Search results for: scholarly communication
3451 Portable Cardiac Monitoring System Based on Real-Time Microcontroller and Multiple Communication Interfaces
Authors: Ionel Zagan, Vasile Gheorghita Gaitan, Adrian Brezulianu
Abstract:
This paper presents the contributions in designing a mobile system named Tele-ECG implemented for remote monitoring of cardiac patients. For a better flexibility of this application, the authors chose to implement a local memory and multiple communication interfaces. The project described in this presentation is based on the ARM Cortex M0+ microcontroller and the ADAS1000 dedicated chip necessary for the collection and transmission of Electrocardiogram signals (ECG) from the patient to the microcontroller, without altering the performances and the stability of the system. The novelty brought by this paper is the implementation of a remote monitoring system for cardiac patients, having a real-time behavior and multiple interfaces. The microcontroller is responsible for processing digital signals corresponding to ECG and also for the implementation of communication interface with the main server, using GSM/Bluetooth SIMCOM SIM800C module. This paper translates all the characteristics of the Tele-ECG project representing a feasible implementation in the biomedical field. Acknowledgment: This paper was supported by the project 'Development and integration of a mobile tele-electrocardiograph in the GreenCARDIO© system for patients monitoring and diagnosis - m-GreenCARDIO', Contract no. BG58/30.09.2016, PNCDI III, Bridge Grant 2016, using the infrastructure from the project 'Integrated Center for research, development and innovation in Advanced Materials, Nanotechnologies, and Distributed Systems for fabrication and control', Contract No. 671/09.04.2015, Sectoral Operational Program for Increase of the Economic Competitiveness co-funded from the European Regional Development Fund.Keywords: Tele-ECG, real-time cardiac monitoring, electrocardiogram, microcontroller
Procedia PDF Downloads 2723450 A Smart Visitors’ Notification System with Automatic Secure Door Lock Using Mobile Communication Technology
Authors: Rabail Shafique Satti, Sidra Ejaz, Madiha Arshad, Marwa Khalid, Sadia Majeed
Abstract:
The paper presents the development of an automated security system to automate the entry of visitors, providing more flexibility of managing their record and securing homes or workplaces. Face recognition is part of this system to authenticate the visitors. A cost effective and SMS based door security module has been developed and integrated with the GSM network and made part of this system to allow communication between system and owner. This system functions in real time as when the visitor’s arrived it will detect and recognizes his face and on the result of face recognition process it will open the door for authorized visitors or notifies and allows the owner’s to take further action in case of unauthorized visitor. The proposed system is developed and it is successfully ensuring security, managing records and operating gate without physical interaction of owner.Keywords: SMS, e-mail, GSM modem, authenticate, face recognition, authorized
Procedia PDF Downloads 7903449 Secure Automatic Key SMS Encryption Scheme Using Hybrid Cryptosystem: An Approach for One Time Password Security Enhancement
Authors: Pratama R. Yunia, Firmansyah, I., Ariani, Ulfa R. Maharani, Fikri M. Al
Abstract:
Nowadays, notwithstanding that the role of SMS as a means of communication has been largely replaced by online applications such as WhatsApp, Telegram, and others, the fact that SMS is still used for certain and important communication needs is indisputable. Among them is for sending one time password (OTP) as an authentication media for various online applications ranging from chatting, shopping to online banking applications. However, the usage of SMS does not pretty much guarantee the security of transmitted messages. As a matter of fact, the transmitted messages between BTS is still in the form of plaintext, making it extremely vulnerable to eavesdropping, especially if the message is confidential, for instance, the OTP. One solution to overcome this problem is to use an SMS application which provides security services for each transmitted message. Responding to this problem, in this study, an automatic key SMS encryption scheme was designed as a means to secure SMS communication. The proposed scheme allows SMS sending, which is automatically encrypted with keys that are constantly changing (automatic key update), automatic key exchange, and automatic key generation. In terms of the security method, the proposed scheme applies cryptographic techniques with a hybrid cryptosystem mechanism. Proofing the proposed scheme, a client to client SMS encryption application was developed using Java platform with AES-256 as encryption algorithm, RSA-768 as public and private key generator and SHA-256 for message hashing function. The result of this study is a secure automatic key SMS encryption scheme using hybrid cryptosystem which can guarantee the security of every transmitted message, so as to become a reliable solution in sending confidential messages through SMS although it still has weaknesses in terms of processing time.Keywords: encryption scheme, hybrid cryptosystem, one time password, SMS security
Procedia PDF Downloads 1303448 Determining the Factors Affecting Social Media Addiction (Virtual Tolerance, Virtual Communication), Phubbing, and Perception of Addiction in Nurses
Authors: Fatima Zehra Allahverdi, Nukhet Bayer
Abstract:
Objective: Three questions were formulated to examine stressful working units (intensive care units, emergency unit nurses) utilizing the self-perception theory and social support theory. This study provides a distinctive input by inspecting the combination of variables regarding stressful working environments. Method: The descriptive research was conducted with the participation of 400 nurses working at Ankara City Hospital. The study used Multivariate Analysis of Variance (MANOVA), regression analysis, and a mediation model. Hypothesis one used MANOVA followed by a Scheffe post hoc test. Hypothesis two utilized regression analysis using a hierarchical linear regression model. Hypothesis three used a mediation model. Result: The study utilized mediation analyses. Findings supported the hypotheses that intensive care units have significantly high scores in virtual communication and virtual tolerance. The number of years on the job, virtual communication, virtual tolerance, and phubbing significantly predicted 51% of the variance of perception of addiction. Interestingly, the number of years on the job, while significant, was negatively related to perception of addiction. Conclusion: The reasoning behind these findings and the lack of significance in the emergency unit is discussed. Around 7% of the variance of phubbing was accounted for through working in intensive care units. The model accounted for 26.80 % of the differences in the perception of addiction.Keywords: phubbing, social media, working units, years on the job, stress
Procedia PDF Downloads 543447 Machine Learning Approach for Anomaly Detection in the Simulated Iec-60870-5-104 Traffic
Authors: Stepan Grebeniuk, Ersi Hodo, Henri Ruotsalainen, Paul Tavolato
Abstract:
Substation security plays an important role in the power delivery system. During the past years, there has been an increase in number of attacks on automation networks of the substations. In spite of that, there hasn’t been enough focus dedicated to the protection of such networks. Aiming to design a specialized anomaly detection system based on machine learning, in this paper we will discuss the IEC 60870-5-104 protocol that is used for communication between substation and control station and focus on the simulation of the substation traffic. Firstly, we will simulate the communication between substation slave and server. Secondly, we will compare the system's normal behavior and its behavior under the attack, in order to extract the right features which will be needed for building an anomaly detection system. Lastly, based on the features we will suggest the anomaly detection system for the asynchronous protocol IEC 60870-5-104.Keywords: Anomaly detection, IEC-60870-5-104, Machine learning, Man-in-the-Middle attacks, Substation security
Procedia PDF Downloads 3713446 Experiential Language Learning as a Tool for Effective Global Leadership
Authors: Christiane Dumont
Abstract:
This paper proposes to revisit foreign-language learning as a tool to increase motivation through advocacy and develop effective natural communication skills, which are critical leadership qualities. To this end, collaborative initiatives undertaken by advanced university students of French with local and international community partners will be reviewed. Close attention will be paid to the acquisition of intercultural skills, the reflective process, as well as the challenges and outcomes. Two international development projects conducted in Haiti will be highlighted, i.e., collaboration with a network of providers in the Haitian cultural heritage preservation and tourism sector (2014-15) and development of investigation and teacher training tools for a primary/secondary school in the Port-au-Prince area (current). The choice of community-service learning as a framework to teach French-as-a-second-language stemmed from the need to raise awareness against stereotypes and prejudice, which hinder the development of effective intercultural skills. This type of experiential education also proved very effective in identifying and preventing miscommunication caused by the lack of face-to-face interaction in our increasingly technology-mediated world. Learners experienced first-hand, the challenges and advantages of face-to-face communication, which, in turn, enhanced their motivation for developing effective intercultural skills. Vygotsky's and Kolb's theories, current research on service learning (Dwight, Eyler), action/project-based pedagogy (Beckett), and reflective learning (TSC Farrell), will provide useful background to analyze the benefits and challenges of community-service learning. The ultimate goal of this paper is to find out what makes experiential learning truly unique and transformative for both the learners and the community they wish to serve. It will demonstrate how enhanced motivation, community engagement, and clear, concise, and respectful communication impact and empower learners. The underlying hope is to help students in high-profile, and leading-edge industries become effective global leaders.Keywords: experiential learning, intercultural communication, reflective learning, effective leadership, learner motivation
Procedia PDF Downloads 1053445 History on the Screen: Nasser and the Biographical Film in Egyptian Cinema
Authors: Omar Khalifah
Abstract:
The emergence of Muhammad Fadel’s 1996 film ‘Nasser 56’ ushered in a new era in Egyptian cinema. Not only was it the first biographical film of late Egyptian president Gamal ‘Abdel Nasser (1918-1970); it also broke a long-accepted taboo against cinematic depiction of modern political leaders. Passionately received by Egyptians and Arabs throughout the world, the success of ‘Nasser 56’ empowered other filmmakers to follow Fadel’s suit. Interestingly, the three biographical films that followed had, completely or partially, a Nasser dimension. In addition to another biographical film of Nasser, Anwar al-Qawadri’s ‘Gamal ‘Abdel Nasser’ (1999); Muhammad Khan’s ‘Ayyam al-Sadat (Days of Sadat)’ (2001), and Sherif Arafa’s ‘Halim (Halim)’ (2006) portray, as the titles clearly suggest, two significant figures whose lives thoroughly intersected with Nasser’s - Nasser’s successor Anwar al-Sadat and the legendary singer Abdel Halim Hafiz. Expectedly, therefore, Nasser himself is abundantly referenced in those films, albeit differently. This paper seeks to examine the ways in which Egyptian filmmakers impersonate Nasser on the screen. Starting with scholarly definitions of the biopic, the paper will first ponder the reasons that have made the biopic an unattractive genre to Egyptian filmmakers. It will then argue that the popularity of Nasser and his wide appeal to the public has transformed the status of the biopic genre in Egyptian cinema. However, the impersonation of Nasser in the four films above proved a daunting mission to filmmakers. As this paper will show, unless he is the main character, the reenactment of Nasser in films will constantly pose dilemmas to filmmakers, a few of which will be discussed in this paper.Keywords: Ahmad Zaki, bio-pictures, Egyptian cinema, Nasser, Nasser 56
Procedia PDF Downloads 4203444 Changing Arbitrary Data Transmission Period by Using Bluetooth Module on Gas Sensor Node of Arduino Board
Authors: Hiesik Kim, Yong-Beom Kim, Jaheon Gu
Abstract:
Internet of Things (IoT) applications are widely serviced and spread worldwide. Local wireless data transmission technique must be developed to rate up with some technique. Bluetooth wireless data communication is wireless technique is technique made by Special Inter Group (SIG) using the frequency range 2.4 GHz, and it is exploiting Frequency Hopping to avoid collision with a different device. To implement experiment, equipment for experiment transmitting measured data is made by using Arduino as open source hardware, gas sensor, and Bluetooth module and algorithm controlling transmission rate is demonstrated. Experiment controlling transmission rate also is progressed by developing Android application receiving measured data, and controlling this rate is available at the experiment result. It is important that in the future, improvement for communication algorithm be needed because a few error occurs when data is transferred or received.Keywords: Arduino, Bluetooth, gas sensor, IoT, transmission
Procedia PDF Downloads 2793443 Analysis of Transmedia Storytelling in Pokémon GO
Authors: Iva Nedelcheva
Abstract:
This study is part of a doctoral thesis on the topic of Hyperfiction: Past, Present and Future of Storytelling through Hypertext. It explores in depth the impact of transmedia storytelling and the role of hypertext in the realm of the currently popular social media phenomenon Pokémon GO. Storytelling is a powerful method to engage and unite people. Moreover, the technology progress adds a whole new angle to the method, with hypertext and cross-platform sharing that enhance the traditional storytelling so much that transmedia storytelling gives unlimited opportunities to affect the everyday life of people across the globe. This research aims at examining the transmedia storytelling approach in Pokémon GO, and explaining how that contributed to its establishment as a massive worldwide hit in less than a week. The social engagement is investigated in all major media platforms, including traditional and online media channels. Observation and content analyses are reported in this paper to form the conclusion that transmedia storytelling with the input of hypertext has a promising future as a method of establishing a productive and rewarding communication strategy.Keywords: communication, hypertext, Pokemon Go, storytelling, transmedia
Procedia PDF Downloads 1713442 The Dynamic Nexus of Public Health and Journalism in Informed Societies
Authors: Ali Raza
Abstract:
The dynamic landscape of communication has brought about significant advancements that intersect with the realms of public health and journalism. This abstract explores the evolving synergy between these fields, highlighting how their intersection has contributed to informed societies and improved public health outcomes. In the digital age, communication plays a pivotal role in shaping public perception, policy formulation, and collective action. Public health, concerned with safeguarding and improving community well-being, relies on effective communication to disseminate information, encourage healthy behaviors, and mitigate health risks. Simultaneously, journalism, with its commitment to accurate and timely reporting, serves as the conduit through which health information reaches the masses. Advancements in communication technologies have revolutionized the ways in which public health information is both generated and shared. The advent of social media platforms, mobile applications, and online forums has democratized the dissemination of health-related news and insights. This democratization, however, brings challenges, such as the rapid spread of misinformation and the need for nuanced strategies to engage diverse audiences. Effective collaboration between public health professionals and journalists is pivotal in countering these challenges, ensuring that accurate information prevails. The synergy between public health and journalism is most evident during public health crises. The COVID-19 pandemic underscored the pivotal role of journalism in providing accurate and up-to-date information to the public. However, it also highlighted the importance of responsible reporting, as sensationalism and misinformation could exacerbate the crisis. Collaborative efforts between public health experts and journalists led to the amplification of preventive measures, the debunking of myths, and the promotion of evidence-based interventions. Moreover, the accessibility of information in the digital era necessitates a strategic approach to health communication. Behavioral economics and data analytics offer insights into human decision-making and allow tailored health messages to resonate more effectively with specific audiences. This approach, when integrated into journalism, enables the crafting of narratives that not only inform but also influence positive health behaviors. Ethical considerations emerge prominently in this alliance. The responsibility to balance the public's right to know with the potential consequences of sensational reporting underscores the significance of ethical journalism. Health journalists must meticulously source information from reputable experts and institutions to maintain credibility, thus fortifying the bridge between public health and the public. As both public health and journalism undergo transformative shifts, fostering collaboration between these domains becomes essential. Training programs that familiarize journalists with public health concepts and practices can enhance their capacity to report accurately and comprehensively on health issues. Likewise, public health professionals can gain insights into effective communication strategies from seasoned journalists, ensuring that health information reaches a wider audience. In conclusion, the convergence of public health and journalism, facilitated by communication advancements, is a cornerstone of informed societies. Effective communication strategies, driven by collaboration, ensure the accurate dissemination of health information and foster positive behavior change. As the world navigates complex health challenges, the continued evolution of this synergy holds the promise of healthier communities and a more engaged and educated public.Keywords: public awareness, journalism ethics, health promotion, media influence, health literacy
Procedia PDF Downloads 723441 Vocabulary Paradigm in Learning Romanian As a Foreign Language
Authors: Georgiana Ciobotaru
Abstract:
The vocabulary that foreign students assimilate once they start studying the Romanian language must allow them to develop the linguistic competence of oral and written expression, but also the intercultural one, necessary for their integration into the new socio-cultural environment. Therefore, the familiarization courses with Romanian as a foreign language aim at fundamental language acquisitions in order to obtain the expected level of Romanian language. They also relate differently to the new culture and the new language they come in contact with, having a distinct way of expressing themselves. Foreign students want to continue their university and postgraduate studies at specialized faculties in the country; therefore, they need both a general language for their integration into society and for interaction with others, Romanians or students from countries other than their own, but also from a specialized language that facilitates didactic communication and professional development. The complexity of the vocabulary must thus cover the daily communication needs, but also the subsequent evolution of each one. This paper aims to illustrate the most important semantic fields that students must assimilate in order to crystallize a linguistic identity in the new context of their personal and professional development and to help them cope with the culture shock.Keywords: integration, intercultural, language, linguistic, vocabulary
Procedia PDF Downloads 1973440 Innovative Business Models in the Era of Digital Tourism: Examining Their Impact on International Travel, Local Businesses, and Residents’ Quality of Life
Authors: Madad Ali
Abstract:
In the contemporary landscape of international travel, the infusion of digital technologies has given rise to innovative business models that are reshaping the dynamics of tourism. This research delves into the transformative potential of these novel business models within the realm of digital tourism and their multifaceted impact on local businesses, residents' quality of life, and the overall travel experience. The study focuses on the captivating backdrop of Yunnan Province, China, renowned for its rich cultural heritage and diverse ethnic minorities, to uncover the intricate nuances of this phenomenon. The primary objectives of this research encompass the identification and categorization of emerging business models facilitated by digital technologies, their implications on tourist engagement, and their integration into the operations of local businesses. By employing a mixed-methods approach, blending qualitative techniques like interviews and content analysis with quantitative tools such as surveys and data analysis, the study provides a comprehensive evaluation of these business models' effects on various dimensions of the tourism landscape. The distinctiveness of this research lies in its exclusive focus on Yunnan Province, China. By concentrating on Yunnan Province, the research contributes exceptional insights into the interplay between digital tourism, ethnic diversity, cultural heritage, and sustainable development. The study's outcomes hold significance for both scholarly discourse and the stakeholders involved in shaping the region's tourism strategies.Keywords: business model, digital tourism, international travel, local businesses, quality of life
Procedia PDF Downloads 603439 Happiness, Media and Sustainability of Communities in Donkeaw, Mearim District, Chiang Mai, Thailand
Authors: Panida Jongsuksomsakul
Abstract:
This study of the ‘happiness’ and ‘sustainability’ in the community of Donkeaw, Amphoe Mae Rim, Chiang Mai Province during the non-election period in Thailand, noted that their happiness levels are in the middle-average range. This was found using a mixed approach of qualitative and quantitative methods (N = 386, α = 0.05). The study explores indicators for six aspects of well-being and happiness, including, good local governance, administrative support for the health system that maintains people’s mental and physical health, environment and weather, job security and a regular income aids them in managing a sustainable lifestyle. The impact of economic security and community relationships on social and cultural capital, and the way these aspects impact on the life style of the community, affects the sustainable well-being of people. Moreover, living with transparency and participatory communication led to diverse rewards in many areas.Keywords: communication, happiness, well-being, Donkeaw community, social and cultural capital
Procedia PDF Downloads 2353438 New Media and the Personal Vote in General Elections: A Comparison of Constituency Level Candidates in the United Kingdom and Japan
Authors: Sean Vincent
Abstract:
Within the academic community, there is a consensus that political parties in established liberal democracies are facing a myriad of organisational challenges as a result of falling membership, weakening links to grass-roots support and rising voter apathy. During the same period of party decline and growing public disengagement political parties have become increasingly professionalised. The professionalisation of political parties owes much to changes in technology, with television becoming the dominant medium for political communication. In recent years, however, it has become clear that a new medium of communication is becoming utilised by political parties and candidates – New Media. New Media, a term hard to define but related to internet based communication, offers a potential revolution in political communication. It can be utilised by anyone with access to the internet and its most widely used platforms of communication such as Facebook and Twitter, are free to use. The advent of Web 2.0 has dramatically changed what can be done with the Internet. Websites now allow candidates at the constituency level to fundraise, organise and set out personalised policies. Social media allows them to communicate with supporters and potential voters practically cost-free. As such candidate dependency on the national party for resources and image now lies open to debate. Arguing that greater candidate independence may be a natural next step in light of the contemporary challenges faced by parties, this paper examines how New Media is being used by candidates at the constituency level to increase their personal vote. The paper will present findings from research carried out during two elections – the Japanese Lower House election of 2014 and the UK general election of 2015. During these elections a sample of candidates, totalling 150 candidates, from the three biggest parties in each country were selected and their new media output, specifically candidate websites, Twitter and Facebook output subjected to content analysis. The analysis examines how candidates are using new media to both become more functionally, through fundraising and volunteer mobilisation and politically, through the promotion of personal/local policies, independent from the national party. In order to validate the results of content analysis this paper will also present evidence from interviews carried out with 17 candidates that stood in the 2014 Japanese Lower House election or 2015 UK general election. With a combination of statistical analysis and interviews, several conclusions can be made about the use of New Media at constituency level. The findings show not just a clear difference in the way candidates from each country are using New Media but also differences within countries based upon the particular circumstances of each constituency. While it has not yet replaced traditional methods of fundraising and activist mobilisation, New Media is also becoming increasingly important in campaign organisation and the general consensus amongst candidates is that its importance will continue to grow along as politics in both countries becomes more diffuse.Keywords: political campaigns, elections, new media, political communication
Procedia PDF Downloads 2283437 Causes and Consequences of Intuitive Animal Communication: A Case Study at Panthera Africa
Authors: Cathrine Scharning Cornwall-Nyquist, David Rafael Vaz Fernandes
Abstract:
Since its origins, mankind has been dreaming of communicating directly with other animals. Past civilizations interacted on different levels with other species and recognized them in their rituals and daily activities. However, recent scientific developments have limited the ability of humans to consider deeper levels of interaction beyond observation and/or physical behavior. In recent years, animal caretakers and facilities such as sanctuaries or rescue centers have been introducing new techniques based on intuition. Most of those initiatives are related to specific cases, such as the incapacity to understand an animal’s behavior. Respected organizations also include intuitive animal communication (IAC) sessions to follow up on past interventions with their animals. Despite the lack of credibility of this discipline, some animal caring structures have opted to integrate IAC into their daily routines and approaches to animal welfare. At this stage, animal communication will be generally defined as the ability of humans to communicate with animals on an intuitive level. The trend in the field remains to be explored. The lack of theory and previous research urges the scientific community to improve the description of the phenomenon and its consequences. Considering the current scenario, qualitative approaches may become a suitable pathway to explore this topic. The purpose of this case study is to explore the beliefs behind and the consequences of an approach based on intuitive animal communication techniques for Panthera Africa (PA), an ethical sanctuary located in South Africa. Due to their personal experience, the Sanctuary’s founders have developed a philosophy based on IAC while respecting the world's highest standards for big cat welfare. Their dual approach is reflected in their rescues, daily activities, and healing animals’ trauma. The case study's main research questions will be: (i) Why do they choose to apply IAC in their work? (ii) What consequences to their activities do IAC bring? (iii) What effects do IAC techniques bring in their interactions with the outside world? Data collection will be gathered on-site via: (i) Complete participation (field notes); (ii) Semi-structured interviews (audio transcriptions); (iii) Document analysis (internal procedures and policies); (iv) Audio-visual material (communication with third parties). The main researcher shall become an active member of the Sanctuary during a 30-day period and have full access to the site. Access to documents and audio-visual materials will be granted on a request basis. Interviews are expected to be held with PA founders and staff members and with IAC practitioners related to the facility. The information gathered shall enable the researcher to provide an extended description of the phenomenon and explore its internal and external consequences for Panthera Africa.Keywords: animal welfare, intuitive animal communication, Panthera Africa, rescue
Procedia PDF Downloads 953436 Automatic Aggregation and Embedding of Microservices for Optimized Deployments
Authors: Pablo Chico De Guzman, Cesar Sanchez
Abstract:
Microservices are a software development methodology in which applications are built by composing a set of independently deploy-able, small, modular services. Each service runs a unique process and it gets instantiated and deployed in one or more machines (we assume that different microservices are deployed into different machines). Microservices are becoming the de facto standard for developing distributed cloud applications due to their reduced release cycles. In principle, the responsibility of a microservice can be as simple as implementing a single function, which can lead to the following issues: - Resource fragmentation due to the virtual machine boundary. - Poor communication performance between microservices. Two composition techniques can be used to optimize resource fragmentation and communication performance: aggregation and embedding of microservices. Aggregation allows the deployment of a set of microservices on the same machine using a proxy server. Aggregation helps to reduce resource fragmentation, and is particularly useful when the aggregated services have a similar scalability behavior. Embedding deals with communication performance by deploying on the same virtual machine those microservices that require a communication channel (localhost bandwidth is reported to be about 40 times faster than cloud vendor local networks and it offers better reliability). Embedding can also reduce dependencies on load balancer services since the communication takes place on a single virtual machine. For example, assume that microservice A has two instances, a1 and a2, and it communicates with microservice B, which also has two instances, b1 and b2. One embedding can deploy a1 and b1 on machine m1, and a2 and b2 are deployed on a different machine m2. This deployment configuration allows each pair (a1-b1), (a2-b2) to communicate using the localhost interface without the need of a load balancer between microservices A and B. Aggregation and embedding techniques are complex since different microservices might have incompatible runtime dependencies which forbid them from being installed on the same machine. There is also a security concern since the attack surface between microservices can be larger. Luckily, container technology allows to run several processes on the same machine in an isolated manner, solving the incompatibility of running dependencies and the previous security concern, thus greatly simplifying aggregation/embedding implementations by just deploying a microservice container on the same machine as the aggregated/embedded microservice container. Therefore, a wide variety of deployment configurations can be described by combining aggregation and embedding to create an efficient and robust microservice architecture. This paper presents a formal method that receives a declarative definition of a microservice architecture and proposes different optimized deployment configurations by aggregating/embedding microservices. The first prototype is based on i2kit, a deployment tool also submitted to ICWS 2018. The proposed prototype optimizes the following parameters: network/system performance, resource usage, resource costs and failure tolerance.Keywords: aggregation, deployment, embedding, resource allocation
Procedia PDF Downloads 2043435 Part of Geomatics Technology in the Capability to Implement an on Demand Transport in Oran Wilaya (the Northwestern of Algeria)
Authors: N. Brahmia
Abstract:
The growing needs of displacements led advanced countries in this field install new specific transport systems, able to palliate any deficiencies, especially when regular public transport does not adequately meet the requests of users. In this context, on-demand transport systems (ODT) are very efficient; they rely on techniques based on the location of trip generators which should be assured effectively with the use of operators responsible of the advance reservation, planning and organization, and studying the different ODT criteria. As the advanced countries in the field of transport, some developing countries are involved in the adaptation of the new technologies to reduce the deficit in their communication system. This communication presents the study of an ODT implementation in the west of Algeria, by developing the Geomatics side of the study. This part requires the use of specific systems such as Geographic Information System (GIS), Road Database Management System (RDBMS)… so we developed the process through an application in an environment of mobility by using the computer tools dedicated to the management of the entities related to the transport field.Keywords: geomatics, GIS, ODT, transport systems
Procedia PDF Downloads 6023434 Women Educational Leaders in an Age of Accountability
Authors: Ann Vibert, Heather Hemming
Abstract:
This paper presentation summarizes the findings and implications of research on the plight and practices of women educational leaders in public school systems and in one university. The authors, both women university administrators, are also scholars and researchers of education. The research project on which this paper presentation is based proposed to examine how women educational leaders imagined, experienced, and carried out their leadership roles in the context of a growing local and global accountability-based performativity discourse which is reshaping educational work especially for women, we argue, in both public school and post-secondary sites. The research employed critical ethnographic interviews with 20 women educational leaders in P-12 school systems and three women university level educational leaders. Data were collected on women educational leaders’ perceptions of the effects of accountability and performativity discourses on the nature of their work. Specifically, leaders were asked to speak to whether they experienced a growth in managerial work as a consequence of increased accountability demands; how they experienced their work changing as a consequence of accountability and performativity demands; how these changes impacted the central values they enacted in their work as women educational leaders changes; and how they responded to/negotiated/accommodated changes in the nature of their work developing as a consequence of accountability and performativity frameworks. Findings from the research data and analyses confirm and extend recent scholarly work on the gendered nature of performativity and accountability discourses and frameworks, and their differential effects across differing genders. The oral presentation we propose here focusses on those findings in terms of similarities for women educational leaders across different educational contexts.Keywords: women in educational leadership, gender and educational performativity, accountability and women leaders, gender and educational leadership
Procedia PDF Downloads 2963433 The Effect of Brand Mascots on Consumers' Purchasing Behaviors
Authors: Isari Pairoa, Proud Arunrangsiwed
Abstract:
Brand mascots are the cartoon characters, which are mainly designed for advertising or other related marketing purposes. Many brand mascots are extremely popular, since they were presented in commercial advertisements and Line Stickers. Brand Line Stickers could lead the users to identify with the brand and brand mascots, where might influence users to become loyal customers, and share the identity with the brand. The objective of the current study is to examine the effect of brand mascots on consumers’ decision and consumers’ intention to purchase the product. This study involved 400 participants, using cluster sampling from 50 districts in Bangkok metropolitan area. The descriptive analysis shows that using brand mascot causes consumers' positive attitude toward the products, and also heightens the possibility to purchasing the products. The current study suggests the new type of marketing strategy, which is brand fandom. This study has also contributed the knowledge to the area of integrated marketing communication and identification theory.Keywords: brand mascot, consumers’ behavior, marketing communication, purchasing
Procedia PDF Downloads 2603432 Joint Physical Custody: Lessons from the European Union
Authors: Katarzyna Kamińska
Abstract:
When thinking about custodial arrangements after divorce or separation, there has been a shift from sole custody, particularly maternal preference, to joint physical custody. In many Western countries, an increasing of children with separated parents have joint physical custody, which is believed to be in the best interests of the child, as children can maintain personal relations and direct contact with both parents on a regular basis. The aim of the article is to examine joint physical custody, both from the perspective of the binding legal instruments that are relevant to joint physical custody, the Principles of European Family Law drafted by the CEFL, as well as the international research on this matter. The thesis underlying this paper is that joint physical custody is in itself neither good nor bad, and it depends on how the arrangements are managed by the parents. The paper includes a reflection on joint physical custody in the face of the COVID-19 crisis. The results indicate that in normal circumstances, joint physical custody demands broad communication, and now it times of crisis, we need over-communication about children and plans. Only a very tight and coordinated co-parenting plan make the whole family safer.Keywords: joint physical custody, co-parenting, child welfare, COVID-19
Procedia PDF Downloads 2463431 Evaluating Imitation Behavior of Children with Autism Spectrum Disorder Using Humanoid Robot NAO
Authors: Masud Karim, Md. Solaiman Mia, Saifuddin Md. Tareeq, Md. Hasanuzzaman
Abstract:
Autism Spectrum Disorder (ASD) is a neurodevelopment disorder. Such disorder is found in childhood life. Children with ASD have less capabilities in communication and social skills. Therapies are used to develop communication and social skills. Recently researchers have been trying to use robots in such therapies. In this paper, we have presented social skill learning test cases for children with ASD. Autism conditions are measured in 30 children in a special school. Among them, twelve children are selected who have equal ASD conditions. Then six children participated in training with humans, and another six children participated in training with robots. The learning session continued for one week and three hours each day. We have taken an assessment test before the learning sessions. After completing the learning sessions, we have taken another assessment test. We have found better performances from children who have participated in robotic sessions rather than the children who have participated in human sessions.Keywords: children with ASD, NAO robot, human-robot interaction, social skills
Procedia PDF Downloads 923430 Resilience and Renewal: Sustainable Tourism Development in Post-Earthquake Marrakech-El Haouz
Authors: Oumayma Hilal
Abstract:
The devastating earthquake in Marrakech-El Haouz in September 2023 underscores the critical need for sustainable tourism practices. This study proposes innovative approaches to territory tourism, prioritizing resilient and sustainable development to aid recovery and empower local communities. Using a mixed-methods approach, the research evaluates post-earthquake tourism impacts, gathers local perspectives, and benchmarks global models for disaster recovery through tourism. The paper aims to offer practical, community-centric tourism initiatives, integrated with strategic communication strategies, to enhance socio-economic welfare and ensure long-term resilience. The findings are expected to contribute significantly to sustainable tourism literature in post-disaster contexts and provide actionable strategies for the revitalization of the Marrakech-El Haouz region.Keywords: sustainable tourism, community development, Marrakech El Haouz, communication strategies, territory tourism, sustainable tourism, community development
Procedia PDF Downloads 563429 Importance of Punctuation in Communicative Competence
Authors: Khayriniso Bakhtiyarovna Ganiyeva
Abstract:
The article explores the significance of punctuation in achieving communicative competence. It underscores that effective communication goes beyond simply using punctuation correctly. In the successful completion of a communicative activity, it is important not that the writer correctly uses punctuation marks but that he was able to achieve a goal aimed at expressing a certain meaning. The unanimity of the writer and the reader in the mutual understanding of the text is of primary importance. It should also be taken into account that situational communication provides special informative content and expressiveness of speech. Also, the norms of the situation are determined by the nature of the information in the text, and the punctuation marks expressed in accordance with the norm perform logical-semantic, highlighting expressive-emotional and signaling functions. It is a mistake to classify the signs subject to the norm of the situation as created by the author because they functionally reflect the general stylistic features of different texts. Such signs are among the common signs that are codified only by the semantics and structure of the created text.Keywords: communicative-pragmatic approach, expressiveness of speech, stylistic features, comparative analysis
Procedia PDF Downloads 553428 The Practices Perspective in Communication, Consumer and Cultural Studies: A Post-Heideggerian Narrative
Authors: Tony Wilson
Abstract:
This paper sets out a practices perspective or practices theory, which has become pervasive from business to sociological studies. In doing so, it locates the perspective historically (in the work of the philosopher Heidegger) and provides a contemporary illustration of its application to communication, consumer and cultural studies as central to this conference theme. The structured account of practices (as articulated in eight ‘axioms’) presented towards the conclusion of this paper is an initial statement - planned to encourage further detailed qualitative and systematic research in areas of interest to the conference. Practice theories of equipped and situated construction of participatory meaning (as in media and marketing consuming) are frequently characterized as lacking common ground, or core principles. This paper explores whether by retracing a journey to earlier philosophical underwriting, a shared territory promoting new research can be located as current philosophical hermeneutics. Moreover, through returning to hermeneutic first principles, the paper shows that a series of spatio-temporal metaphors become available - appropriate to analyzing communication as a process across disciplines in which it is considered. Thus one can argue, for instance, that media users engage (enter) digital text from their diverse ‘horizons of expectation’, in a productive enlarging ‘fusion’ of horizons of understanding, thereby ‘projecting’ a new narrative, integrated in a ‘hermeneutic circle’ of meaning. A politics of communication studies may contest a horizon of understanding - so engaging in critical ‘distancing’. Marketing’s consumers can occupy particular places on a horizon of understanding. Media users pass over borders of changing, revised perspectives. Practices research can now not only be discerned in multiple disciplines but equally crosses disciplines. The ubiquitous practice of media use by managers and visitors in a shopping mall - the mediatization of malls - responds to investigating not just with media study expertise, but from an interpretive marketing perspective. How have mediated identities of person or place been changed? Emphasizing understanding of entities in a material environment as ‘equipment’, practices theory enables the quantitative correlation of use and demographic variable as ‘Zeug Score’. Human behavior is fundamentally habitual - shaped by its tacit assumptions - occasionally interrupted by reflection. Practices theory acknowledges such action to be minimally monitored yet nonetheless considers it as constructing narrative. Thus presented in research, ‘storied’ behavior can then be seen to be (in)formed and shaped from a shifting hierarchy of ‘horizons’ or of perspectives - from habituated to reflective - rather than a single seamless narrative. Taking a communication practices perspective here avoids conflating tacit, transformative and theoretical understanding in research. In short, a historically grounded and unifying statement of contemporary practices theory will enhance its potential as a tool in communication, consumer and cultural research, landscaping interpretative horizons of human behaviour through exploring widely the culturally (in)formed narratives equipping and incorporated (reflectively, unreflectively) in people’s everyday lives.Keywords: communication, consumer, cultural practices, hermeneutics
Procedia PDF Downloads 2693427 Are Values Reflected in Online Skincare Advertisements from the Philippines and Taiwan the Same?
Authors: Chih-Ping Chen
Abstract:
In recent years, some scholars established the reflection of cultural values in advertisements. However, despite the Internet’s rapid development, few studies have focused on observing cross-cultural differences of values reflected in online advertisements. As mirrors of culture, advertisements are believed to reflect values relevant to consumers. Therefore, this research aims to examine the cultural values reflected on online skincare advertisements between countries with different cultural influences. We argue that culture affects the values presented in the slogans, endorsers, brand prominence, and product prominence of online advertisements; a concept that challenges the standardized manner of communication utilized by most multinational brands. Results highlight that the Philippines and Taiwan are neither located on extreme low-context nor extreme high-context cultures. Moreover, although advertisements reflect culture, it may be affected by potential value shifting caused by globalization, standardized communication, and the advertisers’ marketing priorities.Keywords: cross-culture, cultural values, online advertising, prominence, beauty
Procedia PDF Downloads 4723426 Speed-Up Data Transmission by Using Bluetooth Module on Gas Sensor Node of Arduino Board
Authors: Hiesik Kim, YongBeum Kim
Abstract:
Internet of Things (IoT) applications are widely serviced and spread worldwide. Local wireless data transmission technique must be developed to speed up with some technique. Bluetooth wireless data communication is wireless technique is technique made by Special Inter Group(SIG) using the frequency range 2.4 GHz, and it is exploiting Frequency Hopping to avoid collision with different device. To implement experiment, equipment for experiment transmitting measured data is made by using Arduino as Open source hardware, Gas sensor, and Bluetooth Module and algorithm controlling transmission speed is demonstrated. Experiment controlling transmission speed also is progressed by developing Android Application receiving measured data, and controlling this speed is available at the experiment result. it is important that in the future, improvement for communication algorithm be needed because few error occurs when data is transferred or received.Keywords: Arduino, Bluetooth, gas sensor, internet of things, transmission Speed
Procedia PDF Downloads 4853425 A Comparative Analysis of Hyper-Parameters Using Neural Networks for E-Mail Spam Detection
Authors: Syed Mahbubuz Zaman, A. B. M. Abrar Haque, Mehedi Hassan Nayeem, Misbah Uddin Sagor
Abstract:
Everyday e-mails are being used by millions of people as an effective form of communication over the Internet. Although e-mails allow high-speed communication, there is a constant threat known as spam. Spam e-mail is often called junk e-mails which are unsolicited and sent in bulk. These unsolicited emails cause security concerns among internet users because they are being exposed to inappropriate content. There is no guaranteed way to stop spammers who use static filters as they are bypassed very easily. In this paper, a smart system is proposed that will be using neural networks to approach spam in a different way, and meanwhile, this will also detect the most relevant features that will help to design the spam filter. Also, a comparison of different parameters for different neural network models has been shown to determine which model works best within suitable parameters.Keywords: long short-term memory, bidirectional long short-term memory, gated recurrent unit, natural language processing, natural language processing
Procedia PDF Downloads 2063424 The Smart Record and Replay Mechanism for Android
Authors: Kuei-Chun Liu, Yu-Yu Lai, Ching-Hong Wu, Hsiao-Han Huang
Abstract:
The number of Android applications (Apps) has increased rapidly in recent years. In order to get better programmatic control over Apps, we designed a record-and-replay mechanism to record Android input events and accessibility service events then make shortcuts. The shortcut is useful for complicated routine works and to Android beginners. We also generated graphical user interface (GUI) API by these shortcuts. GUI API helps developers make integrated Apps which can control other third-party Apps even if the official API is not offered by their providers. We demonstrated the usage of GUI API with two integrated Apps: Universal Bank App and Universal Communication App. Universal Bank App integrates three accounts from different banks and Universal Communication App integrates Line with WhatsApp. Both of them show the advantage of extendable GUI API. Furthermore, using our mechanism, shortcuts could replay almost all of the Top-100 Apps on Google Play correctly. In sum, the approach we present can help both Android developers and general users.Keywords: graphical user interface, GUI API, record-and-replay, third-party apps
Procedia PDF Downloads 4083423 Nigcomsat-1r and Planned HTS Communication Satellite Critical Pillars for Nigeria’s National Digital Economy Policy and Strategy
Authors: Ibrahim Isa Ali (Pantami), Abdu Jaafaru Bambale, Abimbola Alale, Danjuma Ibrahim Ndihgihdah, Muhammad Alkali, Adamu Idris Umar, Moshood Kareem, Samson Olufunmilayo Abodunrin, Muhammad Dokko Zubairu
Abstract:
The National Digital Economy Policy and Strategy, NDEPS document developed by Nigeria’s Federal Ministry of Communications & Digital Economy (FMoCDE) is anchored on 8 pillars for the acceleration of the National Digital Economy for a Digital Nigeria. NIGCOMSAT-1R and the planned HTS communication Satellite are critical assets for supporting the pillars in the drive for sustainable growth and development. This paper discusses on the gains and contribution of the strategy as a solid infrastructure. The paper also highlights these assets’ contribution as platform for Indigenous Content Development & Adoption, Digital Literacy & Skills, and Digital Services Development & Promotion.Keywords: FMoCDE, HTS, NDEPS, nigcomsat!R, pillars
Procedia PDF Downloads 1163422 BigCrypt: A Probable Approach of Big Data Encryption to Protect Personal and Business Privacy
Authors: Abdullah Al Mamun, Talal Alkharobi
Abstract:
As data size is growing up, people are became more familiar to store big amount of secret information into cloud storage. Companies are always required to need transfer massive business files from one end to another. We are going to lose privacy if we transmit it as it is and continuing same scenario repeatedly without securing the communication mechanism means proper encryption. Although asymmetric key encryption solves the main problem of symmetric key encryption but it can only encrypt limited size of data which is inapplicable for large data encryption. In this paper we propose a probable approach of pretty good privacy for encrypt big data using both symmetric and asymmetric keys. Our goal is to achieve encrypt huge collection information and transmit it through a secure communication channel for committing the business and personal privacy. To justify our method an experimental dataset from three different platform is provided. We would like to show that our approach is working for massive size of various data efficiently and reliably.Keywords: big data, cloud computing, cryptography, hadoop, public key
Procedia PDF Downloads 322