• Title/Summary/Keyword: MD2MD Communication

Search Result 62, Processing Time 0.024 seconds

Mobile News Engagement in a South Asian Context: Roles of Demographics, Motivations, and News Type Preferences in News Exposure and Participation in Bangladesh

  • Alam, Md. Asraful;Kim, Kyun Soo
    • International Journal of Contents
    • /
    • v.17 no.2
    • /
    • pp.48-64
    • /
    • 2021
  • This study examines mobile news engagement-conceptualized as news exposure and participation-in the context of South Asia which has experienced tremendous growth in mobile-Internet users without receiving much attention from communication scholars. Along with demographic characteristics, this research incorporates motivational factors (grounded on uses and gratifications-U&G-approach) and news type preferences to explore their roles in mobile news engagement among urban citizens in Bangladesh. Results of a self-administered survey (N = 504) revealed that participants' mobile news engagement partially varied depending on their demographic differences, particularly gender, age, and education. Our study also unveiled that individuals' motivation for sharing information seemed to be a strong predictor of mobile news exposure and participation. In addition, Bangladeshi respondents were more likely to be interested in the hard news in terms of expressing views on news comments and sharing news via mobile platform. Conversely, preference for soft type news had a significant influence on news exposure through mobile browsing. This study provides insights into the understanding of global phenomena of mobile news engagement by unpacking the case of Bangladesh where mobile news usage seems to be an evolving state.

Securing the IoT Frontier: Exploring the Limitation and Future Directions in Cybersecurity

  • Moustafa Abdelrahman Mahmoud Ahmed;Nur Arzilawati Md Yunus
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.16 no.2
    • /
    • pp.1-9
    • /
    • 2024
  • As the Internet of Things (IoT) continues to permeate every facet of modern life, the imperative to secure this vast and dynamic frontier becomes increasingly paramount. This presents a comprehensive exploration of the challenges and opportunities inherent in safeguarding the interconnected web of IoT devices. The research critically examines the limitations of current cybersecurity measures through an extensive review of diverse topics, including IoT network performance, smart grid security, and the escalating cyber threats against critical infrastructures. A meticulous analysis of research findings underscores the need for enhanced infrastructure and ongoing research to fortify the cybersecurity mechanisms surrounding IoT objects. We underline the imperative of relentless research efforts to parry the advancing threats and leverage the promise of nascent technologies. Our findings affirm the pivotal influence of robust cybersecurity measures in crafting a resiliently connected ecosystem. The paper underscores the importance of ongoing research to address evolving threats and harness the potential of emerging technologies, reaffirming the central role of cybersecurity in shaping a secure interconnected world. In conclusion, the study emphasizes the dynamic and ever-evolving nature of cybersecurity on the IoT frontier. It unveils a complex landscape of challenges, ranging from network performance intricacies to the security concerns of critical infrastructures.

Inverse-Orthogonal Jacket-Haar and DCT Transform (Inverse-Orthogonal Jacket-Haar, DCT 변환)

  • Park, Ju Yong;Khan, Md. Hashem Ali;Kim, Jeong Su;Lee, Moon Ho
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.51 no.9
    • /
    • pp.30-40
    • /
    • 2014
  • As the Hadamard transform can be generalized into the Jacket transform, in this paper, we generalize the Haar transform into the Jacket-Haar transform. The entries of the Jacket-Haar transform are 0 and ${\pm}2^k$. Compared with the original Haar transform, the basis of the Jacket-Haar transform is general and more suitable for signal processing. As an application, we present the DCT-II(discrete cosine transform-II) based on $2{\times}2$ Hadamard matrix and HWT(Haar Wavelete transform) based on $2{\times}2$ Haar matrix, analysis the performances of them and estimate them via the Lenna image simulation.

A Study on the Infant Feeding Method of Mothers in Suwon City (수원 시내 일부 여성의 영아영양법에 관한 실태 조사)

  • 이종현
    • The Korean Journal of Food And Nutrition
    • /
    • v.6 no.2
    • /
    • pp.81-88
    • /
    • 1993
  • This survey was conduced to investigate the feeding methods of mothers in Suwon, Kyungkido. Incidence of breast feeding was 29.9eA of the Interviewed mothers, which showed lower percentages than those of previous surveys. The jai or factors influencing the method of infant feeding were generally depended on mother rather than infant. The mothers who had a higher income and a higher academic career tended to pre(or the bottle feeding to the other. md first birth order made them select the breast feeding rather than the other. Generally mothers knew the information about infant nutrition very well (91.0%), but their knowledge actually did not work. The sources of mother's Information on the Infant nutrition were the books of rearing infants and magazine. But there were some discrepancies between the actual and needed source of information : i.e. mothers wanted to acquire their information from mass communication.

  • PDF

Computationally Efficient Implementation of a Hamming Code Decoder Using Graphics Processing Unit

  • Islam, Md Shohidul;Kim, Cheol-Hong;Kim, Jong-Myon
    • Journal of Communications and Networks
    • /
    • v.17 no.2
    • /
    • pp.198-202
    • /
    • 2015
  • This paper presents a computationally efficient implementation of a Hamming code decoder on a graphics processing unit (GPU) to support real-time software-defined radio, which is a software alternative for realizing wireless communication. The Hamming code algorithm is challenging to parallelize effectively on a GPU because it works on sparsely located data items with several conditional statements, leading to non-coalesced, long latency, global memory access, and huge thread divergence. To address these issues, we propose an optimized implementation of the Hamming code on the GPU to exploit the higher parallelism inherent in the algorithm. Experimental results using a compute unified device architecture (CUDA)-enabled NVIDIA GeForce GTX 560, including 335 cores, revealed that the proposed approach achieved a 99x speedup versus the equivalent CPU-based implementation.

A Study on Efficient Data De-Identification Method for Blockchain DID

  • Min, Youn-A
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.13 no.2
    • /
    • pp.60-66
    • /
    • 2021
  • Blockchain is a technology that enables trust-based consensus and verification based on a decentralized network. Distributed ID (DID) is based on a decentralized structure, and users have the right to manage their own ID. Recently, interest in self-sovereign identity authentication is increasing. In this paper, as a method for transparent and safe sovereignty management of data, among data pseudonymization techniques for blockchain use, various methods for data encryption processing are examined. The public key technique (homomorphic encryption) has high flexibility and security because different algorithms are applied to the entire sentence for encryption and decryption. As a result, the computational efficiency decreases. The hash function method (MD5) can maintain flexibility and is higher than the security-related two-way encryption method, but there is a threat of collision. Zero-knowledge proof is based on public key encryption based on a mutual proof method, and complex formulas are applied to processes such as personal identification, key distribution, and digital signature. It requires consensus and verification process, so the operation efficiency is lowered to the level of O (logeN) ~ O(N2). In this paper, data encryption processing for blockchain DID, based on zero-knowledge proof, was proposed and a one-way encryption method considering data use range and frequency of use was proposed. Based on the content presented in the thesis, it is possible to process corrected zero-knowledge proof and to process data efficiently.

Smart Diesel Generator Control System

  • Jeong, Yunju;Ansari, Md Israfil;Shin, WooHyeon;Kang, Bonggu;Shim, Jaechang
    • Journal of Korea Multimedia Society
    • /
    • v.20 no.2
    • /
    • pp.271-278
    • /
    • 2017
  • This paper introduces a user-friendly PLC (programmable logic controller) monitoring and control system of heavy machinery using Android based smartphone. The proposed system will control diesel generator and many such like machine without a dedicated PC with respect to similar system and offers a new communication protocol for handling it. The smartphone controls the generator via Wi-Fi, through which it connects to the Raspberry pi which will be installed in the PLC panel to setup the communication between them. Furthermore, Raspberry pi connects to two devices, one is PLC which gives the status and current information of the machine and to ON/OFF the machine. This proposed system used RS485 as a key mediator for data exchanging between Raspberry PI(master) and PLC(slave). RS485 allows multiple devices (up to 32) to communicate at half duplex on single pair of wires and provides a long connectivity area (up to 1200 meters) as compared to another device. This proposed system specially focused on accurate data flow between smartphone and PLC panel.

Evaluation of ICT Policy for the Agriculture and Rural Development in Developed Countries: A Comprehensive Lesson for Developing Countries

  • Hossain, Md. Dulal
    • Agribusiness and Information Management
    • /
    • v.1 no.2
    • /
    • pp.61-80
    • /
    • 2009
  • Information and Communication Technology is now widely accepted by developing countries as a development tool in their efforts to alleviate poverty, enhance human development, and achieve Millennium Development Goals. Recognizing this untapped potential and development strategies incorporating ICT are being increasingly promoted and launched across the developing countries requiring a comprehensive ICT policy that plays a crucial rule, in particular, in the area of agriculture and rural development. While the potential advantages of ICT for development are enormous in developed countries, national policies of developing countries are yet to adequately reflect truly comprehensive and integrated strategies for harnessing and exploiting this potential. This paper tries to provide implication of ICT policy to the agriculture and rural development in developing countries, in particular through lessons learned from European Union (EU) IT policy. Through the examination of vital projects in the agriculture and rural development sectors and case study analysis of applied policies and strategies implemented in the European Union, this paper provides tangible examples and lessons for policy-makers and practitioners involved in the field. Hence, this study provides policy-makers the necessary tools, information and knowledge to facilitate the formulation and adoption of ICT policies and strategies in the agriculture and rural development sector.

  • PDF

FTCARP: A Fault-Tolerant Routing Protocol for Cognitive Radio Ad Hoc Networks

  • Che-aron, Zamree;Abdalla, Aisha Hassan;Abdullah, Khaizuran;Rahman, Md. Arafatur
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.8 no.2
    • /
    • pp.371-388
    • /
    • 2014
  • Cognitive Radio (CR) has been recently proposed as a promising technology to remedy the problems of spectrum scarcity and spectrum underutilization by enabling unlicensed users to opportunistically utilize temporally unused licensed spectrums in a cautious manner. In Cognitive Radio Ad Hoc Networks (CRAHNs), data routing is one of the most challenging tasks since the channel availability and node mobility are unpredictable. Moreover, the network performance is severely degraded due to large numbers of path failures. In this paper, we propose the Fault-Tolerant Cognitive Ad-hoc Routing Protocol (FTCARP) to provide fast and efficient route recovery in presence of path failures during data delivery in CRAHNs. The protocol exploits the joint path and spectrum diversity to offer reliable communication and efficient spectrum usage over the networks. In the proposed protocol, a backup path is utilized in case a failure occurs over a primary transmission route. Different cause of a path failure will be handled by different route recovery mechanism. The protocol performance is compared with that of the Dual Diversity Cognitive Ad-hoc Routing Protocol (D2CARP). The simulation results obviously prove that FTCARP outperforms D2CARP in terms of throughput, packet loss, end-to-end delay and jitter in the high path-failure rate CRAHNs.

Performance Improvement of S-MMA Adaptive Equalization Algorithm based on the Variable Step Size (가변 스텝 크기를 이용한 S-MMA 적응 등화 알고리즘의 성능 개선)

  • Lim, Seung-Gag
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.16 no.2
    • /
    • pp.107-112
    • /
    • 2016
  • This paper proposes the improving the equalization performance using the variable step size in the S-MMA (Sliced-Multi Modulus Algorithm) equalization algorithm in order to minimize the effect of intersymbol interference which occurs at the nonlinear transfer function of communication channel. The S-MMA were showned for the improving the steady state equalization performance and misadjustment compared to the MMA present algorithm, this two algorithm has a limitation of performance improvement due to the adapting the fixed step size according to the error signal amplitude. In order to solving the abovemensioned problem, the proposed algorithm was adopting the variable step size proportional to the error signal amplitude and the computer simulation was performed for showing the performance improving. As a result of simulation, the proposed VSS S-MMA algorithm has more superior equalization performance compared to the present S-MMA.