Search results for: leadership communication
2441 A Secure Survey against Black Hole Attack in MANET
Authors: G. Usha, S. Kannimuthu, K. Mahalakshmi
Abstract:
Mobile Adhoc Network (MANET) is one of the most promising technologies that have applications ranging from various portable devices to military networks. MANET has no fixed infrastructure and the security of such network is a big concern. Therefore, in order to operate MANET’s securely, the misbehavior and intrusions should be detected before the attackers affect the network communication. In this article, we make a comprehensive survey against black hole attack that is a serious threat against MANET that exploits the routing behavior of the MANET. We have given broad survey solutions that detect black hole attacks in MANET. This is achieved by analyzing the techniques involved in detecting the attacks in each scheme. Furthermore, we examine about the challenges to the researchers for constructing an in-depth solution against black hole attack.Keywords: AODV, cross layer security, mobile Adhoc network (MANET), packet delivery ratio, single layer security
Procedia PDF Downloads 4062440 Autism Spectrum Disorder Interventions, Problems and Solutions
Authors: Ammara Jabeen
Abstract:
This survey report aims to find the interventions and their effectiveness that are being used globally as well as in Pakistan to treat autistic kids. ‘Autism spectrum disorder (ASD) is a state associated with brain development that shows ‘how a person perceives and socializes with others, causing problems in social interaction and communication’. Besides these problems, these children suffer from restricted and repetitive behaviors too. The term ‘Spectrum’ in Autism Spectrum Disorder refers to the wide range of symptoms and severity. The main cause of this Autism Spectrum Disorder is not known yet, but the research showed that genetics and environmental factors play important roles. In this survey report, after a literature review, some of the possible solutions are suggested based on the most common problems that these children are currently facing in their daily lives. Based on this report, we are able to overcome the lack of the resources (e.g. language, cost, training etc.) that mostly exist in Pakistani culture.Keywords: autism, interventions, spectrum, disorder
Procedia PDF Downloads 212439 Iraqi Media Entrepreneurs across Social Media: Factors and Challenges
Authors: Ahmed Omar Bali, Sherko Jabar, Hazhar Jalal, Mahdi Sofi-Karim
Abstract:
For a long while in Iraq, media organizations were owned by political parties, particularly the ruling parties, because media traditional organizations required big capital and human resources. This paper has examined the dynamics of Iraqi media market transformation with emphasizing on factors that help to merge media entrepreneurs and digital media firms which target audience on social media. A qualitative method was adopted in this study using open, in-depth interviews with 19 media entrepreneurs and three managers of media firms. The study revealed that relative freedom and advanced communication technologies have encouraged media entrepreneurs to drive the new media on producing short videos and broadcast them on social media which has become popular among media consumers.Keywords: media entrepreneur, Iraq, journalists, media technicians, digital media firms, media market
Procedia PDF Downloads 3012438 Campaigns of Youth Empowerment and Unemployment In Development Discourses: In the Case of Ethiopia
Abstract:
In today’s high decrement figure of the global economy, nations are facing many economic, social and political challenges; universally, there is high distress of food and other survival insecurity. Further, as a result of conflict, natural disasters, and leadership influences, youths are existentially less empowered and unemployed, especially in developing countries. With this situation to handle well challenges, it’s important to search, investigate and deliberate about youth, unemployment, empowerment and possible management fashions, as youths have the potential to carry and fight such battles. The method adopted is a qualitative analysis of secondary data sources in youth empowerment, unemployment and development as an inclusive framework. Youth unemployment is a major development headache for most African countries. In Ethiopia, following weak youth empowerment, youth unemployment has increased from time to time, and quality education and organization linkage matter as an important constraint. As a management challenge, although accessibility of quality education for Ethiopian youths is an important constraint, the country's youths are fortified deceptively and harassed in a vicious political challenge in their struggle to fetch social and economic changes in the country. Further, thousands of youths are inactivated, criminalized and lost their lives and this makes youths hopeless anger in their lives and pushes them further to be exposed for addictions, prostitution, violence, and illegitimate migrations. This youth challenge wasn’t only destined for African countries; rather, indeed, it was a global burden and headed as a global agenda. As a resolution, the construction of a healthy education system can create independent youths who acquire success and accelerate development. Developing countries should ensue development in the cultivation of empowerment tools through long and short-term education, implementing policy in action, diminishing wide-ranging gaps of (religion, ethnicity & region), and take high youth population as an opportunity and empower them. Further managing and empowering youths to be involved in decision-making, giving political weight and building a network of organizations to easily access job opportunities are important suggestions to save youths in work, for both increasing their income and the country's food security balance.Keywords: development, Ethiopia, management, unemployment, youth empowerment
Procedia PDF Downloads 572437 Racism In Indonesia: Case Study Racism Toward Papuan
Authors: Fikram Rettob
Abstract:
Racism is human rights violence that has been prohibited for long time ago. However, it is still happening in some part of the world, such as Indonesia. In this journal, the author is going to write about the racism toward Papuan which occurred in 2019 to 2021. The author found that the cause behind this human rights violence was the single assumption about race supremacy in Indonesia. Some people of Indonesia which are in Java that is near from central government believe that their race and the power are above other Indonesia’s race. In this research the author is using the concept of group or collectively oriented rights which explains that solidarity has rights to express their feeling, living in healthy environment, free to humanitarian assistance, communication and share in the common heritage of mankind. This research is applying qualitative methodology which based on secondary data that the author collected from news, journals, books, and articles, and then the author analyses and selects only the relevance one to put into the writing.Keywords: racism, Indonesia, Papuan, violence
Procedia PDF Downloads 192436 Good Environmental Governance Realization among the Three King Mongkut's Institutes of Technology in Bangkok, Thailand
Authors: Pastraporn Thipayasothorn, Vipawan Tadapratheep, Jintana Nokyoo
Abstract:
A physical realization of good environmental governance about an environmental principle, educational psychology and architecture in the three King Mongkut's Institutes of Technology, is generated for researching physical environmental factors which related to the good environmental governance, communication between the good environmental governance and a physical environmental, and a physical environmental design policy. Moreover, we collected data by a survey, observation and questionnaire that participants are students of the three King Mongkut's Institutes of Technology, and analyzed a relationship between a building utilization and the good environmental governance awareness. We found that, from the data analysis, a balance and creativity participation which played as the project users and communities of the good governance environmental promotion in the institutes helps the good governance and environmental development in the future.Keywords: built environment, good governance, environmental governance, physical environmental
Procedia PDF Downloads 4372435 Evaluation of Colour Perception in Different Correlated Colour Temperature of LED Lighting
Authors: Saadet Akbay, Ayşe Nihan Avcı
Abstract:
The perception of colour is a subjective experience which depends on age, gender, race, cultural and educational backgrounds, etc. of an individual. However, colour perception is also affected by the correlated colour temperature (CCT) of a light source which is considered as one of the most fundamental quantitative lighting characteristics. This study focuses on evaluating colour perception in different CCT of light emitting diodes (LED) lighting. The aim is to compare the inherent colours with the perceived colours under two CCT of ‘warm’ (2700K), and ‘cool’ (4000K) LED lights and to understand how different CTT affect the perception of a colour. Analysis and specifications of colour attributes are made with Natural Colour System (NCS) which is an international colour communication system. The outcome of the study reveals the possible tendencies for perceived colours under different illuminance levels of LED lighting.Keywords: colour perception, correlated colour temperature, inherent and perceived colour, LED lighting, natural colour system (NCS)
Procedia PDF Downloads 2652434 Impact of New Media Technologies to News, Social Interactions, and Traditional Media
Authors: Ademola Bamgbose
Abstract:
The new media revolution, which encompasses a wide variety of new media technologies like blogs, social networking, visual worlds, wikis, have had a great influence on communications, traditional media and across other disciplines. This paper gives a review of the impact of new media technologies on the news, social interactions and traditional media in developing and developed countries. The study points to the fact that there is a significant impact of new media technologies on the news, social interactions and the traditional media in developing and developed countries, albeit both positively and negatively. Social interactions have been significantly affected, as well as in news production and reporting. It is reiterated that despite the pervasiveness of new media technologies, it would not bring to a total decline of traditional media. This paper contributes to the theoretical framework on the new media and will help to assess the extent of the impact of the new media in different locations.Keywords: communication, media, news, new media technologies, social interactions, traditional media
Procedia PDF Downloads 2822433 Femtocell Stationed Flawless Handover in High Agility Trains
Authors: S. Dhivya, M. Abirami, M. Farjana Parveen, M. Keerthiga
Abstract:
The development of high-speed railway makes people’s lives more and more convenient; meanwhile, handover is the major problem on high-speed railway communication services. In order to overcome that drawback the architecture of Long-Term Evolution (LTE) femtocell networks is used to improve network performance, and the deployment of a femtocell is a key for bandwidth limitation and coverage issues in conventional mobile network system. To increase the handover performance this paper proposed a multiple input multiple output (MIMO) assisted handoff (MAHO) algorithm. It is a technique used in mobile telecom to transfer a mobile phone to a new radio channel with stronger signal strength and improved channel quality.Keywords: flawless handover, high-speed train, home evolved Node B, LTE, mobile femtocell, RSS
Procedia PDF Downloads 4732432 Experimental Networks Synchronization of Chua’s Circuit in Different Topologies
Authors: Manuel Meranza-Castillon, Rolando Diaz-Castillo, Adrian Arellano-Delgado, Cesar Cruz-Hernandez, Rosa Martha Lopez-Gutierrez
Abstract:
In this work, we deal with experimental network synchronization of chaotic nodes with different topologies. Our approach is based on complex system theory, and we use a master-slave configuration to couple the nodes in the networks. In particular, we design and implement electronically complex dynamical networks composed by nine coupled chaotic Chua’s circuits with topologies: in nearest-neighbor, small-world, open ring, star, and global. Also, network synchronization is evaluated according to a particular coupling strength for each topology. This study is important by the possible applications to private transmission of information in a chaotic communication network of multiple users.Keywords: complex networks, Chua's circuit, experimental synchronization, multiple users
Procedia PDF Downloads 3472431 Investigating the Status of Black Women in Brazil: Beyond Housekeepers and Samba Dancers
Authors: Sandra Maria Cerqueira Da Silva
Abstract:
The construction of the material world involves a series of social power relations. These relations, in a way, can dictate, shape, judge and drive the profiles of so-called ‘ideal’ individuals. Gender relations, as power relations, are defined based on hierarchies, obediences and inequalities, and male domination seems, with few exceptions, to be rooted in every society around the world. The profile of the Brazilian woman, beyond patriarchal and market determinations, is strongly subjected to media products. Women are, numerically, the majority in Brazilian society. The social indicators point to slight advances in terms of years of study and professional qualification, as well as access to the job market; yet, differences in opportunity and conditions — often explained though the ‘unquestionable’ cultural rancidness argument — still hinder women’s ability to reach and keep job positions. These unequalities are also visible in everyday interactions and in gender relations, and they become greater once race is added to the analysis. For a black woman, her racial origins may play a part in determining the construction of her gender roles. In these terms, there is need to investigate the racial character of the sexual differences within a larger social proccess of naturalization and justification of cultural hierarchies. Thus, the goal of this study is to identify and discuss the media-built image of black women in Brazil. Furthermore, it is necessary to seek views different than those of the ruling classes. The study uses a qualitative approach based on the feminist standpoint, which intends to hold women’s experiences as central. The body of the research — images taken from the Internet — was treated through critical content analysis. The results show that in Brazil the profile of black women, beyond the machist and sexist generalizations, objectifies them or sees them as servants, always at the disposal of non-blacks. It is necessary to overcome the history of this nation, always considering the contribution of these women to the growth and development of places and societies. This can be done through the acknowledgement and highlighting of the few black women who were able to overcome the many barriers in their path and reach leadership position in the country. There are still many important challenges in the way of finding affirmative policies and reaching a more equal society in terms of gender and race; a serious and firm political commitment seems sine qua non.Keywords: black woman, feminist standpoint, markings, objectification
Procedia PDF Downloads 2722430 Image Steganography Using Least Significant Bit Technique
Authors: Preeti Kumari, Ridhi Kapoor
Abstract:
In any communication, security is the most important issue in today’s world. In this paper, steganography is the process of hiding the important data into other data, such as text, audio, video, and image. The interest in this topic is to provide availability, confidentiality, integrity, and authenticity of data. The steganographic technique that embeds hides content with unremarkable cover media so as not to provoke eavesdropper’s suspicion or third party and hackers. In which many applications of compression, encryption, decryption, and embedding methods are used for digital image steganography. Due to compression, the nose produces in the image. To sustain noise in the image, the LSB insertion technique is used. The performance of the proposed embedding system with respect to providing security to secret message and robustness is discussed. We also demonstrate the maximum steganography capacity and visual distortion.Keywords: steganography, LSB, encoding, information hiding, color image
Procedia PDF Downloads 4722429 The Personal Characteristics of Nurse Managers and the Personal and Professional Factors That Affect Them
Authors: Handan Alan, Ulkü Baykal
Abstract:
Personal characteristics help people understand and recognize both themselves and other people. They are also known to have direct effects on managerial behaviors. Managers’ personalities indicate how they think, perceive reality and relate to others, and affect their decision-making and problem-solving methods. This descriptive study aims to determine the personal characteristics of nurse managers and the personal and professional factors that affect them since sufficient data does not exist on personal characteristics despite the focus on the leadership and managerial characteristics in nursing. The study population consisted of nurses working in administrative positions at hospitals affiliated with the public hospitals union, research and practice hospitals affiliated with universities and private hospitals in cities in the Marmara Region. The study sample consisted of nurse managers working in the hospitals that permitted conducting the study (excluding private branch hospitals). The data were collected after obtaining the approval of the Clinical Research Ethics Committee of Çanakkale Onsekiz Mart University (Approval date: 1.7.2015, Decision No: 2015-01) and written official permissions from the administrations of the hospitals included in the study. The data analysis was carried out using means and standard deviations (SD) as descriptive statistics, one-way analysis of variance for inter-group comparisons and the independent samples t-test for paired group comparisons. A significance threshold of p < 0.05 was used to evaluate the findings. The data were collected using the Five Factor Personality Inventory. The study included 900 nurse managers, who obtained the highest mean score on the conscientiousness dimension (X=4.22 ±0.35). This dimension was followed by their mean scores on the agreeableness (X=4.06±0.40), intelligence (X=4.05±0.37), extroversion (X=3.50±0.43), and emotional instability (X=2.07±0.53) dimensions. Statistically significant differences were found between the independent variables of age, gender, marital status, education level, work institution, professional experience, institutional experience, managerial experience, administrative position, work unit and managerial education when compared using the five factor personality inventory (p < 0.05). In conclusion, the nurse managers described themselves having high conscientiousness. Statistically significant differences were found between the five factor personality inventory mean scores and their personal and professional characteristics.Keywords: nurse manager, personality, personal characteristics, professional characteristics
Procedia PDF Downloads 2552428 Multiple Query Optimization in Wireless Sensor Networks Using Data Correlation
Authors: Elaheh Vaezpour
Abstract:
Data sensing in wireless sensor networks is done by query deceleration the network by the users. In many applications of the wireless sensor networks, many users send queries to the network simultaneously. If the queries are processed separately, the network’s energy consumption will increase significantly. Therefore, it is very important to aggregate the queries before sending them to the network. In this paper, we propose a multiple query optimization framework based on sensors physical and temporal correlation. In the proposed method, queries are merged and sent to network by considering correlation among the sensors in order to reduce the communication cost between the sensors and the base station.Keywords: wireless sensor networks, multiple query optimization, data correlation, reducing energy consumption
Procedia PDF Downloads 3342427 The Role of the Constructivist Learning Theory and Collaborative Learning Environment on Wiki Classroom and the Relationship between Them
Authors: Ibraheem Alzahrani
Abstract:
This paper seeks to discover the relationship between both the social constructivist learning theory and the collaborative learning environment. This relationship can be identified through given an example of the learning environment. Due to wiki characteristics, wiki can be used to understand the relationship between constructivist learning theory and collaborative learning environment. However, several evidences will come in this paper to support the idea of why wiki is the suitable method to explore the relationship between social constructivist theory and the collaborative learning and their role in learning. Moreover, learning activities in wiki classroom will be discussed in this paper to find out the result of the learners' interaction in the classroom groups, which will be through two types of communication; synchronous and asynchronous.Keywords: social constructivist, collaborative, environment, wiki, activities
Procedia PDF Downloads 5022426 Evidence-Based Approaches and Effective Practices for Preventing Bullying
Authors: Nato Asatiani
Abstract:
The research underscores the critical role of a positive school climate in combating bullying. The results can be generalized and assumed that bullying behavior occurs when there is a victim, and the environment allows the realization of aggression; school culture is a strong predictor of bullying behavior; the probability of becoming a victim (victimhood) is high among those teenagers who experience high levels of stress in the environment; when a teenager experiences a sense of threat, such physical, psychological, or social symptoms are developed that makes teenagers vulnerable to bullying; the school culture that is oriented to adherence to the rules of communication and mutual respect in the group reduces the likelihood of a teenager to become a victim; consequently, when a teenager has a sense of wellness even in combination with aggression, this sense reduces the likelihood of a teenager to become a victim.Keywords: bullying, adolescence, aggression, school climate
Procedia PDF Downloads 292425 The Spatial Circuit of the Audiovisual Industry in Argentina: From Monopoly and Geographic Concentration to New Regionalization and Democratization Policies
Authors: André Pasti
Abstract:
Historically, the communication sector in Argentina is characterized by intense monopolization and geographical concentration in the city of Buenos Aires. In 2000, the four major media conglomerates in operation – Clarín, Telefónica, America and Hadad – controlled 84% of the national media market. By 2009, new policies were implemented as a result of civil society organizations demands. Legally, a new regulatory framework was approved: the law 26,522 of Audiovisual Communications Services. Supposedly, these policies intend to create new conditions for the development of the audiovisual economy in the territory of Argentina. The regionalization of audiovisual production and the democratization of channels and access to media were among the priorities. This paper analyses the main changes and continuities in the organization of the spatial circuit of the audiovisual industry in Argentina provoked by these new policies. These new policies aim at increasing the diversity of audiovisual producers and promoting regional audiovisual industries. For this purpose, a national program for the development of audiovisual centers within the country was created. This program fostered a federalized production network, based on nine audiovisual regions and 40 nodes. Each node has created technical, financial and organizational conditions to gather different actors in audiovisual production – such as SMEs, social movements and local associations. The expansion of access to technical networks was also a concern of other policies, such as ‘Argentina connected’, whose objective was to expand access to broadband Internet. The Open Digital Television network also received considerable investments. Furthermore, measures have been carried out in order to impose limits on the concentration of ownership as well as to eliminate the oligopolies and to ensure more competition in the sector. These actions intended to force a divide of the media conglomerates into smaller groups. Nevertheless, the corporations that compose these conglomerates resist strongly, making full use of their economic and judiciary power. Indeed, the absence of effective impact of such measures can be testified by the fact that the audiovisual industry remains strongly concentrated in Argentina. Overall, these new policies were designed properly to decentralize audiovisual production and expand the regional diversity of the audiovisual industry. However, the effective transformation of the organization of the audiovisual circuit in the territory faced several resistances. This can be explained firstly and foremost by the ideological and economic power of the media conglomerates. In the second place, there is an inherited inertia from the unequal distribution of the objects needed for the audiovisual production and consumption. Lastly, the resistance also relies on financial needs and in the excessive dependence of the state for the promotion of regional audiovisual production.Keywords: Argentina, audiovisual industry, communication policies, geographic concentration, regionalization, spatial circuit
Procedia PDF Downloads 2142424 The Thoughts and Feelings Associated with Goal Achievement
Authors: Lindsay Foreman
Abstract:
Introduction: Goals have become synonymous with the quest for the good life and the pursuit of happiness, with coaching and positive psychology gaining popularity as an approach in recent decades. And yet mental health is on the rise and the leading cause of disability, wellbeing is on the decline, stress is leading to 50-60% of workday absences and the need for action is indisputable and urgent. Purpose: The purpose of this study is to better understand two things we cannot see, but that play the most significant role in these outcomes - what we think and how we feel. With many working on the assumption that positive thinking and an optimistic outlook are necessary or valuable components of goal pursuit, this study uncovers the reality of the ‘inner-game’ from the coachee's perspective. Method: With a mixed methods design using a Q Method study of subjectivity to ‘make the unseen seen’. First, a wide-ranging universe of subjective thoughts and feelings experienced during goal pursuit are explored. These are generated from literature and a Qualtrics survey to create a Q-Set of 40 statements. Then 19 participants in professional and organisational settings offer their perspectives on these 40 Q-Set statements. Each rank them in a semi-forced distribution from ‘most like me’ to ‘least like me’ using Q-Sort software. From these individual perspectives, clusters of perspectives are identified using factor analysis and four distinct viewpoints have emerged. Findings: These Goal Pursuit Viewpoints offer insight into the states and self-talk experienced by coachees and may not reflect the assumption of positive thinking associated with achieving goals. The four Viewpoints are 1) the Optimistic View, 2) the Realistic View 3) The Dreamer View and 4) The Conflicted View. With only a quarter of the Dreamer View, and a third of the Optimistic view going on to achieve their goals, these assumptions need review. And with all the Realistic Views going on to achieve their goals, the role of self-doubt, overwhelm and anxiousness in goal achievement cannot be overlooked. Contribution: This study offers greater insight and understanding of people's inner experiences as they pursue goals and highlights the necessary and normal negative states associated with goal achievement. It also offers a practical tool of the Q-set statements to help coaches and coachees explore the current state and help navigate the journey towards goal achievement. It calls into question whether goals should always be part of coaching and if values, identity, and purpose may play a greater role than goals.Keywords: coaching, goals, positive psychology, mindset, leadership, mental health, beliefs, cognition, emotional intelligence
Procedia PDF Downloads 1132423 Developed Text-Independent Speaker Verification System
Authors: Mohammed Arif, Abdessalam Kifouche
Abstract:
Speech is a very convenient way of communication between people and machines. It conveys information about the identity of the talker. Since speaker recognition technology is increasingly securing our everyday lives, the objective of this paper is to develop two automatic text-independent speaker verification systems (TI SV) using low-level spectral features and machine learning methods. (i) The first system is based on a support vector machine (SVM), which was widely used in voice signal processing with the aim of speaker recognition involving verifying the identity of the speaker based on its voice characteristics, and (ii) the second is based on Gaussian Mixture Model (GMM) and Universal Background Model (UBM) to combine different functions from different resources to implement the SVM based.Keywords: speaker verification, text-independent, support vector machine, Gaussian mixture model, cepstral analysis
Procedia PDF Downloads 552422 Reduction of Impulsive Noise in OFDM System using Adaptive Algorithm
Authors: Alina Mirza, Sumrin M. Kabir, Shahzad A. Sheikh
Abstract:
The Orthogonal Frequency Division Multiplexing (OFDM) with high data rate, high spectral efficiency and its ability to mitigate the effects of multipath makes them most suitable in wireless application. Impulsive noise distorts the OFDM transmission and therefore methods must be investigated to suppress this noise. In this paper, a State Space Recursive Least Square (SSRLS) algorithm based adaptive impulsive noise suppressor for OFDM communication system is proposed. And a comparison with another adaptive algorithm is conducted. The state space model-dependent recursive parameters of proposed scheme enables to achieve steady state mean squared error (MSE), low bit error rate (BER), and faster convergence than that of some of existing algorithm.Keywords: OFDM, impulsive noise, SSRLS, BER
Procedia PDF Downloads 4552421 Uplink Throughput Prediction in Cellular Mobile Networks
Authors: Engin Eyceyurt, Josko Zec
Abstract:
The current and future cellular mobile communication networks generate enormous amounts of data. Networks have become extremely complex with extensive space of parameters, features and counters. These networks are unmanageable with legacy methods and an enhanced design and optimization approach is necessary that is increasingly reliant on machine learning. This paper proposes that machine learning as a viable approach for uplink throughput prediction. LTE radio metric, such as Reference Signal Received Power (RSRP), Reference Signal Received Quality (RSRQ), and Signal to Noise Ratio (SNR) are used to train models to estimate expected uplink throughput. The prediction accuracy with high determination coefficient of 91.2% is obtained from measurements collected with a simple smartphone application.Keywords: drive test, LTE, machine learning, uplink throughput prediction
Procedia PDF Downloads 1552420 Red Green Blue Image Encryption Based on Paillier Cryptographic System
Authors: Mamadou I. Wade, Henry C. Ogworonjo, Madiha Gul, Mandoye Ndoye, Mohamed Chouikha, Wayne Patterson
Abstract:
In this paper, we present a novel application of the Paillier cryptographic system to the encryption of RGB (Red Green Blue) images. In this method, an RGB image is first separated into its constituent channel images, and the Paillier encryption function is applied to each of the channels pixel intensity values. Next, the encrypted image is combined and compressed if necessary before being transmitted through an unsecured communication channel. The transmitted image is subsequently recovered by a decryption process. We performed a series of security and performance analyses to the recovered images in order to verify their robustness to security attack. The results show that the proposed image encryption scheme produces highly secured encrypted images.Keywords: image encryption, Paillier cryptographic system, RBG image encryption, Paillier
Procedia PDF Downloads 2362419 Implementation of a Web-Based Wireless ECG Measuring and Recording System
Authors: Onder Yakut, Serdar Solak, Emine Dogru Bolat
Abstract:
Measuring the Electrocardiogram (ECG) signal is an essential process for the diagnosis of the heart diseases. The ECG signal has the information of the degree of how much the heart performs its functions. In medical diagnosis and treatment systems, Decision Support Systems processing the ECG signal are being developed for the use of clinicians while medical examination. In this study, a modular wireless ECG (WECG) measuring and recording system using a single board computer and e-Health sensor platform is developed. In this designed modular system, after the ECG signal is taken from the body surface by the electrodes first, it is filtered and converted to digital form. Then, it is recorded to the health database using Wi-Fi communication technology. The real time access of the ECG data is provided through the internet utilizing the developed web interface.Keywords: ECG, e-health sensor shield, Raspberry Pi, wiFi technology
Procedia PDF Downloads 3982418 The Use of Emoticons in Polite Phrases of Greeting and Thanks
Authors: Zuzana Komrsková
Abstract:
This paper shows the connection between emoticons and politeness in written computer-mediated communication. It studies if there are some differences in the use of emoticon between Czech and English written tweets. My assumptions about the use of emoticons were based on the use of greetings and thanks in real, face to face situations. The first assumption, that welcome greeting phrase would be accompanied by positive emoticon was correct. But for the farewell greeting both positive and negative emoticons are possible. My results show lower frequency of negative emoticons in this context. I also found quite often both positive and negative emoticon in the same tweet. The expression of gratitude is associated with positive emotions. The results show that emoticons accompany polite phrases of greeting and thanks very often both in Czech and English. The use of emoticons with studied polite phrases shows that emoticons have become an integral part of these phrases.Keywords: Czech, emoticon, english, politeness, twitter
Procedia PDF Downloads 4032417 Symmetric Arabic Language Encryption Technique Based on Modified Playfair Algorithm
Authors: Fairouz Beggas
Abstract:
Due to the large number of exchanges in the networks, the security of communications is essential. Most ways of keeping communication secure rely on encryption. In this work, a symmetric encryption technique is offered to encrypt and decrypt simple Arabic scripts based on a multi-level security. A proposed technique uses an idea of Playfair encryption with a larger table size and an additional layer of encryption to ensure more security. The idea of the proposed algorithm aims to generate a dynamic table that depends on a secret key. The same secret key is also used to create other secret keys to over-encrypt the plaintext in three steps. The obtained results show that the proposed algorithm is faster in terms of encryption/decryption speed and can resist to many types of attacks.Keywords: arabic data, encryption, playfair, symmetric algorithm
Procedia PDF Downloads 862416 The Batteryless Wi-Fi Backscatter System and Method for Improving the Transmission Range
Authors: Young-Min Ko, Seung-Jun Yu, Seongjoo Lee, Hyoung-Kyu Song
Abstract:
The Internet of things (IoT) system has attracted attention. IoT is a technology to connect all the objects to the internet as well as computer. IoT makes it possible for providing more data interoperability methods for an application purpose. Among the IoT technology, the research of devices so that they can communicate without power supply has been actively conducted. Batteryless system permits us to communicate without power supply devices. In this paper, batteryless backscatter system is used as a tag. And mobile devices which are embedded wireless fidelity (Wi-Fi) chipset are used as a reader. The backscatter tag can be obtained Internet connectivity from the reader. Conventional Wi-Fi backscatter system has limitation in the transmission range. In this paper, the proposed algorithm can be obtained improved reliability as well as overcoming the limitation about transmission range.Keywords: Ambient RF, Backscatter, Batteryless communication, Energy-harvesting, IoT, RFID, Tag, Wi-Fi
Procedia PDF Downloads 3872415 Campaigns of Youth Empowerment and Unemployment in Development Discourses: Case of Ethiopia
Authors: Belay Mulat Fentie
Abstract:
In today’s high decrement figure of the global economy, nations are facing many economic, social, and political challenges; universally, there is high distress of food and other survival insecurity. Further, as a result of conflict, natural disaster, and leadership influences, youths are existentially less empowered and unemployed, especially in developing countries. With this situation to handle well challenges, it’s important to search, investigate and deliberate about youth, unemployment, empowerment, and possible management fashions, as youths has a potential to carry and fight such battles. The method adopted is qualitative analysis of secondary data sources in youth empowerment, unemployment, and development as inclusive framework. Youth unemployment is a major development headache for most African countries. In Ethiopia, following weak youth empowerment, youth unemployment has been increased time to time; and quality education and organizations linkage matters as an important constraint. As a management challenge, although accessibility of quality education for Ethiopian youths is an important constraint; the country youths fortified deceptively and harassed in a vicious political challenge in their struggle to fetch social and economic changes in the country. Further, thousands of youths inactivated, criminalized, and lost their lives, and this makes youths to be hopeless, anger in their lives and pushes further to expose for addictions, prostitution, violence, and illegitimate migrations. This youth challenge didn’t only destinate in African countries, rather, indeed, the global burden and headed as a global agenda. As a resolution, the construction of a healthy education system can create independent youths that acquire success and accelerate development. Developing countries should ensue development in cultivation of empowerment tool through long and short-term education, implementing policy in action, diminishing wide ranged gaps of (religion, ethnicity & region), and take the high youth population as an opportunity and empower them. And further manage and empower youths to involve in decision making, in giving political weight and build a network on organizations to easily access jobs opportunities are important suggestion to alive youths in work, for both increasing their income and country food security balance.Keywords: development, Ethiopia, management, unemployment, youth empowerment
Procedia PDF Downloads 1362414 Level up Entrepreneurial Behaviors: A Case Study on the Use of Gamification to Encourage Entrepreneurial Acting and Thinking
Authors: Lena Murawski
Abstract:
Currently, researchers and experts from the business world recognize entrepreneurial behaviors as a decisive factor for economic success, allowing firms to adapt to changing internal and external needs. The purpose of this study is to explore how gamification can enhance entrepreneurial behaviors, reporting on a gamification project in a new venture operating in the IT sector in Germany. This article is based on data gathered from observations of pre‐ and post‐implementation in the case company. Results have indicated that the use of gamification encourages entrepreneurial behaviors, especially relating to seeking ways on how to integrate new employees, improve teamwork and communication, and to adapt existing processes to increase productivity. The interdisciplinary dialogue furthers our understanding of factors that foster entrepreneurial behaviors. The matter is of practical relevance, guiding practitioners on how to exploit the potentials of gamification to exhibit an entrepreneurial orientation in organizations.Keywords: case study, entrepreneurial behaviors, gamification, new venture
Procedia PDF Downloads 1582413 A Framework for Organizational Architecture of Electronic City and Electronic Municipality
Authors: Ali Zeynali Azim, Mostfa Basiry, Samira Kafshi, Elnaz Behnoud
Abstract:
This study provides a framework for enterprise architecture in electronic city is electronic municipality. Nowadays, information technology as an emerging phenomenon has a special place in the world. Development of information and communication technology causes many changes in various fields, including emerging e-cities, municipalities and citizens. However, e-city and e-municipality need essential enterprise architecture. In order to develop enterprise architecture of e-city and e-municipality, enterprise architecture maturity method should be applied. Therefore, one of the most important needs of organizations is to choose important activities according to limitations. The studies show that there is a close relationship between IT, enterprise architecture, e-city and e-municipality. This study aimed to clarify the concept of IT, enterprise architecture, electronic city and e-municipality and how they are related to each other. Is the existence of each of IT, enterprise architecture, electronic and electronic municipal requires each other?Keywords: enterprise architecture, e-city, e-municipality, e-government, e-citizen, service-oriented architecture
Procedia PDF Downloads 5322412 Organized Crime-A Social Challenge for Kosovo towards European Union Integration
Authors: Samedin Mehmeti
Abstract:
Very tens political and economic situation, in particular armed conflicts that followed at the time of the destruction of the former Yugoslavia, influenced migrations and displacement of population. Especially setting international sanctions and embargo influenced the creation of organized criminal groups. A lot of members of the former Yugoslav security apparatus in collaboration with ordinary criminal groups engaged in: smuggling of goods, petroleum and arms, sale and transport of drugs, payable murder, damage to public property, kidnappings, extortion, racketeering, etc. This tradition of criminality, of course in other forms and with other methods, has continued after conflicts and continues with a high intensity even in nowadays. One of the most delicate problems of organized crime activity is the impact on the economic sphere, where organized crime opposes and severely damages national security and economy to criminalize it in certain sectors and directions. Organized crime groups including who find Kosovo as a place to develop their criminal activities are characterized by: loyalty of many people especially through family connections and kinship in carrying out criminal activities and the existence of powerful hierarchy of leadership which in many cases include the corrupt officials of state apparatus. Groups have clear hierarchy and flexible structure of command, each member within the criminal group knows his duties concrete. According to statistics presented in police reports its notable that Kosovo has a large number of cases of organized crime, cultivation, trafficking and possession of narcotics. As already is very well known that one of the primary conditions that must be fulfilled on track toward integration in the European Union is precisely to prevent and combat organized crime. Kosovo has serious problems with prosecutorial and judicial system. But the misuse of public funds, even those coming directly from EU budget or the budget of the European Union member states, have a negative impact on this process. The economic crisis that has gripped some of the EU countries has led to the creation of an environment in which there are far fewer resources and opportunities to invest in preventing and combating organized crime within member states. This automatically reduces the level of financial support for other countries in the fight against organized crime. Kosovo as a poor country, now has less likely benefiting from the support tools that will be eventually offered by Europe set of in this area.Keywords: police, european integration, organized crime, narcotics
Procedia PDF Downloads 438