Search results for: information gain
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 12050

Search results for: information gain

8750 Feature Engineering Based Detection of Buffer Overflow Vulnerability in Source Code Using Deep Neural Networks

Authors: Mst Shapna Akter, Hossain Shahriar

Abstract:

One of the most important challenges in the field of software code audit is the presence of vulnerabilities in software source code. Every year, more and more software flaws are found, either internally in proprietary code or revealed publicly. These flaws are highly likely exploited and lead to system compromise, data leakage, or denial of service. C and C++ open-source code are now available in order to create a largescale, machine-learning system for function-level vulnerability identification. We assembled a sizable dataset of millions of opensource functions that point to potential exploits. We developed an efficient and scalable vulnerability detection method based on deep neural network models that learn features extracted from the source codes. The source code is first converted into a minimal intermediate representation to remove the pointless components and shorten the dependency. Moreover, we keep the semantic and syntactic information using state-of-the-art word embedding algorithms such as glove and fastText. The embedded vectors are subsequently fed into deep learning networks such as LSTM, BilSTM, LSTM-Autoencoder, word2vec, BERT, and GPT-2 to classify the possible vulnerabilities. Furthermore, we proposed a neural network model which can overcome issues associated with traditional neural networks. Evaluation metrics such as f1 score, precision, recall, accuracy, and total execution time have been used to measure the performance. We made a comparative analysis between results derived from features containing a minimal text representation and semantic and syntactic information. We found that all of the deep learning models provide comparatively higher accuracy when we use semantic and syntactic information as the features but require higher execution time as the word embedding the algorithm puts on a bit of complexity to the overall system.

Keywords: cyber security, vulnerability detection, neural networks, feature extraction

Procedia PDF Downloads 71
8749 Inference for Compound Truncated Poisson Lognormal Model with Application to Maximum Precipitation Data

Authors: M. Z. Raqab, Debasis Kundu, M. A. Meraou

Abstract:

In this paper, we have analyzed maximum precipitation data during a particular period of time obtained from different stations in the Global Historical Climatological Network of the USA. One important point to mention is that some stations are shut down on certain days for some reason or the other. Hence, the maximum values are recorded by excluding those readings. It is assumed that the number of stations that operate follows zero-truncated Poisson random variables, and the daily precipitation follows a lognormal random variable. We call this model a compound truncated Poisson lognormal model. The proposed model has three unknown parameters, and it can take a variety of shapes. The maximum likelihood estimators can be obtained quite conveniently using Expectation-Maximization (EM) algorithm. Approximate maximum likelihood estimators are also derived. The associated confidence intervals also can be obtained from the observed Fisher information matrix. Simulation results have been performed to check the performance of the EM algorithm, and it is observed that the EM algorithm works quite well in this case. When we analyze the precipitation data set using the proposed model, it is observed that the proposed model provides a better fit than some of the existing models.

Keywords: compound Poisson lognormal distribution, EM algorithm, maximum likelihood estimation, approximate maximum likelihood estimation, Fisher information, skew distribution

Procedia PDF Downloads 97
8748 Preventing Factors for Innovation: The Case of Swedish Construction Small and Medium-Sized Local Companies towards a One-Stop-Shop Business Concept

Authors: Georgios Pardalis, Krushna Mahapatra, Brijesh Mainali

Abstract:

Compared to other sectors, the residential and service sector in Sweden is responsible for almost 40% of the national final energy use and faces great challenges towards achieving reduction of energy intensity. The one- and two-family (henceforth 'detached') houses, constituting 60% of the residential floor area and using 32 TWh for space heating and hot water purposes, offers significant opportunities for improved energy efficiency. More than 80% of those houses are more than 35 years of old and a large share of them need major renovations. However, the rate of energy renovations for such houses is significantly low. The renovation market is dominated by small and medium-sized local companies (SMEs), who mostly offer individual solutions. A one-stop-shop business framework, where a single actor collaborates with other actors and coordinates them to offer a full package for holistic renovations, may speed up the rate of renovation. Such models are emerging in some European countries. This paper aims to understand the willingness of the SMEs to adopt a one-stop-shop business framework. Interviews were conducted with 13 SMEs in Kronoberg county in Sweden, a geographic region known for its initiatives towards sustainability and energy efficiency. The examined firms seem reluctant to adopt one-stop-shop for nonce due to the perceived risks they see in such a business move and due to their characteristics, although they agree that such a move will advance their position in the market and their business volume. By using threat-rigidity and prospect theory, we illustrate how this type of companies can move from being reluctant to adopt one-stop-shop framework to its adoption. Additionally, with the use of behavioral theory, we gain deeper knowledge on those exact reasons preventing those firms from adopting the one-stop-shop framework.

Keywords: construction SMEs, innovation adoption, one-stop-shop, perceived risks

Procedia PDF Downloads 112
8747 Influence of Online Sports Events on Betting among Nigerian Youth

Authors: Babajide Olufemi Diyaolu

Abstract:

The opportunity provided by advances in technology as regards sports betting is so numerous that even at one's comfort, with the use of a phone, Nigerian youth are found engaging in all kinds of betting. Today it is more difficult to differentiate a true fan as there are quite a number of them that became fans as a result of betting on live games. This study investigated the influence of online sports events on betting among Nigerian youth. A descriptive survey research design was used, and the population consists of all Nigerian youth that engages in betting and live within the southwest zone of Nigeria. A simple random sampling technique was used to pick three states from the southwest zone of Nigeria. Two thousand five hundred respondents comprising males and female were sampled from the three states. A structured questionnaire on online sports event contribution to sports betting (OSECSB) was used. The Instrument consists of three sections. Section A seeks information on the demographic data of the respondents. Section B seeks information on online sports events, while section C is used to extract information on sports betting. The modified instrument, which consists of 14 items, has a reliability coefficient of 0.74. The hypothesis was tested at 0.05 significance level. The completed questionnaire was collated, coded, and analyzed using descriptive statistics of frequency counts, percentage and pie chart, and inferential statistics of multiple regressions. The findings of this study revealed that online sports betting is a significant predictor of an increase in sports betting among Nigerian youth. The media and television, as well as globalization and the internet coupled with social media and various online platforms, have all contributed to the immense increase in sports betting. The increase in the advertisement of the betting platform during live matches, especially football, is becoming more alarming. In most organized international events, the media attention, as well as sponsorship right, are now been given to one or two betting platforms. There is a need for all stakeholders to put in place school-based intervention programs to reorientate our youth about the consequences of addiction to betting. Such programs must include meta-analyses and emotional control towards sports betting.

Keywords: betting platform, Nigerian fans, Nigerian youth, sports betting

Procedia PDF Downloads 61
8746 The Impact of Environmental Corporate Social Responsibility (ECSR) and the Perceived Moral Intensity on the Intention of Ethical Investment

Authors: Chiung-Yao Huang, Yu-Cheng Lin, Chiung-Hui Chen

Abstract:

This study seeks to examine perceived environmental corporate social responsibility (ECSR) with a focus on negative environmental questions, related to intention of ethical investment intention after a environmental failure recovery. An empirical test was employed to test the hypotheses. We manipulated the information on negative ECSR activities of a hypothetical firm in a experimental design with a failure recovery treatment. The company’s negative ECSR recovery was depicted in a positive perspective (depicting a follow-up strong social action), whereas in the negative ECSR treatment it was described in a negative perspective (depicting a follow-up non social action). In both treatments, information about other key characteristics of the focal company were kept constant. Investors’ intentions to invest in the company’s stock were evaluated by multi-item scales. Results indicate that positive ECSR recovery information about a firm enhances investors’ intentions to invest in the company’s stock. In addition, perceived moral intensity has a significant impact on the intention of ethical investment and that perceived moral intensity also serves as a key moderating variable in the relationship between negative ECSR and the intention of ethical investment. Finally, theoretical and managerial implications of the findings are discussed. Practical implications: The results suggest that managers may need to be aware of perceived moral intensity as a key variable in restoring the intention of ethical investment. The results further suggest that perceived moral intensity has a direct, and it also has an moderating influence between ECSR and the intention of ethical investment. Originality/value: In an attempt to deepen the understanding of how investors perceptions of firm environmental CSR are connected with other investor‐related outcomes through ECSR recovery, the present research proposes a comprehensive model which encompasses ECSR and other key relationship constructs after a ECSR failure and recovery.

Keywords: ethical investment, Environmental Corporate Social Responsibility(ECSR), ECSR recovery, moral intensity

Procedia PDF Downloads 334
8745 Examining E-Government Impact Using Public Value Approach: A Case Study in Pakistan

Authors: Shahid Nishat, Keith Thomas

Abstract:

E-government initiatives attract substantial public investments around the world. These investments are based on the premise of digital transformation of the public services, improved efficiency and transparency, and citizen participation in the social democratic processes. However, many e-Government projects, especially in developing countries, fail to achieve their intended outcomes, and a strong disparity exists between the investments made and outcomes achieved, often referred to as e-Government paradox. Further, there is lack of research on evaluating the impacts of e-Government in terms of public value it creates, which ultimately drives usage. This study aims to address these gaps by identifying key enablers of e-Government success and by proposing a public value based framework to examine impact of e-Government services. The study will extend Delone and McLean Information System (IS) Success model by integrating Technology Readiness (TR) characteristics to develop an integrated success model. Level of analysis will be mobile government applications, and the framework will be empirically tested using quantitative methods. The research will add to the literature on e-Government success and will be beneficial for governments, especially in developing countries aspiring to improve public services through the use of Information Communication Technologies (ICT).

Keywords: e-Government, IS success model, public value, technology adoption, technology readiness

Procedia PDF Downloads 115
8744 Real Time Detection of Application Layer DDos Attack Using Log Based Collaborative Intrusion Detection System

Authors: Farheen Tabassum, Shoab Ahmed Khan

Abstract:

The brutality of attacks on networks and decisive infrastructures are on the climb over recent years and appears to continue to do so. Distributed Denial of service attack is the most prevalent and easy attack on the availability of a service due to the easy availability of large botnet computers at cheap price and the general lack of protection against these attacks. Application layer DDoS attack is DDoS attack that is targeted on wed server, application server or database server. These types of attacks are much more sophisticated and challenging as they get around most conventional network security devices because attack traffic often impersonate normal traffic and cannot be recognized by network layer anomalies. Conventional techniques of single-hosted security systems are becoming gradually less effective in the face of such complicated and synchronized multi-front attacks. In order to protect from such attacks and intrusion, corporation among all network devices is essential. To overcome this issue, a collaborative intrusion detection system (CIDS) is proposed in which multiple network devices share valuable information to identify attacks, as a single device might not be capable to sense any malevolent action on its own. So it helps us to take decision after analyzing the information collected from different sources. This novel attack detection technique helps to detect seemingly benign packets that target the availability of the critical infrastructure, and the proposed solution methodology shall enable the incident response teams to detect and react to DDoS attacks at the earliest stage to ensure that the uptime of the service remain unaffected. Experimental evaluation shows that the proposed collaborative detection approach is much more effective and efficient than the previous approaches.

Keywords: Distributed Denial-of-Service (DDoS), Collaborative Intrusion Detection System (CIDS), Slowloris, OSSIM (Open Source Security Information Management tool), OSSEC HIDS

Procedia PDF Downloads 341
8743 Tobacco Taxation and the Heterogeneity of Smokers' Responses to Price Increases

Authors: Simone Tedeschi, Francesco Crespi, Paolo Liberati, Massimo Paradiso, Antonio Sciala

Abstract:

This paper aims at contributing to the understanding of smokers’ responses to cigarette prices increases with a focus on heterogeneity, both across individuals and price levels. To do this, a stated preference quasi-experimental design grounded in a random utility framework is proposed to evaluate the effect on smokers’ utility of the price level and variation, along with social conditioning and health impact perception. The analysis is based on individual-level data drawn from a unique survey gathering very detailed information on Italian smokers’ habits. In particular, qualitative information on the individual reactions triggered by changes in prices of different magnitude and composition are exploited. The main findings stemming from the analysis are the following; the average price elasticity of cigarette consumption is comparable with previous estimates for advanced economies (-.32). However, the decomposition of this result across five latent-classes of smokers, reveals extreme heterogeneity in terms of price responsiveness, implying a potential price elasticity that ranges between 0.05 to almost 1. Such heterogeneity is in part explained by observable characteristics such as age, income, gender, education as well as (current and lagged) smoking intensity. Moreover, price responsiveness is far from being independent from the size of the prospected price increase. Finally, by comparing even and uneven price variations, it is shown that uniform across-brand price increases are able to limit the scope of product substitutions and downgrade. Estimated price-response heterogeneity has significant implications for tax policy. Among them, first, it provides evidence and a rationale for why the aggregate price elasticity is likely to follow a strictly increasing pattern as a function of the experienced price variation. This information is crucial for forecasting the effect of a given tax-driven price change on tax revenue. Second, it provides some guidance on how to design excise tax reforms to balance public health and revenue goals.

Keywords: smoking behaviour, preference heterogeneity, price responsiveness, cigarette taxation, random utility models

Procedia PDF Downloads 140
8742 Education-based, Graphical User Interface Design for Analyzing Phase Winding Inter-Turn Faults in Permanent Magnet Synchronous Motors

Authors: Emir Alaca, Hasbi Apaydin, Rohullah Rahmatullah, Necibe Fusun Oyman Serteller

Abstract:

In recent years, Permanent Magnet Synchronous Motors (PMSMs) have found extensive applications in various industrial sectors, including electric vehicles, wind turbines, and robotics, due to their high performance and low losses. Accurate mathematical modeling of PMSMs is crucial for advanced studies in electric machines. To enhance the effectiveness of graduate-level education, incorporating virtual or real experiments becomes essential to reinforce acquired knowledge. Virtual laboratories have gained popularity as cost-effective alternatives to physical testing, mitigating the risks associated with electrical machine experiments. This study presents a MATLAB-based Graphical User Interface (GUI) for PMSMs. The GUI offers a visual interface that allows users to observe variations in motor outputs corresponding to different input parameters. It enables users to explore healthy motor conditions and the effects of short-circuit faults in the one-phase winding. Additionally, the interface includes menus through which users can access equivalent circuits related to the motor and gain hands-on experience with the mathematical equations used in synchronous motor calculations. The primary objective of this paper is to enhance the learning experience of graduate and doctoral students by providing a GUI-based approach in laboratory studies. This interactive platform empowers students to examine and analyze motor outputs by manipulating input parameters, facilitating a deeper understanding of PMSM operation and control.

Keywords: magnet synchronous motor, mathematical modelling, education tools, winding inter-turn fault

Procedia PDF Downloads 40
8741 The Underground Ecosystem of Credit Card Frauds

Authors: Abhinav Singh

Abstract:

Point Of Sale (POS) malwares have been stealing the limelight this year. They have been the elemental factor in some of the biggest breaches uncovered in past couple of years. Some of them include • Target: A Retail Giant reported close to 40 million credit card data being stolen • Home Depot : A home product Retailer reported breach of close to 50 million credit records • Kmart: A US retailer recently announced breach of 800 thousand credit card details. Alone in 2014, there have been reports of over 15 major breaches of payment systems around the globe. Memory scrapping malwares infecting the point of sale devices have been the lethal weapon used in these attacks. These malwares are capable of reading the payment information from the payment device memory before they are being encrypted. Later on these malwares send the stolen details to its parent server. These malwares are capable of recording all the critical payment information like the card number, security number, owner etc. All these information are delivered in raw format. This Talk will cover the aspects of what happens after these details have been sent to the malware authors. The entire ecosystem of credit card frauds can be broadly classified into these three steps: • Purchase of raw details and dumps • Converting them to plastic cash/cards • Shop! Shop! Shop! The focus of this talk will be on the above mentioned points and how they form an organized network of cyber-crime. The first step involves buying and selling of the stolen details. The key point to emphasize are : • How is this raw information been sold in the underground market • The buyer and seller anatomy • Building your shopping cart and preferences • The importance of reputation and vouches • Customer support and replace/refunds These are some of the key points that will be discussed. But the story doesn’t end here. As of now the buyer only has the raw card information. How will this raw information be converted to plastic cash? Now comes in picture the second part of this underground economy where-in these raw details are converted into actual cards. There are well organized services running underground that can help you in converting these details into plastic cards. We will discuss about this technique in detail. At last, the final step involves shopping with the stolen cards. The cards generated with the stolen details can be easily used to swipe-and-pay for purchased goods at different retail shops. Usually these purchases are of expensive items that have good resale value. Apart from using the cards at stores, there are underground services that lets you deliver online orders to their dummy addresses. Once the package is received it will be delivered to the original buyer. These services charge based on the value of item that is being delivered. The overall underground ecosystem of credit card fraud works in a bulletproof way and it involves people working in close groups and making heavy profits. This is a brief summary of what I plan to present at the talk. I have done an extensive research and have collected good deal of material to present as samples. Some of them include: • List of underground forums • Credit card dumps • IRC chats among these groups • Personal chat with big card sellers • Inside view of these forum owners. The talk will be concluded by throwing light on how these breaches are being tracked during investigation. How are credit card breaches tracked down and what steps can financial institutions can build an incidence response over it.

Keywords: POS mawalre, credit card frauds, enterprise security, underground ecosystem

Procedia PDF Downloads 429
8740 Conventional and Islamic Perspective in Accounting: Potential for Alternative Reporting Framework

Authors: Shibly Abdullah

Abstract:

This paper provides an overview of fundamental philosophical and functional differences in conventional and Islamic accounting. The aim of this research is to undertake a detailed analysis focus on specific illustrations drawn from both these systems and highlight how these differences implicate in recording financial transactions and preparation of financial reports for a range of stakeholders. Accounting as being universally considered as a platform for providing a ‘true and fair’ view of corporate entities can be challenged in the current world view, as the business environment has evolved and transformed significantly. Growth of the non-traditional corporate entity such as Islamic financial institutions, fundamentally questions the applicability of conventional accounting standards in preparation of Shariah-compliant financial reporting. Coupled with this, there are significant concerns about the wider applicability of Islamic accounting standards and framework in order to achieve reporting practices satisfying the information needs generally. Against the backdrop of such a context, this paper raises fundamental question as to how potential convergence could be achieved between these two systems in order to provide users’ a transparent and comparable state of financial information resulting in an alternative framework of financial reporting.

Keywords: accounting, conventional accounting, corporate reporting, Islamic accounting

Procedia PDF Downloads 267
8739 Influence of Vesicular Arbuscular Mycorrhiza on Growth of Cucumis myriocarpus Indigenous Leafy Vegetable

Authors: Pontsho E. Tseke, Phatu W. Mashela

Abstract:

Climate-smart agriculture dictates that underusilised indigenous plant, which served as food for local marginalized communities, be assessed for introduction into mainstream agriculture. Most of the underutilised indigenous plants had survived adverse conditions in the wild; with limited information on how the interact with most abiotic and biotic factors. Cucumis myriocarpus leafy vegetable has nutritional, pharmacological and industrial applications, with limited information on how it interacts with effective microorganisms. The objective of this study was to determine the effects vesicular arbuscular mycorrhiza (VAM) on the growth of C. myriocarpus indigenous leafy vegetable under greenhouse conditions. Four-weeks-old seedlings of C. myriocarpus were transplanted into 20-cm-diameter plastic pots. Two weeks after transplanting, VAM was applied at 0, 10, 20, 30, 40, 50, 60 and 70 g Biocult-VAM plant. At 56 days after treatments, plant growth variables of C. myriocarpus with increase Biocult-VAM levels exhibited positive quadratic relations. Plant variables and increasing concentrations of salinity exhibited positive quadric relations, with 95 to 99% associations. Inclusion, Biocult-VAM can be used in sustainable production of C. myriocarpus for functional food security.

Keywords: abiotic, biotic, rhizasphere, sustainable agriculture

Procedia PDF Downloads 256
8738 Applying Different Stenography Techniques in Cloud Computing Technology to Improve Cloud Data Privacy and Security Issues

Authors: Muhammad Muhammad Suleiman

Abstract:

Cloud Computing is a versatile concept that refers to a service that allows users to outsource their data without having to worry about local storage issues. However, the most pressing issues to be addressed are maintaining a secure and reliable data repository rather than relying on untrustworthy service providers. In this study, we look at how stenography approaches and collaboration with Digital Watermarking can greatly improve the system's effectiveness and data security when used for Cloud Computing. The main requirement of such frameworks, where data is transferred or exchanged between servers and users, is safe data management in cloud environments. Steganography is the cloud is among the most effective methods for safe communication. Steganography is a method of writing coded messages in such a way that only the sender and recipient can safely interpret and display the information hidden in the communication channel. This study presents a new text steganography method for hiding a loaded hidden English text file in a cover English text file to ensure data protection in cloud computing. Data protection, data hiding capability, and time were all improved using the proposed technique.

Keywords: cloud computing, steganography, information hiding, cloud storage, security

Procedia PDF Downloads 174
8737 A Study on Pattern of Acute Poisoning in Patients Admitted to Emergency Wards in a Tertiary Care Hospital

Authors: Sathvika Reddy, Devi Revathi

Abstract:

Background: In India, deliberate self-harm (DSH) with poisoning agents carries a significant impact on morbidity and mortality. Changes in the patterns of poisoning vary across various geographical locations. It is important to know the patterns in a given region in order to facilitate rapid clinical diagnosis, appropriate treatment to reduce associated morbidity and mortality. Aim and Objective: To study the patterns, treatment outcomes of acute poisoning in patients admitted to emergency wards in a tertiary care hospital and to provide poison information services. Materials and Methods: This study was conducted at M.S Ramaiah Memorial and Teaching Hospital from November 2016 to March 2017. The patient’s data was obtained from patient case sheet, interaction with health care professionals, interviewing patients and their caretakers (if possible), and were documented in a suitably designed form. Results: The study involved 131 patients with a mean age of 27.76 ± 15.5 years. Majority of the patients were in the age group 21-30 years, literates (n=53) dwelling in urban (n=113) areas belonging to upper middle class (n=50). Analgesics and antipyretics were commonly utilized in intentional drug overdosage (n=49). Envenomation constituted n=21(16.03%). Furthermore, a significant relationship was observed between marital status and self-poisoning (n=64) (P < 0.001) which commonly occurred through oral ingestion. The outcomes were correlated with the GCS and PSS system and n=85 recovered, n=17 were discharged against medical advice, and n=4 died, and n=4 were lost to follow up respectively. The poison information queries include drug overdose (n=29) and management related queries (n=22) provided majorly by residents (n=45) to update knowledge (n=11) and for better patient care (n=40). Conclusion: The trend in poisoning is dynamic. Medications were identified as the main cause of poisoning in urban areas of India. Educational programs with more emphasis on preventive measures are necessary to create awareness among the general public.

Keywords: poisoning, suicides, clinical pharmacist, envenomation, poison information services

Procedia PDF Downloads 151
8736 Corporate Socially Responsible and Financial Performance in the Tourism-Related Industries

Authors: Yu Shan Wang

Abstract:

Different from other industries, the structure of the tourism industry depends to a large degree the environmental and cultural resources. The industry has to undertake social responsibilities for its commercial behaviour. This paper refers to the seven dimensions of the KLD STATS in 1991-2011 as the indicator to CSR practices. The purpose is to investigate what CSR activities create significant impacts on accounting-based financials and firm values by delving into different CSR dimensions. Meanwhile, this paper takes into consideration S&P 500 and control variables (firm sizes and financial leverage). In fact, the commercial behavior of the tourism-related industry may result in negative impacts on the economy and the society. Therefore, this paper classifies a positive set of CSR elements and a negative set of CSR elements for the tourism-related industry in order to examine their respective effects on short-term profitability and long-term firm values. This can shed light on which CSR dimensions exhibit significant impacts on CFP better than holistic CSR indicators, and hence provide more useful information to investors and corporates. This paper uses quantile regressions to avoid the impact of outliers in the data set. This helps to offer specific information so that companies can make informed decisions.

Keywords: corporate social responsibility, CSR, firm value, tourism, corporate financial performance, CFP

Procedia PDF Downloads 266
8735 Linguistic Symbols Principle Construction in Cultural Creative Product Design

Authors: Pei-Jun Xue, Ming-Yu Hsiao

Abstract:

Language is the emblem of a culture, representing the extension of cultural life. In addition, it is also an important tool for communication and message transmission. It carries not only information but also covers the self-conscious of the information constructor as well as the situational experiences of users from different backgrounds. Moreover, design can be regarded as a language, a dynamic process of coding and decoding. With the designers’ experiences in everyday life, they bring them into the products’ experiences. Considered from the aspects of atmosphere and the five senses, a designer should consider and reconsider how to communicate the messages effectively to suit the users’ needs. In the process of language learning, we should understand the construction behind it and the rules of the compositions of language codes. Regarding the understanding of the design of works or the form of product construction, it is necessary for us to understand the coding system during the process of product construction. The form (signifiers) and meanings (signified) of Chinese characters are closely related. At the same time, it is also a process of simplifying the complicated to the simple. This study discusses the chinese characters that used in the cultural symbols construction, and analysis of existing products by Peirce's semiotic triangles. Through people's cognition of Chinese characters and constitute method, help to understand the way of construction product symbol.

Keywords: cultural-creative product design, cultural product, cultural symbols, linguistic symbols

Procedia PDF Downloads 439
8734 Video Materials as a Persuasive Strategy in Tourism Discourse

Authors: Ganna Zakharova

Abstract:

The persuasive influence of tourism promotional materials is very much experienced nowadays. In order to attract the attention of viewers, marketers choose various techniques in their digital texts. Video is an essential element for attraction and seduction; it is a trigger element for tourists. This solution for web marketing engages and convinces potential tourists to book a tourism product. Embedding video materials into a website provides useful information, create different feelings in viewers, and help them finalize their decisions. The present article discusses video solutions for health tourism websites used to allure potential tourists. The paper reviews the influential elements of persuasive tourism marketing videos. The article highlights how these components as persuasive strategies of tourism promotional materials can influence the decisions of tourism websites’ users. The result section provides the real examples of the deployment of the mentioned technique to convince the audience by the website of 'Karpaty' resort (Ukraine). This technique is worth attention as it plays an important role in the promotion of tourism services. The data collection of this study will provide updated information in relation to the rhetoric of tourism.

Keywords: tourism discourse, persuasive video, influential videos in marketing, persuasive discourse, tourism promotion

Procedia PDF Downloads 104
8733 Patient-Reported Adverse Drug Reactions, Medication Adherence and Clinical Outcomes among major depression disorder Patients in Ethiopia: A Prospective Hospital Based Study.

Authors: Tadesse Melaku Abegaz

Abstract:

Background: there was paucity of data on the self-reported adverse drug reactions (ADRs), level of adherence and clinical outcomes with antidepressants among major depressive disorder (MDD) patients in Ethiopia. Hence, the present study sought to determine the level of adherence for and clinical outcome with antidepressants and the magnitude of ADRs. Methods: A prospective cross-sectional study was employed on MDD patients from September 2016 to January 2017 at Gondar university hospital psychiatry clinic. All patients who were available during the study period were included under the study population. The Naranjo adverse drug reaction probability scale was employed to assess the adverse drug reaction. The rate of medication adherence was determined using morisky medication adherence measurement scale eight. Clinical Outcome of patients was measured by using patient health questionnaire. Multivariable logistic carried out to determine factors for adherence and patient outcome. Results: two hundred seventy patients were participated in the study. More than half of the respondents were males 122(56.2%). The mean age of the participants was 30.94 ± 8.853. More than one-half of the subjects had low adherence to their medications 124(57.1%). About 186(85.7%) of patients encountered ADR. The most common ADR was weight gain 29(13.2). Around 198(92.2%) ADRs were probable and 19(8.8%) were possible. Patients with long standing MDD had high risk of non-adherence COR: 2.458[4.413-4.227], AOR: 2.424[1.185-4.961]. More than one-half 125(57.6) of respondents showed improved outcome. Optimal level of medication adherence was found to be associated with reduced risk of progression of the diseases COR: 0.37[0.110-5.379] and AOR: 0.432[0.201-0.909]. Conclusion: Patient reported adverse drug reactions were more prevalent in major depressive disorder patients. Adherence to medications was very poor in the setup. However, the clinical outcome was relatively higher. Long standing depression was associated with non-adherence. In addition, clinical outcome of patients were affected by non-adherence. Therefore, adherence enhancing interventions should be provided to improve medication adherence and patient outcome.

Keywords: adverse drug reactions, clinical outcomes, Ethiopia, prospective study, medication adherence

Procedia PDF Downloads 232
8732 Initiating the Provision of Adolescent Reproductive Health Information and Services (ARHIS) to Communities in Quezon City, Beginning with District 2

Authors: Erickson Bernardo, Caridad Pineda

Abstract:

The project Adolescent Reproductive Health Information and Services (ARHIS) is a nine-month pilot project which intends to bridge the existing gap between reproductive health information and services, particularly with regard to family planning and HIV, among adolescent boys and girls aged 10-19 years in the 2nd Congressional District of Quezon City, in the Philippines. It aims to increase adolescents' and young people's awareness about their reproductive health concerns and at the same time make a wide range of reproductive health (RH) services accessible and available to them. A number of methodologies were utilized in the implementation of the project. At the onset, a baseline survey was conducted by community mobilizers to gather a situational analysis of adolescents' and young people's issues and concerns. The results of this survey were then presented in a multi-stakeholders' meeting to gather community support and foster their involvement. Further, interactive learning sessions (ILS) on a variety of reproductive health topics, among young people, parents and community leaders based on the results of the baseline survey was conducted. With regard to reproductive health service provision, both facility-based delivery and conduct of outreach activities were employed. In the span of nine months, the project was able to yield the following results: • A total of 521 adolescents and youth (AY) were reached by ILS on puberty, responsible relationships, teenage pregnancy, family planning, as well as HIV & AIDS. • A total of 218 parents and community leaders were informed of AY RH-related issues and concerns. • More than 350 AYs availed of a wide range of FP services including pills – both combined oral and progestin-only, and progestin-only injectables and implants. • More than 380 AYs availed of condoms as means of STI and HIV prevention. A noble initiative of the project is the utilization of a "condom distributor", a youth leader who has been educated about STI and HIV prevention as well as correct condom use, as the focal point for condom access in the community. • A total of 25 young people, parents, and community leaders were identified as ARHIS champions who have been instrumental in the achievement of project deliverables through their dedication and commitment to support the project. The concept of adolescent sexual and reproductive health (ASRH) remains to be a major challenge in the Philippine context. This is due to the fact that majority of Filipinos are still not keen on discussing issues and concerns related to ASRH, albeit the alarming number of teenage pregnancies and the rapid increase of HIV cases among 15- 24 year olds. In addition, Republic Act 10354 or the Responsible Parenthood and Reproductive Health Act of 2012, requires minor adolescents to present a written parental consent prior to accessing RH services. However, with the involvement and support of parents and key community stakeholders, these barriers may be addressed. The project has demonstrated how adolescents and young people yearn for reproductive health information and services.

Keywords: adolescent sexual reproductive health, barriers to access, reproductive health information and services, teenage pregnancies

Procedia PDF Downloads 159
8731 Heuristic Classification of Hydrophone Recordings

Authors: Daniel M. Wolff, Patricia Gray, Rafael de la Parra Venegas

Abstract:

An unsupervised machine listening system is constructed and applied to a dataset of 17,195 30-second marine hydrophone recordings. The system is then heuristically supplemented with anecdotal listening, contextual recording information, and supervised learning techniques to reduce the number of false positives. Features for classification are assembled by extracting the following data from each of the audio files: the spectral centroid, root-mean-squared values for each frequency band of a 10-octave filter bank, and mel-frequency cepstral coefficients in 5-second frames. In this way both time- and frequency-domain information are contained in the features to be passed to a clustering algorithm. Classification is performed using the k-means algorithm and then a k-nearest neighbors search. Different values of k are experimented with, in addition to different combinations of the available feature sets. Hypothesized class labels are 'primarily anthrophony' and 'primarily biophony', where the best class result conforming to the former label has 104 members after heuristic pruning. This demonstrates how a large audio dataset has been made more tractable with machine learning techniques, forming the foundation of a framework designed to acoustically monitor and gauge biological and anthropogenic activity in a marine environment.

Keywords: anthrophony, hydrophone, k-means, machine learning

Procedia PDF Downloads 154
8730 The Influence of Leadership Styles on Organizational Performance and Innovation: Empirical Study in Information Technology Sector in Spain

Authors: Richard Mababu Mukiur

Abstract:

Leadership is an important drive that plays a key role in the success and development of organizations, particularly in the current context of digital transformation, highly competitivity and globalization. Leaders are persons that hold a dominant and privileged position within an organization, field, or sector of activities and are able to manage, motivate and exercise a high degree of influence over other in order to achieve the institutional goals. They achieve commitment and engagement of others to embrace change, and to make good decisions. Leadership studies in higher education institutions have examined how effective leaders hold their organizations, and also to find approaches which fit best in the organizations context for its better management, transformation and improvement. Moreover, recent studies have highlighted the impact of leadership styles on organizational performance and innovation capacities, since some styles give better results than others. Effective leadership is part of learning process that take place through day-to-day tasks, responsibilities, and experiences that influence the organizational performance, innovation and engagement of employees. The adoption of appropriate leadership styles can improve organization results and encourage learning process, team skills and performance, and employees' motivation and engagement. In the case of case of Information Technology sector, leadership styles are particularly crucial since this sector is leading relevant changes and transformations in the knowledge society. In this context, the main objective of this study is to analyze managers leadership styles with their relation to organizational performance and innovation that may be mediated by learning organization process and demographic variables. Therefore, it was hypothesized that the transformational and transactional leadership will be the main style adopted in Information Technology sector and will influence organizational performance and innovation capacity. A sample of 540 participants from Information technology sector has been determined in order to achieve the objective of this study. The Multifactor Leadership Questionnaire was administered as the principal instrument, Scale of innovation and Learning Organization Questionnaire. Correlations and multiple regression analysis have been used as the main techniques of data analysis. The findings indicate that leadership styles have a relevant impact on organizational performance and innovation capacity. The transformational and transactional leadership are predominant styles in Information technology sector. The effective leadership style tend to be characterized by the capacity of generating and sharing knowledge that improve organization performance and innovation capacity. Managers are adopting and adapting their leadership styles that respond to the new organizational, social and cultural challenges and realities of contemporary society. Managers who encourage innovation, foster learning process, share experience are useful to the organization since they contribute to its development and transformation. Learning process capacity and demographic variables (age, gender, and job tenure) mediate the relationship between leadership styles, innovation capacity and organizational performance. The transformational and transactional leadership tend to enhance the organizational performance due to their significant impact on team-building, employees' engagement and satisfaction. Some practical implications and future lines of research have been proposed.

Keywords: leadership styles, tranformational leadership, organisational performance, organisational innovation

Procedia PDF Downloads 201
8729 Analog Input Output Buffer Information Specification Modelling Techniques for Single Ended Inter-Integrated Circuit and Differential Low Voltage Differential Signaling I/O Interfaces

Authors: Monika Rawat, Rahul Kumar

Abstract:

Input output Buffer Information Specification (IBIS) models are used for describing the analog behavior of the Input Output (I/O) buffers of a digital device. They are widely used to perform signal integrity analysis. Advantages of using IBIS models include simple structure, IP protection and fast simulation time with reasonable accuracy. As design complexity of driver and receiver increases, capturing exact behavior from transistor level model into IBIS model becomes an essential task to achieve better accuracy. In this paper, an improvement in existing methodology of generating IBIS model for complex I/O interfaces such as Inter-Integrated Circuit (I2C) and Low Voltage Differential Signaling (LVDS) is proposed. Furthermore, the accuracy and computational performance of standard method and proposed approach with respect to SPICE are presented. The investigations will be useful to further improve the accuracy of IBIS models and to enhance their wider acceptance.

Keywords: IBIS, signal integrity, open-drain buffer, low voltage differential signaling, behavior modelling, transient simulation

Procedia PDF Downloads 180
8728 The Lived Experience of Thai Mothers Living with HIV in Southern Thailand

Authors: Dusanee Suwankhong, Pranee Liamputtong

Abstract:

Mothers living with HIV tend to experience stigma and discrimination which has an impact on their psychological and social well-being and their human rights. This paper explores the lived experience of Thai mothers with HIV in their family. In-depth interviewing and drawing methods were employed to gain a deep understanding on the experience of 30 HIV-positive mothers in the southern community of Thailand. The data was analyzed using thematic analysis method. We found that the majority of HIV-positive mothers learned about their HIV status through blood test services during their antenatal care, but some decided to visit a doctor when their partner became chronically frail and showed some signs indicating HIV/AIDS. Learning about their HIV gave them a great shock, and they could not believe that they were infected with HIV/AIDS. They feared that their illness would be disclosed and hence attempted to keep their HIV secret. This was due to the fact that people in their community would blame and labeled them as a ‘disgusting person’. Besides, they would be separated from social contacts and networks, their individual rights would be disregarded, and their potential roles would be restricted. Although participants suggested that people had more positive view on HIV-infected person nowadays, all still wanted to keep it secret because of fear of stigma and discrimination. Thai health care has provided various kinds of support programs, but many mothers chose not to participate due to the fear of disclosure. However, the women attempted to seek some strategies to live a life which would be more acceptable by the community. We conclude that HIV is still seen as a stigmatised disease in rural community of southern Thailand. Local health care providers and relevant sectors in the locality should create suitable programs to enhance self-worth among those HIV-positive mothers because this could increase a quality of life of this vulnerable mothers. Providing sufficient and appropriate supports for better emotional wellbeing is an essential role of health professionals so that the feeling of isolation among these women could be eliminated and positive social justice can be achieved.

Keywords: HIV-positive mothers, lived experience, southern Thailand, stigma and discrimination

Procedia PDF Downloads 165
8727 Ill-Posed Inverse Problems in Molecular Imaging

Authors: Ranadhir Roy

Abstract:

Inverse problems arise in medical (molecular) imaging. These problems are characterized by large in three dimensions, and by the diffusion equation which models the physical phenomena within the media. The inverse problems are posed as a nonlinear optimization where the unknown parameters are found by minimizing the difference between the predicted data and the measured data. To obtain a unique and stable solution to an ill-posed inverse problem, a priori information must be used. Mathematical conditions to obtain stable solutions are established in Tikhonov’s regularization method, where the a priori information is introduced via a stabilizing functional, which may be designed to incorporate some relevant information of an inverse problem. Effective determination of the Tikhonov regularization parameter requires knowledge of the true solution, or in the case of optical imaging, the true image. Yet, in, clinically-based imaging, true image is not known. To alleviate these difficulties we have applied the penalty/modified barrier function (PMBF) method instead of Tikhonov regularization technique to make the inverse problems well-posed. Unlike the Tikhonov regularization method, the constrained optimization technique, which is based on simple bounds of the optical parameter properties of the tissue, can easily be implemented in the PMBF method. Imposing the constraints on the optical properties of the tissue explicitly restricts solution sets and can restore uniqueness. Like the Tikhonov regularization method, the PMBF method limits the size of the condition number of the Hessian matrix of the given objective function. The accuracy and the rapid convergence of the PMBF method require a good initial guess of the Lagrange multipliers. To obtain the initial guess of the multipliers, we use a least square unconstrained minimization problem. Three-dimensional images of fluorescence absorption coefficients and lifetimes were reconstructed from contact and noncontact experimentally measured data.

Keywords: constrained minimization, ill-conditioned inverse problems, Tikhonov regularization method, penalty modified barrier function method

Procedia PDF Downloads 259
8726 Corporate Social Responsibility as a Determinant of Sustainability of SME: A Study of House of Tara, a Small Business Operating in Nigeria

Authors: Bolanle Deborah Motilewa, E. K. Rowland Worlu, Gbenga Mayowa Agboola, Ayodele Maxwell Olokundun

Abstract:

In the pursuit of profit maximization as a major objective of business organizations, several firms forfeit their social and economic responsibility whilst focusing on activities that are deemed to solely profit the firm, without taking into cognizance the effect of their operations on the society in which they operate. Business analysts have, however, realized the determinant role of social responsibility in corporate performance, such that firms that are able to imbibe corporate social responsibility in their core business operations may be able to take advantage of the social reputation gained across their several stakeholders. Small and medium enterprises operating in highly competitive markets are also advised to leverage on this reputation gained from being socially responsible, if they seek ways to remain relevant in the same markets dominated by multinational corporations. Adapting a case study approach, this study highlights the advantages (such as employee and customer loyalty) gained by House of Tara, a small business operating in the beauty and make-up industry in Nigeria, resulting from the firm’s commitment to advancing the society in which it operates through several social responsibility activities. It is observed that although competing with major makeup brands such as MAC, Maybelline, Dior, Mary Kay and others, House of Tara has been able to not only thrive, but gain a sizeable market in the Nigerian makeup industry, because several consumers purchase their products not solely because of the quality or price of their product, but because they perceive themselves as buying into the firm’s CSR vision. This study, therefore, recommends that small and medium enterprises that may lack adequate resources (manpower, technology, capital) needed to successfully compete with multinationals, can harness the potentials in the reputation and loyalty gained from adequate investment in corporate social responsibility.

Keywords: corporate social responsibility, small and medium enterprises, House of Tara, sustainability

Procedia PDF Downloads 254
8725 Open Minds but Closed Access: Why Are There so Few Gold Open Access LIS Journals And Why Are so Many Librarians Unwilling to Unlock Their Scholarship?

Authors: Sarah Baker, Jayati Chaudhuri

Abstract:

Librarians have embraced the open access movement in all disciplines but their own. They are strong advocates on college campuses and curate institutional repositories, yet there are surprisingly few open access LIS journals. Presenters evaluated the open access availability of library and information science literature. After analyzing the top 100 library science journals (the top 50 journals from Scimago and JCR) and finding very few gold open access journals, they then investigated the availability of open access articles from the top 10 closed access journals. Presenters would like to generate a conversation on what type of proactive approach librarians can take to increase open access to literature within our discipline. Librarians like their colleagues in other disciplines are not motivated to submit their articles to their institutional repositories. Presenters have found a similar reluctance from their fellow colleagues regarding open access initiatives on campus. Presenters will describe Open Access Week activities as part of a campus-wide initiative and share some faculty comments, concerns, and misconceptions that came up as a part of this dialog. Presenters will discuss their personal experiences providing access to faculty publications through the California State University Los Angeles institutional repository.

Keywords: faculty scholarship, institutional repositories, library and information science journals, open access

Procedia PDF Downloads 315
8724 Combination of Artificial Neural Network Model and Geographic Information System for Prediction Water Quality

Authors: Sirilak Areerachakul

Abstract:

Water quality has initiated serious management efforts in many countries. Artificial Neural Network (ANN) models are developed as forecasting tools in predicting water quality trend based on historical data. This study endeavors to automatically classify water quality. The water quality classes are evaluated using 6 factor indices. These factors are pH value (pH), Dissolved Oxygen (DO), Biochemical Oxygen Demand (BOD), Nitrate Nitrogen (NO3N), Ammonia Nitrogen (NH3N) and Total Coliform (T-Coliform). The methodology involves applying data mining techniques using multilayer perceptron (MLP) neural network models. The data consisted of 11 sites of Saen Saep canal in Bangkok, Thailand. The data is obtained from the Department of Drainage and Sewerage Bangkok Metropolitan Administration during 2007-2011. The results of multilayer perceptron neural network exhibit a high accuracy multilayer perception rate at 94.23% in classifying the water quality of Saen Saep canal in Bangkok. Subsequently, this encouraging result could be combined with GIS data improves the classification accuracy significantly.

Keywords: artificial neural network, geographic information system, water quality, computer science

Procedia PDF Downloads 325
8723 Impacts of Human Settlement Development on Highland View Wetland in Bizana, South Africa

Authors: Fikile Xaki, Zendy Magayiyana

Abstract:

The increasing population and urbanization, with the demand for land and development, has had adverse impacts on wetland areas which has resulted in changing the hydrology and water chemistry of wetlands, affecting the water supply and water quality in urban areas like the Highland View, a residential area in Mbizana, South Africa. The settlement development in Highland View has led to wetland degradation due to land uses like agriculture and conversion of wetland for settlement development. Interviews with the local community were conducted to show how settlement development on wetland affects them. The results indicated that the environmental rights of people as according to Section 24 of the South African Constitution are compromised, and sustainable development was not put into consideration during development. With the results from the survey - through questionnaires for the Mbizana Local Municipality and the community, it was clear that the community needs education and capacity building on wetland management and conservation. Geographic Information Systems (GIS) was used to map physical properties of the Highland View wetland and houses built on the wetland. With all the information gathered from the research, it was clear that local municipality, together with hydrologists, needs to develop an environmental management framework to protect the wetlands.

Keywords: sustainable development, wetlands, human settlement, water

Procedia PDF Downloads 319
8722 Post-Disaster Recovery and Impacts on Construction Resources: Case Studies of Queensland Catastrophic Events

Authors: Scott A. Abbott

Abstract:

This paper examines the increase in the occurrence of natural disasters worldwide and the need to support vulnerable communities in post-disaster recovery. Preparation and implementation of post-disaster recovery projects need to be improved to allow communities to recover infrastructure, housing, economically and socially following a catastrophe. With the continual rise in catastrophic events worldwide due to climate change, impacts on construction resources affect the ability for post-disaster recovery to be undertaken. This research focuses on case studies of catastrophic events in Queensland, Australia, to contribute to the body of knowledge and gain valuable insights on lessons learned from past events and how they have been managed. The aim of this research is to adopt qualitative data using semi-structured interviews from participants predominantly from the insurance sector to understand barriers that have previously and currently exist in post-disaster recovery. Existing literature was reviewed to reveal gaps in knowledge that needed to be tested. Qualitative data was collected and summarised from field research with the results analysed and discussed. Barriers that impacted post-disaster recovery included time, cost, and resource capability and capacity. Causal themes that impacted time and cost were identified as decision making, pre-planning, and preparedness, as well as effective communication across stakeholders. The research study applied a qualitative approach to the existing literature and case studies across Queensland, Australia, to identify existing and new barriers that impact post-disaster recovery. It was recommended to implement effective procurement strategies to assist in cost control; implement pre-planning and preparedness strategies across funder, contractor, and local governments; more effective and timely decision making to reduce time and cost impacts.

Keywords: construction recovery, cost, disaster recovery, resources, time

Procedia PDF Downloads 115
8721 The Attitudinal Effects of Dental Hygiene Students When Changing Conventional Practices of Preventive Therapy in the Dental Hygiene Curriculum

Authors: Shawna Staud, Mary Kaye Scaramucci

Abstract:

Objective: Rubber cup polishing has been a traditional method of preventative therapy in dental hygiene treatment. Newer methods such as air polishing have changed the way dental hygiene care is provided, yet this technique has not been embraced by students in the program nor by practitioners in the workforce. Students entering the workforce tend to follow office protocol and are limited in confidence to introduce technologies learned in the curriculum. This project was designed to help students gain confidence in newer skills and encourage private practice settings to adopt newer technologies for patient care. Our program recently introduced air polishing earlier in the program before the rubber cup technique to determine if students would embrace the technology to become leading-edge professionals when they enter the marketplace. Methods: The class of 2022 was taught the traditional method of polishing in the first-year curriculum and air polishing in the second-year curriculum. The class of 2023 will be taught the air polishing method in the first-year curriculum and the traditional method of polishing in the second-year curriculum. Pre- and post-graduation survey data will be collected from both cohorts. Descriptive statistics and pre and post-paired t-tests with alpha set at .05 to compare pre and post-survey results will be used to assess data. Results: This study is currently in progress, with a completion date of October 2023. The class of 2022 completed the pre-graduation survey in the spring of 2022. The post-gradation survey will be sent out in October 2022. The class of 2023 cohort will be surveyed in the spring of 2023 and October 2023. Conclusion: Our hypothesis is students who are taught air polishing first will be more inclined to adopt that skill in private practice, thereby embracing newer technology and improving oral health care.

Keywords: luggage handling system at world’s largest pilgrimage center

Procedia PDF Downloads 87