Search results for: computing and culture
4363 Performance Analysis of Elliptic Curve Cryptography Using Onion Routing to Enhance the Privacy and Anonymity in Grid Computing
Authors: H. Parveen Begam, M. A. Maluk Mohamed
Abstract:
Grid computing is an environment that allows sharing and coordinated use of diverse resources in dynamic, heterogeneous and distributed environment using Virtual Organization (VO). Security is a critical issue due to the open nature of the wireless channels in the grid computing which requires three fundamental services: authentication, authorization, and encryption. The privacy and anonymity are considered as an important factor while communicating over publicly spanned network like web. To ensure a high level of security we explored an extension of onion routing, which has been used with dynamic token exchange along with protection of privacy and anonymity of individual identity. To improve the performance of encrypting the layers, the elliptic curve cryptography is used. Compared to traditional cryptosystems like RSA (Rivest-Shamir-Adelman), ECC (Elliptic Curve Cryptosystem) offers equivalent security with smaller key sizes which result in faster computations, lower power consumption, as well as memory and bandwidth savings. This paper presents the estimation of the performance improvements of onion routing using ECC as well as the comparison graph between performance level of RSA and ECC.Keywords: grid computing, privacy, anonymity, onion routing, ECC, RSA
Procedia PDF Downloads 4014362 Culture and Internationalization: A Study About Brazilian Companies in Bolivia
Authors: Renato Dias Baptista
Abstract:
The purpose of this paper is to analyze the elements of the cultural dimension in the internationalization process of Brazilian companies in Bolivia. This paper is based on research on two major Brazilian transnational companies which have plants in Bolivia. To achieve the objectives, the interconnective characteristics of culture in the process of productive internationalization were analyzed aiming to highlight it as a guiding element opposite the premises of the Brazilian leadership in the integration and development of the continent. The analysis aims to give relevance to the culture of a country and its relations with internationalization.Keywords: interculturalism, transnational, internationalization, organizational development
Procedia PDF Downloads 3034361 A Two Level Load Balancing Approach for Cloud Environment
Authors: Anurag Jain, Rajneesh Kumar
Abstract:
Cloud computing is the outcome of rapid growth of internet. Due to elastic nature of cloud computing and unpredictable behavior of user, load balancing is the major issue in cloud computing paradigm. An efficient load balancing technique can improve the performance in terms of efficient resource utilization and higher customer satisfaction. Load balancing can be implemented through task scheduling, resource allocation and task migration. Various parameters to analyze the performance of load balancing approach are response time, cost, data processing time and throughput. This paper demonstrates a two level load balancer approach by combining join idle queue and join shortest queue approach. Authors have used cloud analyst simulator to test proposed two level load balancer approach. The results are analyzed and compared with the existing algorithms and as observed, proposed work is one step ahead of existing techniques.Keywords: cloud analyst, cloud computing, join idle queue, join shortest queue, load balancing, task scheduling
Procedia PDF Downloads 4364360 Fashion Appropriation: A Study in Awareness of Crossing Cultural Boundaries in Design
Authors: Anahita Suri
Abstract:
Myriad cultures form the warp and weft of the fabric of this world. The last century saw mass migration of people across geographical boundaries, owing to industrialization and globalization. These people took with them their cultures, costumes, traditions, and folklore, which mingled with the local cultures to create something new and place it in a different context to make it contemporary. With the surge in population and growth of the fashion industry, there has been an increasing demand for innovative and individual fashion, from street markets to luxury brands. Exhausted by local influences, designers take inspiration from the so called ‘low’ culture and create artistic products, place it in a different context, and the end-product is categorized as ‘high’ culture. It is challenging as to why a design/culture is ‘high’ or ‘low’. Who decides which works, practices, activities, etc., are ‘high’ and which are ‘low’? The justification for this distinction is often found not in the design itself but the context attached to it. Also, the concept of high/ low is relative to time- what is ‘high’ today can be ‘low’ tomorrow and ‘high’ again the day after. This raises certain concerns. Firstly, it is sad that a culture which offers inspiration is looked down upon as ‘low’ culture. Secondly, it is ironic because the so designated ‘high’ culture is a manipulation of the truth from the authentic ‘low’ culture, which is capable of true expression. When you borrow from a different culture, you pretend to be authentic because you actually are not. Finally, it is important to be aware of crossing cultural boundaries and the context attached to a design/product so as to use it a responsible way that communicates the design without offending anyone. Is it ok for a person’s cultural identity to become another person’s fashion accessory? This essay explores the complex, multi-layered subject of fashion appropriation and aims to provoke debate over cultural ‘borrowing’ and create awareness that commodification of cultural symbols and iconography in fashion is inappropriate and offensive and not the same as ‘celebrating cultural differences’.Keywords: context, culture, fashion appropriation, inoffensive, responsible
Procedia PDF Downloads 1284359 Secure Hashing Algorithm and Advance Encryption Algorithm in Cloud Computing
Authors: Jaimin Patel
Abstract:
Cloud computing is one of the most sharp and important movement in various computing technologies. It provides flexibility to users, cost effectiveness, location independence, easy maintenance, enables multitenancy, drastic performance improvements, and increased productivity. On the other hand, there are also major issues like security. Being a common server, security for a cloud is a major issue; it is important to provide security to protect user’s private data, and it is especially important in e-commerce and social networks. In this paper, encryption algorithms such as Advanced Encryption Standard algorithms, their vulnerabilities, risk of attacks, optimal time and complexity management and comparison with other algorithms based on software implementation is proposed. Encryption techniques to improve the performance of AES algorithms and to reduce risk management are given. Secure Hash Algorithms, their vulnerabilities, software implementations, risk of attacks and comparison with other hashing algorithms as well as the advantages and disadvantages between hashing techniques and encryption are given.Keywords: Cloud computing, encryption algorithm, secure hashing algorithm, brute force attack, birthday attack, plaintext attack, man in middle attack
Procedia PDF Downloads 2834358 The Relationship between Conceptual Organizational Culture and the Level of Tolerance in Employees
Authors: M. Sadoughi, R. Ehsani
Abstract:
The aim of the present study is examining the relationship between conceptual organizational culture and the level of tolerance in employees of Islamic Azad University of Shahre Ghods. This research is a correlational and analytic-descriptive one. The samples included 144 individuals. A 24-item standard questionnaire of organizational culture by Cameron and Queen was used in this study. This questionnaire has six criteria and each criterion includes four items that each item indicates one cultural dimension. Reliability coefficient of this questionnaire was normed using Cronbach's alpha of 0.91. Also, the 25-item questionnaire of tolerance by Conor and Davidson was used. This questionnaire is in a five-degree Likert scale form. It has seven criteria and is designed to measure the power of coping with pressure and threat. It has the needed content reliability and its reliability coefficient is normed using Cronbach's alpha of 0.87. Data were analyzed using Pearson correlation coefficient and multivariable regression. The results showed among various dimensions of organizational culture, there is a positive significant relationship between three dimensions (family, adhocracy, bureaucracy) and tolerance, there is a negative significant relationship between dimension of market and tolerance and components of organizational culture have the power of prediction and explaining the tolerance. In this explanation, the component of family is the most effective and the best predictor of tolerance.Keywords: adhocracy, bureaucracy, organizational culture, tolerance
Procedia PDF Downloads 4544357 MLProxy: SLA-Aware Reverse Proxy for Machine Learning Inference Serving on Serverless Computing Platforms
Authors: Nima Mahmoudi, Hamzeh Khazaei
Abstract:
Serving machine learning inference workloads on the cloud is still a challenging task at the production level. The optimal configuration of the inference workload to meet SLA requirements while optimizing the infrastructure costs is highly complicated due to the complex interaction between batch configuration, resource configurations, and variable arrival process. Serverless computing has emerged in recent years to automate most infrastructure management tasks. Workload batching has revealed the potential to improve the response time and cost-effectiveness of machine learning serving workloads. However, it has not yet been supported out of the box by serverless computing platforms. Our experiments have shown that for various machine learning workloads, batching can hugely improve the system’s efficiency by reducing the processing overhead per request. In this work, we present MLProxy, an adaptive reverse proxy to support efficient machine learning serving workloads on serverless computing systems. MLProxy supports adaptive batching to ensure SLA compliance while optimizing serverless costs. We performed rigorous experiments on Knative to demonstrate the effectiveness of MLProxy. We showed that MLProxy could reduce the cost of serverless deployment by up to 92% while reducing SLA violations by up to 99% that can be generalized across state-of-the-art model serving frameworks.Keywords: serverless computing, machine learning, inference serving, Knative, google cloud run, optimization
Procedia PDF Downloads 1824356 Ethical Leadership: A Theological and Ethical Alternative to the Culture of Greed in South African Government
Authors: Mookgo Solomon Kgatle
Abstract:
Introductory Statement: The effect of corruption in South Africa has seriously constrained development of the national economy and has significantly inhibited good governance in the country. The significance of this paper is a demonstration that Corruption in a South African government is greatly influenced by the culture of greed by leaders in government. Many leaders in government are not satisfied with what they receive on monthly basis in the form of salaries and allowances. Thus, the quest to accumulate, as many material possessions by cabinet ministers and public servants is what is crippling the annual budget and disadvantaging the poor masses of our people including women, children and the elderly. Basic Methodology: In order to deal with this dilemma, this paper proposes ethical leadership as a theological and ethical alternative and antidote to the culture of greed in government. Research Findings: Ethical leadership is proposed because unlike the culture of greed, it is a leadership that is based on respect for ethical principles and standards and for the dignity and privileges of others. Ethical leadership is synonymous with principles like trust, morality, consideration, equality, and justice. Conclusion: The conclusion is that ethical leadership is one of the solutions that can assist the South African government to deal with the root causes of corruption, that is, the culture of greed.Keywords: ethical leadership, theological ethics, culture of greed, corruption, governance
Procedia PDF Downloads 1914355 Organization Culture: Mediator of Information Technology Competence and IT Governance Effectiveness
Authors: Sonny Nyeko, Moses Niwe
Abstract:
Purpose: This research paper examined the mediation effect of organization culture in the relationship between information technology (IT) competence and IT governance effectiveness in Ugandan public universities. The purpose of the research paper is to examine the role of organizational culture in the relationship between IT competence and IT governance effectiveness. Design/methodology/approach: The paper adopted the MedGraph program, Sobel tests and Kenny and Baron Approach for testing the mediation effects. Findings: It is impeccable that IT competence and organization culture are true drivers of IT governance effectiveness in Ugandan public universities. However, organizational culture reveals partial mediation in the IT competence and IT governance effectiveness relationship. Research limitations/implications: The empirical investigation in this research depends profoundly on public universities. Future research in Ugandan private universities could be undertaken to compare results. Practical implications: To effectively achieve IT governance effectiveness, it means senior management requires IT knowledge which is a vital ingredient of IT competence. Moreover, organizations today ought to adopt cultures that are intended to have them competitive in their businesses, with IT operations not in isolation. Originality/value: Spending thousands of dollars on IT resources in advanced institutes of learning necessitates IT control. Preliminary studies in Ugandan public universities have revealed the ineffective utilization of IT resources. Besides, IT governance issues with IT competence and organization culture remain outstanding. Thus, it’s a new study testing the mediating outcome of organization culture in the association between IT competence and IT governance effectiveness in the Ugandan universities.Keywords: organization culture, IT competence, IT governance, effectiveness, mediating effect, universities, Uganda
Procedia PDF Downloads 1444354 Portrayal of Foreign Culture in Pakistani Newspapers
Authors: Ghulam Shabir, Masood Nadeem
Abstract:
The research work has been done on the Portrayal of Foreign Culture including Film, Art, and Drama in Pakistani English newspapers (Dawn and The News). For this purpose the weekly newspapers of three months (January to March) of the years 1990, 1995, 2000, 2005, and 2010 were analyzed. Content Analysis was employed for data interpretation and to draw the inferences. It was explored that to what extent the Foreign Culture has been depicted in our print media in the form of Film, Art, and Drama in comparison to Pakistani cultural context. The qualitative analysis revealed that Pakistani English newspapers gave more coverage to Foreign Culture. Pakistani film, art, and drama related issues have been less portrayed in the form of stories, columns, pictures, and news about music, fashion, ceremonies, programs, and shows. However, most of the space has been occupied by Western and Indian pictures, and news about music, fashion, ceremonies, programs and shows on the Cultural Page of these English newspapers.Keywords: newspapers, portrayal of foreign culture, qualitative analysis, Pakistani English newspapers
Procedia PDF Downloads 5194353 Kurma (Kerma Culture) at Nubia: Migration to Dholavira (Indus Valley Civilization)
Authors: Dhanpat Singh Dhania
Abstract:
Kurma-avatara and the Kachchhapraj is the name of the same person. Tortoise is called Kurma in Kerma valley (Nubia) and also called Kachchhap in India. Wherever a culture migrates, its faiths and beliefs remain intact. The tortoise culture of Kurma valley migrated to Dholavira, and its cultural symbolism remained the same as Kurma, the tortoise. Culture is known by burial traditions, pottery formations, language use, faiths, and beliefs. Following the cultural identification methodology, the Kurma culture buried their dead in circular burials found during excavation at Toshka, Nubia, and built their houses the type of tortoise shell. The Nubian tortoise of a specific species had a triangular on the shell found to be extinct was the cultural symbolism of the culture found on the excavated pottery. Kurma cultural head known as the Seth was known as Kurma-avatara. The Seth of Egypt came to know when the combined efforts of the Seth and the Osiris defeated the Egyptian 1st dynastic rule in about 2775 BCE. Osiris became the king of the 2nd dynastic Egypt. It annoyed Seth. He killed the Osiris and went to Rann of Kachchh and declared him as the Chachchhapraj, the king of Kachchh (now Gujarat, India). The Kurma (Kachchhap) culture migration at Dholavira (Gujarat) attested by the Dholavira signboard found during excavation and deciphered as the ‘Chakradhar’, the eighth incarnation of Kurma-avatara.Keywords: Kurma, Egyptian, Kachchhap, Dholavira, Harappan
Procedia PDF Downloads 814352 Dominican Representation in Introductory Level Spanish Textbooks in the United States
Authors: Sheridan Wigginton
Abstract:
This research project investigates the representation of Dominicans and Dominican culture in nine widely-used Spanish textbooks in universities and colleges in the United States. The project uses the “culture” standard established by the American Council on the Teaching of Foreign Languages to examine the texts. The organization, commonly referred to by its acronym ACTFL, describes products as books, tools, foods, laws, music, and games; practices as patterns of social interactions; and perspectives as meanings, attitudes, values, and ideas. The content analysis of the texts will also specifically include visual analysis of the physical representation of the people depicted in Dominican-themed culture activities to more clearly integrate issues of color and national identity into the discussion.Keywords: blackness, culture, Dominican republic, foreign language education, national identity, Spanish, textbooks
Procedia PDF Downloads 934351 Decoding Digital Culture: A Semiotic Analysis of Social Media Representation in ‘The Social Network'
Authors: Nathan Junell S. Arjona, Al-Noor O. Guinal, Marc Leugin V. Logronio, Jean Clark L. Naga
Abstract:
This study looks at how digital culture is shown in David Fincher's movie "The Social Network." It uses a mix of methods from different theories, including Saussurean semiotics, Castells' Network Society theory, and Jenkins' ideas on digital culture. The research focuses on three important scenes from the film, analyzing them in a clear three-step process. This reveals how movies tell stories about the rise of technology. By using a detailed approach, the study shows that digital platforms connect people but can also create gaps in their experiences. The main findings highlight how the film portrays social networks as important cultural systems. It uncovers the power struggles and identities shaped by technology. The research explains how movies help us understand changes in digital culture, challenging old ways of thinking about technology. This analysis connects film studies, digital sociology, and cultural theory, providing a solid way to understand how technology is represented in modern media. By exploring how technology is turned into cultural stories, the study offers important insights into the changing world of digital culture.Keywords: digital culture, media, social media representation, digital identity
Procedia PDF Downloads 104350 Establishment and Improvement of Oil Palm Liquid Culture for Clonal Propagation
Authors: Mohd Naqiuddin Bin Husri, Siti Rahmah Abd Rahman, Dalilah Abu Bakar, Dayang Izawati Abang Masli, Meilina Ong Abdullah
Abstract:
A serious shortage of prime agricultural land coupled with environmental concerns inland expansion has daunted efforts to increase the national yield average. To address this issue, maximising yield per unit hectare through quality planting material is of great importance. Breeding for improved planting materials has been a continuous effort since the early days of this industry, it is time-consuming, and the likelihood of segregation within the progenies further impedes progress in this area. Incorporation of the cloning technology in oil palm breeding programmes is therefore advantageous to expedite the development of commercial elite and high-yielding planting materials. After more than 22 years of research and development through this project, reliable protocols for liquid/suspension culture systems coupled with various innovative technologies which are effective at promoting proliferation and growth of oil palm culture have been established. Subsequently, clonal palms derived from the suspension culture system were extensively studied in the field, and the results have been encouraging. Clones such as CPS1, CPS2 and a few others recorded superior performance in comparison with D x P standard crosses.Keywords: tissue culture, suspension culture, oil palm, Elaeis guineensis
Procedia PDF Downloads 1944349 The Role of Organizational Culture, Organizational Commitment, and Styles of Transformational Leadership towards Employee Performance
Authors: Ahmad Badawi Saluy, Novawiguna Kemalasari
Abstract:
This study aims to examine and analyze the influence of organizational culture, organizational commitment, and transformational leadership style on employee performance. This study used descriptive survey method with quantitative approach, and questionnaires as a tool used for basic data collection. The sampling technique used is proportionate stratified random sampling technique; all respondents in this study were 70 respondents. The analytical method used in this research is multiple linear regressions. The result of determination coefficient of 52.3% indicates that organizational culture, organizational commitment, and transformational leadership style simultaneously have a significant influence on the performance of employees, while the remaining 47.7% is explained by other factors outside the research variables. Partially, organization culture has strong and positive influence on employee performance, organizational commitment has a moderate and positive effect on employee performance, while the transformational leadership style has a strong and positive influence on employee performance and this is also the variable that has the most impact on employee performance.Keywords: organizational culture, organizational commitment, transformational leadership style, employee performance
Procedia PDF Downloads 2304348 One-Stop Culture Workshop Concept as a Way to Raise the Potential of Indonesia Culture in AEC 2015: Case Study in Saung Angklung Udjo
Authors: Meiliana, Achmad Eko Prabowo, Muhammad Fathan Mubina
Abstract:
AFTA agreement in 2015 will bring a significant impact on Indonesian society. Indonesia’s people will face competition both in the economic, political, and cultural regionally among ten countries in ASEAN. Indonesia is a rich country in culture and has a large enough demographic bonus when compared to other ASEAN countries. Indonesia also has a lot of cultural enrichment in every its region. It’s mean, the role of society and culture of Indonesia's abundant if combined properly it will help Indonesia in the face of the ASEAN Economic Community (AEC) in 2015. This paper will discuss the role of one-stop culture workshop (OSCW) concept at Saung Angklung Udjo (SAU), a cultural tourist area of Angklung which is located in Bandung. OSCW is a concept that implemented a cultural tour in SAU that invites the visitor to engage in the cultural empowerment. In this research, we will answer how the concepts are applied by SAU can be an alternative to re-discover the potential of Indonesia in the face of the AEC 2015. Units of analysis that we used is among the programs, outcomes, and community empowerment. This study used a qualitative approach with in-depth interviews and observation. The finding of this study prove that OSCW concept is an opportunity for Indonesia to encourage a culture to go international. The concept of OSCW can really be used other communities to develop cultures of Indonesia so that later institutionalized culture that not only can be used as a tourist attraction but also as an educational laboratory for the community.Keywords: OSCW concept, citizen empowerment, cultural tour, AEC 2015
Procedia PDF Downloads 4724347 Classification of Attacks Over Cloud Environment
Authors: Karim Abouelmehdi, Loubna Dali, Elmoutaoukkil Abdelmajid, Hoda Elsayed, Eladnani Fatiha, Benihssane Abderahim
Abstract:
The security of cloud services is the concern of cloud service providers. In this paper, we will mention different classifications of cloud attacks referred by specialized organizations. Each agency has its classification of well-defined properties. The purpose is to present a high-level classification of current research in cloud computing security. This classification is organized around attack strategies and corresponding defenses.Keywords: cloud computing, classification, risk, security
Procedia PDF Downloads 5494346 On the Factors Affecting Computing Students’ Awareness of the Latest ICTs
Authors: O. D. Adegbehingbe, S. D. Eyono Obono
Abstract:
The education sector is constantly faced with rapid changes in technologies in terms of ensuring that the curriculum is up to date and in terms of making sure that students are aware of these technological changes. This challenge can be seen as the motivation for this study, which is to examine the factors affecting computing students’ awareness of the latest Information Technologies (ICTs). The aim of this study is divided into two sub-objectives which are: the selection of relevant theories and the design of a conceptual model to support it as well as the empirical testing of the designed model. The first objective is achieved by a review of existing literature on technology adoption theories and models. The second objective is achieved using a survey of computing students in the four universities of the KwaZulu-Natal province of South Africa. Data collected from this survey is analyzed using Statistical package for the Social Science (SPSS) using descriptive statistics, ANOVA and Pearson correlations. The main hypothesis of this study is that there is a relationship between the demographics and the prior conditions of the computing students and their awareness of general ICT trends and of Digital Switch Over (DSO) a new technology which involves the change from analog to digital television broadcasting in order to achieve improved spectrum efficiency. The prior conditions of the computing students that were considered in this study are students’ perceived exposure to career guidance and students’ perceived curriculum currency. The results of this study confirm that gender, ethnicity, and high school computing course affect students’ perceived curriculum currency while high school location affects students’ awareness of DSO. The results of this study also confirm that there is a relationship between students prior conditions and their awareness of general ICT trends and DSO in particular.Keywords: education, information technologies, IDT, awareness
Procedia PDF Downloads 3614345 Efficient Semi-Systolic Finite Field Multiplier Using Redundant Basis
Authors: Hyun-Ho Lee, Kee-Won Kim
Abstract:
The arithmetic operations over GF(2m) have been extensively used in error correcting codes and public-key cryptography schemes. Finite field arithmetic includes addition, multiplication, division and inversion operations. Addition is very simple and can be implemented with an extremely simple circuit. The other operations are much more complex. The multiplication is the most important for cryptosystems, such as the elliptic curve cryptosystem, since computing exponentiation, division, and computing multiplicative inverse can be performed by computing multiplication iteratively. In this paper, we present a parallel computation algorithm that operates Montgomery multiplication over finite field using redundant basis. Also, based on the multiplication algorithm, we present an efficient semi-systolic multiplier over finite field. The multiplier has less space and time complexities compared to related multipliers. As compared to the corresponding existing structures, the multiplier saves at least 5% area, 50% time, and 53% area-time (AT) complexity. Accordingly, it is well suited for VLSI implementation and can be easily applied as a basic component for computing complex operations over finite field, such as inversion and division operation.Keywords: finite field, Montgomery multiplication, systolic array, cryptography
Procedia PDF Downloads 2984344 Proposed Solutions Based on Affective Computing
Authors: Diego Adrian Cardenas Jorge, Gerardo Mirando Guisado, Alfredo Barrientos Padilla
Abstract:
A system based on Affective Computing can detect and interpret human information like voice, facial expressions and body movement to detect emotions and execute a corresponding response. This data is important due to the fact that a person can communicate more effectively with emotions than can be possible with words. This information can be processed through technological components like Facial Recognition, Gait Recognition or Gesture Recognition. As of now, solutions proposed using this technology only consider one component at a given moment. This research investigation proposes two solutions based on Affective Computing taking into account more than one component for emotion detection. The proposals reflect the levels of dependency between hardware devices and software, as well as the interaction process between the system and the user which implies the development of scenarios where both proposals will be put to the test in a live environment. Both solutions are to be developed in code by software engineers to prove the feasibility. To validate the impact on society and business interest, interviews with stakeholders are conducted with an investment mind set where each solution is labeled on a scale of 1 through 5, being one a minimum possible investment and 5 the maximum.Keywords: affective computing, emotions, emotion detection, face recognition, gait recognition
Procedia PDF Downloads 3724343 The Impact of Organizational Culture on Internet Marketing Adoption
Authors: Hafiz Mushtaq Ahmad, Syed Faizan Ali Shah, Bushra Hussain, Muneeb Iqbal
Abstract:
Purpose: The purpose of this study is to investigate the impact of organizational culture on internet marketing adoption. Moreover, the study intends to explore the role of organizational culture in the internet marketing adoption that helps business to achieve organizational growth and augmented market share. Background: With the enormous expansion of technology, organizations now need technology-based marketing paradigm in order to capture larger group of customers. Organizational culture plays a dominant and prominent role in the internet marketing adoption. Changes in the world economy have demolished current organizational competition and generating new technology standards and strategies. With all the technological advances, e-marketing has become one of the essential part of marketing strategies. Organizations require advance internet marketing strategies in order to compete in a global market. Methodology: The population of this study consists of telecom sector organizations of Pakistan. The sample size consists of 200 telecom sector employees. Data were gathered through the questionnaire instrument. The research strategy of this study is survey. The study uses a deductive approach. The sampling technique of this study is convenience sampling. Tentative Results: The study reveals that organizational culture played a vital role in the internet marketing adoption. The results show that there is a strong association between the organizational culture and internet marketing adoption. The results further show that flexible organizational culture helps organization to easily adopt internet marketing. Conclusion: The study discloses that flexible organizational culture helps organizations to easily adopt e-marketing. The study guides decision-makers and owners of organizations to recognize the importance of internet marketing strategy and help them to increase market share by using e-marketing. The study offers solution to the managers to develop flexible organizational culture that helps in internet marketing adoption.Keywords: internet technology, internet marketing, marketing paradigm, organizational culture
Procedia PDF Downloads 2354342 Arithmetic Operations in Deterministic P Systems Based on the Weak Rule Priority
Authors: Chinedu Peter, Dashrath Singh
Abstract:
Membrane computing is a computability model which abstracts its structures and functions from the biological cell. The main ingredient of membrane computing is the notion of a membrane structure, which consists of several cell-like membranes recurrently placed inside a unique skin membrane. The emergence of several variants of membrane computing gives rise to the notion of a P system. The paper presents a variant of P systems for arithmetic operations on non-negative integers based on the weak priorities for rule application. Consequently, we obtain deterministic P systems. Two membranes suffice. There are at most four objects for multiplication and five objects for division throughout the computation processes. The model is simple and has a potential for possible extension to non-negative integers and real numbers in general.Keywords: P system, binary operation, determinism, weak rule priority
Procedia PDF Downloads 4504341 The Role of Community Museum in Ethnic Identity: A Case of Tharu Cultural Museum and Research Center in Chitwan Nepal
Authors: Birendra Mahato, Shiva Narayan Chaudhary
Abstract:
Tharus are indigenous inhabitants of the Tarai, the narrow strip of flat and fertile land that lies at the foothills of the Himalayas. They have unique rituals, festivals, and music, while their clothes and ornaments are similar to some ethnic groups of India. After the control of malaria in the Terai between 1955 to 1965, (with the help of the U.S. Government, the WHO and the government of Nepal) the rate of in-migration skyrocketed, particularly of Nepal’s hill people, whose culture, along with the use of the Western education system, was gradually adopted by the Tharus. Among the many challenges, the Tharus face is their assimilation into the dominant Nepali culture. .The Tharus are thus under threat of slowly losing their ethnic identity and cultural values. In order to preserve the indigenous Tharu Culture, Tharu Cultural Museum, and Research Center. It is a community based non-governmental and non-profitable museum established in 2005 by Tharu intellectuals, traditional leaders and youths. The main goal of the museum is to preserve Tharu culture through different activities with direct and indirect involvement of community people. It aims to preserve arts, culture, handicrafts, and artifacts related to Indigenous Tharu People. Similarly, the museum displays an exhibition about the Tharu histories, lives, culture, and their indigenous knowledge and skills. The paper aims to demonstrate that community museums can be one of the key hubs for the preservation of culture with the collection and promotion of cultural objects, artifacts, and intangible cultural heritages. The preservation of culture not only has contributed to establishing their ethnic identity but also has contributed to establishing their recognition of their political space in the mainstream politics - the constitution of Nepal has recognized Tharus to provide reservation for the political space.Keywords: community museum, tharu, , identity, culture
Procedia PDF Downloads 1404340 The Promotion of a Risk Culture: a Descriptive Study of Ghanaian Banks
Authors: Gerhard Grebe, Johan Marx
Abstract:
The aim of the study is to assess the state of operational risk management and the adoption of an appropriate risk culture in Ghanaian banks. The Bank of Ghana (BoG) joined the Basel Consultative Group (BCG) of the Basel Committee on Bank Supervision (BCBS) in 2021 and is proceeding with the implementation of the Basel III international regulatory framework for banks. The BoG’s Directive about risk management encourages, inter alia, the creation of an appropriate risk culture by Ghanaian banks. However, it is not evident how the risk management staff of Ghanaian banks experience the risk culture and the implementation of operational risk management in the banks where they are employed. Ghana is a developing economy, and it is addressing challenges with its organisational culture. According to Transparency International, successive Ghanaian governments claim to be fighting corruption, but little success has been achieved so far. This points to a possible lack of accountability, transparency, and integrity in the environment in which Ghanaian banks operate and which could influence their risk culture negatively. Purposive sampling was used for the survey, and the questionnaire was completed byGhanaian bank personnel who specializesin operational risk management, risk governance, and compliance, bank supervision, risk analyses, as well as the implementation of the operational risk management requirements of the Basel regulatory frameworks. The respondents indicated that they are fostering a risk culture and implementing monitoring and reporting procedures; the three lines of defence (3LOD); compliance; internal auditing; disclosure of operational risk information; and receiving guidance from the bank supervisor in an attempt to improve their operational risk management practices. However, the respondents reported the following challenges with staff members who are not inside the risk management departments(in order of priority), namelydemonstrating a risk culture, training and development; communication; reporting and disclosure; roles and responsibilities; performance appraisal; and technological and environmental barriers. Recommendations to address these challenges are providedKeywords: ghana, operational risk, risk culture, risk management
Procedia PDF Downloads 1274339 Laser Based Microfabrication of a Microheater Chip for Cell Culture
Authors: Daniel Nieto, Ramiro Couceiro
Abstract:
Microfluidic chips have demonstrated their significant application potentials in microbiological processing and chemical reactions, with the goal of developing monolithic and compact chip-sized multifunctional systems. Heat generation and thermal control are critical in some of the biochemical processes. The paper presents a laser direct-write technique for rapid prototyping and manufacturing of microheater chips and its applicability for perfusion cell culture outside a cell incubator. The aim of the microheater is to take the role of conventional incubators for cell culture for facilitating microscopic observation or other online monitoring activities during cell culture and provides portability of cell culture operation. Microheaters (5 mm × 5 mm) have been successfully fabricated on soda-lime glass substrates covered with aluminum layer of thickness 120 nm. Experimental results show that the microheaters exhibit good performance in temperature rise and decay characteristics, with localized heating at targeted spatial domains. These microheaters were suitable for a maximum long-term operation temperature of 120ºC and validated for long-time operation at 37ºC. for 24 hours. Results demonstrated that the physiology of the cultured SW480 adenocarcinoma of the colon cell line on the developed microheater chip was consistent with that of an incubator.Keywords: laser microfabrication, microheater, bioengineering, cell culture
Procedia PDF Downloads 3004338 An Effective Route to Control of the Safety of Accessing and Storing Data in the Cloud-Based Data Base
Authors: Omid Khodabakhshi, Amir Rozdel
Abstract:
The subject of cloud computing security research has allocated a number of challenges and competitions because the data center is comprised of complex private information and are always faced various risks of information disclosure by hacker attacks or internal enemies. Accordingly, the security of virtual machines in the cloud computing infrastructure layer is very important. So far, there are many software solutions to develop security in virtual machines. But using software alone is not enough to solve security problems. The purpose of this article is to examine the challenges and security requirements for accessing and storing data in an insecure cloud environment. In other words, in this article, a structure is proposed for the implementation of highly isolated security-sensitive codes using secure computing hardware in virtual environments. It also allows remote code validation with inputs and outputs. We provide these security features even in situations where the BIOS, the operating system, and even the super-supervisor are infected. To achieve these goals, we will use the hardware support provided by the new Intel and AMD processors, as well as the TPM security chip. In conclusion, the use of these technologies ultimately creates a root of dynamic trust and reduces TCB to security-sensitive codes.Keywords: code, cloud computing, security, virtual machines
Procedia PDF Downloads 1944337 Design and Implementation of Remote Application Virtualization in Cloud Environments
Authors: Shuen-Tai Wang, Ying-Chuan Chen, Hsi-Ya Chang
Abstract:
Cloud computing is a paradigm of computing that shifts the way computing has been done in the past. The users can use cloud resources such as application software or storage space from the cloud without needing to own them. This paper is focused on solutions that are anticipated to introduce IaaS idea to build cloud base services and enable the individual remote user's applications in cloud environments, which appear as if they are running on the end user's local computer. The available features of application delivery solution have been developed based on our previous research on the virtualization technology to offer applications independent of location so that the users can work online, offline, anywhere, with appropriate device and at any time. This proposed effort has the potential to positively provide an efficient, resilience and elastic environment for cloud service. Users no longer need to burden the system managers and drastically reduces the overall cost of hardware and software licenses. Moreover, this flexible remote application virtualization service represents the next significant step to the mobile workplace, and it lets users access their applications remotely through cloud services anywhere. This is also made possible by the low administrative costs as well as relatively inexpensive end-user terminals and reduced energy expenses.Keywords: cloud computing, IaaS, virtualization, application delivery
Procedia PDF Downloads 2834336 Digital Forensics Compute Cluster: A High Speed Distributed Computing Capability for Digital Forensics
Authors: Daniel Gonzales, Zev Winkelman, Trung Tran, Ricardo Sanchez, Dulani Woods, John Hollywood
Abstract:
We have developed a distributed computing capability, Digital Forensics Compute Cluster (DFORC2) to speed up the ingestion and processing of digital evidence that is resident on computer hard drives. DFORC2 parallelizes evidence ingestion and file processing steps. It can be run on a standalone computer cluster or in the Amazon Web Services (AWS) cloud. When running in a virtualized computing environment, its cluster resources can be dynamically scaled up or down using Kubernetes. DFORC2 is an open source project that uses Autopsy, Apache Spark and Kafka, and other open source software packages. It extends the proven open source digital forensics capabilities of Autopsy to compute clusters and cloud architectures, so digital forensics tasks can be accomplished efficiently by a scalable array of cluster compute nodes. In this paper, we describe DFORC2 and compare it with a standalone version of Autopsy when both are used to process evidence from hard drives of different sizes.Keywords: digital forensics, cloud computing, cyber security, spark, Kubernetes, Kafka
Procedia PDF Downloads 3964335 Polish Operational Plans During Cold War as Part of Warsaw Pact Strategic Culture
Authors: Wiktor Stypczyński
Abstract:
During the Cold War, both sides of the conflict developed advanced operational plans in case of a Third World War outbreak. In the Warsaw Pact, Soviet generals in Moscow chose targets for each army, but each country's General Staff had to create specific plans for their nation. This led to the creation of a Strategic Culture within the Warsaw Pact that was reflected in the plans of each army. This paper aims to showcase the Strategic Culture of the Warsaw Pact by using the plans of the People's Polish Army as an example. Examining one army at a time will allow for a more detailed and unique perspective on the matter. Understanding the past Strategic Culture is crucial in comprehending the current post-Soviet strategic situation in Eastern Europe, especially with the current situation in Ukraine. This paper is based on Benon Miśkiewicz's classic methodology of military history. While this methodology is the foundation, the research findings will also draw on the Strategic Studies methodology and the accomplishments of war and military science. Additionally, the Security and Political Studies methodology will be a crucial element in constructing the narrative.Keywords: cold war, operetional plans, strategic culture, polish people's army
Procedia PDF Downloads 764334 A Performance Analysis Study for Cloud Based ERP Systems
Authors: Burak Erkayman
Abstract:
The manufacturing and service organizations are in the need of using ERP systems to integrate many functions from purchasing to storage, production planning to calculation of costs. Using ERP systems by the integration in the level of information provides companies remarkable advantages in terms of profitability, productivity and efficiency in processes. Cloud computing is one of the most significant changes in information and communication technology. The developments in Cloud Computing attract business world to take advantage of this field. Cloud Computing means much more storage area, more cost saving and faster data transfer rate. In addition to these, it presents new business models, new field of study and practicable solutions for anyone’s use. These developments make inevitable the implementation of ERP systems to cloud environment. In this study, the performance of ERP systems in cloud environment is analyzed through various performance criteria and a comparison between traditional and cloud-ERP systems is presented. At the end of study the transformation and the future of ERP systems is discussed.Keywords: cloud-ERP, ERP system performance, information system transformation
Procedia PDF Downloads 532