Search results for: internet protocol address (IP address)
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 5305

Search results for: internet protocol address (IP address)

5125 Internet of Things Applications on Supply Chain Management

Authors: Beatriz Cortés, Andrés Boza, David Pérez, Llanos Cuenca

Abstract:

The Internet of Things (IoT) field is been applied in industries with different purposes. Sensing Enterprise (SE) is an attribute of an enterprise or a network that allows it to react to business stimuli originating on the internet. These fields have come into focus recently on the enterprises and there is some evidence of the use and implications in supply chain management while finding it as an interesting aspect to work on. This paper presents a revision and proposals of IoT applications in supply chain management.

Keywords: industrial, internet of things, production systems, sensing enterprises, sensor, supply chain management

Procedia PDF Downloads 385
5124 Simulation of a Cost Model Response Requests for Replication in Data Grid Environment

Authors: Kaddi Mohammed, A. Benatiallah, D. Benatiallah

Abstract:

Data grid is a technology that has full emergence of new challenges, such as the heterogeneity and availability of various resources and geographically distributed, fast data access, minimizing latency and fault tolerance. Researchers interested in this technology address the problems of the various systems related to the industry such as task scheduling, load balancing and replication. The latter is an effective solution to achieve good performance in terms of data access and grid resources and better availability of data cost. In a system with duplication, a coherence protocol is used to impose some degree of synchronization between the various copies and impose some order on updates. In this project, we present an approach for placing replicas to minimize the cost of response of requests to read or write, and we implement our model in a simulation environment. The placement techniques are based on a cost model which depends on several factors, such as bandwidth, data size and storage nodes.

Keywords: response time, query, consistency, bandwidth, storage capacity, CERN

Procedia PDF Downloads 247
5123 The Use of the Social Media as a Propaganda Tool from the Political Parties in Europe against the Immigrants

Authors: Gülbuğ Erol, Caner Çakı

Abstract:

In Europe, it is seen that the immigrant population has increased in recent years. The rapid increase in the immigrant population has led to that some extreme right-wing parties increased their harsh discourse against the immigrants in Europe. In particular, it is seen that some right-wing parties in some European countries have demanded that the immigrant population could be controlled in the countries they are in, and even those immigrants should be removed from their countries. In this process, it is seen that these parties have effectively used social media platforms in the propaganda activities carried out for immigrants in recent years. In particular, the social media has great advantages in that these parties can address to the entire population in the country, apart from the limited masses that political parties address. How these political parties benefit from these advantages has great importance for the political parties to demonstrate their influence in political arena. In this study, it was tried to investigate how and why the extreme right-wing parties in Europe have used social media in their propaganda activities towards immigrant populations in Europe. For this purpose, the political parties of the three German-speaking countries in Europe were elected; Die Nationaldemokratische Partei Deutschlands (NPD) from Germany, Die Freiheitliche Partei Österreichs (FPÖ) from Austria, Die Schweizerische Volkspartei (SVP) from Switzerland. As social media platform, only their Facebook accounts were analyzed in this study. Accounts The political parties selected were examined with content analysis, and that social media was effectively used by extreme right-wing parties for propaganda purposes towards immigrants in Europe revealed.In this process, it is seen that these parties have effectively used social media platforms in the propaganda activities carried out for immigrants in recent years. In particular, the social media has great advantages in that these parties can address to the entire population in the country, apart from the limited masses that political parties address. How these political parties benefit from these advantages has great importance for the political parties to demonstrate their influence in political arena. In Europe, it is seen that the immigrant population has increased in recent years. The rapid increase in the immigrant population has led to that some extreme right-wing parties increased their harsh discourse against the immigrants in Europe. In particular, it is seen that some right-wing parties in some European countries have demanded that the immigrant population should be controlled in the countries they are in, and even those immigrants should be removed from their countries. In this process, it is seen that these parties have effectively used social media platforms in the propaganda activities carried out for immigrants in recent years. In particular, the social media has great advantages in that these parties can address to the entire population in the country, apart from the limited masses that political parties address. How these political parties benefit from these advantages has great importance for the political parties to demonstrate their influence in political arena. In this study, it was tried to investigate how and why the extreme right-wing parties in Europe have used social media in their propaganda activities towards immigrant populations in Europe. For this purpose, the political parties of the three German-speaking countries in Europe were elected; Die Nationaldemokratische Partei Deutschlands (NPD) from Germany, Die Freiheitliche Partei Österreichs (FPÖ) from Austria, Die Schweizerische Volkspartei (SVP) from Switzerland. As social media platform, only their Facebook accounts were analyzed in this study. Accounts The political parties selected were examined with content analysis and that social media was effectively used by extreme right-wing parties for propaganda purposes towards immigrants in Europe revealed.

Keywords: content analysis, political parties, propaganda, social media

Procedia PDF Downloads 380
5122 An Overview of Privacy and Security Issues in Social Networks

Authors: Mohamad Ibrahim Al Ladan

Abstract:

Social networks, such as Facebook, Myspace, LinkedIn, Google+, and Twitter have experienced exponential growth and a remarkable adoption rate in recent years. They provide attractive means of online social interactions and communications with family, friends, and colleagues from around the corner or across the globe, and they have become an important part of daily digital interactions for more than one and a half billion users around the world. The various personal information sharing practices that social network providers encourage have led to their success as innovative social interaction platforms. However, these practices have resulted in ample concerns with respect to privacy and security from different stakeholders. Addressing these privacy and security concerns in social networks is a must for these networks to be sustainable. Existing security and privacy tools may not be enough to address existing concerns. Some guidelines should be followed to protect users from the existing risks. In this paper, we have investigated and discussed the various privacy and security issues and concerns pertaining to social networks. Moreover, we have classified these privacy and security issues and presented a thorough discussion of the implications of these issues and concerns on the future of the social networks. In addition, we have presented a set of guidelines as precaution measures that users can consider to address these issues and concerns.

Keywords: social networks privacy issues, social networks security issues, social networks privacy precautions measures, social networks security precautions measures

Procedia PDF Downloads 272
5121 An Analytical Approach for Medication Protocol Errors from Pediatric Nurse Curriculum

Authors: Priyanka Jani

Abstract:

The main focus of this research is to consider the objective of nursing curriculum in concern with pediatric nurses in respect to various parameters such as causes, reporting and prevention of medication protocol errors. A design or method selected for the study is the descriptive and cross sectional with respect to analytical study. Nurses were selected from inpatient pediatric wards of 5 hospitals in Gujarat, as a population. 126 pediatric nurses gave approval to participate in the research and completed with quarter questionnaires. The actual data was collected and analyzed. The actual data was collected and analyzed. The medium age of the nurses was 25.7 ± 3.68 years; the maximum was lady (97.6%) pediatric nurses stated that the most common causes of medication protocol errors were large work time (69.2%) and a huge ratio of patient: nurse (59.9%). Even though the highest number of nurses (89%) made use of a medication protocol errors notification system, or else they use to check it before. Many errors were not reported and nurses cited abeyant claims of nurses in case of adverse and opposite output for patient (53.97%), distrust (52.45%), and fear of various/different protocol for mediations (42%) among the causes of insufficient of notification in concern to ignorance, nurses most commonly noted the requirement for efficient data concerning the safe use of medications (47.5%). This is the frequent study made by researcher in Gujarat about the pediatric nurse curriculum regarding medication protocol errors. The outputs debate that there is a requirement for ongoing coaching of pediatric nurses regarding safe & secure medication observation and that the causes and post reporting of medication protocol errors by hand further survey.

Keywords: pediatric, medication, protocol, errors

Procedia PDF Downloads 270
5120 Utilizing IoT for Waste Collection: A Review of Technologies for Eco-Friendly Waste Management

Authors: Fatemehsadat Mousaviabarbekouh

Abstract:

Population growth and changing consumption patterns have led to waste management becoming a significant global challenge. With projections indicating that nearly 67% of the Earth's population will live in megacities by 2050, there is a pressing need for smart solutions to address citizens' demands. Waste collection, facilitated by the Internet of Things (IoT), offers an efficient and cost-effective approach. This study aims to review the utilization of IoT for waste collection and explore technologies that promote eco-friendly waste management. The research focuses on information and communication technologies (ICTs), including spatial, identification, acquisition, and data communication technologies. Additionally, the study examines various energy harvesting technologies to further reduce costs. The findings indicate that the application of these technologies can lead to significant cost savings, energy efficiency, and ultimately reshape the future of waste management.

Keywords: waste collection, IoT, smart cities, eco-friendly, information and communication technologies, energy harvesting

Procedia PDF Downloads 69
5119 Automated Natural Hazard Zonation System with Internet-SMS Warning: Distributed GIS for Sustainable Societies Creating Schema and Interface for Mapping and Communication

Authors: Devanjan Bhattacharya, Jitka Komarkova

Abstract:

The research describes the implementation of a novel and stand-alone system for dynamic hazard warning. The system uses all existing infrastructure already in place like mobile networks, a laptop/PC and the small installation software. The geospatial dataset are the maps of a region which are again frugal. Hence there is no need to invest and it reaches everyone with a mobile. A novel architecture of hazard assessment and warning introduced where major technologies in ICT interfaced to give a unique WebGIS based dynamic real time geohazard warning communication system. A never before architecture introduced for integrating WebGIS with telecommunication technology. Existing technologies interfaced in a novel architectural design to address a neglected domain in a way never done before–through dynamically updatable WebGIS based warning communication. The work publishes new architecture and novelty in addressing hazard warning techniques in sustainable way and user friendly manner. Coupling of hazard zonation and hazard warning procedures into a single system has been shown. Generalized architecture for deciphering a range of geo-hazards has been developed. Hence the developmental work presented here can be summarized as the development of internet-SMS based automated geo-hazard warning communication system; integrating a warning communication system with a hazard evaluation system; interfacing different open-source technologies towards design and development of a warning system; modularization of different technologies towards development of a warning communication system; automated data creation, transformation and dissemination over different interfaces. The architecture of the developed warning system has been functionally automated as well as generalized enough that can be used for any hazard and setup requirement has been kept to a minimum.

Keywords: geospatial, web-based GIS, geohazard, warning system

Procedia PDF Downloads 370
5118 Embedding the Dimensions of Sustainability into City Information Modelling

Authors: Ali M. Al-Shaery

Abstract:

The purpose of this paper is to address the functions of sustainability dimensions in city information modelling and to present the required sustainability criteria that support establishing a sustainable planning framework for enhancing existing cities and developing future smart cities. The paper is divided into two sections. The first section is based on the examination of a wide and extensive array of cross-disciplinary literature in the last decade and a half to conceptualize the terms ‘sustainable’ and ‘smart city,' and map their associated criteria to city information modelling. The second section is based on analyzing two approaches relating to city information modelling, namely statistical and dynamic approaches, and their suitability in the development of cities’ action plans. The paper argues that the use of statistical approaches to embedding sustainability dimensions in city information modelling have limited value. Despite the popularity of such approaches in addressing other dimensions like utility and service management in development and action plans of the world cities, these approaches are unable to address the dynamics across various city sectors with regards to economic, environmental and social criteria. The paper suggests an integrative dynamic and cross-disciplinary planning approach to embedding sustainability dimensions in city information modelling frameworks. Such an approach will pave the way towards optimal planning and implementation of priority actions of projects and investments. The approach can be used to achieve three main goals: (1) better development and action plans for world cities (2) serve the development of an integrative dynamic and cross-disciplinary framework that incorporates economic, environmental and social sustainability criteria and (3) address areas that require further attention in the development of future sustainable and smart cities. The paper presents an innovative approach for city information modelling and a well-argued, balanced hierarchy of sustainability criteria that can contribute to an area of research which is still in its infancy in terms of development and management.

Keywords: information modelling, smart city, sustainable city, sustainability dimensions, sustainability criteria, city development planning

Procedia PDF Downloads 297
5117 Tracing Back the Bot Master

Authors: Sneha Leslie

Abstract:

The current situation in the cyber world is that crimes performed by Botnets are increasing and the masterminds (botmaster) are not detectable easily. The botmaster in the botnet compromises the legitimate host machines in the network and make them bots or zombies to initiate the cyber-attacks. This paper will focus on the live detection of the botmaster in the network by using the strong framework 'metasploit', when distributed denial of service (DDOS) attack is performed by the botnet. The affected victim machine will be continuously monitoring its incoming packets. Once the victim machine gets to know about the excessive count of packets from any IP, that particular IP is noted and details of the noted systems are gathered. Using the vulnerabilities present in the zombie machines (already compromised by botmaster), the victim machine will compromise them. By gaining access to the compromised systems, applications are run remotely. By analyzing the incoming packets of the zombies, the victim comes to know the address of the botmaster. This is an effective and a simple system where no specific features of communication protocol are considered.

Keywords: bonet, DDoS attack, network security, detection system, metasploit framework

Procedia PDF Downloads 224
5116 Importance of Ethics in Cloud Security

Authors: Pallavi Malhotra

Abstract:

This paper examines the importance of ethics in cloud computing. In the modern society, cloud computing is offering individuals and businesses an unlimited space for storing and processing data or information. Most of the data and information stored in the cloud by various users such as banks, doctors, architects, engineers, lawyers, consulting firms, and financial institutions among others require a high level of confidentiality and safeguard. Cloud computing offers centralized storage and processing of data, and this has immensely contributed to the growth of businesses and improved sharing of information over the internet. However, the accessibility and management of data and servers by a third party raise concerns regarding the privacy of clients’ information and the possible manipulations of the data by third parties. This document suggests the approaches various stakeholders should take to address various ethical issues involving cloud-computing services. Ethical education and training is key to all stakeholders involved in the handling of data and information stored or being processed in the cloud.

Keywords: IT ethics, cloud computing technology, cloud privacy and security, ethical education

Procedia PDF Downloads 303
5115 Effect of Common Yoga Protocol on Reaction Time of Football Players

Authors: Vikram Singh

Abstract:

The objective of the study was to study the effectiveness of common yoga protocol on reaction time (simple visual reaction time-SVRT measured in milliseconds/seconds) of male football players in the age group of 15 to 21 years. The 40 boys were randomly assigned into two groups i.e. control and experimental. SVRT for both the groups were measured on day-1 and post intervention (common yoga protocol here) was measured after 45 days of training to the experimental group only. One way ANOVA (Univariate analysis) and Independent t-test using SPSS 23 statistical package was applied to get and analyze the results. There was a significant difference after 45 days of yoga protocol in simple visual reaction time of experimental group (p = .032), t (33.05) = 3.881, p = .000 (two-tailed). Null hypothesis (that there would be no post measurement differences in reaction times of control and experimental groups) was rejected. Where p<.05. Therefore alternate hypothesis was accepted.

Keywords: footballers, t-test, yoga protocol, reaction time

Procedia PDF Downloads 229
5114 Emerging Research Trends in Routing Protocol for Wireless Sensor Network

Authors: Subhra Prosun Paul, Shruti Aggarwal

Abstract:

Now a days Routing Protocol in Wireless Sensor Network has become a promising technique in the different fields of the latest computer technology. Routing in Wireless Sensor Network is a demanding task due to the different design issues of all sensor nodes. Network architecture, no of nodes, traffic of routing, the capacity of each sensor node, network consistency, service value are the important factor for the design and analysis of Routing Protocol in Wireless Sensor Network. Additionally, internal energy, the distance between nodes, the load of sensor nodes play a significant role in the efficient routing protocol. In this paper, our intention is to analyze the research trends in different routing protocols of Wireless Sensor Network in terms of different parameters. In order to explain the research trends on Routing Protocol in Wireless Sensor Network, different data related to this research topic are analyzed with the help of Web of Science and Scopus databases. The data analysis is performed from global perspective-taking different parameters like author, source, document, country, organization, keyword, year, and a number of the publication. Different types of experiments are also performed, which help us to evaluate the recent research tendency in the Routing Protocol of Wireless Sensor Network. In order to do this, we have used Web of Science and Scopus databases separately for data analysis. We have observed that there has been a tremendous development of research on this topic in the last few years as it has become a very popular topic day by day.

Keywords: analysis, routing protocol, research trends, wireless sensor network

Procedia PDF Downloads 185
5113 Role of Community Based Forest Management to Address Climate Change Problem: A Case of Nepalese Community Forestry

Authors: Bikram Jung Kunwar

Abstract:

Forests have central roles in climate change. The conservation of forests sequestrates the carbon from the atmosphere and also regulates the carbon cycle. However, knowingly and unknowingly the world’s forests were deforested and degraded annually at the rate of 0.18% and emitted the carbon to the atmosphere. The IPCC reports claimed that the deforestation and forest degradation accounts 1/5th of total carbon emission, which is second position after fossil fuels. Since 1.6 billion people depend on varying degree on forests for their daily livelihood, not all deforestation are undesirable. Therefore, to conserve the forests and find the livelihood opportunities for forest surrounding people is prerequisites to address the climate change problems especially in developing countries, and also a growing concern to the forestry sector researchers, planners and policy makers. The study examines the role of community based forest management in carbon mitigation and adaptation taking the examples of Nepal’s community forestry program. In the program, the government hands over a part of national forests to the local communities with sole forest management authorities. However, the government itself retained the ownership rights of forestland. Local communities organized through a local institution called Community Forest User Group (CFUG) managed the forests. They also formed an operational plan with technical prescriptions and a constitution with forest management rules and regulations. The implementation results showed that the CFUGs are not only found effective to organize the local people and construct a local institution to forest conservation and management activities, but also they are able to collect a community fund from the sale of forest products and carried out various community development activities. These development activities have decisive roles to improve the livelihood of forest surrounding people and eventually to address the climate change problems.

Keywords: climate change, community forestry, local institution, Nepal

Procedia PDF Downloads 269
5112 English as a Foreign Language Students’ Perceptions towards the British Culture: The Case of Batna 2 University, Algeria

Authors: Djelloul Nedjai

Abstract:

The issue of cultural awareness triggers many controversies, especially in a context where individuals do not share the same cultural backgrounds and characteristics. The Algerian context is no exception. It has been widely documented by the literature that culture remains essential in many domains. In higher education, for instance, culture plays a pivotal role in shaping individuals’ perceptions and attitudes. Henceforth, the current paper attempts to look at the perceptions of the British culture held by students engaged in learning English as a Foreign Language (EFL) at the department of English at Banta 2 University, Algeria. It also inquires into EFL students’ perceptions of British culture. To address the aforementioned research queries, a descriptive study has been carried out wherein a questionnaire of fifteen (15) items has been deployed to collect students’ attitudes and perceptions toward British culture. Results showcase that, indeed, EFL students of the department of English at Banta 2 University hold both positive and negative perceptions towards British culture at different levels. The explanation could relate to the student's lack of acquaintance with and awareness of British culture. Consequently, this paper is an attempt to address the issue of cultural awareness from the perspective of EFL students.

Keywords: British culture, cultural awareness, EFL students’ perceptions, higher education

Procedia PDF Downloads 54
5111 The Effect of Ethylene Glycol on Cryopreserved Bovine Oocytes

Authors: Sri Wahjuningsih, Nur Ihsan, Hadiah

Abstract:

In the embryo transfer program, to address the limited production of embryos in vivo, in vitro embryo production has become an alternative approach that is relatively inexpensive. One potential source of embryos that can be developed is to use immature oocytes then conducted in vitro maturation and in vitro fertilization. However, obstacles encountered were oocyte viability mammals have very limited that it cannot be stored for a long time, so we need oocyte cryopreservation. The research was conducted to know the optimal concentration use of ethylene glycol as a cryoprotectant on oocytes freezing.Material use in this research was immature oocytes; taken from abbatoir which was aspirated from follicle with diameter 2-6 mm. Concentration ethylen glycol used were 0,5 M, I M, 1,5 M and 2M. The freezing method used was conventional method combined with a five-step protocol washing oocytes from cryoprotectant after thawing. The result showed that concentration ethylen glycol have the significant effect (P<0.05) on oocytes quality after thawing and in vitro maturation. It was concluded that concentration 1,5 M was the best concentration for freezing oocytes using conventional method.

Keywords: bovine, conventional freezing, ethylen glycol, oocytes

Procedia PDF Downloads 326
5110 A Genetic Algorithm Based Sleep-Wake up Protocol for Area Coverage in WSNs

Authors: Seyed Mahdi Jameii, Arash Nikdel, Seyed Mohsen Jameii

Abstract:

Energy efficiency is an important issue in the field of Wireless Sensor Networks (WSNs). So, minimizing the energy consumption in this kind of networks should be an essential consideration. Sleep/wake scheduling mechanism is an efficient approach to handling this issue. In this paper, we propose a Genetic Algorithm-based Sleep-Wake up Area Coverage protocol called GA-SWAC. The proposed protocol puts the minimum of nodes in active mode and adjusts the sensing radius of each active node to decrease the energy consumption while maintaining the network’s coverage. The proposed protocol is simulated. The results demonstrate the efficiency of the proposed protocol in terms of coverage ratio, number of active nodes and energy consumption.

Keywords: wireless sensor networks, genetic algorithm, coverage, connectivity

Procedia PDF Downloads 486
5109 An Application Framework for Integrating Wireless Sensor and Actuator Networks for Precision Farmingas Web of Things to Cloud Interface Using PaaS

Authors: Sumaya Ismail, Aijaz Ahmad Reshi

Abstract:

The advances in sensor and embedded technologies have led to rapid developments in Wireless Sensor Networks (WSNs). Presently researchers focus on the integration of WSNs to the Internet for their pervasive availability to access these network resources as the interoperable subsystems. The recent computing technologies like cloud computing has made resource sharing as a converged infrastructure with required service interfaces for the shared resources over the Internet. This paper presents application architecture for wireless Sensor and Actuator Networks (WSANS) following web of things, which allows easy integration of each node to the Internet in order to provide them with web accessibility. The architecture enables the sensors and actuator nodes accessed and controlled using cloud interface on WWW. The application architecture was implemented using existing web and its emerging technologies. In particular, the Representational State Transfer protocol (REST) was extended for the specific requirements of the application. The Cloud computing environment has been used as a development platform for the application to assess the possibility of integrating the WSAN nodes to Cloud services. The mushroom farm environment monitoring and control using WSANs has been taken as a research use case.

Keywords: WSAN, REST, web of things, ZigBee, cloud interface, PaaS, sensor gateway

Procedia PDF Downloads 67
5108 Key Transfer Protocol Based on Non-invertible Numbers

Authors: Luis A. Lizama-Perez, Manuel J. Linares, Mauricio Lopez

Abstract:

We introduce a method to perform remote user authentication on what we call non-invertible cryptography. It exploits the fact that the multiplication of an invertible integer and a non-invertible integer in a ring Zn produces a non-invertible integer making infeasible to compute factorization. The protocol requires the smallest key size when is compared with the main public key algorithms as Diffie-Hellman, Rivest-Shamir-Adleman or Elliptic Curve Cryptography. Since we found that the unique opportunity for the eavesdropper is to mount an exhaustive search on the keys, the protocol seems to be post-quantum.

Keywords: invertible, non-invertible, ring, key transfer

Procedia PDF Downloads 136
5107 Non-Interactive XOR Quantum Oblivious Transfer: Optimal Protocols and Their Experimental Implementations

Authors: Lara Stroh, Nikola Horová, Robert Stárek, Ittoop V. Puthoor, Michal Mičuda, Miloslav Dušek, Erika Andersson

Abstract:

Oblivious transfer (OT) is an important cryptographic primitive. Any multi-party computation can be realised with OT as a building block. XOR oblivious transfer (XOT) is a variant where the sender Alice has two bits, and a receiver, Bob, obtains either the first bit, the second bit, or their XOR. Bob should not learn anything more than this, and Alice should not learn what Bob has learned. Perfect quantum OT with information-theoretic security is known to be impossible. We determine the smallest possible cheating probabilities for unrestricted dishonest parties in non-interactive quantum XOT protocols using symmetric pure states and present an optimal protocol which outperforms classical protocols. We also "reverse" this protocol so that Bob becomes the sender of a quantum state and Alice the receiver who measures it while still implementing oblivious transfer from Alice to Bob. Cheating probabilities for both parties stay the same as for the unreversed protocol. We optically implemented both the unreversed and the reversed protocols and cheating strategies, noting that the reversed protocol is easier to implement.

Keywords: oblivious transfer, quantum protocol, cryptography, XOR

Procedia PDF Downloads 79
5106 The Current Status of Middle Class Internet Use in China: An Analysis Based on the Chinese General Social Survey 2015 Data and Semi-Structured Investigation

Authors: Abigail Qian Zhou

Abstract:

In today's China, the well-educated middle class, with stable jobs and above-average income, are the driving force behind its Internet society. Through the analysis of data from the 2015 Chinese General Social Survey and 50 interviewees, this study investigates the current situation of this group’s specific internet usage. The findings of this study demonstrate that daily life among the members of this socioeconomic group is closely tied to the Internet. For Chinese middle class, the Internet is used to socialize and entertain self and others. It is also used to search for and share information as well as to build their identities. The empirical results of this study will provide a reference, supported by factual data, for enterprises seeking to target the Chinese middle class through online marketing efforts.

Keywords: middle class, Internet use, network behaviour, online marketing, China

Procedia PDF Downloads 89
5105 Internet Purchases in European Union Countries: Multiple Linear Regression Approach

Authors: Ksenija Dumičić, Anita Čeh Časni, Irena Palić

Abstract:

This paper examines economic and Information and Communication Technology (ICT) development influence on recently increasing Internet purchases by individuals for European Union member states. After a growing trend for Internet purchases in EU27 was noticed, all possible regression analysis was applied using nine independent variables in 2011. Finally, two linear regression models were studied in detail. Conducted simple linear regression analysis confirmed the research hypothesis that the Internet purchases in analysed EU countries is positively correlated with statistically significant variable Gross Domestic Product per capita (GDPpc). Also, analysed multiple linear regression model with four regressors, showing ICT development level, indicates that ICT development is crucial for explaining the Internet purchases by individuals, confirming the research hypothesis.

Keywords: European union, Internet purchases, multiple linear regression model, outlier

Procedia PDF Downloads 277
5104 A Survey on Traditional Mac Layer Protocols in Cognitive Wireless Mesh Networks

Authors: Anusha M., V. Srikanth

Abstract:

Maximizing spectrum usage and numerous applications of the wireless communication networks have forced to a high interest of available spectrum. Cognitive Radio control its receiver and transmitter features exactly so that they can utilize the vacant approved spectrum without impacting the functionality of the principal licensed users. The Use of various channels assists to address interferences thereby improves the whole network efficiency. The MAC protocol in cognitive radio network explains the spectrum usage by interacting with multiple channels among the users. In this paper we studied about the architecture of cognitive wireless mesh network and traditional TDMA dependent MAC method to allocate channels dynamically. The majority of the MAC protocols suggested in the research are operated on Common-Control-Channel (CCC) to handle the services between Cognitive Radio secondary users. In this paper, an extensive study of Multi-Channel Multi-Radios or frequency range channel allotment and continually synchronized TDMA scheduling are shown in summarized way.

Keywords: TDMA, MAC, multi-channel, multi-radio, WMN’S, cognitive radios

Procedia PDF Downloads 523
5103 Stakeholders Perspectives on the Social Determinants of Health and Quality of Life in Aseer Healthy Cities

Authors: Metrek Almetrek, Naser Alqahtani, Eisa Ghazwani, Mona Asiri, Mohammed Alqahtani, Magboolah Balobaid

Abstract:

Background: Advocacy of potential for community coalitions to positively address social determinants of health and quality of life, little is known about the views of stakeholders involved in such efforts. This study sought to assess the provinces leaders’ perspectives about social determinants related to the Health Neighborhood Initiative (HNI), a new county effort to support community coalitions. Method and Subjects: We used a descriptive, qualitative study using personal interviews in 2022. We conducted it in the community coalition's “main cities committees” set across service planning areas that serve vulnerable groups located in the seven registered healthy cities to WHO (Abha, Tareeb, Muhayel, Balqarn, Alharajah, Alamwah, and Bisha). We conducted key informant interviews with 76 governmental, profit, non-profit, and community leaders to understand their perspectives about the HNI. As part of a larger project, this study focused on leaders’ views about social determinants of health related to the HNI. All interviews were audio-recorded and transcribed. An inductive approach to coding was used, with text segments grouped by social determinant categories. Results: Provinces leaders described multiple social determinants of health and quality of life that were relevant to the HNI community coalitions: housing and safety, community violence, economic stability, city services coordination and employment and education. Leaders discussed how social determinants were interconnected with each other and the need for efforts to address multiple social determinants simultaneously to effectively improve health and quality of life. Conclusions: Community coalitions have an opportunity to address multiple social determinants of health and quality of life to meet the social needs of vulnerable groups. Future research should examine how community coalitions, like those in the HNI, can actively engage with community members to identify needs and then deliver evidence-based care.

Keywords: social determinants, health and quality of life, vulnerable groups, qualitative research

Procedia PDF Downloads 54
5102 Ubuntu: A Holistic Social Framework for Preserving Ecosystem Amidst the Climate Change Challenges

Authors: Gabriel Sunday Ayayia

Abstract:

The paper argues that Ubuntu, as a philosophy that emphasizes the interconnectedness of all living things and importance of community and mutual support, can be used as a social framework to address the problems of climate change and promote environmental sustainability. The research demonstrate that Ubuntu is an ideological concept that encourages collective action on climate change, with the emphasis on individual and collective commitment to taking concrete action to address the problems of climate change. The paper shows that Ubuntu can be employed as a social tool that would enhance the cultivation of shared identity and promote the sense of shared response responsibility to develop the resilience to cope with climate change. Using qualitative and quantitative methodologies, the study establishes the imperativeness of mutual support and cooperation through the lens of Ubuntu as a human-centered scalable response to the debacle of climate change. It recommends that we can build a society that values the environment and promotes sustainable practices by encouraging community involvement in sustainable initiatives by integrating Ubuntu-based principles to our decision-making processes, collaboration, leadership, human agency and governance.

Keywords: ubuntu, climate change, humanity, collective actions, community-based

Procedia PDF Downloads 143
5101 Community Development and Empowerment

Authors: Shahin Marjan Nanaje

Abstract:

The present century is the time that social worker faced complicated issues in the area of their work. All the focus are on bringing change in the life of those that they live in margin or live in poverty became the cause that we have forgotten to look at ourselves and start to bring change in the way we address issues. It seems that there is new area of needs that social worker should response to that. In need of dialogue and collaboration, to address the issues and needs of community both individually and as a group we need to have new method of dialogue as tools to reach to collaboration. The social worker as link between community, organization and government play multiple roles. They need to focus in the area of communication with new ability, to transfer all the narration of the community to those organization and government and vice versa. It is not relate only in language but it is about changing dialogue. Migration for survival by job seeker to the big cities created its own issues and difficulty and therefore created new need. Collaboration is not only requiring between government sector and non-government sectors but also it could be in new way between government, non-government and communities. To reach to this collaboration we need healthy, productive and meaningful dialogue. In this new collaboration there will not be any hierarchy between members. The methodology that selected by researcher were focusing on observation at the first place, and used questionnaire in the second place. Duration of the research was three months and included home visits, group discussion and using communal narrations which helped to bring enough evidence to understand real need of community. The sample selected randomly was included 70 immigrant families which work as sweepers in the slum community in Bangalore, Karnataka. The result reveals that there is a gap between what a community is and what organizations, government and members of society apart from this community think about them. Consequently, it is learnt that to supply any service or bring any change to slum community, we need to apply new skill to have dialogue and understand each other before providing any services. Also to bring change in the life of those marginal groups at large we need to have collaboration as their challenges are collective and need to address by different group and collaboration will be necessary. The outcome of research helped researcher to see the area of need for new method of dialogue and collaboration as well as a framework for collaboration and dialogue that were main focus of the paper. The researcher used observation experience out of ten NGO’s and their activities to create framework for dialogue and collaboration.

Keywords: collaboration, dialogue, community development, empowerment

Procedia PDF Downloads 561
5100 An Application Framework for Integrating Wireless Sensor and Actuator Networks for Precision Farming as Web of Things to Cloud Interface Using Platform as a Service

Authors: Sumaya Iqbal, Aijaz Ahmad Reshi

Abstract:

The advances in sensor and embedded technologies have led to rapid developments in Wireless Sensor Networks (WSNs). Presently researchers focus on the integration of WSNs to Internet for their pervasive availability to access these network resources as the interoperable subsystems. The recent computing technologies like cloud computing has made the resource sharing as a converged infrastructure with required service interfaces for the shared resources over the Internet. This paper presents application architecture for wireless Sensor and Actuator Networks (WSANS) following web of things, which allows easy integration of each node to the Internet in order to provide them web accessibility. The architecture enables the sensors and actuator nodes accessed and controlled using cloud interface on WWW. The application architecture was implemented using existing web and its emerging technologies. In particular Representational State Transfer protocol (REST) was extended for the specific requirements of the application. Cloud computing environment has been used as a development platform for the application to assess the possibility of integrating the WSAN nodes to Cloud services. The mushroom farm environment monitoring and control using WSANs has been taken as a research use case.

Keywords: WSAN, REST, web of things, ZigBee, cloud interface, PaaS, sensor gateway

Procedia PDF Downloads 91
5099 A Study of Human Communication in an Internet Community

Authors: Andrew Laghos

Abstract:

The Internet is a big part of our everyday lives. People can now access the internet from a variety of places including home, college, and work. Many airports, hotels, restaurants and cafeterias, provide free wireless internet to their visitors. Using technologies like computers, tablets, and mobile phones, we spend a lot of our time online getting entertained, getting informed, and communicating with each other. This study deals with the latter part, namely, human communication through the Internet. People can communicate with each other using social media, social network sites (SNS), e-mail, messengers, chatrooms, and so on. By connecting with each other they form virtual communities. Regarding SNS, types of connections that can be studied include friendships and cliques. Analyzing these connections is important to help us understand online user behavior. The method of Social Network Analysis (SNA) was used on a case study, and results revealed the existence of some useful patterns of interactivity between the participants. The study ends with implications of the results and ideas for future research.

Keywords: human communication, internet communities, online user behavior, psychology

Procedia PDF Downloads 476
5098 Growing Acts of Terrorism in Local Conflicts: A Dire Need for International Attention

Authors: Yusuf Abubakar Mamud

Abstract:

Highlighting the imperatives of local conflicts considering the dangerous dimensions of terrorism they are assuming in Africa has not attracted serious academic and political attention. The discourse about conflict in Africa was discussed within five identified conflict zones in the continent. The threats from these local conflicts are diverse and complex and the acts of terrorism in these local conflicts are driven by certain attitudes and behaviours linked to the African leadership. The paper examined and noted that the current conflict resolution model of the African Union (AU) was robust with requisite institutions to address the trends in local conflicts. However, it was observed that the AU peace and security framework lacked the requisite structural and technical capabilities to proactively address the drivers of local conflicts in Africa. It was found that the persistence of local conflicts in the African region may deny her the opportunities of achievement of the targets envisioned in the Sustainable Development Goals (SDGs). Consequently, the paper called on the international community to support Africa through provision of capacity. It urged the African leaders themselves to develop the political will to ensure that all issues concerning peace and security in the continent were guided by the provisions of the AU Constitutive Act. The need to strengthen the APRM in the light of the current trends in local conflicts was also highlighted.

Keywords: conflicts, local conflicts, terrorism, sustainable development

Procedia PDF Downloads 251
5097 Cross-Cultural Competence Development through 'Learning by Reflection': A Case Study of Chinese International Students Learning through Taking Part-Time Jobs in the UK

Authors: Xin Zhao

Abstract:

The project aims to expand the notion of narrative learning and address the importance of learning by reflection in our learning and teaching context at a British university. Drawing on the key concepts such as development ZPD, transition and reflection-in and –on-action, this project analyses the learning experiences of a small sample of Chinese postgraduate students in a British University, who use part-time job experience to develop cross-cultural communication skills. The project adopts a mixed methods approach. Questionnaires and focus group interviews are used to examine the way in which students adapt (or not adapt) to the culture of learning in a British university and develop a renewed sense of self in transitions from one culture to the other. The project also looks at how the students appropriate opportunities for learning not just from classrooms but outside classrooms from everyday encounters. The project aims to address the implication of learning by reflection as development in transition. Time in and for learning, or duration, is taken for granted in theorising narrative learning. The project shall explore this very issue of time in relation to learning by reflection in considering time in/of/for learning as duration.

Keywords: cross-cultural competence, learning by refection, international student transition, part-time work experience

Procedia PDF Downloads 162
5096 The Theory of Domination at the Bane of Conflict Resolution and Peace Building Processes in Cameroon

Authors: Nkatow Mafany Christian

Abstract:

According to UNHCR’s annual Database, humanitarian crises have globally been on the increase since the beginning of the 21st Century, especially in the Middle East and in Sub-Saharan Africa. Cameroon is one of the countries that has suffered tremendously from humanitarian challenges in recent years, especially with crises in the Far North, the East and its Two English-speaking Regions. These have been a result of failed mechanisms in conflict resolution peacebuilding by the government. The paper draws from this basic premise to argue that the failure to reach a consensus in order to curb internal conflicts has largely been due to the government’s attachment to the domineering attitude which emphasizes an imposition of peace terms by a superordinate (government) agency on the subordinate (aggrieved) entities. This has stalled peace efforts that have so far been engaged to address the dreaded armed conflicts in the North and South West Regions, leading to the persistence of the armed conflict. The paper exploits written, oral and online sources to sustain its argument. It suggests that an eclectic approach to resolving conflicts, which emphasizes open and frank dialogue as well as a review of the root causes, can go a long way not only to build trust but also to address the Anglophone-Cameroonian problems in Cameroon.

Keywords: conflict, conflict resolution, peace building, humanitarian crisis

Procedia PDF Downloads 38