging aspects of Online Social Networks (OSNs) today. We address this problem through a Machine Learning Based Soft Text Classifier approach using Support Vector Machine algorithm. The proposed system acts as a screening mechanism the alerts the user about such messages. The messages are classified according to their subject matter and each comment is labeled for the presence of profanity and insults.Keywords: machine learning, online social networks, soft text classifier, support vector machine
Procedia PDF Downloads 508508 Analyzing the Characteristics and Shifting Patterns of Creative Hubs in Bandung
Authors: Fajar Ajie Setiawan, Ratu Azima Mayangsari, Bunga Aprilia
Abstract:
The emergence of creative hubs around the world, including in Bandung, was primarily driven by the needs of collaborative-innovative spaces for creative industry activities such as the Maker Movement and the Coworking Movement. These activities pose challenges for identification and formulation of sets of indicators for modeling creative hubs in Bandung to help stakeholders in formulating strategies. This study intends to identify their characteristics. This research was conducted using a qualitative approach comparing three concepts of creative hub categorization and integrating them into a single instrument to analyze 12 selected creative hubs. Our results showed three new functions of creative hubs in Bandung: (1) cultural, (2) retail business, and (3) community network. Results also suggest that creative hubs in Bandung are commonly established for networking and community activities. Another result shows that there was a shifting pattern of creative hubs before the 2000s and after the 2000s, which also creates a hybrid group of creative hubs.Keywords: creative industry, creative hubs, Ngariung, Bandung
Procedia PDF Downloads 177507 Analysis of Decentralized on Demand Cross Layer in Cognitive Radio Ad Hoc Network
Authors: A. Sri Janani, K. Immanuel Arokia James
Abstract:
Cognitive radio ad hoc networks different unlicensed users may acquire different available channel sets. This non-uniform spectrum availability imposes special design challenges for broadcasting in CR ad hoc networks. Cognitive radio automatically detects available channels in wireless spectrum. This is a form of dynamic spectrum management. Cross-layer optimization is proposed, using this can allow far away secondary users can also involve into channel work. So it can increase the throughput and it will overcome the collision and time delay.Keywords: cognitive radio, cross layer optimization, CR mesh network, heterogeneous spectrum, mesh topology, random routing optimization technique
Procedia PDF Downloads 359506 The Impact of Varying the Detector and Modulation Types on Inter Satellite Link (ISL) Realizing the Allowable High Data Rate
Authors: Asmaa Zaki M., Ahmed Abd El Aziz, Heba A. Fayed, Moustafa H. Aly
Abstract:
ISLs are the most popular choice for deep space communications because these links are attractive alternatives to present day microwave links. This paper explored the allowable high data rate in this link over different orbits, which is affected by variation in modulation scheme and detector type. Moreover, the objective of this paper is to optimize and analyze the performance of ISL in terms of Q-factor and Minimum Bit Error Rate (Min-BER) based on different detectors comprising some parameters.Keywords: free space optics (FSO), field of view (FOV), inter satellite link (ISL), optical wireless communication (OWC)
Procedia PDF Downloads 395505 Description of a Structural Health Monitoring and Control System Using Open Building Information Modeling
Authors: Wahhaj Ahmed Farooqi, Bilal Ahmad, Sandra Maritza Zambrano Bernal
Abstract:
In view of structural engineering, monitoring of structural responses over time is of great importance with respect to recent developments of construction technologies. Recently, developments of advanced computing tools have enabled researcher’s better execution of structural health monitoring (SHM) and control systems. In the last decade, building information modeling (BIM) has substantially enhanced the workflow of planning and operating engineering structures. Typically, building information can be stored and exchanged via model files that are based on the Industry Foundation Classes (IFC) standard. In this study a modeling approach for semantic modeling of SHM and control systems is integrated into the BIM methodology using the IFC standard. For validation of the modeling approach, a laboratory test structure, a four-story shear frame structure, is modeled using a conventional BIM software tool. An IFC schema extension is applied to describe information related to monitoring and control of a prototype SHM and control system installed on the laboratory test structure. The SHM and control system is described by a semantic model applying Unified Modeling Language (UML). Subsequently, the semantic model is mapped into the IFC schema. The test structure is composed of four aluminum slabs and plate-to-column connections are fully fixed. In the center of the top story, semi-active tuned liquid column damper (TLCD) is installed. The TLCD is used to reduce effects of structural responses in context of dynamic vibration and displacement. The wireless prototype SHM and control system is composed of wireless sensor nodes. For testing the SHM and control system, acceleration response is automatically recorded by the sensor nodes equipped with accelerometers and analyzed using embedded computing. As a result, SHM and control systems can be described within open BIM, dynamic responses and information of damages can be stored, documented, and exchanged on the formal basis of the IFC standard.Keywords: structural health monitoring, open building information modeling, industry foundation classes, unified modeling language, semi-active tuned liquid column damper, nondestructive testing
Procedia PDF Downloads 151504 Social Media, Society, and Criminal Victimization: A Qualitative Study on University Students of Bangladesh
Authors: Md. Tawohidul Haque
Abstract:
The main objective of this study is to explore the nature, types and, causes of the involvement of criminal activities of the university students using social media namely Social Networking Sites (SNS). The evidence shows that the students have greater chance to involve such criminal activities during sharing their personal messages, photos, and even sharing their academic works. Used qualitative case studies with six students from two universities, this study provides a detail information about the processes how this media provokes the students to commit to the criminal activities such as unethical pose, naked picture, post against persona’s prestige and dignity as well as social position, phone call at midnight, personal threats, sexual offer, kidnapping attitude, and so on. This finding would be an important guideline for the media persons, policy makers, restorative justice, and human rights workers.Keywords: social media, criminal victimization, human gathering scheme, social code of ethics
Procedia PDF Downloads 155503 A POX Controller Module to Prepare a List of Flow Header Information Extracted from SDN Traffic
Authors: Wisam H. Muragaa, Kamaruzzaman Seman, Mohd Fadzli Marhusin
Abstract:
Software Defined Networking (SDN) is a paradigm designed to facilitate the way of controlling the network dynamically and with more agility. Network traffic is a set of flows, each of which contains a set of packets. In SDN, a matching process is performed on every packet coming to the network in the SDN switch. Only the headers of the new packets will be forwarded to the SDN controller. In terminology, the flow header fields are called tuples. Basically, these tuples are 5-tuple: the source and destination IP addresses, source and destination ports, and protocol number. This flow information is used to provide an overview of the network traffic. Our module is meant to extract this 5-tuple with the packets and flows numbers and show them as a list. Therefore, this list can be used as a first step in the way of detecting the DDoS attack. Thus, this module can be considered as the beginning stage of any flow-based DDoS detection method.Keywords: matching, OpenFlow tables, POX controller, SDN, table-miss
Procedia PDF Downloads 199502 Collision Theory Based Sentiment Detection Using Discourse Analysis in Hadoop
Authors: Anuta Mukherjee, Saswati Mukherjee
Abstract:
Data is growing everyday. Social networking sites such as Twitter are becoming an integral part of our daily lives, contributing a large increase in the growth of data. It is a rich source especially for sentiment detection or mining since people often express honest opinion through tweets. However, although sentiment analysis is a well-researched topic in text, this analysis using Twitter data poses additional challenges since these are unstructured data with abbreviations and without a strict grammatical correctness. We have employed collision theory to achieve sentiment analysis in Twitter data. We have also incorporated discourse analysis in the collision theory based model to detect accurate sentiment from tweets. We have also used the retweet field to assign weights to certain tweets and obtained the overall weightage of a topic provided in the form of a query. Hadoop has been exploited for speed. Our experiments show effective results.Keywords: sentiment analysis, twitter, collision theory, discourse analysis
Procedia PDF Downloads 535501 The Impact of Artificial Intelligence on E-Learning
Authors: Sameil Hanna Samweil Botros
Abstract:
The variation of social networking websites inside higher training has garnered enormous hobby in recent years, with numerous researchers thinking about it as a possible shift from the conventional lecture room-based learning paradigm. However, this boom in research and carried out research, but the adaption of SNS-based modules has not proliferated inside universities. This paper commences its contribution with the aid of studying the numerous fashions and theories proposed in the literature and amalgamates together various effective aspects for the inclusion of social technology within e-gaining knowledge. A three-phased framework is similarly proposed, which informs the important concerns for the hit edition of SNS in improving the student's mastering experience. This suggestion outlines the theoretical foundations as a way to be analyzed in sensible implementation across worldwide university campuses.Keywords: eLearning, institutionalization, teaching and learning, transformation vtuber, ray tracing, avatar agriculture, adaptive, e-learning, technology eLearning, higher education, social network sites, student learning
Procedia PDF Downloads 25500 Smart Irrigation Systems and Website: Based Platform for Farmer Welfare
Authors: Anusha Jain, Santosh Vishwanathan, Praveen K. Gupta, Shwetha S., Kavitha S. N.
Abstract:
Agriculture has a major impact on the Indian economy, with the highest employment ratio than any sector of the country. Currently, most of the traditional agricultural practices and farming methods are manual, which results in farmers not realizing their maximum productivity often due to increasing in labour cost, inefficient use of water sources leading to wastage of water, inadequate soil moisture content, subsequently leading to food insecurity of the country. This research paper aims to solve this problem by developing a full-fledged web application-based platform that has the capacity to associate itself with a Microcontroller-based Automated Irrigation System which schedules the irrigation of crops based on real-time soil moisture content employing soil moisture sensors centric to the crop’s requirements using WSN (Wireless Sensor Networks) and M2M (Machine To Machine Communication) concepts, thus optimizing the use of the available limited water resource, thereby maximizing the crop yield. This robust automated irrigation system provides end-to-end automation of Irrigation of crops at any circumstances such as droughts, irregular rainfall patterns, extreme weather conditions, etc. This platform will also be capable of achieving a nationwide united farming community and ensuring the welfare of farmers. This platform is designed to equip farmers with prerequisite knowledge on tech and the latest farming practices in general. In order to achieve this, the MailChimp mailing service is used through which interested farmers/individuals' email id will be recorded and curated articles on innovations in the world of agriculture will be provided to the farmers via e-mail. In this proposed system, service is enabled on the platform where nearby crop vendors will be able to enter their pickup locations, accepted prices and other relevant information. This will enable farmers to choose their vendors wisely. Along with this, we have created a blogging service that will enable farmers and agricultural enthusiasts to share experiences, helpful knowledge, hardships, etc., with the entire farming community. These are some of the many features that the platform has to offer.Keywords: WSN (wireless sensor networks), M2M (M/C to M/C communication), automation, irrigation system, sustainability, SAAS (software as a service), soil moisture sensor
Procedia PDF Downloads 129499 An Earth Mover’s Distance Algorithm Based DDoS Detection Mechanism in SDN
Authors: Yang Zhou, Kangfeng Zheng, Wei Ni, Ren Ping Liu
Abstract:
Software-defined networking (SDN) provides a solution for scalable network framework with decoupled control and data plane. However, this architecture also induces a particular distributed denial-of-service (DDoS) attack that can affect or even overwhelm the SDN network. DDoS attack detection problem has to date been mostly researched as entropy comparison problem. However, this problem lacks the utilization of SDN, and the results are not accurate. In this paper, we propose a DDoS attack detection method, which interprets DDoS detection as a signature matching problem and is formulated as Earth Mover’s Distance (EMD) model. Considering the feasibility and accuracy, we further propose to define the cost function of EMD to be a generalized Kullback-Leibler divergence. Simulation results show that our proposed method can detect DDoS attacks by comparing EMD values with the ones computed in the case without attacks. Moreover, our method can significantly increase the true positive rate of detection.Keywords: DDoS detection, EMD, relative entropy, SDN
Procedia PDF Downloads 337498 Design of a Rectifier with Enhanced Efficiency and a High-gain Antenna for Integrated and Compact-size Rectenna Circuit
Authors: Rawaa Maher, Ahmed Allam, Haruichi Kanaya, Adel B. Abdelrahman
Abstract:
In this paper, a compact, high-efficiency integrated rectenna is presented to operate in the 2.45 GHz band. A comparison between two rectifier topologies is performed to verify the benefits of removing the matching network from the rectifier. A rectifier high conversion efficiency of 74.1% is achieved. To complete the rectenna system, a novel omnidirectional antenna with high gain (3.72 dB) and compact size (25 mm * 29 mm) is designed and fabricated. The same antenna is used with a reflector for raising the gain to nearly 8.3 dB. The simulation and measurement results of the antenna are in good agreement.Keywords: internet of things, integrated rectenna, rectenna, RF energy harvesting, wireless sensor networks(WSN)
Procedia PDF Downloads 182497 Magnetomechanical Effects on MnZn Ferrites
Authors: Ibrahim Ellithy, Mauricio Esguerra, , Rewanth Radhakrishnan
Abstract:
In this study, the effects of hydrostatic stress on the magnetic properties of MnZn ferrite rings of different power grades, were measured and analyzed in terms of the magneto-mechanical effect on core losses was modeled via the Hodgdon-Esguerra hysteresis model. The results show excellent agreement with the model and a correlation between the permeability drop and the core loss increase in dependence of the material grade properties. These results emphasize the vulnerabilities of MnZn ferrites when subjected to mechanical perturbations, especially in real-world scenarios like under-road embedding for WPT.Keywords: hydrostatic stress, power ferrites, core losses, wireless power transfer
Procedia PDF Downloads 70496 Smart Helmet for Two-Wheelers
Authors: Ravi Nandu, Kuldeep Singh
Abstract:
A helmet is a protective layer that is worn in order to prevent head injury. Helmet is the most important safety gear for two wheeler riders. However, due to carelessness of people, less importance toward safety, lot of causalities is every year. According to National Crime Records Bureau (NCRB) two wheelers claimed 92 lives every day out of which most were due to helmetless drive. The system design will be such that without wearing the helmet the rider cannot start two wheelers. The helmet will be connected to vehicle key ignition systems which will be electronically controlled. The smart helmet will be having proximity sensor fitted inside it, which will act as our switch for ignition and further with wireless connection the helmet sensor circuit will be connected to the vehicle ignition system.Keywords: helmet, proximity sensor, microcontroller, head injury
Procedia PDF Downloads 311495 Low Power, Highly Linear, Wideband LNA in Wireless SOC
Authors: Amir Mahdavi
Abstract:
In this paper a highly linear CMOS low noise amplifier (LNA) for ultra-wideband (UWB) applications is proposed. The proposed LNA uses a linearization technique to improve second and third-order intercept points (IIP3). The linearity is cured by repealing the common-mode section of all intermodulation components from the cascade topology current with optimization of biasing current use symmetrical and asymmetrical circuits for biasing. Simulation results show that maximum gain and noise figure are 6.9dB and 3.03-4.1dB over a 3.1–10.6 GHz, respectively. Power consumption of the LNA core and IIP3 are 2.64 mW and +4.9dBm respectively. The wideband input impedance matching of LNA is obtained by employing a degenerating inductor (|S11|<-9.1 dB). The circuit proposed UWB LNA is implemented using 0.18 μm based CMOS technology.Keywords: highly linear LNA, low-power LNA, optimal bias techniques
Procedia PDF Downloads 280494 Performance of LTE Multicast Systems in the Presence of the Colored Noise Jamming
Authors: S. Malisuwan, J. Sivaraks, N. Madan, N. Suriyakrai
Abstract:
The ever going evolution of advanced wireless technologies makes it financially impossible for military operations to completely manufacture their own equipment. Therefore, Commercial-Off-The-Shelf (COTS) and Modified-Off-The-Shelf (MOTS) are being considered in military mission with low-cost modifications. In this paper, we focus on the LTE multicast systems for military communication systems under tactical environments with jamming condition. We examine the influence of the colored noise jamming on the performance of the LTE multicast systems in terms of the average throughput. The simulation results demonstrate the degradation of the average throughput for different dynamic ranges of the colored noise jamming versus average SNR.Keywords: performance, LTE, multicast, jamming, throughput
Procedia PDF Downloads 417493 Fault Diagnosis in Confined Systems
Authors: Nesrine Berber, Hafid Haffaf, Abdel Madjid Meghabar
Abstract:
In the last decade, technology has continued to grow and has changed the structure of our society. Today, new technologies including the information and communication (ICT) play a main role which importance continues to grow, now it's become indispensable to the economic, social and cultural. Thus, ICT technology has proven to be as a promising intervention in the area of road transport. The supervision model of class of train of intelligent and autonomous vehicles leads us to give some defintions about IAV and the different technologies used for communication between them. Our aim in this work is to present an hypergraph modeling a class of train of Intelligent and Autonomous Vehicles (IAV).Keywords: intelligent transportation system, intelligent autonomous vehicles, Ad Hoc network, wireless technologies, hypergraph modeling, supervision
Procedia PDF Downloads 546492 Development and Range Testing of a LoRaWAN System in an Urban Environment
Authors: N. R. Harris, J. Curry
Abstract:
This paper describes the construction and operation of an experimental LoRaWAN network surrounding the University of Southampton in the United Kingdom. Following successful installation, an experimental node design is built and characterised, with particular emphasis on radio range. Several configurations are investigated, including different data rates, and varying heights of node. It is concluded that although range can be great (over 8 km in this case), environmental topology is critical. However, shorter range implementations, up to about 2 km in an urban environment, are relatively insensitive although care is still needed. The example node and the relatively simple base station reported demonstrate that LoraWan can be a very low cost and practical solution to Internet of Things type applications for distributed monitoring systems with sensors spread over distances of several km.Keywords: long-range, wireless, sensor, network
Procedia PDF Downloads 137491 The Study of Security Techniques on Information System for Decision Making
Authors: Tejinder Singh
Abstract:
Information system is the flow of data from different levels to different directions for decision making and data operations in information system (IS). Data can be violated by different manner like manual or technical errors, data tampering or loss of integrity. Security system called firewall of IS is effected by such type of violations. The flow of data among various levels of Information System is done by networking system. The flow of data on network is in form of packets or frames. To protect these packets from unauthorized access, virus attacks, and to maintain the integrity level, network security is an important factor. To protect the data to get pirated, various security techniques are used. This paper represents the various security techniques and signifies different harmful attacks with the help of detailed data analysis. This paper will be beneficial for the organizations to make the system more secure, effective, and beneficial for future decisions making.Keywords: information systems, data integrity, TCP/IP network, vulnerability, decision, data
Procedia PDF Downloads 307490 An Analysis of Privacy and Security for Internet of Things Applications
Authors: Dhananjay Singh, M. Abdullah-Al-Wadud
Abstract:
The Internet of Things is a concept of a large scale ecosystem of wireless actuators. The actuators are defined as things in the IoT, those which contribute or produces some data to the ecosystem. However, ubiquitous data collection, data security, privacy preserving, large volume data processing, and intelligent analytics are some of the key challenges into the IoT technologies. In order to solve the security requirements, challenges and threats in the IoT, we have discussed a message authentication mechanism for IoT applications. Finally, we have discussed data encryption mechanism for messages authentication before propagating into IoT networks.Keywords: Internet of Things (IoT), message authentication, privacy, security
Procedia PDF Downloads 382489 Local Community's Response on Post-Disaster and Role of Social Capital towards Recovery Process: A Case Study of Kaminani Community in Bhaktapur Municipality after 2015 Gorkha Nepal Earthquake
Authors: Lata Shakya, Toshio Otsuki, Saori Imoto, Bijaya Krishna Shrestha, Umesh Bahadur Malla
Abstract:
2015 Gorkha Nepal earthquake have damaged the human settlements in 14 districts of Nepal. Historic core areas of three principal cities namely Kathmandu, Lalitpur and Bhaktapur including numerous traditional ‘newari’ settlements in the peripheral areas have been either collapsed or severely damaged. Despite Government of Nepal and (international) non-government organisations’ attempt towards disaster risk management through the preparation of policies and guidelines and implementation of community-based activities, the recent ‘Gorkha’ earthquake has demonstrated the inadequate preparedness, poor implementation of a legal instrument, resource constraints, and managerial weakness. However, the social capital through community based institutions, self-help attitude, and community bond has helped a lot not only in rescue and relief operation but also in a post-disaster temporary shelter living thereby exhibiting the resilient power of the local community. Conducting a detailed case study of ‘Kaminani’ community with 42 houses at ward no. 16 of Bhaktapur municipality, this paper analyses the local community’s response and activities on the Gorkha earthquake in rescue and relief operation as well as in post disaster work. Leadership, the existence of internal/external aid, physical and human support are also analyzed. Social resource and networking are also explained through critical review of the existing community organisation and their activities. The research methodology includes literature review, field survey, and interview with community leaders and residents based on a semi-structured questionnaire. The study reveals that community carried their recovery process in four different phases: (i) management of emergency evacuation, (ii) constructing community owed temporary shelter for individuals, (iii) demolishing upper floors of the damaged houses, and (iv) planning for collaborative housing reconstruction. As territorial based organization, religion based agency and aim based institution exist in the survey area from pre-disaster time, it can be assumed that the community activists including leaders are well experienced to create aim-based group and manage teamwork to deal with various issues and problems collaboratively. Physical and human support including partial financial aid from external source as a result of community leader’s personal networking is extended to the community members. Thus, human/social resource and personal/social network play a crucial role in the recovery process. And to build such social capital, community should have potential from pre-disaster time.Keywords: Gorkha Nepal earthquake, local community, recovery process, social resource, social network
Procedia PDF Downloads 255488 Concept and Design of a Biomimetic Single-Wing Micro Aerial Vehicle (MAV)
Authors: S. Thomas, D. Ho, A. Kerroux, L. Lixi, N. Rackham, S. Rosenfeld
Abstract:
In this first paper, the different concepts and designs to build a single-wing MAV are discussed. Six scratch-building prototypes using three different designs have been tested regarding sufficient lift and weight distribution, of which various configurations were explored. Samare prototypes achieved wireless control over the motor and flap whilst obtaining data from the IMU, though obtaining an increase in lift was the key issue due to insufficient thrust. The final prototype was able to demonstrate an improvement in weight distribution.Keywords: SAMARE, micro aerial vehicle (MAV), unmanned aerial vehicle (UAV), mono-copter, single-wing, mono-wing, flight control, aerofoil, lift
Procedia PDF Downloads 454