Search results for: never users
1127 Examples of Techniques and Algorithms Used in Wlan Security
Authors: Vahid Bairami Rad
Abstract:
Wireless communications offer organizations and users many benefits such as portability and flexibility, increased productivity, and lower installation costs. Wireless networks serve as the transport mechanism between devices and among devices and the traditional wired networks (enterprise networks and the internet). Wireless networks are many and diverse but are frequently categorized into three groups based on their coverage range: WWAN, WLAN, and WPAN. WWAN, representing wireless wide area networks, includes wide coverage area technologies such as 2G cellular, Cellular Digital Packet Data (CDPD), Global System for Mobile Communications (GSM), and Mobitex. WLAN, representing wireless local area networks, includes 802.11, Hyper lan, and several others. WPAN, represents wireless personal area network technologies such as Bluetooth and Infrared. The security services are provided largely by the WEP (Wired Equivalent Privacy) protocol to protect link-level data during wireless transmission between clients and access points. That is, WEP does not provide end-to-end security but only for the wireless portion of the connection.Keywords: wireless lan, wired equivalent privacy, wireless network security, wlan security
Procedia PDF Downloads 5711126 Identification of Location Parameters for Different User Types of the Inner-City Building Stock: An Austrian Example
Authors: Bernhard Bauer, Thomas Meixner, Amir Dini, Detlef Heck
Abstract:
The inner city building stock is characterized by different types of buildings of different decades and centuries and different types of historical constructions. Depending on the natural growth of a city, those types are often located in downtown areas and the surrounding suburbs. Since the population is becoming older and the variation of the different social requirements spread with the so-called 'Silver Society', city quarters have to be seen alternatively. If an area is very attractive for young students to live there because of the busy nightlife, it might not be suitable for the older society. To identify 'Location Types A, B, C' for different user groups, qualitative interviews with 24 citizens of the city of Graz (Austria) have been carried out, in order to identify the most important values for making a location or city quarter 'A', 'B', or 'C'. Furthermore these acknowledgements have been put into a softwaretool for predicting locations that are the most suitable for certain user groups. On the other hands side, investors or owners of buildings can use the tool for determining the most suitable user group for the location of their building or construction project in order to adapt the project or building stock to the requirements of the users.Keywords: building stock, location parameters, inner city population, built environment
Procedia PDF Downloads 3141125 The Role of Urban Design in Creating Cohesive and People’s Public Spaces
Authors: Hazem Abuorf
Abstract:
From the perspective of viewing urban design as the architecture of public spaces, the latter has many advantages; for example, in achieving attractive and vibrant public spaces, ensuring safety and amenity, supporting a strong sense of place and local character. Besides all advantages, such spaces nevertheless trigger numerous dilemmas, how to design urban spaces preserving the quality of life in the long term while equally achieving cohesion between new urban developments and the already existing urban structure without causing a split in history through the cause of functional and aesthetic degradation. Analysis of this article seeks to propose a methodology deemed essential for assessing and stimulating design criteria of the public spaces when rehabilitating urban sites. The method’s utility is shown by analyzing rehabilitation projects in Gaza Strip, whose design of the public spaces has mainly focused on the physical aspect ignoring the place’s local identity, users’ needs, and history. The proposed methodology serves as a guide for municipal authorities and technical teams to deal with interventions that would rework the role of urban design towards making sense of place.Keywords: urban design, public realm, rehabilitation projects, quality of life
Procedia PDF Downloads 1611124 Challenges in Promoting Software Usability and Applying Principles of Usage-Centred Design in Saudi Arabia
Authors: Kholod J. Alotaibi, Andrew M. Gravell
Abstract:
A study was conducted in which 212 software developers in higher education institutions in Saudi Arabia were surveyed to gather an indication of their understanding of the concept of usability, their acceptance of its importance, and to see how well its principles are applied. Interviews were then held with 20 of these developers, and a demonstration of Usage-Centred Design was attempted, a highly usability focused software development methodology, at one select institution for its redesign of an e-learning exam system interface during the requirements gathering phase. The study confirms the need to raise awareness of usability and its importance, and for Usage-Centred Design to be applied in its entirety, also need to encourage greater consultation with potential end-users of software and collaborative practices. The demonstration of Usage-Centred Design confirmed its ability to capture usability requirements more completely and precisely than would otherwise be the case, and hence its usefulness for developers concerned with improving software usability. The concluding discussion delves on the challenges for promoting usability and Usage-Centred Design in light of the research results and findings and recommendations are made for the same.Keywords: usability, usage-centred, applying principles of usage-centred, Saudi Arabia
Procedia PDF Downloads 3951123 An Accidental Forecasting Modelling for Various Median Roads
Authors: Pruethipong Xinghatiraj, Rajwanlop Kumpoopong
Abstract:
Considering the current situation of road safety, Thailand has the world’s second-highest road fatality rate. Therefore, decreasing the road accidents in Thailand is a prime policy of the Thai government seeking to accomplish. One of the approaches to reduce the accident rate is to improve road environments to fit with the local behavior of the road users. The Department of Highways ensures that choosing the road median types right to the road characteristics, e.g. roadside characteristics, traffic volume, truck traffic percentage, etc., can decrease the possibility of accident occurrence. Presently, raised median, depressed median, painted median and median barriers are typically used in Thailand Highways. In this study, factors affecting road accident for each median type will be discovered through the analysis of the collecting of accident data, death numbers on sample of 600 Kilometers length across the country together with its roadside characteristics, traffic volume, heavy vehicles percentage, and other key factors. The benefits of this study can assist the Highway designers to select type of road medians that can match local environments and then cause less accident prone.Keywords: highways, road safety, road median, forecasting model
Procedia PDF Downloads 2691122 Maintaining User-Level Security in Short Message Service
Authors: T. Arudchelvam, W. W. E. N. Fernando
Abstract:
Mobile phone has become as an essential thing in our life. Therefore, security is the most important thing to be considered in mobile communication. Short message service is the cheapest way of communication via the mobile phones. Therefore, security is very important in the short message service as well. This paper presents a method to maintain the security at user level. Different types of encryption methods are used to implement the user level security in mobile phones. Caesar cipher, Rail Fence, Vigenere cipher and RSA are used as encryption methods in this work. Caesar cipher and the Rail Fence methods are enhanced and implemented. The beauty in this work is that the user can select the encryption method and the key. Therefore, by changing the encryption method and the key time to time, the user can ensure the security of messages. By this work, while users can safely send/receive messages, they can save their information from unauthorised and unwanted people in their own mobile phone as well.Keywords: SMS, user level security, encryption, decryption, short message service, mobile communication
Procedia PDF Downloads 3981121 Genres of Communication and Readers’ Reactions: Popular Science Magazines on Facebook
Authors: Artur Daniel Ramos Modolo
Abstract:
Popular science magazines are an important way to communicate scientific information to lay audience in science. Since the popularization of social networking sites (SNSs) such as Facebook and Twitter, these magazines are trying to adapt their content to these new media. In this study, one hundred posts of popular science magazines on Facebook are analyzed regarding the use of genres of communication and readers’ reactions. The quantitative analysis of these features considers the variety of genres and how the users of Facebook answer to them (liking, sharing and commenting). The first hypothesis was that these magazines used the genres of communication posted on Facebook both to marketing and informational purposes and that these mixed intentions have an impact in the number of readers’ reactions. In order to analyze these features, twenty timeline posts published by five magazines: Cosmos, Galileu, New Scientist, Scientific American and Superinteressante were gathered during the period of three days (6th November 2015–8th November 2015). This research shows that the hyperlinks posted by these magazines created ways to diversify the communication genres used on their pages and, at the same time, revealed that, overall, readers react quantitatively different to these genres.Keywords: Facebook, genres of communication, likes, popular science magazines, social networking sites
Procedia PDF Downloads 4031120 Cooperative Diversity Scheme Based on MIMO-OFDM in Small Cell Network
Authors: Dong-Hyun Ha, Young-Min Ko, Chang-Bin Ha, Hyoung-Kyu Song
Abstract:
In Heterogeneous network (HetNet) can provide high quality of a service in a wireless communication system by composition of small cell networks. The composition of small cell networks improves cell coverage and capacity to the mobile users.Recently, various techniques using small cell networks have been researched in the wireless communication system. In this paper, the cooperative scheme obtaining high reliability is proposed in the small cell networks. The proposed scheme suggests a cooperative small cell system and the new signal transmission technique in the proposed system model. The new signal transmission technique applies a cyclic delay diversity (CDD) scheme based on the multiple input multiple output-orthogonal frequency division multiplexing (MIMO-OFDM) system to obtain improved performance. The improved performance of the proposed scheme is confirmed by the simulation results.Keywords: adaptive transmission, cooperative communication, diversity gain, OFDM
Procedia PDF Downloads 5051119 3D Virtualization through Data Collected from Measurements of Mobile Signal Reception Power Levels (LTE) Band at Escuela Superior Politécnica de Chimborazo in Riobamba-Ecuador
Authors: Sandra Cuenca, Steven Chango, Fabian Chamba, Alexandra Vaca
Abstract:
This project addresses a representation of a virtual environment based on the analysis of the RSRP (Reference Signal Received Power) obtained by the Network Cell Info Lite application at the Escuela Superior Politécnica de Chimborazo (ESPOCH) considering the open areas of the Business Administration Department in the 4G LTE Frequency (band 2) of Claro Telephony at a frequency of 1967. 5 MHz, where measurements were performed from 17:00 UTC-05:00. The indicators required for the simulation of the environment designed in sketchup were focused especially on the power levels obtained where it was possible to represent the scenario with real power values obtained in each concentric radius of a total of 3 campaigns of 200 samples each, where the values vary between 84.6 dBm to 115.5 dBm having average power values for each of the 23 radiuses which are introduced in a virtual environment, allowing users to immerse themselves in it, where they can explore 3D virtual environments, generating a color scale from 0 to 10 with red being the weakest signal and green the signal with the best intensity.Keywords: virtualization, LTE, radios, power intensity levels colors, mobile signal reception power
Procedia PDF Downloads 911118 Monitoring System for Electronic Procurement Systems
Authors: Abdulah Fajar
Abstract:
Electronic Procurement System has been implemented at government institution in Indonesia. This system has been developed centrally at Institution of National Procurement Policy (LKPP) and implemented autonomously at either local or national government institution. The lack of competency at many institution on Information Technology Management arise several major problems. The main concern of LKPP to local administrator is assured that the system is running normally and always be able to serve the needs of its users. Monitoring system has been identified as the one of solution to prevent the problems appeared. Monitoring system is developed using Simple Network Management Protocol (SNMP) and implemented at LKPP. There are two modules; Main Dashboard and Local Agent. Main Dashboard is intended for LKPP and Local Agent is intended to implement at local autonomous e-procurement system (LPSE). There are several resources that must be monitored such as computation, memory and network traffic. Agile paradigm is applied to this project to assure user and system requirement is met. The length of project is the one of reason why agile paradigm has been chosen. The system has been successfully delivered to LKPP.Keywords: procurement system, SNMP, LKPP, LPSE
Procedia PDF Downloads 4281117 1D Convolutional Networks to Compute Mel-Spectrogram, Chromagram, and Cochleogram for Audio Networks
Authors: Elias Nemer, Greg Vines
Abstract:
Time-frequency transformation and spectral representations of audio signals are commonly used in various machine learning applications. Training networks on frequency features such as the Mel-Spectrogram or Cochleogram have been proven more effective and convenient than training on-time samples. In practical realizations, these features are created on a different processor and/or pre-computed and stored on disk, requiring additional efforts and making it difficult to experiment with different features. In this paper, we provide a PyTorch framework for creating various spectral features as well as time-frequency transformation and time-domain filter-banks using the built-in trainable conv1d() layer. This allows computing these features on the fly as part of a larger network and enabling easier experimentation with various combinations and parameters. Our work extends the work in the literature developed for that end: First, by adding more of these features and also by allowing the possibility of either starting from initialized kernels or training them from random values. The code is written as a template of classes and scripts that users may integrate into their own PyTorch classes or simply use as is and add more layers for various applications.Keywords: neural networks Mel-Spectrogram, chromagram, cochleogram, discrete Fourrier transform, PyTorch conv1d()
Procedia PDF Downloads 2371116 Functional Neural Network for Decision Processing: A Racing Network of Programmable Neurons Where the Operating Model Is the Network Itself
Authors: Frederic Jumelle, Kelvin So, Didan Deng
Abstract:
In this paper, we are introducing a model of artificial general intelligence (AGI), the functional neural network (FNN), for modeling human decision-making processes. The FNN is composed of multiple artificial mirror neurons (AMN) racing in the network. Each AMN has a similar structure programmed independently by the users and composed of an intention wheel, a motor core, and a sensory core racing at a specific velocity. The mathematics of the node’s formulation and the racing mechanism of multiple nodes in the network will be discussed, and the group decision process with fuzzy logic and the transformation of these conceptual methods into practical methods of simulation and in operations will be developed. Eventually, we will describe some possible future research directions in the fields of finance, education, and medicine, including the opportunity to design an intelligent learning agent with application in AGI. We believe that FNN has a promising potential to transform the way we can compute decision-making and lead to a new generation of AI chips for seamless human-machine interactions (HMI).Keywords: neural computing, human machine interation, artificial general intelligence, decision processing
Procedia PDF Downloads 1271115 Mobile WiMAX Network based Wireless Communication on Rail: An Analysis
Authors: Vinod Kumar Jatav, Dr. Vrijendra Singh
Abstract:
WiMAX is an emerging wireless technology designed by WiMAX forum. WiMAX technology delivers broadband internet access with QoS, mobility and robust security. WiMAX is among the prominent mobile broadband wireless technology which laid the foundation for the next generation networks (NGN). The next-generation communication system for railway should facilitate high level network availability, fast mobility for high speed trains with reliability, high handover rate, the firmness of train operations, and high QoS. The system should also be capable to provide various railway services by transmitting big data efficiently. One of the most promising technologies for the next generation railway wireless communication is Mobile WiMAX. This paper analyses some of the network architectures for railway wireless communication and considers the elementary concepts to facilitate the users with broadband internet access on trains. The paper aims to recognize the suitability of Mobile WiMAX technology for the special requirements of broadband internet facilities and wireless telecommunication services of Railways.Keywords: Broadband internet, IEEE 802.16e, mobile WiMAX, Railway wireless communication
Procedia PDF Downloads 5261114 The Status of BIM Adoption in Six Continents
Authors: Wooyoung Jung, Ghang Lee
Abstract:
This paper paper reports the worldwide status of building information modeling (BIM) adoption from the perspectives of the engagement level, the Hype Cycle model, the technology diffusion model, and BIM-uses. An online survey was distributed, and 156 experts from six continents responded. Overall, North America was the most advanced continent, followed by Oceania and Europe. Countries in Asia perceived their phase mainly as slope of enlightenment (mature) in the Hype Cycle model. In the technology diffusion model, the main BIM-users worldwide were “early majority” (third phase), but those in the Middle East/Africa and South America were “early adopters” (second phase). In addition, the more advanced the country, the more number of BIM services employed in general. In summary, North America, Europe, Oceania, and Asia were advancing rapidly toward the mature stage of BIM, whereas the Middle East/Africa and South America were still in the early phase. The simple indexes used in this study may be used to track the worldwide status of BIM adoption in long-term surveys.Keywords: BIM adoption, BIM services, hype cycle model, technology diffusion model
Procedia PDF Downloads 5601113 Extending the Theory of Planned Behaviour to Predict Intention to Commute by Bicycle: Case Study of Mexico City
Authors: Magda Cepeda, Frances Hodgson, Ann Jopson
Abstract:
There are different barriers people face when choosing to cycle for commuting purposes. This study examined the role of psycho-social factors predicting the intention to cycle to commute in Mexico City. An extended version of the theory of planned behaviour was developed and utilized with a simple random sample of 401 road users. We applied exploratory and confirmatory factor analysis and after identifying five factors, a structural equation model was estimated to find the relationships among the variables. The results indicated that cycling attributes, attitudes to cycling, social comparison and social image and prestige were the most important factors influencing intention to cycle. Although the results from this study are specific to Mexico City, they indicate areas of interest to transportation planners in other regions especially in those cities where intention to cycle its linked to its perceived image and there is political ambition to instigate positive cycling cultures. Moreover, this study contributes to the current literature developing applications of the Theory of Planned Behaviour.Keywords: cycling, latent variable model, perception, theory of planned behaviour
Procedia PDF Downloads 3541112 Using Analytical Hierarchy Process and TOPSIS Approaches in Designing a Finite Element Analysis Automation Program
Authors: Ming Wen, Nasim Nezamoddini
Abstract:
Sophisticated numerical simulations like finite element analysis (FEA) involve a complicated process from model setup to post-processing tasks that require replication of time-consuming steps. Utilizing FEA automation program simplifies the complexity of the involved steps while minimizing human errors in analysis set up, calculations, and results processing. One of the main challenges in designing FEA automation programs is to identify user requirements and link them to possible design alternatives. This paper presents a decision-making framework to design a Python based FEA automation program for modal analysis, frequency response analysis, and random vibration fatigue (RVF) analysis procedures. Analytical hierarchy process (AHP) and technique for order preference by similarity to ideal solution (TOPSIS) are applied to evaluate design alternatives considering the feedback received from experts and program users.Keywords: finite element analysis, FEA, random vibration fatigue, process automation, analytical hierarchy process, AHP, TOPSIS, multiple-criteria decision-making, MCDM
Procedia PDF Downloads 1141111 Multisignature Schemes for Reinforcing Trust in Cloud Software-As-A-Service Services
Authors: Mustapha Hedabou, Ali Azougaghe, Ahmed Bentajer, Hicham Boukhris, Mourad Eddiwani, Zakaria Igarramen
Abstract:
Software-as-a-service (SaaS) is emerging as a dominant approach to delivering software. It encompasses a range of business, technical opportunities, issue, and challenges. Trustiness in the cloud services regarding the security and the privacy of the delivered data is the most critical issue with the SaaS model. In this paper, we survey the security concerns related to the SaaS model, and we propose the design of a trusted SaaS model that gives users more confidence into SaaS services by leveraging a trust in a neutral source code certifying authority. The proposed design is based on the use of the multisignature mechanism for signing the source code of the application service. In our model, the cloud provider acts as a root of trust by ensuring the integrity of the application service when it was running on its platform. The proposed design prevents insider attacks from tampering with application service before and after it was launched in a cloud provider platform.Keywords: cloud computing, SaaS Platform, TPM, trustiness, code source certification, multi-signature schemes
Procedia PDF Downloads 2781110 Chatbots vs. Websites: A Comparative Analysis Measuring User Experience and Emotions in Mobile Commerce
Authors: Stephan Boehm, Julia Engel, Judith Eisser
Abstract:
During the last decade communication in the Internet transformed from a broadcast to a conversational model by supporting more interactive features, enabling user generated content and introducing social media networks. Another important trend with a significant impact on electronic commerce is a massive usage shift from desktop to mobile devices. However, a presentation of product- or service-related information accumulated on websites, micro pages or portals often remains the pivot and focal point of a customer journey. A more recent change of user behavior –especially in younger user groups and in Asia– is going along with the increasing adoption of messaging applications supporting almost real-time but asynchronous communication on mobile devices. Mobile apps of this type cannot only provide an alternative for traditional one-to-one communication on mobile devices like voice calls or short messaging service. Moreover, they can be used in mobile commerce as a new marketing and sales channel, e.g., for product promotions and direct marketing activities. This requires a new way of customer interaction compared to traditional mobile commerce activities and functionalities provided based on mobile web-sites. One option better aligned to the customer interaction in mes-saging apps are so-called chatbots. Chatbots are conversational programs or dialog systems simulating a text or voice based human interaction. They can be introduced in mobile messaging and social media apps by using rule- or artificial intelligence-based imple-mentations. In this context, a comparative analysis is conducted to examine the impact of using traditional websites or chatbots for promoting a product in an impulse purchase situation. The aim of this study is to measure the impact on the customers’ user experi-ence and emotions. The study is based on a random sample of about 60 smartphone users in the group of 20 to 30-year-olds. Participants are randomly assigned into two groups and participate in a traditional website or innovative chatbot based mobile com-merce scenario. The chatbot-based scenario is implemented by using a Wizard-of-Oz experimental approach for reasons of sim-plicity and to allow for more flexibility when simulating simple rule-based and more advanced artificial intelligence-based chatbot setups. A specific set of metrics is defined to measure and com-pare the user experience in both scenarios. It can be assumed, that users get more emotionally involved when interacting with a system simulating human communication behavior instead of browsing a mobile commerce website. For this reason, innovative face-tracking and analysis technology is used to derive feedback on the emotional status of the study participants while interacting with the website or the chatbot. This study is a work in progress. The results will provide first insights on the effects of chatbot usage on user experiences and emotions in mobile commerce environments. Based on the study findings basic requirements for a user-centered design and implementation of chatbot solutions for mobile com-merce can be derived. Moreover, first indications on situations where chatbots might be favorable in comparison to the usage of traditional website based mobile commerce can be identified.Keywords: chatbots, emotions, mobile commerce, user experience, Wizard-of-Oz prototyping
Procedia PDF Downloads 4601109 New Media and Deliberative Democracy in Malaysia
Authors: Rosyidah Muhamad
Abstract:
This article seeks to access the democratic implication of new media in Malaysia through three important key points of deliberative democracy; information access, rational critical deliberation and mechanism of vertical accountability. The article suggests that the Internet is expanding political opportunity in which contributed to a more diverse discourse. It is depending on how users used it; for democratic or non-democratic outcome. The Internet has been a key instrument in exposing human rights abuse, corruption, organizing protests and mobilizing voters during election campaigns. It therefore pushes for transparency and accountability and thus increasing the rise of deliberative democracy in Malaysia. While there are some elements of an emerging deliberative politics, it is also clear that the Malaysian online political discourse is acting as moderate forms of discourse as the sphere increasingly exist in a chaotic and diversified online discourse. Yet, the online sphere still allows citizens to discuss public affairs. When the public opinion is strong enough, it can influence public policies to ensure that they reflect the public interest. It is suggesting an increased space of negotiation and contestation among the previously muzzled offline situation. This is a big step in the progress democracy in Malaysia.Keywords: Keywords: New Media, democratization, deliberative democracy, Malaysian politics
Procedia PDF Downloads 3011108 Secure Hashing Algorithm and Advance Encryption Algorithm in Cloud Computing
Authors: Jaimin Patel
Abstract:
Cloud computing is one of the most sharp and important movement in various computing technologies. It provides flexibility to users, cost effectiveness, location independence, easy maintenance, enables multitenancy, drastic performance improvements, and increased productivity. On the other hand, there are also major issues like security. Being a common server, security for a cloud is a major issue; it is important to provide security to protect user’s private data, and it is especially important in e-commerce and social networks. In this paper, encryption algorithms such as Advanced Encryption Standard algorithms, their vulnerabilities, risk of attacks, optimal time and complexity management and comparison with other algorithms based on software implementation is proposed. Encryption techniques to improve the performance of AES algorithms and to reduce risk management are given. Secure Hash Algorithms, their vulnerabilities, software implementations, risk of attacks and comparison with other hashing algorithms as well as the advantages and disadvantages between hashing techniques and encryption are given.Keywords: Cloud computing, encryption algorithm, secure hashing algorithm, brute force attack, birthday attack, plaintext attack, man in middle attack
Procedia PDF Downloads 2821107 Energy Audit: A Case Study of a Hot Rolling Mill in Steel Industry
Authors: Arvind Dhingra, Tejinder Singh Saggu
Abstract:
As the energy demands rise and the pollution levels grow, it becomes imperative for us to save energy in all the fields in which it is used. The industrial sector is the major commercial energy consuming sector in India, where electrical energy is the most common and widely used type of energy. As the demand and price of energy are increasing day by day, therefore, the subject of energy conservation is a concern for most energy users particularly industry. Judicious use of energy becomes imperative for third world developing country being presence of energy crisis. This paper provides some measure for energy saving that can be commonly recommended for a rolling unit of steel industry. A case of hot rolling unit in JSL Stainless Ltd., Hisar for energy conservation is given. Overall improvement in energy consumption in light of the stated recommendation is illustrated along with the proposed utilization of the techniques and their applications. Energy conservation in conventional motor with replacement or use of star delta star converter, reduction in cable losses, replacement of filament of LED lamps, replacement of conventional transformer with cast resin dry type transformer and provision of energy management system for energy conservation and per unit production cost reduction are elaborated in this paper.Keywords: energy audit, energy conservation, energy efficient motors
Procedia PDF Downloads 5341106 Cloud Computing in Data Mining: A Technical Survey
Authors: Ghaemi Reza, Abdollahi Hamid, Dashti Elham
Abstract:
Cloud computing poses a diversity of challenges in data mining operation arising out of the dynamic structure of data distribution as against the use of typical database scenarios in conventional architecture. Due to immense number of users seeking data on daily basis, there is a serious security concerns to cloud providers as well as data providers who put their data on the cloud computing environment. Big data analytics use compute intensive data mining algorithms (Hidden markov, MapReduce parallel programming, Mahot Project, Hadoop distributed file system, K-Means and KMediod, Apriori) that require efficient high performance processors to produce timely results. Data mining algorithms to solve or optimize the model parameters. The challenges that operation has to encounter is the successful transactions to be established with the existing virtual machine environment and the databases to be kept under the control. Several factors have led to the distributed data mining from normal or centralized mining. The approach is as a SaaS which uses multi-agent systems for implementing the different tasks of system. There are still some problems of data mining based on cloud computing, including design and selection of data mining algorithms.Keywords: cloud computing, data mining, computing models, cloud services
Procedia PDF Downloads 4811105 Designing Cultural-Creative Products with the Six Categories of Hanzi (Chinese Character Classification)
Authors: Pei-Jun Xue, Ming-Yu Hsiao
Abstract:
Chinese characters, or hanzi, represent a process of simplifying three-dimensional signs into plane signifiers. From pictograms at the beginning to logograms today, a Han linguist thus classified them into six categories known as the six categories of Chinese characters. Design is a process of signification, and cultural-creative design is a process translating ideas into design with creativity upon culture. Aiming to investigate the process of cultural-creative design transforming cultural text into cultural signs, this study analyzed existing cultural-creative products with the six categories of Chinese characters by treating such products as representations which accurately communicate the designer’s ideas to users through the categorization, simplification, and interpretation of sign features. This is a two-phase pilot study on designing cultural-creative products with the six categories of Chinese characters. Phase I reviews the related literature on the theory of the six categories of Chinese characters investigated and concludes with the process and principles of character evolution. Phase II analyzes the design of existing cultural-creative products with the six categories of Chinese characters and explores the conceptualization of product design.Keywords: six categories of Chinese characters, cultural-creative product design, cultural signs, cultural product
Procedia PDF Downloads 3451104 Data Hiding by Vector Quantization in Color Image
Authors: Yung Gi Wu
Abstract:
With the growing of computer and network, digital data can be spread to anywhere in the world quickly. In addition, digital data can also be copied or tampered easily so that the security issue becomes an important topic in the protection of digital data. Digital watermark is a method to protect the ownership of digital data. Embedding the watermark will influence the quality certainly. In this paper, Vector Quantization (VQ) is used to embed the watermark into the image to fulfill the goal of data hiding. This kind of watermarking is invisible which means that the users will not conscious the existing of embedded watermark even though the embedded image has tiny difference compared to the original image. Meanwhile, VQ needs a lot of computation burden so that we adopt a fast VQ encoding scheme by partial distortion searching (PDS) and mean approximation scheme to speed up the data hiding process. The watermarks we hide to the image could be gray, bi-level and color images. Texts are also can be regarded as watermark to embed. In order to test the robustness of the system, we adopt Photoshop to fulfill sharpen, cropping and altering to check if the extracted watermark is still recognizable. Experimental results demonstrate that the proposed system can resist the above three kinds of tampering in general cases.Keywords: data hiding, vector quantization, watermark, color image
Procedia PDF Downloads 3671103 State Budget Accounting: Factors Affected and Basic Orientation to Vietnamese Public Sector Entities
Authors: Pham Quang Huy
Abstract:
State budget is considered as an effective tool for controlling, adjusting and regulating the market economy of any countries. To ensure that the activities of the state in the fields of politics, economy and society has been efficiency, it requires major sources of certain budget. These financial funds are formed from tax revenues and tax revenues beyond. Therefore, the Governments need to have an accounting regime to manage the receipt, expenditure which are suitable for recording a full range of items. From that, it can help to increase the transparency and accountability in budget system. One of the main requirements in Vietnamese policies is to improve that accounting system of revenues and expenditures which can provide many reports to meet the information required of government and users, as well as directions to the trends of international standards requirements. By using quantitative research methods and analytical models to exploring factors, the main purpose of this article is to identify the factors affecting budget accounting and providing some direction for Vietnamese public sector in the future. The results indicated that Vietnam budget accounting has been impacted by seven factors and aims to implement three main orientations in the public sector units.Keywords: state budget, accounting, IPSAS, budget management, government, public sector
Procedia PDF Downloads 2721102 Sustainable User Comfort Using Building Envelope Design; From Traditional Methods to Innovative Solutions
Authors: Soufi Saylam
Abstract:
Environmental concerns, rising consumption of energy, and the high cost of mechanical systems have all contributed to increased interest in building energy efficiency and passive thermal design in recent years. This study attempts to make an evaluation of building envelope components and associated retrofits in terms of their impact on energy efficiency and occupant comfort in a sustainable context. The design of the building envelope, as a critical component of the building, has a significant impact on the organization of interior space and user comfort. In this regard, in order to achieve maximum comfort and energy savings, the design of the building envelope should include a thermal comfort system that adapts to climatic variables. This system should be developed in harmony with the environmental features, building shape, and materials used. The aim of this study is to investigate the role of the building envelope in sustainable architecture by integrating traditional envelope design principles and strategies with technological techniques, as well as to examine its role in providing physical and psychological comfort to users in the interior space.Keywords: envelope design, functional needs, physiological comfort, sustainable architecture, traditional techniques
Procedia PDF Downloads 131101 The Effectiveness of a Hybrid Diffie-Hellman-RSA-Advanced Encryption Standard Model
Authors: Abdellahi Cheikh
Abstract:
With the emergence of quantum computers with very powerful capabilities, the security of the exchange of shared keys between two interlocutors poses a big problem in terms of the rapid development of technologies such as computing power and computing speed. Therefore, the Diffie-Hellmann (DH) algorithm is more vulnerable than ever. No mechanism guarantees the security of the key exchange, so if an intermediary manages to intercept it, it is easy to intercept. In this regard, several studies have been conducted to improve the security of key exchange between two interlocutors, which has led to interesting results. The modification made on our model Diffie-Hellman-RSA-AES (DRA), which encrypts the information exchanged between two users using the three-encryption algorithms DH, RSA and AES, by using stenographic photos to hide the contents of the p, g and ClesAES values that are sent in an unencrypted state at the level of DRA model to calculate each user's public key. This work includes a comparative study between the DRA model and all existing solutions, as well as the modification made to this model, with an emphasis on the aspect of reliability in terms of security. This study presents a simulation to demonstrate the effectiveness of the modification made to the DRA model. The obtained results show that our model has a security advantage over the existing solution, so we made these changes to reinforce the security of the DRA model.Keywords: Diffie-Hellmann, DRA, RSA, advanced encryption standard
Procedia PDF Downloads 941100 Impact of the Pandemic on China's Digital Creative Industries: Mechanisms and Manifestations
Authors: Li Qiaoming
Abstract:
The outbreak of Coronavirus disease 2019 (COVID-19) in early 2020 brought new opportunities to the development of the digital creative industry in China. Based on the realistic foundation of the development of the digital creative industry in China, an analysis was conducted on the mechanism of action of the pandemic on this industry from both sides of supply and demand by sorting out its concept, connotation, and related theories. To be specific, the demand side experienced changes due to the changes in the consumption habits of residents, the sharp increase in gross domestic time (GDT), the satisfaction of the psychological needs of users, search for substitutes for offline consumption, and other factors. An analysis was carried out on the mechanism of action of the pandemic on the digital creative industry from the production link, supply subjects, product characteristics, and transmission link of the supply side. Then, a detailed discussion was held on the manifestation forms of the impact of the pandemic from the dimensions of time and space. Finally, this paper discussed the main development focuses of the digital creative industry in the post-pandemic era from the aspects of the government, industries, and enterprises.Keywords: COVID-19, demand and supply relationship, digital creative industries, industry shocks
Procedia PDF Downloads 1541099 English Learning Speech Assistant Speak Application in Artificial Intelligence
Authors: Albatool Al Abdulwahid, Bayan Shakally, Mariam Mohamed, Wed Almokri
Abstract:
Artificial intelligence has infiltrated every part of our life and every field we can think of. With technical developments, artificial intelligence applications are becoming more prevalent. We chose ELSA speak because it is a magnificent example of Artificial intelligent applications, ELSA speak is a smartphone application that is free to download on both IOS and Android smartphones. ELSA speak utilizes artificial intelligence to help non-native English speakers pronounce words and phrases similar to a native speaker, as well as enhance their English skills. It employs speech-recognition technology that aids the application to excel the pronunciation of its users. This remarkable feature distinguishes ELSA from other voice recognition algorithms and increase the efficiency of the application. This study focused on evaluating ELSA speak application, by testing the degree of effectiveness based on survey questions. The results of the questionnaire were variable. The generality of the participants strongly agreed that ELSA has helped them enhance their pronunciation skills. However, a few participants were unconfident about the application’s ability to assist them in their learning journey.Keywords: ELSA speak application, artificial intelligence, speech-recognition technology, language learning, english pronunciation
Procedia PDF Downloads 1071098 Analysis of the Diffusion Behavior of an Information and Communication Technology Platform for City Logistics
Authors: Giulio Mangano, Alberto De Marco, Giovanni Zenezini
Abstract:
The concept of City Logistics (CL) has emerged to improve the impacts of last mile freight distribution in urban areas. In this paper, a System Dynamics (SD) model exploring the dynamics of the diffusion of a ICT platform for CL management across different populations is proposed. For the development of the model two sources have been used. On the one hand, the major diffusion variables and feedback loops are derived from a literature review of existing diffusion models. On the other hand, the parameters are represented by the value propositions delivered by the platform as a response to some of the users’ needs. To extract the most important value propositions the Business Model Canvas approach has been used. Such approach in fact focuses on understanding how a company can create value for her target customers. These variables and parameters are thus translated into a SD diffusion model with three different populations namely municipalities, logistics service providers, and own account carriers. Results show that, the three populations under analysis fully adopt the platform within the simulation time frame, highlighting a strong demand by different stakeholders for CL projects aiming at carrying out more efficient urban logistics operations.Keywords: city logistics, simulation, system dynamics, business model
Procedia PDF Downloads 268