Search results for: aggressive behavior prevention
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 8069

Search results for: aggressive behavior prevention

7439 Graphene-Based Nanocomposites as Ecofriendly Antifouling Surfaces

Authors: Mohamed S. Selim, Nesreen A. Fatthallah, Shimaa A. Higazy, Zhifeng Hao, Xiang Chen

Abstract:

After the prohibition of tin-based fouling-prevention coatings in 2003, the researchers were directed toward eco-friendly coatings. Because of their nonstick, environmental, and economic benefits, foul-release nanocoatings have received a lot of attention. They use physical anti-adhesion terminology to deter any fouling attachment.Natural bioinspired surfaces have micro/nano-roughness and low surface free energy features, which may inspire the design of dynamic antifouling coatings. Graphene-based nanocomposite surfaces were designed to combat marine-fouling adhesion with ecological as well as eco-friendly effects rather than biocidal solutions. Polymer–graphenenanofiller hybrids are a novel class of composite materials in fouling-prevention applications. The controlled preparation of nanoscale orientation, arrangement, and direction along the composite building blocks would result in superior fouling prohibition. This work representsfoul-release nanocomposite top coats for marine coating applications with superhydrophobicity, surface inertness against fouling adherence, cost-effectiveness, and increased lifetime.

Keywords: foul-release nanocoatings, graphene-based nanocomposite, polymer, nanofillers

Procedia PDF Downloads 135
7438 Assessment of Seismic Behavior of Masonry Minarets by Discrete Element Method

Authors: Ozden Saygili, Eser Cakti

Abstract:

Mosques and minarets can be severely damaged as a result of earthquakes. Non-linear behavior of minarets of Mihrimah Sultan and Süleymaniye Mosques and the minaret of St. Sophia are analyzed to investigate seismic response, damage and failure mechanisms of minarets during earthquake. Selected minarets have different height and diameter. Discrete elements method was used to create the numerical minaret models. Analyses were performed using sine waves. Two parameters were used for evaluating the results: the maximum relative dislocation of adjacent drums and the maximum displacement at the top of the minaret. Both parameters were normalized by the drum diameter. The effects of minaret geometry on seismic behavior were evaluated by comparing the results of analyses.

Keywords: discrete element method, earthquake safety, nonlinear analysis, masonry structures

Procedia PDF Downloads 305
7437 A Memristive Device with Intrinsic Rectification Behavior and Performace of Crossbar Arrays

Authors: Yansong Gao, Damith C.Ranasinghe, Siad F. Al-Sarawi, Omid Kavehei, Derek Abbott

Abstract:

Passive crossbar arrays is in principle the simplest functional electrical circuit, together with memristive device in cross-point, holding great promise in future high-density, non-volatile memories. However, the greatest problem of crossbar array is the sneak path current. In this paper, we investigate one type of memristive device with intrinsic rectification behavior to address the sneak path currents. Firstly, a SPICE behavior model written in Verilog-A language of the memristive device is presented to fit experimental data published in literature. Next, systematic performance simulations including read margin and power consumption of crossbar array, which uses the self-rectifying memristive device as storage element at cross-point, with respect to different crossbar sizes, interconnect resistance, ratio of HRS/LRS (High Resistance State/ Low Resistance State), rectification ratio and different read schemes are conducted. Subsequently, Trade-offs among reading margin, power consumption, and reading schemes are analyzed to provide guidelines for circuit design. Finally, performance comparison between the memristive device with/without intrinsic rectification behavior is given to show the worthiness of this intrinsic rectification behavior.

Keywords: memristive device, memristor, crossbar, RRAM, read margin, power consumption

Procedia PDF Downloads 434
7436 Lived Experiences and Perspectives of Adult Survivors of Incest-Related Childhood Sexual Abuse

Authors: Varsha Puri, Sharon Hudson, Ian Kim

Abstract:

Background: Incest-related childhood sexual abuse (IRCSA) is challenging to study due to the shame and secrecy experienced by its survivors. Ramifications of IRCSA worsen when it is unidentified, and interventions are not made. IRCSA perspectives are essential for future prevention and intervention strategies. However, there is limited understanding of this population’s experiences, perspectives, and long-term struggles. To date, research for IRCSA has utilized data from treatment programs and qualitative research with cohorts of 10-20 people, much of the data is from 10-40 years prior. Methods. In June 2018, an anonymous online survey was posted to multiple social media sites (e.g., Facebook IRCSA groups) and sexual abuse resource sites. Survey responses were collected for a year. The survey collected non-identifying demographics, IRCSA experiences, and outcomes data. Results: We obtained 1310 completed surveys. Demographics of all ages, racial backgrounds, financial backgrounds, and genders were obtained; the majority identified as white (81%) and female (76%). Childhood sexual abuse (CSA) started before the age of 6 in 49% and was endured for more than one year in 84% of respondents, and 39% reported ten or more years of abuse. CSA by multiple perpetrators occurred in 58%, while 8% had ten or more perpetrators. CSA by perpetrators under 21 years old was reported by 46%. Female perpetrators were reported by 28% of respondents. Fathers were the highest reported sexual abusers at 60%, and mothers were reported at 17%. Only 16% reported that at least one of their perpetrators was prosecuted for sexual abuse of a minor. Respondents confirmed that 54% of the time, they informed an adult of the abuse; only 2% agreed that “an intervention was made by the family that protected me.” A majority reported that IRCSA has negatively impacted their intimate/sexual relationships (96%) and mental health (96%). A majority reported negative impacts on biological family relationships (88%), physical health (73%), finances (59%), educational achievement (57%), and employment (56%). When asked about suffering from addiction, 85% of respondents answered yes. Prevention strategies selected most by respondents include early school education around CSA prevention (67%), removing the statute of limitations for reporting CSA (69%), and improved laws protecting IRCSA survivors (63%). Conclusion: The data document that IRCSA can be pervasive, and the dearth of intervention and support for survivors have major lasting impacts. Survivors have a unique and valuable perspective on what interventions are needed to prevent IRCSA and support survivors; their voice has long been unheard in crafting prevention and intervention policies and services. These results thus provide an important call to action from these critical stakeholders. Pediatricians should recognize that perpetrators can be pediatric patients, women, and parents. Pediatricians can advocate for more early CSA prevention education and policy changes that remove the statute of limitations for reporting CSA.

Keywords: incest, childhood sexual abuse, incest-related childhood sexual abuse, incest survivor

Procedia PDF Downloads 87
7435 Discrete Element Modeling of the Effect of Particle Shape on Creep Behavior of Rockfills

Authors: Yunjia Wang, Zhihong Zhao, Erxiang Song

Abstract:

Rockfills are widely used in civil engineering, such as dams, railways, and airport foundations in mountain areas. A significant long-term post-construction settlement may affect the serviceability or even the safety of rockfill infrastructures. The creep behavior of rockfills is influenced by a number of factors, such as particle size, strength and shape, water condition and stress level. However, the effect of particle shape on rockfill creep still remains poorly understood, which deserves a careful investigation. Particle-based discrete element method (DEM) was used to simulate the creep behavior of rockfills under different boundary conditions. Both angular and rounded particles were considered in this numerical study, in order to investigate the influence of particle shape. The preliminary results showed that angular particles experience more breakages and larger creep strains under one-dimensional compression than rounded particles. On the contrary, larger creep strains were observed in he rounded specimens in the direct shear test. The mechanism responsible for this difference is that the possibility of the existence of key particle in rounded particles is higher than that in angular particles. The above simulations demonstrate that the influence of particle shape on the creep behavior of rockfills can be simulated by DEM properly. The method of DEM simulation may facilitate our understanding of deformation properties of rockfill materials.

Keywords: rockfills, creep behavior, particle crushing, discrete element method, boundary conditions

Procedia PDF Downloads 310
7434 Synthesis and Evaluation of Antioxidant Behavior of Some Indole-Based Melatonin Derivatives

Authors: Eddy Neuhaus, Hanif Shirinzadeh, Cigdem Karaaslan, Elif Ince, Hande Gurer-Orhan, Sibel Suzen

Abstract:

Reactive oxygen species (ROS) and oxidative stress can cause fatal damage to essential cell structures, including DNA. It is known that use of antioxidants could be advantageous in the prevention of various diseases such as cancer, cardiovascular diseases and neurodegenerative disorders. Since antioxidant properties of the indole ring-containing melatonin (MLT) has been described and evaluated, MLT-related compounds such as MLT metabolites and synthetic analogues are under investigation to determine which exhibit the highest activity with the lowest side-effects. Owing to indole and hydrazones appealing physiological properties and are mostly found in numerous biologically active compounds a series of indole-7-carbaldehyde hydrazone derivatives were synthesized, characterized and in vitro antioxidant activity was investigated by evaluating their reducing effect against oxidation of a redox-sensitive fluorescent probe. Cytotoxicity potential of all indole-based MLT analogues was investigated both by lactate dehydrogenase leakage assay and by MTT assay. This work was supported by The Scientific and Technological Research Council of Turkey (TÜBİTAK) Research and Development Grant 112S599.

Keywords: melatonin, antioxidant activity, indole, hydrazone, oxidative stress

Procedia PDF Downloads 478
7433 Managing the Baltic Sea Region Resilience: Prevention, Treatment Actions and Circular Economy

Authors: J. Burlakovs, Y. Jani, L. Grinberga, M. Kriipsalu, O. Anne, I. Grinfelde, W. Hogland

Abstract:

The worldwide future sustainable economies are oriented towards the sea: the maritime economy is becoming one of the strongest driving forces in many regions as population growth is the highest in coastal areas. For hundreds of years sea resources were depleted unsustainably by fishing, mining, transportation, tourism, and waste. European Sustainable Development Strategy is identifying and developing actions to enable the EU to achieve a continuous, long-term improvement of the quality of life through the creation of sustainable communities. The aim of this paper is to provide insight in Baltic Sea Region case studies on implemented actions on tourism industry waste and beach wrack management in coastal areas, hazardous contaminants and plastic flow treatment from waste, wastewaters and stormwaters. These projects mentioned in study promote successful prevention of contaminant flows to the sea environments and provide perspectives for creation of valuable new products from residuals for future circular economy are the step forward to green innovation winning streak.

Keywords: resilience, hazardous waste, phytoremediation, water management, circular economy

Procedia PDF Downloads 168
7432 Internet Usage Behavior on Mobile Phones of the Faculty of Management Science Students at Suan Sunandha Rajabhat University

Authors: Arpapron Phokajang

Abstract:

The objectives of this research were to study the internet usage, including; date, time, description of using service, network service, telephone charge, and to study the internet usage behavior on mobile phones of the Faculty of Management Science students at Suan Sunandha Rajabhat University. The samples consisted of 395 students from the Faculty of Management Science. Questionnaires were used for collecting the data. Descriptive statistics used in this research including percentage, mean, and standard deviation. The findings of this research found that most respondents were female, aged between 21 and 25 years old, used the monthly AIS network service calls on Monday to Friday around 6.01-12.00 p.m., the internet usage behavior on mobile phones for entertainment was found in the highest level in all aspects, and education, business and commerce, and communication were found in the moderate level and using the internet to watch YouTube in the highest level also.

Keywords: faculty of management science, internet usage behavior, mobile phones, Suan Sunandha Rajabhat University

Procedia PDF Downloads 237
7431 Ethical Considerations for Conducting Research on Violence against Women with Disabilities: Discussing Issues of Reasonable Accommodation, Capacity and Equal Participation

Authors: Ingrid Van Der Heijden, Naeemah Abrahams, Jane Harries

Abstract:

Background: Women with disabilities are largely missing from global research on violence prevention, yet research shows that women with disabilities are a particularly marginalised group who experience heightened levels and unique forms of violence than men with disabilities, and women without disabilities. They face heightened stigma, discrimination, and violence due to their gender and their disability. Including women with disabilities in violence, research helps inform policy and prevention interventions that are relevant and inclusive. To ensure their inclusion in violence research, we need ethical guidelines that are sensitive to their heightened risk and vulnerability, that recognize the diversity in the disabled population, but that also promote disabled people’s agency in defining their own violence prevention needs and agendas. Objective: To highlight pertinent ethical issues around women with disabilities’ inclusion and participation in violence research. Methodology: Considering the lack of formalized guidelines for research of people with disabilities, we draw from the literature on international ethics guidelines for researching violence against women, and the Emancipatory Disability Research paradigm, as well as drawing from our own experiences from the field in applying the guidelines when doing research with disabled women. Findings: Following the guiding ethical principles of respect, benefit, justice, and do no harm, we argue that reasonable accommodation, capacity, and equal participation need to be considered in conceptualizing and conducting ethical violence research with women with disabilities. We conclude that disability research in the area of violence is highly politicized and must be carefully scrutinized to ensure justice and the contribution of women with disabilities to their own welfare. Implications: We suggest that these issues are practically applied in the field and tested and critiqued to enhance best practice for undertaking ethical research with this particular group. It is important that not only researchers and ethics committees, but also disabled women and disabled organizations, are involved in enhancing and formalizing ethical research guidelines for marginalized populations.

Keywords: capacity, emancipatory disability research paradigm equal participation, reasonable accommodation, research ethics, violence against women with disabilities

Procedia PDF Downloads 331
7430 The Legal Position of Criminal Prevention in the Metaverse World

Authors: Andi Intan Purnamasari, Supriyadi, Sulbadana, Aminuddin Kasim

Abstract:

Law functions as social control. Providing arrangements not only for legal certainty, but also in the scope of justice and expediency. The three values ​​achieved by law essentially function to bring comfort to each individual in carrying out daily activities. However, it is undeniable that global conditions have changed the orientation of people's lifestyles. Some people want to ensure their existence in the digital world which is popularly known as the metaverse. Some countries even project their city to be a metaverse city. The order of life is no longer limited to the real space, but also to the cyber world. Not infrequently, legal events that occur in the cyber world also force the law to position its position and even prevent crime in cyberspace. Through this research, conceptually it provides a view of the legal position in crime prevention in the Metaverse world. when the law acts to regulate the situation in the virtual world, of course some people will feel disturbed, this is due to the thought that the virtual world is a world in which an avatar can do things that cannot be done in the real world, or can be called a world without boundaries. Therefore, when the law is present to provide boundaries, of course the concept of the virtual world itself becomes no longer a cyber world that is not limited by space and time, it becomes a new order of life. approach, approach, approach, approach, and approach will certainly be the method used in this research.

Keywords: crime, cyber, metaverse, law

Procedia PDF Downloads 144
7429 Behavior of Reinforced Concrete Structures Subjected to Multiple Floor Fire Loads

Authors: Suresh Narayana, Chaitanya Akkannavar

Abstract:

Assessment of behavior of reinforced concrete structures subjected to fire load, and its behavior for the multi-floor fire have been presented in this paper. This research is the part of the study to evaluate the performance of ten storied RC structure when it is subjected to fire loads at multiple floors and to evaluate the post-fire effects on structure such as deflection and stresses occurring due to combined effect of static and thermal loading. Thermal loading has been assigned to different floor levels to estimate the critical floors that initiate the collapse of the structure. The structure has been modeled and analyzed in Solid Works and commercially available Finite Element Software ABAQUS. Results are analyzed, and particular design solution has been suggested.

Keywords: collapse mechanism, fire analysis, RC structure, stress vs temperature

Procedia PDF Downloads 465
7428 Interactions between Residential Mobility, Car Ownership and Commute Mode: The Case for Melbourne

Authors: Solmaz Jahed Shiran, John Hearne, Tayebeh Saghapour

Abstract:

Daily travel behavior is strongly influenced by the location of the places of residence, education, and employment. Hence a change in those locations due to a move or changes in an occupation leads to a change in travel behavior. Given the interventions of housing mobility and travel behaviors, the hypothesis is that a mobile housing market allows households to move as a result of any change in their life course, allowing them to be closer to central services, public transport facilities and workplace and hence reducing the time spent by individuals on daily travel. Conversely, household’s immobility may lead to longer commutes of residents, for example, after a change of a job or a need for new services such as schools for children who have reached their school age. This paper aims to investigate the association between residential mobility and travel behavior. The Victorian Integrated Survey of Travel and Activity (VISTA) data is used for the empirical analysis. Car ownership and journey to work time and distance of employed people are used as indicators of travel behavior. Change of usual residence within the last five years used to identify movers and non-movers. Statistical analysis, including regression models, is used to compare the travel behavior of movers and non-movers. The results show travel time, and the distance does not differ for movers and non-movers. However, this is not the case when taking into account the residence tenure-type. In addition, car ownership rate and number found to be significantly higher for non-movers. It is hoped that the results from this study will contribute to a better understanding of factors other than common socioeconomic and built environment features influencing travel behavior.

Keywords: journey to work, regression models, residential mobility, commute mode, car ownership

Procedia PDF Downloads 129
7427 Management Systems as a Tool to Limit the End-Users Impacts on Energy Savings Achievements

Authors: Margarida Plana

Abstract:

The end-users behavior has been identified in the last years as one of the main responsible for the success degree of the energy efficiency improvements. It is essential to create tools to limit their impact on the final consumption. This paper is focused on presenting the results of the analysis developed on the basis of real projects’ data in order to quantify the impact of end-users behavior. The analysis is focused on how the behavior of building’s occupants can vary the achievement of the energy savings targets and how they can be limited. The results obtained show that the management systems are one of the main tools available to control and limit the end-users interaction with the equipment operation. In fact, the results will present the management systems as ‘a must’ on any energy efficiency project.

Keywords: end-users impacts, energy efficiency, energy savings, management systems

Procedia PDF Downloads 254
7426 5iD Viewer: Observation of Fish School Behaviour in Labyrinths and Use of Semantic and Syntactic Entropy for School Structure Definition

Authors: Dalibor Štys, Kryštof M. Stys, Maryia Chkalova, Petr Kouba, Aliaxandr Pautsina, Dalibor Štys Jr., Jana Pečenková, Denis Durniev, Tomáš Náhlík, Petr Císař

Abstract:

In this article, a construction and some properties of the 5iD viewer, the system recording simultaneously five views of a given experimental object is reported. Properties of the system are demonstrated on the analysis of fish schooling behavior. It is demonstrated the method of instrument calibration which allows inclusion of image distortion and it is proposed and partly tested also the method of distance assessment in the case that only two opposite cameras are available. Finally, we demonstrate how the state trajectory of the behavior of the fish school may be constructed from the entropy of the system.

Keywords: 3D positioning, school behavior, distance calibration, space vision, space distortion

Procedia PDF Downloads 381
7425 A Comprehensive Approach to Mitigate Return-Oriented Programming Attacks: Combining Operating System Protection Mechanisms and Hardware-Assisted Techniques

Authors: Zhang Xingnan, Huang Jingjia, Feng Yue, Burra Venkata Durga Kumar

Abstract:

This paper proposes a comprehensive approach to mitigate ROP (Return-Oriented Programming) attacks by combining internal operating system protection mechanisms and hardware-assisted techniques. Through extensive literature review, we identify the effectiveness of ASLR (Address Space Layout Randomization) and LBR (Last Branch Record) in preventing ROP attacks. We present a process involving buffer overflow detection, hardware-assisted ROP attack detection, and the use of Turing detection technology to monitor control flow behavior. We envision a specialized tool that views and analyzes the last branch record, compares control flow with a baseline, and outputs differences in natural language. This tool offers a graphical interface, facilitating the prevention and detection of ROP attacks. The proposed approach and tool provide practical solutions for enhancing software security.

Keywords: operating system, ROP attacks, returning-oriented programming attacks, ASLR, LBR, CFI, DEP, code randomization, hardware-assisted CFI

Procedia PDF Downloads 85
7424 Hotel Customers’ Attitudes towards Service Marketing Mix, Service Behavior, and Perceived Brand Value

Authors: Trikhun Rotkasem

Abstract:

This research paper aimed to investigate hotel customers’ attitudes towards the service marketing, service behavior and perceived brand value. The focus of the study was on the Suan Sunandha Rajabhat University’s hotel. It is a small hotel which aims to provide service to mainly university’s guests. A simple random sampling technique was conducted to obtain a sample group that included 200 respondents. The research question was established as follows: What are customers’ attitudes towards the service marketing mix of hotel customers? The findings revealed the respondents’ attitudes towards the service marketing mix indicated high level in the area of product, place or distribution channel, people, and physical evidence, whereas, the respondents’ attitude towards the service marketing mix indicated medium level in the area of price, promotion, and process.

Keywords: marketing mix, perceived brand value, service behavior, hotel customers

Procedia PDF Downloads 431
7423 Understanding Sixteen Basic Desires and Modern Approaches to Agile Team Motivation: Case Study

Authors: Anna Suvorova

Abstract:

Classical motivation theories hold that there are two kinds of motivation, intrinsic and extrinsic. Leaders are looking for effective motivation techniques, but frequently external influences do not work or, even worse, reduce team productivity. We see only the tip of the iceberg -human behavior. However, beneath the surface of the water are factors that directly affect our behavior -desires. Believing that employees need to be motivated, companies design a motivation system based on the principle: do it and get a reward. As a matter of fact, we all have basic desires. Everybody is motivated but to different extents. Following the principle "intrinsic motivation over extrinsic rewards", we need to create an environment that will support intrinsic motivation and potential of employees, and team, rather than individual work.

Keywords: motivation profile, motivation techniques, agile HR, basic desires, agile people, human behavior, people management

Procedia PDF Downloads 107
7422 An Advanced Exponential Model for Seismic Isolators Having Hardening or Softening Behavior at Large Displacements

Authors: Nicolò Vaiana, Giorgio Serino

Abstract:

In this paper, an advanced Nonlinear Exponential Model (NEM), able to simulate the uniaxial dynamic behavior of seismic isolators having a continuously decreasing tangent stiffness with increasing displacement in the relatively large displacements range and a hardening or softening behavior at large displacements, is presented. The mathematical model is validated by comparing the experimental force-displacement hysteresis loops obtained during cyclic tests, conducted on a helical wire rope isolator and a recycled rubber-fiber reinforced bearing, with those predicted analytically. Good agreement between the experimental and simulated results shows that the proposed model can be an effective numerical tool to predict the force-displacement relationship of seismic isolation devices within the large displacements range. Compared to the widely used Bouc-Wen model, unable to simulate the response of seismic isolators at large displacements, the proposed one allows to avoid the numerical solution of a first order nonlinear ordinary differential equation for each time step of a nonlinear time history analysis, thus reducing the computation effort. Furthermore, the proposed model can simulate the smooth transition of the hysteresis loops from small to large displacements by adopting only one set of five parameters determined from the experimental hysteresis loops having the largest amplitude.

Keywords: base isolation, hardening behavior, nonlinear exponential model, seismic isolators, softening behavior

Procedia PDF Downloads 319
7421 The Development of a Cyber Violence Measurement Tool for Youths: A Multi-Reporting of Ecological Factors

Authors: Jong-Hyo Park, Eunyoung Choi, Jae-Yeon Lim, Seon-Suk Lee, Yeong-Rong Koo, Ji-Ung Kwon, Kyung-Sung Kim, Jong-Ik Lee, Juhan Park, Hyun-Kyu Lee, Won-Kyoung Oh, Jisang Lee, Jiwon Choe

Abstract:

Due to COVID-19, cyber violence among youths has soared as they spend more time online than before. In contrast to the deepening concerns, measurement tools that can assess the vulnerability of cyber violence in individual youths still need to be supplemented. The measurement tools lack consideration of various factors related to cyber violence among youths. Most of the tools are self-report questionnaires, and these adolescents' self-report questionnaire forms can underestimate the harmful behavior and overestimate the damage experience. Therefore, this study aims to develop a multi-report measurement tool for youths that can reliably measure individuals' ecological factors related to cyber violence. The literature review explored factors related to cyber violence, and the questions were constructed. The face validity of the questions was confirmed by conducting focus group interviews. Exploratory and confirmatory factor analyses (N=671) were also conducted for statistical validation. This study developed a multi-report measurement tool for cyber violence with 161 questions, consisting of six domains: online behavior, cyber violence awareness, victimization-perpetration-witness experience, coping efficacy (individuals, peers, teachers, and parents), psychological characteristics, and pro-social capabilities. In addition to self-report from a youth respondent, this measurement tool includes peers, teachers, and parents reporting for the respondent. It is possible to reliably measure the ecological factors of individual youths who are vulnerable or highly resistant to cyber violence. In schools, teachers could refer to the measurement results for guiding students, better understanding their cyber violence conditions, and assessing their pro-social capabilities. With the measurement results, teachers and police officers could detect perpetrators or victims and intervene immediately. In addition, this measurement tool could analyze the effects of the prevention and intervention programs for cyber violence and draw appropriate suggestions.

Keywords: adolescents, cyber violence, cyber violence measurement tool, measurement tool, multi-report measurement tool, youths

Procedia PDF Downloads 96
7420 The Effect of Music on Consumer Behavior

Authors: Lara Ann Türeli, Özlem Bozkurt

Abstract:

There is a biochemical component to listening to music. The type of music listened to can lead to different levels of neurotransmitter and biochemical activity within the brain, resulting in brain stimulation and different moods. Therefore, music plays an important role in neuromarketing and consumer behavior. The quality of a commercial can be measured by the effect the music has on its audience. Thus, understanding how music can affect the brain can provide better marketing strategies for all businesses. The type of music used plays an important role in how a person responds to certain experiences. In the context of marketing and consumer behavior, music can determine whether a person will be intrigued to buy something. Depending on the type of music listened to by an individual; the music may trigger the release of pleasurable neurotransmitters such as dopamine. Dopamine is a neurotransmitter that plays an important role in reward pathways in the brain. When an individual experiences a pleasurable activity, increased levels of dopamine are produced, eventually leading to the formation of new reward pathways. Consequently, the increased dopamine activity within the brain triggered by music can result in new reward pathways along the dopamine pathways in the brain. Selecting pleasurable music for commercials can result in long-term brain stimulation, increasing consumerism. The effect of music on consumerism should be considered not only in commercials but also in the atmosphere it creates within stores. The type of music played in a store can affect consumer behavior and intention. Specifically, the rhythm, pitch, and pace of music can contribute to the mood of the song. The background music in a store can determine the consumer’s emotional presence and consequently affect their intentions. In conclusion, understanding the physiological, psychological, and neurochemical basis of the effect of music on brain stimulation is essential to understand consumer behavior. The role of dopamine in the formation of reward pathways as a result of music directly contributes to consumer behavior and the tendency of a commercial or store to leave a long-term effect on the consumer. The careful consideration of the pitch, pace, and rhythm of a song in the selection of music can not only help companies predict the behavior of a consumer but also determine the behavior of a consumer.

Keywords: sensory processing, neuropsychology, dopamine, neuromarketing

Procedia PDF Downloads 71
7419 Pressure Sensitive v/s Pressure Resistance Institutional Investors towards Socially Responsible Investment Behavior: Evidence from Malaysia

Authors: Mohammad Talha, Abdullah Sallehhuddin Abdullah Salim, Abdul Aziz Abdul Jalil, Norzarina Md Yatim

Abstract:

The significant contribution of institutional investors across the globe in socially responsible investment (SRI) is well-documented in the literature. Nevertheless, how the SRI behavior of pressure-resistant, pressure-sensitive and pressure-indeterminate institutional investors remain unexplored extensively. This study examines the moderating effect of institutional investors towards socially responsible investment behavior in the context of emerging economies. This study involved 229 institutional investors in Malaysia. A total of 1,145 questionnaires were distributed. Out of these, 308 (130 pressure sensitive institutional investors and 178 pressure resistant institutional investors), representing a usable rate of 26.9 per cent, were found fit for data analysis. Utilizing multi-group analysis via AMOS, this study found evidence for the presence of moderating effect by a type of institutional investor topology in socially responsible investment behavior. At intentional level, it established that type of institutional investor was a significant moderator in the relationship between subjective norms, and caring ethical climate with intention among pressure-resistant institutional investors, as well as between perceived behavioral controls with intention among pressure-sensitive institutional investors. At the behavioral level, the results evidenced that there was only a significant moderating effect between intention and socially responsible investment behavior among pressure-resistant institutional investors. The outcomes are expected to benefit policy makers, regulators, and market participants in order to leap forward SRI growth in developing economies. Nevertheless, the outcomes are limited to a few factors, and it is believed that future studies shall address those limitations.

Keywords: socially responsible investment, behavior, pressure sensitive investors, pressure insensitive investors, Institutional Investment Malaysia

Procedia PDF Downloads 355
7418 The Study of Thai Consumer Behavior toward Buying Goods on the Internet

Authors: Pichamon Chansuchai

Abstract:

The study of Thai consumer behavior toward buying goods on the Internet is a survey research. The five-level rating scale and open-ended questionnaire are applied for this research procedure, which has more than 400 random sampling of Thai people aged between 15-40 years old. The summary findings are: The analysis of respondents profile were female 55.3% and male 44.8% , 35.3% aged between 20-30 years old, had been employed 29.5% with average income up to 11,000 baht/month 50.2% and expenditure more than 11,000 baht per month 29.3%. The internet usage behavior of respondents mostly found that objectives of the internet usage are: 1) Communication 93.3% 2) the categories of websites usage was trading 42.8% 3) The marketing mix effected to trading behavior via internet which can be analyzed in term of marketing factor as following: Product focused on product quality was the most influenced factor with average value 4.75. The cheaper price than overview market was the most effect factor to internet shopping with mean value 4.53. The average value 4.67 of the available place that could reduce spending time for shopping. The effective promotion of the buy 1 get 1 was the stimulus factor for internet shopping with mean value 4.60. For hypothesis testing, the different sex has relationship with buying decision. It presented that male and female have vary purchasing decision via internet with value of significant difference 0.05. Furthermore, the variety occupations of respondents related to the use of selected type of website. It also found that the vary of personal occupation effected to the type of website selection dissimilar with value of significant difference 0.05.

Keywords: behavior, internet, consumer, goods

Procedia PDF Downloads 245
7417 Prevalence of Drug Injection among Male Prisoners in the West of Iran

Authors: Farzad Jalilian, Mehdi Mirzaei Alavijeh

Abstract:

Background: Substance addiction is one of the major worldwide problems that destroys economy, familial relationships, and the abuser’s career and has several side effects; in the meantime drug injection due to the possibility of shared use of syringes among drug users could have multiple complications to be followed. The purpose of this study was to determine the prevalence of drug injection among male prisoners in Kermanshah city, the west of Iran. Methods: In this cross-sectional study 615 male prisoners were randomly selected to participate voluntarily in the study. Participants filled out a writing self-report questionnaire. Data were analyzed by the SPSS software (ver. 21.0) at 95% significant level. Results: The mean age of respondents was 31.13 years [SD: 7.76]. Mean initiation age for drug use was 14.36 years (range, 9-34 years). Almost, 39.4 % reported a history of drug use before prison. Opium (33.2%) and crystal (27.1%) was the most used drug among prisoners. Furthermore, 9.3 % had a history of injection addiction. There was a significant correlation between age, crime type, marital status, economic status, unprotected sex and drug injection (P < 0.05). Conclusion: The low age of drug abuse and the prevalence of drug injection among offenders can be as a warning for responsible; in this regard, implementation of prevention programs to risky behavior and harm reduction among high-risk groups can follow useful results.

Keywords: substance abuse, drug injection, prison, Iran

Procedia PDF Downloads 479
7416 Analysis and Design Modeling for Next Generation Network Intrusion Detection and Prevention System

Authors: Nareshkumar Harale, B. B. Meshram

Abstract:

The continued exponential growth of successful cyber intrusions against today’s businesses has made it abundantly clear that traditional perimeter security measures are no longer adequate and effective. We evolved the network trust architecture from trust-untrust to Zero-Trust, With Zero Trust, essential security capabilities are deployed in a way that provides policy enforcement and protection for all users, devices, applications, data resources, and the communications traffic between them, regardless of their location. Information exchange over the Internet, in spite of inclusion of advanced security controls, is always under innovative, inventive and prone to cyberattacks. TCP/IP protocol stack, the adapted standard for communication over network, suffers from inherent design vulnerabilities such as communication and session management protocols, routing protocols and security protocols are the major cause of major attacks. With the explosion of cyber security threats, such as viruses, worms, rootkits, malwares, Denial of Service attacks, accomplishing efficient and effective intrusion detection and prevention is become crucial and challenging too. In this paper, we propose a design and analysis model for next generation network intrusion detection and protection system as part of layered security strategy. The proposed system design provides intrusion detection for wide range of attacks with layered architecture and framework. The proposed network intrusion classification framework deals with cyberattacks on standard TCP/IP protocol, routing protocols and security protocols. It thereby forms the basis for detection of attack classes and applies signature based matching for known cyberattacks and data mining based machine learning approaches for unknown cyberattacks. Our proposed implemented software can effectively detect attacks even when malicious connections are hidden within normal events. The unsupervised learning algorithm applied to network audit data trails results in unknown intrusion detection. Association rule mining algorithms generate new rules from collected audit trail data resulting in increased intrusion prevention though integrated firewall systems. Intrusion response mechanisms can be initiated in real-time thereby minimizing the impact of network intrusions. Finally, we have shown that our approach can be validated and how the analysis results can be used for detecting and protection from the new network anomalies.

Keywords: network intrusion detection, network intrusion prevention, association rule mining, system analysis and design

Procedia PDF Downloads 223
7415 HBTOnto: An Ontology Model for Analyzing Human Behavior Trajectories

Authors: Heba M. Wagih, Hoda M. O. Mokhtar

Abstract:

Social Network has recently played a significant role in both scientific and social communities. The growing adoption of social network applications has been a relevant source of information nowadays. Due to its popularity, several research trends are emerged to service the huge volume of users including, Location-Based Social Networks (LBSN), Recommendation Systems, Sentiment Analysis Applications, and many others. LBSNs applications are among the highly demanded applications that do not focus only on analyzing the spatiotemporal positions in a given raw trajectory but also on understanding the semantics behind the dynamics of the moving object. LBSNs are possible means of predicting human mobility based on users social ties as well as their spatial preferences. LBSNs rely on the efficient representation of users’ trajectories. Hence, traditional raw trajectory information is no longer convenient. In our research, we focus on studying human behavior trajectory which is the major pillar in location recommendation systems. In this paper, we propose an ontology design patterns with their underlying description logics to efficiently annotate human behavior trajectories.

Keywords: human behavior trajectory, location-based social network, ontology, social network

Procedia PDF Downloads 445
7414 Bearing Behavior of a Hybrid Monopile Foundation for Offshore Wind Turbines

Authors: Zicheng Wang

Abstract:

Offshore wind energy provides a huge potential for the expansion of renewable energies to the coastal countries. High demands are required concerning the shape and type of foundations for offshore wind turbines (OWTs) to find an economically, technically and environmentally-friendly optimal solution. A promising foundation concept is the hybrid foundation system, which consists of a steel plate attached to the outer side of a hollow steel pipe pile. In this study, the bearing behavior of a large diameter foundation is analyzed using a 3-dimensional finite element (FE) model. Non-linear plastic soil behavior is considered. The results of the numerical simulations are compared to highlight the priority of the hybrid foundation to the conventional monopile foundation.

Keywords: hybrid foundation system, mechanical parameters, plastic soil behaviors, numerical simulations

Procedia PDF Downloads 112
7413 Meta-Analysis of the Impact of Positive Psychological Capital on Employees Outcomes: The Moderating Role of Tenure

Authors: Hyeondal Jeong, Yoonjung Baek

Abstract:

This research examines the effects of positive psychological capital (or PsyCap) on employee’s outcomes (satisfaction, commitment, organizational citizenship behavior, innovation behavior and individual creativity). This study conducted a meta-analysis of articles published in the Republic of Korea. As a result, positive psychological capital has a positive effect on the behavior of employees. Heterogeneity was identified among the studies included in the analysis and the context factors were analyzed; the study proposes contextual factors such as team tenure. The moderating effect of team tenure was not statistically significant. The implications were discussed based on the analysis results.

Keywords: positive psychological capital , satisfaction, commitment, OCB, creativity, meta-analysis

Procedia PDF Downloads 310
7412 Vehicle Timing Motion Detection Based on Multi-Dimensional Dynamic Detection Network

Authors: Jia Li, Xing Wei, Yuchen Hong, Yang Lu

Abstract:

Detecting vehicle behavior has always been the focus of intelligent transportation, but with the explosive growth of the number of vehicles and the complexity of the road environment, the vehicle behavior videos captured by traditional surveillance have been unable to satisfy the study of vehicle behavior. The traditional method of manually labeling vehicle behavior is too time-consuming and labor-intensive, but the existing object detection and tracking algorithms have poor practicability and low behavioral location detection rate. This paper proposes a vehicle behavior detection algorithm based on the dual-stream convolution network and the multi-dimensional video dynamic detection network. In the videos, the straight-line behavior of the vehicle will default to the background behavior. The Changing lanes, turning and turning around are set as target behaviors. The purpose of this model is to automatically mark the target behavior of the vehicle from the untrimmed videos. First, the target behavior proposals in the long video are extracted through the dual-stream convolution network. The model uses a dual-stream convolutional network to generate a one-dimensional action score waveform, and then extract segments with scores above a given threshold M into preliminary vehicle behavior proposals. Second, the preliminary proposals are pruned and identified using the multi-dimensional video dynamic detection network. Referring to the hierarchical reinforcement learning, the multi-dimensional network includes a Timer module and a Spacer module, where the Timer module mines time information in the video stream and the Spacer module extracts spatial information in the video frame. The Timer and Spacer module are implemented by Long Short-Term Memory (LSTM) and start from an all-zero hidden state. The Timer module uses the Transformer mechanism to extract timing information from the video stream and extract features by linear mapping and other methods. Finally, the model fuses time information and spatial information and obtains the location and category of the behavior through the softmax layer. This paper uses recall and precision to measure the performance of the model. Extensive experiments show that based on the dataset of this paper, the proposed model has obvious advantages compared with the existing state-of-the-art behavior detection algorithms. When the Time Intersection over Union (TIoU) threshold is 0.5, the Average-Precision (MP) reaches 36.3% (the MP of baselines is 21.5%). In summary, this paper proposes a vehicle behavior detection model based on multi-dimensional dynamic detection network. This paper introduces spatial information and temporal information to extract vehicle behaviors in long videos. Experiments show that the proposed algorithm is advanced and accurate in-vehicle timing behavior detection. In the future, the focus will be on simultaneously detecting the timing behavior of multiple vehicles in complex traffic scenes (such as a busy street) while ensuring accuracy.

Keywords: vehicle behavior detection, convolutional neural network, long short-term memory, deep learning

Procedia PDF Downloads 122
7411 Evaluation of Mito-Uncoupler Induced Hyper Metabolic and Aggressive Phenotype in Glioma Cells

Authors: Yogesh Rai, Saurabh Singh, Sanjay Pandey, Dhananjay K. Sah, B. G. Roy, B. S. Dwarakanath, Anant N. Bhatt

Abstract:

One of the most common signatures of highly malignant gliomas is their capacity to metabolize more glucose to lactic acid than normal brain tissues, even under normoxic conditions (Warburg effect), indicating that aerobic glycolysis is constitutively upregulated through stable genetic or epigenetic changes. However, oxidative phosphorylation (OxPhos) is also required to maintain the mitochondrial membrane potential for tumor cell survival. In the process of tumorigenesis, tumor cells during fastest growth rate exhibit both high glycolytic and high OxPhos. Therefore, metabolically reprogrammed cancer cells with combination of both aerobic glycolysis and altered OxPhos develop a robust metabolic phenotype, which confers a selective growth advantage. In our study, we grew the high glycolytic BMG-1 (glioma) cells with continuous exposure of mitochondrial uncoupler 2, 4, dinitro phenol (DNP) for 10 passages to obtain a phenotype of high glycolysis with enhanced altered OxPhos. We found that OxPhos modified BMG (OPMBMG) cells has similar growth rate and cell cycle distribution but high mitochondrial mass and functional enzymatic activity than parental cells. In in-vitro studies, OPMBMG cells showed enhanced invasion, proliferation and migration properties. Moreover, it also showed enhanced angiogenesis in matrigel plug assay. Xenografted tumors from OPMBMG cells showed reduced latent period, faster growth rate and nearly five folds reduction in the tumor take in nude mice compared to BMG-1 cells, suggesting that robust metabolic phenotype facilitates tumor formation and growth. OPMBMG cells which were found radio-resistant, showed enhanced radio-sensitization by 2-DG as compared to the parental BMG-1 cells. This study suggests that metabolic reprogramming in cancer cells enhances the potential of migration, invasion and proliferation. It also strengthens the cancer cells to escape the death processes, conferring resistance to therapeutic modalities. Our data also suggest that combining metabolic inhibitors like 2-DG with conventional therapeutic modalities can sensitize such metabolically aggressive cancer cells more than the therapies alone.

Keywords: 2-DG, BMG, DNP, OPM-BMG

Procedia PDF Downloads 221
7410 Development of Interaction Factors Charts for Piled Raft Foundation

Authors: Abdelazim Makki Ibrahim, Esamaldeen Ali

Abstract:

This study aims at analysing the load settlement behavior and predict the bearing capacity of piled raft foundation a series of finite element models with different foundation configurations and stiffness were established. Numerical modeling is used to study the behavior of the piled raft foundation due to the complexity of piles, raft, and soil interaction and also due to the lack of reliable analytical method that can predict the behavior of the piled raft foundation system. Simple analytical models are developed to predict the average settlement and the load sharing between the piles and the raft in piled raft foundation system. A simple example to demonstrate the applications of these charts is included.

Keywords: finite element, pile-raft foundation, method, PLAXIS software, settlement

Procedia PDF Downloads 554