Search results for: hidden motives of buyers and sellers
421 Following the Caravans: Interdisciplinary Study to Integrate Chinese and African Relations in Ethiopia
Authors: E. Mattio
Abstract:
The aim of this project is to study the Chinese presence in Ethiopia, following the path of the last salt caravans from Danakil to Tigray region. Official estimates of the number of Chinese in Africa vary widely; on the continent, there are increasingly diverse groups of Chinese migrants in terms of language, dialect, class, education, and employment. Based on this and on a very general state of the art, it was decided to increase the studies on this phenomenon, documenting the extraction of salt and following the sellers in the north of the country. The project is unique and allows you to admire a landscape that will soon change, due to the construction of infrastructure that is changing the dynamics of movement and sales. To carry out this study, interdisciplinary investigation methods were integrated, such as landscape archeology, historiographic research, participatory anthropology, geopolitics, and cultural anthropology and ethnology. There are two main objectives of the research. The first was an analysis of risk perceptions to predict what will happen to these populations and how the territory will be modified, trying to monitor the growth of infrastructure in the country and the effects it will have on the population. Thanks to the use of GIS, some roads created by Chinese companies that worked in the area have been georeferenced. The second point was to document the life and rituals of Ethiopian populations, in order not to lose the aspects of uniqueness that risk being lost. The local interviews have garnered impressions and criticisms from the local population to understand whether the Chinese presence is perceived as a threat or a solution. Among the most exclusive interviews, there are those made to Afar leaders in the Logya area and some Coptic representatives in the Wukro area. To make this project even more unique, the Coptic rituals of Gennà and Timkat have been documented, unique expressions of a millennial tradition. The aim was to understand whether the Maoist presence began to influence the religious rites and forms of belief present in the country.Keywords: China, Ethiopia, GIS, risk perceptions
Procedia PDF Downloads 156420 Stochastic Age-Structured Population Models
Authors: Arcady Ponosov
Abstract:
Many well-known age-structured population models are derived from the celebrated McKendrick-von Foerster equation (MFE), also called the biological conservation law. A similar technique is suggested for the stochastically perturbed MFE. This technique is shown to produce stochastic versions of the deterministic population models, which appear to be very different from those one can construct by simply appending additive stochasticity to deterministic equations. In particular, it is shown that stochastic Nicholson’s blowflies model should contain both additive and multiplicative stochastic noises. The suggested transformation technique is similar to that used in the deterministic case. The difference is hidden in the formulas for the exact solutions of the simplified boundary value problem for the stochastically perturbed MFE. The analysis is also based on the theory of stochastic delay differential equations.Keywords: boundary value problems, population models, stochastic delay differential equations, stochastic partial differential equation
Procedia PDF Downloads 254419 Attitude Towards Carnivore-Livestock Conflict and It’s Effect on Households Willingness to Pay for Organic Meat: A Contingent Valuation Approach
Authors: Abinet Tilahun Aweke
Abstract:
In Europe, there is a growing interest in food produced ethically and with a broader benefit for society. Consumers could consider numerous extrinsic and intrinsic quality attributes, including organically produced, when selecting meat to purchase. Many studies recorded various reasons why consumers may choose to pay the premium price for organic foods, although willingness to pay (WTP) for organic meat and motives behind the WTPs differ depending on the meat type/cut and place. Employing state of the art stated preference (SP) method, this study seeks to find out how environmental attitudes and health concerns shape the demand for organic agriculture in Norway. More specifically, this paper contributes to the existing knowledge on consumer preferences by exploring if consumer's attitude towards carnivore-sheep conflict affects the willingness to pay (WTP) for organic meat. This study will also have a methodological contribution by investigating whether having environmental attitude and carnivore-livestock conflict questions prior to the organic meat WTP question will significantly affect the will to pay and the amount paid. Understanding the effect of the content of the auxiliary questions posed before WTP questions will help to improve future CV survey designs and hence the validity of the results obtained.Keywords: attitude, consumer reference, contingent valuation, meat, organic, stated preference, survey design
Procedia PDF Downloads 101418 Urban Gamification: Analyzing the Effects of UFLab’s Tangible Gamified Tools in Four Hungarian Urban Public Participation Processes
Authors: Olivia Kurucz
Abstract:
Gamification is one of the outstanding new methodological possibilities of urban public participation processes to make the most informed decision possible for the future steps of urban development. This paper examines four Hungarian experimental projects in which gamified tools were applied during the public participation progresses by the Urban Future Laboratory (UFLab) research workshop of Budapest University of Technology and Economics (BUTE). The recently implemented future planning projects (in the cities of Pécel, Kistarcsa, Budapest, and Salgótarján) were initiated by various motives, but the multi-stakeholder dialogues were facilitated through physical gamified tools in all cases. Based on the urban gamification hypothesis, the use of gamified tools supported certain steps of participatory processes in several aspects: it helped to increase the attractiveness of public events, to create a more informal atmosphere, to ensure equal conditions for actors, to recall a design mindset, to bridge contrasting social or cultural differences, to fix opinions and to assist dialogue between city actors, designers, and residents. This statement is confirmed by assessing the applied tools, analyzing the case studies, and comparing them to perceive their effects and interrelations.Keywords: experimental projects, future planning, gamification, gamified tools, Hungary, public participation, UFLab, urban gamification
Procedia PDF Downloads 138417 Reclaiming the Lost Jewish Identity of a Second Generation Holocaust Survivor Raised as a Christian: The Role of Art and Art Therapy
Authors: Bambi Ward
Abstract:
Children of Holocaust survivors have been described as inheriting their parents’ trauma as a result of ‘vicarious memory’. The term refers to a process whereby second generation Holocaust survivors subconsciously remember aspects of Holocaust trauma, despite not having directly experienced it. This can occur even when there has been a conspiracy of silence in which survivors chose not to discuss the Holocaust with their children. There are still people born in various parts of the world such as Poland, Hungary, other parts of Europe, USA, Canada and Australia, who have only learnt of their Jewish roots as adults. This discovery may occur during a parent’s deathbed confession, or when an adult child is sorting through the personal belongings of a deceased family member. Some Holocaust survivors chose to deny their Jewish heritage and raise their children as Christians. Reasons for this decision include the trauma experienced during the Holocaust for simply being Jewish, the existence of anti-Semitism, and the desire to protect one’s self and one’s family. Although there has been considerable literature written about the transgenerational impact of trauma on children of Holocaust survivors, there has been little scholarly investigation into the effects of a hidden Jewish identity on these children. This paper presents a case study of an adult child of Hungarian Holocaust survivors who was raised as a Christian. At the age of eight she was told about her family’s Jewish background, but her parents insisted that she keep this a secret, even if asked directly. She honoured their request until she turned forty. By that time she had started the challenging process of reclaiming her Jewish identity. The paper outlines the tension between family loyalty and individual freedom, and discusses the role that art and art therapy played in assisting the subject of the case study to reclaim her Jewish identity and commence writing a memoir about her spiritual journey. The main methodology used in this case study is creative practice-led research. Particular attention is paid to the utilisation of an autoethnographic approach. The autoethnographic tools used include reflective journals of the subject of the case study. These journals reflect on the subject’s collection of autobiographical data relating to her family history, and include memories, drawings, products of art therapy, diaries, letters, photographs, home movies, objects, and oral history interviews with her mother. The case study illustrates how art and art therapy benefitted a second generation Holocaust survivor who was brought up having to suppress her Jewish identity. The process allowed her to express subconscious thoughts and feelings about her identity and free herself from the burden of the long term secret she had been carrying. The process described may also be of assistance to other traumatised people who have been trying to break the silence and who are seeking to express themselves in a positive and healing way.Keywords: art, hidden identity, holocaust, silence
Procedia PDF Downloads 239416 Artificial Neural Network-Based Bridge Weigh-In-Motion Technique Considering Environmental Conditions
Authors: Changgil Lee, Junkyeong Kim, Jihwan Park, Seunghee Park
Abstract:
In this study, bridge weigh-in-motion (BWIM) system was simulated under various environmental conditions such as temperature, humidity, wind and so on to improve the performance of the BWIM system. The environmental conditions can make difficult to analyze measured data and hence those factors should be compensated. Various conditions were considered as input parameters for ANN (Artificial Neural Network). The number of hidden layers for ANN was decided so that nonlinearity could be sufficiently reflected in the BWIM results. The weight of vehicles and axle weight were more accurately estimated by applying ANN approach. Additionally, the type of bridge which was a target structure was considered as an input parameter for the ANN.Keywords: bridge weigh-in-motion (BWIM) system, environmental conditions, artificial neural network, type of bridges
Procedia PDF Downloads 442415 Cognitive Weighted Polymorphism Factor: A New Cognitive Complexity Metric
Authors: T. Francis Thamburaj, A. Aloysius
Abstract:
Polymorphism is one of the main pillars of the object-oriented paradigm. It induces hidden forms of class dependencies which may impact software quality, resulting in higher cost factor for comprehending, debugging, testing, and maintaining the software. In this paper, a new cognitive complexity metric called Cognitive Weighted Polymorphism Factor (CWPF) is proposed. Apart from the software structural complexity, it includes the cognitive complexity on the basis of type. The cognitive weights are calibrated based on 27 empirical studies with 120 persons. A case study and experimentation of the new software metric shows positive results. Further, a comparative study is made and the correlation test has proved that CWPF complexity metric is a better, more comprehensive, and more realistic indicator of the software complexity than Abreu’s Polymorphism Factor (PF) complexity metric.Keywords: cognitive complexity metric, object-oriented metrics, polymorphism factor, software metrics
Procedia PDF Downloads 458414 Examining Motivational Strategies of Foreign Manufacturing Firms in Ghana
Authors: Samuel Ato Dadzie
Abstract:
The objective of this study is to examine the influence of eclectic paradigm on motivational strategy of foreign subsidiaries in Ghana. This study uses binary regression model, and the analysis was based on 75 manufacturing investments made by MNEs from different countries in 1994–2008. The results indicated that perceived market size increases the probability of foreign firms undertaking a market seeking (MS) in Ghana, while perceived cultural distance between Ghana and foreign firm’s home countries decreased the probability of foreign firms undertaking an market seeking (MS) foreign direct investment (FDI) in Ghana. Furthermore, extensive international experience decreases the probability of foreign firms undertaking a market seeking (MS) foreign direct investment (FDI) in Ghana. Most of the studies done by earlier researchers were based on the advanced and emerging countries and offered support for the theory, which was used in generalizing the result that multinational corporations (MNCs) normally used the theory regarding investment strategy outside their home country. In using the same theory in the context of Ghana, the result does not offer strong support for the theory. This means that MNCs that come to Sub-Sahara Africa cannot rely much on eclectic paradigm for their motivational strategies because prevailing economic conditions in Ghana are different from that of the advanced and emerging economies where the institutional structures work.Keywords: foreign subsidiary, motives, Ghana, foreign direct investment
Procedia PDF Downloads 432413 Naturalization of Aliens in Consideration of Turkish Constitutional Law: Recent Governmental Practices
Authors: Zeynep Ozkan, Cigdem Serra Uzunpinar
Abstract:
Citizenship is a legal bond that binds a person to a certain state. How constitutions define ‘the citizen’ and how they regulate the elements of citizenship have great importance in terms of individuals’ duties before the state as well as the rights they own. Especially in multi-segmented societies that contain foreign elements, it becomes necessary to examinate the institution of naturalization in terms of individuals’ duty of constitutional citizenship. The meaning of citizenship in Turkey has transformed due to the changes in practices of naturalization, in parallel to receiving huge amount of immagrants with the recent Syrian Crisis, the change in the governmental system and facing economic crisis. This transformation took place in the way of a diversion from the states’ initial motive of building the bond of citizenship with the aim of founding/sustaining political unity. Hence, rising of the economic and political motives in naturalization practices are in question, instead of objective and subjective criterias, that are traditionally used on defining the notion of nation. In this study, firstly the regime of citizenship and the legal regime of aliens in Turkish legislation will be given place. Then, the transformation, that the notion of constitutional citizenship underwent, will be studied, especially on the basis of governmental practices of naturalization. The assessment will be made in the context of legal institutions brought with the new governmental system as a result of recent constitutional amendment.Keywords: constitutional citizenship, naturalization, naturalization practices in Turkish legal system, transformation of the notion of constitutional citizenship
Procedia PDF Downloads 118412 The Implementation of Child Adoption as Legal Protection of Children
Authors: Sonny Dewi Judiasih
Abstract:
The principle of a marriage is to achieve a happy and eternity family based on the willing of the God. The family has a fundamental role in the society as a social individual and as a nuclear family consists of father, mother, and children. Thus, each family always would like to have children who will continue the family. However, not all family will be blessed with children and consequently, there is family without children. Therefore, the said the certain family will do any effort to fulfill the wish to have children. One of the ways is to adopt children. The implementation of child adoption is conducted by the family who does not have children but sometimes child adoption is conducted by a family who has already children. The implementation of child adoption is based on the interest of the welfare and the intellectual of the said child. Moreover, it should be based on the social liability of the individual in accordance with the developing of the traditional values as part of the nation culture. The child adoption is conducted for the welfare of the child demonstrates that a change on the basic motive (value) whereby in the past the child adoption is to fulfill the wish of foster parent (to have children in the family). Nowadays the purpose of child adoption is not merely for the interest of foster parent but in particular for the interest, welfare and the future of the child. The development of the society has caused the occurrence of changes of perspective in the society which lead to a need for new law. The court of justice has an impact of such changes. It is evidenced by the court order for child adoption in the legal framework of certainty of law. The changes of motives (value) of the child adoption in the society can be fully understood in the event that the society fully understand that the ultimate purpose of Indonesia nation is to achieve a justice and prosperity society, i.e., social welfare for all Indonesian people.Keywords: child adoption, family law, legal protection, children
Procedia PDF Downloads 468411 The Social Perception of National Security Risks: A Comparative Perspective
Authors: Nicula Valentin, Andrei Virginia
Abstract:
Nowadays, the individual plays a central role in the state’s architecture. This is why the subjective dimension of the security represents a key concept in risk assessment. The paper’s scope is to emphasize the discrepancy between expert and lay evaluations of national security hazards, which is caused by key factors like emotions, personal experience, knowledge and media. Therefore, we have chosen to apply, using these two different groups of respondents, the Q-sort method, which reveals individual beliefs, attitudes, preferences hidden behind the subjects’ own way of prioritizing the risks they are confronted with. Our study’s conclusions are meant to unveil significant indicators needed to be taken into consideration by a state’s leadership in order to understand the social perception of national security hazards, to communicate better with the public opinion and prevent or mitigate the overestimation of the severity or probability of these dangers.Keywords: risk perception, Q-sort method, national security hazards, individual beliefs
Procedia PDF Downloads 309410 Acoustic Analysis of Ball Bearings to Identify Localised Race Defect
Authors: M. Solairaju, Nithin J. Thomas, S. Ganesan
Abstract:
Each and every rotating part of a machine element consists of bearings within its structure. In particular, the rolling element bearings such as cylindrical roller bearing and deep groove ball bearings are frequently used. Improper handling, excessive loading, improper lubrication and sealing cause bearing damage. Hence health monitoring of bearings is an important aspect for radiation pattern of bearing vibration is computed using the dipole model. Sound pressure level for defect-free and race defect the prolonged life of machinery and auto motives. This paper presents modeling and analysis of Acoustic response of deep groove ball bearing with localized race defects. Most of the ball bearings, especially in machine tool spindles and high-speed applications are pre-loaded along an axial direction. The present study is carried out with axial preload. Based on the vibration response, the orbit motion of the inner race is studied, and it was found that the oscillation takes place predominantly in the axial direction. Simplified acoustic is estimated. Acoustic response shows a better indication in identifying the defective bearing. The computed sound signal is visualized in diagrammatic representation using Symmetrised Dot Pattern (SDP). SDP gives better visual distinction between the defective and defect-free bearingKeywords: bearing, dipole, noise, sound
Procedia PDF Downloads 294409 A Theoretical Study of Accelerating Neutrons in LINAC Using Magnetic Gradient Method
Authors: Chunduru Amareswara Prasad
Abstract:
The main aim of this proposal it to reveal the secrets of the universe by accelerating neutrons. The proposal idea in its abridged version speaks about the possibility of making neutrons accelerate with help of thermal energy and magnetic energy under controlled conditions. Which is helpful in revealing the hidden secrets of the universe namely dark energy and in finding properties of Higgs boson. The paper mainly speaks about accelerating neutrons to near velocity of light in a LINAC, using magnetic energy by magnetic pressurizers. The center of mass energy of two colliding neutron beams is 94 GeV (~0.5c) can be achieved using this method. The conventional ways to accelerate neutrons has some constraints in accelerating them electromagnetically as they need to be separated from the Tritium or Deuterium nuclei. This magnetic gradient method provides efficient and simple way to accelerate neutrons.Keywords: neutron, acceleration, thermal energy, magnetic energy, Higgs boson
Procedia PDF Downloads 326408 An Optimal Steganalysis Based Approach for Embedding Information in Image Cover Media with Security
Authors: Ahlem Fatnassi, Hamza Gharsellaoui, Sadok Bouamama
Abstract:
This paper deals with the study of interest in the fields of Steganography and Steganalysis. Steganography involves hiding information in a cover media to obtain the stego media in such a way that the cover media is perceived not to have any embedded message for its unintended recipients. Steganalysis is the mechanism of detecting the presence of hidden information in the stego media and it can lead to the prevention of disastrous security incidents. In this paper, we provide a critical review of the steganalysis algorithms available to analyze the characteristics of an image stego media against the corresponding cover media and understand the process of embedding the information and its detection. We anticipate that this paper can also give a clear picture of the current trends in steganography so that we can develop and improvise appropriate steganalysis algorithms.Keywords: optimization, heuristics and metaheuristics algorithms, embedded systems, low-power consumption, steganalysis heuristic approach
Procedia PDF Downloads 292407 Rounding Technique's Application in Schnorr Signature Algorithm: Known Partially Most Significant Bits of Nonce
Authors: Wenjie Qin, Kewei Lv
Abstract:
In 1996, Boneh and Venkatesan proposed the Hidden Number Problem (HNP) and proved the most significant bits (MSB) of computational Diffie-Hellman key exchange scheme and related schemes are unpredictable bits. They also gave a method which is a lattice rounding technique to solve HNP in non-uniform model. In this paper, we put forward a new concept that is Schnorr-MSB-HNP. We also reduce the problem of solving Schnorr signature private key with a few consecutive most significant bits of random nonce (used at each signature generation) to Schnorr-MSB-HNP, then we use the rounding technique to solve the Schnorr-MSB-HNP. We have come to the conclusion that if there is a ‘miraculous box’ which inputs the random nonce and outputs 2loglogq (q is a prime number) most significant bits of nonce, the signature private key will be obtained by choosing 2logq signature messages randomly. Thus we get an attack on the Schnorr signature private key.Keywords: rounding technique, most significant bits, Schnorr signature algorithm, nonce, Schnorr-MSB-HNP
Procedia PDF Downloads 233406 A Theoretical Framework: The Influence of Luxury Companies' Corporate Social Activities on Consumer Purchase Intention
Authors: Kveta Olsanova, Gina Cook, Marija Zlatic
Abstract:
This paper discusses the theoretical framework suggesting the dependencies between luxury brands’ CSR (Corporate Social Responsibility) variables and the purchase intention of luxury shoppers. The framework is based on a literature review and in-depth individual interviews with a sample of luxury users and buyers. The measures of the model are based on existing research and the authors' qualitative research results. The model suggests that purchase intention in the luxury segment is dependent on the luxury values (symbolic, experiential, functional and social), individual sustainable dimension (composed of societal, environmental and economic variables) and awareness of the brand’s CSR, the last two relationships being potentially moderated by certain conditions such as demographics and general attitudes towards CSR and sustainability. The model’s output is in the formulation of several hypotheses, to be tested in an upcoming quantitative study. The qualitative phase indicated that the perceived symbolic, functional and experiential value dimensions of luxury brands were stronger drivers of purchase intention compared to the sustainable dimension. The contribution of the research consists of highlighting CSR’s impact on customer purchase intent as a potential implication for luxury brand management due to two aspects: (i) consumer awareness of the existing CSR activities of luxury brands is low, and this might be challenged by the demands of Gen Z entrants into the lux industry as they are known for their positive approach to CSR; (ii) the UN’s SDGs will bring CSR to the attention of all industries, including currently 'CSR silent' segments represented by luxury. Our research should contribute to incorporation of strategic CSR into the policies and strategies of the luxury segment by providing evidence that luxury customers do care.Keywords: CSR, luxury shoppers, purchase intention, sustainability
Procedia PDF Downloads 148405 Reversible and Adaptive Watermarking for MRI Medical Images
Authors: Nisar Ahmed Memon
Abstract:
A new medical image watermarking scheme delivering high embedding capacity is presented in this paper. Integer Wavelet Transform (IWT), Companding technique and adaptive thresholding are used in this scheme. The proposed scheme implants, recovers the hidden information and restores the input image to its pristine state at the receiving end. Magnetic Resonance Imaging (MRI) images are used for experimental purposes. The scheme first segment the MRI medical image into non-overlapping blocks and then inserts watermark into wavelet coefficients having a high frequency of each block. The scheme uses block-based watermarking adopting iterative optimization of threshold for companding in order to avoid the histogram pre and post processing. Results show that proposed scheme performs better than other reversible medical image watermarking schemes available in literature for MRI medical images.Keywords: adaptive thresholding, companding technique, data authentication, reversible watermarking
Procedia PDF Downloads 296404 Unsupervised Learning with Self-Organizing Maps for Named Entity Recognition in the CONLL2003 Dataset
Authors: Assel Jaxylykova, Alexnder Pak
Abstract:
This study utilized a Self-Organizing Map (SOM) for unsupervised learning on the CONLL-2003 dataset for Named Entity Recognition (NER). The process involved encoding words into 300-dimensional vectors using FastText. These vectors were input into a SOM grid, where training adjusted node weights to minimize distances. The SOM provided a topological representation for identifying and clustering named entities, demonstrating its efficacy without labeled examples. Results showed an F1-measure of 0.86, highlighting SOM's viability. Although some methods achieve higher F1 measures, SOM eliminates the need for labeled data, offering a scalable and efficient alternative. The SOM's ability to uncover hidden patterns provides insights that could enhance existing supervised methods. Further investigation into potential limitations and optimization strategies is suggested to maximize benefits.Keywords: named entity recognition, natural language processing, self-organizing map, CONLL-2003, semantics
Procedia PDF Downloads 45403 Healthcare Data Mining Innovations
Authors: Eugenia Jilinguirian
Abstract:
In the healthcare industry, data mining is essential since it transforms the field by collecting useful data from large datasets. Data mining is the process of applying advanced analytical methods to large patient records and medical histories in order to identify patterns, correlations, and trends. Healthcare professionals can improve diagnosis accuracy, uncover hidden linkages, and predict disease outcomes by carefully examining these statistics. Additionally, data mining supports personalized medicine by personalizing treatment according to the unique attributes of each patient. This proactive strategy helps allocate resources more efficiently, enhances patient care, and streamlines operations. However, to effectively apply data mining, however, and ensure the use of private healthcare information, issues like data privacy and security must be carefully considered. Data mining continues to be vital for searching for more effective, efficient, and individualized healthcare solutions as technology evolves.Keywords: data mining, healthcare, big data, individualised healthcare, healthcare solutions, database
Procedia PDF Downloads 66402 The Essence and Attribution of Intellectual Property Rights Generated in the Digitization of Intangible Cultural Heritage
Authors: Jiarong Zhang
Abstract:
Digitizing intangible cultural heritage is a complex and comprehensive process from which sorts of intellectual property rights may be generated. Digitizing may be a repacking process of cultural heritage, which creates copyrights; recording folk songs and indigenous performances can create 'related rights'. At the same time, digitizing intangible cultural heritage may infringe the intellectual property rights of others unintentionally. Recording religious rituals of indigenous communities without authorization can violate the moral right of the ceremony participants of the community; making digital copies of rock paintings may infringe the right of reproduction. In addition, several parties are involved in the digitization process: indigenous peoples, museums, and archives can be holders of cultural heritage; companies and research institutions can be technology providers; internet platforms can be promoters and sellers; the public and groups above can be beneficiaries. When diverse intellectual property rights versus various parties, problems and disputes can arise easily. What are the types of intellectual property rights generated in the digitization process? What is the essence of these rights? Who should these rights belong to? How to use intellectual property to protect the digitalization of cultural heritage? How to avoid infringing on the intellectual property rights of others? While the digitization has been regarded as an effective approach to preserve intangible cultural heritage, related intellectual property issues have not received the attention and full discussion. Thus, parties involving in the digitization process may face intellectual property infringement lawsuits. The article will explore those problems from the intersection perspective of intellectual property law and cultural heritage. From a comparative approach, the paper will analysis related legal documents and cases, and shed some lights of those questions listed. The findings show, although there are no intellectual property laws targeting the cultural heritage in most countries, the involved stakeholders can seek protection from existing intellectual property rights following the suggestions of the article. The research will contribute to the digitization of intangible cultural heritage from a legal and policy aspect.Keywords: copyright, digitization, intangible cultural heritage, intellectual property, Internet platforms
Procedia PDF Downloads 143401 Performance Effects of Demergers in India
Authors: Pavak Vyas, Hiral Vyas
Abstract:
Spin-offs commonly known as demergers in India, represents dismantling of conglomerates which is a common phenomenon in financial markets across the world. Demergers are carried out with different motives. A demerger generally refers to a corporate restructuring where, a large company divests its stake in in its subsidiary and distributes the shares of the subsidiary - demerged entity to the existing shareholders without any consideration. Demergers in Indian companies are over a decade old phenomena, with many companies opting for the same. This study examines the demerger regulations in Indian capital markets and the announcement period price reaction of demergers during year 2010-2015. We study total 97 demerger announcements by companies listed in India and try to establish that demergers results into abnormal returns for the shareholders of the parent company. Using event study methodology we have analyzed the security price performance of the announcement day effect 10 days prior to announcement to 10 days post demerger announcement. We find significant out-performance of the security over the benchmark index post demerger announcements. The cumulative average abnormal returns range from 3.71% on the day of announcement of a private demerger to 2.08% following 10 days surrounding the announcement, and cumulative average abnormal returns range from 5.67% on the day of announcement of a public demerger to 4.15% following10 days surrounding the announcement.Keywords: demergers, event study, spin offs, stock returns
Procedia PDF Downloads 300400 A Study of Chaos Control Schemes for Plankton-Fish Dynamics
Authors: Rajinder Pal Kaur, Amit Sharma, Anuj Kumar Sharma, Govind Prasad Sahu
Abstract:
The existence of chaos in the marine ecosystems may cause planktonic blooms, disease outbreaks, extinction of some plankton species, or some complex dynamics in oceans, which can adversely affect the sustainable marine ecosystem. The control of the chaotic plankton-fish dynamics is one of the main motives of marine ecologists. In this paper, we have studied the impact of phytoplankton refuge, zooplankton refuge, and fear effect on the chaotic plankton-fish dynamics incorporating phytoplankton, zooplankton, and fish biomass. The fear of fish predation transfers the unpredictable(chaotic) behavior of the plankton system to a stable orbit. The defense mechanism developed by prey species due to fear of the predator population can also terminate chaos from the given dynamics. Moreover, the impact of external disturbances like seasonality, noise, periodic fluctuations, and time delay on the given chaotic plankton system has also been discussed. We have applied feedback mechanisms to control the complexity of the system through the parameter noise. The non-feedback schemes are implemented to observe the role of seasonal force, periodic fluctuations, and time delay in suppressing the given chaotic system. Analytical results are substantiated by numerical simulation.Keywords: plankton, chaos, noise, seasonality, fluctuations, fear effect, prey refuge
Procedia PDF Downloads 84399 Personality as a Predictor of Knowledge Hiding Behavior: Case Study of Alpha Electronics
Authors: Sadeeqa Khan, Muhammad Usman
Abstract:
Employees’ knowledge hiding behaviors can be detrimental to employees’ interpersonal relationships and individual and organizational learning and creativity. However, to the best of the authors’ knowledge, the literature on the contingencies, antecedents and outcomes of employees’ knowledge hiding behaviors is still in its infancy. On the other hand, not everyone who hides knowledge hides it the same way, as individuals are different, so do their behaviors. This study explores the links between employees’ personality traits and their knowledge hiding behaviors. By using a single case study as a research methodology and collecting data through 28 semi-structured interviews from employees working in Alpha Electronics (the pseudo name of the company to ascertain anonymity) operating in Pakistan, we foreground the patterns of relationships between employees’ personality traits and knowledge hiding behaviors – rationalized hiding, evasive hiding and playing dumb. Our findings suggest that employees high on extraversion involve in evasive knowledge hiding; while employees low on extraversion (introverts) demonstrate rationalized hiding. Moreover, both extrovert and introvert employees involve in playing dumb in situations that involve risk for their jobs and careers. For instance, when knowledge is requested from their managers, both extrovert and introvert employees tend to play dumb, as in such cases, evasive and rationalized hiding can be harmful to their job and career-related interests and motives. Other than theoretical contributions, the study offers important implications for organizations faced with the challenges of shortage of skills and knowledge.Keywords: knowledge hiding, personality, rationalized hiding, playing dumb, evasive hiding
Procedia PDF Downloads 215398 An Overview of Bioinformatics Methods to Detect Novel Riboswitches Highlighting the Importance of Structure Consideration
Authors: Danny Barash
Abstract:
Riboswitches are RNA genetic control elements that were originally discovered in bacteria and provide a unique mechanism of gene regulation. They work without the participation of proteins and are believed to represent ancient regulatory systems in the evolutionary timescale. One of the biggest challenges in riboswitch research is that many are found in prokaryotes but only a small percentage of known riboswitches have been found in certain eukaryotic organisms. The few examples of eukaryotic riboswitches were identified using sequence-based bioinformatics search methods that include some slight structural considerations. These pattern-matching methods were the first ones to be applied for the purpose of riboswitch detection and they can also be programmed very efficiently using a data structure called affix arrays, making them suitable for genome-wide searches of riboswitch patterns. However, they are limited by their ability to detect harder to find riboswitches that deviate from the known patterns. Several methods have been developed since then to tackle this problem. The most commonly used by practitioners is Infernal that relies on Hidden Markov Models (HMMs) and Covariance Models (CMs). Profile Hidden Markov Models were also carried out in the pHMM Riboswitch Scanner web application, independently from Infernal. Other computational approaches that have been developed include RMDetect by the use of 3D structural modules and RNAbor that utilizes Boltzmann probability of structural neighbors. We have tried to incorporate more sophisticated secondary structure considerations based on RNA folding prediction using several strategies. The first idea was to utilize window-based methods in conjunction with folding predictions by energy minimization. The moving window approach is heavily geared towards secondary structure consideration relative to sequence that is treated as a constraint. However, the method cannot be used genome-wide due to its high cost because each folding prediction by energy minimization in the moving window is computationally expensive, enabling to scan only at the vicinity of genes of interest. The second idea was to remedy the inefficiency of the previous approach by constructing a pipeline that consists of inverse RNA folding considering RNA secondary structure, followed by a BLAST search that is sequence-based and highly efficient. This approach, which relies on inverse RNA folding in general and our own in-house fragment-based inverse RNA folding program called RNAfbinv in particular, shows capability to find attractive candidates that are missed by Infernal and other standard methods being used for riboswitch detection. We demonstrate attractive candidates found by both the moving-window approach and the inverse RNA folding approach performed together with BLAST. We conclude that structure-based methods like the two strategies outlined above hold considerable promise in detecting riboswitches and other conserved RNAs of functional importance in a variety of organisms.Keywords: riboswitches, RNA folding prediction, RNA structure, structure-based methods
Procedia PDF Downloads 234397 Competition in Petroleum Extraction and the Challenges of Climate Change
Authors: Saeid Rabiei Majd, Motahareh Alvandi, Bahareh Asefi
Abstract:
Extraction of maximum natural resources is one of the common policies of governments, especially petroleum resources that have high economic and strategic value. The incentive to access and maintain profitable oil markets for governments or international oil companies, causing neglects them to pay attention to environmental principles and sustainable development, which in turn drives up environmental and climate change. Significant damage to the environment can cause severe damage to citizens and indigenous people, such as the compulsory evacuation of their zone due to contamination of water and air resources, destruction of animals and plants. Hawizeh Marshes is a common aquatic and environmental ecosystem along the Iran-Iraq border that also has oil resources. This marsh has been very rich in animal, vegetative, and oil resources. Since 1990, the political motives, the strategic importance of oil extraction, and the disregard for the environmental rights of the Iraqi and Iranian governments in the region have caused 90% of the marshes and forced migration of indigenous people. In this paper, we examine the environmental degradation factors resulting from the adoption of policies and practices of governments in this region based on the principles of environmental rights and sustainable development. Revision of the implementation of the government’s policies and natural resource utilization systems can prevent the spread of climate change, which is a serious international challenge today.Keywords: climate change, indigenous rights, petroleum operation, sustainable development principles, sovereignty on resources
Procedia PDF Downloads 111396 Implementation and Performance Analysis of Data Encryption Standard and RSA Algorithm with Image Steganography and Audio Steganography
Authors: S. C. Sharma, Ankit Gambhir, Rajeev Arya
Abstract:
In today’s era data security is an important concern and most demanding issues because it is essential for people using online banking, e-shopping, reservations etc. The two major techniques that are used for secure communication are Cryptography and Steganography. Cryptographic algorithms scramble the data so that intruder will not able to retrieve it; however steganography covers that data in some cover file so that presence of communication is hidden. This paper presents the implementation of Ron Rivest, Adi Shamir, and Leonard Adleman (RSA) Algorithm with Image and Audio Steganography and Data Encryption Standard (DES) Algorithm with Image and Audio Steganography. The coding for both the algorithms have been done using MATLAB and its observed that these techniques performed better than individual techniques. The risk of unauthorized access is alleviated up to a certain extent by using these techniques. These techniques could be used in Banks, RAW agencies etc, where highly confidential data is transferred. Finally, the comparisons of such two techniques are also given in tabular forms.Keywords: audio steganography, data security, DES, image steganography, intruder, RSA, steganography
Procedia PDF Downloads 290395 Affective Approach to Selected Ingmar Bergman Films
Authors: Grzegorz Zinkiewicz
Abstract:
The paper explores affective potential implicit in Bergman’s movies. This is done by the use of affect theory and the concept of affect in terms of paradigmatic and syntagmatic relations, from both diachronic and synchronic perspective. Since its inception in the early 2000s, affect theory has been applied to a number of academic fields. In Film Studies, it offers new avenues for discovering deeper, hidden layers of a given film. The aim is to show that the form and content of the films by Ingmar Bergman are determined by their inner affects that function independently of the viewer and, to an extent, are autonomous entities that can be analysed in separation from the auteur and actual characters. The paper discovers layers in Ingmar Bergman films and focuses on aspects that are often marginalised or studied from other viewpoints such as the connection between the content and visual side. As a result, a revaluation of Bergman films is possible that is more consistent with his original interpretations and comments included in his lectures, interviews and autobiography.Keywords: affect theory, experimental cinema, Ingmar Bergman, viewer response
Procedia PDF Downloads 102394 Edge Detection Using Multi-Agent System: Evaluation on Synthetic and Medical MR Images
Authors: A. Nachour, L. Ouzizi, Y. Aoura
Abstract:
Recent developments on multi-agent system have brought a new research field on image processing. Several algorithms are used simultaneously and improved in deferent applications while new methods are investigated. This paper presents a new automatic method for edge detection using several agents and many different actions. The proposed multi-agent system is based on parallel agents that locally perceive their environment, that is to say, pixels and additional environmental information. This environment is built using Vector Field Convolution that attract free agent to the edges. Problems of partial, hidden or edges linking are solved with the cooperation between agents. The presented method was implemented and evaluated using several examples on different synthetic and medical images. The obtained experimental results suggest that this approach confirm the efficiency and accuracy of detected edge.Keywords: edge detection, medical MRImages, multi-agent systems, vector field convolution
Procedia PDF Downloads 391393 Purpose in Procurement: Much Discussed, Less Conceptualized – An Exploratory Study of CPO Perceptions Based on the Gioia Methodology
Authors: Laurin Zemmrich, Nicolai Stickler
Abstract:
With the ongoing debate over how to incorporate sustainability, resilience, and value creation into business strategies, many procurement departments are put under pressure by governments, consumers, non-governmental organizations, and other stakeholders to disclose more information about their supply chains. According to practitioners and experts, procurement benefits the supply chain by increasing transparency and accountability, recruiting new suppliers, and supporting sustainable and ethical sourcing strategies. While most procurement departments establish these objectives, the bulk of activities are not carried out or are not regularly monitored. With the full potential of targeted sourcing still to be realized, procurement executives, in particular, are seeking for short-term cost-cutting impacts to appease external shareholders. We overcome this limitation by using an abductive approach to research and integrating empirical data from a Gioia methodology study design with relevant literature. Our analysis demonstrates that the procurement department has six essential levers aligned with sustainability, resilience, and value creation objectives and contributes to developing a new intra- and interorganizational purpose within the supply chain. Three enablers are identified as having a value-creating effect on supply chain interactions. Additionally, we discovered two impacts that alter the power balance between buyers and suppliers during transactions and have a cost-cutting or cost-avoiding effect. While cost-cutting, cost-avoidance, and dependency-reduction impacts are desirable, redistributing power may also have negative consequences. The article establishes a first strategy framework for evaluating the influence of the procurement department on supply chain transactions, allowing managers to understand better and apply the sourcing function inside a supply chain and embed it throughout the business.Keywords: supply chain management, resilience, sustainability, value creation, purpose
Procedia PDF Downloads 118392 Motivation to Ride in the Hotter 'N Hell Hundred Bicycling Event
Authors: Karen J. Polvado, Betty Bowles, Jansen Lauren, Gibson Martha, Robin Lockhart
Abstract:
The purpose of this study was to identify motivation to participate in the Hotter ‘n Hell Hundred (HHH) bicycling event, and the participants’ demographics, health risk factors, and preparation to ride in the event. A convenience sample of adults pre-registered for non-competitive cycling events (N = 7,472) were requested to complete a survey. Of these, 2,645 (35%) responded. Questions identified the participants’ demographics, preparation, previous experience with HHH, and motives for riding. The HHH attracted riders of all ages (18-80), genders, ethnicities, and educational levels. The majority were males, 40-59 years old, married, college graduates, and identified themselves as non-Hispanic whites. The majority (68%) reported no existing medical conditions, and were normal weight (70%), although 52% had been overweight or obese in the past. Preparation to ride in the HHH varied from riding more than five times a week for the last year, to riding 1-2 times per week one month before the event. Most (93%) had ridden in the HHH an average of 5 times. Motivations to ride included: personal challenge (75%); to experience the HHH ride (57%); a chance to ride with family/friends/coworkers (52%); improving health (47%); fun (33%); challenge by others (15%); part of a weight loss plan (11%); training for another event (10%); and raising money for a cause (2%). The motivation to participate appeared to move from extrinsic to intrinsic motivation as age increased. Exploration of the exercise habits and motivations of older adults (70+) is suggested by this study.Keywords: cycling, motivation, physical activity, training
Procedia PDF Downloads 297