Search results for: computing and culture
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 4455

Search results for: computing and culture

4275 Networking the Biggest Challenge in Hybrid Cloud Deployment

Authors: Aishwarya Shekhar, Devesh Kumar Srivastava

Abstract:

Cloud computing has emerged as a promising direction for cost efficient and reliable service delivery across data communication networks. The dynamic location of service facilities and the virtualization of hardware and software elements are stressing the communication networks and protocols, especially when data centres are interconnected through the internet. Although the computing aspects of cloud technologies have been largely investigated, lower attention has been devoted to the networking services without involving IT operating overhead. Cloud computing has enabled elastic and transparent access to infrastructure services without involving IT operating overhead. Virtualization has been a key enabler for cloud computing. While resource virtualization and service abstraction have been widely investigated, networking in cloud remains a difficult puzzle. Even though network has significant role in facilitating hybrid cloud scenarios, it hasn't received much attention in research community until recently. We propose Network as a Service (NaaS), which forms the basis of unifying public and private clouds. In this paper, we identify various challenges in adoption of hybrid cloud. We discuss the design and implementation of a cloud platform.

Keywords: cloud computing, networking, infrastructure, hybrid cloud, open stack, naas

Procedia PDF Downloads 400
4274 A Survey on Data-Centric and Data-Aware Techniques for Large Scale Infrastructures

Authors: Silvina Caíno-Lores, Jesús Carretero

Abstract:

Large scale computing infrastructures have been widely developed with the core objective of providing a suitable platform for high-performance and high-throughput computing. These systems are designed to support resource-intensive and complex applications, which can be found in many scientific and industrial areas. Currently, large scale data-intensive applications are hindered by the high latencies that result from the access to vastly distributed data. Recent works have suggested that improving data locality is key to move towards exascale infrastructures efficiently, as solutions to this problem aim to reduce the bandwidth consumed in data transfers, and the overheads that arise from them. There are several techniques that attempt to move computations closer to the data. In this survey we analyse the different mechanisms that have been proposed to provide data locality for large scale high-performance and high-throughput systems. This survey intends to assist scientific computing community in understanding the various technical aspects and strategies that have been reported in recent literature regarding data locality. As a result, we present an overview of locality-oriented techniques, which are grouped in four main categories: application development, task scheduling, in-memory computing and storage platforms. Finally, the authors include a discussion on future research lines and synergies among the former techniques.

Keywords: data locality, data-centric computing, large scale infrastructures, cloud computing

Procedia PDF Downloads 244
4273 Distributed Cost-Based Scheduling in Cloud Computing Environment

Authors: Rupali, Anil Kumar Jaiswal

Abstract:

Cloud computing can be defined as one of the prominent technologies that lets a user change, configure and access the services online. it can be said that this is a prototype of computing that helps in saving cost and time of a user practically the use of cloud computing can be found in various fields like education, health, banking etc.  Cloud computing is an internet dependent technology thus it is the major responsibility of Cloud Service Providers(CSPs) to care of data stored by user at data centers. Scheduling in cloud computing environment plays a vital role as to achieve maximum utilization and user satisfaction cloud providers need to schedule resources effectively.  Job scheduling for cloud computing is analyzed in the following work. To complete, recreate the task calculation, and conveyed scheduling methods CloudSim3.0.3 is utilized. This research work discusses the job scheduling for circulated processing condition also by exploring on this issue we find it works with minimum time and less cost. In this work two load balancing techniques have been employed: ‘Throttled stack adjustment policy’ and ‘Active VM load balancing policy’ with two brokerage services ‘Advanced Response Time’ and ‘Reconfigure Dynamically’ to evaluate the VM_Cost, DC_Cost, Response Time, and Data Processing Time. The proposed techniques are compared with Round Robin scheduling policy.

Keywords: physical machines, virtual machines, support for repetition, self-healing, highly scalable programming model

Procedia PDF Downloads 151
4272 From Prince to Vampire: The Image of Vlad Tepeș Dracula in Popular Culture. Case Study: Castlevania, From Video Game to Netflix Production

Authors: Claudia Horeanu

Abstract:

Ever since the first horror films, Count Dracula, the image inspired mainly by the novel written by Bram Stoker, is an almost indispensable character in popular culture. In the shadow of his vampire image is a Romanian ruler, Vlad Țepeș, from Wallachia, a ruler who was also nicknamed Drăculea. The purpose of this research is to analyze the evolution of the image of Vlad Tepeș/Dracula in popular culture, identifying the reasons and themes associated with this character, and to explore how the figure of Vlad Tepeș/Dracula evolved according to social and political changes in different historical periods. It is also believed that there are elements that have remained constant in the depictions of Vlad the Impaler/Dracula.

Keywords: popular culture, dracula, vlad tepes, castlevania, vampire

Procedia PDF Downloads 49
4271 Review of Cyber Security in Oil and Gas Industry with Cloud Computing Perspective: Taxonomy, Issues and Future Direction

Authors: Irfan Mohiuddin, Ahmad Al Mogren

Abstract:

In recent years, cloud computing has earned substantial attention in the Oil and Gas Industry and provides services in all the phases of the industry lifecycle. Oil and gas supply infrastructure, in particular, is more vulnerable to accidental, natural and intentional threats because of its widespread distribution. Numerous surveys have been conducted on cloud security and privacy. However, to the best of our knowledge, hardly any survey is carried out that reviews cyber security in all phases with a cloud computing perspective. Moreover, a distinctive classification is performed for all the cloud-based cyber security measures based on the cloud component in use. The classification approach will enable researchers to identify the required technique used to enhance the security in specific cloud components. Also, the limitation of each component will allow the researchers to design optimal algorithms. Lastly, future directions are given to point out the imminent challenges that can pave the way for researchers to further enhance the resilience to cyber security threats in the oil and gas industry.

Keywords: cyber security, cloud computing, safety and security, oil and gas industry, security threats, oil and gas pipelines

Procedia PDF Downloads 124
4270 Advanced Simulation and Enhancement for Distributed and Energy Efficient Scheduling for IEEE802.11s Wireless Enhanced Distributed Channel Access Networks

Authors: Fisayo G. Ojo, Shamala K. Subramaniam, Zuriati Ahmad Zukarnain

Abstract:

As technology is advancing and wireless applications are becoming dependable sources, while the physical layer of the applications are been embedded into tiny layer, so the more the problem on energy efficiency and consumption. This paper reviews works done in recent years in wireless applications and distributed computing, we discovered that applications are becoming dependable, and resource allocation sharing with other applications in distributed computing. Applications embedded in distributed system are suffering from power stability and efficiency. In the reviews, we also prove that discrete event simulation has been left behind untouched and not been adapted into distributed system as a simulation technique in scheduling of each event that took place in the development of distributed computing applications. We shed more lights on some researcher proposed techniques and results in our reviews to prove the unsatisfactory results, and to show that more work still have to be done on issues of energy efficiency in wireless applications, and congestion in distributed computing.

Keywords: discrete event simulation (DES), distributed computing, energy efficiency (EE), internet of things (IOT), quality of service (QOS), user equipment (UE), wireless mesh network (WMN), wireless sensor network (wsn), worldwide interoperability for microwave access x (WiMAX)

Procedia PDF Downloads 173
4269 Utilizing Grid Computing to Enhance Power Systems Performance

Authors: Rafid A. Al-Khannak, Fawzi M. Al-Naima

Abstract:

Power load is one of the most important controlling keys which decide power demands and illustrate power usage to shape power market. Hence, power load forecasting is the parameter which facilitates understanding and analyzing all these aspects. In this paper, power load forecasting is solved under MATLAB environment by constructing a neural network for the power load to find an accurate simulated solution with the minimum error. A developed algorithm to achieve load forecasting application with faster technique is the aim for this paper. The algorithm is used to enable MATLAB power application to be implemented by multi machines in the Grid computing system, and to accomplish it within much less time, cost and with high accuracy and quality. Grid Computing, the modern computational distributing technology, has been used to enhance the performance of power applications by utilizing idle and desired Grid contributor(s) by sharing computational power resources.

Keywords: DeskGrid, Grid Server, idle contributor(s), grid computing, load forecasting

Procedia PDF Downloads 459
4268 Culture and Commodification: A Study of William Gibson's the Bridge Trilogy

Authors: Aruna Bhat

Abstract:

Culture can be placed within the social structure that embodies both the creation of social groups, and the manner in which they interact with each other. As many critics have pointed out, culture in the Postmodern context has often been considered a commodity, and indeed it shares many attributes with commercial products. Popular culture follows many patterns of behavior derived from Economics, from the simple principle of supply and demand, to the creation of marketable demographics which fit certain criterion. This trend is exemplary visible in contemporary fiction, especially in contemporary science fiction; Cyberpunk fiction in particular which is an off shoot of pure science fiction. William Gibson is one such author who in his works portrays such a scenario, and in his The Bridge Trilogy he adds another level of interpretation to this state of affairs, by describing a world that is centered on industrialization of a new kind – that focuses around data in the cyberspace. In this new world, data has become the most important commodity, and man has become nothing but a nodal point in a vast ocean of raw data resulting into commodification of each thing including Culture. This paper will attempt to study the presence of above mentioned elements in William Gibson’s The Bridge Trilogy. The theories applied will be Postmodernism and Cultural studies.

Keywords: culture, commodity, cyberpunk, data, postmodern

Procedia PDF Downloads 481
4267 Towards a Secure Storage in Cloud Computing

Authors: Mohamed Elkholy, Ahmed Elfatatry

Abstract:

Cloud computing has emerged as a flexible computing paradigm that reshaped the Information Technology map. However, cloud computing brought about a number of security challenges as a result of the physical distribution of computational resources and the limited control that users have over the physical storage. This situation raises many security challenges for data integrity and confidentiality as well as authentication and access control. This work proposes a security mechanism for data integrity that allows a data owner to be aware of any modification that takes place to his data. The data integrity mechanism is integrated with an extended Kerberos authentication that ensures authorized access control. The proposed mechanism protects data confidentiality even if data are stored on an untrusted storage. The proposed mechanism has been evaluated against different types of attacks and proved its efficiency to protect cloud data storage from different malicious attacks.

Keywords: access control, data integrity, data confidentiality, Kerberos authentication, cloud security

Procedia PDF Downloads 314
4266 Relationship between Cinema and Culture: Reel and Real life in India

Authors: Prachi Chavda

Abstract:

The world, as of today, is smaller than it was for those who lived few decades ago. Internet, media and telecommunications have impacted the world like never before. Culture is the pillar upon which a society mushrooms. A culture develops with human creativity over the years and also by the exchange and intermixing of ideas and way of life across different civilizations and we can say that one of the influencing medium of exchange and intermixing of these ideas is cinema. Cinema has been the wonderful as well as important medium of communication since it has been emerged. Change is the thumb rule of life and so have been Indian cinema. As society has evolved from time to time so has the stories of Indian Cinema and its characters, hence it directly effects to the Indian culture as cinema has been very strong mediator for information exchange. The paper tries to discuss deeply how Indian cinema (reel life) and Indian culture (real life) has been influencing each other that results into a constant modification in both. Moreover, the research tries to deal with the issue with some examples that as a outcome how movies impact the Indian culture positively and negatively on culture. Therefore, it spreads the wave of change in cultural settings of society. The paper also tries to light the psychology of youth of India. Today, children and youth greatly admire the ostentatious materialistic display of outfits and style of the actors in the movies. Also, the movies bearing romanticism and showcasing disputatious issues like pre-marital sex, live-in relationship, homo-sexuality etc. though without highlighting them extensively have indeed inspired the commoners. Pros and cons always exist. Such revelation of issues certainly give a spark in the minds of those who are in their formative years and the effect of which is seen with the passage of time Thus, we can say that emergence of cinema as a strong tool of social change as well as culture as a triggering factor for transformation in cinema. As, a finding we can say that culture and cinema of India are influencing factors for each other. Cinema and culture are two sides of a coin, where both are responsible for evolution of each other.

Keywords: cinema, culture, influence, transformation

Procedia PDF Downloads 383
4265 Multi-Criteria Evaluation of IDS Architectures in Cloud Computing

Authors: Elmahdi Khalil, Saad Enniari, Mostapha Zbakh

Abstract:

Cloud computing promises to increase innovation and the velocity with witch applications are deployed, all while helping any enterprise meet most IT service needs at a lower total cost of ownership and higher return investment. As the march of cloud continues, it brings both new opportunities and new security challenges. To take advantages of those opportunities while minimizing risks, we think that Intrusion Detection Systems (IDS) integrated in the cloud is one of the best existing solutions nowadays in the field. The concept of intrusion detection was known since past and was first proposed by a well-known researcher named Anderson in 1980's. Since that time IDS's are evolving. Although, several efforts has been made in the area of Intrusion Detection systems for cloud computing environment, many attacks still prevail. Therefore, the work presented in this paper proposes a multi criteria analysis and a comparative study between several IDS architectures designated to work in a cloud computing environments. To achieve this objective, in the first place we will search in the state of the art of several consistent IDS architectures designed to work in a cloud environment. Whereas, in a second step we will establish the criteria that will be useful for the evaluation of architectures. Later, using the approach of multi criteria decision analysis Mac Beth (Measuring Attractiveness by a Categorical Based Evaluation Technique we will evaluate the criteria and assign to each one the appropriate weight according to their importance in the field of IDS architectures in cloud computing. The last step is to evaluate architectures against the criteria and collecting results of the model constructed in the previous steps.

Keywords: cloud computing, cloud security, intrusion detection/prevention system, multi-criteria decision analysis

Procedia PDF Downloads 451
4264 Investigation of Organisational Culture and Its Impacts on Job Satisfaction among Language Teachers at a Language School

Authors: Davut Uysal

Abstract:

Turkish higher education system has experienced some structural changes in recent decades, which resulted in the concentration on English language teaching as a foreign language at high education institutions. However, the number of studies examining the relationship between organizational culture and job satisfaction among language teachers at higher education institutions, who are the key elements of the teaching process, is very limited in the country. The main objective of this study is to find out the perceptions of English language instructors regarding organizational culture and its impact on their job satisfaction at School of Foreign Language, Anadolu University in Turkey. Questionnaire technique was used in data collection, and the collected data was analysed with the help of SPSS data analysis program. The findings of the study revealed that the respondents of the study had positive perceptions regarding current organizational culture indicating satisfaction with co-worker relations and administration, supervision support and the work itself, as well as their satisfaction with the available professional development opportunities provided by their institution. A significant relationship between overall organizational culture and job satisfaction was found in the study. This study also presents some key elements to increase the job satisfaction levels of the language teachers by managing corporate communication and to improve the organisational culture based on the findings of the study as they are two interrelated issues.

Keywords: corporate communication, English teacher, organizational culture, job satisfaction

Procedia PDF Downloads 146
4263 Cloud Computing Impact on e-Government Adoption

Authors: Ali Elshabrawy

Abstract:

Cloud computing is expected to be important for e Government in near future. Governments need it for solving some of its e Government, financial, infrastructure, legacy systems and integration problems. It reduces information technology (IT) infrastructure needs and support costs, and offers on-demand infrastructure and computational power, improved collaboration capabilities, which are important for e Government projects start up and sustainability. Budget pressures will continue to drive more and more government IT to hybrid and even public clouds, and more cooperation between cloud service providers and governmental agencies are expected, Or developing governmental private, community clouds. Motivation to convince governments to use cloud computing services, will create a pressure on cloud service providers to cope with government's requirements for interoperability, security standards, open data and integration between their cloud systems There will be significant legal action arising out of governmental uses of cloud computing, and legislation addressing both IT and business needs and consumer fears and protections. Cloud computing is a considered a revolution for IT and E business in general and e commerce, e Government in particular. As governments faces increasing challenges regarding IT infrastructure required for e Government projects implementation. As a result of Lack of required financial resources allocated for e Government projects in developed and developing countries. Cloud computing can play a major role to solve some of e Government projects challenges such as, lack of financial resources, IT infrastructure, Human resources trained to manage e Government applications, interoperability, cost efficiency challenges. If we could solve some security issues related to cloud computing usage which considered critical for e Government projects. Pretty sure it’s Just a matter of time before cloud service providers will find out solutions to attract governments as major customers for their business.

Keywords: cloud computing, e-government, adoption, supply side barriers, e-government requirements, challenges

Procedia PDF Downloads 334
4262 Resource Management Framework in Cloud Computing

Authors: Gagandeep Kaur, Sonal Chawla

Abstract:

In a Cloud Computing environment, resource provisioning, resource allocation and resource scheduling is the most complex issues these days. Cloud User expects the best resource utilization and Cloud Provider expects revenue maximization by considering budget and time constraints. In this research paper, Resource Management Framework has been proposed to allocate the resources to Cloud Users and Cloud Providers in Cloud environment. The main aim of the proposed work is to provide the resources and services to Cloud Providers and Cloud Users in an efficient and effective manner. The proposed framework has been simulated and tested using the CloudSim simulator tool.

Keywords: cloud computing, resource allocation, auction, provisioning

Procedia PDF Downloads 128
4261 Applying Different Stenography Techniques in Cloud Computing Technology to Improve Cloud Data Privacy and Security Issues

Authors: Muhammad Muhammad Suleiman

Abstract:

Cloud Computing is a versatile concept that refers to a service that allows users to outsource their data without having to worry about local storage issues. However, the most pressing issues to be addressed are maintaining a secure and reliable data repository rather than relying on untrustworthy service providers. In this study, we look at how stenography approaches and collaboration with Digital Watermarking can greatly improve the system's effectiveness and data security when used for Cloud Computing. The main requirement of such frameworks, where data is transferred or exchanged between servers and users, is safe data management in cloud environments. Steganography is the cloud is among the most effective methods for safe communication. Steganography is a method of writing coded messages in such a way that only the sender and recipient can safely interpret and display the information hidden in the communication channel. This study presents a new text steganography method for hiding a loaded hidden English text file in a cover English text file to ensure data protection in cloud computing. Data protection, data hiding capability, and time were all improved using the proposed technique.

Keywords: cloud computing, steganography, information hiding, cloud storage, security

Procedia PDF Downloads 172
4260 A Model of Knowledge Management Culture Change

Authors: Reza Davoodi, Hamid Abbasi, Heidar Norouzi, Gholamabbas Alipourian

Abstract:

A dynamic model shaping a process of knowledge management (KM) culture change is suggested. It is aimed at providing effective KM of employees for obtaining desired results in an organization. The essential requirements for obtaining KM culture change are determined. The proposed model realizes these requirements. Dynamics of the model are expressed by a change of its parameters. It is adjusted to the dynamic process of KM culture change. Building the model includes elaboration and integration of interconnected components. The “Result” is a central component of the model. This component determines a desired organizational goal and possible directions of its attainment. The “Confront” component engenders constructive confrontation in an organization. For this reason, the employees are prompted toward KM culture change with the purpose of attaining the desired result. The “Assess” component realizes complex assessments of employee proposals by management and peers. The proposals are directed towards attaining the desired result in an organization. The “Reward” component sets the order of assigning rewards to employees based on the assessments of their proposals.

Keywords: knowledge management, organizational culture change, employee, result

Procedia PDF Downloads 391
4259 Towards Resilient Cloud Computing through Cyber Risk Assessment

Authors: Hilalah Alturkistani, Alaa AlFaadhel, Nora AlJahani, Fatiha Djebbar

Abstract:

Cloud computing is one of the most widely used technology which provides opportunities and services to government entities, large companies, and standard users. However, cybersecurity risk management studies of cloud computing and resiliency approaches are lacking. This paper proposes resilient cloud cybersecurity risk assessment and management tailored specifically, to Dropbox with two approaches:1) technical-based solution motivated by a cybersecurity risk assessment of cloud services, and 2)a target personnel-based solution guided by cybersecurity-related survey among employees to identify their knowledge that qualifies them withstand to any cyberattack. The proposed work attempts to identify cloud vulnerabilities, assess threats and detect high risk components, to finally propose appropriate safeguards such as failure predicting and removing, redundancy or load balancing techniques for quick recovery and return to pre-attack state if failure happens.

Keywords: cybersecurity risk management plan, resilient cloud computing, cyberattacks, cybersecurity risk assessment

Procedia PDF Downloads 116
4258 Data Stream Association Rule Mining with Cloud Computing

Authors: B. Suraj Aravind, M. H. M. Krishna Prasad

Abstract:

There exist emerging applications of data streams that require association rule mining, such as network traffic monitoring, web click streams analysis, sensor data, data from satellites etc. Data streams typically arrive continuously in high speed with huge amount and changing data distribution. This raises new issues that need to be considered when developing association rule mining techniques for stream data. This paper proposes to introduce an improved data stream association rule mining algorithm by eliminating the limitation of resources. For this, the concept of cloud computing is used. Inclusion of this may lead to additional unknown problems which needs further research.

Keywords: data stream, association rule mining, cloud computing, frequent itemsets

Procedia PDF Downloads 482
4257 The Socio-Cultural Aspect of Food in Ceremonial Turkey

Authors: Suheyla Saritas

Abstract:

No matter who we are or where we live, our lives revolve around food, which is much more than a merely sustenance. As a part of the human culture, food carries complex significance and symbolic meanings. Turkish people attribute great value to food and its usage specifically tied to rites of passages of human life. Traditions, especially the ones practiced during rites of passages, such as birth, circumcisions, weddings and funerals, have always been accompanied by food in Turkish culture. Since food celebrates and symbolizes human progress in life in the culture, it also surrounds by aspects of belief, custom, magic, ritual and religion and has always been used in ceremonial context during such rites. Even though that context may be different depending on the religious, economic and social nuances of the various Turkish regions, like wheat, meat and bread, certain kinds of food play key roles during Turkish rites, generally upholding traditions. This paper highlights the sociocultural aspect of food in the rites of passages in the Turkish culture. The importance of this work also is how the ceremonial food represents the identity of Turkish people.

Keywords: food, culture, rites of passages, ritual and identity

Procedia PDF Downloads 406
4256 Going Horizontal: Confronting the Challenges When Transitioning to Cloud

Authors: Harvey Hyman, Thomas Hull

Abstract:

As one of the largest cancer treatment centers in the United States, we continuously confront the challenge of how to leverage the best possible technological solutions, in order to provide the highest quality of service to our customers – the doctors, nurses and patients at Moffitt who are fighting every day for the prevention and cure of cancer. This paper reports on the transition from a vertical to a horizontal IT infrastructure. We discuss how the new frameworks and methods such as public, private and hybrid cloud, brokering cloud services are replacing the traditional vertical paradigm for computing. We also report on the impact of containers, micro services, and the shift to continuous integration/continuous delivery. These impacts and changes in delivery methodology for computing are driving how we accomplish our strategic IT goals across the enterprise.

Keywords: cloud computing, IT infrastructure, IT architecture, healthcare

Procedia PDF Downloads 362
4255 Interdependencies of Culture, Economy, and Resource Availability ’ as 'Determinants of Spatial Inequality in Cities

Authors: Shahna K. C., Belay Menon, Taniya Joshua

Abstract:

As globalization in the era progresses, spatial inequality is turned to be one of the major concerns; the main intent of the Study is to focus on if there is any interdependencies of culture economy and resource availability on creating spatial inequality in cities. The paper tries to establish the relationship between spatial inequality – the quality of life – the DETERMINANT TRIAD (culture, economy, resource availability). Slum area of Dharavi is taken to evaluate the influence of these determinants on the quality of life as spatial inequality is evident there. Interdependencies of the determinants on creating spatial inequality is evaluated. For this, It is understood that these three parameters, i.e., culture, economy, resource availability, are determinants of urban design, each from the social, economic, environmental domains of sustainability, respectively. And there are studies individually on each of these aspects, how they determine the urban spaces, and how influential on the whole process of urbanization. Now extending the study towards the interdependencies of these three so as to find out how these trilogy shapes the urban form and space.

Keywords: spatial inequality, culture, economy, resource availability, quality of life

Procedia PDF Downloads 194
4254 Quiet Ego and Its Predictors: Comparing Turkey and the US

Authors: Ece Akca, Nebi Sumer, Heidi A. Wayment, Meliksah Demir

Abstract:

This study compares a typical individualistic culture (the USA) and a relatively collectivist culture (Turkey) on the levels and personality predictors of the quiet ego. A total of 248 Turkish and 683 American university students completed the Quiet Ego Scale and the Big Five Personality Inventory. The moderating role of culture on the relationship between quiet ego and personality characteristics was investigated. Openness to experience was the strongest predictor of the quiet ego among both Turkish and the US samples. Whereas extraversion, conscientiousness, and agreeableness significantly predicted quiet ego in the US, lower levels of neuroticism were related to the quiet ego in Turkey. Results revealed that the effect of personality characteristics on quiet ego varied across cultures. Agreeableness in the US and neuroticism in Turkey seemed to be the critical predictor of quite ego. Results were discussed considering cultural values in Turkish and the USA context.

Keywords: agreeableness, big five personality, culture, neuroticism, quiet ego

Procedia PDF Downloads 379
4253 Positivism Legal Controversy: Dilemma Carok as Madura’s Culture through Indigenous Dispute Settlement in Indonesia

Authors: M. Yasin Al-Arif, Mohammad Faisol Soleh

Abstract:

The Indonesia’s Constitution in Article 18b explained that the state recognizes and respects indigenous peoples and their traditional rights that are guaranteed by the law. Despite already guaranteed its existence; in practice such indigenous law is often considered contrary to positive law by legal experts. It is because of legal positivism paradigm which requires the written law as the main reference for the settlement of legal disputes. Carok’s culture is one of the indigenous cultures of Madura to resolve legal disputes that still thrives until today. Carok’s culture is in outside the legal process, and through a fight between the disputing parties until one dies. On the other hand, the legal positivism does not give place to accommodate Carok as indigenous dispute settlement, until it must be solved through trial. This way of settlement has not been successfully satisfying the indigenous people, thus although it has been done through its verdict in the trial, but Carok still be used by them. From the explanation above, Carok’s culture must be accommodated as the main settlement process and legal process of law as the alternative to the effectiveness of dispute resolution in Madura Indonesia.

Keywords: carok, dispute settlement, legal positivism, madura’s culture

Procedia PDF Downloads 325
4252 A Study on How to Link BIM Services to Cloud Computing Architecture

Authors: Kim Young-Jin, Kim Byung-Kon

Abstract:

Although more efforts to expand the application of BIM (Building Information Modeling) technologies have be pursued in recent years than ever, it’s true that there have been various challenges in doing so, including a lack or absence of relevant institutions, lots of costs required to build BIM-related infrastructure, incompatible processes, etc. This, in turn, has led to a more prolonged delay in the expansion of their application than expected at an early stage. Especially, attempts to save costs for building BIM-related infrastructure and provide various BIM services compatible with domestic processes include studies to link between BIM and cloud computing technologies. Also in this study, the author attempted to develop a cloud BIM service operation model through analyzing the level of BIM applications for the construction sector and deriving relevant service areas, and find how to link BIM services to the cloud operation model, as through archiving BIM data and creating a revenue structure so that the BIM services may grow spontaneously, considering a demand for cloud resources.

Keywords: construction IT, BIM (building information modeling), cloud computing, BIM service based cloud computing

Procedia PDF Downloads 474
4251 The Strategy of Traditional Religious Culture Tourism: Taking Taiwan Minhsiung Infernal Lord Festival for Example

Authors: Ching-Yi Wang

Abstract:

The purpose of this study is to explore strategies for integrate Minhsiung environments and cultural resources for Infernal Lord Festival. Minhsiung Infernal Lord Festival is one of the famous religious event in Chia-Yi County, Taiwan. This religious event and the life of local residents are inseparable. Minhsiung Infernal Lord Festival has a rich cultural ceremonies meaning and sentiment of local concern. This study apply field study, document analysis and interviews to analyze Minhsiung Township’s featured attractions and folklore events. The research results reveal the difficulties and strategies while incorporating culture elements into culture tourism. This study hopes to provide innovative techniques for the purpose of prolonging the feasibility of future development of the tradition folk culture.

Keywords: Taiwan folk culture, Minhsiung Infernal Lord Festival, religious tourism, folklore, cultural tourism

Procedia PDF Downloads 329
4250 DNA PLA: A Nano-Biotechnological Programmable Device

Authors: Hafiz Md. HasanBabu, Khandaker Mohammad Mohi Uddin, Md. IstiakJaman Ami, Rahat Hossain Faisal

Abstract:

Computing in biomolecular programming performs through the different types of reactions. Proteins and nucleic acids are used to store the information generated by biomolecular programming. DNA (Deoxyribose Nucleic Acid) can be used to build a molecular computing system and operating system for its predictable molecular behavior property. The DNA device has clear advantages over conventional devices when applied to problems that can be divided into separate, non-sequential tasks. The reason is that DNA strands can hold so much data in memory and conduct multiple operations at once, thus solving decomposable problems much faster. Programmable Logic Array, abbreviated as PLA is a programmable device having programmable AND operations and OR operations. In this paper, a DNA PLA is designed by different molecular operations using DNA molecules with the proposed algorithms. The molecular PLA could take advantage of DNA's physical properties to store information and perform calculations. These include extremely dense information storage, enormous parallelism, and extraordinary energy efficiency.

Keywords: biological systems, DNA computing, parallel computing, programmable logic array, PLA, DNA

Procedia PDF Downloads 110
4249 Navigating Cyber Attacks with Quantum Computing: Leveraging Vulnerabilities and Forensics for Advanced Penetration Testing in Cybersecurity

Authors: Sayor Ajfar Aaron, Ashif Newaz, Sajjat Hossain Abir, Mushfiqur Rahman

Abstract:

This paper examines the transformative potential of quantum computing in the field of cybersecurity, with a focus on advanced penetration testing and forensics. It explores how quantum technologies can be leveraged to identify and exploit vulnerabilities more efficiently than traditional methods and how they can enhance the forensic analysis of cyber-attacks. Through theoretical analysis and practical simulations, this study highlights the enhanced capabilities of quantum algorithms in detecting and responding to sophisticated cyber threats, providing a pathway for developing more resilient cybersecurity infrastructures.

Keywords: cybersecurity, cyber forensics, penetration testing, quantum computing

Procedia PDF Downloads 27
4248 Method and Apparatus for Optimized Job Scheduling in the High-Performance Computing Cloud Environment

Authors: Subodh Kumar, Amit Varde

Abstract:

Typical on-premises high-performance computing (HPC) environments consist of a fixed number and a fixed set of computing hardware. During the design of the HPC environment, the hardware components, including but not limited to CPU, Memory, GPU, and networking, are carefully chosen from select vendors for optimal performance. High capital cost for building the environment is a prime factor influencing the design environment. A class of software called “Job Schedulers” are critical to maximizing these resources and running multiple workloads to extract the maximum value for the high capital cost. In principle, schedulers work by preventing workloads and users from monopolizing the finite hardware resources by queuing jobs in a workload. A cloud-based HPC environment does not have the limitations of fixed (type of and quantity of) hardware resources. In theory, users and workloads could spin up any number and type of hardware resource. This paper discusses the limitations of using traditional scheduling algorithms for cloud-based HPC workloads. It proposes a new set of features, called “HPC optimizers,” for maximizing the benefits of the elasticity and scalability of the cloud with the goal of cost-performance optimization of the workload.

Keywords: high performance computing, HPC, cloud computing, optimization, schedulers

Procedia PDF Downloads 74
4247 International and Intercultural Communication Design: Case Study of Manipulative Advertising

Authors: Faiqa Jalal

Abstract:

The purpose of the following research paper is to discuss the differentiating meanings of culture and how popular culture has maintained a great impact on intercultural and international behavior. The following discussion leads to the notion of communicating cultural impact on behavior through advertising and sub-cultural theory in advertising. Although towards the end of the research, the complexities that develop through the above discussion, lead to the solution that ‘advertising gives meaning to the otherwise meaningless and identical objects through linking them to our basic needs’. In today’s fast paced digital world, it is difficult to define culture, literally, since its meaning tends to shift through series of different perceptions such as ‘how’ and ‘why’ it should be used. This notion can be taken towards another notion of popular culture. It is dependent on ‘attitudes, ideas, images, perspectives and other phenomena within the mainstream of a given culture’. Since popular culture is influenced by mass media, it has a way of influencing an individual’s attitude towards certain topics. For example, tattoos are a form of human decorations, that have historic significance, and a huge spectrum of meanings. Advertising is one aspect of marketing that has evolved from the time when it was ‘production oriented’, up till the time it started using different mediums to make its impact more effective. However, this impact has confused us between our needs and desires. The focus in this paper is ‘we consume to acquire a sense of social identity and status, not just for the sake of consumption’. Every culture owns different expressions, which are then used by advertisers to create its impact on the behavior of people sub-culturally and globally, as culture grows through social interaction. Advertisers furthermore play a smart role in highlighting quality of life ranging from ‘survival to well-being’. Hence, this research paper concludes by highlighting that culture is considered as a ‘basic root’ of any community that also provides solution to certain problems; however, advertisers play their part in manipulating society’s literacy and beliefs by rationalizing how relevant certain products/brands are to their beliefs.

Keywords: mass media, popular culture, production oriented, sub-culture

Procedia PDF Downloads 202
4246 The Impact of Culture in Teaching English, the Case Study of Preparatory School of Sciences and Techniques

Authors: Nouzha Yasmina Soulimane-Benhabib

Abstract:

Language is a medium of communication and a means of expression that is why today the learning of foreign languages especially the English language has become a basic necessity for every student who is ambitious. It is known that culture and language are inseparable and complementary, however, in the process of teaching a foreign language, teachers used to focus mainly on preparing adequate syllabi for ESP students, yet, some parameters should be considered. For instance; the culture of the target language may play an important role since students attitudes towards a foreign language enhance their learning or vice versa. The aim of this study is to analyse how culture could influence the teaching of a foreign language, we have taken the example of the English language as it is considered as the second foreign language in Algeria after French. The study is conducted at the Preparatory School of Sciences and Techniques, Tlemcen where twenty-five students participated in this research. The reasons behind learning the English language are various, and since English is the most widely-spoken language in the world, it is the language of research and education and it is used in many other fields, we have to take into consideration one important factor which is the social distance between the culture of the Algerian learner and the culture of the target language, this gap may lead to a culture shock. Two steps are followed in this research: The first one is to collect data from those students who are studying at the Preparatory School under the form of questionnaire and an interview is submitted to six of them in order to reinforce our research and get effective and precise results, and the second step is to analyse these data taking into consideration the diversity of the learners within this institution. The results obtained show that learners’ attitudes towards the English community and culture are mixed and it may influence their curiosity and attention to learn. Despite of big variance between Algerian and European cultures, some of the students focused mainly on the benefits of the English language since they need it in their studies, research and a future carrier, however, the others manifest their reluctance towards this language and this is mainly due to the profound impact of the English culture which is different from the Algerian one.

Keywords: Algeria, culture, English, impact

Procedia PDF Downloads 372