Abstract: The nonlinear chaotic non-autonomous fourth order
system is algebraically simple but can generate complex chaotic
attractors. In this paper, non-autonomous fourth order chaotic
oscillator circuits were designed and simulated. Also chaotic nonautonomous
Attractor is addressed suitable for chaotic masking
communication circuits using Matlab® and MultiSIM® programs.
We have demonstrated in simulations that chaos can be synchronized
and applied to signal masking communications. We suggest that this
phenomenon of chaos synchronism may serve as the basis for little
known chaotic non-autonomous Attractor to achieve signal masking
communication applications. Simulation results are used to visualize
and illustrate the effectiveness of non-autonomous chaotic system in
signal masking. All simulations results performed on nonautonomous
chaotic system are verify the applicable of secure
communication.
Abstract: Traditionally, VLSI implementations of spiking
neural nets have featured large neuron counts for fixed computations
or small exploratory, configurable nets. This paper presents the
system architecture of a large configurable neural net system
employing a dedicated mapping algorithm for projecting the targeted
biology-analog nets and dynamics onto the hardware with its
attendant constraints.
Abstract: Inter-organizational Workflow (IOW) is commonly
used to support the collaboration between heterogeneous and
distributed business processes of different autonomous organizations
in order to achieve a common goal. E-government is considered as an
application field of IOW. The coordination of the different
organizations is the fundamental problem in IOW and remains the
major cause of failure in e-government projects. In this paper, we
introduce a new coordination model for IOW that improves the
collaboration between government administrations and that respects
IOW requirements applied to e-government. For this purpose, we
adopt a Multi-Agent approach, which deals more easily with interorganizational
digital government characteristics: distribution,
heterogeneity and autonomy. Our model integrates also different
technologies to deal with the semantic and technologic
interoperability. Moreover, it conserves the existing systems of
government administrations by offering a distributed coordination
based on interfaces communication. This is especially applied in
developing countries, where administrations are not necessary
equipped with workflow systems. The use of our coordination
techniques allows an easier migration for an e-government solution
and with a lower cost. To illustrate the applicability of the proposed
model, we present a case study of an identity card creation in Tunisia.
Abstract: Computer technology and the Internet have made a
breakthrough in the existence of data communication. This has
opened a whole new way of implementing steganography to ensure
secure data transfer. Steganography is the fine art of hiding the
information. Hiding the message in the carrier file enables the
deniability of the existence of any message at all. This paper designs
a stego machine to develop a steganographic application to hide data
containing text in a computer video file and to retrieve the hidden
information. This can be designed by embedding text file in a video
file in such away that the video does not loose its functionality using
Least Significant Bit (LSB) modification method. This method
applies imperceptible modifications. This proposed method strives
for high security to an eavesdropper-s inability to detect hidden
information.
Abstract: As a company competitiveness depends more and more on the relationship with its stakeholders, the topic of companystakeholder fit is becoming increasingly important. This fit affects the extent to which a stakeholder perceives CSR company commitment, values and behaviors and, therefore, stakeholder identification in a company and his/her loyalty to it. Consequently, it is important to measure the alignment or the gap between stakeholder CSR demands, values, preferences and perceptions, and the company CSR disclosed commitment, values and policies. In this paper, in order to assess the company-stakeholder fit about corporate responsibility, an innovative CSR fit positioning matrix is proposed. This matrix is based on the measurement of a company CSR disclosed commitment and stakeholder perceived and required commitment. The matrix is part of a more complex methodology based on Global Reporting Initiative (GRI) indicators, content analysis and stakeholder questionnaires. This methodology provides appropriate indications for helping companies to achieve CSR company-stakeholder fit, by leveraging both CSR commitment and communication. Moreover, it could be used by top management for comparing different companies and stakeholders, and for planning specific CSR strategies, policies and activities.
Abstract: Cellular communication is being widely used by all
over the world. The users of handsets are increasing due to the
request from marketing sector. The important aspect that has to be
touch in this paper is about the security system of cellular
communication. It is important to provide users with a secure channel
for communication. A brief description of the new GSM cellular
network architecture will be provided. Limitations of cellular
networks, their security issues and the different types of attacks will
be discussed. The paper will go over some new security mechanisms
that have been proposed by researchers. Overall, this paper clarifies
the security system or services of cellular communication using
GSM. Three Malaysian Communication Companies were taken as
Case study in this paper.
Abstract: IMCS is Integrated Monitoring and Control System for
thermal power plant. This system consists of mainly two parts; controllers and OIS (Operator Interface System). These two parts are
connected by Ethernet-based communication. The controller side of communication is managed by CNet module and OIS side is managed
by data server of OIS. CNet module sends the data of controller to data
server and receives commend data from data server. To minimizes or
balance the load of data server, this module buffers data created by controller at every cycle and send buffered data to data server on request of data server. For multiple data server, this module manages
the connection line with each data server and response for each request
from multiple data server. CNet module is included in each controller
of redundant system. When controller fail-over happens on redundant system, this module can provide data of controller to data sever
without loss. This paper presents three main features – separation of get task, usage of ring buffer and monitoring communication status –of CNet module to carry out these functions.
Abstract: In this paper we propose a family of algorithms based
on 3rd and 4th order cumulants for blind single-input single-output
(SISO) Non-Minimum Phase (NMP) Finite Impulse Response (FIR)
channel estimation driven by non-Gaussian signal. The input signal
represents the signal used in 10GBASE-T (or IEEE 802.3an-2006)
as a Tomlinson-Harashima Precoded (THP) version of random
Pulse-Amplitude Modulation with 16 discrete levels (PAM-16). The
proposed algorithms are tested using three non-minimum phase
channel for different Signal-to-Noise Ratios (SNR) and for different
data input length. Numerical simulation results are presented to
illustrate the performance of the proposed algorithms.
Abstract: Web-based technologies have created numerous
opportunities for electronic word-of-mouth (eWOM) communication.
There are many factors that affect customer adoption and decisionmaking
process. However, only a few researches focus on some
factors such as the membership time of forum and propensity to trust.
Using a discrete-time event simulation to simulate a diffusion model
along with a consumer decision model, the study shows the effect of
each factor on adoption of opinions on on-line discussion forum. The
purpose of this study is to examine the effect of factor affecting
information adoption and decision making process. The model is
constructed to test quantitative aspects of each factor. The simulation
study shows the membership time and the propensity to trust has an
effect on information adoption and purchasing decision. The result of
simulation shows that the longer the membership time in the
communities and the higher propensity to trust could lead to the
higher demand rates because consumers find it easier and faster to
trust the person in the community and then adopt the eWOM. Other
implications for both researchers and practitioners are provided.
Abstract: It is quite essential to form dialogue mechanisms and
dialogue channels to solve intercultural communication issues.
Therefore, every country should develop a intercultural education
project which aims to resolve international communication issues.
For proper mediation training, the first step is to reach an agreement
on the actors to run the project. The strongest mediation mechanisms
in the world should be analyzed and initiated within the educational
policies. A communication-based mediation model should be
developed for international mediation training. Mediators can use
their convincing communication skills as a part of this model. At the
first, fundamental stages of the mediation training should be specified
within the scope of the model. Another important topic at this point is
common sence and peace leaders to act as an ombudsman in this
process. Especially for solving some social issues and conflicts,
common sense leaders acting as an ombudsman would lead to
effective communication. In mediation training that is run by
universities and non-governmental organizations, another phase is to
focus on conducting the meetings. In intercultural mediation training,
one of the most critical topics is to conduct the meeting traffic and
performing a shuttle diplomacy. Meeting traffic is where the mediator
organizes meetings with the parties with initiative powers, in order to
contribute to the solution of the issue, and schedule these meetings.
In this notice titled “ Intercultural mediation training and the training
process of common sense leaders by the leadership of universities
communication and artistic campaigns" , communication models and
strategies about this topic will be constructed and an intercultural art
activities and perspectives will be presented.
Abstract: In a complex project environment, project teams face
multi-dimensional communication problems that can ultimately lead
to project breakdown. Team Performance varies in Face-to-Face
(FTF) environment versus groups working remotely in a computermediated
communication (CMC) environment. A brief review of the
Input_Process_Output model suggested by James E. Driskell, Paul H.
Radtke and Eduardo Salas in “Virtual Teams: Effects of
Technological Mediation on Team Performance (2003)", has been
done to develop the basis of this research. This model theoretically
analyzes the effects of technological mediation on team processes,
such as, cohesiveness, status and authority relations, counternormative
behavior and communication. An empirical study
described in this paper has been undertaken to test the
“cohesiveness" of diverse project teams in a multi-national
organization. This study uses both quantitative and qualitative
techniques for data gathering and analysis. These techniques include
interviews, questionnaires for data collection and graphical data
representation for analyzing the collected data. Computer-mediated
technology may impact team performance because of difference in
cohesiveness among teams and this difference may be moderated by
factors, such as, the type of communication environment, the type of
task and the temporal context of the team. Based on the reviewed
model, sets of hypotheses are devised and tested. This research,
reports on a study that compared team cohesiveness among virtual
teams using CMC and non-CMC communication mediums. The
findings suggest that CMC can help virtual teams increase team
cohesiveness among their members, making CMC an effective
medium for increasing productivity and team performance.
Abstract: This paper examines the influence of communication
form on employee uncertainty during mergers and acquisitions
(M&As). Specifically, the author uses narrative theory to analyze
how narrative organizational communication affects the three
components of uncertainty – decreased predictive, explanatory, and
descriptive ability. It is hypothesized that employees whose
organizations use narrative M&A communication will have greater
predictive, explanatory, and descriptive abilities than employees of
organizations using non-narrative M&A communication. This paper
contributes to the stream of research examining uncertainty during
mergers and acquisitions and argues that narratives are an effective
means of managing uncertainty in the mergers and acquisitions
context.
Abstract: The objective of this research was to study the themes
of alcoholic beverage advertisements in Thailand after the enactment
of the 2008 Alcoholic Beverage Control Act. Data was collected
through textual analysis of 35 television and cinema advertisements
for alcoholic beverage products broadcast in Thailand. Nine themes
were identified, seven of which were themes that had previously been
used before the new law (i.e. power, competition, friendship,
Thainess, success, romance and safety) and two of which were new
themes (volunteerism and conservation) that were introduced as a
form of adaptation and negotiation in response to the new law.
Abstract: This paper proposes a VPN Accelerator Board
(VPN-AB), a virtual private network (VPN) protocol designed for
trust channel security system (TCSS). TCSS supports safety
communication channel between security nodes in internet. It
furnishes authentication, confidentiality, integrity, and access control
to security node to transmit data packets with IPsec protocol. TCSS
consists of internet key exchange block, security association block,
and IPsec engine block. The internet key exchange block negotiates
crypto algorithm and key used in IPsec engine block. Security
Association blocks setting-up and manages security association
information. IPsec engine block treats IPsec packets and consists of
networking functions for communication. The IPsec engine block
should be embodied by H/W and in-line mode transaction for high
speed IPsec processing. Our VPN-AB is implemented with high speed
security processor that supports many cryptographic algorithms and
in-line mode. We evaluate a small TCSS communication environment,
and measure a performance of VPN-AB in the environment. The
experiment results show that VPN-AB gets a performance throughput
of maximum 15.645Gbps when we set the IPsec protocol with
3DES-HMAC-MD5 tunnel mode.
Abstract: This paper describes a platform that faces the main
research areas for e-learning educational contents. Reusability tackles
the possibility to use contents in different courses reducing costs and
exploiting available data from repositories. In our approach the
production of educational material is based on templates to reuse
learning objects. In terms of interoperability the main challenge lays
on reaching the audience through different platforms. E-learning
solution must track social consumption evolution where nowadays
lots of multimedia contents are accessed through the social networks.
Our work faces it by implementing a platform for generation of
multimedia presentations focused on the new paradigm related to
social media. The system produces videos-courses on top of web
standard SMIL (Synchronized Multimedia Integration Language)
ready to be published and shared. Regarding interfaces it is
mandatory to satisfy user needs and ease communication. To
overcome it the platform deploys virtual teachers that provide natural
interfaces while multimodal features remove barriers to pupils with
disabilities.
Abstract: Response to the public health-related emergencies is analysed here for a rural university in South Africa. The structure of the designated emergency plan covers all the phases of the disaster management cycle. The plan contains elements of the vulnerability model and the technocratic model of emergency management. The response structures are vertically and horizontally integrated, while the planning contains elements of scenario-based and functional planning. The available number of medical professionals at the Rhodes University, along with the medical insurance rates, makes the staff and students potentially more medically vulnerable than the South African population. The main improvements of the emergency management are required in the tornado response and the information dissemination during health emergencies. The latter should involve the increased use of social media and e-mails, following the Taylor model of communication. Infrastructure must be improved in the telecommunication sector in the face of unpredictable electricity outages.
Abstract: Three new algorithms based on minimization of autocorrelation of transmitted symbols and the SLM approach which are computationally less demanding have been proposed. In the first algorithm, autocorrelation of complex data sequence is minimized to a value of 1 that results in reduction of PAPR. Second algorithm generates multiple random sequences from the sequence generated in the first algorithm with same value of autocorrelation i.e. 1. Out of these, the sequence with minimum PAPR is transmitted. Third algorithm is an extension of the second algorithm and requires minimum side information to be transmitted. Multiple sequences are generated by modifying a fixed number of complex numbers in an OFDM data sequence using only one factor. The multiple sequences represent the same data sequence and the one giving minimum PAPR is transmitted. Simulation results for a 256 subcarrier OFDM system show that significant reduction in PAPR is achieved using the proposed algorithms.
Abstract: This paper reports a case study on how a conceptual
and analytical thinking approach was used in Art and Design Department at Multimedia University (Malaysia) in addressing the
issues of one nation and its impact in the society through artworks. The art project was designed for students to increase the know-how
and develop creative thinking in design and communication. Goals of the design project were: (1) to develop creative thinking in design
and communication, (2) to increase student understanding on the
process of problem solving for design work, and (3) to use design
elements and principles to generate interest, attention and emotional responses. An exhibition entitled "One Nation" was showcased to
local and international viewers consisting of the general public, professionals, academics, artists and students. Findings indicate that the project supported several visual art standards, as well as
generated awareness in the society. This project may be of interest to
current and future art educators and others interested in the potential
of utilizing global issues as content for art, community and environment studies for the purpose of educational art.
Abstract: Our research aims at helping the tutor on line to
evaluate the student-s cognitive processes. The student is a learner in
French as a Second Language who studies an on-line socio-cognitive
scenario in written communication. In our method, these cognitive
processes are defined. For that, the language abilities and learning
tasks are associated to cognitive operation. Moreover, the found
cognitive processes are named with specific terms. The result was to
create an instrumental pattern to question the learner about the
cognitive processes used to build an item of written comprehension.
Our research follows the principles of the third historical generation
of studies on the cognitive activity of the text comprehension. The
strength of our instrumental pattern stands in the precision and the
logical articulation of the questions to the learner. However, the
learner-s answers can still be subjective but the precision of the
instrument restricts it.
Abstract: Support Vector Machine (SVM) is a recent class of statistical classification and regression techniques playing an increasing role in applications to detection problems in various engineering problems, notably in statistical signal processing, pattern recognition, image analysis, and communication systems. In this paper, SVM is applied to an infrared (IR) binary communication system with different types of channel models including Ricean multipath fading and partially developed scattering channel with additive white Gaussian noise (AWGN) at the receiver. The structure and performance of SVM in terms of the bit error rate (BER) metric is derived and simulated for these channel stochastic models and the computational complexity of the implementation, in terms of average computational time per bit, is also presented. The performance of SVM is then compared to classical binary signal maximum likelihood detection using a matched filter driven by On-Off keying (OOK) modulation. We found that the performance of SVM is superior to that of the traditional optimal detection schemes used in statistical communication, especially for very low signal-to-noise ratio (SNR) ranges. For large SNR, the performance of the SVM is similar to that of the classical detectors. The implication of these results is that SVM can prove very beneficial to IR communication systems that notoriously suffer from low SNR at the cost of increased computational complexity.