Search results for: hard fraud
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 1224

Search results for: hard fraud

924 Nanowire by Ac Electrodeposition Into Nanoporous Alumina Fabrication of High Aspect Ratio Metalic

Authors: M. Beyzaiea, S. Mohammadia

Abstract:

High aspect ratio metallic (silver, cobalt) nanowire arrays were fabricated using ac electrodeposition techniques into the nanoporous alumina template. The template with long pore dept fabricated by hard anodization (HA) and thinned for ac electrodeposition. Template preparation was done in short time by using HA technique and high speed thing process. The TEM and XRD investigation confirm the three dimensional nucleation growth mechanism of metallic nanowire inside the nanoporous alumina that fabricated by HA process.

Keywords: metallic, nanowire, nanoporous alumina, ac electrodeposition

Procedia PDF Downloads 269
923 Quality Management in Spice Paprika Production as a Synergy of Internal and External Quality Measures

Authors: É. Kónya, E. Szabó, I. Bata-Vidács, T. Deák, M. Ottucsák, N. Adányi, A. Székács

Abstract:

Spice paprika is a major spice commodity in the European Union (EU), produced locally and imported from non-EU countries, reported not only for chemical and microbiological contamination, but also for fraud. The effective interaction between producers’ quality management practices and government and EU activities is described on the example of spice paprika production and control in Hungary, a country of leading spice paprika producer and per capita consumer in Europe. To demonstrate the importance of various contamination factors in the Hungarian production and EU trade of spice paprika, several aspects concerning food safety of this commodity are presented. Alerts in the Rapid Alert System for Food and Feed (RASFF) of the EU between 2005 and 2013, as well as Hungarian state inspection results on spice paprika in 2004 are discussed, and quality non-compliance claims regarding spice paprika among EU member states are summarized in by means of network analysis. Quality assurance measures established along the spice paprika production technology chain at the leading Hungarian spice paprika manufacturer, Kalocsai Fűszerpaprika Zrt. are surveyed with main critical control points identified. The structure and operation of the Hungarian state food safety inspection system is described. Concerted performance of the latter two quality management systems illustrates the effective interaction between internal (manufacturer) and external (state) quality control measures.

Keywords: spice paprika, quality control, reporting mechanisms, RASFF, vulnerable points, HACCP

Procedia PDF Downloads 283
922 Burnishing Effect on the Mechanical Characteristics of 100C6

Authors: Ouahiba Taamallah, Tarek Litim

Abstract:

This work relates to the physico-geometrical aspect of the surface layers of 100C6 steel having undergone the burnishing treatment by hard steel ball. The application of tip diamond burnishing promotes better roughness compared to turning. In addition, it allows the surface layers to be consolidated by work hardening phenomena. The optimal effects are closely related to the parameters of the treatment and the active part of the device. With an 80% improvement in roughness resulting from the treatment, burnishing can be defined as a finishing operation within the machining range. With a 40% gain in consolidation rate, this treatment is an efficient process for material consolidation.

Keywords: 100C6 steel, burnishing, hardening, roughness

Procedia PDF Downloads 151
921 Good Advice Is Hard to Come By: A Cross-Cultural Perspective on Opposing Views and Entrepreneurial Passion

Authors: Marcel Hechler

Abstract:

The purpose of this study is to understand the impact of entrepreneurs' receptiveness to opposing views on their entrepreneurial passion. Following a cross-cultural approach, we surveyed 1,228 entrepreneurs in seven developing and emerging countries. Besides a positive relationship between receptiveness to opposing views and harmonious passion for entrepreneurship, we found first evidence for a significant moderating effect of access to information reinforcing the positive main effect.

Keywords: harmonious passion, developing and emerging countries, self-determination theory, receptiveness to opposing views

Procedia PDF Downloads 208
920 Propagation of Simmondsia chinensis (Link) Schneider by Stem Cuttings

Authors: Ahmed M. Eed, Adam H. Burgoyne

Abstract:

Jojoba (Simmondsia chinensis (Link) Schneider), is a desert shrub which tolerates saline, alkyle soils and drought. The seeds contain a characteristic liquid wax of economic importance in industry as a machine lubricant and cosmetics. A major problem in seed propagation is that jojoba is a dioecious plant whose sex is not easily determined prior to flowering (3-4 years from germination). To overcome this phenomenon, asexual propagation using vegetative methods such as cutting can be used. This research was conducted to find out the effect of different Plant Growth Regulators (PGRs) and rooting media on Jojoba rhizogenesis. An experiment was carried out in a Factorial Completely Randomized Design (FCRD) with three replications, each with sixty cuttings per replication in fiberglass house of Natural Jojoba Corporation at Yemen. The different rooting media used were peat moss + perlite + vermiculite (1:1:1), peat moss + perlite (1:1) and peat moss + sand (1:1). Plant materials used were semi-hard wood cuttings of jojoba plants with length of 15 cm. The cuttings were collected in the month of June during 2012 and 2013 from the sub-terminal growth of the mother plants of Amman farm and introduced to Yemen. They were wounded, treated with Indole butyric acid (IBA), α-naphthalene acetic acid (NAA) or Indole-3-acetic acid (IAA) all @ 4000 ppm (part per million) and cultured on different rooting media under intermittent mist propagation conditions. IBA gave significantly higher percentage of rooting (66.23%) compared to NAA and IAA in all media used. However, the lowest percentage of rooting (5.33%) was recorded with IAA in the medium consisting of peat moss and sand (1:1). No significant difference was observed at all types of PGRs used with rooting media in respect of root length. Maximum number of roots was noticed in medium consisting of peat moss, perlite and vermiculite (1:1:1); peat moss and perlite (1:1) and peat moss and sand (1:1) using IBA, NAA and IBA, respectively. The interaction among rooting media was statistically significant with respect to rooting percentage character. Similarly, the interactions among PGRs were significant in terms of rooting percentage and also root length characters. The results demonstrated suitability of propagation of jojoba plants by semi-hard wood cuttings.

Keywords: cutting, IBA, Jojoba, propagation, rhizogenesis

Procedia PDF Downloads 338
919 Agency Cost, Firm Performance, Corporate Governance: Evidence from Indonesia

Authors: Arnold Sanda Layuk

Abstract:

Fraud in the disclosure of financial statements by management shows that agency conflict is an important issue in the company. The conflict has consequences for the agency costs that must be borne and has an impact on the firm's performance. The effect of agency costs on firm performance is investigated in this study, as well as whether several variables such as corporate governance mechanisms can positively moderate the agency cost and firm performance relationship. The agency cost is measured by the asset utilization ratio and discretionary expenditure ratio. The firm's performance is represented by the return on equity. Data was collected from the manufacturing companies listed on the Indonesia Stock Exchange from 2015 to 2019, then regressed on the panel data using the panel corrected standard error model (PCSE). According to the findings, agency costs are negatively related to firm performance, which supports previous empirical research findings. It also found that the agency cost and firm performance relationship is significantly moderated by board size and ownership concentration as the representatives of corporate governance mechanisms. It suggests that corporate governance can become tools to reduce agency costs and increase firm performance as well. The empirical evidence adds to previous research on agency conflict, particularly in emerging markets. These findings are expected to supplement previous research and provide additional information to shareholders in order to control opportunistic management decisions that affect their investments and discretionary operational expenses.

Keywords: agency cost, corporate governance, asset utilization ratio, firm performance

Procedia PDF Downloads 190
918 Driven Force of Integrated Reporting in Thailand

Authors: Nuttha Kirdsinsap, Watchaneeporn Setthasakko

Abstract:

This paper aims to gain opinions and perspectives of Certified Public Accountants (CPA) in Thailand regarding the driven force of Integrated Reporting. It employs in-depth interviews with CPA from different big 4 audits firms in Thailand, including PWC, Ernst and Young, Deloitte, and KPMG. It is found that the driven force of Integrated Reporting made CPA in Thailand awaken to the big change that is coming in the future, and it is said to be another big learning and integrating period between certified public accountants and other professionals (for example, engineers, environmentalists and lawyers), which, certified public accountants in Thailand will have to push themselves so hard to catch up.

Keywords: integrated reporting, learning, knowledge, certified public accountants, Thailand

Procedia PDF Downloads 268
917 The Qualitative and Quantitative Detection of Pistachio in Processed Food Products Using Florescence Dye Based PCR

Authors: Ergün Şakalar, Şeyma Özçirak Ergün

Abstract:

Pistachio nuts, the fruits of the pistachio tree (Pistacia vera), are edible tree nuts highly valued for their organoleptic properties. Pistachio nuts used in snack foods, chocolates, baklava, meat products, ice-cream industries and other gourmet products as ingredients. Undeclared pistachios may be present in food products as a consequence of fraudulent substitution. Control of food samples is very important for safety and fraud. Mix of pistachio, peanut (Arachis hypogaea), pea (Pisum sativum L.) used instead of pistachio in food products, because pistachio is a considerably expensive nut. To solve this problem, a sensitive polymerase chain reaction PCR has been developed. A real-time PCR assay for the detection of pea, peanut and pistachio in baklava was designed by using EvaGreen fluorescence dye. Primers were selected from powerful regions for identification of pea, peanut and pistachio. DNA from reference samples and industrial products were successfully extracted with the GIDAGEN® Multi-Fast DNA Isolation Kit. Genomes were identified based on their specific melting peaks (Mp) which are 77°C, 85.5°C and 82.5°C for pea, peanut and pistachio, respectively. Homogenized mixtures of raw pistachio, pea and peanut were prepared with the ratio of 0.01%, 0.1%, 1%, 10%, 40% and 70% of pistachio. Quantitative detection limit of assay was 0.1% for pistachio. Also, real-time PCR technique used in this study allowed the qualitative detection of as little as 0.001% level of peanut DNA, 0,000001% level of pistachio DNA and 0.000001% level of pea DNA in the experimental admixtures. This assay represents a potentially valuable diagnostic method for detection of nut species adulterated with pistachio as well as for highly specific and relatively rapid detection of small amounts of pistachio in food samples.

Keywords: pea, peanut, pistachio, real-time PCR

Procedia PDF Downloads 262
916 Multi-Cluster Overlapping K-Means Extension Algorithm (MCOKE)

Authors: Said Baadel, Fadi Thabtah, Joan Lu

Abstract:

Clustering involves the partitioning of n objects into k clusters. Many clustering algorithms use hard-partitioning techniques where each object is assigned to one cluster. In this paper, we propose an overlapping algorithm MCOKE which allows objects to belong to one or more clusters. The algorithm is different from fuzzy clustering techniques because objects that overlap are assigned a membership value of 1 (one) as opposed to a fuzzy membership degree. The algorithm is also different from other overlapping algorithms that require a similarity threshold to be defined as a priority which can be difficult to determine by novice users.

Keywords: data mining, k-means, MCOKE, overlapping

Procedia PDF Downloads 567
915 Providing Security to Private Cloud Using Advanced Encryption Standard Algorithm

Authors: Annapureddy Srikant Reddy, Atthanti Mahendra, Samala Chinni Krishna, N. Neelima

Abstract:

In our present world, we are generating a lot of data and we, need a specific device to store all these data. Generally, we store data in pen drives, hard drives, etc. Sometimes we may loss the data due to the corruption of devices. To overcome all these issues, we implemented a cloud space for storing the data, and it provides more security to the data. We can access the data with just using the internet from anywhere in the world. We implemented all these with the java using Net beans IDE. Once user uploads the data, he does not have any rights to change the data. Users uploaded files are stored in the cloud with the file name as system time and the directory will be created with some random words. Cloud accepts the data only if the size of the file is less than 2MB.

Keywords: cloud space, AES, FTP, NetBeans IDE

Procedia PDF Downloads 203
914 Service Delivery Disparity Conundrum at Winnie Madikizela Mandela Local Municipality: Exploration of the Enhanced Future

Authors: Mandisi Matyana

Abstract:

Although the South African local government is doing all the best in ensuring improved service delivery for the citizens, service delivery disparity still remains the real challenge for other municipalities. The unequal distribution of services within municipal wards is causing unequal happiness among the citizens; hence others do enjoy different provided municipal services, while others do not. It is acknowledged that less access to municipal services infringes one’s rights, such as the right to human dignity and the right to life. Some of the municipal services are basic services and they are the mainstay of human survival, such as water, housing, etc. It is quite evident that the service delivery disparity could be caused by the various factors within the local municipality affairs, including both administrative and political factors. Therefore, this study is undertaken to check and evaluate the main foundations of service delivery disparity in ensuring equal development of the state, particularly for local communities. The study used the qualitative method to collect the data from the citizens of Winnie Madikizela Mandela Local Municipality. An extensive literature was also conducted in understanding the causes of service delivery disparity. Study findings prove that the service delivery disparity could be caused by factors such as political interference in administration, corruption and fraud, elevated unemployment levels, inadequate institutional capacity, etc. Therefore, the study recommends strong community participation and constant external supervision in the local government so as to encourage openness in local government to ensure fair administration towards services to be provided.

Keywords: administration, development, municipal services, service delivery disparity, Winnie Madikizela Mandela local municipality

Procedia PDF Downloads 106
913 Between a Rock and a Hard Place: The Impact of Inflation on Global Supply Chains

Authors: Elad Harison

Abstract:

The paper identifies the complex links between post-COVID-19 inflationary pressures and global supply chains. Throughout the COVID-19 lockdowns and long periods after the termination of social distancing policies, consumers, notably in the U.S., have confronted and still face disruptions in the supply of goods. The study analyzes the monetary policy in the U.S. that led to the significant shift in consumer demand during a limited supply period, hence resulting in shortages and emphasizing inflationary dynamics. We argue that the monetary guidelines applied by the U.S. government further elevated the scope of supply chain disruptions.

Keywords: consumer demand, COVID-19, inflation, monetary policy, supply chain

Procedia PDF Downloads 89
912 Response Surface Methodology for Optimum Hardness of TiN on Steel Substrate

Authors: R. Joseph Raviselvan, K. Ramanathan, P. Perumal, M. R. Thansekhar

Abstract:

Hard coatings are widely used in cutting and forming tool industries. Titanium Nitride (TiN) possesses good hardness, strength and corrosion resistant. The coating properties are influenced by many process parameters. The coatings were deposited on steel substrate by changing the process parameters such as substrate temperature, nitrogen flow rate and target power in a D.C planer magnetron sputtering. The structure of coatings were analysed using XRD. The hardness of coatings was found using Micro hardness tester. From the experimental data, a regression model was developed and the optimum response was determined using Response Surface Methodology (RSM).

Keywords: hardness, RSM, sputtering, TiN XRD

Procedia PDF Downloads 318
911 The Importance of Supply Chain Management in Prosperity of Organizations

Authors: Seyedeza Baharisaravi

Abstract:

As we know, we are living in the hyper competitive environment and all of companies strive hard to engross more and more customers. Thus, in this milieu, we should produce and deliver diverse commodities, regarding with the consumers' interests. So, all companies elicit that they should pay attention on the external resources besides the internal ones. Hence, the meaning of supply chain management has been introduced as a fundamental issue for global e-business, e-commerce and e-government. The present paper explains prominences, challenges, keys, various descriptions, advantages and disadvantages, globalization and the future of one of the vital issues in the business realm which is supply chain management (SCM). This issue is one of the newest concepts of business science that has transformed the essence of every business and attitude of marketers.

Keywords: SCM concepts, supply chain management, the importance of SCM, SCM in organization

Procedia PDF Downloads 308
910 Enhancing Email Security: A Multi-Layered Defense Strategy Approach and an AI-Powered Model for Identifying and Mitigating Phishing Attacks

Authors: Anastasios Papathanasiou, George Liontos, Athanasios Katsouras, Vasiliki Liagkou, Euripides Glavas

Abstract:

Email remains a crucial communication tool due to its efficiency, accessibility and cost-effectiveness, enabling rapid information exchange across global networks. However, the global adoption of email has also made it a prime target for cyber threats, including phishing, malware and Business Email Compromise (BEC) attacks, which exploit its integral role in personal and professional realms in order to perform fraud and data breaches. To combat these threats, this research advocates for a multi-layered defense strategy incorporating advanced technological tools such as anti-spam and anti-malware software, machine learning algorithms and authentication protocols. Moreover, we developed an artificial intelligence model specifically designed to analyze email headers and assess their security status. This AI-driven model examines various components of email headers, such as "From" addresses, ‘Received’ paths and the integrity of SPF, DKIM and DMARC records. Upon analysis, it generates comprehensive reports that indicate whether an email is likely to be malicious or benign. This capability empowers users to identify potentially dangerous emails promptly, enhancing their ability to avoid phishing attacks, malware infections and other cyber threats.

Keywords: email security, artificial intelligence, header analysis, threat detection, phishing, DMARC, DKIM, SPF, ai model

Procedia PDF Downloads 48
909 Sensitivity to Misusing Verb Inflections in Both Finite and Non-Finite Clauses in Native and Non-Native Russian: A Self-Paced Reading Investigation

Authors: Yang Cao

Abstract:

Analyzing the oral production of Chinese-speaking learners of English as a second language (L2), we can find a large variety of verb inflections – Why does it seem so hard for them to use consistent correct past morphologies in obligatory past contexts? Failed Functional Features Hypothesis (FFFH) attributes the rather non-target-like performance to the absence of [±past] feature in their L1 Chinese, arguing that for post puberty learners, new features in L2 are no more accessible. By contrast, Missing Surface Inflection Hypothesis (MSIH) tends to believe that all features are actually acquirable for late L2 learners, while due to the mapping difficulties from features to forms, it is hard for them to realize the consistent past morphologies on the surface. However, most of the studies are limited to the verb morphologies in finite clauses and few studies have ever attempted to figure out these learners’ performance in non-finite clauses. Additionally, it has been discussed that Chinese learners may be able to tell the finite/infinite distinction (i.e. the [±finite] feature might be selected in Chinese, even though the existence of [±past] is denied). Therefore, adopting a self-paced reading task (SPR), the current study aims to analyze the processing patterns of Chinese-speaking learners of L2 Russian, in order to find out if they are sensitive to misuse of tense morphologies in both finite and non-finite clauses and whether they are sensitive to the finite/infinite distinction presented in Russian. The study targets L2 Russian due to its systematic morphologies in both present and past tenses. A native Russian group, as well as a group of English-speaking learners of Russian, whose L1 has definitely selected both [±finite] and [±past] features, will also be involved. By comparing and contrasting performance of the three language groups, the study is going to further examine and discuss the two theories, FFFH and MSIH. Preliminary hypotheses are: a) Russian native speakers are expected to spend longer time reading the verb forms which violate the grammar; b) it is expected that Chinese participants are, at least, sensitive to the misuse of inflected verbs in non-finite clauses, although no sensitivity to the misuse of infinitives in finite clauses might be found. Therefore, an interaction of finite and grammaticality is expected to be found, which indicate that these learners are able to tell the finite/infinite distinction; and c) having selected [±finite] and [±past], English-speaking learners of Russian are expected to behave target-likely, supporting L1 transfer.

Keywords: features, finite clauses, morphosyntax, non-finite clauses, past morphologies, present morphologies, Second Language Acquisition, self-paced reading task, verb inflections

Procedia PDF Downloads 104
908 Navigating the Cacophony of Human Rights Claims and Chains of Fraud in Nigeria: The Anti-Corruption War Perspective

Authors: Mike Omilusi

Abstract:

Since the Buhari administration came to power, it has gained the people’s confidence with its anti-corruption efforts. Making culprits account for their past unlawful deeds, in a very determined and aggressive manner ever witnessed in the nation’s political history, generates different reactions among Nigerians. However, some questions remain pertinent to this study: Are Nigerians really advocating persecution or prosecution in respect of the graft suspects? Do they want conviction without being convinced? Is their outburst propelled by emotions and revengeful anticipation of having suspected looters of the nation’s commonwealth behind bars? Can the war be successfully fought without resorting to impunity? Relying extensively on secondary sources with the aid of descriptive and narrative tools, this study seeks to interrogate the claim of fundamental human rights in the face of wanton looting of the nation’s resources. If, as opined by President Buhari, corruption is a crime against humanity, then it is argued that those who commit such crime should be subjected to penalties prescribed by law. Such crime -as corruption in this study- deprives the citizens of welfare, social amenities and good things of life. In this instance, it also poses threats to national security, having misappropriated funds meant for the war against the Boko Haram terrorism as revealed by the anti-corruption agency in the country. A theoretically-driven investigation, this essay raises some expectations within the context of good governance-propelled anti-corruption crusade, making modest recommendations as to how corruption should be prevented and combated within the confine of rule of law.

Keywords: corruption, rule of law, human rights, prosecution, commonwealth

Procedia PDF Downloads 199
907 Unmanned Aerial Vehicle Use for Emergency Purpose

Authors: Shah S. M. A., Aftab U.

Abstract:

It is imperative in today’s world to get a real time information about different emergency situation occurred in the environment. Helicopters are mostly used to access places which are hard to access in emergencies like earthquake, floods, bridge failure or in any other disasters conditions. Use of helicopters are considered more costly to properly collect the data. Therefore a new technique has been introduced in this research to promptly collect data using drones. The drone designed in this research is based on trial and error experimental work with objective to construct an economical drone. Locally available material have been used for this purpose. And a mobile camera were also attached to prepare video during the flight. It was found that within very limited resources the result were quite successful.

Keywords: UAV, real time, camera, disasters

Procedia PDF Downloads 230
906 Commercial Automobile Insurance: A Practical Approach of the Generalized Additive Model

Authors: Nicolas Plamondon, Stuart Atkinson, Shuzi Zhou

Abstract:

The insurance industry is usually not the first topic one has in mind when thinking about applications of data science. However, the use of data science in the finance and insurance industry is growing quickly for several reasons, including an abundance of reliable customer data, ferocious competition requiring more accurate pricing, etc. Among the top use cases of data science, we find pricing optimization, customer segmentation, customer risk assessment, fraud detection, marketing, and triage analytics. The objective of this paper is to present an application of the generalized additive model (GAM) on a commercial automobile insurance product: an individually rated commercial automobile. These are vehicles used for commercial purposes, but for which there is not enough volume to apply pricing to several vehicles at the same time. The GAM model was selected as an improvement over GLM for its ease of use and its wide range of applications. The model was trained using the largest split of the data to determine model parameters. The remaining part of the data was used as testing data to verify the quality of the modeling activity. We used the Gini coefficient to evaluate the performance of the model. For long-term monitoring, commonly used metrics such as RMSE and MAE will be used. Another topic of interest in the insurance industry is to process of producing the model. We will discuss at a high level the interactions between the different teams with an insurance company that needs to work together to produce a model and then monitor the performance of the model over time. Moreover, we will discuss the regulations in place in the insurance industry. Finally, we will discuss the maintenance of the model and the fact that new data does not come constantly and that some metrics can take a long time to become meaningful.

Keywords: insurance, data science, modeling, monitoring, regulation, processes

Procedia PDF Downloads 74
905 Socializing Young Females towards Sports

Authors: Mohinder Kumar

Abstract:

Sports are considered as the very prominent social institution in almost every society because it reflects the mores, values, and general culture of a society. Sports activity tend to pave the foundation for learning acceptable values and beliefs and for acquiring desirable character traits such as self-discipline, sportsmanship, and an appreciation for hard work, fairness, self-respect, leadership, followership, justice, perseverance, competition, and goal attainment. The present study focuses on ideal ways of socializing youngsters into sports. Influences of some socializing agents (e.g. family, school, community) are reviewed and suggestions made as to how these socializing agents can be oriented and made effective in carrying out functional processes toward target ends.

Keywords: sports, socializing, family, community, society

Procedia PDF Downloads 456
904 Early Prediction of Disposable Addresses in Ethereum Blockchain

Authors: Ahmad Saleem

Abstract:

Ethereum is the second largest crypto currency in blockchain ecosystem. Along with standard transactions, it supports smart contracts and NFT’s. Current research trends are focused on analyzing the overall structure of the network its growth and behavior. Ethereum addresses are anonymous and can be created on fly. The nature of Ethereum network and addresses make it hard to predict their behavior. The activity period of an ethereum address is not much analyzed. Using machine learning we can make early prediction about the disposability of the address. In this paper we analyzed the lifetime of the addresses. We also identified and predicted the disposable addresses using machine learning models and compared the results.

Keywords: blockchain, Ethereum, cryptocurrency, prediction

Procedia PDF Downloads 94
903 Exploring Counting Methods for the Vertices of Certain Polyhedra with Uncertainties

Authors: Sammani Danwawu Abdullahi

Abstract:

Vertex Enumeration Algorithms explore the methods and procedures of generating the vertices of general polyhedra formed by system of equations or inequalities. These problems of enumerating the extreme points (vertices) of general polyhedra are shown to be NP-Hard. This lead to exploring how to count the vertices of general polyhedra without listing them. This is also shown to be #P-Complete. Some fully polynomial randomized approximation schemes (fpras) of counting the vertices of some special classes of polyhedra associated with Down-Sets, Independent Sets, 2-Knapsack problems and 2 x n transportation problems are presented together with some discovered open problems.

Keywords: counting with uncertainties, mathematical programming, optimization, vertex enumeration

Procedia PDF Downloads 349
902 Antihypertensive Effect of Formulated Apium graveolens: A Randomized, Double-Blind, Placebo-Controlled Clinical Trial

Authors: Maryam Shayani Rad, Seyed Ahmad Mohajeri, Mohsen Mouhebati, Seyed Danial Mousavi

Abstract:

High blood pressure is one of the most important and serious health-threatening because of no symptoms in most people, which can lead to sudden heart attack, heart failure, and stroke. Nowadays, herbal medicine is one of the best and safest strategies for treatment that have no adverse effects. Apium graveolens (celery) can be used as an alternative treatment for many health conditions such as hypertension. Natural compounds reduce blood pressure via different mechanisms in which Apium graveolens extract provides potent calcium channel blocking properties. A randomized, double-blind, placebo-controlled, cross-over clinical trial was done to evaluate the efficacy of formulated Apium graveolens extract with a maximum yield of 3-n-butylphthalide to reduce systolic and diastolic blood pressure in patients with hypertension. 54 hypertensive patients in the range of 20-68 years old were randomly assigned to the treatment group (26 cases) and the placebo control group (26 cases) and were crossed over after washout duration. The treatment group received at least 2 grams of formulated powder in hard capsules orally, before each meal, 2 times daily. The control group received 2 grams of placebo in hard capsules orally, exactly as the same as shape, time, and doses of treatment group. Treatment was administrated in 12 weeks with 4 weeks washout period at the middle of the study, meaning 4 weeks drug consumption for the treatment group, 4 weeks washout and 4 weeks placebo consumption, and vice versa for the placebo control group. The clinical assessment was done 4 times, including at the beginning and ending of the drug and placebo consumption period by 24-hour ambulatory blood pressure monitoring (ABPM) holter, which measured blood pressure every 15 minutes continuously. There was a statistically significant decrease in both systolic blood pressure (SBP) and diastolic blood pressure (DBP) at the end of drug duration compared to baseline. The changes after 4 weeks on average was about 12.34 mm Hg for the SBP (P < 0.005) and 7.83 mm Hg for the DBP (P < 0.005). The results from this clinical trial study showed this Apium graveolens extract formulation in the mentioned dosage had a significant effect on blood pressure-lowering for hypertensive patients.

Keywords: Apium graveolens extract, clinical trial, cross-over, hypertension

Procedia PDF Downloads 207
901 Similarity Based Retrieval in Case Based Reasoning for Analysis of Medical Images

Authors: M. Dasgupta, S. Banerjee

Abstract:

Content Based Image Retrieval (CBIR) coupled with Case Based Reasoning (CBR) is a paradigm that is becoming increasingly popular in the diagnosis and therapy planning of medical ailments utilizing the digital content of medical images. This paper presents a survey of some of the promising approaches used in the detection of abnormalities in retina images as well in mammographic screening and detection of regions of interest in MRI scans of the brain. We also describe our proposed algorithm to detect hard exudates in fundus images of the retina of Diabetic Retinopathy patients.

Keywords: case based reasoning, exudates, retina image, similarity based retrieval

Procedia PDF Downloads 342
900 The Impact of Collective Punishment on Cadets’ Psychology

Authors: Ersegün Ömer Erol

Abstract:

Since the first civilizations, armies have been the most significant part of the countries. As generally known, in today’s world, people are trying hard to find the best way to educate their armies so as to prepare them effectively for the war. Due to the fact that, as rarely known, collective punishment is in fact one of the methods used commonly in militaries in order to educate personnel and cadets. In this study, it is purposed to find out the constructive and unfavorable impacts of collective punishment on cadets’ psychology and by comparing these impacts to decide whether the collective punishment is functional or not. These impacts are obtained from the questionnaire applied on cadets and personnel. The main goal of the study is to provide new point of views and more scientific information about the discussed education way-the collective punishment.

Keywords: army, cadet, collective punishment, psychology

Procedia PDF Downloads 309
899 The Tiv Oral Poet and Taraba Crisis: Anger, Frustration and Uncotrollable Emotionalism in Obadia Kehemen Orkor's Ballads

Authors: Peter Nave Shirga

Abstract:

Obadia Kehemen Orkor’s songs that focus on the predicament of the Tiv man in Taraba in North Central Nigeria handle themes such as poverty, social inequality, discrimination and tyranny perpetrated by Jukun against the Tiv. The major thrust of his focus in the songs is the overriding longing for mutual understanding between the Jukun and Tiv that would usher in love, equality, peace and harmonious co-existence for the two antagonistic ethnic groups. This paper examines Obadia’s hard-hitting lyrics that reveal the anger, frustration and boiling emotionalism of Tiv people in Taraba state of Nigeria.

Keywords: poet, crisis, emotionalism, frustration

Procedia PDF Downloads 304
898 Systems Versioning: A Features-Based Meta-Modeling Approach

Authors: Ola A. Younis, Said Ghoul

Abstract:

Systems running these days are huge, complex and exist in many versions. Controlling these versions and tracking their changes became a very hard process as some versions are created using meaningless names or specifications. Many versions of a system are created with no clear difference between them. This leads to mismatching between a user’s request and the version he gets. In this paper, we present a system versions meta-modeling approach that produces versions based on system’s features. This model reduced the number of steps needed to configure a release and gave each version its unique specifications. This approach is applicable for systems that use features in its specification.

Keywords: features, meta-modeling, semantic modeling, SPL, VCS, versioning

Procedia PDF Downloads 440
897 Rewriting the 'Sick Man' History: Imagining Chinese Masculinity in the Contemporary Military Action Genre

Authors: Yongde Dai

Abstract:

The recent Chinese military action blockbusters, notably known as, Wolf Warrior/Zhan Lang (2015), Operation Mekong/Mei gong he xing dong (2016), Warrior 2/Zhan Lang 2 (2017) and Operation Red Sea/Hong hai xing dong (2018), have achieved phenomenal box-office successes and in particular, Wolf Warrior 2 became China’s highest-grossing film of all time. However, their yearly presence tends to show a paradigmic shift from China’s primacy of wen manliness (soft) to wu masculinity (hard). With the increasing cinematic exposure of a more muscular image manifesting in both the Chinese heroic soldiers and China itself as a rising global power, the backlash of the Chinese public against the proliferation of the feminized masculinity influenced by the ‘pretty-boy’ pop-culture and China’s harder approach to the current Sino-US tensions have correspondingly emerged and continued to brew. Chinese masculinity imagined in these films is one of the key factors that enable a gendered interpretation of the correlation between the Chinese on-screen fantasy and off-screen reality, that is, China’s public and official discourse about the hegemonic masculinity and non-hegemonic masculinity as well as China’s international profile on cinematic appearance and in today’s Sino-US relation. By reading closely at the four megahits as visual-audio texts with Chinese masculinity studies by Kam Louie and Geng Song, this paper attempts to examine the Chinese construction of manliness with historical accounts and argue why and how the recurrent emphasis of hard/military masculinity (wu) on screen are viewed as China’s contemporary rewriting of the ‘sick-man’ history in the film form. Through this investigation, the paper finds that the rewriting of the ‘sick-man’ history in the cinematic world through heroic brawny soldiers comes to resonate a collective anxiety of China in countering the real-life increasing feminized masculinity on the public appearance, particularly on the male celebrities. In addition, the superpower fantasy about China illuminates a hypermasculine imaginary of China as a global rising power and this coincidently echoes China’s current tougher diplomatic strategy tackling the Sino-US trade war, South China sea dispute and Huawei-US lawsuits.

Keywords: Chinese masculinity, Chinese military action film, feminized masculinity, manhood and nationhood, sick man of Asia

Procedia PDF Downloads 140
896 Smaa-Gaia: A Complementary Tool of the Smaa-Promethee Method

Authors: Y. de Smet, J. Hubinont

Abstract:

PROMETHEE and GAIA are well-known Multiple Criteria Decision Aid methods. Given an evaluation table and preference parameters they allow to rank the alternatives, to visualize the problem, to perform sensitivity and robustness analysis, etc. Unfortunately, it is often hard for the Decision Maker (DM) to estimate the precise values of these parameters. Therefore an alternative option is to give ranges of potential values in order to apply Stochastic Multicriteria Acceptability Analysis. This has been recently studied in the context of the SMAA-PROMETHEE method. The aim of this contribution is to propose an SMAA extension of GAIA. We show how this tool can be useful and provide complementary information to SMAA-PROMETHEE. This is illustrated on a pedagogical example.

Keywords: multiple criteria decision making, PROMETHEE, GAIA, SMAA

Procedia PDF Downloads 426
895 Cybersecurity Challenges in Africa

Authors: Chimmoe Fomo Michelle Larissa

Abstract:

The challenges of cybersecurity in Africa are increasingly significant as the continent undergoes rapid digital transformation. With the rise of internet connectivity, mobile phone usage, and digital financial services, Africa faces unique cybersecurity threats. The significance of this study lies in understanding these threats and the multifaceted challenges that hinder effective cybersecurity measures across the continent. The methodologies employed in this study include a comprehensive analysis of existing cybersecurity frameworks in various African countries, surveys of key stakeholders in the digital ecosystem, and case studies of cybersecurity incidents. These methodologies aim to provide a detailed understanding of the current cybersecurity landscape, identify gaps in existing policies, and evaluate the effectiveness of implemented security measures. Major findings of the study indicate that Africa faces numerous cybersecurity challenges, including inadequate regulatory frameworks, insufficient cybersecurity awareness, and a shortage of skilled professionals. Additionally, the prevalence of cybercrime, such as financial fraud, data breaches, and ransomware attacks, exacerbates the situation. The study also highlights the role of international cooperation and regional collaboration in addressing these challenges and improving overall cybersecurity resilience. In conclusion, addressing cybersecurity challenges in Africa requires a multifaceted approach that involves strengthening regulatory frameworks, enhancing public awareness, and investing in cybersecurity education and training. The study underscores the importance of regional and international collaboration in building a robust cybersecurity infrastructure capable of mitigating the risks associated with the continent's digital growth.

Keywords: Africa, cybersecurity, challenges, digital infrastructure, cybercrime

Procedia PDF Downloads 35