Search results for: crisis communications
1118 WormHex: Evidence Retrieval Tool of Social Media from Volatile Memory
Authors: Norah Almubairik, Wadha Almattar, Amani Alqarni
Abstract:
Social media applications are increasingly being used in our everyday communications. These applications utilise end-to-end encryption mechanisms, which make them suitable tools for criminals to exchange messages. These messages are preserved in the volatile memory until the device is restarted. Therefore, volatile forensics has become an important branch of digital forensics. In this study, the WormHex tool was developed to inspect the memory dump files of Windows and Mac-based workstations. The tool supports digital investigators to extract valuable data written in Arabic and English through web-based WhatsApp and Twitter applications. The results verify that social media applications write their data into the memory regardless of the operating system running the application, with there being no major differences between Windows and Mac.Keywords: volatile memory, REGEX, digital forensics, memory acquisition
Procedia PDF Downloads 1911117 Act East Policy and the Politics of the Non-Recognized Thai-Indian Diasporic Community in Thailand
Authors: Ruchi Agarwal
Abstract:
The Indian diaspora in Thailand is as ethnically diverse as any other country. Although a relatively small community, the Indian diaspora has long established its roots, some with their fifth generation now living in Thailand. The community has a solid social and economic standing recognized by the host country but lacks connections with its ethnic roots in the home country. The biggest dilemma faced by the younger generation of the Indian diasporic community is the identity crisis. Regardless of being born and brought up in Thailand and possessing Thai citizenship, they do not get recognition as Thais by their Thai counterparts. However, with the Act Asia Policy of the Indian government, there has been an increase in social and political activities organized by old and new Indian associations, bringing new hopes of recognizing the Thai-Indian diasporic community.Keywords: Indian, Thailand, diaspora, Act East Policy, Thai
Procedia PDF Downloads 1521116 The Study of Digital Transformation Skills and Competencies Framework at Umm Alqura University
Authors: Anod H. Alhazmi, Hanaa A. Yamani
Abstract:
The lack of digital transformation professionals could prevent Saudi Arabia’s universities from providing digital services. The task of understanding what digital skills are needed within an organization, measuring the existing skills, and developing or attracting talents is a complex task. This paper provides a comprehensive analysis of the digital transformation skills needed in the organizations who seek digital transformation and identifies the skills and competencies framework DigSC built on Skills Framework for the Informational Age (SFIA) framework that is adopted by the Ministry of Communications and Information Technology (MCIT) in Saudi Arabia. The framework adopted identifies the main digital transformation skills clusters, categories and levels of responsibilities for each job description to fill the gap between this requirement and the digital skills supplied by the Umm Alqura University (UQU).Keywords: competencies, digital transformation, framework, skills, Umm Alqura university
Procedia PDF Downloads 1871115 Risk, Capital Buffers, and Bank Lending: The Adjustment of Euro Area Banks
Authors: Laurent Maurin, Mervi Toivanen
Abstract:
This paper estimates euro area banks’ internal target capital ratios and investigates whether banks’ adjustment to the targets have an impact on credit supply and holding of securities during the financial crisis in 2005-2011. Using data on listed banks and country-specific macro-variables a partial adjustment model is estimated in a panel context. The results indicate, firstly, that an increase in the riskiness of banks’ balance sheets influences positively on the target capital ratios. Secondly, the adjustment towards higher equilibrium capital ratios has a significant impact on banks’ assets. The impact is found to be more size-able on security holdings than on loans, thereby suggesting a pecking order.Keywords: Euro area, capital ratios, credit supply, partial adjustment model
Procedia PDF Downloads 4481114 A Qualitative Approach to Engineering Design Issues, Problems, and Solutions
Authors: M. U. Arshid, M. A. Kamal
Abstract:
The engineering design process is the activities formulation, to help an engineer raising a plan with a specified goal and performance. The engineering design process is a multi-stage course of action including the conceptualization, research, feasibility studies, establishment of design parameters, preliminary and finally the detailed design. It is a progression from the abstract to the concrete; starting with probably abstract ideas about need, and thereafter elaborating detailed specifications of the object that would satisfy the needs, identified. Engineering design issues, problems, and solutions are discussed in this paper using qualitative approach from an information structure perspective. The objective is to identify the problems, to analyze them and propose solutions by integrating; innovation, practical experience, time and resource management, communications skills, isolating the problem in coordination with all stakeholders. Consequently, this would be beneficial for the engineering community to improve the Engineering design practices.Keywords: engineering design, engineering design issues, innovation, public sector projects
Procedia PDF Downloads 3461113 An Adaptive Cooperative Scheme for Reliability of Transmission Using STBC and CDD in Wireless Communications
Authors: Hyun-Jun Shin, Jae-Jeong Kim, Hyoung-Kyu Song
Abstract:
In broadcasting and cellular system, a cooperative scheme is proposed for the improvement of performance of bit error rate. Up to date, the coverage of broadcasting system coexists with the coverage of cellular system. Therefore each user in a cellular coverage is frequently involved in a broadcasting coverage. The proposed cooperative scheme is derived from the shared areas. The users receive signals from both broadcasting base station and cellular base station. The proposed scheme selects a cellular base station of a worse channel to achieve better performance of bit error rate in cooperation. The performance of the proposed scheme is evaluated in fading channel.Keywords: cooperative communication, diversity, STBC, CDD, channel condition, broadcasting system, cellular system
Procedia PDF Downloads 5091112 Software Quality Assurance in Network Security using Cryptographic Techniques
Authors: Sidra Shabbir, Ayesha Manzoor, Mehreen Sirshar
Abstract:
The use of the network communication has imposed serious threats to the security of assets over the network. Network security is getting more prone to active and passive attacks which may result in serious consequences to data integrity, confidentiality and availability. Various cryptographic techniques have been proposed in the past few years to combat with the concerned problem by ensuring quality but in order to have a fully secured network; a framework of new cryptosystem was needed. This paper discusses certain cryptographic techniques which have shown far better improvement in the network security with enhanced quality assurance. The scope of this research paper is to cover the security pitfalls in the current systems and their possible solutions based on the new cryptosystems. The development of new cryptosystem framework has paved a new way to the widespread network communications with enhanced quality in network security.Keywords: cryptography, network security, encryption, decryption, integrity, confidentiality, security algorithms, elliptic curve cryptography
Procedia PDF Downloads 7331111 Indo-US Strategic Collaboration in Space Capabilities and its Effect on the Stability of South Asian Region
Authors: Shahab Khan, Damiya Saghir
Abstract:
With the advent of space technology, a new era began where space, considered the new ‘High ground,’ is used for a variety of commercial (communications, weather and navigational information, Earth resources monitoring and imagery) and military applications (surveillance, tracking, reconnaissance and espionage of adversaries). With the ever-evolving geo-political environment, where now the US foreseeing India as a counterbalance to China’s economic and military rise, significant growth in strategic collaboration between US and India has been witnessed, particularly in the space domain. This is creating a strategic imbalance in South Asia with implications for all regional countries. This research explores the present and future of Indo-US strategic collaboration in the space domain with envisaged effects and challenges for countries in the South Asian region.Keywords: space, satellites, Indo-US strategic agreements in space domain, balance of power in South Asian region
Procedia PDF Downloads 1291110 Management Pattern for Service Sector in Samut Songkram by Sufficient Economy Approach
Authors: Krisada Sungkhamanee
Abstract:
The objectives of this research are to search the management pattern of one district lodging entrepreneurs by sufficient economy ways, to know the constrains that affects this sector and design fit arrangement shape to sustain their business with Samut Songkram style. What will happen if they do not use this approach? Will they have a monetary crisis? The data and information are collected by informal discussions with 8 managers and 400 questionnaires. A mixed methods of both qualitative research and quantitative research are used and Bent Flyvbjerg’s phronesis is utilized for this analysis. Our paper will prove that sufficient economy can help small business firms to solve their problems. We think that the results of our research will be a financial pattern to solve many problems of the entrepreneurs and this way will can be a super model for other provinces of Thailand.Keywords: Samut Songkram, service sector, sufficient economy, management pattern
Procedia PDF Downloads 3651109 The Use of Simulation Programs of Leakage of Harmful Substances for Crisis Management
Authors: Jiří Barta
Abstract:
The paper deals with simulation programs of spread of harmful substances. Air pollution has a direct impact on the quality of human life and environmental protection is currently a very hot topic. Therefore, the paper focuses on the simulation of release of harmful substances. The first part of article deals with perspectives and possibilities of implementation outputs of simulations programs into the system which is education and of practical training of the management staff during emergency events in the frame of critical infrastructure. The last part shows the practical testing and evaluation of simulation programs. Of the tested simulations software been selected Symos97. The tool offers advanced features for setting leakage. Gradually allows the user to model the terrain, location, and method of escape of harmful substances.Keywords: Computer Simulation, Symos97, Spread, Simulation Software, Harmful Substances
Procedia PDF Downloads 2991108 A Paradigm Shift in Energy Policy and Use: Exergy and Hybrid Renewable Energy Technologies
Authors: Adavbiele Airewe Stephen
Abstract:
Sustainable energy use is exploiting energy resources within acceptable levels of global resource depletion without destroying the ecological balance of an area. In the context of sustainability, the rush to quell the energy crisis of the fossil fuels of the 1970's by embarking on nuclear energy technology has now been seen as a disaster. In the circumstance, action (policy) suggested in this study to avoid future occurrence is exergy maximization/entropy generation minimization and the use is renewable energy technologies that are hybrid based. Thirty-two (32) selected hybrid renewable energy technologies were assessed with respect to their energetic efficiencies and entropy generation. The results indicated that determining which of the hybrid technologies is the most efficient process and sustainable is a matter of defining efficiency and knowing which of them possesses the minimum entropy generation.Keywords: entropy, exergy, hybrid renewable energy technologies, sustainability
Procedia PDF Downloads 4451107 Managerial Risk-Taking: Evidences from the Tourism Industry
Authors: Min-Ming Wen
Abstract:
Applying the U.S. lodging and tourism industry as a research sample, we examine the relation between the corporate governance structure and managerial risk-taking behavior. In light of the global financial crisis, the importance of effective governance structures is essential in protecting claimholder interests. We propose a governance structure consisting of shareholder governance measured by anti-takeover provisions to examine whether the governance structure has a significant impact on managerial risk-taking behaviors in terms of the investment policy. We will use capital expenditure and R&D investment to measure managerial risk-taking and the firm’s investment policy. In addition, we will examine whether the effects of governance on investment policy differ significantly between speculative and investment-grade firms.Keywords: corporate governance, risk-taking, firm value, lodging industry
Procedia PDF Downloads 6161106 Logic of the Prospect Theory: The Decision Making Process of the First Gulf War and the Crimean Annexation
Authors: Zhengyang Ma, Zhiyao Li, Jiayi Zhang
Abstract:
This article examines the prospect theory’s arguments about decision-making through two case studies, the First Gulf War and Russia’s annexation of Crimea. The article uses the methods of comparative case analysis and process tracing to investigate the prospect theory’s fundamental arguments. Through evidence derived from existing primary and secondary sources, this paper argues that both former U.S. President Bush and Russian President Putin viewed their situations as a domain of loss and made risky decisions to prevent further deterioration, which attests the arguments of the prospect theory. After the two case studies, this article also discusses how the prospect theory could be used in analyzing the decision-making process that led to the current Russia-Ukraine War.Keywords: the prospect theory, international relations, the first gulf war, the crimea crisis
Procedia PDF Downloads 1251105 Reasons and Implications of the Use of Social Media by Kuwaiti Women
Authors: Bashayer Alsana
Abstract:
Communication technologies are changing the way we experience life. More specifically, such technologies have changed the interaction system through which women express themselves. Interaction with the other gender, accessibility to useful content, and creative public expression are but a few facets of the new living experience now being offered to women through the use of technology, especially in areas where females are bounded by societal taboos and traditions. An evaluation of the new female experience of expressing themselves through technology is yet to be done. This study aims to fill the void of research conducted around that topic. The study explores women’s use of communication technologies in Kuwait in terms of reasons and effects. women’s responses to survey questions present an overview of the new and changing female experience in this traditional middle eastern country, and draws a framework through which implications and suggestions for future research are discussed to better serve the advancement of women in developing countries.Keywords: communications, kuwait, social media, women
Procedia PDF Downloads 2981104 A Discourse Analysis of Syrian Refugee Representations in Canadian News Media
Authors: Pamela Aimee Rigor
Abstract:
This study aims to examine the representation of Syrian refugees resettled in Vancouver and the Lower Mainland in local community and major newspapers. While there is strong support for immigration in Canada, public opinion towards refugees and asylum seekers is a bit more varied. Concerns about the legitimacy of refugee claims are among the common concerns of Canadians, and hateful or negative narratives are still present in Canadian media discourse which affects how people view refugees. To counter the narratives, these Syrian refugees must publicly declare how grateful they are because they are resettled in Canada. The dominant media discourse is that these refugees should be grateful as they have been graciously accepted by Canada and Canadians, once again upholding the image of Canada being a generous and humanitarian nation. The study examined the representation of Syrian refugees and the Syrian refugee resettlement in Canadian newspapers from September 2015 to October 2017 – around the time Prime Minister Trudeau came into power up until the present. Using a combination of content and discourse analysis, it aimed to uncover how local community and major newspapers in Vancouver covered the Syrian refugee ‘crisis’ – more particularly, the arrival and resettlement of the refugees in the country. Using the qualitative data analysis software Nvivo 12, the newspapers were analyzed and sorted into themes. Based on the initial findings, the discourse of Canada being a humanitarian country and Canadians being generous, as well as the idea of Syrian refugees having to publicly announce how grateful they are, is still present in the local community newspapers. This seems to be done to counter the hateful narratives of citizens who might view them as people who are abusing help provided by the community or the services provided by the government. However, compared to the major and national newspapers in Canada, many these local community newspapers are very inclusive of Syrian refugee voices. Most of the News and Community articles interview Syrian refugees and ask them their personal stories of plight, survival, resettlement and starting a ‘new life’ in Canada. They are not seen as potential threats nor are they dismissed – the refugees were named and were allowed to share their personal experiences in these news articles. These community newspapers, even though their representations are far from perfect, actually address some aspects of the refugee resettlement issue and respond to their community’s needs. There are quite a number of news articles that announce community meetings and orientations about the Syrian refugee crisis, ways to help in the resettlement process, as well as community fundraising activities to help sponsor refugees or resettle newly arrived refugees. This study aims to promote awareness of how these individuals are socially constructed so we can, in turn, be aware of the certain biases and stereotypes present, and its implications on refugee laws and public response to the issue.Keywords: forced migration and conflict, media representations, race and multiculturalism, refugee studies
Procedia PDF Downloads 2501103 The Association of Southeast Asian Nations (ASEAN) and the Dynamics of Resistance to Sovereignty Violation: The Case of East Timor (1975-1999)
Authors: Laura Southgate
Abstract:
The Association of Southeast Asian Nations (ASEAN), as well as much of the scholarship on the organisation, celebrates its ability to uphold the principle of regional autonomy, understood as upholding the norm of non-intervention by external powers in regional affairs. Yet, in practice, this has been repeatedly violated. This dichotomy between rhetoric and practice suggests an interesting avenue for further study. The East Timor crisis (1975-1999) has been selected as a case-study to test the dynamics of ASEAN state resistance to sovereignty violation in two distinct timeframes: Indonesia’s initial invasion of the territory in 1975, and the ensuing humanitarian crisis in 1999 which resulted in a UN-mandated, Australian-led peacekeeping intervention force. These time-periods demonstrate variation on the dependent variable. It is necessary to observe covariation in order to derive observations in support of a causal theory. To establish covariation, my independent variable is therefore a continuous variable characterised by variation in convergence of interest. Change of this variable should change the value of the dependent variable, thus establishing causal direction. This paper investigates the history of ASEAN’s relationship to the norm of non-intervention. It offers an alternative understanding of ASEAN’s history, written in terms of the relationship between a key ASEAN state, which I call a ‘vanguard state’, and selected external powers. This paper will consider when ASEAN resistance to sovereignty violation has succeeded, and when it has failed. It will contend that variation in outcomes associated with vanguard state resistance to sovereignty violation can be best explained by levels of interest convergence between the ASEAN vanguard state and designated external actors. Evidence will be provided to support the hypothesis that in 1999, ASEAN’s failure to resist violations to the sovereignty of Indonesia was a consequence of low interest convergence between Indonesia and the external powers. Conversely, in 1975, ASEAN’s ability to resist violations to the sovereignty of Indonesia was a consequence of high interest convergence between Indonesia and the external powers. As the vanguard state, Indonesia was able to apply pressure on the ASEAN states and obtain unanimous support for Indonesia’s East Timor policy in 1975 and 1999. However, the key factor explaining the variance in outcomes in both time periods resides in the critical role played by external actors. This view represents a serious challenge to much of the existing scholarship that emphasises ASEAN’s ability to defend regional autonomy. As these cases attempt to show, ASEAN autonomy is much more contingent than portrayed in the existing literature.Keywords: ASEAN, east timor, intervention, sovereignty
Procedia PDF Downloads 3581102 Detection of New Attacks on Ubiquitous Services in Cloud Computing and Countermeasures
Authors: L. Sellami, D. Idoughi, P. F. Tiako
Abstract:
Cloud computing provides infrastructure to the enterprise through the Internet allowing access to cloud services at anytime and anywhere. This pervasive aspect of the services, the distributed nature of data and the wide use of information make cloud computing vulnerable to intrusions that violate the security of the cloud. This requires the use of security mechanisms to detect malicious behavior in network communications and hosts such as intrusion detection systems (IDS). In this article, we focus on the detection of intrusion into the cloud sing IDSs. We base ourselves on client authentication in the computing cloud. This technique allows to detect the abnormal use of ubiquitous service and prevents the intrusion of cloud computing. This is an approach based on client authentication data. Our IDS provides intrusion detection inside and outside cloud computing network. It is a double protection approach: The security user node and the global security cloud computing.Keywords: cloud computing, intrusion detection system, privacy, trust
Procedia PDF Downloads 3231101 Improved Performance of Cooperative Scheme in the Cellular and Broadcasting System
Authors: Hyun-Jee Yang, Bit-Na Kwon, Yong-Jun Kim, Hyoung-Kyu Song
Abstract:
In the cooperative transmission scheme, both the cellular system and broadcasting system are composed. Two cellular base stations (CBSs) communicating with a user in the cell edge use cooperative transmission scheme in the conventional scheme. In the case that the distance between two CBSs and the user is distant, the conventional scheme does not guarantee the quality of the communication because the channel condition is bad. Therefore, if the distance between CBSs and a user is distant, the performance of the conventional scheme is decreased. Also, the bad channel condition has bad effects on the performance. The proposed scheme uses two relays to communicate well with CBSs when the channel condition between CBSs and the user is poor. Using the relay in the high attenuation environment can obtain both advantages of the high bit error rate (BER) and throughput performance.Keywords: cooperative communications, diversity gain, OFDM, interworking system
Procedia PDF Downloads 5761100 The Impact of India’s Centre-State Relations on its Maritime Counter-Terrorism Strategy
Authors: Riddhi Shah
Abstract:
Centre-state relations in India are a fascinating area of studies. The structure of the relationship has an effect on every single aspect of life as we know it in India. This paper is an attempt to study centre-state relations in the context of India’s maritime counter-terrorism strategy. Although the Government of India has not publicly stated its counter-terrorism strategy on the sea; intelligence, information sharing, crisis response, finances for internal security and the nation’s legislation for battling terrorism together comprise of India’s maritime-terrorism strategy. Through study of these areas, the paper argues that the centre-state divide has had systemic implications on India’s maritime security and has largely done more harm than good to collective initiatives that aspire to prevent future risk of terrorism from the sea or on the sea.Keywords: counter-terrorism, maritime terrorism, India, federalism, centre-state relations
Procedia PDF Downloads 6001099 Chaotic Control, Masking and Secure Communication Approach of Supply Chain Attractor
Authors: Unal Atakan Kahraman, Yilmaz Uyaroğlu
Abstract:
The chaotic signals generated by chaotic systems have some properties such as randomness, complexity and sensitive dependence on initial conditions, which make them particularly suitable for secure communications. Since the 1990s, the problem of secure communication, based on chaos synchronization, has been thoroughly investigated and many methods, for instance, robust and adaptive control approaches, have been proposed to realize the chaos synchronization. In this paper, an improved secure communication model is proposed based on control of supply chain management system. Control and masking communication simulation results are used to visualize the effectiveness of chaotic supply chain system also performed on the application of secure communication to the chaotic system. So, we discover the secure phenomenon of chaos-amplification in supply chain systemKeywords: chaotic analyze, control, secure communication, supply chain attractor
Procedia PDF Downloads 5171098 The Effect of Social Media Influencer on Boycott Participation through Attitude toward the Offending Country in a Situational Animosity Context
Authors: Hsing-Hua Stella Chang, Mong-Ching Lin, Cher-Min Fong
Abstract:
Using surrogate boycotts as a coercive tactic to force the offending party into changing its approaches has been increasingly significant over the last several decades, and is expected to increase in the future. Research shows that surrogate boycotts are often triggered by controversial international events, and particular foreign countries serve as the offending party in the international marketplace. In other words, multinational corporations are likely to become surrogate boycott targets in overseas markets because of the animosity between their home and host countries. Focusing on the surrogate boycott triggered by a severe situation animosity, this research aims to examine how social media influencers (SMIs) serving as electronic key opinion leaders (EKOLs) in an international crisis facilitate and organize a boycott, and persuade consumers to participate in the boycott. This research suggests that SMIs could be a particularly important information source in a surrogate boycott sparked by a situation of animosity. This research suggests that under such a context, SMIs become a critical information source for individuals to enhance and update their understanding of the event because, unlike traditional media, social media serve as a platform for instant and 24-hour non-stop information access and dissemination. The Xinjiang cotton event was adopted as the research context, which was viewed as an ongoing inter-country conflict, reflecting a crisis, which provokes animosity against the West. Through online panel services, both studies recruited Mainland Chinese nationals to be respondents to the surveys. The findings show that: 1. Social media influencer message is positively related to a negative attitude toward the offending country. 2. Attitude toward the offending country is positively related to boycotting participation. To address the unexplored question – of the effect of social media influencer influence on consumer participation in boycotts, this research presents a finer-grained examination of boycott motivation, with a special focus on a situational animosity context. This research is split into two interrelated parts. In the first part, this research shows that attitudes toward the offending country can be socially constructed by the influence of social media influencers in a situational animosity context. The study results show that consumers perceive different strengths of social pressure related to various levels of influencer messages and thus exhibit different levels of attitude toward the offending country. In the second part, this research further investigates the effect of attitude toward the offending country on boycott participation. The study findings show that such attitude exacerbated the effect of social media influencer messages on boycott participation in a situation of animosity.Keywords: animosity, social media marketing, boycott, attitude toward the offending country
Procedia PDF Downloads 1111097 Agent-Base Modeling of IoT Applications by Using Software Product Line
Authors: Asad Abbas, Muhammad Fezan Afzal, Muhammad Latif Anjum, Muhammad Azmat
Abstract:
The Internet of Things (IoT) is used to link up real objects that use the internet to interact. IoT applications allow handling and operating the equipment in accordance with environmental needs, such as transportation and healthcare. IoT devices are linked together via a number of agents that act as a middleman for communications. The operation of a heat sensor differs indoors and outside because agent applications work with environmental variables. In this article, we suggest using Software Product Line (SPL) to model IoT agents and applications' features on an XML-based basis. The contextual diversity within the same domain of application can be handled, and the reusability of features is increased by XML-based feature modelling. For the purpose of managing contextual variability, we have embraced XML for modelling IoT applications, agents, and internet-connected devices.Keywords: IoT agents, IoT applications, software product line, feature model, XML
Procedia PDF Downloads 941096 The Effect of Iran's Internet Filtering on Active Digital Marketing Businesses
Authors: Maryam Sheikhzadeh Noshabadi
Abstract:
There is no doubt that the Internet has connected the entire world. As a result of this flexible environment, virtual businesses have grown in importance and become one of the most important types of businesses. Although many governments use the internet and have free access to it, some are not happy with the free space and wide accessibility. As a result of recent events and civil protests in Iran, the country's government leaders have decided to once again cut off and filter its free and global Internet. Several issues were impacted by this decision; this includes the lives of businesses that were formed in virtual spaces platform. In this study, we explored the definitive impact of the Internet in Iran in September 1401, using semi-structured interviews with 20 digital marketing activists. This group was discussed in detail in terms of their financial and psychological damages. As a result of these conditions, this group has experienced a crisis of livelihood.Keywords: internet, Iran, filtering, digital marketing.
Procedia PDF Downloads 761095 Community Communications and Micro-Level Shifts: The Case of Video Volunteers’ IndiaUnheard Program
Authors: Pooja Ichplani, Archna Kumar, Jessica Mayberry
Abstract:
Community Video (CV) is a participatory medium that has immense potential to strengthen community communications and amplify the voice of people for their empowerment. By building capacities especially of marginalized community groups and providing a platform to freely voice their ideas, CV endeavours to bring about shifts towards more participatory, bottom up development processes and greater power in the hands of the people, especially the disadvantaged. In various parts of the world, among marginalized community groups, community video initiatives have become instrumental in facilitating micro-level, yet significant changes in communities. Video Volunteers (VV) is an organization that promotes community media and works towards providing disadvantaged communities with journalistic, critical thinking and creative skills they need for catalysing change in their communities. Working since 2002, VV has evolved a unique community media model fostering locally-owned and managed media production, as well as building people’s capacities to articulate and share their perspectives on the issues that matter to them – on a local and a global scale. Further, by integrating a livelihood aspect within its model, VV has actively involved people from poor marginalized communities and provided them a new tool for serving their communities whilst keeping their identities intact. This paper, based on a qualitative research, seeks to map the range of VV impacts in communities and provide an in-depth analysis of factors contributing to VV impacting change in communities. Study tools included content analysis of a longitudinal sample of impact videos produced, narratives of community correspondents using the Most Significant Change Technique (MSCT) and interviews with key informants. Using a multi-fold analysis, the paper seeks to gain holistic insights. At the first level, the paper profiles the Community Correspondents (CCs), spearheading change, and maps their personal and social context and their perceptions about VV in their personal lives. Secondly, at an organizational level, the paper maps the significance of impacts brought about in the CCs communities and their association, challenges and achievements while working with VV. Lastly, at the community level, it consists of analysis of the nature of impacts achieved and aspects influencing the same. Finally, the study critiques the functioning of Video Volunteers as a community media initiative using the tipping point theory emphasizing on the power of context that is constituted by their socio-cultural environment. It concludes how empowerment of its Community Correspondents, multifarious activities during pre and post video production, and other innovative mechanisms have enabled in center staging issues of marginalized communities and snowballing processes of change in communities.Keywords: community media, empowerment, participatory communication, social change
Procedia PDF Downloads 1371094 Experimental Investigation of On-Body Channel Modelling at 2.45 GHz
Authors: Hasliza A. Rahim, Fareq Malek, Nur A. M. Affendi, Azuwa Ali, Norshafinash Saudin, Latifah Mohamed
Abstract:
This paper presents the experimental investigation of on-body channel fading at 2.45 GHz considering two effects of the user body movement; stationary and mobile. A pair of body-worn antennas was utilized in this measurement campaign. A statistical analysis was performed by comparing the measured on-body path loss to five well-known distributions; lognormal, normal, Nakagami, Weibull and Rayleigh. The results showed that the average path loss of moving arm varied higher than the path loss in sitting position for upper-arm-to-left-chest link, up to 3.5 dB. The analysis also concluded that the Nakagami distribution provided the best fit for most of on-body static link path loss in standing still and sitting position, while the arm movement can be best described by log-normal distribution.Keywords: on-body channel communications, fading characteristics, statistical model, body movement
Procedia PDF Downloads 3551093 The Iraqi Fibre-to-the-Home Networks, Problems, Challenges, and Solutions along with Less Expense
Authors: Hasanein Hasan, Mohammed Al-Taie, Basil Shanshool, Khalaf Abd-Ali
Abstract:
This approach aims to deal with establishing and operating Iraqi Fibre-To-The-Home (FTTH) projects. The problems they suffer from are organized sabotage, vandalism, accidental damage and poor planning. It provides practical solutions that deal with the aforementioned problems. These solutions consist of both technical and financial clarifications that ensure the achievement of the FTTH network’s stability for the purpose of equipping citizens, private sector companies, and governmental institutions with services, data transmission, the Internet, and other services. They aim to solve problems and obstacles accompanying the operation and maintenance of FTTH projects implemented by the Informatics and Telecommunications Public Company (ITPC)/ Iraqi Ministry of Communications (MoC). This approach takes the FTTH network of AlMaalif-AlMuaslat districts/ Baghdad-Iraq as a case study.Keywords: CCTV, FTTH, ITPC, MoC, NVR, PTZ
Procedia PDF Downloads 821092 Reliable and Error-Free Transmission through Multimode Polymer Optical Fibers in House Networks
Authors: Tariq Ahamad, Mohammed S. Al-Kahtani, Taisir Eldos
Abstract:
Optical communications technology has made enormous and steady progress for several decades, providing the key resource in our increasingly information-driven society and economy. Much of this progress has been in finding innovative ways to increase the data carrying capacity of a single optical fiber. In this research article we have explored basic issues in terms of security and reliability for secure and reliable information transfer through the fiber infrastructure. Conspicuously, one potentially enormous source of improvement has however been left untapped in these systems: fibers can easily support hundreds of spatial modes, but today’s commercial systems (single-mode or multi-mode) make no attempt to use these as parallel channels for independent signals. Bandwidth, performance, reliability, cost efficiency, resiliency, redundancy, and security are some of the demands placed on telecommunications today. Since its initial development, fiber optic systems have had the advantage of most of these requirements over copper-based and wireless telecommunications solutions. The largest obstacle preventing most businesses from implementing fiber optic systems was cost. With the recent advancements in fiber optic technology and the ever-growing demand for more bandwidth, the cost of installing and maintaining fiber optic systems has been reduced dramatically. With so many advantages, including cost efficiency, there will continue to be an increase of fiber optic systems replacing copper-based communications. This will also lead to an increase in the expertise and the technology needed to tap into fiber optic networks by intruders. As ever before, all technologies have been subject to hacking and criminal manipulation, fiber optics is no exception. Researching fiber optic security vulnerabilities suggests that not everyone who is responsible for their networks security is aware of the different methods that intruders use to hack virtually undetected into fiber optic cables. With millions of miles of fiber optic cables stretching across the globe and carrying information including but certainly not limited to government, military, and personal information, such as, medical records, banking information, driving records, and credit card information; being aware of fiber optic security vulnerabilities is essential and critical. Many articles and research still suggest that fiber optics is expensive, impractical and hard to tap. Others argue that it is not only easily done, but also inexpensive. This paper will briefly discuss the history of fiber optics, explain the basics of fiber optic technologies and then discuss the vulnerabilities in fiber optic systems and how they can be better protected. Knowing the security risks and knowing the options available may save a company a lot embarrassment, time, and most importantly money.Keywords: in-house networks, fiber optics, security risk, money
Procedia PDF Downloads 4201091 Climatic Roots of Piracy in Red Sea
Authors: Nasser Karami
Abstract:
Piracy in the North West of Indian Ocean and the Red Sea has become a global crisis in recent years. Pirates of this area are often very poor people from the Horn of Africa and the western coast of the Red Sea. Climatic and geographical evidence suggests that poverty and destruction of social structures in the region have directly relation to prolonged-drought. Indeed, after the seventies (more than 40 years ago) due to the long-term drought in the region, all political, economic and social structures had declined. Spread of terrorism, violent extremism and of course piracy, are main effects of climate change and drought of this regression. It is disturbing to say the climatic documents say that because of global climate change, severe drought will continue in this region. This mean that the dangers worse than piracy threatens the future of this area. Forty-year data that has assessed in this study indicate that there is direct relationship between spread of drought and piracy in the Red Sea.Keywords: climate, poverty, climate change, drought, piracy in red sea
Procedia PDF Downloads 4981090 Building Community through Discussion Forums in an Online Accelerated MLIS Program: Perspectives of Instructors and Students
Authors: Mary H Moen, Lauren H. Mandel
Abstract:
Creating a sense of community in online learning is important for student engagement and success. The integration of discussion forums within online learning environments presents an opportunity to explore how this computer mediated communications format can cultivate a sense of community among students in accelerated master’s degree programs. This research has two aims, to delve into the ways instructors utilize this communications technology to create community and to understand the feelings and experiences of graduate students participating in these forums in regard to its effectiveness in community building. This study is a two-phase approach encompassing qualitative and quantitative methodologies. The data will be collected at an online accelerated Master of Library and Information Studies program at a public university in the northeast of the United States. Phase 1 is a content analysis of the syllabi from all courses taught in the 2023 calendar year, which explores the format and rules governing discussion forum assignments. Four to six individual interviews of department faculty and part time faculty will also be conducted to illuminate their perceptions of the successes and challenges of their discussion forum activities. Phase 2 will be an online survey administered to students in the program during the 2023 calendar year. Quantitative data will be collected for statistical analysis, and short answer responses will be analyzed for themes. The survey is adapted from the Classroom Community Scale Short-Form (CSS-SF), which measures students' self-reported responses on their feelings of connectedness and learning. The prompts will contextualize the items from their experience in discussion forums during the program. Short answer responses on the challenges and successes of using discussion forums will be analyzed to gauge student perceptions and experiences using this type of communication technology in education. This research study is in progress. The authors anticipate that the findings will provide a comprehensive understanding of the varied approaches instructors use in discussion forums for community-building purposes in an accelerated MLIS program. They predict that the more varied, flexible, and consistent student uses of discussion forums are, the greater the sense of community students will report. Additionally, students’ and instructors’ perceptions and experiences within these forums will shed light on the successes and challenges faced, thereby offering valuable recommendations for enhancing online learning environments. The findings are significant because they can contribute actionable insights for instructors, educational institutions, and curriculum designers aiming to optimize the use of discussion forums in online accelerated graduate programs, ultimately fostering a richer and more engaging learning experience for students.Keywords: accelerated online learning, discussion forums, LIS programs, sense of community, g
Procedia PDF Downloads 841089 IACOP - Route Optimization in Wireless Networks Using Improved Ant Colony Optimization Protocol
Authors: S. Vasundra, D. Venkatesh
Abstract:
Wireless networks have gone through an extraordinary growth in the past few years, and will keep on playing a crucial role in future data communication. The present wireless networks aim to make communication possible anywhere and anytime. With the converging of mobile and wireless communications with Internet services, the boundary between mobile personal telecommunications and wireless computer networks is disappearing. Wireless networks of the next generation need the support of all the advances on new architectures, standards, and protocols. Since an ad hoc network may consist of a large number of mobile hosts, this imposes a significant challenge on the design of an effective and efficient routing protocol that can work well in an environment with frequent topological changes. This paper proposes improved ant colony optimization (IACO) technique. It also maintains load balancing in wireless networks. The simulation results show that the proposed IACO performs better than existing routing techniques.Keywords: wireless networks, ant colony optimization, load balancing, architecture
Procedia PDF Downloads 421