Search results for: broadcast messages
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 453

Search results for: broadcast messages

423 Graffiti as Intelligence: an Analysis of Encoded Messages in Gang Graffiti Renderings

Authors: Timothy Kephart

Abstract:

Many law enforcement officials believe that gangs communicate messages to both the community and to rival gangs through graffiti. Some social scientists have documented this as well, however no recent research has examined gang graffiti for its underlying meaning. Empirical research on gang graffiti and gang communication through graffiti is limited. This research can be described as an exploratory effort to better understand how, and perhaps why, gangs employ this medium for communication. Furthermore this research showcases how law enforcement agencies can utilize this hidden form of communication to better direct resources and impact gang violence.

Keywords: gangs, graffiti, juvenile justice, policing

Procedia PDF Downloads 415
422 Modified InVEST for Whatsapp Messages Forensic Triage and Search through Visualization

Authors: Agria Rhamdhan

Abstract:

WhatsApp as the most popular mobile messaging app has been used as evidence in many criminal cases. As the use of mobile messages generates large amounts of data, forensic investigation faces the challenge of large data problems. The hardest part of finding this important evidence is because current practice utilizes tools and technique that require manual analysis to check all messages. That way, analyze large sets of mobile messaging data will take a lot of time and effort. Our work offers methodologies based on forensic triage to reduce large data to manageable sets resulting easier to do detailed reviews, then show the results through interactive visualization to show important term, entities and relationship through intelligent ranking using Term Frequency-Inverse Document Frequency (TF-IDF) and Latent Dirichlet Allocation (LDA) Model. By implementing this methodology, investigators can improve investigation processing time and result's accuracy.

Keywords: forensics, triage, visualization, WhatsApp

Procedia PDF Downloads 142
421 Exchanging Messages in Ancient Greek Tragedy: The Use of δέλτος in the Euripidean and Sophoclean Stage

Authors: Maria-Agori Gravvani

Abstract:

The part of communication holds a significant place in human life. From the early beginning of human history, humans tried to communicate orally with other people in order to survive and to communicate their needs. The level of education that the majority of the Athenean citizens had the opportunity to acquire in the Classic period was very low. Only the wealthy ones had the opportunity of the upper form of education that led them to a career in politics, while the other ones struggled for their daily survival. In the corpus of Euripides' and Sophocles' tragedies, the type of communication is written, too. Not only in the Iphigenia's tragedies of Euripides but also in the Sophocles' Trachiniae, the use of δέλτος bonds significant messages with people. Those written means of private communication play an important role in the plot of the tragedy and have hidden private messages from their owners. The main aim of this paper is to analyze the power of the deltos' written text in the tragedies of Euripides Ifigenia Taurica and Ifigenia Aulidensis and Sophocles' Trachiniae.

Keywords: deltos, ancient greek tragedy, sophocles, euripides

Procedia PDF Downloads 29
420 Cluster Based Ant Colony Routing Algorithm for Mobile Ad-Hoc Networks

Authors: Alaa Eddien Abdallah, Bajes Yousef Alskarnah

Abstract:

Ant colony based routing algorithms are known to grantee the packet delivery, but they su ffer from the huge overhead of control messages which are needed to discover the route. In this paper we utilize the network nodes positions to group the nodes in connected clusters. We use clusters-heads only on forwarding the route discovery control messages. Our simulations proved that the new algorithm has decreased the overhead dramatically without affecting the delivery rate.

Keywords: ad-hoc network, MANET, ant colony routing, position based routing

Procedia PDF Downloads 398
419 Evidence-Based Investigation of the Phonology of Nigerian Instant Messaging

Authors: Emmanuel Uba, Lily Chimuanya, Maryam Tar

Abstract:

Orthographic engineering is no longer the preserve of the Short Messaging Service (SMS), which is characterised by limited space. Such stylistic creativity or deviation is fast creeping into real-time messaging, popularly known as Instant Messaging (IM), despite the large number of characters allowed. This occurs at various linguistic levels: phonology, morphology, syntax, etc. Nigerians are not immune to this linguistic stylisation. This study investigates the phonological and meta-phonological conventions of the messages sent and received via WhatsApp by Nigerian graduates. This is ontological study of 250 instant messages collected from 98 graduates from different ethnic groups in Nigeria. The selection and analysis of the messages are based on figure and ground principle. The results reveal the use of accent stylisation, phoneme substitution, blending, consonantisation (a specialised form of deletion targeting vowels), numerophony (using a figure/number, usually 1-10, to represent a word or syllable that has the same sound) and phonetic respelling in the IMs sent by Nigerians. The study confirms the existence of linguistic creativity.

Keywords: figure and ground principle, instant messaging, linguistic stylisation, meta-phonology

Procedia PDF Downloads 363
418 Emotions and Message Sharing on the Chinese Microblog

Authors: Yungeng Xie, Cong Liu, Yi Liu, Xuanao Wan

Abstract:

The study aims to explore microblog users’ emotion expression and sharing behaviors on the Chinese microblog (Weibo). The first theme of study analyzed whether microblog emotions impact readers’ message sharing behaviors, specifically, how the strength of emotion (positive and negative) in microblog messages facilitate/inhibit readers’ sharing behaviors. The second theme compared the differences among the three types of microblog users (i.e., verified enterprise users, verified individual users and unverified users) in terms of their profiles and microblog behaviors. A total of 7114 microblog messages about 24 hot public events in China were sampled from Sina Weibo. The first study results show that strength of negative emotions that microblog messages carry significantly increase the possibility of the message being shared. The second study results indicate that there are significant differences across the three types of users in terms of their emotion expression and its influence on microblog behaviors.

Keywords: emotion expression, information diffusion, microblog, sharing

Procedia PDF Downloads 215
417 Co-produced Databank of Tailored Messages to Support Enagagement to Digitial Health Interventions

Authors: Menna Brown, Tania Domun

Abstract:

Digital health interventions are effective across a wide array of health conditions spanning physical health, lifestyle behaviour change, and mental health and wellbeing; furthermore, they are rapidly increasing in volume within both the academic literature and society as commercial apps continue to proliferate the digital health market. However, adherence and engagement to digital health interventions remains problematic. Technology-based personalised and tailored reminder strategies can support engagement to digital health interventions. Interventions which support individuals’ mental health and wellbeing are of critical importance in the wake if the COVID-19 pandemic. Student and young person’s mental health has been negatively affected and digital resources continue to offer cost effective means to address wellbeing at a population level. Develop a databank of digital co-produced tailored messages to support engagement to a range of digital health interventions including those focused on mental health and wellbeing, and lifestyle behaviour change. Qualitative research design. Participants discussed their views of health and wellbeing, engagement and adherence to digital health interventions focused around a 12-week wellbeing intervention via a series of focus group discussions. They worked together to co-create content following a participatory design approach. Three focus group discussions were facilitated with (n=15) undergraduate students at one Welsh university to provide an empirically derived, co-produced, databank of (n=145) tailored messages. Messages were explored and categorised thematically, and the following ten themes emerged: Autonomy, Recognition, Guidance, Community, Acceptance, Responsibility, Encouragement, Compassion, Impact and Ease. The findings provide empirically derived, co-produced tailored messages. These have been made available for use, via ‘ACTivate your wellbeing’ a digital, automated, 12-week health and wellbeing intervention programme, based on acceptance and commitment therapy (ACT). The purpose of which is to support future research to evaluate the impact of thematically categorised tailored messages on engagement and adherence to digital health interventions.

Keywords: digital health, engagement, wellbeing, participatory design, positive psychology, co-production

Procedia PDF Downloads 99
416 Understanding the Selectional Preferences of the Twitter Mentions Network

Authors: R. Sudhesh Solomon, P. Y. K. L. Srinivas, Abhay Narayan, Amitava Das

Abstract:

Users in social networks either unicast or broadcast their messages. At mention is the popular way of unicasting for Twitter whereas general tweeting could be considered as broadcasting method. Understanding the information flow and dynamics within a Social Network and modeling the same is a promising and an open research area called Information Diffusion. This paper seeks an answer to a fundamental question - understanding if the at-mention network or the unicasting pattern in social media is purely random in nature or is there any user specific selectional preference? To answer the question we present an empirical analysis to understand the sociological aspects of Twitter mentions network within a social network community. To understand the sociological behavior we analyze the values (Schwartz model: Achievement, Benevolence, Conformity, Hedonism, Power, Security, Self-Direction, Stimulation, Traditional and Universalism) of all the users. Empirical results suggest that values traits are indeed salient cue to understand how the mention-based communication network functions. For example, we notice that individuals possessing similar values unicast among themselves more often than with other value type people. We also observe that traditional and self-directed people do not maintain very close relationship in the network with the people of different values traits.

Keywords: information diffusion, personality and values, social network analysis, twitter mentions network

Procedia PDF Downloads 350
415 The Inhibition of Sexual Pleasure and Its Associations with Cultural Messages

Authors: Fabiola Trejo Perez, Rolando Diaz Loving

Abstract:

Sexual pleasure consists of the positively valued feelings induced by sexual stimuli, but it is also weighed down by pop-psychological baggage, and subjected to cross-cultural and cross-historical variation. Social and individual interpretations of what can or can’t be considered as pleasurable are intertwined with culture’s predominant values, norms and beliefs. For each culture, sexual norms work as a guide to be followed in order to model socially accepted behaviors. Therefore, cultural messages regarding sexuality are usually directed to restrict men and women from enjoyment, sexual satisfaction and specifically orgasm. Given that sexual pleasure hasn’t been recognized as an accepted topic of open discussion, particularly for women, people have to eventually complement their knowledge using their own experience filling in the blanks from what little has been said. Thus, this research aims to identify which are the particular social messages associated with the easing or inhibition of sexual pleasure. Three hundred Mexican men and women ages 25 to 35 years old answered a self-report survey composed by the Inventory of facilitators and inhibitors of sexual pleasure and the Sexual premises questionnaire via pencil-paper and online. Results show a high endorsement to double standard messages associated with higher levels of sexual pleasure inhibitors like feeling pressured to have sexual activity, guilt and inability to reach orgasm, in contrast with people who endorse more permissive norms and beliefs, feeling connected to their sexual partners and confident with themselves. These results illustrate that the shaping of sexuality, from experience to society, is comprised of an important relationship between culture and sexual pleasure.

Keywords: culture, sexual double standard, sexual norms and beliefs, sexual pleasure

Procedia PDF Downloads 202
414 Wireless Communication in Sunlight

Authors: Karmveer Sheoran

Abstract:

To make wireless communication a vast success is to use sunlight for wireless communication. We can use sunlight in upper atmosphere to encode messages to efficiently use sunlight. This use of sunlight for wireless communication will need encoders which will encode sunlight according to our message and then resultant will be spread in all atmospheres wherever sunlight goes, it will take our messages with it. With minimum requirement of cost in equipment used at the edge of atmosphere is where sunlight is being encoded. In this way a very high efficient wireless communication system can be designed. On receiver side we will need light detectors which will detect sunlight variations and will finally give the information contained i it. Sunlight can be encoded at a very high speed that nobody will be annoyed by flickering. It will be most sophisticated and efficient wireless communication ever designed. There are far more possibilities in this sunlight communication. Let us call it “Sunlight Communication".

Keywords: sunlight communication, emerging trends, wireless communication, wifi

Procedia PDF Downloads 376
413 Social Media Mining with R. Twitter Analyses

Authors: Diana Codat

Abstract:

Tweets' analysis is part of text mining. Each document is a written text. It's possible to apply the usual text search techniques, in particular by switching to the bag-of-words representation. But the tweets induce peculiarities. Some may enrich the analysis. Thus, their length is calibrated (at least as far as public messages are concerned), special characters make it possible to identify authors (@) and themes (#), the tweet and retweet mechanisms make it possible to follow the diffusion of the information. Conversely, other characteristics may disrupt the analyzes. Because space is limited, authors often use abbreviations, emoticons to express feelings, and they do not pay much attention to spelling. All this creates noise that can complicate the task. The tweets carry a lot of potentially interesting information. Their exploitation is one of the main axes of the analysis of the social networks. We show how to access Twitter-related messages. We will initiate a study of the properties of the tweets, and we will follow up on the exploitation of the content of the messages. We will work under R with the package 'twitteR'. The study of tweets is a strong focus of analysis of social networks because Twitter has become an important vector of communication. This example shows that it is easy to initiate an analysis from data extracted directly online. The data preparation phase is of great importance.

Keywords: data mining, language R, social networks, Twitter

Procedia PDF Downloads 155
412 Charting Sentiments with Naive Bayes and Logistic Regression

Authors: Jummalla Aashrith, N. L. Shiva Sai, K. Bhavya Sri

Abstract:

The swift progress of web technology has not only amassed a vast reservoir of internet data but also triggered a substantial surge in data generation. The internet has metamorphosed into one of the dynamic hubs for online education, idea dissemination, as well as opinion-sharing. Notably, the widely utilized social networking platform Twitter is experiencing considerable expansion, providing users with the ability to share viewpoints, participate in discussions spanning diverse communities, and broadcast messages on a global scale. The upswing in online engagement has sparked a significant curiosity in subjective analysis, particularly when it comes to Twitter data. This research is committed to delving into sentiment analysis, focusing specifically on the realm of Twitter. It aims to offer valuable insights into deciphering information within tweets, where opinions manifest in a highly unstructured and diverse manner, spanning a spectrum from positivity to negativity, occasionally punctuated by neutrality expressions. Within this document, we offer a comprehensive exploration and comparative assessment of modern approaches to opinion mining. Employing a range of machine learning algorithms such as Naive Bayes and Logistic Regression, our investigation plunges into the domain of Twitter data streams. We delve into overarching challenges and applications inherent in the realm of subjectivity analysis over Twitter.

Keywords: machine learning, sentiment analysis, visualisation, python

Procedia PDF Downloads 28
411 Survival Struggle: To Be a Female Competitor in Survivor

Authors: Gülbuğ Erol, Gamze Beyge, Hakan Ekemen

Abstract:

In Turkey national TV channels broadcast a wide range of programs to audience attract viewers. Since the year 2000, especially the competition programs were directed towards entertainment and audience has gained. Even today, television channels have just begun to be broadcast on entertainment channels. Except from the news, the TV collects pleasure with its broadcasts aiming to meet the expectation of the Turkish people of TV 8 TV channels. Survivor, one of the TV 8 programs, draws attention with the ratings it receives and the broad target audience it addresses. Survivor, however, is one of the most exciting competitions on the Turkish television scene, which is rightly and ambitiously competitive in television contest programs. It is a format in which women and men struggle their power borders by winning the competition with their names thanks to their intelligence and endurance games. The contestants of the program, which has been running since March 22, 2005, are seen in a platform where they must present their struggle for their various awards. In Survivor, where competition is at stake, courage and strength are reduced by the reduction of sex. In this study, the critical discourse was made taking into consideration the challenges of female competitors competing to the final stage which is behind the male competitors. Secondly, the variables from the beginning to the present day of the adaptation of the judge to Turkey have been debated in a critical context.

Keywords: television, meaning, discourse, contest program

Procedia PDF Downloads 200
410 A Location-based Authentication and Key Management Scheme for Border Surveillance Wireless Sensor Networks

Authors: Walid Abdallah, Noureddine Boudriga

Abstract:

Wireless sensor networks have shown their effectiveness in the deployment of many critical applications especially in the military domain. Border surveillance is one of these applications where a set of wireless sensors are deployed along a country border line to detect illegal intrusion attempts to the national territory and report this to a control center to undergo the necessary measures. Regarding its nature, this wireless sensor network can be the target of many security attacks trying to compromise its normal operation. Particularly, in this application the deployment and location of sensor nodes are of great importance for detecting and tracking intruders. This paper proposes a location-based authentication and key distribution mechanism to secure wireless sensor networks intended for border surveillance where the key establishment is performed using elliptic curve cryptography and identity-based public key scheme. In this scheme, the public key of each sensor node will be authenticated by keys that depend on its position in the monitored area. Before establishing a pairwise key between two nodes, each one of them must verify the neighborhood location of the other node using a message authentication code (MAC) calculated on the corresponding public key and keys derived from encrypted beacon messages broadcast by anchor nodes. We show that our proposed public key authentication and key distribution scheme is more resilient to node capture and node replication attacks than currently available schemes. Also, the achievement of the key distribution between nodes in our scheme generates less communication overhead and hence increases network performances.

Keywords: wireless sensor networks, border surveillance, security, key distribution, location-based

Procedia PDF Downloads 637
409 Research Repository System (RRS) for Academics

Authors: Ajayi Olusola Olajide, O. Ojeyinka Taiwo, Adeolara Oluwawemimo Janet, Isheyemi Olufemi Gabriel, Lawal Muideen Adekunle

Abstract:

In an academic world where research work is the tool for promotion and elevation to higher cadres, the quest for a system that secure researchers’ work, monitor as well as alert researchers of pending academic research work, cannot be over-emphasized. This study describes how a research repository system for academics is designed. The invention further relates to a system for archiving any paperwork and journal that comprises of a database for storing all researches. It relates to a method for users to communicate through messages which will also allow reviewing all the messages. To create this research repository system, PHP and MySQL were married together for the system implementation.

Keywords: research, repository, academic, archiving, secure, system, implementation

Procedia PDF Downloads 562
408 Hidden Truths of Advertising: An Unspoken Fact in Making Ethical Diffusions

Authors: Mustafa Hyder, Shamaila Burney, Roohi Mumtaz

Abstract:

The aim of this study is to determine the consequences of silent or hidden messages and their effectiveness in deteriorating or altering our ethical norms and values. The study also focuses the repercussions of subconscious messages and possibilities of ethical diffusion in our society. The research based on the question that what are the different factors that motivate advertisers to include subliminal messages and how much these unspoken truths affecting our ethical values silently. What are the causes and effects of the subliminal messages in general and the level of ethical diffusion and its acceptance? The concept of advertising is to promote and highlight the salient features of the products and services, a company offers. Advertising is the best option nowadays to convey the related information to the consumers so that they attracted more towards the products or services proposed. The other thing advertisers concentrate, is the psychological characteristics using to persuade consumers choice. Using skills and tactics of advertising to promote a product in such a way that it creates a sensation, controversy or brand consciousness among the consumers or customers. The purpose to have increase purchase or to gain popularity in comparison to their competitors, they sometimes use such tactics and techniques, which is highly unethical and immoral for any society. These kinds of stuff used very smartly within the ads that only the conscious mind subconsciously catches the meaning of those glittery images, posters, phrases, tag lines and non-verbal clues. This study elucidates the subliminal advertising their repercussions and impact on consumer’s behaviour in our society with the help of few ads embedded subliminally and the trends of profitability. The methods used to accomplish our research are based on qualitative research along with the research articles, books and feedback from focused groups regarding the topic. The basic objective of this study was that, there is no significant change in the behaviour and attitude observed. These messages capture very short-term life on the viewer’s subconscious mind but in long run people get used to it and hence not only have the diffusion power but also has the high level of acceptance as well that reflects mostly through their social behaviours and attitudes.

Keywords: ethical diffusion, subconscious, subliminal advertising, unspoken facts

Procedia PDF Downloads 310
407 The Use of Mobile Phones as a Direct Marketing Tool and Consumer Attitudes

Authors: Abdülcelil Mücahid Zengin, Göksel Şimşek

Abstract:

Mobile phones are one of the direct marketing tools that can be used to reach todays hard to reach consumers. Mobile phones are very personal devices and they are always carried with the consumer, where ever they go. This creates an opportunity for marketers to create personalized marketing communications messages and send them on the right time and place. This study examines consumer attitudes toward mobile marketing, especially toward SMS marketing. Unlike similar studies, this study does not focus on the young, but includes consumers who are in the 18-70 age range to the field research. According to the results, it has been concluded that most participants think SMS marketing is disturbing. Most important problems with SMS marketing are about getting subscribed to message lists without the permission of the receiver; the high number of messages sent; and the irrelevancy of the message content.

Keywords: direct marketing, mobile phones mobile marketing, sms advertising, sms marketing

Procedia PDF Downloads 321
406 Bioarm, a Prothesis without Surgery

Authors: J. Sagouis, A. Chamel, E. Carre, C. Casasreales, G. Rudnik, M. Cerdan

Abstract:

Robotics provides answers to amputees. The most expensive solutions surgically connect the prosthesis to nerve endings. There are also several types of non-invasive technologies that recover nerve messages passing through the muscles. After analyzing these messages, myoelectric prostheses perform the desired movement. The main goal is to avoid all surgeries, which can be heavy and offer cheaper alternatives. For an amputee, we use valid muscles to recover the electrical signal involved in a muscle movement. EMG sensors placed on the muscle allows us to measure a potential difference, which our program transforms into control for a robotic arm with two degrees of freedom. We have shown the feasibility of non-invasive prostheses with two degrees of freedom. Signal analysis and an increase in degrees of freedom is still being improved.

Keywords: prosthesis, electromyography (EMG), robotic arm, nerve message

Procedia PDF Downloads 232
405 Lab Support: A Computer Laboratory Class Management Support System

Authors: Eugenia P. Ramirez, Kevin Matthe Caramancion, Mia Eleazar

Abstract:

Getting the attention of students is a constant challenge to the instructors/lecturers. Although in the computer laboratories some networking and entertainment websites are blocked, yet, these websites have unlimited ways of attracting students to get into it. Thus, when an instructor gives a specific set of instructions, some students may not be able to follow sequentially the steps that are given. The instructor has to physically go to the specific remote terminal and show the student the details. Sometimes, during an examination in laboratory set-up, a proctor may prefer to give detailed and text-written instructions rather than verbal instructions. Even the mere calling of a specific student at any time will distract the whole class especially when activities are being performed. What is needed is : An application software that is able to lock the student's monitor and at the same time display the instructor’s screen; a software that is powerful enough to process in its side alone and manipulate a specific user’s terminal in terms of free configuration that is, without restrictions at the server level is a required functionality for a modern and optimal server structure; a software that is able to send text messages to students, per terminal or in group will be a solution. These features are found in LabSupport. This paper outlines the LabSupport application software framework to efficiently manage computer laboratory sessions and will include different modules: screen viewer, demonstration mode, monitor locking system, text messaging, and class management. This paper's ultimate aim is to provide a system that increases instructor productivity.

Keywords: application software, broadcast messaging, class management, locking system

Procedia PDF Downloads 413
404 The Influence of Group Heuristics on Corporate Social Responsibility Messages Designed to Reduce Illegal Consumption

Authors: Kate Whitman, Zahra Murad, Joe Cox

Abstract:

Corporate social responsibility projects are suggested to motivate consumers to reciprocate good corporate deeds with their custom. When the projects benefit the ingroup vs the outgroup, such as locals rather than foreigners, the effect on reciprocity is suggested to be more powerful. This may be explained by group heuristics, a theory which indicates that favours to the ingroup (but not outgroup) are expected to be reciprocated, resulting in ingroup favouritism. The heuristic is theorised to explain prosocial behaviours towards the ingroup. The aim of this study is to test whether group heuristics similarly explain a reduction in antisocial behaviours towards the ingroup, measured by illegal consumption which harms a group that consumers identify with. In order to test corporate social responsibility messages, a population of interested consumers is required, so sport fans are recruited. A pre-registered experiment (N = 600) tests the influence of a focused “team” benefiting message vs a broader “sport” benefiting message on change in illegal intentions. The influence of group (team) identity and trait reciprocity on message efficacy are tested as measures of group heuristics. Results suggest that the “team” treatment significantly reduces illegal consumption intentions. The “sport” treatment interacted with the team identification measure, increasing illegal consumption intentions for low team identification individuals. The results suggest that corporate social responsibility may be effective in reducing illegal consumption, if the messages are delivered directly from brands to consumers with brand identification. Messages delivered on the behalf of an industry may have an undesirable effect.

Keywords: live sports, piracy, counterfeiting, corporate social responsibility, group heuristics, ingroup bias, team identification

Procedia PDF Downloads 51
403 The Effect of Artificial Intelligence on Marketing Distribution

Authors: Yousef Wageh Nagy Fahmy

Abstract:

Mobile phones are one of the direct marketing tools used to reach today's hard-to-reach consumers. Cell phones are very personal devices and you can have them with you anytime, anywhere. This offers marketers the opportunity to create personalized marketing messages and send them at the right time and place. The study examined consumer attitudes towards mobile marketing, particularly SMS marketing. Unlike similar studies, this study does not focus on young people, but includes consumers between the ages of 18 and 70 in the field study.The results showed that the majority of participants found SMS marketing disruptive. The biggest problems with SMS marketing are subscribing to message lists without the recipient's consent; large number of messages sent; and the irrelevance of message content

Keywords: direct marketing, mobile phones mobile marketing, sms advertising, marketing sponsorship, marketing communication theories, marketing communication tools

Procedia PDF Downloads 43
402 Communication Aesthetics of Techno-Scenery and Lighting in Bolanle Austen-Peters Queen Moremi the Musical

Authors: Badeji Adebayo John

Abstract:

Technology has immense contribution in every aspect of human endeavor; it has not only made work easier but also provided exhilarating impression in the mind of the people. Theatre is not exempted from the multifaceted influence of technology on phenomenon. Therefore, theatre performances have experienced the excellence of technology in the contemporary era such that audiences have unforgettable experiences after seeing theatre performances. Some of these technological advancements that have amplified the aesthetics of performances in the theatre are techno-scenery (3D mapping) and lighting. In view of this, the objective of this study is to explore how techno-scenery and lighting technologies were used to communicate messages in the performance of Queen Moremi the Musical. In so doing, Participant-Observation Method and Content Analysis are adopted. Berlo’s model of communication is also employed to explain the communicative aesthetics of these theatre technologies in the performance. Techno-scenery and lighting are communication media modifier that facilitates audiences’ comprehension of the messages in the performance of Queen Moremi the Musical. They also create clear motion pictures of the setting which the performers cannot communicate in their acting, dances and singing, to ease the audiences’ decoding of messages that the performers are sending to the audience. Therefore, consistent incorporation of these technologies to theatre performances will facilitate easy flow of communication in-between the performers who are the sender, the message which is the performance and the audience who are the receiver.

Keywords: communication, aesthetics, techno-scenery, lighting, musical

Procedia PDF Downloads 56
401 Spanish Language Violence Corpus: An Analysis of Offensive Language in Twitter

Authors: Beatriz Botella-Gil, Patricio Martínez-Barco, Lea Canales

Abstract:

The Internet and ICT are an integral element of and omnipresent in our daily lives. Technologies have changed the way we see the world and relate to it. The number of companies in the ICT sector is increasing every year, and there has also been an increase in the work that occurs online, from sending e-mails to the way companies promote themselves. In social life, ICT’s have gained momentum. Social networks are useful for keeping in contact with family or friends that live far away. This change in how we manage our relationships using electronic devices and social media has been experienced differently depending on the age of the person. According to currently available data, people are increasingly connected to social media and other forms of online communication. Therefore, it is no surprise that violent content has also made its way to digital media. One of the important reasons for this is the anonymity provided by social media, which causes a sense of impunity in the victim. Moreover, it is not uncommon to find derogatory comments, attacking a person’s physical appearance, hobbies, or beliefs. This is why it is necessary to develop artificial intelligence tools that allow us to keep track of violent comments that relate to violent events so that this type of violent online behavior can be deterred. The objective of our research is to create a guide for detecting and recording violent messages. Our annotation guide begins with a study on the problem of violent messages. First, we consider the characteristics that a message should contain for it to be categorized as violent. Second, the possibility of establishing different levels of aggressiveness. To download the corpus, we chose the social network Twitter for its ease of obtaining free messages. We chose two recent, highly visible violent cases that occurred in Spain. Both of them experienced a high degree of social media coverage and user comments. Our corpus has a total of 633 messages, manually tagged, according to the characteristics we considered important, such as, for example, the verbs used, the presence of exclamations or insults, and the presence of negations. We consider it necessary to create wordlists that are present in violent messages as indicators of violence, such as lists of negative verbs, insults, negative phrases. As a final step, we will use automatic learning systems to check the data obtained and the effectiveness of our guide.

Keywords: human language technologies, language modelling, offensive language detection, violent online content

Procedia PDF Downloads 102
400 Destination Port Detection For Vessels: An Analytic Tool For Optimizing Port Authorities Resources

Authors: Lubna Eljabu, Mohammad Etemad, Stan Matwin

Abstract:

Port authorities have many challenges in congested ports to allocate their resources to provide a safe and secure loading/ unloading procedure for cargo vessels. Selecting a destination port is the decision of a vessel master based on many factors such as weather, wavelength and changes of priorities. Having access to a tool which leverages AIS messages to monitor vessel’s movements and accurately predict their next destination port promotes an effective resource allocation process for port authorities. In this research, we propose a method, namely, Reference Route of Trajectory (RRoT) to assist port authorities in predicting inflow and outflow traffic in their local environment by monitoring Automatic Identification System (AIS) messages. Our RRoT method creates a reference route based on historical AIS messages. It utilizes some of the best trajectory similarity measure to identify the destination of a vessel using their recent movement. We evaluated five different similarity measures such as Discrete Fr´echet Distance (DFD), Dynamic Time Warping (DTW), Partial Curve Mapping (PCM), Area between two curves (Area) and Curve length (CL). Our experiments show that our method identifies the destination port with an accuracy of 98.97% and an fmeasure of 99.08% using Dynamic Time Warping (DTW) similarity measure.

Keywords: spatial temporal data mining, trajectory mining, trajectory similarity, resource optimization

Procedia PDF Downloads 94
399 WormHex: Evidence Retrieval Tool of Social Media from Volatile Memory

Authors: Norah Almubairik, Wadha Almattar, Amani Alqarni

Abstract:

Social media applications are increasingly being used in our everyday communications. These applications utilise end-to-end encryption mechanisms, which make them suitable tools for criminals to exchange messages. These messages are preserved in the volatile memory until the device is restarted. Therefore, volatile forensics has become an important branch of digital forensics. In this study, the WormHex tool was developed to inspect the memory dump files of Windows and Mac-based workstations. The tool supports digital investigators to extract valuable data written in Arabic and English through web-based WhatsApp and Twitter applications. The results verify that social media applications write their data into the memory regardless of the operating system running the application, with there being no major differences between Windows and Mac.

Keywords: volatile memory, REGEX, digital forensics, memory acquisition

Procedia PDF Downloads 159
398 Study on the Efficient Routing Algorithms in Delay-Tolerant Networks

Authors: Si-Gwan Kim

Abstract:

In Delay Tolerant Networks (DTN), there may not exist an end-to-end path between source and destination at the time of message transmission. Employing ‘Store Carry and Forward’ delivery mechanism for message transmission in such networks usually incurs long message delays. In this paper, we present the modified Binary Spray and Wait (BSW) routing protocol that enhances the performance of the original one. Our proposed algorithm adjusts the number of forward messages depending on the number of neighbor nodes. By using beacon messages periodically, the number of neighbor nodes can be managed. The simulation using ONE simulator results shows that our modified version gives higher delivery ratio and less latency as compared to BSW.

Keywords: delay tolerant networks, store carry and forward, one simulator, binary spray and wait

Procedia PDF Downloads 102
397 Effectuation of Interactive Advertising: An Empirical Study on Egyptian Tourism Advertising

Authors: Bassant Eyada, Hanan Atef Kamal Eldin

Abstract:

Advertising has witnessed a diffusion and development in technology to promote products and services, increasingly relying on the interactivity between the consumer and the advertisement. Consumers seek, self-select, process, use and respond to the information provided, hence, providing the potential to increase consumers’ efficiency, involvement, trustworthiness, response, and satisfaction towards the advertised product or service. The power of interactive personalized messages shifts the focus of traditional advertising to more concentrated consumers, sending out tailored messages with more specific individual needs and preferences, defining the importance and relevance that consumers attach to the advertisement, therefore, enhancing the ability to persuade, and the quality of decision making. In this paper, the researchers seek to discuss and explore innovative interactive advertising, its’ effectiveness on consumers and the benefits the advertisements provide, through designing an interactive ad to be placed at the international airports promoting tourism in Egypt.

Keywords: advertising, effectiveness, interactivity, Egypt

Procedia PDF Downloads 290
396 A New Method for Fault Detection

Authors: Mehmet Hakan Karaata, Ali Hamdan, Omer Yusuf Adam Mohamed

Abstract:

Consider a distributed system that delivers messages from a process to another. Such a system is often required to deliver each message to its destination regardless of whether or not the system components experience arbitrary forms of faults. In addition, each message received by the destination must be a message sent by a system process. In this paper, we first identify the necessary and sufficient conditions to detect some restricted form of Byzantine faults referred to as modifying Byzantine faults. An observable form of a Byzantine fault whose effect is limited to the modification of a message metadata or content, timing and omission faults, and message replay is referred to as a modifying Byzantine fault. We then present a distributed protocol to detect modifying Byzantine faults using optimal number of messages over node-disjoint paths.

Keywords: Byzantine faults, distributed systems, fault detection, network protocols, node-disjoint paths

Procedia PDF Downloads 423
395 An Approach to Secure Mobile Agent Communication in Multi-Agent Systems

Authors: Olumide Simeon Ogunnusi, Shukor Abd Razak, Michael Kolade Adu

Abstract:

Inter-agent communication manager facilitates communication among mobile agents via message passing mechanism. Until now, all Foundation for Intelligent Physical Agents (FIPA) compliant agent systems are capable of exchanging messages following the standard format of sending and receiving messages. Previous works tend to secure messages to be exchanged among a community of collaborative agents commissioned to perform specific tasks using cryptosystems. However, the approach is characterized by computational complexity due to the encryption and decryption processes required at the two ends. The proposed approach to secure agent communication allows only agents that are created by the host agent server to communicate via the agent communication channel provided by the host agent platform. These agents are assumed to be harmless. Therefore, to secure communication of legitimate agents from intrusion by external agents, a 2-phase policy enforcement system was developed. The first phase constrains the external agent to run only on the network server while the second phase confines the activities of the external agent to its execution environment. To implement the proposed policy, a controller agent was charged with the task of screening any external agent entering the local area network and preventing it from migrating to the agent execution host where the legitimate agents are running. On arrival of the external agent at the host network server, an introspector agent was charged to monitor and restrain its activities. This approach secures legitimate agent communication from Man-in-the Middle and Replay attacks.

Keywords: agent communication, introspective agent, isolation of agent, policy enforcement system

Procedia PDF Downloads 277
394 Effectuation of Interactive Advertising: An Empirical Study on Egyptian Tourism Advert

Authors: Bassant Eyada, Hanan Atef Kamal Eldin

Abstract:

Advertising has witnessed a diffusion and development in technology to promote products and services, increasingly relying on the interactivity between the consumer and the advertisement. Consumers seek, self-select, process, use and respond to the information provided, hence, providing the potential to increase consumers’ efficiency, involvement, trustworthiness, response and satisfaction towards the advertised product or service. The power of interactive personalized messages shifts the focus of traditional advertising to more concentrated consumers, sending out tailored messages with more specific individual needs and preferences, defining the importance and relevance that consumers attach to the advertisement, therefore, enhancing the ability to persuade, and the quality of decision making. In this paper, the researchers seek to discuss and explore innovative interactive advertising, its’ effectiveness on consumers and the benefits the advertisements provide, through designing an interactive ad to be placed at the international airports promoting tourism in Egypt.

Keywords: advertising, effectiveness, interactivity, Egypt

Procedia PDF Downloads 263