Search results for: diplomatic communication
2409 Inter-Personal and Inter-Organizational Relationships in Supply Chain Integration: A Resource Orchestration Perspective
Authors: Bill Wang, Paul Childerhouse, Yuanfei Kang
Abstract:
Purpose: The research is to extend resource orchestration theory (ROT) into supply chain management (SCM) area to investigate the dyadic relationships at both individual and organizational levels in supply chain integration (SCI). Also, we try to explore the interaction mechanism between inter-personal relationships (IPRs) and inter-organizational (IORs) during the whole SCI process. Methodology/approach: The research employed an exploratory multiple case study approach of four New Zealand companies. The data was collected via semi-structured interviews with top, middle, and lower level managers and operators from different departments of both suppliers and customers triangulated with company archival data. Findings: The research highlights the important role of both IPRs and IORs in the whole SCI process. Both IPRs and IORs are valuable, inimitable resources but IORs are formal and exterior while IPRs are informal and subordinated. In the initial stage of SCI process, IPRs are seen as key resources antecedents to IOR building while three IPRs dimensions work differently: personal credibility acts as an icebreaker to strengthen the confidence forming IORs, and personal affection acts as a gatekeeper, whilst personal communication expedites the IORs process. In the maintenance and development stage, IORs and IPRs interact each other continuously: good interaction between IPRs and IORs can facilitate SCI process while the bad interaction between IPRs can damage the SCI process. On the other hand, during the life-cycle of SCI process, IPRs can facilitate the formation, development of IORs while IORs development can cultivate the ties of IPRs. Out of the three dimensions of IPRs, Personal communication plays a more important role to develop IORs than personal credibility and personal affection. Originality/value: This research contributes to ROT in supply chain management literature by highlighting the interaction of IPRs and IORs in SCI. The intangible resources and capabilities of three dimensions of IPRs need to be orchestrated and nurtured to achieve efficient and effective IORs in SCI. Also, IPRs and IORs need to be orchestrated in terms of breadth, depth, and life-cycle of whole SCI process. Our study provides further insight into the rarely explored inter-personal level of SCI. Managerial implications: Our research provides top management with further evidence of the significance roles of IPRs at different levels when working with trading partners. This highlights the need to actively manage and develop these soft IPRs skills as an intangible competitive resource. Further, the research identifies when staff with specific skills and connections should be utilized during the different stages of building and maintaining inter-organizational ties. More importantly, top management needs to orchestrate and balance the resources of IPRs and IORs.Keywords: case study, inter-organizational relationships, inter-personal relationships, resource orchestration, supply chain integration
Procedia PDF Downloads 2332408 Secure Network Coding-Based Named Data Network Mutual Anonymity Transfer Protocol
Authors: Tao Feng, Fei Xing, Ye Lu, Jun Li Fang
Abstract:
NDN is a kind of future Internet architecture. Due to the NDN design introduces four privacy challenges,Many research institutions began to care about the privacy issues of naming data network(NDN).In this paper, we are in view of the major NDN’s privacy issues to investigate privacy protection,then put forwards more effectively anonymous transfer policy for NDN.Firstly,based on mutual anonymity communication for MP2P networks,we propose NDN mutual anonymity protocol.Secondly,we add interest package authentication mechanism in the protocol and encrypt the coding coefficient, security of this protocol is improved by this way.Finally, we proof the proposed anonymous transfer protocol security and anonymity.Keywords: NDN, mutual anonymity, anonymous routing, network coding, authentication mechanism
Procedia PDF Downloads 4502407 A Secure Survey against Black Hole Attack in MANET
Authors: G. Usha, S. Kannimuthu, K. Mahalakshmi
Abstract:
Mobile Adhoc Network (MANET) is one of the most promising technologies that have applications ranging from various portable devices to military networks. MANET has no fixed infrastructure and the security of such network is a big concern. Therefore, in order to operate MANET’s securely, the misbehavior and intrusions should be detected before the attackers affect the network communication. In this article, we make a comprehensive survey against black hole attack that is a serious threat against MANET that exploits the routing behavior of the MANET. We have given broad survey solutions that detect black hole attacks in MANET. This is achieved by analyzing the techniques involved in detecting the attacks in each scheme. Furthermore, we examine about the challenges to the researchers for constructing an in-depth solution against black hole attack.Keywords: AODV, cross layer security, mobile Adhoc network (MANET), packet delivery ratio, single layer security
Procedia PDF Downloads 4062406 Autism Spectrum Disorder Interventions, Problems and Solutions
Authors: Ammara Jabeen
Abstract:
This survey report aims to find the interventions and their effectiveness that are being used globally as well as in Pakistan to treat autistic kids. ‘Autism spectrum disorder (ASD) is a state associated with brain development that shows ‘how a person perceives and socializes with others, causing problems in social interaction and communication’. Besides these problems, these children suffer from restricted and repetitive behaviors too. The term ‘Spectrum’ in Autism Spectrum Disorder refers to the wide range of symptoms and severity. The main cause of this Autism Spectrum Disorder is not known yet, but the research showed that genetics and environmental factors play important roles. In this survey report, after a literature review, some of the possible solutions are suggested based on the most common problems that these children are currently facing in their daily lives. Based on this report, we are able to overcome the lack of the resources (e.g. language, cost, training etc.) that mostly exist in Pakistani culture.Keywords: autism, interventions, spectrum, disorder
Procedia PDF Downloads 212405 Iraqi Media Entrepreneurs across Social Media: Factors and Challenges
Authors: Ahmed Omar Bali, Sherko Jabar, Hazhar Jalal, Mahdi Sofi-Karim
Abstract:
For a long while in Iraq, media organizations were owned by political parties, particularly the ruling parties, because media traditional organizations required big capital and human resources. This paper has examined the dynamics of Iraqi media market transformation with emphasizing on factors that help to merge media entrepreneurs and digital media firms which target audience on social media. A qualitative method was adopted in this study using open, in-depth interviews with 19 media entrepreneurs and three managers of media firms. The study revealed that relative freedom and advanced communication technologies have encouraged media entrepreneurs to drive the new media on producing short videos and broadcast them on social media which has become popular among media consumers.Keywords: media entrepreneur, Iraq, journalists, media technicians, digital media firms, media market
Procedia PDF Downloads 3022404 Racism In Indonesia: Case Study Racism Toward Papuan
Authors: Fikram Rettob
Abstract:
Racism is human rights violence that has been prohibited for long time ago. However, it is still happening in some part of the world, such as Indonesia. In this journal, the author is going to write about the racism toward Papuan which occurred in 2019 to 2021. The author found that the cause behind this human rights violence was the single assumption about race supremacy in Indonesia. Some people of Indonesia which are in Java that is near from central government believe that their race and the power are above other Indonesia’s race. In this research the author is using the concept of group or collectively oriented rights which explains that solidarity has rights to express their feeling, living in healthy environment, free to humanitarian assistance, communication and share in the common heritage of mankind. This research is applying qualitative methodology which based on secondary data that the author collected from news, journals, books, and articles, and then the author analyses and selects only the relevance one to put into the writing.Keywords: racism, Indonesia, Papuan, violence
Procedia PDF Downloads 202403 Good Environmental Governance Realization among the Three King Mongkut's Institutes of Technology in Bangkok, Thailand
Authors: Pastraporn Thipayasothorn, Vipawan Tadapratheep, Jintana Nokyoo
Abstract:
A physical realization of good environmental governance about an environmental principle, educational psychology and architecture in the three King Mongkut's Institutes of Technology, is generated for researching physical environmental factors which related to the good environmental governance, communication between the good environmental governance and a physical environmental, and a physical environmental design policy. Moreover, we collected data by a survey, observation and questionnaire that participants are students of the three King Mongkut's Institutes of Technology, and analyzed a relationship between a building utilization and the good environmental governance awareness. We found that, from the data analysis, a balance and creativity participation which played as the project users and communities of the good governance environmental promotion in the institutes helps the good governance and environmental development in the future.Keywords: built environment, good governance, environmental governance, physical environmental
Procedia PDF Downloads 4372402 Evaluation of Colour Perception in Different Correlated Colour Temperature of LED Lighting
Authors: Saadet Akbay, Ayşe Nihan Avcı
Abstract:
The perception of colour is a subjective experience which depends on age, gender, race, cultural and educational backgrounds, etc. of an individual. However, colour perception is also affected by the correlated colour temperature (CCT) of a light source which is considered as one of the most fundamental quantitative lighting characteristics. This study focuses on evaluating colour perception in different CCT of light emitting diodes (LED) lighting. The aim is to compare the inherent colours with the perceived colours under two CCT of ‘warm’ (2700K), and ‘cool’ (4000K) LED lights and to understand how different CTT affect the perception of a colour. Analysis and specifications of colour attributes are made with Natural Colour System (NCS) which is an international colour communication system. The outcome of the study reveals the possible tendencies for perceived colours under different illuminance levels of LED lighting.Keywords: colour perception, correlated colour temperature, inherent and perceived colour, LED lighting, natural colour system (NCS)
Procedia PDF Downloads 2652401 Impact of New Media Technologies to News, Social Interactions, and Traditional Media
Authors: Ademola Bamgbose
Abstract:
The new media revolution, which encompasses a wide variety of new media technologies like blogs, social networking, visual worlds, wikis, have had a great influence on communications, traditional media and across other disciplines. This paper gives a review of the impact of new media technologies on the news, social interactions and traditional media in developing and developed countries. The study points to the fact that there is a significant impact of new media technologies on the news, social interactions and the traditional media in developing and developed countries, albeit both positively and negatively. Social interactions have been significantly affected, as well as in news production and reporting. It is reiterated that despite the pervasiveness of new media technologies, it would not bring to a total decline of traditional media. This paper contributes to the theoretical framework on the new media and will help to assess the extent of the impact of the new media in different locations.Keywords: communication, media, news, new media technologies, social interactions, traditional media
Procedia PDF Downloads 2822400 Femtocell Stationed Flawless Handover in High Agility Trains
Authors: S. Dhivya, M. Abirami, M. Farjana Parveen, M. Keerthiga
Abstract:
The development of high-speed railway makes people’s lives more and more convenient; meanwhile, handover is the major problem on high-speed railway communication services. In order to overcome that drawback the architecture of Long-Term Evolution (LTE) femtocell networks is used to improve network performance, and the deployment of a femtocell is a key for bandwidth limitation and coverage issues in conventional mobile network system. To increase the handover performance this paper proposed a multiple input multiple output (MIMO) assisted handoff (MAHO) algorithm. It is a technique used in mobile telecom to transfer a mobile phone to a new radio channel with stronger signal strength and improved channel quality.Keywords: flawless handover, high-speed train, home evolved Node B, LTE, mobile femtocell, RSS
Procedia PDF Downloads 4732399 Experimental Networks Synchronization of Chua’s Circuit in Different Topologies
Authors: Manuel Meranza-Castillon, Rolando Diaz-Castillo, Adrian Arellano-Delgado, Cesar Cruz-Hernandez, Rosa Martha Lopez-Gutierrez
Abstract:
In this work, we deal with experimental network synchronization of chaotic nodes with different topologies. Our approach is based on complex system theory, and we use a master-slave configuration to couple the nodes in the networks. In particular, we design and implement electronically complex dynamical networks composed by nine coupled chaotic Chua’s circuits with topologies: in nearest-neighbor, small-world, open ring, star, and global. Also, network synchronization is evaluated according to a particular coupling strength for each topology. This study is important by the possible applications to private transmission of information in a chaotic communication network of multiple users.Keywords: complex networks, Chua's circuit, experimental synchronization, multiple users
Procedia PDF Downloads 3472398 Image Steganography Using Least Significant Bit Technique
Authors: Preeti Kumari, Ridhi Kapoor
Abstract:
In any communication, security is the most important issue in today’s world. In this paper, steganography is the process of hiding the important data into other data, such as text, audio, video, and image. The interest in this topic is to provide availability, confidentiality, integrity, and authenticity of data. The steganographic technique that embeds hides content with unremarkable cover media so as not to provoke eavesdropper’s suspicion or third party and hackers. In which many applications of compression, encryption, decryption, and embedding methods are used for digital image steganography. Due to compression, the nose produces in the image. To sustain noise in the image, the LSB insertion technique is used. The performance of the proposed embedding system with respect to providing security to secret message and robustness is discussed. We also demonstrate the maximum steganography capacity and visual distortion.Keywords: steganography, LSB, encoding, information hiding, color image
Procedia PDF Downloads 4722397 Multiple Query Optimization in Wireless Sensor Networks Using Data Correlation
Authors: Elaheh Vaezpour
Abstract:
Data sensing in wireless sensor networks is done by query deceleration the network by the users. In many applications of the wireless sensor networks, many users send queries to the network simultaneously. If the queries are processed separately, the network’s energy consumption will increase significantly. Therefore, it is very important to aggregate the queries before sending them to the network. In this paper, we propose a multiple query optimization framework based on sensors physical and temporal correlation. In the proposed method, queries are merged and sent to network by considering correlation among the sensors in order to reduce the communication cost between the sensors and the base station.Keywords: wireless sensor networks, multiple query optimization, data correlation, reducing energy consumption
Procedia PDF Downloads 3342396 The Role of the Constructivist Learning Theory and Collaborative Learning Environment on Wiki Classroom and the Relationship between Them
Authors: Ibraheem Alzahrani
Abstract:
This paper seeks to discover the relationship between both the social constructivist learning theory and the collaborative learning environment. This relationship can be identified through given an example of the learning environment. Due to wiki characteristics, wiki can be used to understand the relationship between constructivist learning theory and collaborative learning environment. However, several evidences will come in this paper to support the idea of why wiki is the suitable method to explore the relationship between social constructivist theory and the collaborative learning and their role in learning. Moreover, learning activities in wiki classroom will be discussed in this paper to find out the result of the learners' interaction in the classroom groups, which will be through two types of communication; synchronous and asynchronous.Keywords: social constructivist, collaborative, environment, wiki, activities
Procedia PDF Downloads 5022395 Evidence-Based Approaches and Effective Practices for Preventing Bullying
Authors: Nato Asatiani
Abstract:
The research underscores the critical role of a positive school climate in combating bullying. The results can be generalized and assumed that bullying behavior occurs when there is a victim, and the environment allows the realization of aggression; school culture is a strong predictor of bullying behavior; the probability of becoming a victim (victimhood) is high among those teenagers who experience high levels of stress in the environment; when a teenager experiences a sense of threat, such physical, psychological, or social symptoms are developed that makes teenagers vulnerable to bullying; the school culture that is oriented to adherence to the rules of communication and mutual respect in the group reduces the likelihood of a teenager to become a victim; consequently, when a teenager has a sense of wellness even in combination with aggression, this sense reduces the likelihood of a teenager to become a victim.Keywords: bullying, adolescence, aggression, school climate
Procedia PDF Downloads 292394 The Spatial Circuit of the Audiovisual Industry in Argentina: From Monopoly and Geographic Concentration to New Regionalization and Democratization Policies
Authors: André Pasti
Abstract:
Historically, the communication sector in Argentina is characterized by intense monopolization and geographical concentration in the city of Buenos Aires. In 2000, the four major media conglomerates in operation – Clarín, Telefónica, America and Hadad – controlled 84% of the national media market. By 2009, new policies were implemented as a result of civil society organizations demands. Legally, a new regulatory framework was approved: the law 26,522 of Audiovisual Communications Services. Supposedly, these policies intend to create new conditions for the development of the audiovisual economy in the territory of Argentina. The regionalization of audiovisual production and the democratization of channels and access to media were among the priorities. This paper analyses the main changes and continuities in the organization of the spatial circuit of the audiovisual industry in Argentina provoked by these new policies. These new policies aim at increasing the diversity of audiovisual producers and promoting regional audiovisual industries. For this purpose, a national program for the development of audiovisual centers within the country was created. This program fostered a federalized production network, based on nine audiovisual regions and 40 nodes. Each node has created technical, financial and organizational conditions to gather different actors in audiovisual production – such as SMEs, social movements and local associations. The expansion of access to technical networks was also a concern of other policies, such as ‘Argentina connected’, whose objective was to expand access to broadband Internet. The Open Digital Television network also received considerable investments. Furthermore, measures have been carried out in order to impose limits on the concentration of ownership as well as to eliminate the oligopolies and to ensure more competition in the sector. These actions intended to force a divide of the media conglomerates into smaller groups. Nevertheless, the corporations that compose these conglomerates resist strongly, making full use of their economic and judiciary power. Indeed, the absence of effective impact of such measures can be testified by the fact that the audiovisual industry remains strongly concentrated in Argentina. Overall, these new policies were designed properly to decentralize audiovisual production and expand the regional diversity of the audiovisual industry. However, the effective transformation of the organization of the audiovisual circuit in the territory faced several resistances. This can be explained firstly and foremost by the ideological and economic power of the media conglomerates. In the second place, there is an inherited inertia from the unequal distribution of the objects needed for the audiovisual production and consumption. Lastly, the resistance also relies on financial needs and in the excessive dependence of the state for the promotion of regional audiovisual production.Keywords: Argentina, audiovisual industry, communication policies, geographic concentration, regionalization, spatial circuit
Procedia PDF Downloads 2162393 Developed Text-Independent Speaker Verification System
Authors: Mohammed Arif, Abdessalam Kifouche
Abstract:
Speech is a very convenient way of communication between people and machines. It conveys information about the identity of the talker. Since speaker recognition technology is increasingly securing our everyday lives, the objective of this paper is to develop two automatic text-independent speaker verification systems (TI SV) using low-level spectral features and machine learning methods. (i) The first system is based on a support vector machine (SVM), which was widely used in voice signal processing with the aim of speaker recognition involving verifying the identity of the speaker based on its voice characteristics, and (ii) the second is based on Gaussian Mixture Model (GMM) and Universal Background Model (UBM) to combine different functions from different resources to implement the SVM based.Keywords: speaker verification, text-independent, support vector machine, Gaussian mixture model, cepstral analysis
Procedia PDF Downloads 562392 Top Skills That Build Cultures at Organizations
Authors: Priyanka Botny Srinath, Alessandro Suglia, Mel McKendrick
Abstract:
Background: Organizational cultural studies integrate sociology and anthropology, portraying man as a creator of symbols, languages, beliefs, and ideologies -essentially, a creator and manager of meaning. In our research, we leverage analytical measures to discern whether an organization embodies a singular culture or a myriad of subcultures. Fast-forward to 2023, our research thesis focuses on digitally measuring culture, coining it as the "Work Culture Quotient." This entails conceptually mapping common experiential patterns to provide executives insights into the digital organization journey, aiding in understanding their current position and identifying future steps. Objectives: Finding the new age skills that help in defining the culture; understand the implications of post-COVID effects; derive a digital framework for measuring skillsets. Method: We conducted two comprehensive Delphi studies to distill essential insights. Delphi 1: Through a thematic analysis of interviews with 20 high-level leaders representing companies across diverse regions -India, Japan, the US, Canada, Morocco, and Uganda- we identified 20 key skills critical for cultivating a robust organizational culture. The skills are -influence, self-confidence, optimism, empathy, leadership, collaboration and cooperation, developing others, commitment, innovativeness, leveraging diversity, change management, team capabilities, self-control, digital communication, emotional awareness, team bonding, communication, problem solving, adaptability, and trustworthiness. Delphi 2: Subject matter experts were asked to complete a questionnaire derived from the thematic analysis in stage 1 to formalise themes and draw consensus amongst experts on the most important workplace skills. Results: The thematic analysis resulted in 20 workplace employee skills being identified. These skills were all included in the Delphi round 2 questionnaire. From the outputs, we analysed the data using R Studio for arriving at agreement and consensus, we also used sum of squares method to compare various agreements to extract various themes with a threshold of 80% agreements. This yielded three themes at over 80% agreement (leadership, collaboration and cooperation, communication) and three further themes at over 60% agreement (commitment, empathy, trustworthiness). From this, we selected five questionnaires to be included in the primary data collection phase, and these will be paired with the digital footprints to provide a workplace culture quotient. Implications: The findings from these studies bear profound implications for decision-makers, revolutionizing their comprehension of organizational culture. Tackling the challenge of mapping the digital organization journey involves innovative methodologies that probe not only external landscapes but also internal cultural dynamics. This holistic approach furnishes decision-makers with a nuanced understanding of their organizational culture and visualizes pivotal skills for employee growth. This clarity enables informed choices resonating with the organization's unique cultural fabric. Anticipated outcomes transcend mere individual cultural measurements, aligning with organizational goals to unveil a comprehensive view of culture, exposing artifacts and depth. Armed with this profound understanding, decision-makers gain tangible evidence for informed decision-making, strategically leveraging cultural strengths to cultivate an environment conducive to growth, innovation, and enduring success, ultimately leading to measurable outcomes.Keywords: leadership, cooperation, collaboration, teamwork, work culture
Procedia PDF Downloads 452391 Reduction of Impulsive Noise in OFDM System using Adaptive Algorithm
Authors: Alina Mirza, Sumrin M. Kabir, Shahzad A. Sheikh
Abstract:
The Orthogonal Frequency Division Multiplexing (OFDM) with high data rate, high spectral efficiency and its ability to mitigate the effects of multipath makes them most suitable in wireless application. Impulsive noise distorts the OFDM transmission and therefore methods must be investigated to suppress this noise. In this paper, a State Space Recursive Least Square (SSRLS) algorithm based adaptive impulsive noise suppressor for OFDM communication system is proposed. And a comparison with another adaptive algorithm is conducted. The state space model-dependent recursive parameters of proposed scheme enables to achieve steady state mean squared error (MSE), low bit error rate (BER), and faster convergence than that of some of existing algorithm.Keywords: OFDM, impulsive noise, SSRLS, BER
Procedia PDF Downloads 4552390 Uplink Throughput Prediction in Cellular Mobile Networks
Authors: Engin Eyceyurt, Josko Zec
Abstract:
The current and future cellular mobile communication networks generate enormous amounts of data. Networks have become extremely complex with extensive space of parameters, features and counters. These networks are unmanageable with legacy methods and an enhanced design and optimization approach is necessary that is increasingly reliant on machine learning. This paper proposes that machine learning as a viable approach for uplink throughput prediction. LTE radio metric, such as Reference Signal Received Power (RSRP), Reference Signal Received Quality (RSRQ), and Signal to Noise Ratio (SNR) are used to train models to estimate expected uplink throughput. The prediction accuracy with high determination coefficient of 91.2% is obtained from measurements collected with a simple smartphone application.Keywords: drive test, LTE, machine learning, uplink throughput prediction
Procedia PDF Downloads 1552389 Red Green Blue Image Encryption Based on Paillier Cryptographic System
Authors: Mamadou I. Wade, Henry C. Ogworonjo, Madiha Gul, Mandoye Ndoye, Mohamed Chouikha, Wayne Patterson
Abstract:
In this paper, we present a novel application of the Paillier cryptographic system to the encryption of RGB (Red Green Blue) images. In this method, an RGB image is first separated into its constituent channel images, and the Paillier encryption function is applied to each of the channels pixel intensity values. Next, the encrypted image is combined and compressed if necessary before being transmitted through an unsecured communication channel. The transmitted image is subsequently recovered by a decryption process. We performed a series of security and performance analyses to the recovered images in order to verify their robustness to security attack. The results show that the proposed image encryption scheme produces highly secured encrypted images.Keywords: image encryption, Paillier cryptographic system, RBG image encryption, Paillier
Procedia PDF Downloads 2362388 Implementation of a Web-Based Wireless ECG Measuring and Recording System
Authors: Onder Yakut, Serdar Solak, Emine Dogru Bolat
Abstract:
Measuring the Electrocardiogram (ECG) signal is an essential process for the diagnosis of the heart diseases. The ECG signal has the information of the degree of how much the heart performs its functions. In medical diagnosis and treatment systems, Decision Support Systems processing the ECG signal are being developed for the use of clinicians while medical examination. In this study, a modular wireless ECG (WECG) measuring and recording system using a single board computer and e-Health sensor platform is developed. In this designed modular system, after the ECG signal is taken from the body surface by the electrodes first, it is filtered and converted to digital form. Then, it is recorded to the health database using Wi-Fi communication technology. The real time access of the ECG data is provided through the internet utilizing the developed web interface.Keywords: ECG, e-health sensor shield, Raspberry Pi, wiFi technology
Procedia PDF Downloads 3982387 The Use of Emoticons in Polite Phrases of Greeting and Thanks
Authors: Zuzana Komrsková
Abstract:
This paper shows the connection between emoticons and politeness in written computer-mediated communication. It studies if there are some differences in the use of emoticon between Czech and English written tweets. My assumptions about the use of emoticons were based on the use of greetings and thanks in real, face to face situations. The first assumption, that welcome greeting phrase would be accompanied by positive emoticon was correct. But for the farewell greeting both positive and negative emoticons are possible. My results show lower frequency of negative emoticons in this context. I also found quite often both positive and negative emoticon in the same tweet. The expression of gratitude is associated with positive emotions. The results show that emoticons accompany polite phrases of greeting and thanks very often both in Czech and English. The use of emoticons with studied polite phrases shows that emoticons have become an integral part of these phrases.Keywords: Czech, emoticon, english, politeness, twitter
Procedia PDF Downloads 4032386 Symmetric Arabic Language Encryption Technique Based on Modified Playfair Algorithm
Authors: Fairouz Beggas
Abstract:
Due to the large number of exchanges in the networks, the security of communications is essential. Most ways of keeping communication secure rely on encryption. In this work, a symmetric encryption technique is offered to encrypt and decrypt simple Arabic scripts based on a multi-level security. A proposed technique uses an idea of Playfair encryption with a larger table size and an additional layer of encryption to ensure more security. The idea of the proposed algorithm aims to generate a dynamic table that depends on a secret key. The same secret key is also used to create other secret keys to over-encrypt the plaintext in three steps. The obtained results show that the proposed algorithm is faster in terms of encryption/decryption speed and can resist to many types of attacks.Keywords: arabic data, encryption, playfair, symmetric algorithm
Procedia PDF Downloads 862385 The Batteryless Wi-Fi Backscatter System and Method for Improving the Transmission Range
Authors: Young-Min Ko, Seung-Jun Yu, Seongjoo Lee, Hyoung-Kyu Song
Abstract:
The Internet of things (IoT) system has attracted attention. IoT is a technology to connect all the objects to the internet as well as computer. IoT makes it possible for providing more data interoperability methods for an application purpose. Among the IoT technology, the research of devices so that they can communicate without power supply has been actively conducted. Batteryless system permits us to communicate without power supply devices. In this paper, batteryless backscatter system is used as a tag. And mobile devices which are embedded wireless fidelity (Wi-Fi) chipset are used as a reader. The backscatter tag can be obtained Internet connectivity from the reader. Conventional Wi-Fi backscatter system has limitation in the transmission range. In this paper, the proposed algorithm can be obtained improved reliability as well as overcoming the limitation about transmission range.Keywords: Ambient RF, Backscatter, Batteryless communication, Energy-harvesting, IoT, RFID, Tag, Wi-Fi
Procedia PDF Downloads 3872384 Level up Entrepreneurial Behaviors: A Case Study on the Use of Gamification to Encourage Entrepreneurial Acting and Thinking
Authors: Lena Murawski
Abstract:
Currently, researchers and experts from the business world recognize entrepreneurial behaviors as a decisive factor for economic success, allowing firms to adapt to changing internal and external needs. The purpose of this study is to explore how gamification can enhance entrepreneurial behaviors, reporting on a gamification project in a new venture operating in the IT sector in Germany. This article is based on data gathered from observations of pre‐ and post‐implementation in the case company. Results have indicated that the use of gamification encourages entrepreneurial behaviors, especially relating to seeking ways on how to integrate new employees, improve teamwork and communication, and to adapt existing processes to increase productivity. The interdisciplinary dialogue furthers our understanding of factors that foster entrepreneurial behaviors. The matter is of practical relevance, guiding practitioners on how to exploit the potentials of gamification to exhibit an entrepreneurial orientation in organizations.Keywords: case study, entrepreneurial behaviors, gamification, new venture
Procedia PDF Downloads 1582383 A Framework for Organizational Architecture of Electronic City and Electronic Municipality
Authors: Ali Zeynali Azim, Mostfa Basiry, Samira Kafshi, Elnaz Behnoud
Abstract:
This study provides a framework for enterprise architecture in electronic city is electronic municipality. Nowadays, information technology as an emerging phenomenon has a special place in the world. Development of information and communication technology causes many changes in various fields, including emerging e-cities, municipalities and citizens. However, e-city and e-municipality need essential enterprise architecture. In order to develop enterprise architecture of e-city and e-municipality, enterprise architecture maturity method should be applied. Therefore, one of the most important needs of organizations is to choose important activities according to limitations. The studies show that there is a close relationship between IT, enterprise architecture, e-city and e-municipality. This study aimed to clarify the concept of IT, enterprise architecture, electronic city and e-municipality and how they are related to each other. Is the existence of each of IT, enterprise architecture, electronic and electronic municipal requires each other?Keywords: enterprise architecture, e-city, e-municipality, e-government, e-citizen, service-oriented architecture
Procedia PDF Downloads 5322382 Hand Controlled Mobile Robot Applied in Virtual Environment
Authors: Jozsef Katona, Attila Kovari, Tibor Ujbanyi, Gergely Sziladi
Abstract:
By the development of IT systems, human-computer interaction is also developing even faster and newer communication methods become available in human-machine interaction. In this article, the application of a hand gesture controlled human-computer interface is being introduced through the example of a mobile robot. The control of the mobile robot is implemented in a realistic virtual environment that is advantageous regarding the aspect of different tests, parallel examinations, so the purchase of expensive equipment is unnecessary. The usability of the implemented hand gesture control has been evaluated by test subjects. According to the opinion of the testing subjects, the system can be well used, and its application would be recommended on other application fields too.Keywords: human-machine interface (HCI), mobile robot, hand control, virtual environment
Procedia PDF Downloads 2952381 Threshold Competency of Students in Graduate School
Authors: Terada Pinyo
Abstract:
This study is the survey research, designed to find out the threshold competency of graduate students in terms of knowledge excellency and professional skills proficiency based on Thai Qualifications Framework for Higher Education (TQF). The sample group consisted of 240 students. The results were collected by stratified sampling, using study programs for each stage. The results were analysed and calculated by computer program. Statistics used during analysing were percentage, mean, and standard deviation. From the study, the threshold competency of graduate students were in very high score range in both overall and specific category. The top category which received the most score was interpersonal skills and responsibility, following by ethics and morality, knowledge and skills, and numerical communication and information technology.Keywords: threshold competency, Thai qualifications framework for higher education, graduate school
Procedia PDF Downloads 4012380 Adolescents' Perspectives on Parental Responses to Teen Dating Violence
Authors: Beverly Black
Abstract:
Teen dating violence (TDV) is a significant public health problem with severe negative impact on youths’ mental and physical health and well-being. Exacerbating the negative impact of TDV victimization is the fact that teens rarely report the violence. They are fearful to tell friends or family, especially parents. The family context is the first place where children learn about interpersonal relationships, and therefore, parental response of teens’ life experiences influences teens’ actions and development. This study examined youths’ perspectives on parental responses to TDV. Effective parental responses to TDV may increase the likelihood that youth will leave abusive relationships. Method. Eleven gender-separate focus groups were conducted with 27 females and 28 males, ages 12 to 17, to discuss parental responses to teen dating violence. Youth were recruited from a metropolitan community in the southwestern part of the United States. Focus groups questions asked the middle and high school youth how they would want their parents to respond to them if they approached them about various incidents of dating violence. All focus groups were transcribed. Using QSR-N10, two researchers’ analyzed data first using open and axial coding techniques to find overarching themes. Researchers triangulated the coded data to ensure accurate interpretations of the participants’ messages and used the scenario questions to structure the coded results. Results. Most youths suggested that parents should simply talk with them; they recognized the importance of communication. Teens wanted parents to ask questions, educate them about healthy relationships, share their personal experiences, and give teens advice (tell them to break up, limit contact with perpetrator, go to police). Younger youth expressed more willingness to listen to parental advice. Older youth wanted their parents to give them the opportunity to make their decisions. Many of the teens’ comments focused on the importance of parents protecting the teen, providing support and empathy for the teen, and especially refraining from overreacting (not yelling, not getting angry and staying calm). Implications. Parents need to know how to effectively respond to youth needing to leave unhealthy relationships. Demanding that their children end a relationship may not be a realistic approach to TDV. A parent’s ineffective response, when approached by an adolescent for assistance in TDV, may influence a youth to dismiss parents and other adults as viable options for seeking assistance. Parents and prevention educators can learn from hearing youths’ voices about effective responses to TDV.Keywords: adolescents dating abuse, adolescent and parent communication, parental responses to teen dating violence, teen dating violence
Procedia PDF Downloads 272