scholarly journals Modern Technology Trends Bring the Chance of Identity Originality Dikir Barat in Kelantan

This paper discusses the threat of modern technology that has led to badly identity originality of the popular dikir barat tradition performances in Kelantan. The development of modern technology through the internet is very accessible at your fingertips. In addition to television, radio and dvd help to affect give the originality dikir barat. The emergence of modern dikir barat singer with a lack of basic knowledge has little to do with the traditional dikir barat style and structure. What changes are being made due to the saturation and anxiety of young thinkers about the long existence of the dikir barat tradition in Kelantan. Modern dikir barat are given new breaths is a desire to bury the native dikir barat that is considered outdated and outdated. The modernization or adaptation of dikir barat tradition to a new of modern dikir barat thought due to the application of foreign influences and the appearance of western elements is absorbed in western thought today. The advent of modern technology has also led to the gradual disappearance of the originality dikir barat style show that wants to channel information to the public. This discussion is also more a study of the change in the dikir west of tradition with society in the process of technological development today. Confusion exits among the younger generation, a new generation that is hard to identify with the originality dikir barat in Kelantan. Therefore, revitalizing the authenticity of the dikir barat tradition must be done so that modernity and technology are not threatened, lost and lost. Re-documenting this study could add further sources of refence to other researchers in the future.

Author(s):  
Chong Shen Hew ◽  
Mu Yi Hor ◽  
Hou Huai Gary Yap ◽  
Tin Fung Chong

MY Psychology is an online educational platform currently based in Malaysia, formed with the intention to spread awareness towards the general public of not only on issues related with mental health and those who suffer under mental illnesses, but also to create a place where psychology as a basic knowledge can be taught and learned. This is in order to correct misunderstandings from the public toward psychology. Operating on the internet requires the company to shift towards a marketing-oriented direction, in the meantime, coping with internal and external challenges in order to strive for greater reach and engagement from the audience.


Author(s):  
Kamal Alieyan ◽  
Ammar Almomani ◽  
Rosni Abdullah ◽  
Badr Almutairi ◽  
Mohammad Alauthman

In today's internet world the internet of things (IoT) is becoming the most significant and developing technology. The primary goal behind the IoT is enabling more secure existence along with the improvement of risks at various life levels. With the arrival of IoT botnets, the perspective towards IoT products has transformed from enhanced living enabler into the internet of vulnerabilities for cybercriminals. Of all the several types of malware, botnet is considered as really a serious risk that often happens in cybercrimes and cyber-attacks. Botnet performs some predefined jobs and that too in some automated fashion. These attacks mostly occur in situations like phishing against any critical targets. Files sharing channel information are moved to DDoS attacks. IoT botnets have subjected two distinct problems, firstly, on the public internet. Most of the IoT devices are easily accessible. Secondly, in the architecture of most of the IoT units, security is usually a reconsideration. This particular chapter discusses IoT, botnet in IoT, and various botnet detection techniques available in IoT.


Author(s):  
Kamal Alieyan ◽  
Ammar Almomani ◽  
Rosni Abdullah ◽  
Badr Almutairi ◽  
Mohammad Alauthman

In today's internet world the internet of things (IoT) is becoming the most significant and developing technology. The primary goal behind the IoT is enabling more secure existence along with the improvement of risks at various life levels. With the arrival of IoT botnets, the perspective towards IoT products has transformed from enhanced living enabler into the internet of vulnerabilities for cybercriminals. Of all the several types of malware, botnet is considered as really a serious risk that often happens in cybercrimes and cyber-attacks. Botnet performs some predefined jobs and that too in some automated fashion. These attacks mostly occur in situations like phishing against any critical targets. Files sharing channel information are moved to DDoS attacks. IoT botnets have subjected two distinct problems, firstly, on the public internet. Most of the IoT devices are easily accessible. Secondly, in the architecture of most of the IoT units, security is usually a reconsideration. This particular chapter discusses IoT, botnet in IoT, and various botnet detection techniques available in IoT.


Author(s):  
Paddy Hoey

Modern traditions of activist media grow out of the increased opportunities for intervention into the public sphere created by the Internet and modern technology. In recent years online media activism has been said to have been at the centre of uprisings during the Arab Spring, the development of countercultural movements like Occupy and the populist right. In Northern Ireland, this form of activism emerged but it failed to diminish much older, deeply historic tradition of activist journalism and writing in Irish republicanism. Journals, pamphlets, newspapers and free sheets all persisted in the years after the signing of the Good Friday peace agreement providing a challenge to the narratives of digital utopianism and its claims for a public sphere dynamically and completely restructured by the Internet.


2021 ◽  
Vol 104 (2) ◽  
pp. 003685042110008
Author(s):  
Caihua Ma ◽  
Lingxin Ma ◽  
Abdulkader Helwan ◽  
Mohammad Khaleel Sallam Ma’aitah ◽  
Sayed Abdulla Jami ◽  
...  

To examine basic COVID-19 knowledge, coping style and exercise behavior among the public including government-provided medical cloud system treatment app based on the internet during the outbreak. Besides, to provide references for developing targeted strategies and measures on prevention and control of COVID-19. We conducted an online survey from 11th to 15th March 2020 via WeChat App using a designed questionnaire. As well as aim to diagnose COVID-19 earlier and to improve its treatment by applying medical technology, the “COVID-19 Intelligent Diagnosis and Treatment Assistant Program (nCapp)” based on the Internet of Things. Valid information was collected from 1893 responders (47.07% males and 52.93% females aged 18–80 years, with a mean age of 31.05 ± 9.86) in 20 provincial-level regions across China. From the responders, 92.90% and 34.81% were scaled pass and good and above scores for the knowledge about the novel coronavirus epidemic. 38.44% were scaled poor scores and only 5.40% were scaled good and above scores for appropriate behavior coping with the pandemic. Among the responders, 52.14% reported having active physical exercise in various places during the previous 1 week. For all the responders, appropriate behavior coping correlated positively with physical exercise ( p < 0.05); the daily consumed time for getting the epidemic-related information correlated positively with the score for cognition on the epidemic’s prevention measures ( r = 0.111, p < 0.01) and on general knowledge about the epidemic ( r = 0.087, p < 0.01). Targeted and multiple measures for guidance on the control of COVID-19 among the public should be promoted to improve the cognition on basic knowledge, behaviors and treatment.


Author(s):  
Chong Shen Hew ◽  
Mu Yi Hor ◽  
Hou Huai Gary Yap ◽  
Tin Fung Chong

MY Psychology is an online educational platform currently based in Malaysia, formed with the intention to spread awareness towards the general public of not only on issues related with mental health and those who suffer under mental illnesses, but also to create a place where psychology as a basic knowledge can be taught and learned. This is in order to correct misunderstandings from the public toward psychology. Operating on the internet requires the company to shift towards a marketing-oriented direction, in the meantime, coping with internal and external challenges in order to strive for greater reach and engagement from the audience.


2021 ◽  
pp. 162-169
Author(s):  
V. SHEVCHENKO

The threats of Chinese Huawei's activity in the American and European digital markets have been studied. Prospects for the global implementation of new generation 5G technologies are detailed. The legislation of some countries on the introduction of import substitution programs for software and technological products, especially for the needs of the public sector, is analyzed. Global trends in strengthening cyber security in the direction of eliminating technological dependence on foreign manufacturers of information and communication technologies have been identified. The principles of domestic state policy in the field of software import substitution and technological development are generalized. The directions of improvement of the domestic IT-market and its contribution to cyber security are outlined.


2021 ◽  
Vol 51 (2) ◽  
pp. 18-24
Author(s):  
Hari Balakrishnan ◽  
Sujata Banerjee ◽  
Israel Cidon ◽  
David Culler ◽  
Deborah Estrin ◽  
...  

There is now a significant and growing functional gap between the public Internet, whose basic architecture has remained unchanged for several decades, and a new generation of more sophisticated private networks. To address this increasing divergence of functionality and overcome the Internet's architectural stagnation, we argue for the creation of an Extensible Internet (EI) that supports in-network services that go beyond best-effort packet delivery. To gain experience with this approach, we hope to soon deploy both an experimental version (for researchers) and a prototype version (for early adopters) of EI. In the longer term, making the Internet extensible will require a community to initiate and oversee the effort; this paper is the first step in creating such a community.


2020 ◽  
Vol 2020 (4) ◽  
pp. 116-1-116-7
Author(s):  
Raphael Antonius Frick ◽  
Sascha Zmudzinski ◽  
Martin Steinebach

In recent years, the number of forged videos circulating on the Internet has immensely increased. Software and services to create such forgeries have become more and more accessible to the public. In this regard, the risk of malicious use of forged videos has risen. This work proposes an approach based on the Ghost effect knwon from image forensics for detecting forgeries in videos that can replace faces in video sequences or change the mimic of a face. The experimental results show that the proposed approach is able to identify forgery in high-quality encoded video content.


Sign in / Sign up

Export Citation Format

Share Document