Search results for: popular romance narratives
1535 The Effect of Mobile Technology Use in Education: A Meta-Analysis Study
Authors: Şirin Küçük, Ayşe Kök, İsmail Şahin
Abstract:
Mobile devices are very popular and useful tools for assisting people in daily life. With the advancement of mobile technologies, the issue of mobile learning has been widely investigated in education. Many researches consider that it is important to integrate pedagogical and technical strengths of mobile technology into learning environments. For this reason, the purpose of this research is to examine the effect of mobile technology use in education with meta-analysis method. Meta-analysis is a statistical technique which combines the findings of independent studies in a specific subject. In this respect, the articles will be examined by searching the databases for researches which are conducted between 2005 and 2014. It is expected that the results of this research will contribute to future research related to mobile technology use in education.Keywords: mobile learning, meta-analysis, mobile technology, education
Procedia PDF Downloads 7201534 Understanding the Motivations behind the Assassination of Turkish Armenian Journalist, Hrant Dink
Authors: Nusret Mesut Sahin
Abstract:
Hrant Dink, a prominent Turkish-Armenian journalist, and editor-in-chief of the bilingual Turkish-Armenian newspaper Agos was assassinated in Istanbul on January 19th, 2007 by a nationalist extremist, Ogun Samast. Dink had been voicing the atrocities against the Armenians between 1915 and 1922 during the Ottoman rule, and his comments on the issue appeared in the Turkish media many times before his assassination. It has been argued that the suffocating atmosphere created by the Turkish news media targeting Mr. Dink made him a target of an extremist Turkish juvenile. This study analyzes the media news to understand and explain why Hrant Dink became the target of a nationalist extremist. In this research, content analysis of news articles (N= 170) is conducted to identify whether there is a link between hate speech against Hrant Dink in the Turkish media and his assassination. The content of the newspaper articles is categorized and coded according to the hate language being used. The analysis suggested that Turkish media paved the way for Dink’s assassination. Hate speech against Hrant Dink on the media had risen gradually before the assassination. The study also found that the number of news stories covering hate speech and racist discourse against non-Muslim citizens of Turkey also increased dramatically before the assassination. Therefore, hate speech against minorities in media narratives and news reports should be monitored, and political figures or leaders of social groups who are targeted by some media outlets should be protected.Keywords: Hrant Dink, assassination, Turkish Armenian journalist, media
Procedia PDF Downloads 1591533 Models of Copyrights System
Authors: A. G. Matveev
Abstract:
The copyrights system is a combination of different elements. The number, content and the correlation of these elements are different for different legal orders. The models of copyrights systems display this system in terms of the interaction of economic and author's moral rights. Monistic and dualistic models are the most popular ones. The article deals with different points of view on the monism and dualism in copyright system. A specific model of the copyright in Switzerland in the XXth century is analyzed. The evolution of a French dualistic model of copyright is shown. The author believes that one should talk not about one, but rather about a number of dualism forms of copyright system.Keywords: copyright, exclusive copyright, economic rights, author's moral rights, rights of personality, monistic model, dualistic model
Procedia PDF Downloads 4201532 Regenerative City Regions: Exploring the Connections between Regenerative Development, Collaborative Governance and Progressive Regionalism
Authors: Lorena F. Axinte
Abstract:
Territorial rescaling is a universal practice in the UK, following a logic of agglomeration and competition as the only chance for cities to thrive. Cardiff Capital Region is one of the latest examples, and its governance structures and developmental narratives are currently being shaped. Its evolution must be compatible with the Wellbeing of Future Generations Act, a Welsh legislation that requires public bodies to put sustainability at the core of all actions. Departing from this case study, the project follows the evolution of Cardiff Capital Region and assesses it based on a new a conceptual framework that connects the notions of regenerative development, collaborative governance, and progressive regionalism. The hypothetical synergies between these different theoretical perspectives are demonstrated, inferring that if regenerative development is aimed at, it must necessarily start with collaborative modes of governance. The objective is to explore (a) whether expanding the network of active stakeholders who get to intervene in the governance structure can contribute to a more progressive definition and development of the city region and (b) whether this can be considered a pathway towards regenerative development. The exploratory fieldwork conducted during the initial phase of the project used qualitative methods, which will be complemented next by different participatory research approaches, as well as a quantitative analysis. Despite being in its early days, the study is showing that a wider range of voices can indeed change priorities, reconcile and balance between the economic drivers and the wider social, economic, cultural and environmental aspects.Keywords: Cardiff Capital Region, collaborative governance, progressive regionalism, regenerative development
Procedia PDF Downloads 3101531 A Loop between Victimhood and Women with Choice: Case of Trafficked North Korean Women in China
Authors: Jinah Kwon
Abstract:
Why are there North Korean women who prefer their life in China, living as an undocumented migrant, to legal residence in South Korea? What is the line between choice and coercion in trafficking and how does it relate to family, especially in Asian culture? Is family function as a haven in the unsecured world or a fetter against the better world? Are the current international mechanisms on trafficked victims fully reflecting the voices of the victims? This study is about the paradoxical conditions of North Korean women situated in China as the trafficked victim and as members of their Chinese family. In order to answer the questions above, this study explored the case of trafficked North Korean women in China. This mixed-methods study employed in-depth interviews of 18 trafficked women living in China and a survey of 98 North Korean origin women residing in South Korea. From the survey, 40 out of 98 women from the survey indicated an unexpected function of trafficking, which was used as a channel of supporting the subjectivity of women in the North Korean context. Such results supported the actual observation and narratives of North Korean women who experienced trafficking from the author’s two visits to the Northeastern area of China in 2012 and 2018, respectively. Based on the findings, the last part of the study makes policy implications on international trafficking mechanisms—theories by Gayatri Spivak and Herbert A. Simon was employed to approach the relatively less dealt aspect of trafficking.Keywords: China, North Korean women, trafficking, victimhood
Procedia PDF Downloads 1921530 Deadline Missing Prediction for Mobile Robots through the Use of Historical Data
Authors: Edwaldo R. B. Monteiro, Patricia D. M. Plentz, Edson R. De Pieri
Abstract:
Mobile robotics is gaining an increasingly important role in modern society. Several potentially dangerous or laborious tasks for human are assigned to mobile robots, which are increasingly capable. Many of these tasks need to be performed within a specified period, i.e., meet a deadline. Missing the deadline can result in financial and/or material losses. Mechanisms for predicting the missing of deadlines are fundamental because corrective actions can be taken to avoid or minimize the losses resulting from missing the deadline. In this work we propose a simple but reliable deadline missing prediction mechanism for mobile robots through the use of historical data and we use the Pioneer 3-DX robot for experiments and simulations, one of the most popular robots in academia.Keywords: deadline missing, historical data, mobile robots, prediction mechanism
Procedia PDF Downloads 4011529 Translating History in a Brazilian Graphic Novel: A Translation Project for Angola Janga by Marcelo D'Salete
Authors: Carolina Rezende, Julio Cesar Neves Monteiro
Abstract:
Traditionally, History and fiction are considered to be opposing fields of study. While one is linked to the study of facts, things that have happened within the limits of ‘reality’, the other explores a made-up world, originated from imagination and fantasy. However, despite their apparent discrepancies, there is a fundamental trait that brings them closer. Historical narratives, similarly to fiction ones, are produced based on multiple interpretations of an event, which are transmitted in a rather subjective way by language. It is within this perspective of history and fiction intertwined that this paper aims to discuss the translation of historical facts in the graphic novel Angola Janga, by Marcelo D’Salete, as well as presenting it as a historical document. The novel, which is divided into 11 short stories, narrates the rebellions that took place in Serra da Barriga, between the 16th and 17th centuries, that resulted in the Guerra dos Palmares. The graphic novel in question is a result of the author’s 11-year historical and bibliographical research, which combines history and fiction in order to shed a light of the confrontation that history seems to overlook. Also, the book includes a foreword, glossary, chronological line of Guerra dos Palmares, as well as maps and references used by the author during his research. For that, a few segments from the book will be selected and translated in order to show such connection between history and fiction, and the discussion resulted from it will be based on the works of Southgate (2009), Pym (2001) and D’hulst (2001).Keywords: graphic novel, history, fiction, Palmares
Procedia PDF Downloads 1751528 Representation of Pashtuns in the Context of Terrorism: A Comparative Study of Bollywood and Lollywood Movies After 9/11
Authors: Aamir Ayub, Yasir Shehzad, Shakeel Ahmad
Abstract:
This research paper aims to understand how the Pashtuns have been represented in relationship to terrorism in post-9/11 Bollywood and Lollywood movies. It focuses particularly on ‘Torbaaz’ from Bollywood and ‘Waar’ from Lollywood in order to define the nature of Pashtun characterization, the functioning of intelligence agencies, as well as the socio-political side of the represented narratives. In this research, the analytical approach developed is applied to contemplate how these films represent or fail to represent Pashtun identity, taking into consideration the cultural, historical and social dimensions. The study also aims to examine the effects of the media, particularly on the different ethnic groups’ perceptions of terrorism. In this case, it covers how the movie relates actual events in society – specifically, socio-political – to the messages in the film regarding the Pashtun people and their portrayal. Such elements may constitute the portrayal of intelligence agencies and their fight against terrorism, state-security dynamics, and the Pashtun society. In conclusion, this research paper focuses on the representation of Pashtuns in films after 9/11 and addresses the issue concerning the representation of ethnic groups in the method of the theme of terrorism. It provides ideas about the role of media in influencing the mind of the society and their attitude towards certain communities after geopolitics upheavals.Keywords: pashtun representation, terrorism, 9/11 attacks, socio-political implications, ethnic representation in media
Procedia PDF Downloads 211527 Sense of the Place and Human Multisensory Perceptions: The Case of Kerman Old Bazaar Scents
Authors: Sabra Saeidi
Abstract:
When we talk about tangible heritage, the first thing that comes to mind is historic places: what they look like, who made them, and what materials they are made of. But each monument is not limited to its physical constituents and is a complex and related set of human perceptions, memories, narratives, and the structure that shapes its character. In this article, based on the ideology of two great architects, Juhani Pallasmaa and Christian Norberg-Schulz, we discussed the sense of the place and how the human presence in a place with all its senses (visual, auditory, tactile, olfactory, taste) gives life and value to it. This value is all about feeling and definitions and is recorded in the form of our memoirs. An attempt has been made to conclude that our perception of the environment, by our sensory tools, is an intangible and thematic heritage itself, whose existence depends on our existence and has no less value than monuments' physical form and structure. The sense of smell is one of the most powerful, personal and inexplicable, unrecorded, and unexpressed senses and has a solid connection with our memories. by reviewing the case of Kerman Bazaar and its change of use in recent years, we define that one of the ways to protect the olfactory heritage of this valuable complex is to draw a Smellscape: a way to record the moment of present and past memories. Smellscapes are tools for transferring the sense of smell to a visual form to record scents and understand them in a more comprehensive, common, and artistic form.Keywords: sence of the place, spirit of the place, smellscape, multisensory perception
Procedia PDF Downloads 1121526 Accelerating Side Channel Analysis with Distributed and Parallelized Processing
Authors: Kyunghee Oh, Dooho Choi
Abstract:
Although there is no theoretical weakness in a cryptographic algorithm, Side Channel Analysis can find out some secret data from the physical implementation of a cryptosystem. The analysis is based on extra information such as timing information, power consumption, electromagnetic leaks or even sound which can be exploited to break the system. Differential Power Analysis is one of the most popular analyses, as computing the statistical correlations of the secret keys and power consumptions. It is usually necessary to calculate huge data and takes a long time. It may take several weeks for some devices with countermeasures. We suggest and evaluate the methods to shorten the time to analyze cryptosystems. Our methods include distributed computing and parallelized processing.Keywords: DPA, distributed computing, parallelized processing, side channel analysis
Procedia PDF Downloads 4261525 Pharmacy-Station Mobile Application
Authors: Taissir Fekih Romdhane
Abstract:
This paper proposes a mobile web application named Pharmacy-Station that sells medicines and permits user to search for medications based on their symptoms, making it is easy to locate a specific drug online without the need to visit a pharmacy where it may be out of stock. This application is developed using the jQuery Mobile framework, which uses many web technologies and languages such as HTML5, PHP, JavaScript and CSS3. To test the proposed application, we used data from popular pharmacies in Saudi Arabia that included important information such as location, contact, and medicines in stock, etc. This document describes the different steps followed to create the Pharmacy-Station application along with screenshots. Finally, based on the results, the paper concludes with recommendations and further works planned to improve the Pharmacy-Station mobile application.Keywords: pharmacy, mobile application, jquery mobile framework, search, medicine
Procedia PDF Downloads 1591524 MR-Implantology: Exploring the Use for Mixed Reality in Dentistry Education
Authors: Areej R. Banjar, Abraham G. Campbell
Abstract:
The use of Mixed Reality (MR) in teaching and training is growing popular and can improve students’ ability to perform technical procedures. This short paper outlines the creation of an interactive educational MR 3D application that aims to improve the quality of instruction for dentistry students. This application is called MRImplantology and aims to teach the fundamentals and preoperative planning of dental implant placement. MRImplantology uses cone-beam computed tomography (CBCT) images as the source for 3D dental models that dentistry students will be able to freely manipulate within a 3D MR world to aid their learning process.Keywords: augmented reality, education, dentistry, cone-beam computed tomography CBCT, head mounted display HMD, mixed reality
Procedia PDF Downloads 1901523 Growth of Struvite Crystals in Synthetic Urine Using Magnesium Nitrate
Authors: Reneiloe Seodigeng, John Kabuba, Hilary Rutto, Tumisang Seodigeng
Abstract:
Urine diversion toilets have become popular as a means of solving the challenges in sanitation. As a result, the source-separated urine must be adequately treated so that it can be disposed of safely and valuable struvite can be extracted for use as fertilizer. In this study, synthetic urine was prepared, and struvite crystallisation experiments carried out using magnesium nitrate. The effect of residence time on crystal growth was studied. At residence time of 10, 30 and 60 minutes, mean particle sizes were 17, 34 and 53 µm showing that with higher residence times, larger crystal sizes can be achieved. SEM analysis of the crystal showed that the resultant crystals had the typical morphology of struvite crystals.Keywords: struvite, magnesium nitrate, crystallisation, urine treatment
Procedia PDF Downloads 1601522 1/Sigma Term Weighting Scheme for Sentiment Analysis
Authors: Hanan Alshaher, Jinsheng Xu
Abstract:
Large amounts of data on the web can provide valuable information. For example, product reviews help business owners measure customer satisfaction. Sentiment analysis classifies texts into two polarities: positive and negative. This paper examines movie reviews and tweets using a new term weighting scheme, called one-over-sigma (1/sigma), on benchmark datasets for sentiment classification. The proposed method aims to improve the performance of sentiment classification. The results show that 1/sigma is more accurate than the popular term weighting schemes. In order to verify if the entropy reflects the discriminating power of terms, we report a comparison of entropy values for different term weighting schemes.Keywords: 1/sigma, natural language processing, sentiment analysis, term weighting scheme, text classification
Procedia PDF Downloads 2011521 Agony and Agency: Discursive Construction of Barren women in the Bible and Traditional African Society
Authors: Vicky Khasandi-Telewa, Sinfree Makoni
Abstract:
Barrenness is a fundamentally agonizing condition that leads to identity disruption in its victims. In Africa, women are usually referred to as ‘Mother of X,’ and this causes grief to one who does not have a child to be identified with. This paper is an examination and critical appraisal of the impact of barrenness on the self-perception of women and the underlying power relations in how they are discursively constructed in the Bible and Traditional African Society (TAS). It is an analysis of expressive practices to examine how barrenness is constructed in Christianity and TAS with the aim of understanding the intersecting power systems. We approach this from an integrationism and Critical Discourse Analysis perspective that takes seriously both the radical harassment of barren women and the possibilities offered by the ensuing desperation calling for inclusive reinterpretation. We also seek to understand barren women’s coping mechanisms and suggestions on how best to improve their lives. The purpose of this study is to explain how discursive construction of barrenness affects the fundamental rights and freedoms of women and what linguistic strategies they adopt to navigate through the maze of stigma. It seeks to illustrate a more nuanced complexity of barren women's lives through women's own exegesis of the Biblical accounts of barrenness and their traditions and to explore alternative narratives. We explore the linguistic strategies the barren women employ to communicate their coping with limitations imposed upon their rights by the negative constructions.Keywords: integrationism, critical discourse analysis, barrenness, communication strategies, women rights
Procedia PDF Downloads 691520 International Trends in Sustainability Reporting Using Global Reporting Initiatives
Authors: Ramona Zharfpeykan
Abstract:
This study analyses the trend and nature of sustainability key performance indicators (KPIs) reporting in firms globally. It presents both trend and panel data of sustainability reports of 798 firms in the Global Reporting Initiative (GRI) database from 2010 to 2014. The results show some fluctuations in the frequency of sustainability KPI reporting globally across the time while the major focus of reports in firms stayed almost the same. It made us further analyse this trend and found that there are some indicators, such as 'environmental protect expenses' and 'number of grievances', that was barely reported over this period along with some highly popular ones such as 'direct economic value' and 'employment rate'. We could not find any statistical correlation between the KPI reporting percentage and the firms’ industries generally and neither if they belong to environmentally sensitive industries.Keywords: global reporting initiatives, sustainability reporting, sustainability KPI, trends of sustainability reporting
Procedia PDF Downloads 1421519 Re-Imagining and De-Constructing the Global Security Architecture
Authors: Smita Singh
Abstract:
The paper develops a critical framework to the hegemonic discourses resorted to by the dominant powers in the global security architecture. Within this framework, security is viewed as a discourse through which identities and threats are represented and produced to legitimize the security concerns of few at the cost of others. International security have long been driven and dominated by power relations. Since the end of the Cold War, the global transformations have triggered contestations to the idea of security at both theoretical and practical level. These widening and deepening of the concept of security have challenged the existing power hierarchies at the theoretical level but not altered the substance and actors defining it. When discourses are introduced into security studies, several critical questions erupt: how has power shaped security policies of the globe through language? How does one understand the meanings and impact of those discourses? Who decides the agenda, rules, players and outliers of the security? Language as a symbolic system and form of power is fluid and not fixed. Over the years the dominant Western powers, led by the United States of America have employed various discursive practices such as humanitarian intervention, responsibility to protect, non proliferation, human rights, war on terror and so on to reorient the constitution of identities and interests and hence the policies that need to be adopted for its actualization. These power relations are illustrated in this paper through the narratives used in the nonproliferation regime. The hierarchical security dynamics is a manifestation of the global power relations driven by many factors including discourses.Keywords: hegemonic discourse, global security, non-proliferation regime, power politics
Procedia PDF Downloads 3181518 Simulating Drilling Using a CAD System
Authors: Panagiotis Kyratsis, Konstantinos Kakoulis
Abstract:
Nowadays, the rapid development of CAD systems’ programming environments results in the creation of multiple downstream applications, which are developed and becoming increasingly available. CAD based manufacturing simulations is gradually following the same trend. Drilling is the most popular hole-making process used in a variety of industries. A specially built piece of software that deals with the drilling kinematics is presented. The cutting forces are calculated based on the tool geometry, the cutting conditions and the tool/work piece materials. The results are verified by experimental work. Finally, the response surface methodology (RSM) is applied and mathematical models of the total thrust force and the thrust force developed because of the main cutting edges are proposed.Keywords: CAD, application programming interface, response surface methodology, drilling, RSM
Procedia PDF Downloads 4701517 ‘A Ghost of One’s Own’: Spectral Intrusions and Trauma in the Poetry of Joanna Baillie and Anne Bannerman
Authors: Elli Karampela
Abstract:
In Specters of Marx (1993), Jacques Derrida refers to the ghost as an Other presence that occupies the space of the self and emanates from there, haunting in its shadowy pastness and threatening/striving to break free. In times of change, ghosts both reflect the dissolution of set principles and voice traumas of the past that create a sense of fear and instability. This paper observes the way female ghosts create connections with the living in the poetry of Joanna Baillie and Anne Bannerman, both integral, albeit under-researched in different ways, writers of the English Romantic period working in the aftermath of the French Revolution. Especially at the beginning of the nineteenth century, when ghost narratives were devoured by readers and enjoyed as stories that re-awakened sensation in times of revolution, there was at the same time fear of intrusion by terror’s unruly forces that threatened to turn the readers restless. The ghost was particularly dangerous because it was associated with memory and the intrusion of past trauma in the here and now. As will be seen, both Baillie and Bannerman explore the idea of the female ghost’s ‘return’ (a Freudian term that will be approached) which breaks both time and space boundaries to raise the suppressed female voice, threaten stability, and correct wrongs. As a result, the varied manifestations of female ghosts render Baillie and Bannerman active in the contemporary discourse about human rights and the reclamation of the agency.Keywords: poetry, romanticism, spectrality, trauma, women
Procedia PDF Downloads 2091516 Democracy and Human Rights in Nigeria's Fourth Republic: An Assessment
Authors: Kayode Julius Oni
Abstract:
Without mincing words, democracy is by far the most popular form of government in the world today. No matter how we look at it, and regardless of the variant, most leaders in the world today wish to be seen or labeled as Democrats. Perhaps, its attractions in terms of freedom of allocation, accountability, smooth successions of leadership and a lot more, account for its appeal to the ordinary people. The governance style in Nigeria since 1999 cannot be said to be different from the military. Elections are manipulated, judicial processes abused, and the ordinary people do not have access to the dividends of democracy. The paper seeks to address the existing failures experienced under democratic rule in Nigeria which have to transcend into violation of human rights in the conduct of government business. The paper employs the primary and secondary sources of data collection, and it is highly descriptive and critical.Keywords: democracy, human rights, Nigeria, politics, republic
Procedia PDF Downloads 2601515 Phytochemical and Proximate Composition Analysis of Aspillia kotschyi
Authors: A. U. Adamu, E. D Paul, C. E. Gimba, I. G. Ndukwe
Abstract:
The phytochemical and proximate composition of Aspillia kotschyi belonging to Compositae family which is commonly used as medicinal plant in Nigeria was determined on both the Methanolic and Petroleum sprit extract of the plant. The Methanolic extract of the plant revealed the presence of carbohydrates, cardiac glyscosides, flavonoids, triterpene, and alkaloids. The Petroleum sprit extract showed the presence of only carbohydrates and alkaloid. Proximate composition analysis shows moisture content of 5.7%, total ash of 4.03%, crude protein 10.94%, fibre 9.06%, fat value 0.83%, and nitrogen free extract of 70.19%. The results of this study suggest some merit in the popular use of Aspillia kotschi in herbal medicine.Keywords: Aspillia kotschyi, herbal medicine, phytochemical, proximate composition
Procedia PDF Downloads 3661514 Automated Java Testing: JUnit versus AspectJ
Authors: Manish Jain, Dinesh Gopalani
Abstract:
Growing dependency of mankind on software technology increases the need for thorough testing of the software applications and automated testing techniques that support testing activities. We have outlined our testing strategy for performing various types of automated testing of Java applications using AspectJ which has become the de-facto standard for Aspect Oriented Programming (AOP). Likewise JUnit, a unit testing framework is the most popular Java testing tool. In this paper, we have evaluated our proposed AOP approach for automated testing and JUnit on various parameters. First we have provided the similarity between the two approaches and then we have done a detailed comparison of the two testing techniques on factors like lines of testing code, learning curve, testing of private members etc. We established that our AOP testing approach using AspectJ has got several advantages and is thus particularly more effective than JUnit.Keywords: aspect oriented programming, AspectJ, aspects, JU-nit, software testing
Procedia PDF Downloads 3311513 A Multi Function Myocontroller for Upper Limb Prostheses
Authors: Ayad Asaad Ibrahim
Abstract:
Myoelectrically controlled prostheses are becoming more and more popular, for below-elbow amputation, the wrist flexor and extensor muscle group, while for above-elbow biceps and triceps brachii muscles are used for control of the prosthesis. A two site multi-function controller is presented. Two stainless steel bipolar electrode pairs are used to monitor the activities in both muscles. The detected signals are processed by new pre-whitening technique to identify the accurate tension estimation in these muscles. These estimates will activate the relevant prosthesis control signal, with a time constant of 200 msec. It is ensured that the tension states in the control muscle to activate a particular prosthesis function are similar to those used to activate normal functions in the natural hand. This facilitates easier training.Keywords: prosthesis, biosignal processing, pre-whitening, myoelectric controller
Procedia PDF Downloads 3631512 The Rise of Darknet: A Call for Understanding Online Communication of Terrorist Groups in Indonesia
Authors: Aulia Dwi Nastiti
Abstract:
A number of studies and reports on terrorism have continuously addressed the role of internet and online activism to support terrorist and extremist groups. In particular, they stress on social media’s usage that generally serves for the terrorist’s propaganda as well as justification of their causes. While those analyses are important to understand how social media is a vital tool for global network terrorism, they are inadequate to explain the online communication patterns that enable terrorism acts. Beyond apparent online narratives, there is a deep cyber sphere where the very vein of terrorism movement lies. That is a hidden space in the internet called ‘darknet’. Recent investigations, particularly in Middle Eastern context, have shed some lights that this invisible space in the internet is fundamental to maintain the terrorist activities. Despite that, limited number of research examines darknet within the issue of terrorist movements in Indonesian context—where the country is considered quite a hotbed for extremist groups. Therefore, this paper attempts to provide an insight of darknet operation in Indonesian cases. By exploring how the darknet is used by the Indonesian-based extremist groups, this paper maps out communication patterns of terrorist groups on the internet which appear as an intermingled network. It shows the usage of internet is differentiated in different level of anonymity for distinctive purposes. This paper further argues that the emerging terrorist communication network calls for a more comprehensive counterterrorism strategy on the Internet.Keywords: communication pattern, counterterrorism, darknet, extremist groups, terrorism
Procedia PDF Downloads 2931511 Big Data Analysis with RHadoop
Authors: Ji Eun Shin, Byung Ho Jung, Dong Hoon Lim
Abstract:
It is almost impossible to store or analyze big data increasing exponentially with traditional technologies. Hadoop is a new technology to make that possible. R programming language is by far the most popular statistical tool for big data analysis based on distributed processing with Hadoop technology. With RHadoop that integrates R and Hadoop environment, we implemented parallel multiple regression analysis with different sizes of actual data. Experimental results showed our RHadoop system was much faster as the number of data nodes increases. We also compared the performance of our RHadoop with lm function and big lm packages available on big memory. The results showed that our RHadoop was faster than other packages owing to paralleling processing with increasing the number of map tasks as the size of data increases.Keywords: big data, Hadoop, parallel regression analysis, R, RHadoop
Procedia PDF Downloads 4371510 Cyclic Evolution of a Two Fluid Diffusive Universe
Authors: Subhayan Maity
Abstract:
Complete scenario of cosmic evolution from emergent phase to late time acceleration (i.e. non-singular ever expanding Universe) is a popular preference in the recent cosmology. Yet one can’t exclude the idea that other type of evolution pattern of the Universe may also be possible. Especially, the bouncing scenario is becoming a matter of interest now a days. The present work is an exhibition of such a different pattern of cosmic evolution where the evolution of Universe has been shown as a cyclic thermodynamic process. Under diffusion mechanism (non-equilibrium thermodynamic process), the cosmic evolution has been modelled as [ emergent - accelerated expansion - decelerated expansion - decelerated contraction - accelerated contraction - emergent] .Keywords: non-equilibrium thermodynamics, non singular evolution of universe, cyclic evolution, diffusive fluid
Procedia PDF Downloads 1401509 Proposed Terminal Device for End-to-End Secure SMS in Cellular Networks
Authors: Neetesh Saxena, Narendra S. Chaudhari
Abstract:
Nowadays, SMS is a very popular mobile service and even the poor, illiterate people and those living in rural areas use SMS service very efficiently. Although many mobile operators have already started 3G and 4G services, 2G services are still being used by the people in many countries. In 2G (GSM), only encryption provided is between the MS and the BTS, there is no end-to-end encryption available. Sometimes we all need to send some confidential message to other person containing bank account number, some password, financial details, etc. Normally, a message is sent in plain text only to the recipient and it is not an acceptable standard for transmitting such important and confidential information. Authors propose an end-to-end encryption approach by proposing a terminal for sending/receiving a secure message. An asymmetric key exchange algorithm is used in order to transmit secret shared key securely to the recipient. The proposed approach with terminal device provides authentication, confidentiality, integrity and non-repudiation.Keywords: AES, DES, Diffie-Hellman, ECDH, A5, SMS
Procedia PDF Downloads 4151508 Islam’s Expediency; The Poison and the Antidote of Islamic Government
Authors: Mahdi Ebrahimi
Abstract:
One of the most effective factors that can empower and modernize the Islamic government according to the needs of society is the institution of expediency in Islamic governance. At the same time, not paying attention to the foundations and principles of Islamic governance may cause this factor to create the basis for corruption and totalitarianism of the rulers, which ultimately causes a gap between the people and the rulers and the emergence of whole government corruption and dictatorship. Meanwhile, there are specific principles in the doctrine of Islamic Governance that can prevent such an event from happening. Principles such as: remaining popular and pious by the Ulama, Amr Bil-Maroof Va Nahy An Al-Munkar (commanding the good and preventing the bad) by the individuals, the rule of frank criticism with loud voices and clarification and accountability in the fields that cause the corruption of those in charge. In this research, these principles are presented along with their Islamic basis. It is also stated what effect each of these cases will have on preserving Islam in the ruling system.Keywords: expediency, Islamic ruling, Islamic principles, Islam
Procedia PDF Downloads 761507 Emerging Methods as a Tool for Obtaining Subconscious Feedback in E-Commerce and Marketplace
Authors: J. Berčík, A. Mravcová, A. Rusková, P. Jurčišin, R. Virágh
Abstract:
The online world is changing every day. With this comes the emergence and development of new business models. One of them is the sale of several types of products in one place. This type of sales in the form of online marketplaces has undergone a positive development in recent years and represents a kind of alternative to brick-and-mortar shopping centres. The main philosophy is to buy several products under one roof. Examples of popular e-commerce marketplaces are Amazon, eBay, and Allegro. Their share of total e-commerce turnover is expected to even double in the coming years. The paper highlights possibilities for testing web applications and online marketplace using emerging methods like stationary eye cameras (eye tracking) and facial analysis (FaceReading).Keywords: emerging methods, consumer neuroscience, e-commerce, marketplace, user experience, user interface
Procedia PDF Downloads 711506 Identity (Mis)Representation and Ideological Struggles in Discourses on Boko Haram in Nigeria
Authors: Temitope Ogungbemi
Abstract:
Jama'atu Ahlis Sunna Lidda'awati wal-Jihad (also called Boko Haram) in the North-East of Nigeria has facilitated ideological binarity in discourses on the crisis. Since its proliferation, media representation of the crisis has facilitated identity contamination and ideological struggle through which other critical issues, such as religious intolerance, ethnic diversity and other forms of class conflict in the Nigerian state, are brought to public notice. Though Boko Haram insurgency is ideological laden, the manifestation of the inherent ideologies requires extensive scholarly attention in order deconstruct the veiled ideologies. Therefore, the thrust of this study is to critically investigate identity (mis)representation as a basis for ideological mapping in discourses on Boko Haram in Nigeria, adopting critical discourse analytical tools supported with insights from systemic functional linguistics and critical discourse analysis. The data for this study consist of articles on Boko Haram in Nigerian newspapers published in English. The data selection is purposive and aimed at responding to challenges that are inherent in Nigeria's multifaithism and multiculturalism, and their effects on the construction of narratives on Boko Haram. The study reveals that identity manipulation is a constructive device for ideological mapping, realised through labeling, agency activation, and transitivity. Identity representation in discourses on Boko Haram depicted four dichotomous binarities using exclusion, generalisation, contrasting and attribution.Keywords: identity representation, ideology, Boko Haram, newspapers
Procedia PDF Downloads 340