Webology最新文献

筛选
英文 中文
An Empirical Study on the Problems of Kudumbashree Units in Kerala 喀拉拉邦苦瓜树单位问题的实证研究
Webology Pub Date : 2022-01-20 DOI: 10.14704/web/v19i1/web19068
C. N. Pandala, D. K.A.
{"title":"An Empirical Study on the Problems of Kudumbashree Units in Kerala","authors":"C. N. Pandala, D. K.A.","doi":"10.14704/web/v19i1/web19068","DOIUrl":"https://doi.org/10.14704/web/v19i1/web19068","url":null,"abstract":"Women have become society's backbone, and their contributions must be acknowledged and valued. There is a significant change in society when women and men enjoy equal standing. By establishing microcredit and productive companies, the Kudumbashree scheme strives to improve the living standards of disadvantaged women in rural areas. There is a strong push to promote Kudumbashree units to fulfil the state's livelihood missions in order to provide better job and livelihood opportunities for the underprivileged. It was also realised that these Kudumbashree teams encounter incalculable difficulties in their missions. “Brittle support from direct stakeholders and a lack of professionalism,” “Infringement of unnecessary external governance,” and “Absence of flawless familiarity on Kudumbashree units” are all issues that Kudumbashree units face.","PeriodicalId":35441,"journal":{"name":"Webology","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-01-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46796797","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Women Workers: Social Aspects and Accessibility in The Residential Neighborhood and Probability to Commuting 女工:社会因素与居住区可达性及通勤概率
Webology Pub Date : 2022-01-20 DOI: 10.14704/web/v19i1/web19073
Sylvia Vianty Ranita, Nasri Bachtiar, Fashbir Noor Siddin, Fajri Muharja, Febriandi Prima Putra
{"title":"Women Workers: Social Aspects and Accessibility in The Residential Neighborhood and Probability to Commuting","authors":"Sylvia Vianty Ranita, Nasri Bachtiar, Fashbir Noor Siddin, Fajri Muharja, Febriandi Prima Putra","doi":"10.14704/web/v19i1/web19073","DOIUrl":"https://doi.org/10.14704/web/v19i1/web19073","url":null,"abstract":"Women are often faced with considerations including the choice of mobility with or without commuting, which is inseparable from the role of social in the neighborhood. This study aims to analyze the probability of women workers commuting in Indonesia through social capital and accessibility from the neighborhood to the labor market. The logit model and marginal effect were applied in this research, using the 2018 microdata obtained from Indonesia National Labor Force Survey (Sakernas) and Indonesian Village Potential (Podes). These data are combined based on residence similarity at the district level of each individual. The results showed that trust and solidarity increase, the probability of women workers commuting declines by 3.9%. The group and networks level increases through women groups in the residential neighborhood area cause commuting probability to decline of 14.3% on women workers. The variable of facilities will increase with a rise in women workers' commuting probability by 2.5%. These results were controlled by sectoral variables, work, income, education, age, and marital status of women workers in Indonesia. The findings in this study explain the social aspect in the social capital approach originating from the residential neighborhood causes a decreased probability of that decision. The indicates that the social ties of traditional society are still attached to women workers in Indonesia. However, the accessibility in this article is that public transportation gives a positive probability to the decision to commute to women workers in Indonesia.","PeriodicalId":35441,"journal":{"name":"Webology","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-01-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46870360","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Novel Image Encryption Approach for IoT Applications 一种新的物联网应用图像加密方法
Webology Pub Date : 2022-01-20 DOI: 10.14704/web/v19i1/web19107
W. A. Alawsi, H. Obayes, S. M. Hussain
{"title":"A Novel Image Encryption Approach for IoT Applications","authors":"W. A. Alawsi, H. Obayes, S. M. Hussain","doi":"10.14704/web/v19i1/web19107","DOIUrl":"https://doi.org/10.14704/web/v19i1/web19107","url":null,"abstract":"The rapid developments observed in the field of Internet of Things (IoT), along with the recently increasing dependence on this technology in home and financial applications, have made it necessary to pay attention to the security of information sent through these IoT applications. The present article proposes a new encryption method for important messages that are sent via IoT applications. The proposed method provides four levels of security for the confidential message (in this case, an image). The first level is represented by applying the Conformal Mapping on the secret image. The second level is represented by encoding the resulting image from the first level using the encryption and decryption (RSA) method, while the third level is the use of Less Significant Bit (LSB) as the hiding method to hide the message inside the cover image. The compression of the stego image using GZIP is the last level of security. The peak signal-to-noise (PNSR) metric was used to measure the quality of the resulting image after the steganography process. The results appear promising and acceptable. Therefore, it is suggested that this method can be applied to send secret messages through applications of special importance across the IoT.","PeriodicalId":35441,"journal":{"name":"Webology","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-01-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43957181","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
The Reality of Total Quality Management in the Iraqi Ministry of Education 伊拉克教育部全面质量管理的现状
Webology Pub Date : 2022-01-20 DOI: 10.14704/web/v19i1/web19082
Ekhlas Zaki Faraj
{"title":"The Reality of Total Quality Management in the Iraqi Ministry of Education","authors":"Ekhlas Zaki Faraj","doi":"10.14704/web/v19i1/web19082","DOIUrl":"https://doi.org/10.14704/web/v19i1/web19082","url":null,"abstract":"The aim of this research is to verity Total Quality Management (TQM) in the two general directorates of education in Baghdad, namely Rusafa - 1 and Al-Karkh - 1. Which are responsible for setting primary and secondary schools. The author adopted the descriptive approach. A survey was conducted to investigate the implementation (TQM) for the academic year 2019-2020 in six main categories by both directorates was sent to a sample of directors and head of divisions. These categories include leadership, operations management, human resources, training, oversight and community partnership. Eighty of the directors and head of a divisions responded to the survey and the findings indicate these conclusions; there is a lack of interest by the senior management in both directorates in applying TQM and in community partnership as both these measures received lowest degree of weighted average. The latter indicates the lack of interest by senior management to an important element. It is noted from the answers of the research sample that all the questions got low and close weighted average, and this is an important indicator of the lack of interest in total quality management by the leadership in the two directorates General of Education. Based on conclusions these findings, this research propose two main recommendations. formulated Firstly, the directorates need engage with the stake holders (students, parents, community and relevant ministries in the decision making process. Secondly, senior managers need to engage with, motivate and facilitate with the employees to create a culture that promotes and rewards creative thinkers and problem solvers.","PeriodicalId":35441,"journal":{"name":"Webology","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-01-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45309626","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The Effectiveness of Training Courses Provided to Social Education Teachers Using e-Learning Tools in Light of the Corona Pandemic from their Point of View 从社会教育教师的角度看新冠疫情下使用电子学习工具为社会教育教师提供培训课程的有效性
Webology Pub Date : 2022-01-20 DOI: 10.14704/web/v19i1/web19118
Amneh Zakariah Alsarayrah
{"title":"The Effectiveness of Training Courses Provided to Social Education Teachers Using e-Learning Tools in Light of the Corona Pandemic from their Point of View","authors":"Amneh Zakariah Alsarayrah","doi":"10.14704/web/v19i1/web19118","DOIUrl":"https://doi.org/10.14704/web/v19i1/web19118","url":null,"abstract":"The present study mainly aimed to determine the effectiveness, extend of training courses provided to social education teachers using e-learning tools based on the Corona pandemic from their point of view. The study mainly depended on and used the descriptive analytical approach. Besides, the study sample reached to (74) male as well as female teachers, as they have been selected randomly. The results of the study proved that the effectiveness of the training courses provided to social education teachers using e-learning tools was at a positive level with an arithmetical average (3.53). The study recommended the necessity of conducting courses and workshops for both teachers and students to develop their attitudes towards e-learning and its tools and the using mechanism of e-learning tools in the educational process and to employ what they have been trained in intensive and continuous ways, and to train them on using it, and interesting in providing the devices and technologies used in e-learning to comprise all schools, and the study recommended also, the necessity of modifying the social education curricula to be compatible with the implementation of e-learning.","PeriodicalId":35441,"journal":{"name":"Webology","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-01-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47606177","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Monitoring of MQTT-based Messaging Server 基于MQTT的消息服务器的监控
Webology Pub Date : 2022-01-20 DOI: 10.14704/web/v19i1/web19316
Kitae Hwang, In-hwan Jung, ae Moon Lee
{"title":"Monitoring of MQTT-based Messaging Server","authors":"Kitae Hwang, In-hwan Jung, ae Moon Lee","doi":"10.14704/web/v19i1/web19316","DOIUrl":"https://doi.org/10.14704/web/v19i1/web19316","url":null,"abstract":"In the messaging server where many devices send and receive messages, the ability to monitor the performance of the server and characteristics of the messaging is essential. This paper decides MQTT as the messaging protocol, and analyzes and defines key parameters that show the performance of the MQTT server and the characteristics of MQTT communication like MQTT message topics. In addition, this paper built an MQTT messaging server for testing by using Mosquitto as a MQTT broker and a separate monitoring system to monitor defined key parameters. In this paper, the system for monitoring the performance of the MQTT messaging server was built into three parts: a dashboard server, a monitoring application, and a test load generator. The test load generator is configured to generate a large amount of MQTT message load using 11 Raspberry PIs. The monitoring application was developed and installed on the MQTT server computer and periodically stored the server's performance and the MQTT message-related parameters processed by Mosquitto in the dashboard server's DB. The dashboard server was developed as a web server and implemented so that the administrator can view the data stored in the DB through a web browser in real time. Through experiments that generate various loads in the test load generator, it has been confirmed that the monitoring system operates normally. The monitoring system built in this paper is expected to be a good model of the monitoring system to be built together when developing an MQTT-based messaging server.","PeriodicalId":35441,"journal":{"name":"Webology","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-01-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43824673","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Study on the Case of Songdo Smart City based on the Citizen Participation Approach 基于市民参与法的松岛智慧城市案例研究
Webology Pub Date : 2022-01-20 DOI: 10.14704/web/v19i1/web19312
Myung-Hee Kim
{"title":"Study on the Case of Songdo Smart City based on the Citizen Participation Approach","authors":"Myung-Hee Kim","doi":"10.14704/web/v19i1/web19312","DOIUrl":"https://doi.org/10.14704/web/v19i1/web19312","url":null,"abstract":"The purpose of this paper is to explore the level of citizen participation in Songdo smart city project, once called U-city project, in order to provide citizens with U-service anywhere by using new IT technology in the Incheon Free Economic Zone, a landfill site. To this end, it reviews the literature on smart city, and derives project’s problems, evaluates according to the framework, and proposes implications. This paper uses the “Citizen Participation Evaluation Framework” formalized by Simonofsky and his colleagues and analyzes civic participation method by dividing it into democratic participants, co-creators, and ICT users. The level of citizen participation in the Songdo project is evaluated according to the criteria presented by this framework and the results are presented. The analysis period is from 2003 to 2016, when the government office was opened and the initial foundation was completed. As a result of analysis, Songdo had built open data and infrastructure for citizens, but citizens were participated as ICT users only. Although citizens living in smart cities should be the co-creators and participants in democratic decision-making for solving urban problems, Songdo was missing these factors. In conclusion, this paper argues that Songdo remains in the U-city paradigm as the 'smart people', a key element among the smart city components, has been neglected and ultimately reveals a fundamental limit to its growth into a sustainable smart city. In addition, suggestions for improvement are presented. This paper is meaningful in that it presented lessons and implications that the human factors should be emphasized as the subject of technology and services to develop into an authentic smart city through the case of Songdo.","PeriodicalId":35441,"journal":{"name":"Webology","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-01-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42705828","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Development of Scalable Coding of Encrypted Images Using Enhanced Block Truncation Code 基于增强块截断码的可扩展加密图像编码的发展
Webology Pub Date : 2022-01-20 DOI: 10.14704/web/v19i1/web19109
Jeya Bright Pankiraj, V. Govindaraj, Yudong Zhang, Pallikonda Rajasekaran Murugan, Anisha Milton
{"title":"Development of Scalable Coding of Encrypted Images Using Enhanced Block Truncation Code","authors":"Jeya Bright Pankiraj, V. Govindaraj, Yudong Zhang, Pallikonda Rajasekaran Murugan, Anisha Milton","doi":"10.14704/web/v19i1/web19109","DOIUrl":"https://doi.org/10.14704/web/v19i1/web19109","url":null,"abstract":"Only few researchers are reported on scalable coding of encrypted images, and it is an important area of research. In this paper, a novel method of scalable coding of encrypted images using Enhanced Block Truncation Code (EBTC) has been proposed. The raw image is compressed using EBTC and then encrypted using the pseudo-random number (PSRN) at the transmitter and the Key is disseminated to the receiver. The transmitted image is decrypted at the receiver by using the PSRN key. Finally, the output image is constructed using EBTC, scaled by scaling factor 2 and Bilinear Interpolation Technique. The proposed system gives better PSNR, Compression ratio and storage requirement than existing techniques such as Hadamard, DMMBTC and BTC.","PeriodicalId":35441,"journal":{"name":"Webology","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-01-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42708888","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Authentication and Integrity of E-documents based on Zero-Watermarking Method 基于零水印方法的电子文档认证与完整性
Webology Pub Date : 2022-01-20 DOI: 10.14704/web/v19i1/web19340
M. Gaata, Dr. Mustafa Dhiaa Al-Hassani
{"title":"Authentication and Integrity of E-documents based on Zero-Watermarking Method","authors":"M. Gaata, Dr. Mustafa Dhiaa Al-Hassani","doi":"10.14704/web/v19i1/web19340","DOIUrl":"https://doi.org/10.14704/web/v19i1/web19340","url":null,"abstract":"During the last period, due increase the use of e-government applications and the health conditions that occurred as a result of the spread of the Corona virus, the using of e-documents has become increasingly common. Therefore, there was an urgent need to ensure the authenticity of the source and integrity of the e-documents and that they are free from forgery and manipulation. In this paper, the zero-watermarking method has been proposed in order to achieve the authentication and integrity of e-documents and to determine the regions which tampered. The main idea is based on segment the e-documents into small square areas with 8×8 and then generate the watermark information by computing the eigenvalues and eigenvectors. The generated watermark is insert into the e-documents with a specific relationship among regions. The experimental results prove the efficiency and effectiveness of the proposed method in detecting areas that have been tampered by various types of attacks. In addition, a high level of quality for e-documents watermarked was obtained.","PeriodicalId":35441,"journal":{"name":"Webology","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-01-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48624247","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Empirical Review of DDOS Attack Mitigation System on SDN Using Cloud Environment 基于云环境的SDN DDOS攻击缓解系统的实证研究
Webology Pub Date : 2022-01-20 DOI: 10.14704/web/v19i1/web19022
A. S, Dr. Sivakumar R
{"title":"An Empirical Review of DDOS Attack Mitigation System on SDN Using Cloud Environment","authors":"A. S, Dr. Sivakumar R","doi":"10.14704/web/v19i1/web19022","DOIUrl":"https://doi.org/10.14704/web/v19i1/web19022","url":null,"abstract":"The separation of the control plane and the network data plane from the network defined by the software is making it easier for network management. As a result, SDN can be used in a variety of network settings, including network hiring networks. However, the construction of the novel network raises new security issues. Dedicated Shared Denial (DDoS) is easy to distribute and hard to protect on standard networks; on SDN networks, it can bypass the central controllers and bring the entire network down. Cloud computing has emerged as a modern and exciting computer space over the past decade, providing an affordable and awesome computer space. SDN technology combined with cloud computing highlights the challenges of cloud communication and enhances cloud adaptability, configuration, intelligence, and extreme density. Sensitive features of SDN, such as global network coverage, software-based traffic analysis, integrated network management, etc., greatly enhance the acquisition of DDoS cloud capabilities and scalability capabilities. In this study, a major effort was made to compare the various solutions currently available for programs to reduce DDoS attacks in cloud environments using SDN and provided performance tests such as detection rate, recovery time and False positive Rate.","PeriodicalId":35441,"journal":{"name":"Webology","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-01-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45904076","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信