Search results for: Amman Message
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 390

Search results for: Amman Message

180 Da’wah (Proselytization) and Qur’anic Moral Excellence: An Exposition

Authors: Attahir Shehu Mainiyo, Ahmad Ibrahim Karfe

Abstract:

The Glorious Qur’an, as the central religious text of Islam, addresses various aspects of human life and provides guidance for personal and societal development. It also outlines the moral excellence of individuals and communities, focusing on spiritual, moral, and social dimensions. Da’wah is the act of inviting others to Islam, emphasizing the significance of conveying the message with kindness, patience, and understanding. Qur’anic moral excellence, as evinced in the Qur’an encompasses virtues such as compassion, honesty, humility, patience, and generosity. The Glorious Qur’an, therefore, harps on the importance of embodying these values in daily life, serving as a guide for individuals engaged in Da’wah activities to exemplify moral excellence through their actions and characters. It is in line with this backdrop that this article intends to assess the Da’wah and Qur’anic Moral Excellence. However, to achieve the objectives of the research, the article attempts to answer some basic questions. Emphasizes were laid in the Glorious on the need to invite others to the true path of Islam and the qualities of Da’i necessary for his Da’wah activities. The paper also discussed the impact of Qur’anic moral excellence on the Da’i and those invited to Islam. The paper adopts an analytical methodology and utilizes secondary data for the research.

Keywords: Da'wah, Qur'an, moral, excellence

Procedia PDF Downloads 24
179 Development of a Smart Liquid Level Controller

Authors: Adamu Mudi, Ibrahim Wahab Fawole, Abubakar Abba Kolo

Abstract:

In this research paper, we present a microcontroller-based liquid level controller that identifies the various levels of a liquid, carries out certain actions, and is capable of communicating with the human being and other devices through the GSM network. This project is useful in ensuring that a liquid is not wasted. It also contributes to the internet of things paradigm, which is the future of the internet. The method used in this work includes designing the circuit and simulating it. The circuit is then implemented on a solderless breadboard, after which it is implemented on a strip board. A C++ computer program is developed and uploaded into the microcontroller. This program instructs the microcontroller on how to carry out its actions. In other to determine levels of the liquid, an ultrasonic wave is sent to the surface of the liquid similar to radar or the method for detecting the level of sea bed. Message is sent to the phone of the user similar to the way computers send messages to phones of GSM users. It is concluded that the routine of observing the levels of a liquid in a tank, refilling the tank when the liquid level is too low can be entirely handled by a programmable device without wastage of the liquid or bothering a human being with such tasks.

Keywords: Arduino Uno, HC-SR04 ultrasonic sensor, internet of things, IoT, SIM900 GSM module

Procedia PDF Downloads 104
178 Exploring Family and Preschool Early Interactive Literacy Practices in Jordan

Authors: Rana Alkhamra

Abstract:

Background: Child's earliest experiences with books and stories during the first years of his life are strongly linked with the development of his early language and literacy skills. Interacting in routine learning activities, such as shared book reading, storytelling, and teaching about the letters of the alphabet make a critical foundation for early learning, language growth and emergent literacy. Aim: The current study explores family and preschool early interactive literacy practices in families and preschools (nursery and kindergarten) in Jordan. It highlights the importance of early interactive literacy activities on child language and literacy growth and development. Methods: This is a cross sectional study that surveyed 243 Jordanian families. The survey investigated literacy routine practices, largely shared books reading, at home and at preschool; child speech and language development; and family demographics. Results: Around 92.5% of the families read books and stories to their children, as frequently as 1-2 times weekly or monthly (75%). Only 19.6% read books on daily basis. Many families reported preferring story-telling (97%). Despite that families acknowledged the importance of early literacy activities, on language, reading and writing, cognitive, and academic development, 45% asked for education and training pertaining to specific ways and ideas to help their young children develop language and literacy skills. About 69% of the families reported reading books and stories to their children for 15 minutes a day, while 71.2% indicated having their children watch television for 3 to > 6 hours a day. At preschool, only 52.8% of the teachers were reported to read books and stories. Factors like parent education, monthly income, living inside (33.6%) or outside (66.4%) the capital city of Amman significantly (p < 0.05) affected child early literacy interactive activities whether at home or at preschool. Conclusion: Early language and literacy skills depend largely on the opportunities and experiences provided to children in the home and in preschool environment. Family literacy programs can play an important role in bridging the gap in early literacy experiences for families that need help. Also, speech therapists can work in collaboration with families and educators to ensure that young children have high quality and sufficient opportunities to participate in early literacy activities both at home and in preschool environments.

Keywords: literacy, interactive activities, language, practices, family, preschool, Jordan

Procedia PDF Downloads 420
177 Street Art Lenses: A Glimpse into the Street Artists’ Identity and Socio-Political Perspective in Brussels

Authors: José Francisco Urrutia Reyes, Judith Espinosa Real

Abstract:

This paper is meant to re-examine the role of street art in the contemporary world. By studying this form of art in Brussels, it can be explained how murals show the socio-political reality of a given community and influence on its interaction. Through the definitions of street art, murals and street artists, and analysing their role in Brussels, it is possible to understand how this counter culture movement serves as an engine of social development, as it interacts with its surroundings sending a clear message to a wider audience. Street art impacts on its environment because it interacts with the people who occupies the day-to-day public space. This has proven to be effective in the arouse of social consciousness, up to the point of being adopted by the government of Brussels to promote social movements such as the AIDS-HIV campaign along with the Plate-Forme Prévention Sida. It can be concluded that street art has evolved since its vandalic beginnings, to become a form of art that has not lost it counter official status, but now has a critical vision that can promote social awakening. Street art is now a global trend that uses visual inputs to create a positive impact.

Keywords: street art, Brussels, social impact, political perspective

Procedia PDF Downloads 331
176 Initiative Programme to Reform Education in Thailand

Authors: Piyapat Chitpirom, Teerakiat Jareonsettasin, Chintida Vichitsophaphan

Abstract:

The Foundation of Virtuous Youth was established and supported by the Crown Property Bureau, with the intention to instill goodness in Thai youth. The Centre for Educational Psychology is one of the three units under the foundation. We aim to develop programmes that can be used to improve the quality of education in schools. Translation of the King’s message in keeping with the modern research from various sources, our team create 6 programmes: (1) Teacher-Student Relationship (2) Growth Mindset (3) Socratic Teaching (4) Peer Tutoring (5) Parental Involvement (6) Inclusion. After nine months of implementing the programmes in the schools, we found that there were more cooperation between student-student, teacher-student, teacher-parent, and student-parent and the school regained trust from the community. Our ideas were accepted well by the government as our director was promoted to be the Vice Minister of Education in order to implement our programmes into national education system. We consider that the key of our success is that we do practical things. We are still continuing, improving, and learning from our work with hope that the quality of Thai education will improve in near future.

Keywords: education reform, educational psychology, effective teaching, teacher-student relationship

Procedia PDF Downloads 405
175 Chinese College Students’ Intercultural Competence and Culture Learning Through Telecollaboration

Authors: Li Yuqing

Abstract:

Fostering the development of intercultural (communicative) competence (IC) is one way to equip our students with the linguistic and cultural skills to communicate effectively with people from diverse backgrounds, particularly English majors who are most likely to encounter multicultural work environments in the future. The purpose of this study is to compare the English majors' intercultural competence in terms of cognitive, affective, and behavioral aspects before and after a ten-week telecollaboration program between 23 English majors at a Chinese university and 23 American students enrolled in a Chinese class at an American university, and analyze their development during the program. The results indicate that subjects' cognitive, affective, and behavioral perceptions of IC improved significantly over time. In addition, the program had significant effects on the participants' “Interaction Confidence,” “Interaction Engagement,” and “Interaction Enjoyment” - three components of intercultural sensitivity - as well as their overall intercultural effectiveness (except for “Message Skills”). With the widespread use of the internet, this type of online cultural exchange has a promising future, as suggested by the findings of the current study.

Keywords: intercultural competence, English majors, computer-mediated communication, telecollaboration

Procedia PDF Downloads 50
174 Propagation of Simmondsia chinensis (Link) Schneider by Stem Cuttings

Authors: Ahmed M. Eed, Adam H. Burgoyne

Abstract:

Jojoba (Simmondsia chinensis (Link) Schneider), is a desert shrub which tolerates saline, alkyle soils and drought. The seeds contain a characteristic liquid wax of economic importance in industry as a machine lubricant and cosmetics. A major problem in seed propagation is that jojoba is a dioecious plant whose sex is not easily determined prior to flowering (3-4 years from germination). To overcome this phenomenon, asexual propagation using vegetative methods such as cutting can be used. This research was conducted to find out the effect of different Plant Growth Regulators (PGRs) and rooting media on Jojoba rhizogenesis. An experiment was carried out in a Factorial Completely Randomized Design (FCRD) with three replications, each with sixty cuttings per replication in fiberglass house of Natural Jojoba Corporation at Yemen. The different rooting media used were peat moss + perlite + vermiculite (1:1:1), peat moss + perlite (1:1) and peat moss + sand (1:1). Plant materials used were semi-hard wood cuttings of jojoba plants with length of 15 cm. The cuttings were collected in the month of June during 2012 and 2013 from the sub-terminal growth of the mother plants of Amman farm and introduced to Yemen. They were wounded, treated with Indole butyric acid (IBA), α-naphthalene acetic acid (NAA) or Indole-3-acetic acid (IAA) all @ 4000 ppm (part per million) and cultured on different rooting media under intermittent mist propagation conditions. IBA gave significantly higher percentage of rooting (66.23%) compared to NAA and IAA in all media used. However, the lowest percentage of rooting (5.33%) was recorded with IAA in the medium consisting of peat moss and sand (1:1). No significant difference was observed at all types of PGRs used with rooting media in respect of root length. Maximum number of roots was noticed in medium consisting of peat moss, perlite and vermiculite (1:1:1); peat moss and perlite (1:1) and peat moss and sand (1:1) using IBA, NAA and IBA, respectively. The interaction among rooting media was statistically significant with respect to rooting percentage character. Similarly, the interactions among PGRs were significant in terms of rooting percentage and also root length characters. The results demonstrated suitability of propagation of jojoba plants by semi-hard wood cuttings.

Keywords: cutting, IBA, Jojoba, propagation, rhizogenesis

Procedia PDF Downloads 321
173 Double Encrypted Data Communication Using Cryptography and Steganography

Authors: Adine Barett, Jermel Watson, Anteneh Girma, Kacem Thabet

Abstract:

In information security, secure communication of data across networks has always been a problem at the forefront. Transfer of information across networks is susceptible to being exploited by attackers engaging in malicious activity. In this paper, we leverage steganography and cryptography to create a layered security solution to protect the information being transmitted. The first layer of security leverages crypto- graphic techniques to scramble the information so that it cannot be deciphered even if the steganography-based layer is compromised. The second layer of security relies on steganography to disguise the encrypted in- formation so that it cannot be seen. We consider three cryptographic cipher methods in the cryptography layer, namely, Playfair cipher, Blowfish cipher, and Hills cipher. Then, the encrypted message is passed through the least significant bit (LSB) to the steganography algorithm for further encryption. Both encryption approaches are combined efficiently to help secure information in transit over a network. This multi-layered encryption is a solution that will benefit cloud platforms, social media platforms and networks that regularly transfer private information such as banks and insurance companies.

Keywords: cryptography, steganography, layered security, Cipher, encryption

Procedia PDF Downloads 57
172 Secure Network Coding against Content Pollution Attacks in Named Data Network

Authors: Tao Feng, Xiaomei Ma, Xian Guo, Jing Wang

Abstract:

Named Data Network (NDN) is one of the future Internet architecture, all nodes (i.e., hosts, routers) are allowed to have a local cache, used to satisfy incoming requests for content. However, depending on caching allows an adversary to perform attacks that are very effective and relatively easy to implement, such as content pollution attack. In this paper, we use a method of secure network coding based on homomorphic signature system to solve this problem. Firstly ,we use a dynamic public key technique, our scheme for each generation authentication without updating the initial secret key used. Secondly, employing the homomorphism of hash function, intermediate node and destination node verify the signature of the received message. In addition, when the network topology of NDN is simple and fixed, the code coefficients in our scheme are generated in a pseudorandom number generator in each node, so the distribution of the coefficients is also avoided. In short, our scheme not only can efficiently prevent against Intra/Inter-GPAs, but also can against the content poisoning attack in NDN.

Keywords: named data networking, content polloution attack, network coding signature, internet architecture

Procedia PDF Downloads 307
171 Bank ATM Monitoring System Using IR Sensor

Authors: P. Saravanakumar, N. Raja, M. Rameshkumar, D. Mohankumar, R. Sateeshkumar, B. Maheshwari

Abstract:

This research work is designed using Microsoft VB. Net as front end and MySQL as back end. The project deals with secure the user transaction in the ATM system. This application contains the option for sending the failed transaction details to the particular customer by using the SMS. When the customer withdraws the amount from the Bank ATM system, sometimes the amount will not be dispatched but the amount will be debited to the particular account. This application is used to avoid this type of problems in the ATM system. In this proposed system using IR technique to detect the dispatched amount. IR Transmitter and IR Receiver are placed in the path of cash dispatch. It is connected each other through the IR signal. When the customers withdraw the amount in the ATM system then the amount will be dispatched or not is monitored by IR Receiver. If the amount will be dispatched then the signal will be interrupted between the IR Receiver and the IR Transmitter. At that time, the monitoring system will be reduced their particular withdraw amount on their account. If the cash will not be dispatched, the signal will not be interrupted, at that time the particular withdraw amount will not be reduced their account. If the transaction completed successfully, the transaction details such as withdraw amount and current balance can be sent to the customer via the SMS. If the transaction fails, the transaction failed message can be send to the customer.

Keywords: ATM system, monitoring system, IR Transmitter, IR Receiver

Procedia PDF Downloads 277
170 Transporting the Setting of the Beloved Musical, Peter Pan, to Colonial India

Authors: R. Roznowski

Abstract:

This paper is an examination of a recent Michigan State University production of the classic musical, Peter Pan. In this production, approved by the licensor, the action was moved to Colonial India transforming the musical’s message to include themes of cultural identity, racism, classism and ultimately inclusion. Major character changes and casting decisions expanded the scope of the musical while still retaining the original book and score. Major changes included reframing the Darlings as British Colonials stationed in India. The Lost Boy’s as mixed race children of British officials and their Indian nannies, the Pirates were a female 'fishing fleet' a group of women sent from England to keep the British soldiers from mixing with the locals and the Michigan State University Bhangra Dance Team played the Indians in the production. Traditional Indian theatrical techniques were also employed in the storytelling. The presentation will cover the key changes to the musical, the rehearsal process, historical accuracy and audience reaction. A final analysis of cultural appropriation versus historical reframing will be examined.

Keywords: directing, history, musical theatre, producing

Procedia PDF Downloads 221
169 How Much for a Dancer? Culture Policy in Japan and Czech Republic towards Dance

Authors: Lucie Hayashi

Abstract:

This paper offers a view on a different approach towards a dancer´s career in two very dissimilar countries: on one hand Japan, an economic predator at the end of last century, but suffering under economic crisis from the beginning of the new century; and the Czech Republic, a post-communist country, caught up in capitalist fever from the 1990s on the other. The government’s approach towards culture and dance in these two countries not only has a different history and nature, but also presents a different take on the ideal future development in its respective dance scenes. The level of support from the state budget echoes in all the fields of a professional dance career, dance art and the education of the public towards dance. The message of the statistic data is clear: the production of an enormous number of well trained and expensively educated dancers with no jobs for them in Japan, and a lack of good dancers ready to fill state supported theatre companies in the Czech Republic (that gladly employs Japanese dancers). The paradigm leaves a big exclamation mark on the huge influence the policy has on dance in society, and a question mark on the ideal situation.

Keywords: culture policy, dance, education, employment, Czech Republic, Japan

Procedia PDF Downloads 134
168 Augmented Reality in Advertising and Brand Communication: An Experimental Study

Authors: O. Mauroner, L. Le, S. Best

Abstract:

Digital technologies offer many opportunities in the design and implementation of brand communication and advertising. Augmented reality (AR) is an innovative technology in marketing communication that focuses on the fact that virtual interaction with a product ad offers additional value to consumers. AR enables consumers to obtain (almost) real product experiences by the way of virtual information even before the purchase of a certain product. Aim of AR applications in relation with advertising is in-depth examination of product characteristics to enhance product knowledge as well as brand knowledge. Interactive design of advertising provides observers with an intense examination of a specific advertising message and therefore leads to better brand knowledge. The elaboration likelihood model and the central route to persuasion strongly support this argumentation. Nevertheless, AR in brand communication is still in an initial stage and therefore scientific findings about the impact of AR on information processing and brand attitude are rare. The aim of this paper is to empirically investigate the potential of AR applications in combination with traditional print advertising. To that effect an experimental design with different levels of interactivity is built to measure the impact of interactivity of an ad on different variables o advertising effectiveness.

Keywords: advertising effectiveness, augmented reality, brand communication, brand recall

Procedia PDF Downloads 276
167 Management of Coronary Heart Disease through Yoga

Authors: Subramaniam Iyer

Abstract:

The most common disease that is pertaining to all human beings is heart-related. The reasons for coronary artery disease are due to lifestyle and eating habits. Due to this, many people mentally become sick, feeling that soon they will die due to their heart problems. This results in stress and anxiety, which has become common amongst all the Indians. Medicines are the commonest curative remedy in India, but it is proposed through this article some remedies through yoga. This article does not guarantee a 100% result, but it is a preventive remedy for coronary artery disease. Yoga is giving a new lease of life to many, so to tackle chronic diseases, it provides remedies that will be lifelong. It is brought to many people by Patanjali. Yoga will provide support to patients having coronary artery disease through its various relevant postures (asanas), which can be done very easily. Yoga does not send a message that if you do it regularly, you will be relieved from a particular disease. If it is performed every day, it will add vital energy for a smooth life, even if you are suffering from any chronic disease. In this article, we will be providing 6 postures (asanas), which can be performed at any time in the day, but the early morning will always be preferred (empty stomach) to get a good result. Secondly, these postures must be implemented after due consultation with your physician. If your physician disapproves, don’t do these postures as it will be harmful to your body.

Keywords: coronary artery, yoga, disease, remedy, medicine

Procedia PDF Downloads 126
166 A Hybrid Digital Watermarking Scheme

Authors: Nazish Saleem Abbas, Muhammad Haris Jamil, Hamid Sharif

Abstract:

Digital watermarking is a technique that allows an individual to add and hide secret information, copyright notice, or other verification message inside a digital audio, video, or image. Today, with the advancement of technology, modern healthcare systems manage patients’ diagnostic information in a digital way in many countries. When transmitted between hospitals through the internet, the medical data becomes vulnerable to attacks and requires security and confidentiality. Digital watermarking techniques are used in order to ensure the authenticity, security and management of medical images and related information. This paper proposes a watermarking technique that embeds a watermark in medical images imperceptibly and securely. In this work, digital watermarking on medical images is carried out using the Least Significant Bit (LSB) with the Discrete Cosine Transform (DCT). The proposed methods of embedding and extraction of a watermark in a watermarked image are performed in the frequency domain using LSB by XOR operation. The quality of the watermarked medical image is measured by the Peak signal-to-noise ratio (PSNR). It was observed that the watermarked medical image obtained performing XOR operation between DCT and LSB survived compression attack having a PSNR up to 38.98.

Keywords: watermarking, image processing, DCT, LSB, PSNR

Procedia PDF Downloads 11
165 Fixing the Identity Gap in Fashion: Magazines' Role in Consumption of Clothes

Authors: Kateryna Pilyarchuk

Abstract:

A dress has, since times immemorial, been used to communicate the wearer’s identity. When a new trend is born, fashionistas buy it not only with the purpose to beautify themselves, but also to acquire the collective identity. Fashion has become a means of narrating one’s stance and status. Thus, when one spends money on a brand, one pays for some unmaterial components associated with it. This paper will present some ways in which fashion magazines promote consumerism by drawing on women’s craving for collective identity and need to fill in their identity gap by means of a purchase. By applying the method of critical discursive psychology, it will present layers of ideology and positions that become visible in framing of the message in U.S. Harper’s Bazaar. In this context, fashion decisions that are presented to its readers will be critically evaluated from the gender perspective. It will be demonstrated that what is presented as a postfeminist choice in the neoliberal society is still, to a considerable extent, oppressive and driven by the male gaze. As the findings show, the contemporary female identities in fashion are still built on the principles of traditional femininity. Magazines and fashion discourse train women that they should fear being left out of fashion and, by extension, out of the category of the sexually appealing (from the male perspective).

Keywords: collective identity, critical discursive psychology, fashion discourse, identity gap

Procedia PDF Downloads 126
164 Heritage, Cultural Events and Promises for Better Future: Media Strategies for Attracting Tourism during the Arab Spring Uprisings

Authors: Eli Avraham

Abstract:

The Arab Spring was widely covered in the global media and the number of Western tourists traveling to the area began to fall. The goal of this study was to analyze which media strategies marketers in Middle Eastern countries chose to employ in their attempts to repair the negative image of the area in the wake of the Arab Spring. Several studies were published concerning image-restoration strategies of destinations during crises around the globe; however, these strategies were not part of an overarching theory, conceptual framework or model from the fields of crisis communication and image repair. The conceptual framework used in the current study was the ‘multi-step model for altering place image’, which offers three types of strategies: source, message and audience. Three research questions were used: 1.What public relations crisis techniques and advertising campaign components were used? 2. What media policies and relationships with the international media were adopted by Arab officials? 3. Which marketing initiatives (such as cultural and sports events) were promoted? This study is based on qualitative content analysis of four types of data: 1) advertising components (slogans, visuals and text); (2) press interviews with Middle Eastern officials and marketers; (3) official media policy adopted by government decision-maker (e.g. boycotting or arresting newspeople); and (4) marketing initiatives (e.g. organizing heritage festivals and cultural events). The data was located in three channels from December 2010, when the events started, to September 31, 2013: (1) Internet and video-sharing websites: YouTube and Middle Eastern countries' national tourism board websites; (2) News reports from two international media outlets, The New York Times and Ha’aretz; these are considered quality newspapers that focus on foreign news and tend to criticize institutions; (3) Global tourism news websites: eTurbo news and ‘Cities and countries branding’. Using the ‘multi-step model for altering place image,’ the analysis reveals that Middle Eastern marketers and officials used three kinds of strategies to repair their countries' negative image: 1. Source (cooperation and media relations; complying, threatening and blocking the media; and finding alternatives to the traditional media) 2. Message (ignoring, limiting, narrowing or reducing the scale of the crisis; acknowledging the negative effect of an event’s coverage and assuring a better future; promotion of multiple facets, exhibitions and softening the ‘hard’ image; hosting spotlight sporting and cultural events; spinning liabilities into assets; geographic dissociation from the Middle East region; ridicule the existing stereotype) and 3. Audience (changing the target audience by addressing others; emphasizing similarities and relevance to specific target audience). It appears that dealing with their image problems will continue to be a challenge for officials and marketers of Middle Eastern countries until the region stabilizes and its regional conflicts are resolved.

Keywords: Arab spring, cultural events, image repair, Middle East, tourism marketing

Procedia PDF Downloads 259
163 Heritage Tourism Balance between Historic Culture and Marketing Innovation: The Case Study of Taiwan

Authors: Lin Chih-Ken

Abstract:

This paper explores the A Li Shan hotel of Taiwan during the Japanese occupation period, after over a hundred years of time, it has been handed over to the hotel managing enterprise to retain the historic building and the culture. Applying the innovative marketing strategies, coordinate the local government traveling policy then combined local tea agriculture and forestry specialty integrated marketing, to create the special hotel located in the Alishan National Scenic Area with the characteristics of landscape, innovative marketing and history, to attract domestic tourism and visitors around the world. This study interview the hotel owner, managers, employees and guests, in addition to collected message feedback from reservation website, to apply Ambidexterity Marketing Theory and Resource Base Theory to analyze the main impact factors. The conclusion showed that the integration of several key factors and make good use of resource strength generate heterogeneous product characteristics to attracting wider range of visitors.

Keywords: heritage tourism, historic hotel, marketing ambidexterity, resource base theory

Procedia PDF Downloads 238
162 Energy-Efficient Contact Selection Method for CARD in Wireless Ad-Hoc Networks

Authors: Mehdi Assefi, Keihan Hataminezhad

Abstract:

One of the efficient architectures for exploring the resources in wireless ad-hoc networks is contact-based architecture. In this architecture, each node assigns a unique zone for itself and each node keeps all information from inside the zone, as well as some from outside the zone, which is called contact. Reducing the overlap between different zones of a node and its contacts increases its performance, therefore Edge Method (EM) is designed for this purpose. Contacts selected by EM do not have any overlap with their sources, but for choosing the contact a vast amount of information must be transmitted. In this article, we will offer a new protocol for contact selection, which is called PEM. The objective would be reducing the volume of transmitted information, using Non-Uniform Dissemination Probabilistic Protocols. Consumed energy for contact selection is a function of the size of transmitted information between nodes. Therefore, by reducing the content of contact selection message using the PEM will decrease the consumed energy. For evaluation of the PEM we applied the simulation method. Results indicated that PEM consumes less energy compared to EM, and by increasing the number of nodes (level of nodes), performance of PEM will improve in comparison with EM.

Keywords: wireless ad-hoc networks, contact selection, method for CARD, energy-efficient

Procedia PDF Downloads 263
161 Use of Visual, Animating Narrative in an Entrepreneurial Storytelling: A Case Study of Greenesignit! Card Game, Educational and Brainstorming Tool for Development of Sustainable Products

Authors: Maja S. Todorovic

Abstract:

This paper aims to promote entrepreneurial storytelling by exploring new ideas and learning practices. An entrepreneur needs to be a ‘storyteller’, an ‘epic hero’, capable of offering an emotional connection to his audience, a character with whom audience can identify with, rejoice, suffer, celebrate, fail – simply experience everything. In other words, a successful entrepreneur is giving tangible experience through his business story and that’s what makes his story and business alive. Use of mythology, eulogy, metaphor, epic, fairytales and cartoons, permeated with humor and sudden twists is a winning recipe for a business story that captures attention. In the business case of the Greenesignit! Card game, (educational and brainstorming tool for development of sustainable products) we will demonstrate how an entrepreneur successfully used visual narrative to communicate his story and at the same time as a vehicle to transmute his message in learning tool and product development.

Keywords: animating narrative, entrepreneur, Greeneisgnit! card game, visual storytelling

Procedia PDF Downloads 374
160 Bandwidth Efficient Cluster Based Collision Avoidance Multicasting Protocol in VANETs

Authors: Navneet Kaur, Amarpreet Singh

Abstract:

In Vehicular Adhoc Networks, Data Dissemination is a challenging task. There are number of techniques, types and protocols available for disseminating the data but in order to preserve limited bandwidth and to disseminate maximum data over networks makes it more challenging. There are broadcasting, multicasting and geocasting based protocols. Multicasting based protocols are found to be best for conserving the bandwidth. One such protocol named BEAM exists that improves the performance of Vehicular Adhoc Networks by reducing the number of in-network message transactions and thereby efficiently utilizing the bandwidth during an emergency situation. But this protocol may result in multicar chain collision as there was no V2V communication. So, this paper proposes a new protocol named Enhanced Bandwidth Efficient Cluster Based Multicasting Protocol (EBECM) that will overcome the limitations of existing BEAM protocol. And Simulation results will show the improved performance of EBECM in terms of Routing overhead, throughput and PDR when compared with BEAM protocol.

Keywords: BEAM, data dissemination, emergency situation, vehicular adhoc network

Procedia PDF Downloads 323
159 Use of Oral Communication Strategies: A Study of Bangladeshi EFL Learners at the Graduate Level

Authors: Afroza Akhter Tina

Abstract:

This paper reports on an investigation into the use of specific types of oral communication strategies, namely ‘topic avoidance’, ‘message abandonment’, ‘code-switching’, ‘paraphrasing’, ‘restructuring’, and ‘stalling’ by Bangladeshi EFL learners at the graduate level. It chiefly considers the frequency of using these strategies as well as the students and teachers attitudes toward such uses. The participants of this study are 66 EFL students and 12 EFL teachers of Jahangirnagar University. Data was collected through questionnaire, oral interview, and classroom observation form. The findings reveal that the EFL students tried to employ all the strategies to various extents due to the language difficulties they encountered in their oral English performance. Among them, the mostly used strategy was ‘stalling’ or the use of fillers, followed by ‘code-switching’. The least used strategies were ‘topic avoidance’, ‘restructuring’, and ‘paraphrasing’. The findings indicate that the use of such strategies was related to the contexts of situation and data-elicitation tasks. It also reveals that the students were not formally trained to use the strategies though the majority of the teachers and students acknowledge them as helpful in communication. Finally the study suggests that an awareness of the nature and functions of these strategies can contribute to the overall improvement of the learners’ communicative competence in spoken English.

Keywords: communicative strategies, competency, attitude, frequency

Procedia PDF Downloads 384
158 Integrating the Modbus SCADA Communication Protocol with Elliptic Curve Cryptography

Authors: Despoina Chochtoula, Aristidis Ilias, Yannis Stamatiou

Abstract:

Modbus is a protocol that enables the communication among devices which are connected to the same network. This protocol is, often, deployed in connecting sensor and monitoring units to central supervisory servers in Supervisory Control and Data Acquisition, or SCADA, systems. These systems monitor critical infrastructures, such as factories, power generation stations, nuclear power reactors etc. in order to detect malfunctions and ignite alerts and corrective actions. However, due to their criticality, SCADA systems are vulnerable to attacks that range from simple eavesdropping on operation parameters, exchanged messages, and valuable infrastructure information to malicious modification of vital infrastructure data towards infliction of damage. Thus, the SCADA research community has been active over strengthening SCADA systems with suitable data protection mechanisms based, to a large extend, on cryptographic methods for data encryption, device authentication, and message integrity protection. However, due to the limited computation power of many SCADA sensor and embedded devices, the usual public key cryptographic methods are not appropriate due to their high computational requirements. As an alternative, Elliptic Curve Cryptography has been proposed, which requires smaller key sizes and, thus, less demanding cryptographic operations. Until now, however, no such implementation has been proposed in the SCADA literature, to the best of our knowledge. In order to fill this gap, our methodology was focused on integrating Modbus, a frequently used SCADA communication protocol, with Elliptic Curve based cryptography and develop a server/client application to demonstrate the proof of concept. For the implementation we deployed two C language libraries, which were suitably modify in order to be successfully integrated: libmodbus (https://github.com/stephane/libmodbus) and ecc-lib https://www.ceid.upatras.gr/webpages/faculty/zaro/software/ecc-lib/). The first library provides a C implementation of the Modbus/TCP protocol while the second one offers the functionality to develop cryptographic protocols based on Elliptic Curve Cryptography. These two libraries were combined, after suitable modifications and enhancements, in order to give a modified version of the Modbus/TCP protocol focusing on the security of the data exchanged among the devices and the supervisory servers. The mechanisms we implemented include key generation, key exchange/sharing, message authentication, data integrity check, and encryption/decryption of data. The key generation and key exchange protocols were implemented with the use of Elliptic Curve Cryptography primitives. The keys established by each device are saved in their local memory and are retained during the whole communication session and are used in encrypting and decrypting exchanged messages as well as certifying entities and the integrity of the messages. Finally, the modified library was compiled for the Android environment in order to run the server application as an Android app. The client program runs on a regular computer. The communication between these two entities is an example of the successful establishment of an Elliptic Curve Cryptography based, secure Modbus wireless communication session between a portable device acting as a supervisor station and a monitoring computer. Our first performance measurements are, also, very promising and demonstrate the feasibility of embedding Elliptic Curve Cryptography into SCADA systems, filling in a gap in the relevant scientific literature.

Keywords: elliptic curve cryptography, ICT security, modbus protocol, SCADA, TCP/IP protocol

Procedia PDF Downloads 229
157 Implementation of Successive Interference Cancellation Algorithms in the 5g Downlink

Authors: Mokrani Mohamed Amine

Abstract:

In this paper, we have implemented successive interference cancellation algorithms in the 5G downlink. We have calculated the maximum throughput in Frequency Division Duplex (FDD) mode in the downlink, where we have obtained a value equal to 836932 b/ms. The transmitter is of type Multiple Input Multiple Output (MIMO) with eight transmitting and receiving antennas. Each antenna among eight transmits simultaneously a data rate of 104616 b/ms that contains the binary messages of the three users; in this case, the Cyclic Redundancy Check CRC is negligible, and the MIMO category is the spatial diversity. The technology used for this is called Non-Orthogonal Multiple Access (NOMA) with a Quadrature Phase Shift Keying (QPSK) modulation. The transmission is done in a Rayleigh fading channel with the presence of obstacles. The MIMO Successive Interference Cancellation (SIC) receiver with two transmitting and receiving antennas recovers its binary message without errors for certain values of transmission power such as 50 dBm, with 0.054485% errors when the transmitted power is 20dBm and with 0.00286763% errors for a transmitted power of 32 dBm(in the case of user 1) as well as with 0.0114705% errors when the transmitted power is 20 dBm also with 0.00286763% errors for a power of 24 dBm(in the case of user2) by applying the steps involved in SIC.

Keywords: 5G, NOMA, QPSK, TBS, LDPC, SIC, capacity

Procedia PDF Downloads 82
156 Intelligent Wireless Patient Monitoring and Tracking System

Authors: Ch. Sandeep Kumar Subudhi, S. Sivanandam

Abstract:

Our system is to monitor the human body temperature, blood pressure (BP), Pulse Rate and ECG and tracking the patient location. In our system the body temperature is detected by using LM35 temperature sensor, blood pressure is detected by the BP sensor, pulse rate is detected by the ear plug pulse sensor and the ECG is detected by the three lead ECG sensor in the working environment of the patient. The sensed information is sent to the PIC16F877 microcontroller through signal conditioning circuit. A desired amount of sensor value is set and if it is exceeded preliminary steps should be taken by indication by buzzer. The sensor information will be transmitted from the patient unit to the main controller unit with the help of Zigbee communication medium which is connected with the microcontrollers in the both units. The main controller unit will send those sensor data as well as the location of that patient by the help of GPS module to the observer/doctor. The observer/doctor can receive the SMS sent by GSM module and further decision can be taken. The message is sent to a cell phone using global system mobile (GSM) Modem. MAX232 acts as a driver between microcontroller and modem.

Keywords: LM35, heart beat sensor, ECG Sensor, BP Sensor, Zigbee module, GSM module, GPS module, PIC16F877A microcontroller

Procedia PDF Downloads 357
155 The Language of Hip-Hop and Rap in Tunisia: Symbol of Cultural Change in Post-Arab Spring Tunisia

Authors: Zouhir Gabsi

Abstract:

The Arab Spring has had noticeable effects on Tunisia in socio-economic, political, and cultural terms. Few have predicted that the music of hip-hop and rap could engage with the socio-political situation in Tunisia, especially after the downfall of Ben Ali’s regime. Having survived as underground music since the year 2000, the genre of hip-hop and rap remains an aberration from the folkloric tradition. By adhering to the socio-economic reality of the Tunisian street, rappers attempt to claim authenticity mainly in both thematic and language uses, and by usurping the power of ‘space’ from the regime’s control. With the songs’ fast-paced rhythms, catchy phrases, puns, vulgarisms, and linguistic innovations using metaphors, hip-hop, and rap have struck a chord with Tunisia’s youth. Tunisia’s new social reality has allowed Tunisian rappers to express dissent and voice people’s despair over the socio-economic and political situation. This paper argues that rap artists use language as a vehicle to claim the authenticity of their message. It also explores how the performative nature of the language of hip-hop and rap interacts with the Tunisian culture and argues the power of music in the context of political and socio-economic grievances in post-Arab Spring Tunisia.

Keywords: Arab Spring, hip-hop, eevolution, Tunisia, Tunisian Arabic

Procedia PDF Downloads 119
154 Urban Vitality: Methods for Measuring Vitality in Egypt's Commercial Streets

Authors: Alaa Eldien Sarhaan, Rania A. Galil, Yasmina Youssef

Abstract:

Vital streets transfer a totally different message from the lifeless streets; vitality is considered as the mobility dynamism for the city’s streets. The quality of a street is integral to the vitality. However, most efforts have focused on the requirements of cars resulting in the loss many qualities. A successful street is related to the needs and expectations of pedestrians. The amount of activity held in a place is one of the measures of vitality; hence the meaning of a vital street may be the result of a number of people engaged in various activities meeting their needs and expectations. Consequently, it varies from one city to another. This research focuses on vitality in commercial streets. It studies commercial streets in the Egyptian context, which have developed into a chaotic environment due to inefficiency and high-density activities. The first part identifies the meaning of vitality in the frame of its physical, social and economic dimensions, then determines the methods used in measuring vitality across commercial streets. Secondly, an application on one of the most important commercial streets in Alexandria ‘El-Attareen’ street is chosen as a case study to measure its vitality. The study contributes to a greater understanding of how theories on vital urban life contribute to the development of vital commercial streets in the Egyptian and similar contexts.

Keywords: footfall measurement, vitality, urban commercial streets, yield factor

Procedia PDF Downloads 230
153 Case Study Analysis for Driver's Company in the Transport Sector with the Help of Data Mining

Authors: Diana Katherine Gonzalez Galindo, David Rolando Suarez Mora

Abstract:

With this study, we used data mining as a new alternative of the solution to evaluate the comments of the customers in order to find a pattern that helps us to determine some behaviors to reduce the deactivation of the partners of the LEVEL app. In one of the greatest business created in the last times, the partners are being affected due to an internal process that compensates the customer for a bad experience, but these comments could be false towards the driver, that’s why we made an investigation to collect information to restructure this process, many partners have been disassociated due to this internal process and many of them refuse the comments given by the customer. The main methodology used in this case study is the observation, we recollect information in real time what gave us the opportunity to see the most common issues to get the most accurate solution. With this new process helped by data mining, we could get a prediction based on the behaviors of the customer and some basic data recollected such as the age, the gender, and others; this could help us in future to improve another process. This investigation gives more opportunities to the partner to keep his account active even if the customer writes a message through the app. The term is trying to avoid a recession of drivers in the future offering improving in the processes, at the same time we are in search of stablishing a strategy which benefits both the app’s managers and the associated driver.

Keywords: agent, driver, deactivation, rider

Procedia PDF Downloads 254
152 The Use of Facebook as a Social Media by Political Parties in the June 7 Election in Konya

Authors: Yasemin Gülşen Yılmaz, Süleyman Hakan Yılmaz, Muhammet Erbay

Abstract:

Social media is among the most important means of communication. Social media offers individuals and groups with an opportunity for participatory socialization over the internet, which is free of any time and place restrictions. Social media is a kind of interactive communication and bilateral social network. Various communication contents can be shared and put into mass circulation easily and quickly through social media. These sharings are not only limited to individuals but also happen to groups, institutions, and different constitutions. Their contents consist of any type of written message, audio and video files. We are living in the social media era now. It is not surprising that social media which has extensive communication facilities and massive prevalence is used in politics. Therefore, the use of social media (Facebook) by political parties during the Turkish general elections held on June 7, 2015, has been chosen as our research subject. Four parties namely, AKP, CHP, MHP and HDP who have the majority of votes in Turkey and participate in elections in Konya have been selected for our study. Their provincial centers’ and parliamentary candidates` use of social media (Facebook) on the last three days prior to the election have been examined and subjected to a qualitative analysis by means of content analysis.

Keywords: social media, June 7 general elections, politics, Facebook

Procedia PDF Downloads 372
151 The Influence of Language and Background Culture on Speakers from the Viewpoint of Gender and Identity

Authors: Yuko Tomoto

Abstract:

The purpose of this research is to examine the assumption that female bilingual speakers more often change the way they talk or think depending on the language they use compared with male bilingual speakers. The author collected data through questionnaires on 241 bilingual speakers. Also, in-depth interview surveys were conducted with 13 Japanese/English bilingual speakers whose native language is Japanese and 16 English/Japanese bilingual speakers whose native language is English. The results indicate that both male and female bilingual speakers are more or less influenced consciously and unconsciously by the language they use, as well as by the background cultural values of each language. At the same time, it was found that female speakers are much more highly affected by the language they use, its background culture and also by the interlocutors they were talking to. This was probably due to the larger cultural expectations on women. Through conversations, speakers are not only conveying a message but also attempting to express who they are, and what they want to be like. In other words, they are constantly building up and updating their own identities by choosing the most appropriate language and descriptions to express themselves in the dialogues. It has been claimed that the images of ideal L2 self could strongly motivate learners. The author hopes to make the best use of the fact that bilingual speakers change their presence depending on the language they use, in order to motivate Japanese learners of English, especially female learners from the viewpoint of finding their new selves in English.

Keywords: cultural influence, gender expectation, language learning, L2 self

Procedia PDF Downloads 390