Search results for: cross-cultural communications
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 550

Search results for: cross-cultural communications

280 Missing Link Data Estimation with Recurrent Neural Network: An Application Using Speed Data of Daegu Metropolitan Area

Authors: JaeHwan Yang, Da-Woon Jeong, Seung-Young Kho, Dong-Kyu Kim

Abstract:

In terms of ITS, information on link characteristic is an essential factor for plan or operation. But in practical cases, not every link has installed sensors on it. The link that does not have data on it is called “Missing Link”. The purpose of this study is to impute data of these missing links. To get these data, this study applies the machine learning method. With the machine learning process, especially for the deep learning process, missing link data can be estimated from present link data. For deep learning process, this study uses “Recurrent Neural Network” to take time-series data of road. As input data, Dedicated Short-range Communications (DSRC) data of Dalgubul-daero of Daegu Metropolitan Area had been fed into the learning process. Neural Network structure has 17 links with present data as input, 2 hidden layers, for 1 missing link data. As a result, forecasted data of target link show about 94% of accuracy compared with actual data.

Keywords: data estimation, link data, machine learning, road network

Procedia PDF Downloads 484
279 Transmission of ASCII Code Messages Using a High Power (50mW) Underwater Laser Communication Prototype in Two Controlled Scenarios

Authors: Lessly Borja, Anthony Gualli, Kelly Baño, Fabricio Santacruz

Abstract:

In this article, a prototype of underwater communication using a long-range laser (50mW) has been carried out in two aquatic scenarios (fish tank and swimming pool) with the aim of recreating Aqua-Fi technology (the future of underwater communications) using a Bluetooth connection to the transmitter to send data in ASCII code by means of light. Initially, the transmitter and receiver circuits were programmed in Arduino so that the data would travel by light pulses in the aforementioned code. To obtain the results of the underwater communication, two scenarios were chosen (fish tank and swimming pool), where the power value of the received signal was calculated from its peak-to-peak voltage using the Oscilloscope equipment (ESPOCH). Finally, it was concluded that the maximum communication range of this prototype is 12m underwater, and it was observed that the power decreases as the distance increases. However, this prototype still needs to improve communication so that the information is not distorted or lost when there is movement and dispersion of the water. It is hoped that it will form the basis for future research.

Keywords: prototype, underwater, communication, power, voltage, distance

Procedia PDF Downloads 50
278 Cyber Security Enhancement via Software Defined Pseudo-Random Private IP Address Hopping

Authors: Andre Slonopas, Zona Kostic, Warren Thompson

Abstract:

Obfuscation is one of the most useful tools to prevent network compromise. Previous research focused on the obfuscation of the network communications between external-facing edge devices. This work proposes the use of two edge devices, external and internal facing, which communicate via private IPv4 addresses in a software-defined pseudo-random IP hopping. This methodology does not require additional IP addresses and/or resources to implement. Statistical analyses demonstrate that the hopping surface must be at least 1e3 IP addresses in size with a broad standard deviation to minimize the possibility of coincidence of monitored and communication IPs. The probability of breaking the hopping algorithm requires a collection of at least 1e6 samples, which for large hopping surfaces will take years to collect. The probability of dropped packets is controlled via memory buffers and the frequency of hops and can be reduced to levels acceptable for video streaming. This methodology provides an impenetrable layer of security ideal for information and supervisory control and data acquisition systems.

Keywords: moving target defense, cybersecurity, network security, hopping randomization, software defined network, network security theory

Procedia PDF Downloads 156
277 The Complaint Speech Act Set Produced by Arab Students in the UAE

Authors: Tanju Deveci

Abstract:

It appears that the speech act of complaint has not received as much attention as other speech acts. However, the face-threatening nature of this speech act requires a special attention in multicultural contexts in particular. The teaching context in the UAE universities, where a big majority of teaching staff comes from other cultures, requires investigations into this speech act in order to improve communication between students and faculty. This session will outline the results of a study conducted with this purpose. The realization of complaints by Freshman English students in Communication courses at Petroleum Institute was investigated to identify communication patterns that seem to cause a strain. Data were collected using a role-play between a teacher and students, and a judgment scale completed by two of the instructors in the Communications Department. The initial findings reveal that the students had difficulty putting their case, produced the speech act of criticism along with a complaint and that they produced both requests and demands as candidate solutions. The judgement scales revealed that the students’ attitude was not appropriate most of the time and that the judges would behave differently from students. It is concluded that speech acts, in general, and complaint, in particular, need to be taught to learners explicitly to improve interpersonal communication in multicultural societies. Some teaching ideas are provided to help increase foreign language learners’ sociolinguistic competence.

Keywords: speech act, complaint, pragmatics, sociolinguistics, language teaching

Procedia PDF Downloads 480
276 Building Energy Modeling for Networks of Data Centers

Authors: Eric Kumar, Erica Cochran, Zhiang Zhang, Wei Liang, Ronak Mody

Abstract:

The objective of this article was to create a modelling framework that exposes the marginal costs of shifting workloads across geographically distributed data-centers. Geographical distribution of internet services helps to optimize their performance for localized end users with lowered communications times and increased availability. However, due to the geographical and temporal effects, the physical embodiments of a service's data center infrastructure can vary greatly. In this work, we first identify that the sources of variances in the physical infrastructure primarily stem from local weather conditions, specific user traffic profiles, energy sources, and the types of IT hardware available at the time of deployment. Second, we create a traffic simulator that indicates the IT load at each data-center in the set as an approximator for user traffic profiles. Third, we implement a framework that quantifies the global level energy demands using building energy models and the traffic profiles. The results of the model provide a time series of energy demands that can be used for further life cycle analysis of internet services.

Keywords: data-centers, energy, life cycle, network simulation

Procedia PDF Downloads 119
275 Global Indicators of Successful Remote Monitoring Adoption Applying Diffusion of Innovation Theory

Authors: Danika Tynes

Abstract:

Innovations in technology have implications for sustainable development in health and wellness. Remote monitoring is one innovation for which the evidence-base has grown to support its viability as a quality healthcare delivery adjunct. This research reviews global data on telehealth adoption, in particular, remote monitoring, and the conditions under which its success becomes more likely. System-level indicators were selected to represent four constructs of DoI theory (relative advantage, compatibility, complexity, and observability) and assessed against 5 types of Telehealth (Teleradiology, Teledermatology, Telepathology, Telepsychology, and Remote Monitoring) using ordinal logistic regression. Analyses include data from 84 countries, as extracted from the World Health Organization, World Bank, ICT (Information Communications Technology) Index, and HDI (Human Development Index) datasets. Analyses supported relative advantage and compatibility as the strongest influencers of remote monitoring adoption. Findings from this research may help focus on the allocation of resources, as a sustainability concern, through consideration of systems-level factors that may influence the success of remote monitoring adoption.

Keywords: remote monitoring, diffusion of innovation, telehealth, digital health

Procedia PDF Downloads 99
274 An Overview of Privacy and Security Issues in Social Networks

Authors: Mohamad Ibrahim Al Ladan

Abstract:

Social networks, such as Facebook, Myspace, LinkedIn, Google+, and Twitter have experienced exponential growth and a remarkable adoption rate in recent years. They provide attractive means of online social interactions and communications with family, friends, and colleagues from around the corner or across the globe, and they have become an important part of daily digital interactions for more than one and a half billion users around the world. The various personal information sharing practices that social network providers encourage have led to their success as innovative social interaction platforms. However, these practices have resulted in ample concerns with respect to privacy and security from different stakeholders. Addressing these privacy and security concerns in social networks is a must for these networks to be sustainable. Existing security and privacy tools may not be enough to address existing concerns. Some guidelines should be followed to protect users from the existing risks. In this paper, we have investigated and discussed the various privacy and security issues and concerns pertaining to social networks. Moreover, we have classified these privacy and security issues and presented a thorough discussion of the implications of these issues and concerns on the future of the social networks. In addition, we have presented a set of guidelines as precaution measures that users can consider to address these issues and concerns.

Keywords: social networks privacy issues, social networks security issues, social networks privacy precautions measures, social networks security precautions measures

Procedia PDF Downloads 272
273 Confirmatory Factor Analysis of Smartphone Addiction Inventory (SPAI) in the Yemeni Environment

Authors: Mohammed Al-Khadher

Abstract:

Currently, we are witnessing rapid advancements in the field of information and communications technology, forcing us, as psychologists, to combat the psychological and social effects of such developments. It also drives us to continually look for the development and preparation of measurement tools compatible with the changes brought about by the digital revolution. In this context, the current study aimed to identify the factor analysis of the Smartphone Addiction Inventory (SPAI) in the Republic of Yemen. The sample consisted of (1920) university students (1136 males and 784 females) who answered the inventory, and the data was analyzed using the statistical software (AMOS V25). The factor analysis results showed a goodness-of-fit of the data five-factor model with excellent indicators, as RMSEA-(.052), CFI-(.910), GFI-(.931), AGFI-(.915), TLI-(.897), NFI-(.895), RFI-(.880), and RMR-(.032). All within the ideal range to prove the model's fit of the scale’s factor analysis. The confirmatory factor analysis results showed factor loading in (4) items on (Time Spent), (4) items on (Compulsivity), (8) items on (Daily Life Interference), (5) items on (Craving), and (3) items on (Sleep interference); and all standard values of factor loading were statistically significant at the significance level (>.001).

Keywords: smartphone addiction inventory (SPAI), confirmatory factor analysis (CFA), yemeni students, people at risk of smartphone addiction

Procedia PDF Downloads 57
272 Analyzing e-Leadership Literature in Applying an e-Leadership Model for Community College Leaders of Hybrid Remote Teams

Authors: Lori Timmis

Abstract:

The COVID-19 pandemic precipitated significant organizational change in employee turnover, retirements, and burnout exacerbated by enrollment declines in higher education, especially community colleges. To counter this downturn, community college leaders must thoughtfully examine meaningful work opportunities to retain an engaged and productive workforce. Higher education led fully remote teams during the pandemic, which highlighted the benefits and weaknesses of building and leading remote teams. Hybrid remote teams offer possibility to reimagine community college structures, though leading remote teams requires specific e-leadership competencies. This paper examines the literature of studies on e-leadership conducted during the pandemic and from several higher education studies, pre-pandemic, against an e-leadership competency framework. The e-leadership studies conducted pre-pandemic and from the pandemic complement the e-leadership competency framework, comprising six e-leadership competencies performed via information technology communications, which provides community college (and higher education) leaders to consider hybrid remote team structures and the necessary leadership skills to lead hybrid remote teams.

Keywords: community college, e-leadership, great resignation, hybrid remote teams

Procedia PDF Downloads 70
271 Geographies of Blackness: An Exploration of the Subaltern Public Spheres of the African Diaspora in European Cities

Authors: Teju N. Adisa-Farrar

Abstract:

In European cities, social, political and cultural geographies of blackness exist. Organizations create spaces to discuss, express, and expose the realities of young people of African descent creating an Afropean lifestyle with transnational affiliations. Focusing on black and brown spaces produced by and for the young people of African descent in Vienna and Brussels, it became clear a multidisciplinary approach would be necessary. Using Cultural Studies frameworks along with Communications Theories on Black Public Spheres and Social-Geography, a basis was created for exploring the creative, political, and economic responses of young people who are apart of the historically (and contemporary) oppressed and excluded groups of the African Diaspora. Through this intrinsic study, it became apparent that spaces created and reclaimed by young people of the African Diaspora were more inclusive and democratic than other spaces. The organizations studied have used city life as the platform to express their struggles and celebrations of their multicultural identity; clearly using historical, global black and Pan-African movements as the basis for local adaptation of an African Diaspora identity.

Keywords: African diaspora, black public sphere, identity, spaces, geographies

Procedia PDF Downloads 260
270 Glocalization of Journalism and Mass Communication Education: Best Practices from an International Collaboration on Curriculum Development

Authors: Bellarmine Ezumah, Michael Mawa

Abstract:

Glocalization is often defined as the practice of conducting business according to both local and global considerations – this epitomizes the curriculum co-development collaboration between a journalism and mass communications professor from a university in the United States and the Uganda Martyrs University in Uganda where a brand new journalism and mass communications program was recently co-developed. This paper presents the experiences and research result of this initiative which was funded through the Institute of International Education (IIE) under the umbrella of the Carnegie African Diaspora Fellowship Program (CADFP). Vital international and national concerns were addressed. On a global level, scholars have questioned and criticized the general Western-module ingrained in journalism and mass communication curriculum and proposed a decolonization of journalism curricula. Another major criticism is the concept of western-based educators transplanting their curriculum verbatim to other regions of the world without paying greater attention to the local needs. To address these two global concerns, an extensive assessment of local needs was conducted prior to the conceptualization of the new program. The assessment of needs adopted a participatory action model and captured the knowledge and narratives of both internal and external stakeholders. This involved review of pertinent documents including the nation’s constitution, governmental briefs, and promulgations, interviews with governmental officials, media and journalism educators, media practitioners, students, and benchmarking the curriculum of other tertiary institutions in the nation. Information gathered through this process served as blueprint and frame of reference for all design decisions. In the area of local needs, four key factors were addressed. First, the realization that most media personnel in Uganda are both academically and professionally unqualified. Second, the practitioners with academic training were found lacking in experience. Third, the current curricula offered at several tertiary institutions are not comprehensive and lack local relevance. The project addressed these problems thus: first, the program was designed to cater to both traditional and non-traditional students offering opportunities for unqualified media practitioners to get their formal training through evening and weekender programs. Secondly, the challenge of inexperienced graduates was mitigated by designing the program to adopt the experiential learning approach which many refer to as the ‘Teaching Hospital Model’. This entails integrating practice to theory - similar to the way medical students engage in hands-on practice under the supervision of a mentor. The university drew a Memorandum of Understanding (MoU) with reputable media houses for students and faculty to use their studios for hands-on experience and for seasoned media practitioners to guest-teach some courses. With the convergence functions of media industry today, graduates should be trained to have adequate knowledge of other disciplines; therefore, the curriculum integrated cognate courses that would render graduates versatile. Ultimately, this research serves as a template for African colleges and universities to follow in their quest to glocalize their curricula. While the general concept of journalism may remain western, journalism curriculum developers in Africa through extensive assessment of needs, and focusing on those needs and other societal particularities, can adjust the western module to fit their local needs.

Keywords: curriculum co-development, glocalization of journalism education, international journalism, needs assessment

Procedia PDF Downloads 106
269 Empirical Prediction of the Effect of Rain Drops on Dbs System Operating in Ku-Band (Case Study of Abuja)

Authors: Tonga Agadi Danladi, Ajao Wasiu Bamidele, Terdue Dyeko

Abstract:

Recent advancement in microwave communications technologies especially in telecommunications and broadcasting have resulted in congestion on the frequencies below 10GHz. This has forced microwave designers to look for high frequencies. Unfortunately for frequencies greater than 10GHz rain becomes one of the main factors of attenuation in signal strength. At frequencies from 10GHz upwards, rain drop sizes leads to outages that compromises the availability and quality of service this making it a critical factor in satellite link budget design. Rain rate and rain attenuation predictions are vital steps to be considered when designing microwave satellite communication link operating at Ku-band frequencies (112-18GHz). Unreliable rain rates data in the tropical regions of the world like Nigeria from radio communication group of the international Telecommunication Union (ITU-R) makes it difficult for microwave engineers to determine a realistic rain margin that needs to be accommodated in satellite link budget design in such region. This work presents an empirical tool for predicting the amount of signal due to rain on DBS signal operating at the Ku-band.

Keywords: attenuation, Ku-Band, microwave communication, rain rates

Procedia PDF Downloads 450
268 The Readiness of English Communication Skills for Travel Agents to Enter the ASEAN Economic Community

Authors: Bavornluck Kuosuwan

Abstract:

The purpose of this research was to study the level of readiness of English communication skills for travel agents in the Silom road area of Bangkok in order to enter the ASEAN economic community in the year 2015. The multi-stage sampling method was utilized with 474 respondents from 79 travel agencies. An English Questionnaire was used to collect the data. Descriptive statistics included percentage, average, standard deviation and Pearson’s r coefficient. The findings revealed that the majority of respondents were not well prepared in terms of ASEAN knowledge including laws and regulations. The majority of respondents had not been well informed about the changes that will come with the coming of ASEAN economic community. Moreover, the level of English communication for most travel agents was between the poor and intermediate level and therefore improvement is needed, especially the speaking and listening skill. In other words, the majority of respondents needed more training in terms of communications skills. The correlation between the working environment and attitude of the staff was very positive. Moreover, the correlation between the background of staff and attitude of staff was also very positive and most of demographic factors had a positive correlation with attitude of staff, except gender.

Keywords: ASEAN, communication skills, travel agents, media engineering

Procedia PDF Downloads 227
267 Optimizing Resource Allocation and Indoor Location Using Bluetooth Low Energy

Authors: Néstor Álvarez-Díaz, Pino Caballero-Gil, Héctor Reboso-Morales, Francisco Martín-Fernández

Abstract:

The recent tendency of "Internet of Things" (IoT) has developed in the last years, causing the emergence of innovative communication methods among multiple devices. The appearance of Bluetooth Low Energy (BLE) has allowed a push to IoT in relation to smartphones. In this moment, a set of new applications related to several topics like entertainment and advertisement has begun to be developed but not much has been done till now to take advantage of the potential that these technologies can offer on many business areas and in everyday tasks. In the present work, the application of BLE technology and smartphones is proposed on some business areas related to the optimization of resource allocation in huge facilities like airports. An indoor location system has been developed through triangulation methods with the use of BLE beacons. The described system can be used to locate all employees inside the building in such a way that any task can be automatically assigned to a group of employees. It should be noted that this system cannot only be used to link needs with employees according to distances, but it also takes into account other factors like occupation level or category. In addition, it has been endowed with a security system to manage business and personnel sensitive data. The efficiency of communications is another essential characteristic that has been taken into account in this work.

Keywords: bluetooth low energy, indoor location, resource assignment, smartphones

Procedia PDF Downloads 362
266 Crisis Communication at Destinations: A Study for Tourism Managers

Authors: Volkan Altintas, Burcu Oksuz

Abstract:

Tourism industry essentially requires effective crisis management and crisis communication skills, as it is extremely vulnerable to crises. In terms of destinations, tourism crises cause dramatic decreases in the number of inbound tourists, impairment in the destination’s image, and decline in the level of preferability of the destination not only in the short but also in the long term. Therefore, any destination should be well prepared for crisis situation that may arise for various reasons. Currently, the advancement in communication technologies enables and facilitates information and experience to spread rapidly, and negative information and experiences tend to be shared to a further extent. Destinations are broadly exposed to the impacts of such communication stream. Turkey is almost continuously exposed to crises and their adverse impacts as a tourism destination, and thus requires effective crisis communication activities to be maintained. Hence, the approaches of tourism managers toward crisis communication and their proposals for addressing issues in question are important. This study intends to set forth the considerations of the managers serving in the tourism industry about crisis communication at destinations. The theoretical part of the study describes and explains crisis management and crisis communication at destinations; following which are provided the outcomes of the thorough in-depth interviews and discussions conducted for the establishment of the considerations of tourism managers. Managers indicated the role and importance of crisis communications in destinations.

Keywords: crisis communication, crisis management, destination, tourism managers

Procedia PDF Downloads 271
265 Fake News During COVID-19 Pandemic: An Overview from A Legal Perspective

Authors: Ida Shafinaz Mohamed Kamil, Mohd Dahlan Abdul Malek

Abstract:

Today, the whole world is facing a catastrophe called the novel coronavirus disease known as COVID-19. As of October 2021, it has been reported that more than 248 million cases and 5 million deaths have been recorded worldwide. In Malaysia, 2,466,663 cases were reported, with 28,876 deaths recorded on 30 October 2021. Unfortunately, the world is not only facing the COVID-19 pandemic but the COVID-19 infodemic as well, where fake news about COVID-19 disease is spreading faster and more widely than from the virus itself. The spread of fake news is amplified through various social media platforms, which is causing concern among the community. The uncertainty in understanding what fake news really is has caused difficulties and challenges in providing a solution to the hazards that it creates. This article discusses what constitutes fake news and examines the current legal framework put in place to combat fake news in Malaysia. Employing a doctrinal research methodology, this article thoroughly analyzes the relevant legal provisions under the Communications and Multimedia Act 1998, the Penal Code and the Emergency (Essential Powers) Ordinance (No.2) 2021, which came into force on 12 March 2021 as well as related case laws, for offenses and punishments with regards to fake news. The findings from the analysis indicate that there is still room for improvement in regulating fake news, in particular concerning COVID-19.

Keywords: fake news, legal pespective, covid 19, pendemic

Procedia PDF Downloads 55
264 Mobile Cloud Application in Design Build Bridge Construction

Authors: Meng Sun, Bin Wei

Abstract:

In the past decades, design-build has become a more popular project delivery system especially for the large scaled infrastructure project in North America. It provides a one-stop shopping system for the client therefore improves the efficiency of construction, and reduces the risks and overall cost for the clients. Compared to the project with traditional delivery method, design-build project requires contractor and designer to work together efficiently to deliver the best-value solutions through the construction process. How to facilitate a solid integration and efficient interaction between contractor and designer often affects the schedule, budget and quality of the construction therefore becomes a key factor to the success of a design-build project. This paper presents a concept of using modern mobile cloud technology to provide an integrated solution during the design-build construction. It uses mobile cloud architecture to provide a platform for real-time field progress, change request approval, job progress log, and project time entry with devices integration for field information and communications. The paper uses a real filed change notice as an example to demonstrate how mobile cloud technology applies in a design-build project and how it can improve the project efficiency.

Keywords: cloud, design-build, field change notice, mobile application

Procedia PDF Downloads 218
263 Learning Chinese Suprasegmentals for a Better Communicative Performance

Authors: Qi Wang

Abstract:

Chinese has become a powerful worldwide language and millions of learners are studying it all over the words. Chinese is a tone language with unique meaningful characters, which makes foreign learners master it with more difficulties. On the other hand, as each foreign language, the learners of Chinese first will learn the basic Chinese Sound Structure (the initials and finals, tones, Neutral Tone and Tone Sandhi). It’s quite common that in the following studies, teachers made a lot of efforts on drilling and error correcting, in order to help students to pronounce correctly, but ignored the training of suprasegmental features (e.g. stress, intonation). This paper analysed the oral data based on our graduation students (two-year program) from 2006-2013, presents the intonation pattern of our graduates to speak Chinese as second language -high and plain with heavy accents, without lexical stress, appropriate stop endings and intonation, which led to the misunderstanding in different real contexts of communications and the international official Chinese test, e.g. HSK (Chinese Proficiency Test), HSKK (HSK Speaking Test). This paper also demonstrated how the Chinese to use the suprasegmental features strategically in different functions and moods (declarative, interrogative, imperative, exclamatory and rhetorical intonations) in order to train the learners to achieve better Communicative Performance.

Keywords: second language learning, suprasegmental, communication, HSK (Chinese Proficiency Test)

Procedia PDF Downloads 414
262 Design of Mobile Teaching for Students Collaborative Learning in Distance Higher Education

Authors: Lisbeth Amhag

Abstract:

The aim of the study is to describe and analyze the design of mobile teaching for students collaborative learning in distance higher education with a focus on mobile technologies as online webinars (web-based seminars or conferencing) by using laptops, smart phones, or tablets. These multimedia tools can provide face-to-face interactions, recorded flipped classroom videos and parallel chat communications. The data collection consists of interviews with 22 students and observations of online face-to-face webinars, as well two surveys. Theoretically, the study joins the research tradition of Computer Supported Collaborative learning, CSCL, as well as Computer Self-Efficacy, CSE concerned with individuals’ media and information literacy. Important conclusions from the study demonstrated mobile interactions increased student centered learning. As the students were appreciating the working methods, they became more engaged and motivated. The mobile technology using among student also contributes to increased flexibility between space and place, as well as media and information literacy.

Keywords: computer self-efficacy, computer supported collaborative learning, distance and open learning, educational design and technologies, media and information literacy, mobile learning

Procedia PDF Downloads 333
261 An Efficient Discrete Chaos in Generalized Logistic Maps with Applications in Image Encryption

Authors: Ashish Ashish

Abstract:

In the last few decades, the discrete chaos of difference equations has gained a massive attention of academicians and scholars due to its tremendous applications in each and every branch of science, such as cryptography, traffic control models, secure communications, weather forecasting, and engineering. In this article, a generalized logistic discrete map is established and discrete chaos is reported through period doubling bifurcation, period three orbit and Lyapunov exponent. It is interesting to see that the generalized logistic map exhibits superior chaos due to the presence of an extra degree of freedom of an ordered parameter. The period doubling bifurcation and Lyapunov exponent are demonstrated for some particular values of parameter and the discrete chaos is determined in the sense of Devaney's definition of chaos theoretically as well as numerically. Moreover, the study discusses an extended chaos based image encryption and decryption scheme in cryptography using this novel system. Surprisingly, a larger key space for coding and more sensitive dependence on initial conditions are examined for encryption and decryption of text messages, images and videos which secure the system strongly from external cyber attacks, coding attacks, statistic attacks and differential attacks.

Keywords: chaos, period-doubling, logistic map, Lyapunov exponent, image encryption

Procedia PDF Downloads 112
260 Internet Optimization by Negotiating Traffic Times

Authors: Carlos Gonzalez

Abstract:

This paper describes a system to optimize the use of the internet by clients requiring downloading of videos at peak hours. The system consists of a web server belonging to a provider of video contents, a provider of internet communications and a software application running on a client’s computer. The client using the application software will communicate to the video provider a list of the client’s future video demands. The video provider calculates which videos are going to be more in demand for download in the immediate future, and proceeds to request the internet provider the most optimal hours to do the downloading. The times of the downloading will be sent to the application software, which will use the information of pre-established hours negotiated between the video provider and the internet provider to download those videos. The videos will be saved in a special protected section of the user’s hard disk, which will only be accessed by the application software in the client’s computer. When the client is ready to see a video, the application will search the list of current existent videos in the area of the hard disk; if it does exist, it will use this video directly without the need for internet access. We found that the best way to optimize the download traffic of videos is by negotiation between the internet communication provider and the video content provider.

Keywords: internet optimization, video download, future demands, secure storage

Procedia PDF Downloads 113
259 The Associations of Family Support with Sexual Behaviour and Repeat Induced Abortion among Chinese Adolescents

Authors: Jiashu Shen

Abstract:

Background: The abortion rate has increased significantly, which is harmful especially to adolescents, making repeat induced abortion (RIA) among adolescents a social problem. This study aims to investigate the associations of family support with sexual behavior and repeat induced abortion among Chinese adolescents Methods: This study based on a national hospital-based sample with 945 girls aged 15-19 who underwent induced abortion in 43 hospitals. Multivariate logistic regressions were performed to estimated odds ratio for the risk factors. Results: Adolescences living with parents were less inclined to undergo RIA, especially if they were rural (adjusted odds ratio=0.48 95%CI 0.31-0.72) and local (adjusted odds ratio =0.39 95%=0.23-0.66). Those with parental financial support were likely to have less sexual partnersand take contraceptives more regularly. Those with higher self-perceived importance in family were more likely to take contraceptives during the first sexual intercourse in higher age, and with higher first abortion age and less sexual partners. Conclusion: In mainland China, living with parents, parental financial support, high self-perceived importance in family and adequate family sexuality communications may contribute to lower incidence of RIA.

Keywords: Chinese adolescent, family support, repeat induced abortion, sexual behavior

Procedia PDF Downloads 87
258 Application of Intelligent City and Hierarchy Intelligent Buildings in Kuala Lumpur

Authors: Jalalludin Abdul Malek, Zurinah Tahir

Abstract:

When the Multimedia Super Corridor (MSC) was launched in 1995, it became the catalyst for the implementation of the intelligent city concept, an area that covers about 15 x 50 kilometres from Kuala Lumpur City Centre (KLCC), Putrajaya and Kuala Lumpur International Airport (KLIA). The concept of intelligent city means that the city has an advanced infrastructure and infostructure such as information technology, advanced telecommunication systems, electronic technology and mechanical technology to be utilized for the development of urban elements such as industries, health, services, transportation and communications. For example, the Golden Triangle of Kuala Lumpur has also many intelligent buildings developed by the private sector such as the KLCC Tower to implement the intelligent city concept. Consequently, the intelligent buildings in the Golden Triangle can be linked directly to the Putrajaya Intelligent City and Cyberjaya Intelligent City within the confines of the MSC. However, the reality of the situation is that there are not many intelligent buildings within the Golden Triangle Kuala Lumpur scope which can be considered of high-standard intelligent buildings as referred to by the Intelligence Quotient (IQ) building standard. This increases the need to implement the real ‘intelligent city’ concept. This paper aims to show the strengths and weaknesses of the intelligent buildings in the Golden Triangle by taking into account aspects of 'intelligence' in the areas of technology and infrastructure of buildings.

Keywords: intelligent city concepts, intelligent building, Golden Triangle, Kuala Lumpur

Procedia PDF Downloads 258
257 Electric Vehicle Market Penetration Impact on Greenhouse Gas Emissions for Policy-Making: A Case Study of United Arab Emirates

Authors: Ahmed Kiani

Abstract:

The United Arab Emirates is clearly facing a multitude of challenges in curbing its greenhouse gas emissions to meet its pre-allotted framework of Kyoto protocol and COP21 targets due to its hunger for modernization, industrialization, infrastructure growth, soaring population and oil and gas activity. In this work, we focus on the bonafide zero emission electric vehicles market penetration in the country’s transport industry for emission reduction. We study the global electric vehicle market trends, the complementary battery technologies and the trends by manufacturers, emission standards across borders and prioritized advancements which will ultimately dictate the terms of future conditions for the United Arab Emirate transport industry. Based on our findings and analysis at every stage of current viability and state-of-transport-affairs, we postulate policy recommendations to local governmental entities from a supply and demand perspective covering aspects of technology, infrastructure requirements, change in power dynamics, end user incentives program, market regulators behavior and communications amongst key stakeholders. 

Keywords: electric vehicles, greenhouse gas emission reductions, market analysis, policy recommendations

Procedia PDF Downloads 284
256 Modification Encryption Time and Permutation in Advanced Encryption Standard Algorithm

Authors: Dalal N. Hammod, Ekhlas K. Gbashi

Abstract:

Today, cryptography is used in many applications to achieve high security in data transmission and in real-time communications. AES has long gained global acceptance and is used for securing sensitive data in various industries but has suffered from slow processing and take a large time to transfer data. This paper suggests a method to enhance Advance Encryption Standard (AES) Algorithm based on time and permutation. The suggested method (MAES) is based on modifying the SubByte and ShiftRrows in the encryption part and modification the InvSubByte and InvShiftRows in the decryption part. After the implementation of the proposal and testing the results, the Modified AES achieved good results in accomplishing the communication with high performance criteria in terms of randomness, encryption time, storage space, and avalanche effects. The proposed method has good randomness to ciphertext because this method passed NIST statistical tests against attacks; also, (MAES) reduced the encryption time by (10 %) than the time of the original AES; therefore, the modified AES is faster than the original AES. Also, the proposed method showed good results in memory utilization where the value is (54.36) for the MAES, but the value for the original AES is (66.23). Also, the avalanche effects used for calculating diffusion property are (52.08%) for the modified AES and (51.82%) percentage for the original AES.

Keywords: modified AES, randomness test, encryption time, avalanche effects

Procedia PDF Downloads 217
255 Tsunami Vulnerability of Critical Infrastructure: Development and Application of Functions for Infrastructure Impact Assessment

Authors: James Hilton Williams

Abstract:

Recent tsunami events, including the 2011 Tohoku Tsunami, Japan, and the 2015 Illapel Tsunami, Chile, have highlighted the potential for tsunami impacts on the built environment. International research in the tsunami impacts domain has been largely focused toward impacts on buildings and casualty estimations, while only limited attention has been placed on the impacts on infrastructure which is critical for the recovery of impacted communities. New Zealand, with 75% of the population within 10 km of the coast, has a large amount of coastal infrastructure exposed to local, regional and distant tsunami sources. To effectively manage tsunami risk for New Zealand critical infrastructure, including energy, transportation, and communications, the vulnerability of infrastructure networks and components must first be determined. This research develops infrastructure asset vulnerability, functionality and repair- cost functions based on international post-event tsunami impact assessment data from technologically similar countries, including Japan and Chile, and adapts these to New Zealand. These functions are then utilized within a New Zealand based impact framework, allowing for cost benefit analyses, effective tsunami risk management strategies and mitigation options for exposed critical infrastructure to be determined, which can also be applied internationally.

Keywords: impact assessment, infrastructure, tsunami impacts, vulnerability functions

Procedia PDF Downloads 128
254 Importance of E-Participation by U-Society in the Development of the U-City

Authors: Jalaluddin Abdul Malek, Mohd Asruladlyi Ibrahim, Zurinah Tahir

Abstract:

This paper is to reveal developments in the areas of urban technology in Malaysia. Developments occur intend to add value intelligent city development to the ubiquitous city (U-city) or smart city. The phenomenon of change is called the development of post intelligent cities. U-City development discourse is seen from the perspective of the philosophy of the virtuous city organized by al-Farabi. The prosperity and perfection of a city is mainly caused by human personality factors, as well as its relationship with material and technological aspects of the city. The question is, to what extent to which human factors are taken into account in the concept of U-City as an added value to the intelligent city concept to realize the prosperity and perfection of the city? Previously, the intelligent city concept was developed based on global change and ICT movement, while the U-city added value to the development of intelligent cities and focused more on the development of information and communications technology (ICT). Value added is defined as the use of fiber optic technology that is wired to the use of wireless technology, such as wireless broadband. In this discourse, the debate on the concept of U-City is to the symbiosis between the U-City and the importance of local human e-participation (U-Society) for prosperity. In the context of virtuous city philosophy, it supports the thought of symbiosis so the concept of U-City can achieve sustainability, prosperity and perfection of the city.

Keywords: smart city, ubiquitous city, u-society, e-participation, prosperity

Procedia PDF Downloads 245
253 Review of the Legislative and Policy Issues in Promoting Infrastructure Development to Promote Automation in Telecom Industry

Authors: Marvin Ricardo Awarab

Abstract:

There has never been a greater need for telecom services. The Internet of Things (IoT), 5G networking, and edge computing are the driving forces behind this increased demand. The fierce demand offers communications service providers significant income opportunities. The telecom sector is centered on automation, and realizing a digital operation that functions as a real-time business will be crucial for the industry as a whole. Automation in telecom refers to the application of technology to create a more effective, quick, and scalable alternative to the conventional method of operating the telecom industry. With the promotion of 5G and the Internet of Things (IoT), telecom companies will continue to invest extensively in telecom automation technology. Automation offers benefits in the telecom industry; developing countries such as Namibia may not fully tap into such benefits because of the lack of funds and infrastructural resources to invest in automation. This paper fully investigates the benefits of automation in the telecom industry. Furthermore, the paper identifies hiccups that developing countries such as Namibia face in their quest to fully introduce automation in the telecom industry. Additionally, the paper proposes possible avenues that Namibia, as a developing country, adopt investing in automation infrastructural resources with the aim of reaping the full benefits of automation in the telecom industry.

Keywords: automation, development, internet, internet of things, network, telecom, telecommunications policy, 5G

Procedia PDF Downloads 32
252 Effects of Smartphone Social Applications on Elderly People’s Quality of Life

Authors: Seyed Ebrahim Hosseini, Shahbaz Pervez

Abstract:

As people go through aging, maintenance and improvement of the quality of life become more important for them. To know the role of smartphone technology and communications applications on quality of life, a sample group of old people living in Dar-Iran was selected for a quasi-experimental study. The participants were registered senior inhabitants from public health centers in Dar, Iran in 2022. The number of participants was 39. Participants were randomly categorized into intervention and control groups. A validated Persian version of the Control, Autonomy, Self-realisation, Pleasure scale (CASP-19) scale questionnaire was provided for them which answers were used for the quality of life assessment. The paired t-test between pre-and post-test (t= -8.45, p<.00), post-and follow-up-test (t= -2.12, p=.01), and pre-test and the follow-up test (t= -8.27, p<.00) in the intervention group revealed a considerable mean difference. Based on the results of paired t-test for the control group, this was not significant between pre-test and post-test (t= 1.26, p=.15), post-test and follow-up test (t= .33, p=.67) and pre-test and follow-up test (t= 1.85, p=.08) for quality of life. Considering the educational training associated with it, this study aimed at helping families and aging field practitioners to understand the essentiality of modern communication technology teaching in promoting a greater life quality of the elderly’s community.

Keywords: Iranian elderly, quality of life, smartphone, social applications, CASP-19

Procedia PDF Downloads 115
251 Protection of Minor's Privacy in Bosnian Herzegovinian Media (Legal Regulation and Current Media Reporting)

Authors: Ilija Musa

Abstract:

Positive legal regulation of juvenile privacy protection, current state of showing a child in BH media and possibilities of a child’s privacy protection by more adequate media legislature which should be arranged in accordance to recommendations of the UN Committee on the Rights of the Child for Bosnia and Herzegovina. Privacy of the minors in Bosnian-Herzegovinian media is insufficiently legally arranged. Due to the fact that there is no law on media area arrangement at the state level, electronic media are under jurisdiction of Communications regulatory agency, which at least partially, regulated the sector of radio and television broadcasting by adequate protection of child’s privacy. However, print and online media are under jurisdiction of non-governmental association Print and online media council in B&H which is not authorized to punish violators of this body’s Codex, what points out the necessity of passing the unique media law which would enable sanctioning the child’s privacy violation. The analysis of media content, which is a common violation of the child's privacy, analysis of positive legislation which regulates the media, confirmed the working hypothesis by which the minor’s protection policy in BH media is not protected at the appropriate level. Taking this into consideration, in the conclusion of this article the author gives recommendations for the regulation of legal protection of minor’s privacy in BH media.

Keywords: children, media, legislation, privacy protection, Bosnia Herzegovina

Procedia PDF Downloads 465