Search results for: malware information sharing platform
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 12661

Search results for: malware information sharing platform

10231 Towards a Framework for Embedded Weight Comparison Algorithm with Business Intelligence in the Plantation Domain

Authors: M. Pushparani, A. Sagaya

Abstract:

Embedded systems have emerged as important elements in various domains with extensive applications in automotive, commercial, consumer, healthcare and transportation markets, as there is emphasis on intelligent devices. On the other hand, Business Intelligence (BI) has also been extensively used in a range of applications, especially in the agriculture domain which is the area of this research. The aim of this research is to create a framework for Embedded Weight Comparison Algorithm with Business Intelligence (EWCA-BI). The weight comparison algorithm will be embedded within the plantation management system and the weighbridge system. This algorithm will be used to estimate the weight at the site and will be compared with the actual weight at the plantation. The algorithm will be used to build the necessary alerts when there is a discrepancy in the weight, thus enabling better decision making. In the current practice, data are collected from various locations in various forms. It is a challenge to consolidate data to obtain timely and accurate information for effective decision making. Adding to this, the unstable network connection leads to difficulty in getting timely accurate information. To overcome the challenges embedding is done on a portable device that will have the embedded weight comparison algorithm to also assist in data capture and synchronize data at various locations overcoming the network short comings at collection points. The EWCA-BI will provide real-time information at any given point of time, thus enabling non-latent BI reports that will provide crucial information to enable efficient operational decision making. This research has a high potential in bringing embedded system into the agriculture industry. EWCA-BI will provide BI reports with accurate information with uncompromised data using an embedded system and provide alerts, therefore, enabling effective operation management decision-making at the site.

Keywords: embedded business intelligence, weight comparison algorithm, oil palm plantation, embedded systems

Procedia PDF Downloads 271
10230 Twenty-First Century Masculinities in Popular Romance Genre

Authors: Eirini Arvanitaki

Abstract:

The popular romance novel has the ability to withstand the test of time by carefully adjusting its contents to the twenty-first century and modern society. At the same time, it manages to preserve unaltered its traditional foundations (heteronormativity, heterosexual love, monogamy). This paper focuses on the projection of the hero’s masculinity in a selection of post-millennial popular romance narratives and attempts to discover if, and to what extent, this projection reinforces or challenges patriarchal ideas about gender. In the majority of these narratives, the hero is often presented as a hegemonic alpha male. However, hegemonic masculinity is not a fixed concept. Rather, it is subject to continuous change, which allows for the emergence of various dominant masculinities. With this in mind, and through a close textual analysis approach and a gender reading of romance narratives, the paper suggests that to a certain extent, the romance hero could be described as a platform onto which different forms of dominant masculinity are displayed and highlights that these masculinities do not necessarily clash, depend on, or function as a prerequisite for each other.

Keywords: gender, literary projections, masculinity, twenty-first century popular romance narratives

Procedia PDF Downloads 121
10229 Automated Prepaid Billing Subscription System

Authors: Adekunle K. O, Adeniyi A. E, Kolawole E

Abstract:

One of the most dramatic trends in the communications market in recent years has been the growth of prepaid services. Today, prepaid no longer constitutes the low-revenue, basic-service segment. It is driven by a high margin, value-add service customers who view it as a convenient way of retaining control over their usage and communication spending while expecting high service levels. To service providers, prepaid services offer the advantage of reducing bad accounts while allowing them to predict usage and plan network resources. Yet, the real-time demands of prepaid services require a scalable, real-time platform to manage customers through their entire life cycle. It delivers integrated real-time rating, voucher management, recharge management, customer care and service provisioning for the generation of new prepaid services. It carries high scalability that can handle millions of prepaid customers in real-time through their entire life cycle.

Keywords: prepaid billing, voucher management, customers, automated, security

Procedia PDF Downloads 95
10228 Site Selection and Construction Mechanism of the Island Settlements in China Based on CFD-GIS Technology

Authors: Weng Jiantao, Wu Yiqun

Abstract:

The efficiency of natural ventilation, wind pressure distribution on building surface, wind comfort for pedestrians and buildings’ wind tolerance in traditional settlements are closely related to the pattern of terrain. On the basis of field research on the typical island terrain in China, the physical and mathematical models are established by using CFD software, and then the simulation results of the wind field are exported. We discuss the relationship between wind direction and wind field results. Furthermore simulation results are imported into ArcGIS platform. The evaluation model of island site selection is established with considering slope factor. We realize the visual model of site selection on complex island terrain. The multi-plans of certain residential are discussed based on wind simulation; at last the optimal project is selected. Results can provide the theory guidance for settlement planning and construction in China's traditional island.

Keywords: CFD, island terrain, site selection, construction mechanism

Procedia PDF Downloads 490
10227 “I” on the Web: Social Penetration Theory Revised

Authors: Dr. Dionysis Panos Dpt. Communication, Internet Studies Cyprus University of Technology

Abstract:

The widespread use of New Media and particularly Social Media, through fixed or mobile devices, has changed in a staggering way our perception about what is “intimate" and "safe" and what is not, in interpersonal communication and social relationships. The distribution of self and identity-related information in communication now evolves under new and different conditions and contexts. Consequently, this new framework forces us to rethink processes and mechanisms, such as what "exposure" means in interpersonal communication contexts, how the distinction between the "private" and the "public" nature of information is being negotiated online, how the "audiences" we interact with are understood and constructed. Drawing from an interdisciplinary perspective that combines sociology, communication psychology, media theory, new media and social networks research, as well as from the empirical findings of a longitudinal comparative research, this work proposes an integrative model for comprehending mechanisms of personal information management in interpersonal communication, which can be applied to both types of online (Computer-Mediated) and offline (Face-To-Face) communication. The presentation is based on conclusions drawn from a longitudinal qualitative research study with 458 new media users from 24 countries for almost over a decade. Some of these main conclusions include: (1) There is a clear and evidenced shift in users’ perception about the degree of "security" and "familiarity" of the Web, between the pre- and the post- Web 2.0 era. The role of Social Media in this shift was catalytic. (2) Basic Web 2.0 applications changed dramatically the nature of the Internet itself, transforming it from a place reserved for “elite users / technical knowledge keepers" into a place of "open sociability” for anyone. (3) Web 2.0 and Social Media brought about a significant change in the concept of “audience” we address in interpersonal communication. The previous "general and unknown audience" of personal home pages, converted into an "individual & personal" audience chosen by the user under various criteria. (4) The way we negotiate the nature of 'private' and 'public' of the Personal Information, has changed in a fundamental way. (5) The different features of the mediated environment of online communication and the critical changes occurred since the Web 2.0 advance, lead to the need of reconsideration and updating the theoretical models and analysis tools we use in our effort to comprehend the mechanisms of interpersonal communication and personal information management. Therefore, is proposed here a new model for understanding the way interpersonal communication evolves, based on a revision of social penetration theory.

Keywords: new media, interpersonal communication, social penetration theory, communication exposure, private information, public information

Procedia PDF Downloads 351
10226 The Use of Crisis Workplace Technology to Protect Communication Processes of Critical Infrastructure

Authors: Jiri Barta, Jiří F. Urbanek

Abstract:

This paper deals with a protection of the national and European infrastructure. It is issue nowadays. The paper deals with the perspectives and possibilities of "smart solutions" to critical infrastructure protection. The research project deals with computers aided technologies are used from the perspective of new, better protection of selected infrastructure objects. Protection is focused on communication and information channels. These communication and information channels are very important for the functioning of the system of protection of critical infrastructure elements.

Keywords: interoperability, communication systems, controlling proces, critical infrastructure, crisis workplaces, continuity

Procedia PDF Downloads 284
10225 Turkish Graduate Students' Perceptions of Drop Out Issues in Massive Open Online Courses

Authors: Harun Bozna

Abstract:

MOOC (massive open online course) is a groundbreaking education platform and a current buzzword in higher education. Although MOOCs offer many appreciated learning experiences to learners from various universities and institutions, they have considerably higher dropout rates than traditional education. Only about 10% of the learners who enroll in MOOCs actually complete the course. In this case, perceptions of participants and a comprehensive analysis of MOOCs have become an essential part of the research in this area. This study aims to explore the MOOCs in detail for better understanding its content, purpose and primarily drop out issues. The researcher conducted an online questionnaire to get perceptions of graduate students on their learning experiences in MOOCs and arranged a semi- structured oral interview with some participants. The participants are Turkish graduate level students doing their MA and Ph.D. in various programs. The findings show that participants are more likely to drop out courses due to lack of time and lack of pressure.

Keywords: distance education, MOOCs, drop out, perception of graduate students

Procedia PDF Downloads 226
10224 Obstetric Violence Consequences And Coping Strategies: Insights Through The Voices Of Arab And Jewish Women In Israel

Authors: Dganit Sharon, Raghda Alnabilsy

Abstract:

The goal of this qualitative research was to sound the voices of Jewish and Arab women in Israel who had experienced obstetric violence, to learn the consequences of the violence to them on different levels and over time, and to present their coping strategies from their perspective. Another goal was to expand the research knowledge on an issue that has not been studied among Arab and Jewish women in Israel. The premise of this study is the feminist approach that aims to promote human rights, and to eradicate phenomena related to cultural, structural, gender and patriarchal structures of women, their bodies, and their health. The research was based on the qualitative-constructivist methodology, by means of thematic analysis of 20 in-depth semi-structured interviews. Two main themes emerged from the analysis. First, the physical and emotional consequences of obstetric violence, consequences to spousal relationships, and mistrust of the health system and service providers. Second, women’s coping strategies with obstetric violence that included repression and avoidance as a way of coping with the pain and trauma of the abuse; garnering inner strengths, resilience, knowledge and awareness of the delivery process; recruiting and relying on external help; sharing on social media, and discussions with other women who had similar experiences; or reaching out to therapists / legal aid / public complaints.

Keywords: obstetric violence, Jewish and arab women in israel, consequences, coping strategies, gender-related perspective

Procedia PDF Downloads 54
10223 Police and Community Crime Prevention in Sweden

Authors: Peter Lindstrom, Caroline Gyberg, Scott Goodwin

Abstract:

The Swedish police organisation was fundamentally reorganized in 2015 when 21 regional police forces were combined into one national police authority divided in 7 larger police regions, 35 police areas, and some 100 local police districts. A central theme for the reform was that local crime prevention policing should be more unified in the country. In this paper, we review crime prevention strategies in Sweden from a criminological and policing perspective focusing, among other things, on differences between urban and rural areas. In the crime prevention field, words such as 'knowledge- and evidence-based', 'collaboration', and 'strategies' are common. Our objective is to investigate the relationship between theoretical and practical knowledge in local crime prevention work. Our research indicate that an elaborated and strategic connection between theoretical and practical perspectives is important for successful local crime prevention work. Universities may provide a platform such knowledge exchange.

Keywords: crime prevention, police reform, urban and rural areas, criminological and policing perspectives

Procedia PDF Downloads 166
10222 A Comparative Study of the Athlete Health Records' Minimum Data Set in Selected Countries and Presenting a Model for Iran

Authors: Robab Abdolkhani, Farzin Halabchi, Reza Safdari, Goli Arji

Abstract:

Background and purpose: The quality of health record depends on the quality of its content and proper documentation. Minimum data set makes a standard method for collecting key data elements that make them easy to understand and enable comparison. The aim of this study was to determine the minimum data set for Iranian athletes’ health records. Methods: This study is an applied research of a descriptive comparative type which was carried out in 2013. By using internal and external forms of documentation, a checklist was created that included data elements of athletes health record and was subjected to debate in Delphi method by experts in the field of sports medicine and health information management. Results: From 97 elements which were subjected to discussion, 85 elements by more than 75 percent of the participants (as the main elements) and 12 elements by 50 to 75 percent of the participants (as the proposed elements) were agreed upon. In about 97 elements of the case, there was no significant difference between responses of alumni groups of sport pathology and sports medicine specialists with medical record, medical informatics and information management professionals. Conclusion: Minimum data set of Iranian athletes’ health record with four information categories including demographic information, health history, assessment and treatment plan was presented. The proposed model is available for manual and electronic medical records.

Keywords: Documentation, Health record, Minimum data set, Sports medicine

Procedia PDF Downloads 459
10221 An Efficient Mitigation Plan to Encounter Various Vulnerabilities in Internet of Things Enterprises

Authors: Umesh Kumar Singh, Abhishek Raghuvanshi, Suyash Kumar Singh

Abstract:

As IoT networks gain popularity, they are more susceptible to security breaches. As a result, it is crucial to analyze the IoT platform as a whole from the standpoint of core security concepts. The Internet of Things relies heavily on wireless networks, which are well-known for being susceptible to a wide variety of attacks. This article provides an analysis of many techniques that may be used to identify vulnerabilities in the software and hardware associated with the Internet of Things (IoT). In the current investigation, an experimental setup is built with the assistance of server computers, client PCs, Internet of Things development boards, sensors, and cloud subscriptions. Through the use of network host scanning methods and vulnerability scanning tools, raw data relating to IoT-based applications and devices may be collected. Shodan is a tool that is used for scanning, and it is also used for effective vulnerability discovery in IoT devices as well as penetration testing. This article presents an efficient mitigation plan for encountering vulnerabilities in the Internet of Things.

Keywords: internet of things, security, privacy, vulnerability identification, mitigation plan

Procedia PDF Downloads 24
10220 Transparency Obligations under the AI Act Proposal: A Critical Legal Analysis

Authors: Michael Lognoul

Abstract:

In April 2021, the European Commission released its AI Act Proposal, which is the first policy proposal at the European Union level to target AI systems comprehensively, in a horizontal manner. This Proposal notably aims to achieve an ecosystem of trust in the European Union, based on the respect of fundamental rights, regarding AI. Among many other requirements, the AI Act Proposal aims to impose several generic transparency obligationson all AI systems to the benefit of natural persons facing those systems (e.g. information on the AI nature of systems, in case of an interaction with a human). The Proposal also provides for more stringent transparency obligations, specific to AI systems that qualify as high-risk, to the benefit of their users, notably on the characteristics, capabilities, and limitations of the AI systems they use. Against that background, this research firstly presents all such transparency requirements in turn, as well as related obligations, such asthe proposed obligations on record keeping. Secondly, it focuses on a legal analysis of their scope of application, of the content of the obligations, and on their practical implications. On the scope of transparency obligations tailored for high-risk AI systems, the research notably notes that it seems relatively narrow, given the proposed legal definition of the notion of users of AI systems. Hence, where end-users do not qualify as users, they may only receive very limited information. This element might potentially raise concern regarding the objective of the Proposal. On the content of the transparency obligations, the research highlights that the information that should benefit users of high-risk AI systems is both very broad and specific, from a technical perspective. Therefore, the information required under those obligations seems to create, prima facie, an adequate framework to ensure trust for users of high-risk AI systems. However, on the practical implications of these transparency obligations, the research notes that concern arises due to potential illiteracy of high-risk AI systems users. They might not benefit from sufficient technical expertise to fully understand the information provided to them, despite the wording of the Proposal, which requires that information should be comprehensible to its recipients (i.e. users).On this matter, the research points that there could be, more broadly, an important divergence between the level of detail of the information required by the Proposal and the level of expertise of users of high-risk AI systems. As a conclusion, the research provides policy recommendations to tackle (part of) the issues highlighted. It notably recommends to broaden the scope of transparency requirements for high-risk AI systems to encompass end-users. It also suggests that principles of explanation, as they were put forward in the Guidelines for Trustworthy AI of the High Level Expert Group, should be included in the Proposal in addition to transparency obligations.

Keywords: aI act proposal, explainability of aI, high-risk aI systems, transparency requirements

Procedia PDF Downloads 280
10219 The Potentials of Online Learning and the Challenges towards Its Adoption in Nigeria's Higher Institutions of Learning

Authors: Kuliya Muhammed

Abstract:

This paper examines the potentials of online learning and the challenges to its adoption in Nigeria’s higher institutions of learning. The research would assist in tackling the challenges of online learning adoption and enlighten institutions on the numerous benefits of online learning in Nigeria. The researcher used survey method for the study and questionnaires were used to obtain the needed data from 230 respondents cut across 20 higher institutions in the country. The findings revealed that online learning has the prospect to boost access to learning tools, assist students’ to learn from the comfort of their offices or homes, reduce the cost of learning, and enable individuals to gain self-knowledge. The major challenges in the adoption of e-learning are poor Information and Communication Technology infrastructures, poor internet connectivity where available, lack of Information and Communication Technology background, problem of power supply, lack of commitment by institutions, poor maintenance of Information and Communication Technology tools, inadequate facilities, lack of government funding and fraud. Recommendations were also made at the end of the research work.

Keywords: electronic, ICT, institution, internet, learning, technology

Procedia PDF Downloads 369
10218 Rumour Containment Using Monitor Placement and Truth Propagation

Authors: Amrah Maryam

Abstract:

The emergence of online social networks (OSNs) has transformed the way we pursue and share information. On the one hand, OSNs provide great ease for the spreading of positive information while, on the other hand, they may also become a channel for the spreading of malicious rumors and misinformation throughout the social network. Thus, to assure the trustworthiness of OSNs to its users, it is of vital importance to detect the misinformation propagation in the network by placing network monitors. In this paper, we aim to place monitors near the suspected nodes with the intent to limit the diffusion of misinformation in the social network, and then we also detect the most significant nodes in the network for propagating true information in order to minimize the effect of already diffused misinformation. Thus, we initiate two heuristic monitor placement using articulation points and truth propagation using eigenvector centrality. Furthermore, to provide real-time workings of the system, we integrate both the monitor placement and truth propagation entities as well. To signify the effectiveness of the approaches, we have carried out the experiment and evaluation of Stanford datasets of online social networks.

Keywords: online social networks, monitor placement, independent cascade model, spread of misinformation

Procedia PDF Downloads 146
10217 Auditing of Building Information Modeling Application in Decoration Engineering Projects in China

Authors: Lan Luo

Abstract:

In China’s construction industry, it is a normal practice to separately subcontract the decoration engineering part from construction engineering, and Building Information Modeling (BIM) is also done separately. Application of BIM in decoration engineering should be integrated with other disciplines, but Chinese current practice makes this very difficult and complicated. Currently, there are three barriers in the auditing of BIM application in decoration engineering in China: heavy workload; scarcity of qualified professionals; and lack of literature concerning audit contents, standards, and methods. Therefore, it is significant to perform research on what (contents) should be evaluated, in which phase, and by whom (professional qualifications) in BIM application in decoration construction so that the application of BIM can be promoted in a better manner. Based on this consideration, four principles of BIM auditing are proposed: Comprehensiveness of information, accuracy of data, aesthetic attractiveness of appearance, and scheme optimization. In the model audit, three methods should be used: Collision, observation, and contrast. In addition, BIM auditing at six stages is discussed and a checklist for work items and results to be submitted is proposed. This checklist can be used for reference by decoration project participants.

Keywords: audit, evaluation, dimensions, methods, standards, BIM application in decoration engineering projects

Procedia PDF Downloads 330
10216 Data Collection in Protected Agriculture for Subsequent Big Data Analysis: Methodological Evaluation in Venezuela

Authors: Maria Antonieta Erna Castillo Holly

Abstract:

During the last decade, data analysis, strategic decision making, and the use of artificial intelligence (AI) tools in Latin American agriculture have been a challenge. In some countries, the availability, quality, and reliability of historical data, in addition to the current data recording methodology in the field, makes it difficult to use information systems, complete data analysis, and their support for making the right strategic decisions. This is something essential in Agriculture 4.0. where the increase in the global demand for fresh agricultural products of tropical origin, during all the seasons of the year requires a change in the production model and greater agility in the responses to the consumer market demands of quality, quantity, traceability, and sustainability –that means extensive data-. Having quality information available and updated in real-time on what, how much, how, when, where, at what cost, and the compliance with production quality standards represents the greatest challenge for sustainable and profitable agriculture in the region. The objective of this work is to present a methodological proposal for the collection of georeferenced data from the protected agriculture sector, specifically in production units (UP) with tall structures (Greenhouses), initially for Venezuela, taking the state of Mérida as the geographical framework, and horticultural products as target crops. The document presents some background information and explains the methodology and tools used in the 3 phases of the work: diagnosis, data collection, and analysis. As a result, an evaluation of the process is carried out, relevant data and dashboards are displayed, and the first satellite maps integrated with layers of information in a geographic information system are presented. Finally, some improvement proposals and tentatively recommended applications are added to the process, understanding that their objective is to provide better qualified and traceable georeferenced data for subsequent analysis of the information and more agile and accurate strategic decision making. One of the main points of this study is the lack of quality data treatment in the Latin America area and especially in the Caribbean basin, being one of the most important points how to manage the lack of complete official data. The methodology has been tested with horticultural products, but it can be extended to other tropical crops.

Keywords: greenhouses, protected agriculture, data analysis, geographic information systems, Venezuela

Procedia PDF Downloads 117
10215 Sustainability of Performing Venues Considering Urban Connectivity and Facility Utilization

Authors: Wei-Hwa Chiang, Wei-Ting Hsu, Yuan-Chi Liu, Cheng-Che Tsai

Abstract:

A sustainable built environment aims for minimizing both regional and global environmental impact while maintaining a healthy living for individuals. Sustainability of performing venues has rarely been discussed when compared with residential, office, and other popular building types. Life-cycle carbon emission due to the high standard requirements in acoustics, stage engineering, HVAC, and building structure need to be carefully examined. This can be complicated by social-economic and cultural concerns in addition to technical excellence. This paper reported case-based study and statistics of performing venues regarding urban connectivity and spatial layouts in enhancing facility usage and promoting cultural vitality. Interviews conducted for a major venue at Taipei indicated high linkage with surrounding leisure activity and the need for quality pedestrian and additional spaces open to the general public. Statistics of venues with various size and function suggested the possibility and strategies limit the size and height of reception and foyer spaces, and to maximize their use when there are no performances. Design strategies are identified to increase visual contact or facility sharing between the artists and the audience or the general public in reducing facility size and promoting potential involvement in cultural activities.

Keywords: sustainability, performing venue, design, operation

Procedia PDF Downloads 111
10214 The Flipped Education Case Study on Teacher Professional Learning Community in Technology and Media Implementation

Authors: Juei-Hsin Wang, Yen-Ting Chen

Abstract:

The paper examines teacher professional learning community theory and implementation by using technology and media tools in Taiwan. After literature review, the researcher concluded in five elements of teacher professional learning community theory. They are ‘sharing the vision and value', ‘collaborative cooperation’, ‘ to support the situation', ‘to share practice' and 'Pay Attention to Student Learning Effectiveness' five levels by using technology and media in flipped education. Teacher professional learning community is one kind of models for teacher professional development in flipped education. Due to Taiwan education culture, there is no summative evaluation for teachers. So, there are multiple kinds of ways and education practice in teacher professional learning community nowadays. This study used literature review and quality analysis to analyze the connection theory and practice and discussed the official and non‐official strategies on teacher professional learning community by using technology and media in flipped education. The tablet is used as a camera tool for classroom students to solve problems. The students can instantly see and enable other students to watch the whole class discussion by operating the tablet. This would allow teachers and students to focus on discussing the connotation of subjects, especially bottom‐up and non‐official cases from teachers become an important influence in Taiwan.

Keywords: professional learning community, collaborative cooperation, flipped education, technology application, media application

Procedia PDF Downloads 135
10213 Co-management Organizations: A Way to Facilitate Sustainable Management of the Sundarbans Mangrove Forests of Bangladesh

Authors: Md. Wasiul Islam, Md. Jamius Shams Sowrov

Abstract:

The Sundarbans is the largest single tract of mangrove forest in the world. This is located in the southwest corner of Bangladesh. This is a unique ecosystem which is a great breeding and nursing ground for a great biodiversity. It supports the livelihood of about 3.5 million coastal dwellers and also protects the coastal belt and inland areas from various natural calamities. Historically, the management of the Sundarbans was controlled by the Bangladesh Forest Department following top-down approach without the involvement of local communities. Such fence and fining-based blue-print approach was not effective to protect the forest which caused Sundarbans to degrade severely in the recent past. Fifty percent of the total tree cover has been lost in the last 30 years. Therefore, local multi-stakeholder based bottom-up co-management approach was introduced at some of the parts of the Sundarbans in 2006 to improve the biodiversity status by enhancing the protection level of the forest. Various co-management organizations were introduced under co-management approach where the local community people could actively involve in various activities related to the management and welfare of the Sundarbans including the decision-making process to achieve the goal. From this backdrop, the objective of the study was to assess the performance of co-management organizations to facilitate sustainable management of the Sundarbans mangrove forests. The qualitative study followed face-to-face interview to collect data using two sets of semi-structured questionnaires. A total of 40 respondents participated in the research that was from eight villagers under two forest ranges. 32 representatives from the local communities as well as 8 official representatives involved in co-management approach were interviewed using snowball sampling technique. The study shows that the co-management approach improved governance system of the Sundarbans through active participation of the local community people and their interactions with the officials via the platform of co-management organizations. It facilitated accountability and transparency system to some extent through following some formal and informal rules and regulations. It also improved the power structure of the management process by fostering local empowerment process particularly the women. Moreover, people were able to learn from their interactions with and within the co-management organizations as well as interventions improved environmental awareness and promoted social learning. The respondents considered good governance as the most important factor for achieving the goal of sustainable management and biodiversity conservation of the Sundarbans. The success of co-management planning process also depends on the active and functional participation of different stakeholders including the local communities where co-management organizations were considered as the most functional platform. However, the governance system was also facing various challenges which resulted in barriers to the sustainable management of the Sundarbans mangrove forest. But still there were some members involved in illegal forest operations and created obstacles against sustainable management of the Sundarbans. Respondents recommended greater patronization from the government, financial and logistic incentives for alternative income generation opportunities with effective participatory monitoring and evaluation system to improve sustainable management of the Sundarbans.

Keywords: Bangladesh, co-management approach, co-management organizations, governance, Sundarbans, sustainable management

Procedia PDF Downloads 159
10212 Adaptive Power Control Topology Based Photovoltaic-Battery Microgrid System

Authors: Rajat Raj, Rohini S. Hallikar

Abstract:

The ever-increasing integration of renewable energy sources in the power grid necessitates the development of efficient and reliable microgrid systems. Photovoltaic (PV) systems coupled with energy storage technologies, such as batteries, offer promising solutions for sustainable and resilient power generation. This paper proposes an adaptive power control topology for a PV-battery microgrid system, aiming to optimize the utilization of available solar energy and enhance the overall system performance. In order to provide a smooth transition between the OFF-GRID and ON-GRID modes of operation with proportionate power sharing, a self-adaptive control method for a microgrid is proposed. Three different modes of operation are discussed in this paper, i.e., GRID connected, the transition between Grid-connected and Islanded State, and changing the irradiance of PVs and doing the transitioning. The simulation results show total harmonic distortion to be 0.08, 1.43 and 2.17 for distribution generation-1 and 4.22,3.92 and 2.10 for distribution generation-2 in the three modes, respectively which helps to maintain good power quality. The simulation results demonstrate the superiority of the adaptive power control topology in terms of maximizing renewable energy utilization, improving system stability and ensuring a seamless transition between grid-connected and islanded modes.

Keywords: islanded modes, microgrids, photo voltaic, total harmonic distortion

Procedia PDF Downloads 153
10211 Examination of the Satisfaction Levels of Pre-Service Teachers Concerning E-Learning Process in Terms of Different Variables

Authors: Agah Tugrul Korucu

Abstract:

Significant changes have taken place for the better in the bulk of information and in the use of technology available in the field of education induced by technological changes in the 21st century. It is mainly the job of the teachers and pre-service teachers to integrate information and communication technologies into education by means of conveying the use of technology to individuals. While the pre-service teachers are conducting lessons by using technology, the methods they have developed are important factors for the requirements of the lesson and for the satisfaction levels of the students. The study of this study is to examine the satisfaction levels of pre-service teachers as regards e-learning in a technological environment in which there are lesson activities conducted through an online learning environment in terms of various variables. The study group of the research is composed of 156 pre-service teachers that were students in the departments of Computer and Teaching Technologies, Art Teaching and Pre-school Teaching in the academic year of 2014 - 2015. The qualitative research method was adopted for this study; the scanning model was employed in collecting the data. “The Satisfaction Scale regarding the E-learning Process”, developed by Gülbahar, and the personal information form, which was developed by the researcher, were used as means of collecting the data. Cronbach α reliability coefficient, which is the internal consistency coefficient of the scale, is 0.91. SPSS computerized statistical package program and the techniques of medium, standard deviation, percentage, correlation, t-test and variance analysis were used in the analysis of the data.

Keywords: online learning environment, integration of information technologies, e-learning, e-learning satisfaction, pre-service teachers

Procedia PDF Downloads 339
10210 Emerging Cyber Threats and Cognitive Vulnerabilities: Cyberterrorism

Authors: Oludare Isaac Abiodun, Esther Omolara Abiodun

Abstract:

The purpose of this paper is to demonstrate that cyberterrorism is existing and poses a threat to computer security and national security. Nowadays, people have become excitedly dependent upon computers, phones, the Internet, and the Internet of things systems to share information, communicate, conduct a search, etc. However, these network systems are at risk from a different source that is known and unknown. These network systems risk being caused by some malicious individuals, groups, organizations, or governments, they take advantage of vulnerabilities in the computer system to hawk sensitive information from people, organizations, or governments. In doing so, they are engaging themselves in computer threats, crime, and terrorism, thereby making the use of computers insecure for others. The threat of cyberterrorism is of various forms and ranges from one country to another country. These threats include disrupting communications and information, stealing data, destroying data, leaking, and breaching data, interfering with messages and networks, and in some cases, demanding financial rewards for stolen data. Hence, this study identifies many ways that cyberterrorists utilize the Internet as a tool to advance their malicious mission, which negatively affects computer security and safety. One could identify causes for disparate anomaly behaviors and the theoretical, ideological, and current forms of the likelihood of cyberterrorism. Therefore, for a countermeasure, this paper proposes the use of previous and current computer security models as found in the literature to help in countering cyberterrorism

Keywords: cyberterrorism, computer security, information, internet, terrorism, threat, digital forensic solution

Procedia PDF Downloads 83
10209 VIAN-DH: Computational Multimodal Conversation Analysis Software and Infrastructure

Authors: Teodora Vukovic, Christoph Hottiger, Noah Bubenhofer

Abstract:

The development of VIAN-DH aims at bridging two linguistic approaches: conversation analysis/interactional linguistics (IL), so far a dominantly qualitative field, and computational/corpus linguistics and its quantitative and automated methods. Contemporary IL investigates the systematic organization of conversations and interactions composed of speech, gaze, gestures, and body positioning, among others. These highly integrated multimodal behaviour is analysed based on video data aimed at uncovering so called “multimodal gestalts”, patterns of linguistic and embodied conduct that reoccur in specific sequential positions employed for specific purposes. Multimodal analyses (and other disciplines using videos) are so far dependent on time and resource intensive processes of manual transcription of each component from video materials. Automating these tasks requires advanced programming skills, which is often not in the scope of IL. Moreover, the use of different tools makes the integration and analysis of different formats challenging. Consequently, IL research often deals with relatively small samples of annotated data which are suitable for qualitative analysis but not enough for making generalized empirical claims derived quantitatively. VIAN-DH aims to create a workspace where many annotation layers required for the multimodal analysis of videos can be created, processed, and correlated in one platform. VIAN-DH will provide a graphical interface that operates state-of-the-art tools for automating parts of the data processing. The integration of tools that already exist in computational linguistics and computer vision, facilitates data processing for researchers lacking programming skills, speeds up the overall research process, and enables the processing of large amounts of data. The main features to be introduced are automatic speech recognition for the transcription of language, automatic image recognition for extraction of gestures and other visual cues, as well as grammatical annotation for adding morphological and syntactic information to the verbal content. In the ongoing instance of VIAN-DH, we focus on gesture extraction (pointing gestures, in particular), making use of existing models created for sign language and adapting them for this specific purpose. In order to view and search the data, VIAN-DH will provide a unified format and enable the import of the main existing formats of annotated video data and the export to other formats used in the field, while integrating different data source formats in a way that they can be combined in research. VIAN-DH will adapt querying methods from corpus linguistics to enable parallel search of many annotation levels, combining token-level and chronological search for various types of data. VIAN-DH strives to bring crucial and potentially revolutionary innovation to the field of IL, (that can also extend to other fields using video materials). It will allow the processing of large amounts of data automatically and, the implementation of quantitative analyses, combining it with the qualitative approach. It will facilitate the investigation of correlations between linguistic patterns (lexical or grammatical) with conversational aspects (turn-taking or gestures). Users will be able to automatically transcribe and annotate visual, spoken and grammatical information from videos, and to correlate those different levels and perform queries and analyses.

Keywords: multimodal analysis, corpus linguistics, computational linguistics, image recognition, speech recognition

Procedia PDF Downloads 93
10208 Utilization of Secure Wireless Networks as Environment for Learning and Teaching in Higher Education

Authors: Mohammed A. M. Ibrahim

Abstract:

This paper investigate the utilization of wire and wireless networks to be platform for distributed educational monitoring system. Universities in developing countries suffer from a lot of shortages(staff, equipment, and finical budget) and optimal utilization of the wire and wireless network, so universities can mitigate some of the mentioned problems and avoid the problems that maybe humble the education processes in many universities by using our implementation of the examinations system as a test-bed to utilize the network as a solution to the shortages for academic staff in Taiz University. This paper selects a two areas first one quizzes activities is only a test bed application for wireless network learning environment system to be distributed among students. Second area is the features and the security of wireless, our tested application implemented in a promising area which is the use of WLAN in higher education for leering environment.

Keywords: networking wire and wireless technology, wireless network security, distributed computing, algorithm, encryption and decryption

Procedia PDF Downloads 325
10207 An Efficient and Provably Secure Three-Factor Authentication Scheme with Key Agreement

Authors: Mohan Ramasundaram, Amutha Prabakar Muniyandi

Abstract:

Remote user authentication is one of the important tasks for any kind of remote server applications. Several remote authentication schemes are proposed by the researcher for Telecare Medicine Information System (TMIS). Most of the existing techniques have limitations, vulnerable to various kind attacks, lack of functionalities, information leakage, no perfect forward security and ineffectiveness. Authentication is a process of user verification mechanism for allows him to access the resources of a server. Nowadays, most of the remote authentication protocols are using two-factor authentications. We have made a survey of several remote authentication schemes using three factors and this survey shows that the most of the schemes are inefficient and subject to several attacks. We observed from the experimental evaluation; the proposed scheme is very secure against various known attacks that include replay attack, man-in-the-middle attack. Furthermore, the analysis based on the communication cost and computational cost estimation of the proposed scheme with related schemes shows that our proposed scheme is efficient.

Keywords: Telecare Medicine Information System, elliptic curve cryptography, three-factor, biometric, random oracle

Procedia PDF Downloads 208
10206 Striving towards an Ambush Free Olympics: Effective Strategies and Intellectual Property Legislations

Authors: Mahit T. Anand

Abstract:

The modern Olympic Games present an unparalleled platform for companies to gain worldwide visibility. The increasing popularity of such an event supplemented by large sums of money paid by sponsors for the privilege of being associated with the Olympic Games has spawned its own particular brand of unfair competition, called ‘ambush marketing’. This research examines the practice of ambush marketing which has long been troubling the International Olympic Committee (I.O.C.) and its corporate sponsors. It emphasizes on implementing stringent legislative reforms by the host nations and to carry out effective ‘Brand Protection Programs’ for the upcoming Winter Olympics due to begin in February 2014 at Sochi, Russia and the Summer Olympics at Rio de Janeiro, Brazil in 2016. The research is carried out in the backdrop of out-standing legislative enactments made by the previous host nations and effective ‘Brand Protection Program’ formulated by their respective organizing committees.

Keywords: ambush marketing, international olympic committee (IOC), official sponsors, trademark

Procedia PDF Downloads 329
10205 Internet as a Marketing Tool for Tourism Promotion

Authors: Emeka Okonkwo

Abstract:

The Information Technology (IT) has prevailed over all functions of strategic and operational management. The Internet (a product of information technology) has increasingly become a popular medium for marketing. This paper examines the potentials of Internet for tourism marketing. To achieve this, the paper x-rays the characteristics of tourism marketing and examines the application of the Internet in tourism marketing. It is argued that the use of Internet for tourism marketing will not only reach a broad audience and reduce the cost of transaction (by conventional methods used by travel agents in times past), but, will also alleviate the problems of identification, authentication and confirmation of travels/package tours by tourists as well as promotion of tourism industry.

Keywords: internet, marketing, tourism, tourism management

Procedia PDF Downloads 403
10204 Information Technology Impacts on the Supply Chain Performance: Case Study Approach

Authors: Kajal Zarei

Abstract:

Supply chain management is becoming an increasingly important issue in many businesses today. In such circumstances, a number of reasons such as management deficiency in different segments of the supply chain, lack of streamlined processes, resistance to change the current systems and technologies, and lack of advanced information system have paved the ground to ask for innovative research studies. To this end, information technology (IT) is becoming a major driver to overcome the supply chain limitations and deficiencies. The emergence of IT has provided an excellent opportunity for redefining the supply chain to be more effective and competitive. This paper has investigated the IT impact on two-digit industry codes in the International Standard Industrial Classification (ISIC) that are operating in four groups of the supply chains. Firstly, the primary fields of the supply chain were investigated, and then paired comparisons of different industry parts were accomplished. Using experts' ideas and Analytical Hierarchy Process (AHP), the status of industrial activities in Kurdistan Province in Iran was determined. The results revealed that manufacturing and inventory fields have been more important compared to other fields of the supply chain. In addition, IT has had greater impact on food and beverage industry, chemical industry, wood industry, wood products, and production of basic metals. The results indicated the need to IT awareness in supply chain management; in other words, IT applications needed to be developed for the identified industries.

Keywords: supply chain, information technology, analytical hierarchy process, two-digit codes, international standard industrial classification

Procedia PDF Downloads 270
10203 Fan-Subbing in East Asia: Audience Involvement in Transnational Media Flows

Authors: Jason D. Lin, Christine Sim

Abstract:

This paper examines the nature of transnational media flows in East Asia, specifically expounding on the popularity of Korean dramas in China and Taiwan. Situated in interdisciplinary academic work from cultural studies, media studies, and linguistics, this project locates the significance of certain genres and regions in determining why some are subject to flow while others remain within domestic borders. Moreover, transnational flows can take one of two routes –official translations and adaptations by media corporations and subtitles written by fans in online communities. The work of 'fan-subbing' has allowed for a more democratized showcase of what bilingual fans consume and are invested in sharing, rather than what major media companies deem relevant and monetizable. This reflects a culture of relatability driven by audiences rather than by corporate direction. Of course, a variety of technological, political, and economic factors play imperative roles in how both professional and fan-made subtitles flowed across borders and between nations. While fan-subbed media may be subject to criticism because of a lack of formal regulation, these limitations can, in some cases, be overcome by the agency afforded to audiences in the digital landscape. Finally, this paper offers a critical lens for deliberating the lasting impact of fan involvement on both professional practices and the flows of mainstream media throughout East Asia.

Keywords: audience studies, bilingual, cultural proximity, fan-subbing, online communities, subtitles

Procedia PDF Downloads 110
10202 A Hybrid Digital Watermarking Scheme

Authors: Nazish Saleem Abbas, Muhammad Haris Jamil, Hamid Sharif

Abstract:

Digital watermarking is a technique that allows an individual to add and hide secret information, copyright notice, or other verification message inside a digital audio, video, or image. Today, with the advancement of technology, modern healthcare systems manage patients’ diagnostic information in a digital way in many countries. When transmitted between hospitals through the internet, the medical data becomes vulnerable to attacks and requires security and confidentiality. Digital watermarking techniques are used in order to ensure the authenticity, security and management of medical images and related information. This paper proposes a watermarking technique that embeds a watermark in medical images imperceptibly and securely. In this work, digital watermarking on medical images is carried out using the Least Significant Bit (LSB) with the Discrete Cosine Transform (DCT). The proposed methods of embedding and extraction of a watermark in a watermarked image are performed in the frequency domain using LSB by XOR operation. The quality of the watermarked medical image is measured by the Peak signal-to-noise ratio (PSNR). It was observed that the watermarked medical image obtained performing XOR operation between DCT and LSB survived compression attack having a PSNR up to 38.98.

Keywords: watermarking, image processing, DCT, LSB, PSNR

Procedia PDF Downloads 28