Search results for: union threat
1687 Analysis of Lightweight Register Hardware Threat
Authors: Yang Luo, Beibei Wang
Abstract:
In this paper, we present a design methodology of lightweight register transfer level (RTL) hardware threat implemented based on a MAX II FPGA platform. The dynamic power consumed by the toggling of the various bit of registers as well as the dynamic power consumed per unit of logic circuits were analyzed. The hardware threat was designed taking advantage of the differences in dynamic power consumed per unit of logic circuits to hide the transfer information. The experiment result shows that the register hardware threat was successfully implemented by using different dynamic power consumed per unit of logic circuits to hide the key information of DES encryption module. It needs more than 100000 sample curves to reduce the background noise by comparing the sample space when it completely meets the time alignment requirement. In additional, an external trigger signal is playing a very important role to detect the hardware threat in this experiment.Keywords: side-channel analysis, hardware Trojan, register transfer level, dynamic power
Procedia PDF Downloads 2791686 Board of Directors Characteristics and Credit Union Financial Performance
Authors: Luisa Unda, Kamran Ahmed, Paul Mather
Abstract:
We examine the effect of board characteristics on the performance and asset quality of credit unions in Australia, using a large sample covering the period 2004-2012. Credit unions are unique in that they are customer-owned financial institutions and directors are democratically elected by members, which is distinctly different from other financial institutions, such as commercial banks. We find that board remuneration, board expertise, and attendance at board meetings have significantly positive impacts on credit union performance and asset quality, while board members who hold multiple directorships (busy directors), have a significant negative impact on credit union performance. Financial performance also improves with larger boards and long-tenured directors in credit unions. All of these relations hold after we control for alternative measures of performance, credit union characteristics and endogeneity problem.Keywords: credit unions, corporate governance, board of directors, financial performance, Australia, asset quality
Procedia PDF Downloads 5211685 Gramscian Class Analysis of the Brexit Process in the Passive Revolution Framework
Authors: Volkan Gulsen
Abstract:
This paper attempts to indicate the main class dynamics of the Brexit process in a Gramscian theoretical framework. It further aims to point out the influence of the withdrawal of the United Kingdom on the European Union class structure. It defines the unification process of the European Union as a passive revolution. In that way, the Brexit process has been described as a moment of negation in the European Union history of class struggle. It will be argued that the withdrawal of the United Kingdom has already altered the European class structure from the embedded neoliberal structure to a more corporate-liberal one.Keywords: brexit, gramsci, passive revolution, post-neoliberalism
Procedia PDF Downloads 1551684 Fractional Integration in the West African Economic and Monetary Union
Authors: Hector Carcel Luis Alberiko Gil-Alana
Abstract:
This paper examines the time series behavior of three variables (GDP, Price level of Consumption and Population) in the eight countries that belong to the West African Economic and Monetary Union (WAEMU), which are Benin, Burkina Faso, Côte d’Ivoire, Guinea-Bissau, Mali, Niger, Senegal and Togo. The reason for carrying out this study lies in the considerable heterogeneity that can be perceived in the data from these countries. We conduct a long memory and fractional integration modeling framework and we also identify potential breaks in the data. The aim of the study is to perceive up to which degree the eight West African countries that belong to the same monetary union follow the same economic patterns of stability. Testing for mean reversion, we only found strong evidence of it in the case of Senegal for the Price level of Consumption, and in the cases of Benin, Burkina Faso and Senegal for GDP.Keywords: West Africa, Monetary Union, fractional integration, economic patterns
Procedia PDF Downloads 4321683 R-Killer: An Email-Based Ransomware Protection Tool
Authors: B. Lokuketagoda, M. Weerakoon, U. Madushan, A. N. Senaratne, K. Y. Abeywardena
Abstract:
Ransomware has become a common threat in past few years and the recent threat reports show an increase of growth in Ransomware infections. Researchers have identified different variants of Ransomware families since 2015. Lack of knowledge of the user about the threat is a major concern. Ransomware detection methodologies are still growing through the industry. Email is the easiest method to send Ransomware to its victims. Uninformed users tend to click on links and attachments without much consideration assuming the emails are genuine. As a solution to this in this paper R-Killer Ransomware detection tool is introduced. Tool can be integrated with existing email services. The core detection Engine (CDE) discussed in the paper focuses on separating suspicious samples from emails and handling them until a decision is made regarding the suspicious mail. It has the capability of preventing execution of identified ransomware processes. On the other hand, Sandboxing and URL analyzing system has the capability of communication with public threat intelligence services to gather known threat intelligence. The R-Killer has its own mechanism developed in its Proactive Monitoring System (PMS) which can monitor the processes created by downloaded email attachments and identify potential Ransomware activities. R-killer is capable of gathering threat intelligence without exposing the user’s data to public threat intelligence services, hence protecting the confidentiality of user data.Keywords: ransomware, deep learning, recurrent neural networks, email, core detection engine
Procedia PDF Downloads 2161682 Age Determination from Epiphyseal Union of Bones at Shoulder Joint in Girls of Central India
Authors: B. Tirpude, V. Surwade, P. Murkey, P. Wankhade, S. Meena
Abstract:
There is no statistical data to establish variation in epiphyseal fusion in girls in central India population. This significant oversight can lead to exclusion of persons of interest in a forensic investigation. Epiphyseal fusion of proximal end of humerus in eighty females were analyzed on radiological basis to assess the range of variation of epiphyseal fusion at each age. In the study, the X ray films of the subjects were divided into three groups on the basis of degree of fusion. Firstly, those which were showing No Epiphyseal Fusion (N), secondly those showing Partial Union (PC), and thirdly those showing Complete Fusion (C). Observations made were compared with the previous studies.Keywords: epiphyseal union, shoulder joint, proximal end of humerus
Procedia PDF Downloads 4981681 A Comparison of Performance Indicators Between University-Level Rugby Union and Rugby Union Sevens Matches
Authors: Pieter van den Berg, Retief Broodryk, Bert Moolman
Abstract:
Firstly, this study aimed to identify which performance indicators (PIs) discriminate between winning and losing university-level Rugby Union (RU) teams and, secondly, to compare the significant PIs in RU and Rugby Union Sevens (RS) at university level. Understanding the importance of PIs and their effect on match outcomes could assist coaching staff to prioritise specific game aspects during training to increase performance. Twenty randomly selected round-robin matches of the 2018 Varsity Cup (n=20), and Varsity Sports sevens (n=20) tournaments were analysed. A linear mixed model was used to determine statistical significant differences set at p≤0.05 while effect size was reported according to Cohen's d value. Results revealed that various PIs discriminated between winning and losing RU teams and that specific PIs could be observed as significant in both RU and RS. Therefore, specific identified tactical aspects of RU and RS should be prioritised to optimise performanceKeywords: match success, notational analysis, performance analysis, rugby, video analysis
Procedia PDF Downloads 721680 The Correlation Between the Rise of China and the US-Iranian Conflict: An American Perspective
Authors: Ranj Tofik
Abstract:
This article aims to demonstrate a link and/or correlation between the rise of China and the US-Iranian conflict, from a US point of view. To demonstrate this link, the article relies on the content analysis method by analyzing American reports and official data. This article concludes that this correlation indicates that the more China rises and the greater the Chinese threat to America, the more changes will occur in the US-Iranian conflict and the US actions regarding this conflict will increase – in the form of imposing sanctions and using means of pressure on Iran, or trying to reach an agreement and settlement with Iran. This article, via noting and observing that correlation, also claims that before 2012, Iran was a regional threat to US interests in the Middle East. However, after 2012 when the rise of China became one of the major threats to America, Iran, because of its rapprochement with China, became also part of the Chinese threat, which is a threat to America's global standing. In addition, observing this correlation indicates the possibility that the rise of China and its threat to the USA has become one of the main drivers in the US-Iranian conflict. Consequently, it can be said that Iran has become a vital issue in the US-China rivalry, as it has become an appropriate gateway for China to enter the Middle East and undermine US hegemony there.Keywords: China-Iran relations, China's rise, JCPOA, US-Chinese competition, US-Iranian conflict
Procedia PDF Downloads 1021679 The Role of Development in Settling Migration Crisis: The Preventive Approach of the European Union in Relations with Sub-Saharan African States
Authors: Artsiom Zinchanka
Abstract:
The world faces now one of the largest migration crisis and the European Union meets challenges in accepting the flow of migrants that could not be handled finally at this step. This crisis is complicated with many factors, such as military conflict in the Middle East; absence of the appropriate conditions in the refugees’ camps; but also with the complicity of the migration flow consisting of the Sub-Saharan migrants. This type of migrants leave their homelands for many reasons including poverty, not appropriate level of social and economic conditions, absence of infrastructure and access to the education and medical care. In practice, when the restrictive approach directed to limit the flow of illicit migration and to send illicit migrants back to their homelands is not always working, the approach directed to the root causes of the migration crisis can be more effective in settling the crisis. The Cotonou Agreement and the following treaties concluded between the European Union, and Sub-Saharan states show that the European Union considers the development of human rights and appropriate social and economic conditions in the Sub-Saharan states as one of the most important factors addressing the migration crisis. The preventive approach as the efforts of the European Union to develop appropriate social and economic conditions in Sub-Saharan states is considered in this article, as well as its evolution and current condition. This article also considers pros and cons of this approach and the obstacles that this approach faces. The research methods include review of literature and documents, analytical and descriptive methods.Keywords: migration crisis, preventive approach, Sub-Saharan States, the European Union
Procedia PDF Downloads 1341678 The Effects of Self-Efficacy on Challenge and Threat States
Authors: Nadine Sammy, Mark Wilson, Samuel Vine
Abstract:
The Theory of Challenge and Threat States in Athletes (TCTSA) states that self-efficacy is an antecedent of challenge and threat. These states result from conscious and unconscious evaluations of situational demands and personal resources and are represented by both cognitive and physiological markers. Challenge is considered a more adaptive stress response as it is associated with a more efficient cardiovascular profile, as well as better performance and attention effects compared with threat. Self-efficacy is proposed to influence challenge/threat because an individual’s belief that they have the skills necessary to execute the courses of action required to succeed contributes to a perception that they can cope with the demands of the situation. This study experimentally examined the effects of self-efficacy on cardiovascular responses (challenge and threat), demand and resource evaluations, performance and attention under pressurised conditions. Forty-five university students were randomly assigned to either a control (n=15), low self-efficacy (n=15) or high self-efficacy (n=15) group and completed baseline and pressurised golf putting tasks. Self-efficacy was manipulated using false feedback adapted from previous studies. Measures of self-efficacy, cardiovascular reactivity, demand and resource evaluations, task performance and attention were recorded. The high self-efficacy group displayed more favourable cardiovascular reactivity, indicative of a challenge state, compared with the low self-efficacy group. The former group also reported high resource evaluations, but no task performance or attention effects were detected. These findings demonstrate that levels of self-efficacy influence cardiovascular reactivity and perceptions of resources under pressurised conditions.Keywords: cardiovascular, challenge, performance, threat
Procedia PDF Downloads 2331677 Management of Gap Non-Union Following Tumour Resection of the Distal Femur
Authors: Rajendra Kumar Kanojia
Abstract:
Correction of the gap created by the resection of large juxtra-articular tumours of the femur would be difficult to manage, several bone substitutes, bone grafts, and artificial bone granules were tried but the results were not as good as with the distraction osteogensis, by the help of either Ilizarov ring fixator or the mono-rail fixators. We are presenting a small study of five cases of malignant tumours of the distal femur, removed, custom made mega prosthesis was applied and that failed twice in a span of five years. We had no better option left then to apply mono-rail fixator, and start the process of distraction osteogeneis, we got the union, gap was filled with new bone and patient has been made walking in few months.Keywords: distal femur tumour, resection, defect non-union, mono-rail fixator
Procedia PDF Downloads 3761676 A Reasoning Method of Cyber-Attack Attribution Based on Threat Intelligence
Authors: Li Qiang, Yang Ze-Ming, Liu Bao-Xu, Jiang Zheng-Wei
Abstract:
With the increasing complexity of cyberspace security, the cyber-attack attribution has become an important challenge of the security protection systems. The difficult points of cyber-attack attribution were forced on the problems of huge data handling and key data missing. According to this situation, this paper presented a reasoning method of cyber-attack attribution based on threat intelligence. The method utilizes the intrusion kill chain model and Bayesian network to build attack chain and evidence chain of cyber-attack on threat intelligence platform through data calculation, analysis and reasoning. Then, we used a number of cyber-attack events which we have observed and analyzed to test the reasoning method and demo system, the result of testing indicates that the reasoning method can provide certain help in cyber-attack attribution.Keywords: reasoning, Bayesian networks, cyber-attack attribution, Kill Chain, threat intelligence
Procedia PDF Downloads 4521675 Strategic Cyber Sentinel: A Paradigm Shift in Enhancing Cybersecurity Resilience
Authors: Ayomide Oyedele
Abstract:
In the dynamic landscape of cybersecurity, "Strategic Cyber Sentinel" emerges as a revolutionary framework, transcending traditional approaches. This paper pioneers a holistic strategy, weaving together threat intelligence, machine learning, and adaptive defenses. Through meticulous real-world simulations, we demonstrate the unprecedented resilience of our framework against evolving cyber threats. "Strategic Cyber Sentinel" redefines proactive threat mitigation, offering a robust defense architecture poised for the challenges of tomorrow.Keywords: cybersecurity, resilience, threat intelligence, machine learning, adaptive defenses
Procedia PDF Downloads 841674 Economic Conflict between the United Kingdom and the European Community 1945-1975
Authors: Soumia Hebbri
Abstract:
The relationship between Britain and the European Union is phenomenally complex with a great opposition to Europe in the British Conservative and Labour Parties emerged since 1945. During the history and development of the European Union, Europe saw a lack of British involvement until 1961, after refusing to sign the Treaties of Rome of 1957 for being a member of the European Economic Community. Britain then applied to join the EEC in 1961 under Harold Macmillan’s Conservative Government, its application led by the Chief Negotiator Edward Heath. This application was vetoed by President de Gaulle. With de Gaulle out of power Britain. finally could joined in 1973. But again Labour and conservative both found themselves divided on the issue and they hold a referendum under labour on whether to continue the UK’s membership.Keywords: the European Union, the British, economic community, de Gaulle
Procedia PDF Downloads 4911673 A Machine Learning-Assisted Crime and Threat Intelligence Hunter
Authors: Mohammad Shameel, Peter K. K. Loh, James H. Ng
Abstract:
Cybercrime is a new category of crime which poses a different challenge for crime investigators and incident responders. Attackers can mask their identities using a suite of tools and with the help of the deep web, which makes them difficult to track down. Scouring the deep web manually takes time and is inefficient. There is a growing need for a tool to scour the deep web to obtain useful evidence or intel automatically. In this paper, we will explain the background and motivation behind the research, present a survey of existing research on related tools, describe the design of our own crime/threat intelligence hunting tool prototype, demonstrate its capability with some test cases and lastly, conclude with proposals for future enhancements.Keywords: cybercrime, deep web, threat intelligence, web crawler
Procedia PDF Downloads 1751672 Sharing Experience in Authentic Learning for Mobile Security
Abstract:
Mobile devices such as smartphones are getting more and more popular in our daily lives. The security vulnerability and threat attacks become a very emerging and important research and education topic in computing security discipline. There is a need to have an innovative mobile security hands-on laboratory to provide students with real world relevant mobile threat analysis and protection experience. This paper presents an authentic teaching and learning mobile security approach with smartphone devices which covers most important mobile threats in most aspects of mobile security. Each lab focuses on one type of mobile threats, such as mobile messaging threat, and conveys the threat analysis and protection in multiple ways, including lectures and tutorials, multimedia or app-based demonstration for threats analysis, and mobile app development for threat protections. This authentic learning approach is affordable and easily-adoptable which immerse students in a real world relevant learning environment with real devices. This approach can also be applied to many other mobile related courses such as mobile Java programming, database, network, and any security relevant courses so that can learn concepts and principles better with the hands-on authentic learning experience.Keywords: mobile computing, Android, network, security, labware
Procedia PDF Downloads 4071671 A Historical Overview of the General Implementation of the European Union Market Abuse Directive in the United Kingdom before the Brexit and Its Future Implications
Authors: Howard Chitimira
Abstract:
The European Union (EU) was probably the first body to establish multinational anti-market abuse laws aimed at enhancing the detection and curbing of cross-border market abuse activities in its member states. Put differently, the EU Insider Dealing Directive was adopted in 1989 and was the first law that harmonised the insider trading ban among the EU member states. Thereafter, the European Union Directive on Insider Dealing and Market Manipulation (EU Market Abuse Directive) was adopted in a bid to improve and effectively discourage all the forms of market abuse in the EU’s securities and financial markets. However, the EU Market Abuse Directive had its own gaps and flaws. In light of this, the Market Abuse Regulation and the Criminal Sanctions for Market Abuse Directive were enacted to repeal and replace the EU Market Abuse Directive in 2016. The article examines the adequacy of the EU Market Abuse Directive and its implementation in the United Kingdom (UK) prior to the British exit (Brexit). This is done to investigate the possible implications of the Brexit referendum outcome of 23 June 2016 on the future regulation of market abuse in the UK.Keywords: market abuse, insider trading, market manipulation, European Union, United Kingdom
Procedia PDF Downloads 2521670 Socio-Economic Problems in Treatment of Non-Union Both Bones Fracture of the Leg: A Retrospective Study
Authors: Rajendra Kumar Kanojia
Abstract:
Treatment of fracture both bones of leg following trauma is done intially at nearby primary health care center.primary management for shock,pain,control of bleeding,plaster application. These are treated for primay fixation of fracture, debridment of wound. Then, they were refered to tertiary care where they were again and planned for further treatment. This leads to loss of lot of time, money, job, etc.Keywords: fracture both bones leg, non-union, ilizarov, cost
Procedia PDF Downloads 5721669 Collective Bargaining Agreement with Its Related Factors and Employees’ Perceived Productivity: The Case of an Academic Institution in Davao City, Philippines
Authors: Amylyn F. Labasano, M. S. Econ
Abstract:
The study predicts the impact of collective bargaining agreement and its related factors on employees’ perceived productivity in terms of union-management relation’s climate, income, fringe benefits, and job satisfaction of the employees. It also determines whether there are significant differences in the employees’ perceived productivity based on the demographic characteristics of the respondents. The results revealed that the relationship climate which exists between the union and the management is found to have significant adverse effect on the average unpaid hours spent by employees working within the college. On the other hand, the total monthly wage earnings of employees have negative effect on the average hours an employee spent in bringing his work home while job satisfaction positively influences the overall productivity level of employees. The result further shows significant differences in the productivity level of employees across civil status and current designation.Keywords: perceived productivity, collective bargaining agreement, union, union-management relations climate, income, fringe benefits, job satisfaction
Procedia PDF Downloads 3321668 Hierarchical Filtering Method of Threat Alerts Based on Correlation Analysis
Authors: Xudong He, Jian Wang, Jiqiang Liu, Lei Han, Yang Yu, Shaohua Lv
Abstract:
Nowadays, the threats of the internet are enormous and increasing; however, the classification of huge alert messages generated in this environment is relatively monotonous. It affects the accuracy of the network situation assessment, and also brings inconvenience to the security managers to deal with the emergency. In order to deal with potential network threats effectively and provide more effective data to improve the network situation awareness. It is essential to build a hierarchical filtering method to prevent the threats. In this paper, it establishes a model for data monitoring, which can filter systematically from the original data to get the grade of threats and be stored for using again. Firstly, it filters the vulnerable resources, open ports of host devices and services. Then use the entropy theory to calculate the performance changes of the host devices at the time of the threat occurring and filter again. At last, sort the changes of the performance value at the time of threat occurring. Use the alerts and performance data collected in the real network environment to evaluate and analyze. The comparative experimental analysis shows that the threat filtering method can effectively filter the threat alerts effectively.Keywords: correlation analysis, hierarchical filtering, multisource data, network security
Procedia PDF Downloads 2021667 Adapted Intersection over Union: A Generalized Metric for Evaluating Unsupervised Classification Models
Authors: Prajwal Prakash Vasisht, Sharath Rajamurthy, Nishanth Dara
Abstract:
In a supervised machine learning approach, metrics such as precision, accuracy, and coverage can be calculated using ground truth labels to help in model tuning, evaluation, and selection. In an unsupervised setting, however, where the data has no ground truth, there are few interpretable metrics that can guide us to do the same. Our approach creates a framework to adapt the Intersection over Union metric, referred to as Adapted IoU, usually used to evaluate supervised learning models, into the unsupervised domain, which solves the problem by factoring in subject matter expertise and intuition about the ideal output from the model. This metric essentially provides a scale that allows us to compare the performance across numerous unsupervised models or tune hyper-parameters and compare different versions of the same model.Keywords: general metric, unsupervised learning, classification, intersection over union
Procedia PDF Downloads 501666 The Intersection/Union Region Computation for Drosophila Brain Images Using Encoding Schemes Based on Multi-Core CPUs
Authors: Ming-Yang Guo, Cheng-Xian Wu, Wei-Xiang Chen, Chun-Yuan Lin, Yen-Jen Lin, Ann-Shyn Chiang
Abstract:
With more and more Drosophila Driver and Neuron images, it is an important work to find the similarity relationships among them as the functional inference. There is a general problem that how to find a Drosophila Driver image, which can cover a set of Drosophila Driver/Neuron images. In order to solve this problem, the intersection/union region for a set of images should be computed at first, then a comparison work is used to calculate the similarities between the region and other images. In this paper, three encoding schemes, namely Integer, Boolean, Decimal, are proposed to encode each image as a one-dimensional structure. Then, the intersection/union region from these images can be computed by using the compare operations, Boolean operators and lookup table method. Finally, the comparison work is done as the union region computation, and the similarity score can be calculated by the definition of Tanimoto coefficient. The above methods for the region computation are also implemented in the multi-core CPUs environment with the OpenMP. From the experimental results, in the encoding phase, the performance by the Boolean scheme is the best than that by others; in the region computation phase, the performance by Decimal is the best when the number of images is large. The speedup ratio can achieve 12 based on 16 CPUs. This work was supported by the Ministry of Science and Technology under the grant MOST 106-2221-E-182-070.Keywords: Drosophila driver image, Drosophila neuron images, intersection/union computation, parallel processing, OpenMP
Procedia PDF Downloads 2391665 Rethinking the Role of Small States in the Hybrid Era: Shifts in the Cypriot Foreign and Defence Policies, 2004-2019
Authors: Constantinos Adamides, Petros Petrikkos
Abstract:
In the era of growing hybrid threats, small states find themselves in need to re-evaluate existing foreign and defense policies. The pressure to establishing or maintain a status of a reliable partner in the community in which they belong to, vis-à-vis their multilateral relations with other organisations and entities, small states may need to shift their policies in the field to accommodate security needs that are not only pertinent to their security, but also to that of the organisations (bloc) in which they interact. Unlike potential shortcomings in a small state’s mainstream security and defence framework where the threat would be limited to the state itself, in more contemporary times with dominating hybrid threats, the small states’ security shortcomings may also become a security problem for the bloc in which these states belong to. An indicative example is small states like Cyprus and Malta, which belong and 'interact' in the European Union. As a result, the nature of hybrid threats can be utilised to hurt bigger states in a bloc by exploiting the small states’ vulnerabilities and security gaps. Inevitably, both the defensive and foreign policy collaborations of small states with bigger states have been and are constantly re-evaluated to tackle and prevent such problems. In essence, the goal of this ‘re-evaluation’ aims to achieve a twofold goal: The first is the small states’ quest to appear as a reliable partner within the bloc, while the second is to avoid being the weakest security link in the bloc’s defence against hybrid threats. Indeed, the hybrid arena is a security area where they can excel in the bloc, despite the potential and expected conventional military deficiencies. This new environment prompts us to think security from the perspective of small states differently and in relation to their role as members or big organisations. The paper focuses on the case of Cyprus following its accession to the European Union and examines how a country that has had a very focused security orientation –not least due to its ongoing security problems– altered its foreign and defence policies within the European Union to ensure compliance with the rest of the bloc, while at the same time maximizing its role as a security player. Specifically, it examines the methods through which the country shifted its policies as well as the challenges and opportunities that emerged from these security shifts.Keywords: Cyprus, defence, foreign policy, hybrid threats, ontological security, small states
Procedia PDF Downloads 1381664 Development of Terrorist Threat Prediction Model in Indonesia by Using Bayesian Network
Authors: Hilya Mudrika Arini, Nur Aini Masruroh, Budi Hartono
Abstract:
There are more than 20 terrorist threats from 2002 to 2012 in Indonesia. Despite of this fact, preventive solution through studies in the field of national security in Indonesia has not been conducted comprehensively. This study aims to provide a preventive solution by developing prediction model of the terrorist threat in Indonesia by using Bayesian network. There are eight stages to build the model, started from literature review, build and verify Bayesian belief network to what-if scenario. In order to build the model, four experts from different perspectives are utilized. This study finds several significant findings. First, news and the readiness of terrorist group are the most influent factor. Second, according to several scenarios of the news portion, it can be concluded that the higher positive news proportion, the higher probability of terrorist threat will occur. Therefore, the preventive solution to reduce the terrorist threat in Indonesia based on the model is by keeping the positive news portion to a maximum of 38%.Keywords: Bayesian network, decision analysis, national security system, text mining
Procedia PDF Downloads 3921663 Personal Identity and Group Identity under Threat following Exclusion: A Study in Singapore and in the Netherlands
Authors: Z. N. Huwaë, E.M. W. Tong, Y. H. M. See
Abstract:
In the present study, the researchers examined whether people from collectivistic cultures perceive a more group identity threat following social exclusion, whereas a more personal identity threat would be the case for those from individualistic cultures. In doing so, they investigated whether threatened identities depend on whether people are excluded by ingroup members (same ethnic background) or outgroup members (another ethnic background), as exclusion studies have shown mixed results when it comes to being excluded by ingroup versus outgroup members. For this purpose, students in Singapore and in the Netherlands participated in an online ball-tossing game (Cyberball) where they were excluded or included by other players with either the same or other ethnicity. Tentative results showed that both Singaporean and Dutch participants reported a more threat to their group identity than to their personal identity following exclusion and this did not depend on who excluded them. These tentative findings suggest that threatened identities following exclusion may not depend on cultural factors or on the source of exclusion.Keywords: cultures, exclusion, experiment, group membership, identities
Procedia PDF Downloads 1191662 Cognitive and Environmental Factors Affecting Graduate Student Perception of Mathematics
Authors: Juanita Morris
Abstract:
The purpose of this study will examine the mediating relationships between the theories of intelligence, mathematics anxiety, gender stereotype threat, meta-cognition and math performance through the use of eye tracking technology, affecting student perception and problem-solving abilities. The participants will consist of (N=80) female graduate students. Test administered were the Abbreviated Math Anxiety Scale, Tobii Eye Tracking software, gender stereotype threat through Google images, and they will be asked to describe their problem-solving approach allowed to measure metacognition. Participants will be administered mathematics problems while having gender stereotype threat shown to them through online images while being directed to look at the eye tracking software Tobii. We will explore this by asking ‘Is mathematics anxiety associated with the theories of intelligence and gender stereotype threat and how does metacognition and math performance place a role in mediating those perspectives?’. It is hypothesized that math-anxious students are more likely affected by the gender stereotype threat and that may play a role in their performance? Furthermore, we also want to explore whether math anxious students are more likely to be an entity theorist than incremental theorist and whether those who are math anxious will be more likely to be fixated on variables associated with coefficients? Path analysis and independent samples t-test will be used to generate results for this study. We hope to conclude that both the theories of intelligence and metacognition mediate the relationship between mathematics anxiety and gender stereotype threat.Keywords: math anxiety, emotions, affective domains fo learning, cognitive underlinings
Procedia PDF Downloads 2701661 Financial Information and Collective Bargaining: Conflicting or Complementing
Authors: Humayun Murshed, Shibly Abdullah
Abstract:
The research conducted in early seventies apparently assumed the existence of a universal decision model for union negotiators and furthermore tended to regard financial information as a ‘neutral’ input into a rational decision-making process. However, research in the eighties began to question the neutrality of financial information as an input in collective bargaining rather viewing it as a potentially effective means for controlling the labour force. Furthermore, this later research also started challenging the simplistic assumptions relating particularly to union objectives which have underpinned the earlier search for universal union decision models. Despite the above developments there seems to be a dearth of studies in developing countries concerning the use of financial information in collective bargaining. This paper seeks to begin to remedy this deficiency. Utilising a case study approach based on two enterprises, one in the public sector and the other a multinational, the universal decision model is rejected and it is argued that the decision whether or not to use financial information is a contingent one and such a contingency is largely defined by the context and environment in which both union and management negotiators work. An attempt is also made to identify the factors constraining as well as promoting the use of financial information in collective bargaining, these being regarded as unique to the organizations within which the case studies are conducted.Keywords: collective bargaining, developing countries, disclosures, financial information
Procedia PDF Downloads 4721660 Operative versus Non-Operative Treatment of Scaphoid Non-Union in Children: A Case Presentation and Review of the Literature
Authors: Ilja Käch, Abdul R. Jandali, Nadja Zechmann-Müller
Abstract:
Introduction: We discuss the treatment of two young male patients suffering from scaphoid non-union after a traumatic scaphoid fracture. The currently propagated techniques for treating a scaphoid non-union in children are either the operative reconstruction of the scaphoid or the conservative treatment with splinting in a scaphoid cast. Cases: In the first case, we operated on a 13 years old male patient with a posttraumatic scaphoid non-union in the middle third with a humpback deformity. We resected the middle third of the scaphoid and grafted the defect with an iliac crest bone, and the DISI-Deformity was reduced. Fixation was performed with K-Wires and immobilisation in a scaphoid cast. In the second case a 13 years old male patient also with a posttraumatic scaphoid non-union in the middle third and humpback deformity, DISI-deformity, was treated conservatively. Immobilisation in a scaphoid cast for four months was performed. Results: Operative: One year postoperatively the patient achieved a painless free arc of motion. Flexion/Extension 70/0/60°, Radial-/Ulnarduction 30/0/30° and Pro-/Supination 90/0/90°. The computer tomogram showed complete consolidation and bony fusion of the iliac crest bone. Conservative: Six to eight months after conservative treatment the patient demonstrated painless motion and AROM Flexion/Extension 80/0/80°, Radial-/Ulnarduction and Pro-/Supination in maximum range. Complete consolidation in the computer tomogram with persistent humpback- and DISI deformity. Conclusion: In the literature, both techniques are described, either the operative scaphoid reconstruction or the conservative treatment with splinting. In our cases, both the operative and conservative treatments showed comparable good results. However, the humpback- and DISI deformity can only be addressed with a surgical approach.Keywords: scaphoid, non-union, trauma, operative vs. non operative
Procedia PDF Downloads 771659 Internet Purchases in European Union Countries: Multiple Linear Regression Approach
Authors: Ksenija Dumičić, Anita Čeh Časni, Irena Palić
Abstract:
This paper examines economic and Information and Communication Technology (ICT) development influence on recently increasing Internet purchases by individuals for European Union member states. After a growing trend for Internet purchases in EU27 was noticed, all possible regression analysis was applied using nine independent variables in 2011. Finally, two linear regression models were studied in detail. Conducted simple linear regression analysis confirmed the research hypothesis that the Internet purchases in analysed EU countries is positively correlated with statistically significant variable Gross Domestic Product per capita (GDPpc). Also, analysed multiple linear regression model with four regressors, showing ICT development level, indicates that ICT development is crucial for explaining the Internet purchases by individuals, confirming the research hypothesis.Keywords: European union, Internet purchases, multiple linear regression model, outlier
Procedia PDF Downloads 3031658 Environmental Impacts on Urban Agriculture in Algiers
Authors: Sara Bouzekri, Said Madani
Abstract:
In many Mediterranean cities such as Algiers, the human activity, the strong mobility the urban sprawl, the air pollution, the problems of waste management, the wasting of the resources and the degradation of the environment weaken in an unquestionable way the farming. The question of sustainable action vis-a-vis these threats arises then in order to maintain a level of desired local development. The methodology is based on a multi-criteria method based on the AFOM diagnosis, which classifies agricultural strength indicators and those of threat, according to an analytical approach. In a sustainable development perspective, it will be appropriate to link the threat factors of the case study with the factors of climate change to see their impact on the future of agriculture. This will be accompanied by a SWOT analysis, which crosses the most significant criteria to arrive at the necessary recommendations based on future projects for urban agriculture.Keywords: Algiers, environment, urban agriculture, threat factors
Procedia PDF Downloads 300