Search results for: internet revolution
1886 Security of Internet of Things: Challenges, Requirements and Future Directions
Authors: Amjad F. Alharbi, Bashayer A. Alotaibi, Fahd S. Alotaibi
Abstract:
The emergence of Internet of Things (IoT) technology provides capabilities for a huge number of smart devices, services and people to be communicate with each other for exchanging data and information over existing network. While as IoT is progressing, it provides many opportunities for new ways of communications as well it introduces many security and privacy threats and challenges which need to be considered for the future of IoT development. In this survey paper, an IoT security issues as threats and current challenges are summarized. The security architecture for IoT are presented from four main layers. Based on these layers, the IoT security requirements are presented to insure security in the whole system. Furthermore, some researches initiatives related to IoT security are discussed as well as the future direction for IoT security are highlighted.Keywords: Internet of Things (IoT), IoT security challenges, IoT security requirements, IoT security architecture
Procedia PDF Downloads 3751885 Revolution and Political Opposition in Contemporary Arabic Poetry: A Thematic Study of Two Poems by Muzaffar Al-Nawwab
Authors: Nasser Y. Athamneh
Abstract:
Muzaffar al-Nawwab (1934--) is a modern Iraqi poet, critic, and painter, well-known to Arab youth of the second half of the 20th century for his revolutionary spirit and political activism. For the greater part of his relatively long life, al-Nawwab was wanted 'dead or alive,' so to speak, by most of the Arab regimes and authorities due to his scathing, and at times unsparingly obscene attacks on them. Hence it is that the Arab masses found in his poetry the rebellious expression of their own anger and frustration, stifled by fear for their physical safety. Thus, al-Nawwab’s contemporary Arab audience loved and embraced him both as an Arab exile and as a poet. They memorized and celebrated his poems and transmitted them secretly by word of mouth and on compact cassette tapes. He himself recited his own poetry and had it recorded on compact cassette tapes for fans to smuggle from one Arab country to the other. The themes of al-Nawwab’s poems are varied, but the most predominant among them is political opposition. In most of his poems, al-Nawwab takes up politics as the major theme. Yet, he often represents it coupled with the leitmotifs of women and wine. Indeed he oscillates almost systematically between political commitment to the revolutionary cause of the masses of his nation and homeland on the one hand and love for women and wine on the other. For the persona in al-Nawwab’s poetry, love-longing for the woman and devotion to the cause of revolution and Pan-Arabism are interrelated; each of them readily evokes the other. In this paper, an attempt is made at investigating the treatment and representation of the theme of revolution and political opposition in some of al-Nawwab’s poems. This investigation will be conducted through close reading and textual analysis of representative sections of the poetic texts under consideration in the paper. The primary texts for the study are selected passages from two representative poems, namely, 'The Night Song of the Bow Strings' (Watariyyaat Layliyyah) and 'In Wine and Sorrow My Heart [Is Immersed]' (bil-khamri wa bil-huzni fu’aady). Other poems and extracts from al-Nawwab’s poetic works will be drawn upon as secondary texts to clarify the arguments in the paper and support its thesis. The discussions and textual analysis of the texts under consideration are meant to show that revolution and undaunted political opposition is a predominant theme in al-Nawwab’s poetry, often represented through the use of the leitmotifs of women and wine.Keywords: Arabic poetry, Muzaffar al-Nawwab, politics, revolution
Procedia PDF Downloads 1381884 Shia School of Thought and the Experience of Political Order in Contemporary Era
Authors: Abdulvahab Forati
Abstract:
Religious intellectualism is the only stream of consciousness in Iran that its religious theories formed Democracy. The theory of Religious intellectualism was utilized in Constitutional Revolution and Islamic Revolution. To instate Democracy in Iran, in compare with West and sunnis, the theory of Religious Intellectualism is being used differently. Unlike Democracy in the west that has started with the concept of Individualism and Natural Rights or in Sunni world that has started with the concept of consultation, it has started in Iran with mima-la-nas-fih (what we don’t have any proof for)or mantaqa-alfiraq-altashri’ (area of vacuum from reason). Shia scholars first acquainted with the concept of Democracy through theories of Sheikh Mortiza Ansari, and later some of his followers, including Akhund-e-khorasani and Mirzaye naeini, regarding Sheikh Ansari’s thoughts, began to analyze its Constitutional system and Democratic elements. But Imam Khomeini, the great founder of Islamic Republic of Iran, with respect to RAKHS (religious permission for having a choice)could make connection between Islam and Democracy. Instead of focusing on Civil contracts, he relied on Sirah Ughala (Tradition) and accepted many of the current conducts, e.g. Democracy and Political Parties and acknowledged the authority (Hujiat) of them even in absence of Infallibles. These two are the most notable experiences of shia political thoughts about Democracy within the last 100 years. In this article, the author tries to explain the second experience in Imam Khomeini’s thoughts and Sirah.Keywords: Shia school, Islamic revolution, democracy, political order
Procedia PDF Downloads 3201883 The Law of Treaties and National Security of Islamic Republic of Iran
Authors: S. M. Tavakoli Sani, M. Sabbet Moghadam, Y. Khorram Farhadi, Iraj Rezayi Nejad
Abstract:
The concept of national security in Iran is a permanently effective factor in acceptance or rejection of many international obligations. These obligations had been defined according to the type of legislation of Iran in many aspects. Therefore, there are several treaties at international level which requires Iran’s security to come in contact with obligations in these treaties in a way that an obstacle to join to them and their passage in parliament. This issue is a typical category which every country pays attention to be accepted in treaties or to include their national security in that treaties and also they can see the related treaties from this perspective, but this issue that 'what is the concept of Iran’s national security', and 'To what extent it is changed in recent years, especially after Islamic Revolution' are important issues that can be criticized. Thus, this study is trying to assess singed treaties from the perspective of Iran’s national security according of the true meaning of treaty and to investigate how the international treaties may be in conflict with Iran’s national security.Keywords: treaties, national security, Iran, Islamic Revolution
Procedia PDF Downloads 4711882 Impacts of Online Behaviors on Empathy in Medical Students
Authors: Ling-Lang Huang, Yih-Jer Wu
Abstract:
Empathy is crucial for a patient-physician relationship and medical professionalism. Internet activity, gaming, or even addiction, have been more and more common among medical students. However, there’s been no report showing whether internet behavior has a substantial impact on empathy in medical students to our best knowledge. All year-2 medical students taking the optional course 'Narrative, Comprehension, and Communication' were enrolled. Internet behaviors are divided into two groups, 'internet users without online gaming (IU)' and 'internet users with online gaming (IG)', each group was further divided into 3 groups according to their average online retention time each day (< 2, 2 - 6, > 6 hours). Empathy was evaluated by the scores of the reports and humanities reflection after watching indicated movies, and by self-measured empathy questionnaire. All students taking the year-2 optional course 'Narrative, Comprehension, and Communication' were enrolled. As compared with students in the IU group, those in the IG group had significantly lower scores for the reports (81.3 ± 3.7 vs. 86.4 ± 5.1, P = 0.014). If further dividing the students into 5 groups (IU < 2, IU 2-6, IG < 2, IG 2 - 6, and IG > 6 hours), the scores were significantly and negatively correlated to online gaming with longer hours (r = -0.556, P = 0.006). However, there was no significant difference between IU and IG groups (33.0 ± 5.4 vs. 34.8 ± 3.2, P = n.s.), in terms of scores in the self-measured empathy questionnaire, neither was there any significant trend of scores along with longer online hours across the 5 groups (r = -0.164, P = n.s.). To date, there has been no evidence showing whether different internet behaviors (with or without online gaming) have distinct impacts on empathy. Although all of the medical students had a similarly good self-perception for empathy, our data suggested that online gaming did have a negative impact on their actual expression of empathy. Our observation has brought up an important issue for pondering: May IT- or gaming-assisted medical learning actually harm students’ empathy? In conclusion, this data suggests that long hours of online gaming harms expression of empathy, though all medics think themselves a person of high empathy.Keywords: empathy. Internet, medical students, online gaming
Procedia PDF Downloads 1321881 The Effect of Satisfaction with the Internet on Online Shopping Attitude With TAM Approach Controlled By Gender
Authors: Velly Anatasia
Abstract:
In the last few decades extensive research has been conducted into information technology (IT) adoption, testing a series of factors considered to be essential for improved diffusion. Some studies analyze IT characteristics such as usefulness, ease of use and/or security, others focus on the emotions and experiences of users and a third group attempts to determine the importance of socioeconomic user characteristics such as gender, educational level and income. The situation is similar regarding e-commerce, where the majority of studies have taken for granted the importance of including these variables when studying e-commerce adoption, as these were believed to explain or forecast who buys or who will buy on the internet. Nowadays, the internet has become a marketplace suitable for all ages and incomes and both genders and thus the prejudices linked to the advisability of selling certain products should be revised. The objective of this study is to test whether the socioeconomic characteristics of experienced e-shoppers such as gender rally moderate the effect of their perceptions of online shopping behavior. Current development of the online environment and the experience acquired by individuals from previous e-purchases can attenuate or even nullify the effect of these characteristics. The individuals analyzed are experienced e-shoppers i.e. individuals who often make purchases on the internet. The Technology Acceptance Model (TAM) was broadened to include previous use of the internet and perceived self-efficacy. The perceptions and behavior of e-shoppers are based on their own experiences. The information obtained will be tested using questionnaires which were distributed and self-administered to respondent accustomed using internet. The causal model is estimated using structural equation modeling techniques (SEM), followed by tests of the moderating effect of socioeconomic variables on perceptions and online shopping behavior. The expected findings of this study indicated that gender moderate neither the influence of previous use of the internet nor the perceptions of e-commerce. In short, they do not condition the behavior of the experienced e-shopper.Keywords: Internet shopping, age groups, gender, income, electronic commerce
Procedia PDF Downloads 3381880 Investigation of the Relationship between Digital Game Playing, Internet Addiction and Perceived Stress Levels in University Students
Authors: Sevim Ugur, Cemile Kutmec Yilmaz, Omer Us, Sevdenur Koksaldi
Abstract:
Aim: This study aims to investigate the effect of digital game playing and Internet addiction on perceived stress levels in university students. Method: The descriptive study was conducted through face-to-face interview method with a total of 364 university students studying at Aksaray University between November 15 and December 30, 2017. The research data were collected using personal information form, a questionnaire to determine the characteristics of playing digital game, the Internet addiction scale and the perceived stress scale. In the evaluation of the data, Mann-Whitney U test was used for two-group comparison of the sample with non-normal distribution, Kruskal-Wallis H-test was used in the comparison of more than two groups, and the Spearman correlation test was used to determine the relationship between Internet addiction and the perceived stress level. Results: It was determined that the mean age of the students participated in the study was 20.13 ± 1.7 years, 67.6% was female, 35.7% was sophomore, and 62.1% had an income 500 TL or less. It was found that 83.5% of the students use the Internet every day and 70.6% uses the Internet for 5 hours or less per day. Of the students, 12.4% prefers digital games instead of spending time outdoors, 8% plays a game as the first activity in leisure time, 12.4% plays all day, 15.7% feels anger when he/she is prevented from playing, 14.8% prefers playing games to get away from his/her problems, 23.4% had his/her school achievement affected negatively because of game playing, and 8% argues with family members due to the time spent for gaming. Students who play games on the computer for a long time were found to feel back pain (30.8%), headache (28.6%), insomnia (26.9%), dryness and pain in the eyes (26.6%), pain in the wrist (21.2%), feeling excessive tension and anger (16.2%), humpback (12.9), vision loss (9.6%) and pain in the wrist and fingers (7.4%). In our study, students' Internet addiction scale mean score was found to be 45.47 ± 16.1 and mean perceived stress scale score was 28.56 ± 2.7. A significant and negative correlation (p=0.037) was found between the total score of the Internet addiction scale and the total score of the perceived stress scale (r=-0.110). Conclusion: It was found in the study that Internet addiction and perceived stress of the students were at a moderate level and that there was a negative correlation between Internet addiction and perceived stress levels. Internet addiction was found to increase with the increasing perceived stress levels of students, and students were found to have health problems such as back pain, dryness in the eyes, pain, insomnia, headache, and humpback. Therefore, it is recommended to inform students about different coping methods other than spending time on the Internet to cope with the stress they perceive.Keywords: digital game, internet addiction, student, stress level
Procedia PDF Downloads 2881879 The Analysis of Internet and Social Media Behaviors of the Students in Vocational High School
Authors: Mehmet Balci, Sakir Tasdemir, Mustafa Altin, Ozlem Bozok
Abstract:
Our globalizing world has become almost a small village and everyone can access any information at any time. Everyone lets each other know who does whatever in which place. We can learn which social events occur in which place in the world. From the perspective of education, the course notes that a lecturer use in lessons in a university in any state of America can be examined by a student studying in a city of Africa or the Far East. This dizzying communication we have mentioned happened thanks to fast developments in computer technologies and in parallel with this, internet technology. While these developments in the world, has a very large young population and a rapidly evolving electronic communications infrastructure Turkey has been affected by this situation. Researches has shown that almost all young people in Turkey has an account in a social network. Especially becoming common of mobile devices causes data traffic in social networks to increase. In this study, has been surveyed on students in the different age groups and at the Selcuk University Vocational School of Technical Sciences Department of Computer Technology. Student’s opinions about the use of internet and social media has been gotten. Using the Internet and social media skills, purposes, operating frequency, access facilities and tools, social life and effects on vocational education etc. have been explored. Both internet and use of social media positive and negative effects on this department students results have been obtained by the obtained findings evaluating from various aspects. Relations and differences have been found out with statistic.Keywords: computer technologies, internet use, social network, higher vocational school
Procedia PDF Downloads 5441878 A New Block Cipher for Resource-Constrained Internet of Things Devices
Authors: Muhammad Rana, Quazi Mamun, Rafiqul Islam
Abstract:
In the Internet of Things (IoT), many devices are connected and accumulate a sheer amount of data. These Internet-driven raw data need to be transferred securely to the end-users via dependable networks. Consequently, the challenges of IoT security in various IoT domains are paramount. Cryptography is being applied to secure the networks for authentication, confidentiality, data integrity and access control. However, due to the resource constraint properties of IoT devices, the conventional cipher may not be suitable in all IoT networks. This paper designs a robust and effective lightweight cipher to secure the IoT environment and meet the resource-constrained nature of IoT devices. We also propose a symmetric and block-cipher based lightweight cryptographic algorithm. The proposed algorithm increases the complexity of the block cipher, maintaining the lowest computational requirements possible. The proposed algorithm efficiently constructs the key register updating technique, reduces the number of encryption rounds, and adds a new layer between the encryption and decryption processes.Keywords: internet of things, cryptography block cipher, S-box, key management, security, network
Procedia PDF Downloads 1141877 Factors Affecting Mobile Internet Adoption in an Emerging Market
Authors: Maha Mourad, Fady Todros
Abstract:
The objective of this research is to find an explanatory model to define the most important variables and factors that affect the acceptance of Mobile Internet in the Egyptian market. A qualitative exploratory research was conducted to support the conceptual framework followed with a quantitative research in the form of a survey distributed among 411 respondents. It was clear that relative advantage, complexity, compatibility, perceived price level and perceived playfulness have a dominant role in influencing consumers to adopt mobile internet, while observability is correlated to the adoption but when measured with the other factors it lost its value. The perceived price level has a negative relationship with the adoption as well the compatibility.Keywords: innovation, Egypt, communication technologies, diffusion, innovation adoption, emerging market
Procedia PDF Downloads 4531876 Securing Health Monitoring in Internet of Things with Blockchain-Based Proxy Re-Encryption
Authors: Jerlin George, R. Chitra
Abstract:
The devices with sensors that can monitor your temperature, heart rate, and other vital signs and link to the internet, known as the Internet of Things (IoT), have completely transformed the way we control health. Providing real-time health data, these sensors improve diagnostics and treatment outcomes. Security and privacy matters when IoT comes into play in healthcare. Cyberattacks on centralized database systems are also a problem. To solve these challenges, the study uses blockchain technology coupled with proxy re-encryption to secure health data. ThingSpeak IoT cloud analyzes the collected data and turns them into blockchain transactions which are safely kept on the DriveHQ cloud. Transparency and data integrity are ensured by blockchain, and secure data sharing among authorized users is made possible by proxy re-encryption. This results in a health monitoring system that preserves the accuracy and confidentiality of data while reducing the safety risks of IoT-driven healthcare applications.Keywords: internet of things, healthcare, sensors, electronic health records, blockchain, proxy re-encryption, data privacy, data security
Procedia PDF Downloads 191875 Improving the Security of Internet of Things Using Encryption Algorithms
Authors: Amirhossein Safi
Abstract:
Internet of things (IOT) is a kind of advanced information technology which has drawn societies’ attention. Sensors and stimulators are usually recognized as smart devices of our environment. Simultaneously, IOT security brings up new issues. Internet connection and possibility of interaction with smart devices cause those devices to involve more in human life. Therefore, safety is a fundamental requirement in designing IOT. IOT has three remarkable features: overall perception, reliable transmission, and intelligent processing. Because of IOT span, security of conveying data is an essential factor for system security. Hybrid encryption technique is a new model that can be used in IOT. This type of encryption generates strong security and low computation. In this paper, we have proposed a hybrid encryption algorithm which has been conducted in order to reduce safety risks and enhancing encryption's speed and less computational complexity. The purpose of this hybrid algorithm is information integrity, confidentiality, non-repudiation in data exchange for IOT. Eventually, the suggested encryption algorithm has been simulated by MATLAB software, and its speed and safety efficiency were evaluated in comparison with conventional encryption algorithm.Keywords: internet of things, security, hybrid algorithm, privacy
Procedia PDF Downloads 4691874 Implementing Internet of Things through Building Information Modelling in Order to Assist with the Maintenance Stage of Commercial Buildings
Authors: Ushir Daya, Zenadene Lazarus, Dimelle Moodley, Ehsan Saghatforoush
Abstract:
It was found through literature that there is a lack of implementation of the Internet of Things (IoT) incorporated into Building Information Modelling (BIM) in South Africa. The research aims to find if the implementation of IoT into BIM will make BIM more useful during the maintenance stage of buildings and assist facility managers when doing their job. The research will look at the existing problematic areas with building information modelling, specifically BIM 7D. This paper will look at the capabilities of IoT and what issues IoT will be able to resolve in BIM software, as well as how IoT into BIM will assist facility managers and if such an implementation will make a facility manager's job more efficient.Keywords: internet of things, building information modeling, facilities management, structural health monitoring
Procedia PDF Downloads 2081873 The Semiosis of 'We' Narrative: Examining Collectivity in Tahrir Memoir
Authors: May Al Sahib
Abstract:
This paper draws together an analysis of two autobiographical writings; Ahdaf Soueif’s Cairo: My City, Our Revolution (2012), Radwa Ashour’s Heavier than Radwa (2013), and Revolution is My Name: An Egyptian Woman’s Diary from Eighteen Days in Tahrir (2015). Soueif, Ashour, and Prince are Egyptian authors, activists, and cultural commentators who are fully aware that being a ‘third world’ citizen constrains the writer into taking a specific pattern in writing. However, this paper will analyze the choice of literary form in writing the 2011 January revolution. All texts give factual accounts of the revolution with all its contesting powers lingering with mixed references of anxiety and merriment that accentuates their sense of communal solidarity against social corruption and political positioning. Through shifting between the pronouns ‘I’ and ‘we’, these narratives do not solely engage with the personal life of the memorialist; but rather give an account of the collective. Both writers take us to the heart of high-spirited Tahrir Square in 2011 while millions are ranting to oust Hosni Mubarak, the 30 years ruling dictator. By utilizing the instrumentality of collective memory for expressing textual collectivity in their non-fictional writings, these writers are depicting the people power of Egyptians and the historical civil-resistance against governmental unfairness and establishing a certain type of patriotism that elevates and priorities itself from minor conflicts. Their de-individualizing type of life narrative represents the Arabic nation through vital socio-political situations that perpetuate the politics of resistance and collectivity with a constant fear of betraying it and erupts historical moments aiming for an improved future. The texts incorporate an explicit set of reported political series of thought that shape an overall public argument and representational ideas.Keywords: resistance narrative, life-writing, Tahrir memoir, Middle Eastern literature
Procedia PDF Downloads 1681872 Applications of Internet of Things (IoTs) for Information Resources and Services: Survey of Academic Librarians
Authors: Sultan Aldaihani, Eiman Al-Fadhli
Abstract:
Internet of Things (IoTs) expected to change the future of academic libraries operations. It enables academic libraries to be smart libraries through, for example, the connection of the physical objects with the Internet. The implementation of IoTs will improve library resources and services. Therefore, this research aims to investigate the applications of Internet of Things (IoTs) for information resources and services. Understanding perceptions of academic librarians toward IoTs before adopting of such applications will assist decision-makers in academic libraries in their strategic planning. An online questionnaire was administered to academic librarians at Kuwait University. The findings of this study showed that academic librarians have awareness for the IoTs. They have strongly believed that the IoTs contributes to the development of information resources, services, and understanding of the user's information behavior. Identifying new applications of the IoTs in libraries was the highest possible reason for future adoption. Academic librarians indicated that lack of privacy and data penetration were the greatest problem in their future adoption of IoTs. Academic libraries need to implement the IoTs for enhancing their information resources and services. One important step in the success of future adoption is to conduct awareness and training programs for academic librarians. They also need to maintain higher security and privacy measurements in their implementation for the IoTs. This study will assist academic libraries in accommodating this technology.Keywords: academic libraries, internet of things, information resources, information services
Procedia PDF Downloads 1531871 Fundamentals of Theorizing Power in International Relations
Authors: Djehich Mohamed Yousri
Abstract:
The field of political science is one of the sciences in which there is much controversy, in terms of the multiplicity of schools, trends, and goals. This overlap and complexity in the interpretation of the political phenomenon in political science has been linked to other disciplines associated with it, and the science of international relations and the huge amount of theories that have found a wide range and a decisive position after the national tide in the history of Western political thought, especially after the Westphalia Conference 1648, and as a result was approved The new foundations of international politics, the most important of which is respect for state sovereignty. Historical events continued and coincided with scientific, intellectual, and economic developments following the emergence of the industrial revolution, followed by the technological revolutions in all their contents, which led to the rooting and establishment of a comprehensive political system that is more complex and overlapping than it was in the past during the First and Second World Wars. The international situation has become dependent on the digital revolution and its aspirations in The comprehensive transformation witnessed by international political relations after the Cold War.Keywords: theorizing, international relations, approaches to international relations, political science, the political system
Procedia PDF Downloads 1041870 Industry 4.0 and Supply Chain Integration: Case of Tunisian Industrial Companies
Authors: Rym Ghariani, Ghada Soltane, Younes Boujelbene
Abstract:
Industry 4.0, a set of emerging smart and digital technologies, has been the main focus of operations management researchers and practitioners in recent years. The objective of this research paper is to study the impact of Industry 4.0 on the integration of the supply chain (SCI) in Tunisian industrial companies. A conceptual model to study the relationship between Industry 4.0 technologies and supply chain integration was designed. This model contains three explained variables (Big data, Internet of Things, and Robotics) and one variable to be explained (supply chain integration). In order to answer our research questions and investigate the research hypotheses, principal component analysis and discriminant analysis were used using SPSS26 software. The results reveal that there is a statistically positive impact significant impact of Industry 4.0 (Big data, Internet of Things and Robotics) on the integration of the supply chain. Interestingly, big data has a greater positive impact on supply chain integration than the Internet of Things and robotics.Keywords: industry 4.0 (I4.0), big data, internet of things, robotics, supply chain integration
Procedia PDF Downloads 621869 Analysis of Turkish Government Cultural Portal for Supporting Gastronomy Tourism
Authors: Hilmi Rafet Yüncü
Abstract:
Today Internet has very important role to promote products and services all over the world. Companies and destinations in tourism industry use Internet to sell and to promote their core products to directly potential tourists. Internet technologies have redefined the relationships between tourists, tourism companies, and travel agents. The new relationship allows for accessing and tapping tourism information and services. Internet technologies ensure new opportunities to available for the tourism industry, including travel accommodation, and tourist destination organizations. Websites are important devices to the marketing of a destination. Most people make a research about the destination before arriving via internet. Governments have a considerable role in the process of marketing tourism destinations. Governments make policies and regulations; furthermore, they help to market destinations to potential tourists. Governments have a comprehensive overview of the sector to see changes in tourism market and design better policies, programs and marketing plans. At the same time, governments support developing of alternative tourism in the country with regulations and marketing tools. The aim of this study is to analyse of an Internet website of governmental tourism portal in Turkey to determine effectiveness about gastronomy tourism. The Turkish government has established a culture portal for foreign and local tourists. The Portal provides local and general information about tourism attractions of cities and Turkey. There are 81 official cities in Turkey and all these cities are conducted to analyse to determine how effective marketing is done by Turkish Government in the manner of gastronomy tourism. A content analysis will be conducted to Internet website of the portal with food content, recipes and gastronomic feature of cities.Keywords: culture portal, gastronomy tourism, government, Turkey
Procedia PDF Downloads 3441868 Reimagine and Redesign: Augmented Reality Digital Technologies and 21st Century Education
Authors: Jasmin Cowin
Abstract:
Augmented reality digital technologies, big data, and the need for a teacher workforce able to meet the demands of a knowledge-based society are poised to lead to major changes in the field of education. This paper explores applications and educational use cases of augmented reality digital technologies for educational organizations during the Fourth Industrial Revolution. The Fourth Industrial Revolution requires vision, flexibility, and innovative educational conduits by governments and educational institutions to remain competitive in a global economy. Educational organizations will need to focus on teaching in and for a digital age to continue offering academic knowledge relevant to 21st-century markets and changing labor force needs. Implementation of contemporary disciplines will need to be embodied through learners’ active knowledge-making experiences while embracing ubiquitous accessibility. The power of distributed ledger technology promises major streamlining for educational record-keeping, degree conferrals, and authenticity guarantees. Augmented reality digital technologies hold the potential to restructure educational philosophies and their underpinning pedagogies thereby transforming modes of delivery. Structural changes in education and governmental planning are already increasing through intelligent systems and big data. Reimagining and redesigning education on a broad scale is required to plan and implement governmental and institutional changes to harness innovative technologies while moving away from the big schooling machine.Keywords: fourth industrial revolution, artificial intelligence, big data, education, augmented reality digital technologies, distributed ledger technology
Procedia PDF Downloads 2771867 The Effect of Artificial Intelligence on Media Production
Authors: Mona Mikhail Shakhloul Gadalla
Abstract:
The brand-new media revolution, which features a huge range of new media technologies like blogs, social networking, visual worlds, and wikis, has had a tremendous impact on communications, traditional media and across different disciplines. This paper gives an evaluation of the impact of recent media technology on the news, social interactions and conventional media in developing and advanced nations. The look points to the reality that there is a widespread impact of recent media technologies on the news, social interactions and the conventional media in developing and developed nations, albeit undoubtedly and negatively. Social interactions have been considerably affected, in addition to news manufacturing and reporting. It's miles reiterated that regardless of the pervasiveness of recent media technologies, it might now not carry a complete decline of conventional media. This paper contributes to the theoretical framework of the new media and will assist in assessing the extent of the effect of the new media in special places.Keywords: court reporting, offenders in media, quantitative content analysis, victims in mediamedia literacy, ICT, internet, education communication, media, news, new media technologies, social interactions, traditional media
Procedia PDF Downloads 371866 Role of Machine Learning in Internet of Things Enabled Smart Cities
Authors: Amit Prakash Singh, Shyamli Singh, Chavi Srivastav
Abstract:
This paper presents the idea of Internet of Thing (IoT) for the infrastructure of smart cities. Internet of Thing has been visualized as a communication prototype that incorporates myriad of digital services. The various component of the smart cities shall be implemented using microprocessor, microcontroller, sensors for network communication and protocols. IoT enabled systems have been devised to support the smart city vision, of which aim is to exploit the currently available precocious communication technologies to support the value-added services for function of the city. Due to volume, variety, and velocity of data, it requires analysis using Big Data concept. This paper presented the various techniques used to analyze big data using machine learning.Keywords: IoT, smart city, embedded systems, sustainable environment
Procedia PDF Downloads 5771865 The Roots of the Robust and Looting Economy (poverty and inequality) in Iran after the 1979 Revolution, From the Perspective of Acem Oglu & Robinson theory
Authors: Vorya Shabrandi
Abstract:
The study factors of poverty and inequality causes in countries is the subject of many scholars and economists in the last century, theorists in various areas of economic science know different factors as the roots of poverty and inequality in Iran after the 1979 revolution. Economists have emphasized political elements and political scientists on political elements. This research reviews the political economy of poverty and corruption in Iran after the revolution. The findings of this research, based on AcemOgluand Robinson theory, show how the institutional structural dependence of Iran's economy to raw has led to the growth of its non-economic economic institutions and its consequence of the continuity of the release and looting economy and poverty and inequality in Iran's political economy Is. This research was carried out using descriptive-analytical and comparative methods. Many economists try to justify the conditions of the country based on war, sanctions; And the external factors, and ... knows. In this study, we tried to examine the roots of poverty and the looting economy of Iran by implementing Research AcemOgluand Robinson on the institutions and roots of poverty. Looking for a framework for understanding why countries, such as Iran, the reason for the difference in revenue in different countries, as well as the poor or wealth of countries, regardless of the non-effective and non-professional institutions, and why inefficient institutions in some countries, such as Iran, such as Iran It remains and does not have a voluntary political powers to change these institutions. Findings The research shows that institutions are broadly the main reason for the roots of the robust and looting economy (poverty and inequality) in Iran.Keywords: Iran, plunderable (Loot) economy, raw shopping, poverty and inequality, acem oglu and robinson, non-inclusive institutions
Procedia PDF Downloads 1411864 Using the Internet of Things to Deal with Ventilators for Minimizing the Direct Contact with COVID-19 Patients
Authors: Mohammed Al-Shalabi
Abstract:
In recent years, the Internet of Things (IoT) has become an important technology for connecting various smart objects in many applications, especially in health monitoring applications. The IoT technology develops healthcare applications from traditional to personalized ones by making the treatment and monitoring of patients easier. Nowadays, especially during the COVID-19 pandemic, the necessity of enhancing healthcare monitoring applications to avoid the spreading of this pandemic is increased. In this paper, a mechanism is proposed to minimize direct contact with COVID-19 patients who need ventilators by using IoT technology. The proposed mechanism saves medical providers from COVID-19 infection and then minimizes the spreading of this disease.Keywords: internet of things, healthcare monitoring, COVID-19, ventilators, thingspeak, clouds
Procedia PDF Downloads 1361863 A Critical Appraisal of Adekunle Ajasin University Policy on Internet Resource Centre in Service Delivery Adekunle Ajasin University, Akungba-Akoko, Ondo State
Authors: Abimbola Olaotan Akinsete
Abstract:
Government all over the world has intensified efforts in making internet and resource centres readily available in public institutions and centres for the advancement of humanity and working processes. Information and communication resource centre will not only help in the reduction of task that are presumed to be herculean. This centres influenced the working rate and productivity of both staffs and students and its benefit. The utilization of the internet and information resource centre will not only speed up service delivery, working time and efficiency of the system. Information and Communication Technology plays significant roles in presenting equalization strategy for developing university community and improving educational service delivery. This equalization will not only advance, accelerate and ensure results are accessed electronically, ensuring the transfer and confirmation of students’ academic records and their results in the world without physically available to request for these services. This study seeks to make Critical Appraisal of Adekunle Ajasin University Policy on Internet Resource Centre in Service Delivery Adekunle Ajasin University, Akungba-Akoko, Ondo State. The study employ descriptive survey design method in identifying hindrances of the non-utilization of technology in the service delivery in the university. Findings revealed that the adoption of internet and resource centre in the Exams and Records unit of the University shall help in delivering more in students’ records/results processing.Keywords: internet, resource, centre, policy and service delivery
Procedia PDF Downloads 1041862 An Enhanced Digital Forensic Model for Internet of Things Forensic
Authors: Tina Wu, Andrew Martin
Abstract:
The expansion of the Internet of Things (IoT) brings a new level of threat. Attacks on IoT are already being used by criminals to form botnets, launch Distributed Denial of Service (DDoS) and distribute malware. This opens a whole new digital forensic arena to develop forensic methodologies in order to have the capability to investigate IoT related crimes. However, existing proposed IoT forensic models are still premature requiring further improvement and validation, many lack details on the acquisition and analysis phase. This paper proposes an enhanced theoretical IoT digital forensic model focused on identifying and acquiring the main sources of evidence in a methodical way. In addition, this paper presents a theoretical acquisition framework of the different stages required in order to be capable of acquiring evidence from IoT devices.Keywords: acquisition, Internet of Things, model, zoning
Procedia PDF Downloads 2721861 The Internet of Things Ecosystem: Survey of the Current Landscape, Identity Relationship Management, Multifactor Authentication Mechanisms, and Underlying Protocols
Authors: Nazli W. Hardy
Abstract:
A critical component in the Internet of Things (IoT) ecosystem is the need for secure and appropriate transmission, processing, and storage of the data. Our current forms of authentication, and identity and access management do not suffice because they are not designed to service cohesive, integrated, interconnected devices, and service applications. The seemingly endless opportunities of IoT are in fact circumscribed on multiple levels by concerns such as trust, privacy, security, loss of control, and related issues. This paper considers multi-factor authentication (MFA) mechanisms and cohesive identity relationship management (IRM) standards. It also surveys messaging protocols that are appropriate for the IoT ecosystem.Keywords: identity relation management, multifactor authentication, protocols, survey of internet of things ecosystem
Procedia PDF Downloads 3561860 Memetic Marketing: An Emerging Online Marketing Trend and the Case with #TFWGucci Meme Campaign
Authors: Vehbi Gorgulu
Abstract:
The primary objective of the current study is to explore how brand managers can employ Internet memes as a marketing tool. Internet memes are marked for their sarcastic and entertaining content and their amateur/DIY natures. The current study focuses on #TFWGucci, a collaborative marketing project enacted by Gucci, which is marked for being one of the first structured collaborative memetic marketing campaigns in the world. By embracing a qualitative approach, the study will explore production and meaning making processes of #TFWGucci campaign via analysis of sample campaign contents. The study will provide hints and insights for digital marketers on how to employ memetic marketing strategies in successful ways.Keywords: meme, internet meme, online marketing, memetic marketing, #TFWGucci
Procedia PDF Downloads 2361859 The Impact of Information and Communication Technology on Bilateral Trade in Goods
Authors: Christina Tay
Abstract:
This paper investigates the impact of Information and Communication Technology (ICT) on bilateral trade in goods. Empirical analysis is performed on the United States and 34 partnering countries from 2000 to 2013. Our econometric model fits the data well, explaining 52% of the variation in trade flows for goods trade, 53.2% of the variation in trade flows for goods export and 48% of the variation in trade flows for goods import. For every 10% increase in fixed broadband Internet subscribers per 100 people increases, goods trade by 7.9% and for every 5% increase in fixed broadband Internet subscribers per 100 people, goods export increases by 11%. For every 1% increase in fixed telephone line penetration per 100 people, goods trade increases by 26.3%, goods export increases by 24.4% and goods import increases by 24.8%. For every 1% increase in mobile-cellular telephone subscriptions, goods trade decreases by 29.6% and goods export decreases by 27.1%, whilst for every 0.01% increase in mobile-cellular telephone subscriptions, goods import decreases by 34.3%. For every 1% increase in the percentage of population who used the Internet from any location in the last 12 months Internet, goods trade increases by 32.5%, goods export increases by 38.9%, goods import increases by 33%. All our trade determinants as well as our ICT variables have significances on goods exports for the US. We can also draw from our study that the US relies more rather heavily on ICT for its goods export compared to goods import.Keywords: bilateral trade, fixed broadband, fixed telephone, goods trade, information and communicative technologies, Internet, mobile-cellular phone
Procedia PDF Downloads 2981858 Sliding Mode Control of an Internet Teleoperated PUMA 600 Robot
Authors: Abdallah Ghoul, Bachir Ouamri, Ismail Khalil Bousserhane
Abstract:
In this paper, we have developed a sliding mode controller for PUMA 600 manipulator robot, to control the remote robot a teleoperation system was developed. This system includes two sites, local and remote. The sliding mode controller is installed at the remote site. The client asks for a position through an interface and receives the real positions after running of the task by the remote robot. Both sites are interconnected via the Internet. In order to verify the effectiveness of the sliding mode controller, that is compared with a classic PID controller. The developed approach is tested on a virtual robot. The results confirmed the high performance of this approach.Keywords: internet, manipulator robot, PID controller, remote control, sliding mode, teleoperation
Procedia PDF Downloads 3321857 The Dual Role of the Internet in the Development of Local Communities Through Ecotourism and Cultural Assimilation in Iran
Authors: Haniyeh Sameie
Abstract:
In the process of globalization, geographical boundaries gradually lose their importance, and ethnic, local, and regional cultures are integrated with each other and even marginalized. Globalization has many manifestations and aspects, including economic, political, social, etc., but this paper has focused on the cultural aspect of globalization. From this point of view, one of the important issues that have always been raised is the assimilation of diverse and plural cultures, which are gradually disappearing and destroyed in the onslaught of global culture and are dissolved in global culture. In the postmodern paradigm, the tools of the globalized world can be used to preserve and strengthen cultural diversity. For example, the Internet, as a globalization tool, can play an important role in preserving and recognizing local cultures. In today's world, the world nations and ethnic groups are trying to revive their specific and native cultures in different ways in opposition to the rising cultural assimilation and challenge the globalization of culture. One of the manifestations of these actions is addressing the issue of tourism and, specifically, eco-tourism, which is being developed in Iran as well as in other parts of the world, relying on the powerful tool of globalization, the Internet. Considering the significant growth of the ecotourism industry in Iran in recent years, this paper focuses on the role of the Internet in the development of ecotourism in Iran as one of the manifestations of tourism in recent decades and how to preserve and survive diverse local cultures and strengthen local communities against global culture through it. One of the major challenges in the development of communication technology in Iran in the last decade has been the debate over the necessity or non-necessity of access to high-speed Internet in the villages of Iran. Some believe that accessing the broadband internet in the villages may lead to the disappearance of local cultures and can facilitate the spread of western culture among villagers. On the other hand, the speed of expansion of ecotourism in Iran in the last ten years is owed to the development of the Internet in villages. In this regard, we pay attention to the dual role of the Internet in cultural assimilation and, at the same time, the platform that the online space has created for the growth and development of ecotourism accommodations as a source of stable income for local communities, focusing on the Iranian experience in the recent decade.Keywords: tourism, globalization, internet, ecotourism in Iran, cultural assimilation
Procedia PDF Downloads 83