Search results for: Internet of Thing
595 A Distributed Cryptographically Generated Address Computing Algorithm for Secure Neighbor Discovery Protocol in IPv6
Authors: M. Moslehpour, S. Khorsandi
Abstract:
Due to shortage in IPv4 addresses, transition to IPv6 has gained significant momentum in recent years. Like Address Resolution Protocol (ARP) in IPv4, Neighbor Discovery Protocol (NDP) provides some functions like address resolution in IPv6. Besides functionality of NDP, it is vulnerable to some attacks. To mitigate these attacks, Internet Protocol Security (IPsec) was introduced, but it was not efficient due to its limitation. Therefore, SEND protocol is proposed to automatic protection of auto-configuration process. It is secure neighbor discovery and address resolution process. To defend against threats on NDP’s integrity and identity, Cryptographically Generated Address (CGA) and asymmetric cryptography are used by SEND. Besides advantages of SEND, its disadvantages like the computation process of CGA algorithm and sequentially of CGA generation algorithm are considerable. In this paper, we parallel this process between network resources in order to improve it. In addition, we compare the CGA generation time in self-computing and distributed-computing process. We focus on the impact of the malicious nodes on the CGA generation time in the network. According to the result, although malicious nodes participate in the generation process, CGA generation time is less than when it is computed in a one-way. By Trust Management System, detecting and insulating malicious nodes is easier.Keywords: NDP, IPsec, SEND, CGA, modifier, malicious node, self-computing, distributed-computing
Procedia PDF Downloads 278594 Digital Self-Care Intervention Evaluation from the Perspective of Healthcare Users
Authors: Dina Ziadlou, Anthony Sunjaya, Joyzen Cortez Ramos, Romario Muñoz Ramos, Richard Dasselaar
Abstract:
This study aimed to evaluate the opinions of users using digital health technologies to prevent, promote, and maintain their health and well-being with or without the support of a healthcare provider to delineate an overview of the future patient journey while considering the strategic initiatives in the digital transformation era. This research collected the opinions of healthcare clients through a structural questionnaire to collect user accessibility, user knowledge, user experience, user engagement, and personalized medicine to investigate the mindset of the users and illustrate their opinions, expectations, needs, and voices about digital self-care expansion. In the realm of digital transformation, the accessibility of users to the internet, digital health platforms, tools, and mobile health applications have revolutionized the healthcare ecosystem toward nurturing informed and empowered patients who are tech-savvy and can take the initiative to be in charge of their health, involved in medical decision-making, and seek digital health innovations to prevent diseases and promote their healthy lifestyles. Therefore, the future of the patient journey is digital self-care intervention in a healthcare ecosystem where the partnership of patients in healthcare services is tied to their health information and action ownership.Keywords: digital health, patient engagement, self-care intervention, digital self-care intervention, digital transformation
Procedia PDF Downloads 36593 Designing and Implementation of MPLS Based VPN
Authors: Muhammad Kamran Asif
Abstract:
MPLS stands for Multi-Protocol Label Switching. It is the technology which replaces ATM (Asynchronous Transfer Mode) and frame relay. In this paper, we have designed a full fledge small scale MPLS based service provider network core network model, which provides communication services (e.g. voice, video and data) to the customer more efficiently using label switching technique. Using MPLS VPN provides security to the customers which are either on LAN or WAN. It protects its single customer sites from being attacked by any intruder from outside world along with the provision of concept of extension of a private network over an internet. In this paper, we tried to implement a service provider network using minimum available resources i.e. five 3800 series CISCO routers comprises of service provider core, provider edge routers and customer edge routers. The customers on the one end of the network (customer side) is capable of sending any kind of data to the customers at the other end using service provider cloud which is MPLS VPN enabled. We have also done simulation and emulation for the model using GNS3 (Graphical Network Simulator-3) and achieved the real time scenarios. We have also deployed a NMS system which monitors our service provider cloud and generates alarm in case of any intrusion or malfunctioning in the network. Moreover, we have also provided a video help desk facility between customers and service provider cloud to resolve the network issues more effectively.Keywords: MPLS, VPN, NMS, ATM, asynchronous transfer mode
Procedia PDF Downloads 331592 Online Formative Assessment Challenges Experienced by Grade 10 Physical Sciences Teachers during Remote Teaching and Learning
Authors: Celeste Labuschagne, Sam Ramaila, Thasmai Dhurumraj
Abstract:
Although formative assessment is acknowledged as crucial for teachers to gauge students’ understanding of subject content, applying formative assessment in an online context is more challenging than in a traditional Physical Sciences classroom. This study examines challenges experienced by Grade 10 Physical Sciences teachers when enacting online formative assessment. The empirical investigation adopted a generic qualitative design and involved three purposively selected Grade 10 Physical Sciences teachers from three different schools and quintiles within the Tshwane North District in South Africa. Data were collected through individual and focus group interviews. Technological, pedagogical, and content knowledge (TPACK) was utilised as a theoretical framework underpinning the study. The study identified a myriad of challenges experienced by Grade 10 Physical Sciences teachers when enacting online formative assessment. These challenges include the utilisation of Annual Teaching Plans, lack of technological knowledge, and internet connectivity. The Department of Basic Education faces the key imperative to provide continuous teacher professional development and concomitant online learning materials that can facilitate meaningful enactment of online formative assessment in various educational settings.Keywords: COVID-19, challenges, online formative assessment, physical sciences, TPACK
Procedia PDF Downloads 66591 Black Protests in Poland: Analysis of Women's Movement in Poland, 2016-2018
Authors: Aneta Ostaszewska
Abstract:
The purpose of this research is to reflect on 'black protests' of women in Poland. 'Black protests' have been organized nationwide since October 2016 as a sign of opposition and resistance to anti-women government’s policy and its attempts to exacerbate abortion law. Women protest not only in the biggest cities (Warsaw, Cracow or Wroclaw) but in over 140 towns and villages all over Poland. The research represents qualitative methodological approach – an active research method. It has involved the observation, description, and analysis of 'black protests' carried out mainly in Warsaw (the capital of Poland). The focus has been on behavior and attitudes of protesting women: protesters’ slogans, statements, and views, the ways of dressing up, ways of participating and involvement in protests. Research also involves the analysis of social media discourse: the analysis of content published by women on social media. Black protests are an example of a grassroots social initiative of women in Poland. What unites women is opposition to government policy. The primary space of communication has become the Internet – especially social media (Facebook). A new social movement 'Dziewuchy dziewuchom' (Girls for girls) has been born as well as organization of 'Ogolnopolski Strajk Kobiet' (Nationwide women's strike) as a result of 'black protest'. These protests and marches became a way of emphasizing women’s subjectivity as well as political and civic activity.Keywords: women, black protests, communitas, experience, Poland, abortion law
Procedia PDF Downloads 375590 Challenges for Interface Designers in Designing Sensor Dashboards in the Context of Industry 4.0
Authors: Naveen Kumar, Shyambihari Prajapati
Abstract:
Industry 4.0 is the fourth industrial revolution that focuses on interconnectivity of machine to machine, human to machine and human to human via Internet of Things (IoT). Technologies of industry 4.0 facilitate communication between human and machine through IoT and forms Cyber-Physical Production System (CPPS). In CPPS, multiple shop floors sensor data are connected through IoT and displayed through sensor dashboard to the operator. These sensor dashboards have enormous amount of information to be presented which becomes complex for operators to perform monitoring, controlling and interpretation tasks. Designing handheld sensor dashboards for supervision task will become a challenge for the interface designers. This paper reports emerging technologies of industry 4.0, changing context of increasing information complexity in consecutive industrial revolutions and upcoming design challenges for interface designers in context of Industry 4.0. Authors conclude that information complexity of sensor dashboards design has increased with consecutive industrial revolutions and designs of sensor dashboard causes cognitive load on users. Designing such complex dashboards interfaces in Industry 4.0 context will become main challenges for the interface designers.Keywords: Industry4.0, sensor dashboard design, cyber-physical production system, Interface designer
Procedia PDF Downloads 128589 Legal Regulation of Personal Information Data Transmission Risk Assessment: A Case Study of the EU’s DPIA
Authors: Cai Qianyi
Abstract:
In the midst of global digital revolution, the flow of data poses security threats that call China's existing legislative framework for protecting personal information into question. As a preliminary procedure for risk analysis and prevention, the risk assessment of personal data transmission lacks detailed guidelines for support. Existing provisions reveal unclear responsibilities for network operators and weakened rights for data subjects. Furthermore, the regulatory system's weak operability and a lack of industry self-regulation heighten data transmission hazards. This paper aims to compare the regulatory pathways for data information transmission risks between China and Europe from a legal framework and content perspective. It draws on the “Data Protection Impact Assessment Guidelines” to empower multiple stakeholders, including data processors, controllers, and subjects, while also defining obligations. In conclusion, this paper intends to solve China's digital security shortcomings by developing a more mature regulatory framework and industry self-regulation mechanisms, resulting in a win-win situation for personal data protection and the development of the digital economy.Keywords: personal information data transmission, risk assessment, DPIA, internet service provider, personal information data transimission, risk assessment
Procedia PDF Downloads 60588 Timescape-Based Panoramic View for Historic Landmarks
Authors: H. Ali, A. Whitehead
Abstract:
Providing a panoramic view of famous landmarks around the world offers artistic and historic value for historians, tourists, and researchers. Exploring the history of famous landmarks by presenting a comprehensive view of a temporal panorama merged with geographical and historical information presents a unique challenge of dealing with images that span a long period, from the 1800’s up to the present. This work presents the concept of temporal panorama through a timeline display of aligned historic and modern images for many famous landmarks. Utilization of this panorama requires a collection of hundreds of thousands of landmark images from the Internet comprised of historic images and modern images of the digital age. These images have to be classified for subset selection to keep the more suitable images that chronologically document a landmark’s history. Processing of historic images captured using older analog technology under various different capturing conditions represents a big challenge when they have to be used with modern digital images. Successful processing of historic images to prepare them for next steps of temporal panorama creation represents an active contribution in cultural heritage preservation through the fulfillment of one of UNESCO goals in preservation and displaying famous worldwide landmarks.Keywords: cultural heritage, image registration, image subset selection, registered image similarity, temporal panorama, timescapes
Procedia PDF Downloads 165587 An Evaluation of Kahoot Application and Its Environment as a Learning Tool
Authors: Muhammad Yasir Babar, Ebrahim Panah
Abstract:
Over the past 20 years, internet has seen continual advancement and with the advent of online technology, various types of web-based games have been developed. Games are frequently being used among different age groups from baby boomers to generation Z. Games are not only used for entertainment but also utilized as a learning approach transmitting education to a level that is more interesting and effective for students. One of the popular web-based education games is Kahoot with growing popularity and usage, which is being used in different fields of studies. However, little knowledge is available on university students’ perception of Kahoot environment and application for learning subjects. Hence, the objective of the current study is to investigate students’ perceptions of Kahoot application and environment as a learning tool. The study employed a survey approach by distributing Google Forms –created questionnaire, with high level of reliability index, to 62 students (11 males and 51 females). The findings show that students have positive attitudes towards Kahoot application and its environment for learning. Regarding Kahoot application, it was indicated that activities created using Kahoot are more interesting for students, Kahoot is useful for collaborative learning, and Kahoot enhances interest in learning lesson. In terms of Kahoot environment, it was found that using this application through mobile is easy for students, its design is simple and useful, Kahoot-created activities can easily be shared, and the application can easily be used on any platform. The findings of the study have implications for instructors, policymakers and curriculum developers.Keywords: application, environment, Kahoot, learning tool
Procedia PDF Downloads 133586 Achieving Sustainable Development through Transformative Pedagogies in Universities
Authors: Eugene Allevato
Abstract:
Developing a responsible personal worldview is central to sustainable development, but achieving quality education to promote transformative learning for sustainability is thus far, poorly understood. Most programs involving education for sustainable development rely on changing behavior, rather than attitudes. The emphasis is on the scientific and utilitarian aspect of sustainability with negligible importance on the intrinsic value of nature. Campus sustainability projects include building sustainable gardens and implementing energy-efficient upgrades, instead of focusing on educating for sustainable development through exploration of students’ values and beliefs. Even though green technology adoption maybe the right thing to do, most schools are not targeting the root cause of the environmental crisis; they are just providing palliative measures. This study explores the under-examined factors that lead to pro-environmental behavior by investigating the environmental perceptions of both college business students and personnel of green organizations. A mixed research approach of qualitative, based on structured interviews, and quantitative instruments was developed including 30 college-level students’ interviews and 40 green organization staff members involved in sustainable activities. The interviews were tape-recorded and transcribed for analysis. Categorization of the responses to the open‐ended questions was conducted with the purpose of identifying the main types of factors influencing attitudes and correlating with behaviors. Overall the findings of this study indicated a lack of appreciation for nature, and inability to understand interconnectedness and apply critical thinking. The results of the survey conducted on undergraduate students indicated that the responses of business and liberal arts students by independent t-test were significantly different, with a p‐value of 0.03. While liberal arts students showed an understanding of human interdependence with nature and its delicate balance, business students seemed to believe that humans were meant to rule over the rest of nature. This result was quite intriguing from the perspective that business students will be defining markets, influencing society, controlling and managing businesses that supposedly, in the face of climate change, shall implement sustainable activities. These alarming results led to the focus on green businesses in order to better understand their motivation to engage in sustainable activities. Additionally, a probit model revealed that childhood exposure to nature has a significantly positive impact in pro-environmental attitudes to most of the New Ecological Paradigm scales. Based on these findings, this paper discusses educators including Socrates, John Dewey and Paulo Freire in the implementation of eco-pedagogy and transformative learning following a curriculum with emphasis on critical and systems thinking, which are deemed to be key ingredients in quality education for sustainable development.Keywords: eco-pedagogy, environmental behavior, quality education for sustainable development, transformative learning
Procedia PDF Downloads 312585 The Hotel Logging Behavior and Factors of Tourists in Bankontee District, Samut Songkhram Province, Thailand
Authors: Aticha Kwaengsopha
Abstract:
The purpose of this research was to study the behaviour and related factors that tourists utilized for making decisions to choose their accommodations at a tourist destination, Bangkontee district, Samut Songkhran Province, Thailand. The independent variables included gender, age, income, occupation, and region, while the three important dependent variables included selection behaviour, factors related selection process, and satisfaction of the accommodation service. A total of 400 Thai and international tourists were interviewed at tourist destination of Bangkontee. A questionnaire was used as the tool for collecting data. Descriptive statistics in this research included percentage, mean, and standard deviation. The findings revealed that the majority of respondents were single, female, and with the age between 23-30 years old. Most of the international tourists were from Asia and planned to stay in Thailand about 1-6 days. In addition, the majority of tourists preferred to travel in small groups of 3 persons. The majority of respondents used internet and word of mouth as the main tool to search for information. The majority of respondents spent most of their budget on food & drink, accommodation, and travelling. Even though the majority of tourists were satisfied with the quality of accommodation, the price range of accommodation, and the image of accommodation and the facilities of the accommodation, they indicated that they were not likely to re-visit Thailand in the near future.Keywords: behaviour, decision factors, tourists, media engineering
Procedia PDF Downloads 275584 Effective Use of Educational Technology for Teaching in Nigerian Colleges of Education
Authors: Edo O. Ekanem, Eme S. Ndeh, Ubong M. Nkok
Abstract:
The role of educational technology in teaching is of great importance because of its systematic way of conceptualizing the execution and evaluation of Educational process. This study therefore examines the use of Educational Technology for teaching in Colleges of Education in south south geo-political zone of Nigeria. Four specific purposes, four research questions and four null hypotheses guided the study. The study adopted descriptive research design of the survey type. A sample of 295 lecturers from six colleges of education was selected using stratified and simple random sampling techniques. The data for this study were collected through a self-designed questionnaire and was analyzed using frequency counts, percentage scores and t-test statistics. The hypotheses for the study were tested at 0.05 significance. Findings from the study reveal that Educational Technology facilities such as Internet, electronic notice boards and projectors were not adequately used for teaching in the Colleges. It was also found that most lecturers use more of visual media than electronic/digital media in the classrooms. Moreover, the study shows that lecturers’ use of educational technology is influenced by their highest academic qualification while their level of awareness about the value of technology in education is not gender based. Lecturers’ lack of competence, inadequate Educational Technology facilities and Power are among the factors that inhibit the adequate use of the facilities. Based on the findings, recommendations were made on how to ensure effective use of Educational Technology for teaching in the Colleges in Nigeria.Keywords: colleges of education, educational technology, teaching, Nigeria
Procedia PDF Downloads 428583 Availability, Accessibility and Utilization of Information and Communication Technology in Teaching and Learning Islamic Studies in Colleges of Education, North-Eastern, Nigeria
Authors: Bello Ali
Abstract:
The use of Information and Communication Technology (ICT) in tertiary institutions by lecturers and students has become a necessity for the enhancement of quality teaching and learning. This study examined availability, accessibility and utilization of ICT in Teaching-Learning Islamic Studies in Colleges of Education, North-East, Nigeria. The study adopted multi-stage sampling technique, in which, five out of the eleven Colleges of Education (both Federal and State owned) were purposively selected for the study. Primary data was drawn from the respondents by the use of questionnaire, interviews and observations. The results of the study, generally, indicate that the availability and accessibility to ICT facilities in Colleges of Education in North-East, Nigeria, especially in teaching/learning delivery of Islamic studies were relatively inadequate and rare to lecturers and students. The study further reveals that the respondents’ level of utilization of ICT is low and only few computer packages and internet services were involved in the ICT utilization, which is yet to reach the real expected situation of the globalization and advancement in the application of ICT if compared to other parts of the world, as far as the teaching and learning of Islamic studies is concerned. Observations and conclusion were drawn from the findings and finally, recommendations on how to improve on ICT availability, accessibility and utilization in teaching/ learning were suggested.Keywords: accessibility, availability, college of education, ICT, Islamic studies, learning, North-East, teaching, utilization
Procedia PDF Downloads 363582 Lightweight Hardware Firewall for Embedded System Based on Bus Transactions
Authors: Ziyuan Wu, Yulong Jia, Xiang Zhang, Wanting Zhou, Lei Li
Abstract:
The Internet of Things (IoT) is a rapidly evolving field involving a large number of interconnected embedded devices. In the design of embedded System-on-Chip (SoC), the key issues are power consumption, performance, and security. However, the easy-to-implement software and untrustworthy third-party IP cores may threaten the safety of hardware assets. Considering that illegal access and malicious attacks against SoC resources pass through the bus that integrates IPs, we propose a Lightweight Hardware Firewall (LHF) to protect SoC, which monitors and disallows the offending bus transactions based on physical addresses. Furthermore, under the LHF architecture, this paper refines two types of firewalls: Destination Hardware Firewall (DHF) and Source Hardware Firewall (SHF). The former is oriented to fine-grained detection and configuration, whose core technology is based on the method of dynamic grading units. In addition, we design the SHF based on static entries to achieve lightweight. Finally, we evaluate the hardware consumption of the proposed method by both Field-Programmable Gate Array (FPGA) and IC. Compared with the exciting efforts, LHF introduces a bus latency of zero clock cycles for every read or write transaction implemented on Xilinx Kintex-7 FPGAs. Meanwhile, the DC synthesis results based on TSMC 90nm show that the area is reduced by about 25% compared with the previous method.Keywords: IoT, security, SoC, bus architecture, lightweight hardware firewall, FPGA
Procedia PDF Downloads 61581 The Role of Media Relations in the Brand Image: Case Study in Three Brands of the Automobile Industry
Authors: Rosa Sobreira, Paula Arriscado
Abstract:
Marketers are aware that media relations is an important touch point, which is also cheaper, to bring their products and their brands to the consumer. They recognize the role of journalists as moderators and transformers of public opinion, and they realize their influence on brand image. And also, they know that readers, listeners, viewers and internet users "believe" more what they read, hear and see in the news than in an advertisement. The study is focused on the automotive industry and analyses the news published about three brands that share industrial facilities and components. We wanted to understand the role of the information created by the brand`s media team in the journalists’ work, and the impact on management, activation and differentiation of brands and their products` attributes and benefits. Based on a qualitative methodology, the analysis focused on press news, making comparison between media coverage and their “narratives” about the three cars from different brands. The results point to the fact that journalists easily integrate speech from the marks on their products. In the case of this study, we found that apart from the description of the many similarities between the three cars, the average speech also "struggled" for revealing the attributes that differentiate them. This interpretation of the results helps us to understand the "marriage" between branding and media. We believe also this paper let us to understand how journalists, through news, join the speech of the brands.Keywords: brand management, media relations, differentiation, positioning
Procedia PDF Downloads 225580 Application of the Mobile Phone for Occupational Self-Inspection Program in Small-Scale Industries
Authors: Jia-Sin Li, Ying-Fang Wang, Cheing-Tong Yan
Abstract:
In this study, an integrated approach of Google Spreadsheet and QR code which is free internet resources was used to improve the inspection procedure. The mobile phone Application(App)was also designed to combine with a web page to create an automatic checklist in order to provide a new integrated information of inspection management system. By means of client-server model, the client App is developed for Android mobile OS and the back end is a web server. It can set up App accounts including authorized data and store some checklist documents in the website. The checklist document URL could generate QR code first and then print and paste on the machine. The user can scan the QR code by the app and filled the checklist in the factory. In the meanwhile, the checklist data will send to the server, it not only save the filled data but also executes the related functions and charts. On the other hand, it also enables auditors and supervisors to facilitate the prevention and response to hazards, as well as immediate report data checks. Finally, statistics and professional analysis are performed using inspection records and other relevant data to not only improve the reliability, integrity of inspection operations and equipment loss control, but also increase plant safety and personnel performance. Therefore, it suggested that the traditional paper-based inspection method could be replaced by the APP which promotes the promotion of industrial security and reduces human error.Keywords: checklist, Google spreadsheet, APP, self-inspection
Procedia PDF Downloads 118579 The Influence of Job Recognition and Job Motivation on Organizational Commitment in Public Sector: The Mediation Role of Employee Engagement
Authors: Muhammad Tayyab, Saba Saira
Abstract:
It is an established fact that organizations across the globe consider employees as their assets and try to advance their well-being. However, the local firms of developing countries are mostly profit oriented and do not have much concern about their employees’ engagement or commitment. Like other developing countries, the local organizations of Pakistan are also less concerned about the well-being of their employees. Especially public sector organizations lack concern regarding engagement, satisfaction or commitment of the employees. Therefore, this study aimed at investigating the impact of job recognition and job motivation on organizational commitment in the mediation role of employee engagement. The data were collected from land record officers of board of revenue, Punjab, Pakistan. Structured questionnaire was used to collect data through physically visiting land record officers and also through the internet. A total of 318 land record officers’ responses were finalized to perform data analysis. The data were analyzed through confirmatory factor analysis and structural equation modeling technique. The findings revealed that job recognition and job motivation have direct as well as indirect positive and significant impact on organizational commitment. The limitations, practical implications and future research indications are also explained.Keywords: job motivation, job recognition, employee engagement, employee commitment, public sector, land record officers
Procedia PDF Downloads 132578 Social Media Creating Communication Gap among Individuals
Authors: Muneeza Anwar, Muniba Raza, Zunahs Khalid
Abstract:
The study discusses the communication gap that has been created due to excessive use of social networking websites such as Facebook, WhatsApp, Viber etc. In this growing world of technology and awareness among people about social media it has also increased its usage. The objective of this study is to measure the ways the internet is affecting the communications among individuals through social media and to check whether this is affecting the society in a positive manner. The study signifies the theoretical and practical aspects of communication gaps among the individuals through social media. The study is conducted to check whether social networking websites are the main causes of creating communication gap among individuals. In this world of fast growing technology every day, there is a new invention, affecting the lives of people both directly and indirectly. Moreover with the usage of technology people keep updating about themselves, about different events happening around their surrounding by creating events, uploading pictures, checking in different place, and creating awareness among people who are not aware of people about what is happening. From the study, we deduced how social media is affecting individual’s life. The findings suggest that social media is although creating communication gaps among people but is also bridging them. Showing that social media is one of the causes that is creating communication gap among the individuals. Communication gap has although increased on a daily basis but on average it has remained the same as they are communicating on social networking websites but eventually decreasing the communication on personal grounds.Keywords: communication gaps, usage of social networking websites, interaction with friends and family, social media
Procedia PDF Downloads 483577 Survival and Growth Factors of Korean Start-Ups: Focusing on the Industrial Characteristics
Authors: Hanei Son
Abstract:
Since the beginning of the 2010s, ‘start-up boom’ has continued with the creation of many new enterprises in Korea. Such tendency was led by various changes in society such as emergence and diffusion of smartphones. Especially, the Korean government has been interested in start-ups and entrepreneurship as an alternative engine for Korea's economic growth. With strong support from the government, as a result, many new enterprises have been established for recent years and the Korean government seems to have achieved its goal: expanding the basis of start-ups. However, it is unclear which factors affect the survival and growth of these new enterprises after their creation. Therefore, this study aims to identify which start-ups from early 2010s survived and which factors influenced their survival and growth. The study will strongly focus on which industries the new enterprises were in, as environmental elements are expected to be critical factors for business of start-ups in Korean context. For this purpose, 105 companies which were introduced as high potential start-ups from 2010 to 2012 were considered in the analysis. According to their current status, dead or alive, the start-ups were categorized by their industries and service area. Through this analysis, it was observed that many start-ups that are still in business are in internet or mobile platform businesses and four major sectors. In each group, a representative case has been studied to reveal its survival and growth factors. The results point to the importance of industrial characteristics for the survival and success of Korean startups and offer political implications in which sector and business more potentials for start-ups in Korea lie in.Keywords: government support for start-ups, industrial characteristics, Korean start-ups, survival of start-ups
Procedia PDF Downloads 186576 Using IoT on Single Input Multiple Outputs (SIMO) DC–DC Converter to Control Smart-home
Authors: Auwal Mustapha Imam
Abstract:
The aim of the energy management system is to monitor and control utilization, access, optimize and manage energy availability. This can be realized through real-time analyses and energy sources and loads data control in a predictive way. Smart-home monitoring and control provide convenience and cost savings by controlling appliances, lights, thermostats and other loads. There may be different categories of loads in the various homes, and the homeowner may wish to control access to solar-generated energy to protect the storage from draining completely. Controlling the power system operation by managing the converter output power and controlling how it feeds the appliances will satisfy the residential load demand. The Internet of Things (IoT) provides an attractive technological platform to connect the two and make home automation and domestic energy utilization easier and more attractive. This paper presents the use of IoT-based control topology to monitor and control power distribution and consumption by DC loads connected to single-input multiple outputs (SIMO) DC-DC converter, thereby reducing leakages, enhancing performance and reducing human efforts. A SIMO converter was first developed and integrated with the IoT/Raspberry Pi control topology, which enables the user to monitor and control power scheduling and load forecasting via an Android app.Keywords: flyback, converter, DC-DC, photovoltaic, SIMO
Procedia PDF Downloads 46575 Explaining the Changes in Contentious Politics of China: A Comparative Study of Falun Gong and 'Diaosi'
Authors: Larry Lai, Evans Leung
Abstract:
Falun gong is a self-proclaimed religious group that has been under crackdown by Beijing for more than two decades. Diaosi, on the other hand, is an emerging community with members loosely connected on the internet through different online social platforms, centering around the sharing of different hobbies and interests. Diaosi community has been transformed from a potential threat to the Chinese authority for different causes to a pro-government force. This paper seeks to explain the different strategies adopted by the People's Republic of China (PRC) regime in handling these two potential threatening communities. Both communities share some obvious similarities: (1) both have massive nation-wide participation; (2) both have attempted to challenge the PRC's authority through contentious means; (3) both have high level of mobility, online or offline; and (4) both have at first been unnoticed until the threat against the PRC have taken form. But the strategies the PRC endorsed against the communities were, in many ways, different. The question is: if the strategy against Falun Gong has been an effective one, why used other strategies against Diaosi? The authors argue that the main reason for using different strategies lies in the differences between the two communities in terms of (i) the nature of the groups, and (ii) the group dynamics. Lastly, based on this analysis, the authors attempt to explore the possible strategies that the PRC would adopt against the Hong Kong cyber-world political community in light of the latest national security law in Hong Kong.Keywords: contentious politics, Diaosi, Falun Gong, Hong Kong, People's Republic of China
Procedia PDF Downloads 145574 An Enhanced SAR-Based Tsunami Detection System
Authors: Jean-Pierre Dubois, Jihad S. Daba, H. Karam, J. Abdallah
Abstract:
Tsunami early detection and warning systems have proved to be of ultimate importance, especially after the destructive tsunami that hit Japan in March 2012. Such systems are crucial to inform the authorities of any risk of a tsunami and of the degree of its danger in order to make the right decision and notify the public of the actions they need to take to save their lives. The purpose of this research is to enhance existing tsunami detection and warning systems. We first propose an automated and miniaturized model of an early tsunami detection and warning system. The model for the operation of a tsunami warning system is simulated using the data acquisition toolbox of Matlab and measurements acquired from specified internet pages due to the lack of the required real-life sensors, both seismic and hydrologic, and building a graphical user interface for the system. In the second phase of this work, we implement various satellite image filtering schemes to enhance the acquired synthetic aperture radar images of the tsunami affected region that are masked by speckle noise. This enables us to conduct a post-tsunami damage extent study and calculate the percentage damage. We conclude by proposing improvements to the existing telecommunication infrastructure of existing warning tsunami systems using a migration to IP-based networks and fiber optics links.Keywords: detection, GIS, GSN, GTS, GPS, speckle noise, synthetic aperture radar, tsunami, wiener filter
Procedia PDF Downloads 392573 Conceptualising Queercide: A Quantitative Desktop Exploration of the Technical Frames Used in Online Repors of Lesbian Killings in South Africa
Authors: Marchant Van Der Schyff
Abstract:
South Africa remains one of the most dangerous places for women – lesbians in particular – to live freely and safely, where a culture of patriarchy and a lack of socio-economic opportunity are ubiquitous throughout its communities. While the Internet has given a wider platform to provide insights to issues plaguing lesbians, very little information exists regarding the elements used in the construction of these online reports. This is not only due to the lack of language required to contextualise lesbian issues, but also persistent institutional and societal homophobia. This article describes the technical frames used in the online news reporting of four case studies of ‘queercide’. Through using a thematic coding sheet, data was collected from 70 online articles purposively selected based on priori population characteristics. The study found technical elements, such as the length of online reports, credible sources used, ‘code driven’-, and ‘user driven’ elements which were identified in the coded online articles. From the conclusions some clear trends emerged enabling the construction of a Venn-type diagram which present insights to how the murder of lesbians (referred to as ‘queercide’ in the article) is being reported on by online news media compared to the contemporary theoretical discussions on how these cases should be reported on.Keywords: journalism, lesbian murder, queercide, technical frames, reporting, online
Procedia PDF Downloads 72572 The Death of Ruan Lingyu: Leftist Aesthetics and Cinematic Reality in the 1930s Shanghai
Authors: Chen Jin
Abstract:
This topic seeks to re-examine the New Women Incident in 1935 Shanghai from the perspective of the influence of leftist cinematic aesthetics on public discourse in 1930s Shanghai. Accordingly, an original means of interpreting the death of Ruan Lingyu will be provided. On 8th March 1935, Ruan Lingyu, the queen of Chinese silent film, committed suicide through overdosing on sleeping tablets. Her last words, ‘gossip is fearful thing’, interlinks her destiny with the protagonist she played in the film The New Women (Cai Chusheng, 1935). The coincidence was constantly questioned by the masses following her suicide, constituting the enduring question: ‘who killed Ruan Lingyu?’ Responding to this query, previous scholars primarily analyze the characters played by women -particularly new women as part of the leftist movement or public discourse of 1930s Shanghai- as a means of approaching the truth. Nevertheless, alongside her status as a public celebrity, Ruan Lingyu also plays as a screen image of mechanical reproduction. The overlap between her screen image and personal destiny attracts limited academic focus in terms of the effect and implications of leftist aesthetics of reality in relation to her death, which itself has provided impetus to this research. With the reconfiguration of early Chinese film theory in the 1980s, early discourses on the relationship between cinematic reality and consciousness proposed by Hou Yao and Gu Kenfu in the 1920s are integrated into the category of Chinese film ontology, which constitutes a transcultural contrast with the Euro-American ontology that advocates the representation of reality. The discussion of Hou and Gu overlaps cinematic reality with effect, which emphasizes the empathy of cinema that is directly reflected in the leftist aesthetics of the 1930s. As the main purpose of leftist cinema is to encourage revolution through depicting social reality truly, Ruan Lingyu became renowned for her natural and realistic acting proficiency, playing leading roles in several esteemed leftist films. The realistic reproduction and natural acting skill together constitute the empathy of leftist films, which establishes a dialogue with the virtuous female image within the 1930s public discourse. On this basis, this research considers Chinese cinematic ontology and affect theory as the theoretical foundation for investigating the relationship between the screen image of Ruan Lingyu reproduced by the leftist film The New Women and the female image in the 1930s public discourse. Through contextualizing Ruan Lingyu’s death within the Chinese leftist movement, the essay indicates that the empathy embodied within leftist cinematic reality limits viewers’ cognition of the actress, who project their sentiments for the perfect screen image on to Ruan Lingyu’s image in reality. Essentially, Ruan Lingyu is imprisoned in her own perfect replication. Consequently, this article states that alongside leftist anti-female consciousness, the leftist aesthetics of reality restricts women in a passive position within public discourse, which ultimately plays a role in facilitating the death of Ruan Lingyu.Keywords: cinematic reality, leftist aesthetics, Ruan Lingyu, The New Women
Procedia PDF Downloads 119571 Assets Misappropriation in the Malaysian Public and Private Sectors
Authors: I. K. Norziaton, M. D. Ridhuan, A. N. Nur Adura
Abstract:
Assets misappropriation is becoming a major concern in organizations. Over the years, the Malaysian Auditor General has reported high occurrences of assets misappropriation at the federal, state and even local governments. It is surprising that assets misappropriation is not the only major concern in the public sector but it has also indicates a common sight in private sector. The current situation is rather disconcerting because employees are accountable to perform their jobs at the interest of the organizations. Various researches in the past has found that the incidence of assets misappropriation occurs when employees used the official vehicles, internet connection, computers, stationery and facilities for personal and family benefits. The issue of assets misappropriation has continue to be a major concern for organizations and its impact on the reputation and financial health can be enormous. Even though the issue seems to be trivial, yet, if it is left untreated, the symptoms will become an incurable disease that it will cause major leakages to the organizations. Hence, this paper highlights the common practices of assets misappropriation in public and private sectors. It also discusses why the acts of assets misappropriation occurs. Using the data through questionnaire survey, a total of 250 questionnaires were distributed to the private and public sectors employees. However 173 (69.2%) were returned and usable. This paper concludes that it is vital to promote awareness to the public and private sectors employees on issues of assets misappropriation. Assets misappropriation could have been avoided provided that the officers in charge are more vigilant, competent and practice high level of integrity in discharging their responsibilities towards the organizations.Keywords: assets misappropriation, fraud, public sector, private sector
Procedia PDF Downloads 197570 The Impacts of Social Media and Digital Environment on the Contemporary Arabic Literature: A Case Study about the Works of Ahlam Mosteghanemi
Authors: Zohreh Ghorbani Madavani, Masoumeh Mikaeili
Abstract:
Social media, as one of the main tools in today’s world, imposes deep impacts on human life, particularly in various cultural and literary areas. By providing platforms for direct communication between writers and audiences, these spaces have made great changes in the styles of literary works, writing, and publishing. The impacts of digital communication are very visible not only in the content of literary works but also in narrative structures, writing styles, and interaction of writers with audiences. Applying an analytical-descriptive approach, the present study investigates the impacts of internet communications and social media on the literary works of the Arab world and describes some instances of such impacts on the works of one of the most reputed contemporary Arab novelists, Ahlam Mosteghanemi. In this study, we specifically emphasize on changes of themes, narrative techniques and writing styles of Mosteghanemi and investigate how she leverages digital environment facilities and potentials in creating works suited to her audiences’ needs and expectations. This study indicates that social media has significantly helped the democratization of authorship and diversity in contemporary Arabic literature and has enabled writers to have more direct and interactive relationship.Keywords: social media, digital impacts, narrative changes, writing style, contemporary literature, Ahlam Mosteghanemi
Procedia PDF Downloads 18569 Phishing Detection: Comparison between Uniform Resource Locator and Content-Based Detection
Authors: Nuur Ezaini Akmar Ismail, Norbazilah Rahim, Norul Huda Md Rasdi, Maslina Daud
Abstract:
A web application is the most targeted by the attacker because the web application is accessible by the end users. It has become more advantageous to the attacker since not all the end users aware of what kind of sensitive data already leaked by them through the Internet especially via social network in shake on ‘sharing’. The attacker can use this information such as personal details, a favourite of artists, a favourite of actors or actress, music, politics, and medical records to customize phishing attack thus trick the user to click on malware-laced attachments. The Phishing attack is one of the most popular attacks for social engineering technique against web applications. There are several methods to detect phishing websites such as Blacklist/Whitelist based detection, heuristic-based, and visual similarity-based detection. This paper illustrated a comparison between the heuristic-based technique using features of a uniform resource locator (URL) and visual similarity-based detection techniques that compares the content of a suspected phishing page with the legitimate one in order to detect new phishing sites based on the paper reviewed from the past few years. The comparison focuses on three indicators which are false positive and negative, accuracy of the method, and time consumed to detect phishing website.Keywords: heuristic-based technique, phishing detection, social engineering and visual similarity-based technique
Procedia PDF Downloads 177568 A Comparative Study of Primary Revenue Sources in the U.S. Professional Sports, Intercollegiate Sports, and Sporting Goods Industry
Authors: Chenghao Ma
Abstract:
This paper mainly examines and compares the primary revenue sources in the professional sports, intercollegiate sports, and sporting goods industries in the U.S. In the professional team sport, revenues may come from different resources, including broadcasting rights, ticket sales, corporate partnerships, naming rights, licensed merchandise, luxury suites, club seating, ancillary activities, and transfer fees. Many universities use university budgets and student fees to cover the cost of collegiate athletics. Other sources of revenue include ticket sales, broadcast rights, concessions, corporate partnerships, cash contributions from alumni, and others. Revenues in the sporting goods industry are very different compared with professional sports teams and collegiate athletics. Sporting goods companies mainly sell a line of products and equipment to generate revenue. Revenues are critical for sports organizations, including professional sports teams, intercollegiate athletics, and sporting goods companies. There are similarities and differences among these areas. Sports managers are looking for new ways to generate revenues, and there are many changes of sources because of the development of the internet and technology. Compared with intercollegiate athletics, professional sport and sporting goods companies will create more revenue opportunities globally.Keywords: revenue sources, professional sports, intercollegiate athletics, sporting goods industry
Procedia PDF Downloads 220567 A Cellular-Based Structural Health Monitoring Device (HMD) Based on Cost-Effective 1-Axis Accelerometers
Authors: Chih-Hsing Lin, Wen-Ching Chen, Chih-Ting Kuo, Gang-Neng Sung, Chih-Chyau Yang, Chien-Ming Wu, Chun-Ming Huang
Abstract:
This paper proposes a cellular-based structure health monitoring device (HMD) for temporary bridge monitoring without the requirement of power line and internet service. The proposed HMD includes sensor node, power module, cellular gateway, and rechargeable batteries. The purpose of HMD focuses on short-term collection of civil infrastructure information. It achieves the features of low cost by using three 1-axis accelerometers with data synchronization problem being solved. Furthermore, instead of using data acquisition system (DAQ) sensed data is transmitted to Host through cellular gateway. Compared with 3-axis accelerometer, our proposed 1-axis accelerometers based device achieves 50.5% cost saving with high sensitivity 2000mv/g. In addition to fit different monitoring environments, the proposed system can be easily replaced and/or extended with different PCB boards, such as communication interfaces and sensors, to adapt to various applications. Therefore, with using the proposed device, the real-time diagnosis system for civil infrastructure damage monitoring can be conducted effectively.Keywords: cellular-based structural health monitoring, cost-effective 1-axis accelerometers, short-term monitoring, structural engineering
Procedia PDF Downloads 517566 The Ontological Memory in Bergson as a Conceptual Tool for the Analysis of the Digital Conjuncture
Authors: Douglas Rossi Ramos
Abstract:
The current digital conjuncture, called by some authors as 'Internet of Things' (IoT), 'Web 2.0' or even 'Web 3.0', consists of a network that encompasses any communication of objects and entities, such as data, information, technologies, and people. At this juncture, especially characterized by an "object socialization," communication can no longer be represented as a simple informational flow of messages from a sender, crossing a channel or medium, reaching a receiver. The idea of communication must, therefore, be thought of more broadly in which it is possible to analyze the process communicative from interactions between humans and nonhumans. To think about this complexity, a communicative process that encompasses both humans and other beings or entities communicating (objects and things), it is necessary to constitute a new epistemology of communication to rethink concepts and notions commonly attributed to humans such as 'memory.' This research aims to contribute to this epistemological constitution from the discussion about the notion of memory according to the complex ontology of Henri Bergson. Among the results (the notion of memory in Bergson presents itself as a conceptual tool for the analysis of posthumanism and the anthropomorphic conjuncture of the new advent of digital), there was the need to think about an ontological memory, analyzed as a being itself (being itself of memory), as a strategy for understanding the forms of interaction and communication that constitute the new digital conjuncture, in which communicating beings or entities tend to interact with each other. Rethinking the idea of communication beyond the dimension of transmission in informative sequences paves the way for an ecological perspective of the digital dwelling condition.Keywords: communication, digital, Henri Bergson, memory
Procedia PDF Downloads 164