Search results for: tactical messages
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 471

Search results for: tactical messages

201 Unravelling the Interplay: Chinese Government Tweets, Anti-US Propaganda Cartoons and Social Media Dynamics in US-China Relations

Authors: Mitchell Gallagher

Abstract:

This investigation explores the relationship between Chinese government ministers' tweets and publicized anti-US propaganda political cartoons by Chinese state media. Defining "anti-US" tweets as expressions with negative impressions about the United States, its policies, or cultural values, the study considers their context-dependent nature. Analyzing social media's growing role, this research probes the Chinese government's attitudes toward the United States. While China traditionally adhered to a non-interference stance, instances of verbal and visual retorts occurred, driven by efforts to enhance soft power and counter unfavorable portrayals. To navigate global challenges, China embraced proactive image construction, utilizing political cartoons as a messaging tool. As Sino-American political relations continue deteriorating, it has become increasingly commonplace for Chinese officials to circulate anti-US messages and negative impressions of the United States via tweets. The present study is committed to inspecting the nature and frequency of political cartoons casting the United States in an unfavorable light, with the aim of gaining a comprehensive understanding the degree to which the Chinese government and state-affiliated media are aligned in their corresponding messaging.

Keywords: China, political cartoons, propaganda, twitter, social media

Procedia PDF Downloads 49
200 Potential Positive Impacts of Online Communities on Mental Health of Women Who Have Experienced Miscarriage

Authors: Mahtab Talafian

Abstract:

With the advent of technology over the last decades, participation in online communities and discussion forums has become increasingly popular. Many studies have been done on the negative role of the online world on human beings’ psychological well-being and mental health, while relatively less attention has been given to the potentially positive role of technology in promoting mental health. Miscarriage is a common and emotionally challenging experience for women, and online communities seem to be a potential source of support for them. This study aimed to firstly find the most common types of support communicated in online communities of women who have miscarried and, secondly, investigate if there is a relationship between participation in online communities and mental health outcomes after miscarriage. In this study, three research methodologies, including content analysis, survey and interview, were employed to answer the research questions. With the analysis of 158 messages, including postings and comments in the online community of Mumsnet, it can be concluded that informational support and emotional support are the most prevalent types of support women share in the online community. Analysis of data gathered from the survey of 19 women who had experienced a miscarriage during the last year showed that participation in online communities makes a significant improvement in their mental health. Interviews also highlighted the helpful role of the online community in relieving emotional disorders, such as trauma, hopelessness, loneliness, stress, depression and anxiety about miscarriage.

Keywords: mental health, miscarriage, online community, support

Procedia PDF Downloads 46
199 Intelligent Chatbot Generating Dynamic Responses Through Natural Language Processing

Authors: Aarnav Singh, Jatin Moolchandani

Abstract:

The proposed research work aims to build a query-based AI chatbot that can answer any question related to any topic. A chatbot is software that converses with users via text messages. In the proposed system, we aim to build a chatbot that generates a response based on the user’s query. For this, we use natural language processing to analyze the query and some set of texts to form a concise answer. The texts are obtained through web-scrapping and filtering all the credible sources from a web search. The objective of this project is to provide a chatbot that is able to provide simple and accurate answers without the user having to read through a large number of articles and websites. Creating an AI chatbot that can answer a variety of user questions on a variety of topics is the goal of the proposed research project. This chatbot uses natural language processing to comprehend user inquiries and provides succinct responses by examining a collection of writings that were scraped from the internet. The texts are carefully selected from reliable websites that are found via internet searches. This project aims to provide users with a chatbot that provides clear and precise responses, removing the need to go through several articles and web pages in great detail. In addition to exploring the reasons for their broad acceptance and their usefulness across many industries, this article offers an overview of the interest in chatbots throughout the world.

Keywords: Chatbot, Artificial Intelligence, natural language processing, web scrapping

Procedia PDF Downloads 37
198 A Comparative Analysis of Asymmetric Encryption Schemes on Android Messaging Service

Authors: Mabrouka Algherinai, Fatma Karkouri

Abstract:

Today, Short Message Service (SMS) is an important means of communication. SMS is not only used in informal environment for communication and transaction, but it is also used in formal environments such as institutions, organizations, companies, and business world as a tool for communication and transactions. Therefore, there is a need to secure the information that is being transmitted through this medium to ensure security of information both in transit and at rest. But, encryption has been identified as a means to provide security to SMS messages in transit and at rest. Several past researches have proposed and developed several encryption algorithms for SMS and Information Security. This research aims at comparing the performance of common Asymmetric encryption algorithms on SMS security. The research employs the use of three algorithms, namely RSA, McEliece, and RABIN. Several experiments were performed on SMS of various sizes on android mobile device. The experimental results show that each of the three techniques has different key generation, encryption, and decryption times. The efficiency of an algorithm is determined by the time that it takes for encryption, decryption, and key generation. The best algorithm can be chosen based on the least time required for encryption. The obtained results show the least time when McEliece size 4096 is used. RABIN size 4096 gives most time for encryption and so it is the least effective algorithm when considering encryption. Also, the research shows that McEliece size 2048 has the least time for key generation, and hence, it is the best algorithm as relating to key generation. The result of the algorithms also shows that RSA size 1024 is the most preferable algorithm in terms of decryption as it gives the least time for decryption.

Keywords: SMS, RSA, McEliece, RABIN

Procedia PDF Downloads 136
197 Marketing Practices of the Urban and Recycled Wood Industry in the United States

Authors: Robert Smith, Omar Espinoza, Anna Pitta

Abstract:

In the United States, trees felled in urban areas and wood generated through construction and demolition are primarily disposed of as low-value resources, such as biomass for energy, landscaping mulch, composting, or landfilled. An emerging industry makes use of these underutilized resources to produce high value-added products, with associated benefits for the environment, the local economy, and consumers. For the circular economy to be successful, markets must be created for sustainable, reusable natural materials. Research was carried out to increase the understanding of the marketing practices of urban and reclaimed wood industries. This paper presents the results of a nationwide survey of these companies. The results indicate that a majority of companies in this industry are small firms, operating for less than 10 years, which produce mostly to order and sell their products at comparatively higher prices than competing products made from virgin natural resources. Promotional messages included quality, aesthetics, and customization, conveyed through company webpages, word of mouth, and social media. Distribution channels used include direct sales, online sales, and retail sales. Partnerships are critical for effective raw material procurement. Respondents indicated optimistic growth expectations, despite barriers associated with urban and reclaimed wood materials and production.

Keywords: urban and reclaimed wood, circular economy, marketing, wood products

Procedia PDF Downloads 94
196 Tracking and Classifying Client Interactions with Personal Coaches

Authors: Kartik Thakore, Anna-Roza Tamas, Adam Cole

Abstract:

The world health organization (WHO) reports that by 2030 more than 23.7 million deaths annually will be caused by Cardiovascular Diseases (CVDs); with a 2008 economic impact of $3.76 T. Metabolic syndrome is a disorder of multiple metabolic risk factors strongly indicated in the development of cardiovascular diseases. Guided lifestyle intervention driven by live coaching has been shown to have a positive impact on metabolic risk factors. Individuals’ path to improved (decreased) metabolic risk factors are driven by personal motivation and personalized messages delivered by coaches and augmented by technology. Using interactions captured between 400 individuals and 3 coaches over a program period of 500 days, a preliminary model was designed. A novel real time event tracking system was created to track and classify clients based on their genetic profile, baseline questionnaires and usage of a mobile application with live coaching sessions. Classification of clients and coaches was done using a support vector machines application build on Apache Spark, Stanford Natural Language Processing Library (SNLPL) and decision-modeling.

Keywords: guided lifestyle intervention, metabolic risk factors, personal coaching, support vector machines application, Apache Spark, natural language processing

Procedia PDF Downloads 408
195 Charting Sentiments with Naive Bayes and Logistic Regression

Authors: Jummalla Aashrith, N. L. Shiva Sai, K. Bhavya Sri

Abstract:

The swift progress of web technology has not only amassed a vast reservoir of internet data but also triggered a substantial surge in data generation. The internet has metamorphosed into one of the dynamic hubs for online education, idea dissemination, as well as opinion-sharing. Notably, the widely utilized social networking platform Twitter is experiencing considerable expansion, providing users with the ability to share viewpoints, participate in discussions spanning diverse communities, and broadcast messages on a global scale. The upswing in online engagement has sparked a significant curiosity in subjective analysis, particularly when it comes to Twitter data. This research is committed to delving into sentiment analysis, focusing specifically on the realm of Twitter. It aims to offer valuable insights into deciphering information within tweets, where opinions manifest in a highly unstructured and diverse manner, spanning a spectrum from positivity to negativity, occasionally punctuated by neutrality expressions. Within this document, we offer a comprehensive exploration and comparative assessment of modern approaches to opinion mining. Employing a range of machine learning algorithms such as Naive Bayes and Logistic Regression, our investigation plunges into the domain of Twitter data streams. We delve into overarching challenges and applications inherent in the realm of subjectivity analysis over Twitter.

Keywords: machine learning, sentiment analysis, visualisation, python

Procedia PDF Downloads 28
194 Performance Analysis of 5G for Low Latency Transmission Based on Universal Filtered Multi-Carrier Technique and Interleave Division Multiple Access

Authors: A. Asgharzadeh, M. Maroufi

Abstract:

5G mobile communication system has drawn more and more attention. The 5G system needs to provide three different types of services, including enhanced Mobile BroadBand (eMBB), massive machine-type communication (mMTC), and ultra-reliable and low-latency communication (URLLC). Universal Filtered Multi-Carrier (UFMC), Filter Bank Multicarrier (FBMC), and Filtered Orthogonal Frequency Division Multiplexing (f-OFDM) are suggested as a well-known candidate waveform for the coming 5G system. Themachine-to-machine (M2M) communications are one of the essential applications in 5G, and it involves exchanging of concise messages with a very short latency. However, in UFMC systems, the subcarriers are grouped into subbands but f-OFDM only one subband covers the entire band. Furthermore, in FBMC, a subband includes only one subcarrier, and the number of subbands is the same as the number of subcarriers. This paper mainly discusses the performance of UFMC with different parameters for the UFMC system. Also, paper shows that UFMC is the best choice outperforming OFDM in any case and FBMC in case of very short packets while performing similarly for long sequences with channel estimation techniques for Interleave Division Multiple Access (IDMA) systems.

Keywords: universal filtered multi-carrier technique, UFMC, interleave division multiple access, IDMA, fifth-generation, subband

Procedia PDF Downloads 108
193 Integrating Student Engagement Activities into the Learning Process

Authors: Yingjin Cui, Xue Bai, Serena Reese

Abstract:

Student engagement and student interest during class instruction are important conditions for active learning. Engagement, which has an important relationship with learning motivation, influences students' levels of persistence in overcoming challenges. Lack of student engagement and absence from face-to-face lectures and tutorials, in turn, can lead to poor academic performance. However, keeping students motivated and engaged in the learning process in different instructional modes poses a significant challenge; students can easily become discouraged from attending lectures and tutorials across both online and face-to-face settings. Many factors impact students’ engagement in the learning process. If you want to keep students focused on learning, you have to invite them into the process of helping themselves by providing an active learning environment. Active learning is an excellent technique for enhancing student engagement and participation in the learning process because it provides means to motivate the student to engage themselves in the learning process through reflection, analyzing, applying, and synthesizing the material they learn during class. In this study, we discussed how to create an active learning class (both face-to-face and synchronous online) through engagement activities, including reflection, collaboration, screen messages, open poll, tournament, and transferring editing roles. These activities will provide an uncommon interactive learning environment that can result in improved learning outcomes. To evaluate the effectiveness of those engagement activities in the learning process, an experimental group and a control group will be explored in the study.

Keywords: active learning, academic performance, engagement activities, learning motivation

Procedia PDF Downloads 125
192 A Survey of Feature-Based Steganalysis for JPEG Images

Authors: Syeda Mainaaz Unnisa, Deepa Suresh

Abstract:

Due to the increase in usage of public domain channels, such as the internet, and communication technology, there is a concern about the protection of intellectual property and security threats. This interest has led to growth in researching and implementing techniques for information hiding. Steganography is the art and science of hiding information in a private manner such that its existence cannot be recognized. Communication using steganographic techniques makes not only the secret message but also the presence of hidden communication, invisible. Steganalysis is the art of detecting the presence of this hidden communication. Parallel to steganography, steganalysis is also gaining prominence, since the detection of hidden messages can prevent catastrophic security incidents from occurring. Steganalysis can also be incredibly helpful in identifying and revealing holes with the current steganographic techniques, which makes them vulnerable to attacks. Through the formulation of new effective steganalysis methods, further research to improve the resistance of tested steganography techniques can be developed. Feature-based steganalysis method for JPEG images calculates the features of an image using the L1 norm of the difference between a stego image and the calibrated version of the image. This calibration can help retrieve some of the parameters of the cover image, revealing the variations between the cover and stego image and enabling a more accurate detection. Applying this method to various steganographic schemes, experimental results were compared and evaluated to derive conclusions and principles for more protected JPEG steganography.

Keywords: cover image, feature-based steganalysis, information hiding, steganalysis, steganography

Procedia PDF Downloads 187
191 A Highly Efficient Broadcast Algorithm for Computer Networks

Authors: Ganesh Nandakumaran, Mehmet Karaata

Abstract:

A wave is a distributed execution, often made up of a broadcast phase followed by a feedback phase, requiring the participation of all the system processes before a particular event called decision is taken. Wave algorithms with one initiator such as the 1-wave algorithm have been shown to be very efficient for broadcasting messages in tree networks. Extensions of this algorithm broadcasting a sequence of waves using a single initiator have been implemented in algorithms such as the m-wave algorithm. However as the network size increases, having a single initiator adversely affects the message delivery times to nodes further away from the initiator. As a remedy, broadcast waves can be allowed to be initiated by multiple initiator nodes distributed across the network to reduce the completion time of broadcasts. These waves initiated by one or more initiator processes form a collection of waves covering the entire network. Solutions to global-snapshots, distributed broadcast and various synchronization problems can be solved efficiently using waves with multiple concurrent initiators. In this paper, we propose the first stabilizing multi-wave sequence algorithm implementing waves started by multiple initiator processes such that every process in the network receives at least one sequence of broadcasts. Due to being stabilizing, the proposed algorithm can withstand transient faults and do not require initialization. We view a fault as a transient fault if it perturbs the configuration of the system but not its program.

Keywords: distributed computing, multi-node broadcast, propagation of information with feedback and cleaning (PFC), stabilization, wave algorithms

Procedia PDF Downloads 475
190 Real-Time Gesture Recognition System Using Microsoft Kinect

Authors: Ankita Wadhawan, Parteek Kumar, Umesh Kumar

Abstract:

Gesture is any body movement that expresses some attitude or any sentiment. Gestures as a sign language are used by deaf people for conveying messages which helps in eliminating the communication barrier between deaf people and normal persons. Nowadays, everybody is using mobile phone and computer as a very important gadget in their life. But there are some physically challenged people who are blind/deaf and the use of mobile phone or computer like device is very difficult for them. So, there is an immense need of a system which works on body gesture or sign language as input. In this research, Microsoft Kinect Sensor, SDK V2 and Hidden Markov Toolkit (HTK) are used to recognize the object, motion of object and human body joints through Touch less NUI (Natural User Interface) in real-time. The depth data collected from Microsoft Kinect has been used to recognize gestures of Indian Sign Language (ISL). The recorded clips are analyzed using depth, IR and skeletal data at different angles and positions. The proposed system has an average accuracy of 85%. The developed Touch less NUI provides an interface to recognize gestures and controls the cursor and click operation in computer just by waving hand gesture. This research will help deaf people to make use of mobile phones, computers and socialize among other persons in the society.

Keywords: gesture recognition, Indian sign language, Microsoft Kinect, natural user interface, sign language

Procedia PDF Downloads 282
189 A Barthesian Analysis of Semiotic Practices in an Indigenous School in Taiwan: A Case of a Bunun Primary School

Authors: Yi Yin Chen, Changsoo Hur

Abstract:

This study explores the role of totems and decorative texts on an indigenous primary school campus in Taiwan, as well as how they affect the building of the cultural identity of indigenous students. By employing Roland Barthes' semiotic theory, this research aims to uncover the cultural meanings and social functions contained in these visual symbols, as well as their significance for building a cultural identity among indigenous students. The study uses a qualitative method, combining observations, interviews, and document analysis to explore how these symbols perform as carriers of hidden meaning and contribute to educational and cultural settings. The findings show that totems on the indigenous school campus reflect the ethnic group's cultural background knowledge, allowing students to study their cultural heritage and providing a sense of belonging. However, certain textual decorations also reflect the historical influence of the hegemonic government attempting to establish moral norms in the ethnic group. This coexistence of traditional ethnic totems and hegemonic textual admonitions in the school environment creates a complex identity landscape for students, leading to a multiplicity of cultural identities. It underlines the importance of culturally relevant symbols in enhancing students' cultural heritage and identity and presents the challenges posed by conflicting cultural messages within the educational context.

Keywords: Roland Barthes, semiotic, Indigenous, Bunun

Procedia PDF Downloads 13
188 Preservice EFL Teachers in a Blended Professional Development Program: Learning to Teach Speech Acts

Authors: Mei-Hui Liu

Abstract:

This study examines the effectiveness of a blended professional development program on preservice EFL (English as a foreign language) teachers’ learning to teach speech acts with the advent of Information and Communication Technology, researchers and scholars underscore the significance of integrating online and face-to-face learning opportunities in the teacher education field. Yet, a paucity of evidence has been documented to investigate the extent to which such a blended professional learning model may impact real classroom practice and student learning outcome. This yearlong project involves various stakeholders, including 25 preservice teachers, 5 English professionals, and 45 secondary school students. Multiple data sources collected are surveys, interviews, reflection journals, online discussion messages, artifacts, and discourse completion tests. Relying on the theoretical lenses of Community of Inquiry, data analysis depicts the nature and process of preservice teachers’ professional development in this blended learning community, which triggers and fosters both face-to-face and synchronous/asynchronous online interactions among preservice teachers and English professionals (i.e., university faculty and in-service teachers). Also included is the student learning outcome after preservice teachers put what they learn from the support community into instructional practice. Pedagogical implications and research suggestions are further provided based on the research findings and limitations.

Keywords: blended professional development, preservice EFL teachers, speech act instruction, student learning outcome

Procedia PDF Downloads 197
187 The Colombian Linguistic Landscape: A Study of Commercial Signs

Authors: Francia Martinez

Abstract:

This study documents and demonstrates the profound impact of the high status of American English and culture in Colombian commercial landscape due to the globalization and commodification of English. It also documents and describes how Colombian advertisers make use of various language and visual mechanisms in the commercial linguistic landscape to convey messages, create an image with which the target audience can identify, and build a relationship with that target audience. The data (in the form of pictures) were collected in different cities in Colombia and were classified and organized into different categories for the reliability and validity of the analysis. The research questions were: do the ubiquity and high status of American English and culture play a major role in the Colombian commercial linguistic landscape? If so, how?, what roles do national and local culture and language (Spanish) play in the commercial linguistic landscape?, and what different linguistic and visual strategies do Colombian advertisers employ to reach their target audience? Based on data analysis and results, American and local culture and icons play a major role when Colombian advertisers create and design their commercial logos and ads to get consumers’ attention and establish a rapport with them in a successful way. In order to achieve their objectives, Colombian advertisers rely on creative linguistic and visual techniques in their ads, such as puns, humor, irony, comparisons, metaphors, mocking, exaggeration, parody, personification, sarcasm, satire, allusion, onomatopoeias, and imitation (copycat or cloning).

Keywords: Colombian ads, linguistic landscape, rhetorical devices, sociolinguistics

Procedia PDF Downloads 282
186 A Location-based Authentication and Key Management Scheme for Border Surveillance Wireless Sensor Networks

Authors: Walid Abdallah, Noureddine Boudriga

Abstract:

Wireless sensor networks have shown their effectiveness in the deployment of many critical applications especially in the military domain. Border surveillance is one of these applications where a set of wireless sensors are deployed along a country border line to detect illegal intrusion attempts to the national territory and report this to a control center to undergo the necessary measures. Regarding its nature, this wireless sensor network can be the target of many security attacks trying to compromise its normal operation. Particularly, in this application the deployment and location of sensor nodes are of great importance for detecting and tracking intruders. This paper proposes a location-based authentication and key distribution mechanism to secure wireless sensor networks intended for border surveillance where the key establishment is performed using elliptic curve cryptography and identity-based public key scheme. In this scheme, the public key of each sensor node will be authenticated by keys that depend on its position in the monitored area. Before establishing a pairwise key between two nodes, each one of them must verify the neighborhood location of the other node using a message authentication code (MAC) calculated on the corresponding public key and keys derived from encrypted beacon messages broadcast by anchor nodes. We show that our proposed public key authentication and key distribution scheme is more resilient to node capture and node replication attacks than currently available schemes. Also, the achievement of the key distribution between nodes in our scheme generates less communication overhead and hence increases network performances.

Keywords: wireless sensor networks, border surveillance, security, key distribution, location-based

Procedia PDF Downloads 637
185 The Effects of Smoking Prevention Intervention on Smoking Knowledge, Attitudes and Anti-Smoking Self-Efficiency among Adolescent Students

Authors: Yi-Ying Lin, Su-Guo, Chia-Hao, Ming-Szu Hong

Abstract:

Objectives: Smoking is a common addictive behavior in teenagers. Long-term smoking is hazardous to health, causes family and social expenditure, and is an important topic that should not be overlooked by academia or the government. The aims of this study are to examine the effectiveness of these courses in terms of teenagers’ knowledge and attitudes towards the hazards of smoking and the effectiveness of their self-efficacy in rejecting smoking. Methods: This study adopted a pre-test post-test design and selected 7th, 8th, 10th, and 11th graders from two junior high schools. Total of 1073 valid questionnaires were collected. The self-completed questionnaire included background information, smoking status of relatives staying with the subject, attitudes of parents towards child smoking, knowledge and attitudes towards smoking, and anti-smoking self-efficacy. Results and clinical applications: Subjects in the experimental group underwent course interventions, which are 'smoking prevention courses,' in the semester. After course intervention, it was found that the intervention showed significant efficacy in terms of knowledge and self-efficacy in rejecting smoking in senior high school students but no efficacy in junior high school. We recommend that this course can be used in normal senior high schools. With regards to junior high schools, smoking prevention courses should be designed to be gamified, or combined with activities with both anti-smoking messages and entertainment at the same time, so that knowledge, attitudes, and self-efficacy can be subconsciously cultivated.

Keywords: adolescent students, smoking knowledge, attitudes, anti-smoking self-efficiency, smoking prevention intervention

Procedia PDF Downloads 102
184 Emerging Cyber Threats and Cognitive Vulnerabilities: Cyberterrorism

Authors: Oludare Isaac Abiodun, Esther Omolara Abiodun

Abstract:

The purpose of this paper is to demonstrate that cyberterrorism is existing and poses a threat to computer security and national security. Nowadays, people have become excitedly dependent upon computers, phones, the Internet, and the Internet of things systems to share information, communicate, conduct a search, etc. However, these network systems are at risk from a different source that is known and unknown. These network systems risk being caused by some malicious individuals, groups, organizations, or governments, they take advantage of vulnerabilities in the computer system to hawk sensitive information from people, organizations, or governments. In doing so, they are engaging themselves in computer threats, crime, and terrorism, thereby making the use of computers insecure for others. The threat of cyberterrorism is of various forms and ranges from one country to another country. These threats include disrupting communications and information, stealing data, destroying data, leaking, and breaching data, interfering with messages and networks, and in some cases, demanding financial rewards for stolen data. Hence, this study identifies many ways that cyberterrorists utilize the Internet as a tool to advance their malicious mission, which negatively affects computer security and safety. One could identify causes for disparate anomaly behaviors and the theoretical, ideological, and current forms of the likelihood of cyberterrorism. Therefore, for a countermeasure, this paper proposes the use of previous and current computer security models as found in the literature to help in countering cyberterrorism

Keywords: cyberterrorism, computer security, information, internet, terrorism, threat, digital forensic solution

Procedia PDF Downloads 72
183 Divergences in Interpreters’ Oral Interpretation among Pentecostal Churches: Sermonic Reflections

Authors: Rufus Olufemi Adebayo, Sylvia Phiwani Zulu

Abstract:

Interpreting in the setting of diverse language and multicultural congregants, is often understood as integrating the content of the message. Preaching, similar to any communication, takes seriously people’s multiple contexts. The one who provides the best insight into understanding “the other”, traditionally speaking could be an interpreter in a multilingual context. Nonetheless, there are reflections in the loss of spiritual communication, translation and interpretive dialogue. No matter how eloquent the preacher is, an interpreter can make or mere the sermon (speech). The sermon that the preacher preaches is not always the one the congregation hears from the interpreter. In other occurrences, however, interpreting can lead not only to distort messages but also to dissatisfied audiences and preacher being overshadowed by the pranks of the interpreter. Using qualitative methodology, this paper explores the challenges and the conventional assumptions about preachers’ interpreter as influenced by spirituality, culture, and language in empirical and theoretical perspectives. An emphasis on the bias translation and the basis of reality that suppresses or devalues the spiritual communication is examined. The result indicates that interpretation of the declaration of guilt, history of congregation, spirituality, attitudes, morals, customs, specific practices of a preacher, education, and the environment form an entangled and misinterpretation. The article concludes by re-examining these qualities and rearticulating them into a preliminary theory for practice, as distinguished from theory, which could possibly enhance the development of more sustainable multilingual interpretation in the South African Pentecostal churches.

Keywords: congregants, divergences, interpreting/translation, language & communication, sermon/preaching

Procedia PDF Downloads 133
182 Livonian Werewolves, 1500-1700s: A Sociological Assessment of Their Historical Significance and Origins through the Case of Old Thiess

Authors: Liu Jiaxin

Abstract:

This paper seeks to do an in-depth investigation on the phenomenon of Early Modern era (1500-1700s) Livonian werewolves. Noting their uniqueness in comparison to contemporaneous werewolves hailing from other geographic areas, the paper suggests that the Livonian werewolf is a metaphor for Livonian society at that time, one which was characterized by social turmoil and strict class hierarchy. This metaphor was utilized by different classes to establish their own interests in society, and thus the paper concludes that the werewolf is a mutable artifact whose value is contingent on its social context. This is demonstrated by the particular case of Old Thiess—a poor, elderly Livonian peasant who gave an unorthodox and anomalous testimony when accused of being a werewolf. In his court statement, it is shown how Thiess was, in fact, alluding to social tensions by lambasting the rich German elite and establishing the righteousness of the peasantry, of which he was a member. A close reading method was utilized on the trial transcript of Old Thiess with heavy reference to Carlo Ginzburg and Bruce Lincoln’s collaborative work Old Thiess, a Livonian werewolf: a classic case in comparative perspective. Through a contextual reading of Livonia’s social atmosphere, the paper draws connections between the content of the trial to wider societal disturbances happening at the time. The thesis—that the werewolf is a flexible metaphor for the social milieu—is further buttressed by numerous contemporaneous sources that had similar messages as Thiess’ transcript, which are discussed as well.

Keywords: early-modern baltic, Livonia, Old Thiess, social history, werewolves

Procedia PDF Downloads 83
181 Hand Gesture Interface for PC Control and SMS Notification Using MEMS Sensors

Authors: Keerthana E., Lohithya S., Harshavardhini K. S., Saranya G., Suganthi S.

Abstract:

In an epoch of expanding human-machine interaction, the development of innovative interfaces that bridge the gap between physical gestures and digital control has gained significant momentum. This study introduces a distinct solution that leverages a combination of MEMS (Micro-Electro-Mechanical Systems) sensors, an Arduino Mega microcontroller, and a PC to create a hand gesture interface for PC control and SMS notification. The core of the system is an ADXL335 MEMS accelerometer sensor integrated with an Arduino Mega, which communicates with a PC via a USB cable. The ADXL335 provides real-time acceleration data, which is processed by the Arduino to detect specific hand gestures. These gestures, such as left, right, up, down, or custom patterns, are interpreted by the Arduino, and corresponding actions are triggered. In the context of SMS notifications, when a gesture indicative of a new SMS is recognized, the Arduino relays this information to the PC through the serial connection. The PC application, designed to monitor the Arduino's serial port, displays these SMS notifications in the serial monitor. This study offers an engaging and interactive means of interfacing with a PC by translating hand gestures into meaningful actions, opening up opportunities for intuitive computer control. Furthermore, the integration of SMS notifications adds a practical dimension to the system, notifying users of incoming messages as they interact with their computers. The use of MEMS sensors, Arduino, and serial communication serves as a promising foundation for expanding the capabilities of gesture-based control systems.

Keywords: hand gestures, multiple cables, serial communication, sms notification

Procedia PDF Downloads 24
180 A Deep Learning Approach to Online Social Network Account Compromisation

Authors: Edward K. Boahen, Brunel E. Bouya-Moko, Changda Wang

Abstract:

The major threat to online social network (OSN) users is account compromisation. Spammers now spread malicious messages by exploiting the trust relationship established between account owners and their friends. The challenge in detecting a compromised account by service providers is validating the trusted relationship established between the account owners, their friends, and the spammers. Another challenge is the increase in required human interaction with the feature selection. Research available on supervised learning (machine learning) has limitations with the feature selection and accounts that cannot be profiled, like application programming interface (API). Therefore, this paper discusses the various behaviours of the OSN users and the current approaches in detecting a compromised OSN account, emphasizing its limitations and challenges. We propose a deep learning approach that addresses and resolve the constraints faced by the previous schemes. We detailed our proposed optimized nonsymmetric deep auto-encoder (OPT_NDAE) for unsupervised feature learning, which reduces the required human interaction levels in the selection and extraction of features. We evaluated our proposed classifier using the NSL-KDD and KDDCUP'99 datasets in a graphical user interface enabled Weka application. The results obtained indicate that our proposed approach outperformed most of the traditional schemes in OSN compromised account detection with an accuracy rate of 99.86%.

Keywords: computer security, network security, online social network, account compromisation

Procedia PDF Downloads 93
179 Development of Automatic Laser Scanning Measurement Instrument

Authors: Chien-Hung Liu, Yu-Fen Chen

Abstract:

This study used triangular laser probe and three-axial direction mobile platform for surface measurement, programmed it and applied it to real-time analytic statistics of different measured data. This structure was used to design a system integration program: using triangular laser probe for scattering or reflection non-contact measurement, transferring the captured signals to the computer through RS-232, and using RS-485 to control the three-axis platform for a wide range of measurement. The data captured by the laser probe are formed into a 3D surface. This study constructed an optical measurement application program in the concept of visual programming language. First, the signals are transmitted to the computer through RS-232/RS-485, and then the signals are stored and recorded in graphic interface timely. This programming concept analyzes various messages, and makes proper presentation graphs and data processing to provide the users with friendly graphic interfaces and data processing state monitoring, and identifies whether the present data are normal in graphic concept. The major functions of the measurement system developed by this study are thickness measurement, SPC, surface smoothness analysis, and analytical calculation of trend line. A result report can be made and printed promptly. This study measured different heights and surfaces successfully, performed on-line data analysis and processing effectively, and developed a man-machine interface for users to operate.

Keywords: laser probe, non-contact measurement, triangulation measurement principle, statistical process control, labVIEW

Procedia PDF Downloads 346
178 Twitter Ego Networks and the Capital Markets: A Social Network Analysis Perspective of Market Reactions to Earnings Announcement Events

Authors: Gregory D. Saxton

Abstract:

Networks are everywhere: lunch ties among co-workers, golfing partnerships among employees, interlocking board-of-director connections, Facebook friendship ties, etc. Each network varies in terms of its structure -its size, how inter-connected network members are, and the prevalence of sub-groups and cliques. At the same time, within any given network, some network members will have a more important, more central position on account of their greater number of connections or their capacity as “bridges” connecting members of different network cliques. The logic of network structure and position is at the heart of what is known as social network analysis, and this paper applies this logic to the study of the stock market. Using an array of data analytics and machine learning tools, this study will examine 17 million Twitter messages discussing the stocks of the firms in the S&P 1,500 index in 2018. Each of these 1,500 stocks has a distinct Twitter discussion network that varies in terms of core network characteristics such as size, density, influence, norms and values, level of activity, and embedded resources. The study’s core proposition is that the ultimate effect of any market-relevant information is contingent on the characteristics of the network through which it flows. To test this proposition, this study operationalizes each of the core network characteristics and examines their influence on market reactions to 2018 quarterly earnings announcement events.

Keywords: data analytics, investor-to-investor communication, social network analysis, Twitter

Procedia PDF Downloads 90
177 Lab Support: A Computer Laboratory Class Management Support System

Authors: Eugenia P. Ramirez, Kevin Matthe Caramancion, Mia Eleazar

Abstract:

Getting the attention of students is a constant challenge to the instructors/lecturers. Although in the computer laboratories some networking and entertainment websites are blocked, yet, these websites have unlimited ways of attracting students to get into it. Thus, when an instructor gives a specific set of instructions, some students may not be able to follow sequentially the steps that are given. The instructor has to physically go to the specific remote terminal and show the student the details. Sometimes, during an examination in laboratory set-up, a proctor may prefer to give detailed and text-written instructions rather than verbal instructions. Even the mere calling of a specific student at any time will distract the whole class especially when activities are being performed. What is needed is : An application software that is able to lock the student's monitor and at the same time display the instructor’s screen; a software that is powerful enough to process in its side alone and manipulate a specific user’s terminal in terms of free configuration that is, without restrictions at the server level is a required functionality for a modern and optimal server structure; a software that is able to send text messages to students, per terminal or in group will be a solution. These features are found in LabSupport. This paper outlines the LabSupport application software framework to efficiently manage computer laboratory sessions and will include different modules: screen viewer, demonstration mode, monitor locking system, text messaging, and class management. This paper's ultimate aim is to provide a system that increases instructor productivity.

Keywords: application software, broadcast messaging, class management, locking system

Procedia PDF Downloads 413
176 Sexting Phenomenon in Educational Settings: A Data Mining Approach

Authors: Koutsopoulou Ioanna, Gkintoni Evgenia, Halkiopoulos Constantinos, Antonopoulou Hera

Abstract:

Recent advances in Internet Computer Technology (ICT) and the ever-increasing use of technological equipment amongst adolescents and young adults along with unattended access to the internet and social media and uncontrolled use of smart phones and PCs have caused social problems like sexting to emerge. The main purpose of the present article is first to present an analytic theoretical framework of sexting as a recent social phenomenon based on studies that have been conducted the last decade or so; and second to investigate Greek students’ and also social network users, sexting perceptions and to record how often social media users exchange sexual messages and to retrace demographic variables predictors. Data from 1,000 students were collected and analyzed and all statistical analysis was done by the software package WEKA. The results indicate among others, that the use of data mining methods is an important tool to draw conclusions that could affect decision and policy making especially in the field and related social topics of educational psychology. To sum up, sexting lurks many risks for adolescents and young adults students in Greece and needs to be better addressed in relevance to the stakeholders as well as society in general. Furthermore, policy makers, legislation makers and authorities will have to take action to protect minors. Prevention strategies based on Greek cultural specificities are being proposed. This social problem has raised concerns in recent years and will most likely escalate concerns in global communities in the future.

Keywords: educational ethics, sexting, Greek sexters, sex education, data mining

Procedia PDF Downloads 160
175 Information Overload, Information Literacy and Use of Technology by Students

Authors: Elena Krelja Kurelović, Jasminka Tomljanović, Vlatka Davidović

Abstract:

The development of web technologies and mobile devices makes creating, accessing, using and sharing information or communicating with each other simpler every day. However, while the amount of information constantly increasing it is becoming harder to effectively organize and find quality information despite the availability of web search engines, filtering and indexing tools. Although digital technologies have overall positive impact on students’ lives, frequent use of these technologies and digital media enriched with dynamic hypertext and hypermedia content, as well as multitasking, distractions caused by notifications, calls or messages; can decrease the attention span, make thinking, memorizing and learning more difficult, which can lead to stress and mental exhaustion. This is referred to as “information overload”, “information glut” or “information anxiety”. Objective of this study is to determine whether students show signs of information overload and to identify the possible predictors. Research was conducted using a questionnaire developed for the purpose of this study. The results show that students frequently use technology (computers, gadgets and digital media), while they show moderate level of information literacy. They have sometimes experienced symptoms of information overload. According to the statistical analysis, higher frequency of technology use and lower level of information literacy are correlated with larger information overload. The multiple regression analysis has confirmed that the combination of these two independent variables has statistically significant predictive capacity for information overload. Therefore, the information science teachers should pay attention to improving the level of students’ information literacy and educate them about the risks of excessive technology use.

Keywords: information overload, computers, mobile devices, digital media, information literacy, students

Procedia PDF Downloads 256
174 Functionality of Promotional and Advertising Texts: Pragmatic Implications for English-Arabic Translation

Authors: Jamal Gaber Abdalla

Abstract:

In business promotion and advertising, language is used intentionally to create a powerful influence over people and their behavior. In commercial and marketing activities, the choice of language to convey specific messages with the intention of influencing people is pragmatically important. Design and visual content in promotional and advertising texts also have a great persuasive impact on consumers. It is the functional combination of design, language and visual content that helps people to identify a product or service and remember it. Translating promotional and advertising texts between structurally and culturally different languages, such as English and Arabic, usually involves pragmatic/functional shifts that decide the quality of translation. This study explores some of these shifts in translating promotional and advertising texts between English and Arabic and their implications for translation quality. The study is based on a contrastive analysis of data collected from real samples of English-Arabic translations of promotional and advertising texts. The samples cover different promotional and advertising text types and different business domains. The aim is to identify the most recurrent translation shifts and most used translation approaches/strategies that achieve quality in view of the functional nature of promotional and advertising texts and target language culture conventions. The study shows that linguistic shifts and visual shifts are recurrent in English-Arabic translations of promotional and advertising texts. The study also shows that the most commonly used translation approaches/strategies are functional translation, domestication, communicative translation.

Keywords: advertising, Arabic, English, functional translation, promotion

Procedia PDF Downloads 333
173 The Impact of Online Advertising on Generation Y’s Purchase Decision in Malaysia

Authors: Mui Joo Tang, Eang Teng Chan

Abstract:

Advertising is commonly used to foster sales and reputation of an institution. It is at first the growth of print advertising that has increased the population and number of periodicals of newspaper and its circulation. The rise of Internet and online media has somehow blurred the role of media and advertising though the intention is still to reach out to audience and to increase sales. The relationship between advertising and audience on a product purchase through persuasion has been developing from print media to online media. From the changing media environment and audience, it is the concern of this research to study the impact of online advertising to such a relationship cycle. The content of online advertisements is much of text, multimedia, photo, audio and video. The messages of such content format may indeed bring impacts to its audience and its credibility. This study is therefore reflecting the effectiveness of online advertisement and its influences on generation Y in their purchasing behavior. This study uses Media Dependency Theory to analyze the relationship between the impact of online advertisement and media usage pattern of generation Y. Hierarchy of Effectiveness Model is used as a marketing communication model to study the effectiveness of advertising and further to determine the impact of online advertisement on generation Y in their purchasing decision making. This research uses online survey to reach out the sample of generation Y. The results have shown that online advertisements do not affect much on purchase decision making even though generation Y relies much on the media content including online advertisement for its information and believing in its credibility. There are few other external factors that may interrupt the effectiveness of online advertising. The very obvious influence of purchasing behavior is actually derived from the peers.

Keywords: generation Y, purchase decision, print media, online advertising, persuasion

Procedia PDF Downloads 501
172 SIP Flooding Attacks Detection and Prevention Using Shannon, Renyi and Tsallis Entropy

Authors: Neda Seyyedi, Reza Berangi

Abstract:

Voice over IP (VOIP) network, also known as Internet telephony, is growing increasingly having occupied a large part of the communications market. With the growth of each technology, the related security issues become of particular importance. Taking advantage of this technology in different environments with numerous features put at our disposal, there arises an increasing need to address the security threats. Being IP-based and playing a signaling role in VOIP networks, Session Initiation Protocol (SIP) lets the invaders use weaknesses of the protocol to disable VOIP service. One of the most important threats is denial of service attack, a branch of which in this article we have discussed as flooding attacks. These attacks make server resources wasted and deprive it from delivering service to authorized users. Distributed denial of service attacks and attacks with a low rate can mislead many attack detection mechanisms. In this paper, we introduce a mechanism which not only detects distributed denial of service attacks and low rate attacks, but can also identify the attackers accurately. We detect and prevent flooding attacks in SIP protocol using Shannon (FDP-S), Renyi (FDP-R) and Tsallis (FDP-T) entropy. We conducted an experiment to compare the percentage of detection and rate of false alarm messages using any of the Shannon, Renyi and Tsallis entropy as a measure of disorder. Implementation results show that, according to the parametric nature of the Renyi and Tsallis entropy, by changing the parameters, different detection percentages and false alarm rates will be gained with the possibility to adjust the sensitivity of the detection mechanism.

Keywords: VOIP networks, flooding attacks, entropy, computer networks

Procedia PDF Downloads 377