Search results for: general attacks
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 5497

Search results for: general attacks

4987 A Scalable Media Job Framework for an Open Source Search Engine

Authors: Pooja Mishra, Chris Pollett

Abstract:

This paper explores efficient ways to implement various media-updating features like news aggregation, video conversion, and bulk email handling. All of these jobs share the property that they are periodic in nature, and they all benefit from being handled in a distributed fashion. The data for these jobs also often comes from a social or collaborative source. We isolate the class of periodic, one round map reduce jobs as a useful setting to describe and handle media updating tasks. As such tasks are simpler than general map reduce jobs, programming them in a general map reduce platform could easily become tedious. This paper presents a MediaUpdater module of the Yioop Open Source Search Engine Web Portal designed to handle such jobs via an extension of a PHP class. We describe how to implement various media-updating tasks in our system as well as experiments carried out using these implementations on an Amazon Web Services cluster.

Keywords: distributed jobs framework, news aggregation, video conversion, email

Procedia PDF Downloads 271
4986 Molecular Dynamics Simulation of Beta-Glucosidase of Streptomyces

Authors: Adam Abate, Elham Rasti, Philip Romero

Abstract:

Beta-glucosidase is the key enzyme component present in cellulase and completes the final step during cellulose hydrolysis by converting the cellobiose to glucose. The regulatory properties of beta-glucosidases are most commonly found for the retaining and inverting enzymes. Hydrolysis of a glycoside typically occurs with general acid and general base assistance from two amino acid side chains, normally glutamic or aspartic acids. In order to obtain more detailed information on the dynamic events origination from the interaction with enzyme active site, we carried out molecular dynamics simulations of beta-glycosidase in protonated state (Glu-H178) and deprotonated state (Glu178). The theoretical models generated from our molecular dynamics simulations complement and advance the structural information currently available, leading to a more detailed understanding of Beta-glycosidase structure and function. This article presents the important role of Asn307 in enzyme activity of beta-glucosidase

Keywords: Beta-glucosidase, GROMACS, molecular dynamics simulation, structural parameters

Procedia PDF Downloads 374
4985 Software Quality Assurance in Network Security using Cryptographic Techniques

Authors: Sidra Shabbir, Ayesha Manzoor, Mehreen Sirshar

Abstract:

The use of the network communication has imposed serious threats to the security of assets over the network. Network security is getting more prone to active and passive attacks which may result in serious consequences to data integrity, confidentiality and availability. Various cryptographic techniques have been proposed in the past few years to combat with the concerned problem by ensuring quality but in order to have a fully secured network; a framework of new cryptosystem was needed. This paper discusses certain cryptographic techniques which have shown far better improvement in the network security with enhanced quality assurance. The scope of this research paper is to cover the security pitfalls in the current systems and their possible solutions based on the new cryptosystems. The development of new cryptosystem framework has paved a new way to the widespread network communications with enhanced quality in network security.

Keywords: cryptography, network security, encryption, decryption, integrity, confidentiality, security algorithms, elliptic curve cryptography

Procedia PDF Downloads 715
4984 Evaluation of Gesture-Based Password: User Behavioral Features Using Machine Learning Algorithms

Authors: Lakshmidevi Sreeramareddy, Komalpreet Kaur, Nane Pothier

Abstract:

Graphical-based passwords have existed for decades. Their major advantage is that they are easier to remember than an alphanumeric password. However, their disadvantage (especially recognition-based passwords) is the smaller password space, making them more vulnerable to brute force attacks. Graphical passwords are also highly susceptible to the shoulder-surfing effect. The gesture-based password method that we developed is a grid-free, template-free method. In this study, we evaluated the gesture-based passwords for usability and vulnerability. The results of the study are significant. We developed a gesture-based password application for data collection. Two modes of data collection were used: Creation mode and Replication mode. In creation mode (Session 1), users were asked to create six different passwords and reenter each password five times. In replication mode, users saw a password image created by some other user for a fixed duration of time. Three different duration timers, such as 5 seconds (Session 2), 10 seconds (Session 3), and 15 seconds (Session 4), were used to mimic the shoulder-surfing attack. After the timer expired, the password image was removed, and users were asked to replicate the password. There were 74, 57, 50, and 44 users participated in Session 1, Session 2, Session 3, and Session 4 respectfully. In this study, the machine learning algorithms have been applied to determine whether the person is a genuine user or an imposter based on the password entered. Five different machine learning algorithms were deployed to compare the performance in user authentication: namely, Decision Trees, Linear Discriminant Analysis, Naive Bayes Classifier, Support Vector Machines (SVMs) with Gaussian Radial Basis Kernel function, and K-Nearest Neighbor. Gesture-based password features vary from one entry to the next. It is difficult to distinguish between a creator and an intruder for authentication. For each password entered by the user, four features were extracted: password score, password length, password speed, and password size. All four features were normalized before being fed to a classifier. Three different classifiers were trained using data from all four sessions. Classifiers A, B, and C were trained and tested using data from the password creation session and the password replication with a timer of 5 seconds, 10 seconds, and 15 seconds, respectively. The classification accuracies for Classifier A using five ML algorithms are 72.5%, 71.3%, 71.9%, 74.4%, and 72.9%, respectively. The classification accuracies for Classifier B using five ML algorithms are 69.7%, 67.9%, 70.2%, 73.8%, and 71.2%, respectively. The classification accuracies for Classifier C using five ML algorithms are 68.1%, 64.9%, 68.4%, 71.5%, and 69.8%, respectively. SVMs with Gaussian Radial Basis Kernel outperform other ML algorithms for gesture-based password authentication. Results confirm that the shorter the duration of the shoulder-surfing attack, the higher the authentication accuracy. In conclusion, behavioral features extracted from the gesture-based passwords lead to less vulnerable user authentication.

Keywords: authentication, gesture-based passwords, machine learning algorithms, shoulder-surfing attacks, usability

Procedia PDF Downloads 83
4983 CybeRisk Management in Banks: An Italian Case Study

Authors: E. Cenderelli, E. Bruno, G. Iacoviello, A. Lazzini

Abstract:

The financial sector is exposed to the risk of cyber-attacks like any other industrial sector. Furthermore, the topic of CybeRisk (cyber risk) has become particularly relevant given that Information Technology (IT) attacks have increased drastically in recent years, and cannot be stopped by single organizations requiring a response at international and national level. IT risk is never a matter purely for the IT manager, although he clearly plays a key role. A bank's risk management function requires a thorough understanding of the evolving risks as well as the tools and practical techniques available to address them. Upon the request of European and national legislation regarding CybeRisk in the financial system, banks are therefore called upon to strengthen the operational model for CybeRisk management. This will require an important change with a more intense collaboration with the structures that deal with information security for the development of an ad hoc system for the evaluation and control of this type of risk. The aim of the work is to propose a framework for the management and control of CybeRisk that will bridge the gap in the literature regarding the understanding and consideration of CybeRisk as an integral part of business management. The IT function has a strong relevance in the management of CybeRisk, which is perceived mainly as operational risk, but with a positive tendency on the part of risk management to the identification of CybeRisk assessment methods that are increasingly complete, quantitative and able to better describe the possible impacts on the business. The paper provides answers to the research questions: Is it possible to define a CybeRisk governance structure able to support the comparison between risk and security? How can the relationships between IT assets be integrated into a cyberisk assessment framework to guarantee a system of protection and risks control? From a methodological point of view, this research uses a case study approach. The choice of “Monte dei Paschi di Siena” was determined by the specific features of one of Italy’s biggest lenders. It is chosen to use an intensive research strategy: an in-depth study of reality. The case study methodology is an empirical approach to explore a complex and current phenomenon that develops over time. The use of cases has also the advantage of allowing the deepening of aspects concerning the "how" and "why" of contemporary events, on which the scholar has little control. The research bases on quantitative data and qualitative information obtained through semi-structured interviews of an open-ended nature and questionnaires to directors, members of the audit committee, risk, IT and compliance managers, and those responsible for internal audit function and anti-money laundering. The added value of the paper can be seen in the development of a framework based on a mapping of IT assets from which it is possible to identify their relationships for purposes of a more effective management and control of cyber risk.

Keywords: bank, CybeRisk, information technology, risk management

Procedia PDF Downloads 224
4982 Online Learning Versus Face to Face Learning: A Sentiment Analysis on General Education Mathematics in the Modern World of University of San Carlos School of Arts and Sciences Students Using Natural Language Processing

Authors: Derek Brandon G. Yu, Clyde Vincent O. Pilapil, Christine F. Peña

Abstract:

College students of Cebu province have been indoors since March 2020, and a challenge encountered is the sudden shift from face to face to online learning and with the lack of empirical data on online learning on Higher Education Institutions (HEIs) in the Philippines. Sentiments on face to face and online learning will be collected from University of San Carlos (USC), School of Arts and Sciences (SAS) students regarding Mathematics in the Modern World (MMW), a General Education (GE) course. Natural Language Processing with machine learning algorithms will be used to classify the sentiments of the students. Results of the research study are the themes identified through topic modelling and the overall sentiments of the students in USC SAS

Keywords: natural language processing, online learning, sentiment analysis, topic modelling

Procedia PDF Downloads 218
4981 Black-Box-Base Generic Perturbation Generation Method under Salient Graphs

Authors: Dingyang Hu, Dan Liu

Abstract:

DNN (Deep Neural Network) deep learning models are widely used in classification, prediction, and other task scenarios. To address the difficulties of generic adversarial perturbation generation for deep learning models under black-box conditions, a generic adversarial ingestion generation method based on a saliency map (CJsp) is proposed to obtain salient image regions by counting the factors that influence the input features of an image on the output results. This method can be understood as a saliency map attack algorithm to obtain false classification results by reducing the weights of salient feature points. Experiments also demonstrate that this method can obtain a high success rate of migration attacks and is a batch adversarial sample generation method.

Keywords: adversarial sample, gradient, probability, black box

Procedia PDF Downloads 70
4980 Mental Disorders and Physical Illness in Geriatric Population

Authors: Vinay Kumar, M. Kishor, Sathyanarayana Rao Ts

Abstract:

Background: Growth of elderly people in the general population in recent years is termed as ‘greying of the world’ where there is a shift from high mortality & fertility to low mortality and fertility, resulting in an increased proportion of older people as seen in India. Improved health care promises longevity but socio-economic factors like poverty, joint families and poor services pose a psychological threat. Epidemiological data regarding the prevalence of mental disorders in geriatric population with physical illness is required for proper health planning. Methods: Sixty consecutive elderly patients aged 60 years or above of both sexes, reporting with physical illness to general outpatient registration counter of JSS Medical College and Hospital, Mysore, India, were considered for the Study. With informed consent, they were screened with General Health Questionnaire (GHQ-12) and were further evaluated for diagnosing mental disorders according to WHO International Classification of Diseases (ICD-10) criteria. Results: Mental disorders were detected in 48.3%, predominantly depressive disorders, nicotine dependence, generalized anxiety disorder, alcohol dependence and least was dementia. Most common physical illness was cardiovascular disease followed by metabolic, respiratory and other diseases. Depressive disorders, substance dependence and dementia were more associated with cardiovascular disease compared to metabolic disease and respiratory diseases were more associated with nicotine dependence. Conclusions: Depression and Substance use disorders among elderly population is of concern, which needs to be further studied with larger population. Psychiatric morbidity will adversely have an impact on physical illness which needs proper assessment and management. This will enhance our understanding and prioritize our planning for future.

Keywords: Geriatric, mental disorders, physical illness, psychiatry

Procedia PDF Downloads 262
4979 Democrat Support to Antiterorrism of USA from Hollywood: Homeland Series

Authors: Selman Selim Akyüz, Mete Kazaz

Abstract:

Since The First Gulf War, USA, “Leader of The Free World” has been in trouble with terror. The USA created a complexity in The Middle East and paid the price with terrorist attacks in homeland. USA has made serious mistakes in terms of antiterrorism and fight against its supporters. Democrats have repaired damages caused by the Republican Party's management. Old methods about antiterrorism have been slowly abandoned. Hollywood, too, has played an important part in this war. Sometimes, Hollywood became an unquestioned patriot, sometimes it cried for the death of American Soldiers far away. In this study, messages in The Homeland, broadcast in the USA and a lot of countries around the world, are analyzed in terms of Washington’s foreign policy and position of the CIA in the fight against antiterrorism. The series reflect an orientalist viewpoint and has been criticized for offensive policy against the government. Homeland wanted to offer a perspective for the USA to be the “Leader of The Free World” again but with a liberal-democrat approach, dialogue and rational intelligence methods.

Keywords: antiterrorism, CIA, homeland, USA

Procedia PDF Downloads 345
4978 Social Media and Student-Teacher Relationship: A Case Study Form Kashmir University

Authors: Wahid Ahmad Dar, Irshad Ahmad Najar

Abstract:

The influence of social media is percolating to every corner of our social life. It is also changing the social sphere of the classroom in particular and education in general. This paper tries to explore the ways in which social media is influencing student-teacher relationship. Differences have been found in student’s ability to draw benefits from using ICT. Besides digital divides in access and usage, there are attitudinal differences among students towards ICT aligned with traditional forms of social differences. The paper particularly focusses on how students from diverse backgrounds are using social media to interact with their teachers and how such interactions differ on the basis of social class, gender and residential background of students. A qualitative research methodology has been used for answering these questions. Open-ended questionnaire has been designed and administered to a sample of postgraduate students from University of Kashmir drawn purposively ensuring optimum number of subjects from all backgrounds. The data were analyzed by content analysis, deciphering general patterns in the data.

Keywords: social media, student-teacher relationship, social class, gender

Procedia PDF Downloads 221
4977 Design and Optimization Fire Alarm System to Protect Gas Condensate Reservoirs With the Use of Nano-Technology

Authors: Hefzollah Mohammadian, Ensieh Hajeb, Mohamad Baqer Heidari

Abstract:

In this paper, for the protection and safety of tanks gases (flammable materials) and also due to the considerable economic value of the reservoir, the new system for the protection, the conservation and fire fighting has been cloned. The system consists of several parts: the Sensors to detect heat and fire with Nanotechnology (nano sensor), Barrier for isolation and protection from a range of two electronic zones, analyzer for detection and locating point of fire accurately, Main electronic board to announce fire, Fault diagnosis in different locations, such as relevant alarms and activate different devices for fire distinguish and announcement. An important feature of this system, high speed and capability of fire detection system in a way that is able to detect the value of the ambient temperature that can be adjusted. Another advantage of this system is autonomous and does not require human operator in place. Using nanotechnology, in addition to speeding up the work, reduces the cost of construction of the sensor and also the notification system and fire extinguish.

Keywords: analyser, barrier, heat resistance, general fault, general alarm, nano sensor

Procedia PDF Downloads 434
4976 Detection of New Attacks on Ubiquitous Services in Cloud Computing and Countermeasures

Authors: L. Sellami, D. Idoughi, P. F. Tiako

Abstract:

Cloud computing provides infrastructure to the enterprise through the Internet allowing access to cloud services at anytime and anywhere. This pervasive aspect of the services, the distributed nature of data and the wide use of information make cloud computing vulnerable to intrusions that violate the security of the cloud. This requires the use of security mechanisms to detect malicious behavior in network communications and hosts such as intrusion detection systems (IDS). In this article, we focus on the detection of intrusion into the cloud sing IDSs. We base ourselves on client authentication in the computing cloud. This technique allows to detect the abnormal use of ubiquitous service and prevents the intrusion of cloud computing. This is an approach based on client authentication data. Our IDS provides intrusion detection inside and outside cloud computing network. It is a double protection approach: The security user node and the global security cloud computing.

Keywords: cloud computing, intrusion detection system, privacy, trust

Procedia PDF Downloads 291
4975 Hierarchical Piecewise Linear Representation of Time Series Data

Authors: Vineetha Bettaiah, Heggere S. Ranganath

Abstract:

This paper presents a Hierarchical Piecewise Linear Approximation (HPLA) for the representation of time series data in which the time series is treated as a curve in the time-amplitude image space. The curve is partitioned into segments by choosing perceptually important points as break points. Each segment between adjacent break points is recursively partitioned into two segments at the best point or midpoint until the error between the approximating line and the original curve becomes less than a pre-specified threshold. The HPLA representation achieves dimensionality reduction while preserving prominent local features and general shape of time series. The representation permits course-fine processing at different levels of details, allows flexible definition of similarity based on mathematical measures or general time series shape, and supports time series data mining operations including query by content, clustering and classification based on whole or subsequence similarity.

Keywords: data mining, dimensionality reduction, piecewise linear representation, time series representation

Procedia PDF Downloads 256
4974 Factors Influencing the General Public Intention to Be Vaccinated: A Case of Botswana

Authors: Meng Qing Feng, Otsile Morake

Abstract:

Background: Successful implementation of the COVID-19 vaccination ensures the prevention of virus infection. Postponement and refusal of the vaccination will threaten public health, which is now common among the general public across the world. In addition, an acceptance of the COVID-19 vaccine appears as a decisive factor in controlling the COVID-19 pandemic. Purpose: This study's objective is to explore the factors influencing the public intention to be vaccinated (ITBV). Design/methodology/approach: The web-based survey included socio-demographics and questions related to the theory of planned behavior (TPB) and the health belief model (HBM). An online survey was administered using Google Form to collect data from participants of Botswana. The sample included 339 participants, half-half of the participants were female. Data analysis was run using the Statistical Package for the Social Sciences (SPSS). Findings: The study results highlight that perceived severity, perceived barriers, health motivation, and attitude have a positive and significant effect on ITBV, while perceived susceptibility, benefits, subjective norms, and perceived behavior control do not affect ITBV. Among all of the predictors, perceived barriers have the most significant influence on ITBV. Conclusion: Theoretically, this research stated that both HBM and TPB are effective in predicting and explaining the general public ITBV. Practically, this study offers insights to the government and health departments to arrange and launch health awareness programs and provide a better guide to vaccination so that doubts about vaccine confidence and the level of uncertainty can be decreased.

Keywords: COVID-19, Omicron, intention to be COVID-19 vaccine, health behavior model, theory of planned behavior, Botswana

Procedia PDF Downloads 75
4973 Relationship Between Expectation (Before) and Satisfaction (After) Receiving Services of Thai Consumers from Domestic Low-Cost Airlines

Authors: Sittichai Charoensettasilp, Chong Wu

Abstract:

This study employs sampling of 400 Thai people who live in Bangkok and have used air transportation to travel. A random convenience sampling technique is used to collect data. The results found that at 0.05 significance level the differences of means of Thai consumers’ expectations (before) and satisfaction (after) receiving services in the service marketing mix, the results of all aspects are different both in general and for each aspect of the service marketing mix. Average levels of expectations before receiving services are higher than satisfaction after receiving services in all aspects, as well. When analyzing further to the correlation between average means, the means of expectations before receiving services are higher than those of satisfaction after receiving services in general. As in all aspects of the service marketing mix, any aspect that has a big difference between expectations before receiving services and satisfaction after receiving services has low correlation.

Keywords: domestic low-cost airlines, Thai consumers, relationship, expectation before receiving services, satisfaction after receiving services

Procedia PDF Downloads 386
4972 Educational Disparities with Respect to Achievement Motivation and Socio-Economic Status: A Comparative Study Based on Caste

Authors: Santoshi Halder, Ranjini Ghosh

Abstract:

Research on educational stratification suggests that inequality in education between different social strata continues and sometimes even widens in spite of educational growth. The backward classes are the most suppressed classes in society. In India, the Scheduled Castes are found as one of the backward classes. After independence there a lot of provisions were made for their uplift. Still they are facing a lot of problems in perusing education, getting jobs, choosing life style independently etc. The present study was conducted to explore the educational disparities in education with respect to caste. Sample consisted of 1020 students (540 scheduled caste and 540 general caste) from three different universities of West Bengal. Tools selected were General Information Schedule (GIS), socioeconomic status (SES), Achievement motivation scale. Findings indicated significant differences for the selected variables under the study with respect to caste. Findings have significant implication for the advocates, policy makers and educationists and sociologists for appropriate intervention.

Keywords: scheduled caste, educational barriers, achievement motivation, socioeconomic status

Procedia PDF Downloads 398
4971 Organizational Change in the FBI after 9/11: An Institutional Theoretical Analysis

Authors: Ben D. Atkins

Abstract:

This study will examine the impact of September 11, 2001, terrorist attacks on the organizational development of American federal law enforcement through focusing on the Federal Bureau of Investigation. Content analysis of discourse in a federal law enforcement practitioner publication along with official FBI statements will be used to gain a better understanding of FBI organizational changes that have taken place since the events of September 11, 2001. Analysis of content trends in the FBI Law Enforcement Bulletin and public discourse of FBI officials from 1999 to 2005 indicate that, in addition to structural changes, the bureau has also undergone a variety of cultural changes. The results offer some support for the institutional theoretical perspective, suggesting that post-9/11 organizational changes such as new mission priorities and the establishment of new branches were partially initiated due to a variety external pressures, which lends support for coercive isomorphism. Furthermore, structural changes are discussed in relation to the attainment and maintenance of organizational legitimacy.

Keywords: institutional theory, organizational theory, law enforcement, public administration

Procedia PDF Downloads 217
4970 Partners Sharing Resources, Costs, and Risks

Authors: Lee Li

Abstract:

The strategic management literature posits that the major motive of strategic alliances is to share resources, costs and risks. However, the literature also indicates that such sharing leads to transaction costs which are positively correlated with environmental dynamism. As such, it is not clear why firms are willing to cover high transaction costs for sharing resources, costs and risks. This study categorizes resources into firm-specific and general resource; costs into accounting and non-accounting cost; and risks into visible and invisible risks. Using data from 167 Canadian firms in technology industries, we find that sharing firm-specific resources and non-accounting costs are negatively correlated with environmental dynamism but sharing general resources, accounting costs and visible risks are positively correlated with environmental dynamism. Findings suggest that sharing certain resources, costs and risks do not necessarily incur high transaction costs.

Keywords: environmental dynamism, strategic alliances, resource/cost/risk sharing

Procedia PDF Downloads 343
4969 Chaotic Semiflows with General Acting Topological Monoids

Authors: Alica Miller

Abstract:

A semiflow is a triple consisting of a Hausdorff topological space $X$, a commutative topological monoid $T$ and a continuous monoid action of $T$ on $X$. The acting monoid $T$ is usually either the discrete monoid $\N_0$ of nonnegative integers (in which case the semiflow can be defined as a pair $(X,f)$ consisting of a phase space $X$ and a continuous function $f:X\to X$), or the monoid $\R_+$ of nonnegative real numbers (the so-called one-parameter monoid). However, it turns out that there are real-life situations where it is useful to consider the acting monoids that are a combination of discrete and continuous monoids. That, for example, happens, when we are observing certain dynamical system at discrete moments, but after some time realize that it would be beneficial to continue our observations in real time. The acting monoid in that case would be $T=\{0, t_0, 2t_0, \dots, (n-1)t_0\} \cup [nt_0,\infty)$ with the operation and topology induced from real numbers. This partly explains the motivation for the level of generality which is pursued in our research. We introduce the PSP monoids, which include all but ``pathological'' monoids, and most of our statements hold for them. The topic of our presentation are some recent results about chaos-related properties in semiflows, indecomposability and sensitivity of semiflows in the described general context.

Keywords: chaos, indecomposability, PSP monoids, semiflow, sensitivity

Procedia PDF Downloads 266
4968 Perspectives of Computational Modeling in Sanskrit Lexicons

Authors: Baldev Ram Khandoliyan, Ram Kishor

Abstract:

India has a classical tradition of Sanskrit Lexicons. Research work has been done on the study of Indian lexicography. India has seen amazing strides in Information and Communication Technology (ICT) applications for Indian languages in general and for Sanskrit in particular. Since Machine Translation from Sanskrit to other Indian languages is often the desired goal, traditional Sanskrit lexicography has attracted a lot of attention from the ICT and Computational Linguistics community. From Nighaŋţu and Nirukta to Amarakośa and Medinīkośa, Sanskrit owns a rich history of lexicography. As these kośas do not follow the same typology or standard in the selection and arrangement of the words and the information related to them, several types of Kośa-styles have emerged in this tradition. The model of a grammar given by Aṣṭādhyāyī is well appreciated by Indian and western linguists and grammarians. But the different models provided by lexicographic tradition also have importance. The general usefulness of Sanskrit traditional Kośas is well discussed by some scholars. That is most of the matter made available in the text. Some also have discussed the good arrangement of lexica. This paper aims to discuss some more use of the different models of Sanskrit lexicography especially focusing on its computational modeling and its use in different computational operations.

Keywords: computational lexicography, Sanskrit Lexicons, nighanṭu, kośa, Amarkosa

Procedia PDF Downloads 143
4967 Activism: An Experiential Sharing of Impacts on Businesses and Ways to Engage Activists

Authors: Lee Kar Heng

Abstract:

Activists are people who use strong actions such as public protests or social media accusations in support of or opposition to controversial issues. While activism is the act of using such vigorous campaigns and actions to achieve political or social changes by the activists, today, the pressure and stresses from activism do not only grow in terms of civil rights but also in racial justice, labour reforms, and environmental change, to name a few. Some activism acts are constructive, but many are destructive, and they affect businesses as activists direct their sights on corporations, business entities, and organizations to achieve their supporting objectives beyond reasonable means. The paper attempts to share experiences of businesses being attacked by activists and how the attacks are mitigated. In sharing, this paper will discuss the effectiveness of the activist action and ways to react to them. The positive and negative impacts caused by activists' support action against corporations are also discussed.

Keywords: activism, conflicts, business, social responsibility

Procedia PDF Downloads 54
4966 Investment Trend Analysis of Dhaka Stock Exchange: A Comparative Study

Authors: Azaz Zaman, Mirazur Rahman

Abstract:

Capital market is a crucial financial market place where companies and the government can raise long-term funds and, at the same time, investors get the opportunity to invest in the listed companies. Capital markets play a vital role not only in shifting the funds from surplus entity to deficit for investment, but also in the overall economic development of any developing country like Bangladesh. Being the first and biggest capital market of Bangladesh, Dhaka Stock Exchange (DSE) is the prime bourse of the country. The differences in the investment preference— among three broad categories of investors in DSE including individual investors, institutional investors, and government— are easily observed. Authors of this article have used five categories of investors such as sponsors or directors of the company, institutional investors, foreign investors, government, and the general public in order to present a comparative analysis of their investment patterns. Obtaining data on the percentage of investment by these five types of investors in different sectors from the DSE website, this study aims to analyze the sector-wise investment preference of these investors using August 2018 data. The study has found that the sponsors or directors of the company have the highest percentage of investment in the textile industry which is close to 16%. The Bangladesh government, as an investor, has the highest percentage of investment in the fuel & power sector, approximately 32%. It has also found that the mutual funds' sector is mostly financed by institutional investors, nearly 28%. Foreign investors have their most investments in the banking sector, which is close to 22%. It has also revealed that the textile sector is mostly financed by the general public, close to 17%. Nevertheless, general public, surprisingly, has the lowest percentage of investment in the telecommunication sector, which is 0.10%.

Keywords: stock market investment, Dhaka stock exchange, capital market, Bangladesh

Procedia PDF Downloads 98
4965 LuMee: A Centralized Smart Protector for School Children who are Using Online Education

Authors: Lumindu Dilumka, Ranaweera I. D., Sudusinghe S. P., Sanduni Kanchana A. M. K.

Abstract:

This study was motivated by the challenges experienced by parents and guardians in ensuring the safety of children in cyberspace. In the last two or three years, online education has become very popular all over the world due to the Covid 19 pandemic. Therefore, parents, guardians and teachers must ensure the safety of children in cyberspace. Children are more likely to go astray and there are plenty of online programs are waiting to get them on the wrong track and also, children who are engaging in the online education can be distracted at any moment. Therefore, parents should keep a close check on their children's online activity. Apart from that, due to the unawareness of children, they tempt to share their sensitive information, causing a chance of being a victim of phishing attacks from outsiders. These problems can be overcome through the proposed web-based system. We use feature extraction, web tracking and analysis mechanisms, image processing and name entity recognition to implement this web-based system.

Keywords: online education, cyber bullying, social media, face recognition, web tracker, privacy data

Procedia PDF Downloads 60
4964 Addictive Use Due to Personality: Focused on Big Five Personality Traits and Game Addiction

Authors: Eui Jun Jeong, Hye Rim Lee, Ji Hye Yoo

Abstract:

Recent studies have verified the significant relationship of user personality with Internet use. However, in game studies, little research has emphasized on the effects of personality traits on game addiction. This study examined whether big five personality traits affect game addiction with control of psychological, social, and demographic factors. Specifically, using data from a survey of 789 game users in Korea, we conducted a regression analysis to see the associations of psychological (loneliness/depression), social (activities with family/friends), self-efficacy (game/general), gaming (daily gaming time/perception), demographic (age/gender), and personality traits (extraversion, neuroticism conscientiousness, agreeableness, & openness) with the degree of game addiction. Results showed that neuroticism increase game addiction with no effect of extraversion on the addiction. General self-efficacy negatively affected game addiction, whereas game self-efficacy increased the degree of game addiction. Loneliness enhanced game addiction while depression showed a negative effect on the addiction. Results and implications are discussed.

Keywords: game addiction, big five personality, social activities, self-efficacy, loneliness, depression

Procedia PDF Downloads 549
4963 Task Based Language Learning: A Paradigm Shift in ESL/EFL Teaching and Learning: A Case Study Based Approach

Authors: Zehra Sultan

Abstract:

The study is based on the task-based language teaching approach which is found to be very effective in the EFL/ESL classroom. This approach engages learners to acquire the usage of authentic language skills by interacting with the real world through sequence of pedagogical tasks. The use of technology enhances the effectiveness of this approach. This study throws light on the historical background of TBLT and its efficacy in the EFL/ESL classroom. In addition, this study precisely talks about the implementation of this approach in the General Foundation Programme of Muscat College, Oman. It furnishes the list of the pedagogical tasks embedded in the language curriculum of General Foundation Programme (GFP) which are skillfully allied to the College Graduate Attributes. Moreover, the study also discusses the challenges pertaining to this approach from the point of view of teachers, students, and its classroom application. Additionally, the operational success of this methodology is gauged through formative assessments of the GFP, which is apparent in the students’ progress.

Keywords: task-based language teaching, authentic language, communicative approach, real world activities, ESL/EFL activities

Procedia PDF Downloads 104
4962 The Grand Unified Theory of Bidirectional Spacetime with Spatial Covariance and Wave-Particle Duality in Spacetime Flow Model

Authors: Tory Erickson

Abstract:

The "Bidirectional Spacetime with Spatial Covariance and Wave-Particle Duality in Spacetime Flow" (BST-SCWPDF) Model introduces a framework aimed at unifying general relativity (GR) and quantum mechanics (QM). By proposing a concept of bidirectional spacetime, this model suggests that time can flow in more than one direction, thus offering a perspective on temporal dynamics. Integrated with spatial covariance and wave-particle duality in spacetime flow, the BST-SCWPDF Model resolves long-standing discrepancies between GR and QM. This unified theory has profound implications for quantum gravity, potentially offering insights into quantum entanglement, the collapse of the wave function, and the fabric of spacetime itself. The Bidirectional Spacetime with Spatial Covariance and Wave-Particle Duality in Spacetime Flow" (BST-SCWPDF) Model offers researchers a framework for a better understanding of theoretical physics.

Keywords: astrophysics, quantum mechanics, general relativity, unification theory, theoretical physics

Procedia PDF Downloads 59
4961 General Awareness of Teenagers in Information Security

Authors: Magdaléna Náplavová, Tomáš Ludík, Petr Hrůza, František Božek

Abstract:

The use of IT equipment has become a part of every day. However, each device that is part of cyberspace should be secured against unauthorized use. It is very important to know the basics of these security devices, but also the basics of safe conduct their owners. This information should be part of every curriculum computer science education in primary and secondary schools. Therefore, the work focuses on the education of pupils in primary and secondary schools on the Internet. Analysis of the current state describes approaches to the education of pupils in security issues on the Internet. The paper presents a questionnaire-based survey which was carried out in the Czech Republic, whose task was to ascertain the level of opinion pupils in primary and secondary schools on the issue of communication in social networks. The research showed that awareness of socio-pathological phenomena on the Internet environment is very low. Based on the results it was proposed appropriate ways of teaching to this issue and its inclusion a proposal of curriculum for primary and secondary schools.

Keywords: information security, cyber space, general awareness, questionnaire, socio-pathological phenomena, educational system

Procedia PDF Downloads 367
4960 Robust and Transparent Spread Spectrum Audio Watermarking

Authors: Ali Akbar Attari, Ali Asghar Beheshti Shirazi

Abstract:

In this paper, we propose a blind and robust audio watermarking scheme based on spread spectrum in Discrete Wavelet Transform (DWT) domain. Watermarks are embedded in the low-frequency coefficients, which is less audible. The key idea is dividing the audio signal into small frames, and magnitude of the 6th level of DWT approximation coefficients is modifying based upon the Direct Sequence Spread Spectrum (DSSS) technique. Also, the psychoacoustic model for enhancing in imperceptibility, as well as Savitsky-Golay filter for increasing accuracy in extraction, is used. The experimental results illustrate high robustness against most common attacks, i.e. Gaussian noise addition, Low pass filter, Resampling, Requantizing, MP3 compression, without significant perceptual distortion (ODG is higher than -1). The proposed scheme has about 83 bps data payload.

Keywords: audio watermarking, spread spectrum, discrete wavelet transform, psychoacoustic, Savitsky-Golay filter

Procedia PDF Downloads 179
4959 Secure Authentication Scheme Based on Numerical Series Cryptography for Internet of Things

Authors: Maha Aladdin, Khaled Nagaty, Abeer Hamdy

Abstract:

The rapid advancement cellular networks and wireless networks have laid a solid basis for the Internet of Things. IoT has evolved into a unique standard that allows diverse physical devices to collaborate with one another. A service provider gives a variety of services that may be accessed via smart apps anywhere, at any time, and from any location over the Internet. Because of the public environment of mobile communication and the Internet, these services are highly vulnerable to a several malicious attacks, such as unauthorized disclosure by hostile attackers. As a result, the best option for overcoming these vulnerabilities is a strong authentication method. In this paper, a lightweight authentication scheme that is based on numerical series cryptography is proposed for the IoT environments. It allows mutual authentication between IoT devices Parametric study and formal proofs are utilized to illustrate that the pro-posed approach is resistant to a variety of security threats.

Keywords: internet of things, authentication, cryptography, security protocol

Procedia PDF Downloads 90
4958 Attitudes of the Adolescent Students towards People with Disabilities and Demographic Variables: An Indian Context

Authors: Santoshi Halder, Bijoya Saha

Abstract:

Adolescent’s attitude is one of the most important variables in the inclusion of people with disabilities. This article investigated attitudes of general adolescent in the eastern part of India (Kolkata), India, towards people with disabilities measured by responses on the Attitude toward Disabled Persons Scale. The present study examined 400, High School adolescent students of Mean Age 14 from various schools in and around Kolkata, West Bengal. The study measured whether demographic characteristics such as gender, socioeconomic status (SES) habitat affect the attitudes of adolescent students towards people with disabilities. The results of this study indicate that habitat and socioeconomic status are some of the significant factors affecting the attitudes of the general adolescent students towards people with disabilities (PwD). However findings also indicate no significant effect on the attitude of the students towards people with disabilities (PwD) with respect to gender. Implication of this study: Broader and wide range of exposure to students and healthy family environment in order to increase positive attitudes towards people with disabilities.

Keywords: attitudes, People with Disabilities (PwD), adolescent students, socioeconomic status, gender, habitat, inclusion

Procedia PDF Downloads 401