Search results for: trust message
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 1105

Search results for: trust message

355 A Case Study of Physical and Psychological Forces in the Nigerian Criminal and Military Interrogations

Authors: Onimisi Ekuh Abdullahi, Lasbat Omoshalewa Akinsemoyin

Abstract:

In Nigeria, over two decades now, there has been a steady increase in the insecurity of human lives and physical properties. In the South-South Nigeria, there is an acute insecurity of militants destroying oil pipe-lines and kidnapping cases; in the Middle-Belt zone, insecurity centers on kidnapping and in a few states crises between Herdsmen and Farmers range like wildfire; in the South-Western zone, kidnapping is vile, in the North-East zone the issue of Boko Haram has become World-wide concern, and in North-west zone, cattle rustlers and religious crisis are of great concern. At the initial stage, the Nigerian Police Force was called upon to quell the crisis. It soon became obvious that the dimension of the crisis was beyond police force. The Nigerian Armed Forces were called to maintain peace and order because the magnitude of the crisis was threatening the national unity and cohesion. The main objective of this paper, was to examine the investigative techniques of criminal by the military in Nigeria. Specifically to examine the physical and psychological force; the abusive techniques and tactics; and suggest modern psychological techniques of interrogating criminals accepted to Human Right Activists and the rule of law. The process is to create room behaviour and practices that carefully monitored the trust and reliability of admissions produced by Psychological manipulative process in Nigeria.

Keywords: military, Nigerian criminal, physical, psychological force

Procedia PDF Downloads 160
354 Senior Leadership Team Coaching in Action: Creating High-Performance Teams

Authors: Siqi Fang, Jingxi Hou

Abstract:

Positive psychology and coaching psychology share a number of fundamental assumptions and common themes. Blending positive psychology, mindfulness, and coaching psychology, our work in team coaching with leaders enhances both leadership and team effectiveness. Although individual coaching has proven to be effective, this article advocates the benefits of leadership coaching in team settings, because durable changes in leadership behaviors are more likely to occur. Does leadership team coaching really work? Does it help improve senior leadership team effectiveness and productivity? This action research study answers these questions by tracking the progress of three typical senior leadership teams consisting of 31 executives participating in a six-month team coaching program. Assessments (pre- and post), workshops, and feedback based on ego development theories and mindfulness were applied to upgrade the senior leadership teams’ transformational stages and reframe their organizational leadership cultures. Results suggest that the team effectiveness of the three leadership teams increased up to 43 percent according to post-survey feedback from superior, direct report, and peers. Discussion is offered to show that senior leadership team coaching help teams to achieve a consensus on common purposes, establish a foundation of trust, improve collective skills, and promote efficient operation. All factors translate into better team performance. Implications of the results for future executive development programs are discussed and specific recommendations are provided.

Keywords: action research, ego development, mindfulness, senior leadership team coaching, team effectiveness, transformational stages

Procedia PDF Downloads 367
353 Political Corruption and Workplace Misconduct

Authors: Masako Darrough, Mahmud Hossain, Santanu Mitra

Abstract:

The prevalent and increasing workplace misconduct in the United States presents a significant threat to social welfare. Despite efforts by enforcement agencies, U.S. workers remain vulnerable to employer exploitation, as evidenced by rising workplace injuries and discrimination lawsuits. While existing literature has identified several factors associated with unethical labor practices, the influence of political corruption remains largely unexplored. This paper aims to fill this gap by investigating the relationship between political corruption and workplace misconduct in the U.S. context. Using the data from the U.S. Bureau of Labor Statistics, the Equal Employment Opportunity Commission, and corruption convictions reported by the Department of Justice, we find a positive association between political corruption and workplace misconduct among U.S.-listed firms that are headquartered in different states from 2004 to 2022. Both unionization and stricter labor laws attenuate the positive association between corruption and unethical labor practices. Our analyses also address potential endogeneity concerns via difference-in-differences, instrumental variables, and propensity-score-matched analyses, reaffirming the robustness of our findings. This research contributes to the literature by shedding light on how corrupt political climates influence organizational operational behavior and unethical practices. It also underscores the importance of stakeholder trust and the role of regulatory frameworks and offers practical insights to policymakers by suggesting a judicious allocation of enforcement resources to more corrupt states.

Keywords: workplace misconduct, political corruption, unionization, labor law strictness

Procedia PDF Downloads 23
352 A Deep Learning Approach to Online Social Network Account Compromisation

Authors: Edward K. Boahen, Brunel E. Bouya-Moko, Changda Wang

Abstract:

The major threat to online social network (OSN) users is account compromisation. Spammers now spread malicious messages by exploiting the trust relationship established between account owners and their friends. The challenge in detecting a compromised account by service providers is validating the trusted relationship established between the account owners, their friends, and the spammers. Another challenge is the increase in required human interaction with the feature selection. Research available on supervised learning (machine learning) has limitations with the feature selection and accounts that cannot be profiled, like application programming interface (API). Therefore, this paper discusses the various behaviours of the OSN users and the current approaches in detecting a compromised OSN account, emphasizing its limitations and challenges. We propose a deep learning approach that addresses and resolve the constraints faced by the previous schemes. We detailed our proposed optimized nonsymmetric deep auto-encoder (OPT_NDAE) for unsupervised feature learning, which reduces the required human interaction levels in the selection and extraction of features. We evaluated our proposed classifier using the NSL-KDD and KDDCUP'99 datasets in a graphical user interface enabled Weka application. The results obtained indicate that our proposed approach outperformed most of the traditional schemes in OSN compromised account detection with an accuracy rate of 99.86%.

Keywords: computer security, network security, online social network, account compromisation

Procedia PDF Downloads 119
351 Investor Sentiment and Satisfaction in Automated Investment: A Sentimental Analysis of Robo-Advisor Platforms

Authors: Vertika Goswami, Gargi Sharma

Abstract:

The rapid evolution of fintech has led to the rise of robo-advisor platforms that utilize artificial intelligence (AI) and machine learning to offer personalized investment solutions efficiently and cost-effectively. This research paper conducts a comprehensive sentiment analysis of investor experiences with these platforms, employing natural language processing (NLP) and sentiment classification techniques. The study investigates investor perceptions, engagement, and satisfaction, identifying key drivers of positive sentiment such as clear communication, low fees, consistent returns, and robust security. Conversely, negative sentiment is linked to issues like inconsistent performance, hidden fees, poor customer support, and a lack of transparency. The analysis reveals that addressing these pain points—through improved transparency, enhanced customer service, and ongoing technological advancements—can significantly boost investor trust and satisfaction. This paper contributes valuable insights into the fields of behavioral finance and fintech innovation, offering actionable recommendations for stakeholders, practitioners, and policymakers. Future research should explore the long-term impact of these factors on investor loyalty, the role of emerging technologies, and the effects of ethical investment choices and regulatory compliance on investor sentiment.

Keywords: artificial intelligence in finance, automated investment, financial technology, investor satisfaction, investor sentiment, robo-advisors, sentimental analysis

Procedia PDF Downloads 18
350 Analyzing the Prospects and Challenges in Implementing the Legal Framework for Competition Regulation in Nigeria

Authors: Oluchukwu P. Obioma, Amarachi R. Dike

Abstract:

Competition law promotes market competition by regulating anti-competitive conduct by undertakings. There is a need for a third party to regulate the market for efficiency and supervision, since, if the market is left unchecked, it may be skewed against the consumers and the economy. Competition law is geared towards the protection of consumers from economic exploitation. It is the duty of every rational government to optimally manage its economic system by employing the best regulatory practices over the market to ensure it functions effectively and efficiently. The Nigerian government has done this by enacting the Federal Competition and Consumer Protection Act, 2018 (FCCPA). This is a comprehensive legal framework with the objective of governing competition issues in Nigeria. Prior to its enactment, the competition law regime in Nigeria was grossly inadequate despite Nigeria being the biggest economy in Africa. This latest legislation has become a bold step in the right direction. This study will use the doctrinal methodology in analyzing the FCCPA, 2018 in order to discover the extent to which the Act will guard against anti-competitive practices and promote competitive markets for the benefit of the Nigerian economy and consumers. The study finds that although the FCCPA, 2018 provides for the regulation of competition in Nigeria, there is a need to effectively tackle the challenges to the implementation of the Act and the development of anti-trust jurisprudence in Nigeria. This study concludes that incisive implementation of competition law in Nigeria will help protect consumers and create a conducive environment for economic growth, development, and protection of consumers from obnoxious competition practices.

Keywords: anti-competitive practices, competition law, competition regulation, consumer protection.

Procedia PDF Downloads 179
349 Caste Discourses in Popular Cinema in India

Authors: Devina Sethia

Abstract:

This paper will examine the discourse of sense of belonging in popular Hindi language cinema in India to understand how Dalit identities and experiences are negotiated. It will situate such discourse against the emergence of new rhetorical forms of nationalism that seem to contest colonial constructs of nation and identity while clearly envisioning anti-colonial futures through the invocation of a glorious pre-colonial past. While nations have always been 'imagined communities' with the Hobsbawmian invented traditions that leverage national consciousness to establish trust and legitimacy of governance, the concept of ethnic nationalism has been at odds with the idea of India itself as the concept of nationalism in India was born out of anti colonial ideology and not ethnicity. However, in recent times, anti colonial nationalism is transforming into Hindu nationalism and hardening the boundaries around what is Indian-ness and what it means to be Indian. In the past two decades films such as Masaan (2015), Manjhi - The Mountain Man (2015), Sairat (2016), Article 15 (2019) and Vedaa (2024) have gained immense popularity amongst different audience groups across the country. The success of this cinematic genre is interesting when juxtaposed against the reinforcing of a more rigid and exclusionary understanding of Indian-ness. Hence, further exploration of this is essential to gain insights into the anti colonial future of India. In conclusion, studying the discourse of Dalit sense of belonging in film serves as more than mere representation, but rather as a crucial intervention in the comprehension and envisioning of anticolonial possibilities amidst the rise of Hindu nationalism.

Keywords: film studies, identity, sense of belonging, discourse

Procedia PDF Downloads 27
348 Contemporary Christian Mission in Nigeria, the Question of Identity and Self-Realization for Integral Development

Authors: Felix Ehimare Enegho

Abstract:

The issue of the Christian mission among various people in our world has become a subject of discussion for quite a while now considering the many challenges faced by people of different religions. The understanding of who we are and how we choose to live our life as a people is quite imperative in many societies. The Christian Church down through the ages attempted to define itself so as to become relevant in human society. In Africa, the question of identity and self-realization is quite imperative if Africans are to define themselves and place themselves in the proper perspective as Christians. With the high level of insecurity bedevilling the world and especially Nigerian society, there is the need for Christians in Nigeria to see themselves as one body belonging to the same family. It is however disheartening that for several years now, there is a high level of disunity, lack of trust, disharmony, and vices of all kinds even among Christians who are often too quick to segment themselves into denominations thereby making themselves weak, segmented ad powerless in the midst of great oppositions, as if the Christian church in Nigeria is a divided house. The significance of this paper is to explore the areas of conflict among Christians in Nigeria with a view to finding possible solutions that would lead to the integral formation and in the long run a common identity and invariably self-realization. This paper utilized the socio-historical method of research. Among the major findings in the work is the fact that it is only people that can truly be responsible and held accountable for how they define their identity and self-realization. This entails that Christianity’s identity and self-realization in Nigeria will not only lead to a better and more defined form of Christianity but would ultimately assist in the integral development of Christian mission in Nigeria, a kind of development that would lead to a better Nigerian society.

Keywords: contemporary, Christian, mission, Nigeria, identity, self-realization

Procedia PDF Downloads 88
347 Neighborhood Linking Social Capital as a Predictor of Drug Abuse: A Swedish National Cohort Study

Authors: X. Li, J. Sundquist, C. Sjöstedt, M. Winkleby, K. S. Kendler, K. Sundquist

Abstract:

Aims: This study examines the association between the incidence of drug abuse (DA) and linking (communal) social capital, a theoretical concept describing the amount of trust between individuals and societal institutions. Methods: We present results from an 8-year population-based cohort study that followed all residents in Sweden, aged 15-44, from 2003 through 2010, for a total of 1,700,896 men and 1,642,798 women. Social capital was conceptualized as the proportion of people in a geographically defined neighborhood who voted in local government elections. Multilevel logistic regression was used to estimate odds ratios (ORs) and between-neighborhood variance. Results: We found robust associations between linking social capital (scored as a three level variable) and DA in men and women. For men, the OR for DA in the crude model was 2.11 [95% confidence interval (CI) 2.02-2.21] for those living in areas with the lowest vs. highest level of social capital. After accounting for neighborhood-level deprivation, the OR fell to 1.59 (1.51-1-68), indicating that neighborhood deprivation lies in the pathway between linking social capital and DA. The ORs remained significant after accounting for age, sex, family income, marital status, country of birth, education level, and region of residence, and after further accounting for comorbidities and family history of comorbidities and family history of DA. For women, the OR decreased from 2.15 (2.03-2.27) in the crude model to 1.31 (1.22-1.40) in the final model, adjusted for multiple neighborhood-level and individual-level variables. Conclusions: Our study suggests that low linking social capital may have important independent effects on DA.

Keywords: drug abuse, social linking capital, environment, family

Procedia PDF Downloads 473
346 The Current Development and Legislation on the Acquisition and Use of Nuclear Energy in Contemporary International Law

Authors: Uche A. Nnawulezi

Abstract:

Over the past decades, the acquisition and utilization of nuclear energy have remained a standout amongst the most intractable issues which past world leaders have unsuccessfully endeavored to grapple with. This study analyzes the present advancement and enactment on the acquisition and utilization of nuclear energy in contemporary international law. It seeks to address international co-operations in the field of nuclear energy by looking at what nuclear energy is all about and how it came into being. It also seeks to address concerns expressed by a few researchers on the position of nuclear law in the most extensive domain of the law by looking at the authoritative procedure for nuclear law, system of arrangements and traditions. This study also agrees in favour of treaty on non-proliferation of nuclear weapons based on human right and humanitarian principles that are not duly moral, but also legal ones. Specifically, the past development activities on nuclear weapon and the practical system of the nuclear energy institute will be inspected. The study noted among others, former president Obama's remark on nuclear energy and Pakistan nuclear policies and its attendant outcomes. Essentially, we depended on documentary evidence and henceforth scooped a great part of the data from secondary sources. The study emphatically advocates for the adoption of absolute liability principles and setting up of a viability trust fund, all of which will help in sustaining global peace where global best practices in acquisition and use of nuclear energy will be widely accepted in the contemporary international law. Essentially, the fundamental proposals made in this paper if completely adopted, might go far in fortifying the present advancement and enactment on the application and utilization of nuclear energy and accordingly, addressing a portion of the intractable issues under international law.

Keywords: nuclear energy, international law, acquisition, development

Procedia PDF Downloads 178
345 Islamic Perception of Modern Democratic System

Authors: Muhammad Khubaib

Abstract:

The Holy Quran purport is to establish a democratic system in which Allah has the right to special authority and He who has the supreme power or sovereignty. The supreme leader, Allah ceded the right to govern to his prophet and whoever would ever rule he would have to govern as a deputy of Prophet of Allah and he will not have the right to deviate from the basic rules of law and constitution. Centuries before the birth of prevailing democracy, Muslim scholars and researchers continuously keep using the term of “Jamhür” (majority) in their books. Islam gives the basic importance to the public opinion to establish a government and make the public confidence necessary for the government. The most effective way to gain the trust of the people in the present to build national institutions is through the vote. Vote testifies in favor of the candidate and majority tells us who is more honest and talented. Each voter stands at the position of trustworthy. To vote a cruel person would be tantamount to treason and even not to vote would be considered as a national offence. After transparent process, the selected member of government would be seemed a fine example of the saying of Muhammad (S.A.W) in which he said; the majority of my people will never be agreed at misleading. In short in this article, there would be discussed democracy in the Islamic perception, while elaborating the western democracy so that it can be cleared that in which way the Holy Quran supported the democracy and what gestures Muhammad (S.A.W) made to spread the democracy and on the basis of those gestures, and how come those gestures are being followed to choose the sacred caliphate. It's hoped that this research would be helpful to refine the democratic system and support to meet the challenges Muslim world are facing.

Keywords: democracy, modern democratic system, respect of majority opinion, vote casting

Procedia PDF Downloads 194
344 Assessing Adoption Trends of Mukau (Melia volkensii (Gürke)) Enterprises in Eastern and Coastal Regions of Kenya

Authors: Lydia Murugi Mugendi

Abstract:

The promotion of tree growing as a lucrative enterprise is the focus of this paper as management practices have shifted focus from protection of natural forest resources to community/government partnerships with the aim of resource conservation, management and increase of on-farm tree growing. Using KEFRI as (the source) of information pertaining Melia volkensii (the medium or message) being transferred, this paper investigates the current perception towards forestry and the behavioural attitudes of recipients of forest intervention activities. The two objectives explored in this paper are to find out the level of adoption of Mukau in Kitui, Kibwezi and Samburu/Taru and secondly, to find out the characteristics of the adoption process between Kitui, Kibwezi and Samburu/Taru. The methodologies used during data collection were participatory rural appraisal tools in conjunction with the social survey questionnaires. Simple random sampling and snowball sampling were used to identify respondents within the three target sites and analysis was done using SPSS. Results of the study of indicating that adoption rates of the Mukau in Samburu/Taru, where forestry-related activities were introduced within the past one decade had significantly increase despite initial resistance. The other areas, which had benefited from numerous decades of intense forestry extension projects and activities, indicated a decline in re-adoption rates of Mukau as an enterprise. This study has brought out the reality of adoption trends and state of Mukau population within the three counties while providing a glimpse towards the communities’ perception in regards to adoption of forestry and other environmental innovations. The outcome of the study is to provide a guideline for extension/ dissemination officers in KEFRI and related stakeholders to promote seamless cohesive interaction between the recipient communities of the proposed interventions.

Keywords: adoption, innovation, enterprise, extension, DOI Theory

Procedia PDF Downloads 113
343 King versus God: An Introduction to Dhanujatra of Odisha

Authors: Kailash Pattanaik, Giribala Mohanty

Abstract:

Dhanujatra is a folk performance of ODISHA, India, that transports the participants, on lookers and all alike into a mythical atmosphere for eleven days and nights as well. In this performance the whole town becomes stage. The uniqueness of the festival lies in the fact that all the episodes of this Jatra enacted in different parts of the town making it the largest open air theatre in the world. The paper would emphasize on the uniqueness and the impact of this performance.Different episodes are enacted at different places in the regime. So, Dhanujatra does not confine itself to a fixed static or dead stage, as in case of other Jatra’s; it rather becomes the stage for the world at large. For that, it is said that, Worlds biggest open air theatre held in the tiny town called Bargarh in the western part of Orissa. The play moves sequentially day after day and the audience moves from locale to locale. Here it is analogues to the Ramleela of Ramnagar of Benars. Parallal enactment is a significant feature of this Jatra. From the second day, parallal performances take place in both Bargarh town and Ambapalli epitomising ‘Mathura’ and ‘Gokul’ respectively. Krishna is born in the prison on the second day of the jatra. Basudeb exchanges the child with the Nanda’s newborn baby in Gokul. In this way, parallal performances go on both in Mathura and Gokul. The ordinary persons who act as the mythological characters, or become historical heroes or the legendary Saints or Bhaktas in a Jatra in the evening, lead the lives of ordinary persons during day time. The dramatic personas of those individuals are shed with the end of the Jatra. On the contrary, the persons who act as the main characters of Dhanujatra are exceptions in this regard. They are identified as the characters they enact for the whole period of performance, both in the evenings and during daytime. It is worth mentioning that generally in the folk performances there is an ample scope to touch upon or interpret or comment or satirize the issues of contemporary relevance with the sole purpose to convey some specific message. Dhanujatra is no exception to that.

Keywords: folk performance, Jatra, parallel enactment, open-air stage, Odisha

Procedia PDF Downloads 286
342 Improving Cheon-Kim-Kim-Song (CKKS) Performance with Vector Computation and GPU Acceleration

Authors: Smaran Manchala

Abstract:

Homomorphic Encryption (HE) enables computations on encrypted data without requiring decryption, mitigating data vulnerability during processing. Usable Fully Homomorphic Encryption (FHE) could revolutionize secure data operations across cloud computing, AI training, and healthcare, providing both privacy and functionality, however, the computational inefficiency of schemes like Cheon-Kim-Kim-Song (CKKS) hinders their widespread practical use. This study focuses on optimizing CKKS for faster matrix operations through the implementation of vector computation parallelization and GPU acceleration. The variable effects of vector parallelization on GPUs were explored, recognizing that while parallelization typically accelerates operations, it could introduce overhead that results in slower runtimes, especially in smaller, less computationally demanding operations. To assess performance, two neural network models, MLPN and CNN—were tested on the MNIST dataset using both ARM and x86-64 architectures, with CNN chosen for its higher computational demands. Each test was repeated 1,000 times, and outliers were removed via Z-score analysis to measure the effect of vector parallelization on CKKS performance. Model accuracy was also evaluated under CKKS encryption to ensure optimizations did not compromise results. According to the results of the trail runs, applying vector parallelization had a 2.63X efficiency increase overall with a 1.83X performance increase for x86-64 over ARM architecture. Overall, these results suggest that the application of vector parallelization in tandem with GPU acceleration significantly improves the efficiency of CKKS even while accounting for vector parallelization overhead, providing impact in future zero trust operations.

Keywords: CKKS scheme, runtime efficiency, fully homomorphic encryption (FHE), GPU acceleration, vector parallelization

Procedia PDF Downloads 24
341 Perceived Risks in Business-to-Consumer Online Contracts: An Empirical Study in Saudi Arabia

Authors: Shaya Alshahrani

Abstract:

Perceived risks play a major role in consumer intentions, behaviors, attitudes, and decisions about online shopping in the KSA. This paper investigates the influence of six perceived risk dimensions on Saudi consumers: product risk, information risk, financial risk, privacy and security risk, delivery risk, and terms and conditions risk empirically. To ensure the success of this study, a random survey was distributed to reflect the consumers’ perceived risk and to enable the generalization of the results. Data were collected from 323 respondents in the Kingdom of Saudi Arabia (KSA): 50 who had never shopped online and 273 who had done so. The results indicated that all six risks influenced the respondents’ perceptions of online shopping. The non-online shoppers perceived financial and delivery risks as the most significant barriers to online shopping. This was followed closely by performance, information, and privacy and security risks. Terms and conditions were perceived as less significant. The online consumers considered delivery and performance risks to be the most significant influences on internet shopping. This was followed closely by information and terms and conditions. Financial and privacy and security risks were perceived as less significant. This paper argues that introducing adequate legal solutions to addressing related problems arising from this study is an urgent need. This may enhance consumer trust in the KSA online market, increase consumers’ intentions regarding online shopping, and improve consumer protection.

Keywords: perceived risk, online contracts, Saudi Arabia, consumer protection

Procedia PDF Downloads 148
340 Ponticuli of Atlas Vertebra: A Study in South Coastal Region of Andhra Pradesh

Authors: Hema Lattupalli

Abstract:

Introduction: A bony bridge extends from the lateral mass of the atlas to postero medial margin of vertebral artery groove, termed as a posterior bridge of atlas or posterior ponticulus. The foramen formed by the bridge is called as arcuate foramen or retroarticulare superior. Another bony bridge sometimes extends laterally from lateral mass to posterior root of transverse foramen forming and additional groove for vertebral artery, above and behind foramen transversarium called Lateral bridge or ponticulus lateralis. When both posterior and lateral are present together it is called as Posterolateral ponticuli. Aim and Objectives: The aim of the present study is to detect the presence of such Bridge or Ponticuli called as Lateral, Posterior and Posterolateral reported by earlier investigators in atlas vertebrae. Material and Methods: The study was done on 100 Atlas vertebrae from the Department of Anatomy Narayana Medical College Nellore, and also from SVIMS Tirupati was collected over a period of 2 years. The parameters that were studied include the presence of ponticuli, complete and incomplete and right and left side ponticuli. They were observed for all these parameters and the results were documented and photographed. Results: Ponticuli were observed in 25 (25%) of atlas vertebrae. Posterior ponticuli were found in 16 (16%), Lateral in 01 (01%) and Posterolateral in 08(08%) of the atlas vertebrae. Complete ponticuli were present in 09 (09%) and incomplete ponticuli in 16 (16%) of the atlas vertebrae. Bilateral ponticuli were seen in 10 (10%) and unilateral ponticuli were seen in 15 (15%) of the atlas vertebrae. Right side ponticuli were seen in 04 (04%) and Left side ponticuli in 05 (05%) of the atlas vertebrae respectively. Interpretation and Conclusion: In the present study posterior complete ponticuli were said to be more than the lateral complete ponticuli. The presence of Bilateral Incomplete Posterior ponticuli is higher and also Atlantic ponticuli. The present study is to say that knowledge of normal anatomy and variations in the atlas vertebra is very much essential to the neurosurgeons giving a message that utmost care is needed to perform surgeries related to craniovertebral regions. This is additional information to the Anatomists, Neurosurgeons and Radiologist. This adds an extra page to the literature.

Keywords: atlas vertebra, ponticuli, posterior arch, arcuate foramen

Procedia PDF Downloads 369
339 ‘Internationalize Yourself’: Mobility in Academia as a Form of Continuing Professional Training

Authors: Sonja Goegele, Petra Kletzenbauer

Abstract:

The FH JOANNEUM- a university of applied sciences based in Austria - cooperates in teaching and research with well-known international universities and thus aims to foster so-called strategic partnerships. The exchange of university lecturers and other faculty members is a way to achieve and secure strategic company goals, in which excellent research and teaching play a central role in order to improve both the development of academics and administration. Thanks to mobility not only the university but also the involved people truly benefit in their professional development which can be seen on several levels: increased foreign language proficiency, excellent networking possibilities within the scientific community as well as reinforced didactic competencies in the form of different teaching and learning methodologies. The paper discusses mobility in the light of the university’s strategic paper entitled ‘Hands on 2022’ by presenting results from an empirical research study among faculty members who participate in exchange programmes on a regular basis. In the form of an online questionnaire, mobility was discussed from different angles such as networking, collaborative research, professional training for academics and the overall impact of the exchange within and outside the organization. From the findings, it can be concluded that mobility is an asset for any university. However, keeping in constant dialogue with partner universities requires more than the purpose of the exchange itself. Building rapport and keeping a relationship of trust are challenges that need to be addressed more closely in order to run successful mobility programmes. Best Practice examples should highlight the importance of mobility as a vital initiative to transfer disciplines.

Keywords: higher education, internationalization, mobility, strategic partnerships

Procedia PDF Downloads 139
338 Experiences of Marital Relationship of Middle-Aged Couples in Hong Kong: Implications for Services Interventions

Authors: Wai M. Shum

Abstract:

There was evidence that the change of marital quality satisfaction was related to the different stages of the family life cycle. Research studies have been largely based on western contexts, which found a curvilinear U-shaped trend in changes of marital satisfaction over the course of a marriage, but little is known about the marital experiences of Hong Kong couples. Through in-depth interviews, this qualitative study explored the marital relationship of middle-aged couples in a satisfying marriage and to identify how couples maintain a satisfying relationship in the local context. Findings from this study suggested twelve themes with some showing consistency with previous literature, such as communication, companionship, trust, and fidelity. The affective aspects of empathetic understanding and perceived empathy were found to have an enormous effect on couples’ bondedness. The high level of differentiation and security served as a basis for unconditional contribution, acceptance, and adjustment to unsolvable issues such that negative emotion would not be escalated. The manifestations of intimacy and commitment in the triangular theory of love were more frequently addressed than passion in striving for marital longevity in the local context. This study challenged the curvilinear trend of marital satisfaction throughout marriage, with couples showing different pathways of marital satisfaction. The study gave insights on martial enrichment, such as facilitating couples to disclose their vulnerabilities, desire for physical intimacy, and passion in the pursuit of enduring marriage instead of an emphasis on skills training on communication and conflict resolution.

Keywords: intimacy, marital relationship, marital satisfaction, middle-aged

Procedia PDF Downloads 114
337 Emergence of Information Centric Networking and Web Content Mining: A Future Efficient Internet Architecture

Authors: Sajjad Akbar, Rabia Bashir

Abstract:

With the growth of the number of users, the Internet usage has evolved. Due to its key design principle, there is an incredible expansion in its size. This tremendous growth of the Internet has brought new applications (mobile video and cloud computing) as well as new user’s requirements i.e. content distribution environment, mobility, ubiquity, security and trust etc. The users are more interested in contents rather than their communicating peer nodes. The current Internet architecture is a host-centric networking approach, which is not suitable for the specific type of applications. With the growing use of multiple interactive applications, the host centric approach is considered to be less efficient as it depends on the physical location, for this, Information Centric Networking (ICN) is considered as the potential future Internet architecture. It is an approach that introduces uniquely named data as a core Internet principle. It uses the receiver oriented approach rather than sender oriented. It introduces the naming base information system at the network layer. Although ICN is considered as future Internet architecture but there are lot of criticism on it which mainly concerns that how ICN will manage the most relevant content. For this Web Content Mining(WCM) approaches can help in appropriate data management of ICN. To address this issue, this paper contributes by (i) discussing multiple ICN approaches (ii) analyzing different Web Content Mining approaches (iii) creating a new Internet architecture by merging ICN and WCM to solve the data management issues of ICN. From ICN, Content-Centric Networking (CCN) is selected for the new architecture, whereas, Agent-based approach from Web Content Mining is selected to find most appropriate data.

Keywords: agent based web content mining, content centric networking, information centric networking

Procedia PDF Downloads 475
336 A Business-to-Business Collaboration System That Promotes Data Utilization While Encrypting Information on the Blockchain

Authors: Hiroaki Nasu, Ryota Miyamoto, Yuta Kodera, Yasuyuki Nogami

Abstract:

To promote Industry 4.0 and Society 5.0 and so on, it is important to connect and share data so that every member can trust it. Blockchain (BC) technology is currently attracting attention as the most advanced tool and has been used in the financial field and so on. However, the data collaboration using BC has not progressed sufficiently among companies on the supply chain of manufacturing industry that handle sensitive data such as product quality, manufacturing conditions, etc. There are two main reasons why data utilization is not sufficiently advanced in the industrial supply chain. The first reason is that manufacturing information is top secret and a source for companies to generate profits. It is difficult to disclose data even between companies with transactions in the supply chain. In the blockchain mechanism such as Bitcoin using PKI (Public Key Infrastructure), in order to confirm the identity of the company that has sent the data, the plaintext must be shared between the companies. Another reason is that the merits (scenarios) of collaboration data between companies are not specifically specified in the industrial supply chain. For these problems this paper proposes a Business to Business (B2B) collaboration system using homomorphic encryption and BC technique. Using the proposed system, each company on the supply chain can exchange confidential information on encrypted data and utilize the data for their own business. In addition, this paper considers a scenario focusing on quality data, which was difficult to collaborate because it is a top secret. In this scenario, we show a implementation scheme and a benefit of concrete data collaboration by proposing a comparison protocol that can grasp the change in quality while hiding the numerical value of quality data.

Keywords: business to business data collaboration, industrial supply chain, blockchain, homomorphic encryption

Procedia PDF Downloads 136
335 Economic Life of Iranians on Instagram and the Disturbance in Politics

Authors: Mohammad Zaeimzade

Abstract:

The development of communication technologies is clearly and rapidly moving towards reducing the distance between the virtual and real worlds. Of course, living in a two-spatial or two-globalized world or any other interpretation that means mixing real and virtual life is still relevant and debatable. In the present age of communication, where social networks have transformed the message equation and turned the audience out of passivity and turned into a user. Platforms have penetrated widely in various aspects of human life, from culture and education and economy. Among the messengers, Instagram, which is one of the most extensive image-based interactive networks, plays a significant role in the new economic life. It doesn't need much explanation that the era of thinking of every messenger as a non-insulating conductor that is just a neutral load has passed. Every messenger has its own economic, political and of course security background, Instagram is no exception to this rule and of course it leaves its effects in bio-economics as well. Iran, as the 19th largest economy in the world, has not been unaffected by new platforms, including Instagram, and their consequences in the economy. Generally, in the policy-making space, there are two simple and inflexible pessimistic or optimistic views on this issue, and each of the holders of these views usually have their own one-dimensional policy recommendations regarding how to deal with Instagram. Prescriptions that are usually very different and sometimes contradictory. In this article, we show that this confusion of policymakers is the result of not accurately describing the reality of its effect, and the reason for this inaccurate description is the existence of a conflict of interests in the eyes of describers and researchers. In this article, we first take a look at the main indicators of the Iranian economy, estimate the role of the digital economy in Iran's economic growth, then study the conflicting descriptions of the Instagram-based digital economy, the statistics that show the tolerance of economic users of Instagram in Iran. 300 thousand to 9 million have been estimated. Finally, we take a look at the government's actions in this matter, especially in the context of street riots in October and November 2022. And we suggest an intermediate idea.

Keywords: digital economy, instagram, conflict of interest, social networks

Procedia PDF Downloads 76
334 Optimization of Reliability Test Plans: Increase Wafer Fabrication Equipments Uptime

Authors: Swajeeth Panchangam, Arun Rajendran, Swarnim Gupta, Ahmed Zeouita

Abstract:

Semiconductor processing chambers tend to operate in controlled but aggressive operating conditions (chemistry, plasma, high temperature etc.) Owing to this, the design of this equipment requires developing robust and reliable hardware and software. Any equipment downtime due to reliability issues can have cost implications both for customers in terms of tool downtime (reduced throughput) and for equipment manufacturers in terms of high warranty costs and customer trust deficit. A thorough reliability assessment of critical parts and a plan for preventive maintenance/replacement schedules need to be done before tool shipment. This helps to save significant warranty costs and tool downtimes in the field. However, designing a proper reliability test plan to accurately demonstrate reliability targets with proper sample size and test duration is quite challenging. This is mainly because components can fail in different failure modes that fit into different Weibull beta value distributions. Without apriori Weibull beta of a failure mode under consideration, it always leads to over/under utilization of resources, which eventually end up in false positives or false negatives estimates. This paper proposes a methodology to design a reliability test plan with optimal model size/duration/both (independent of apriori Weibull beta). This methodology can be used in demonstration tests and can be extended to accelerated life tests to further decrease sample size/test duration.

Keywords: reliability, stochastics, preventive maintenance

Procedia PDF Downloads 15
333 Integrated On-Board Diagnostic-II and Direct Controller Area Network Access for Vehicle Monitoring System

Authors: Kavian Khosravinia, Mohd Khair Hassan, Ribhan Zafira Abdul Rahman, Syed Abdul Rahman Al-Haddad

Abstract:

The CAN (controller area network) bus is introduced as a multi-master, message broadcast system. The messages sent on the CAN are used to communicate state information, referred as a signal between different ECUs, which provides data consistency in every node of the system. OBD-II Dongles that are based on request and response method is the wide-spread solution for extracting sensor data from cars among researchers. Unfortunately, most of the past researches do not consider resolution and quantity of their input data extracted through OBD-II technology. The maximum feasible scan rate is only 9 queries per second which provide 8 data points per second with using ELM327 as well-known OBD-II dongle. This study aims to develop and design a programmable, and latency-sensitive vehicle data acquisition system that improves the modularity and flexibility to extract exact, trustworthy, and fresh car sensor data with higher frequency rates. Furthermore, the researcher must break apart, thoroughly inspect, and observe the internal network of the vehicle, which may cause severe damages to the expensive ECUs of the vehicle due to intrinsic vulnerabilities of the CAN bus during initial research. Desired sensors data were collected from various vehicles utilizing Raspberry Pi3 as computing and processing unit with using OBD (request-response) and direct CAN method at the same time. Two types of data were collected for this study. The first, CAN bus frame data that illustrates data collected for each line of hex data sent from an ECU and the second type is the OBD data that represents some limited data that is requested from ECU under standard condition. The proposed system is reconfigurable, human-readable and multi-task telematics device that can be fitted into any vehicle with minimum effort and minimum time lag in the data extraction process. The standard operational procedure experimental vehicle network test bench is developed and can be used for future vehicle network testing experiment.

Keywords: CAN bus, OBD-II, vehicle data acquisition, connected cars, telemetry, Raspberry Pi3

Procedia PDF Downloads 205
332 Capitalizing on Differential Network Ties: Unpacking Individual Creativity from Social Capital Perspective

Authors: Yuanyuan Wang, Chun Hui

Abstract:

Drawing on social capital theory, this article discusses how individuals may utilize network ties to come up with creativity. Social capital theory elaborates how network ties enhances individual creativity from three dimensions: structural access, and relational and cognitive mechanisms. We categorize network ties into strong and weak in terms of tie strength. With less structural constraints, weak ties allow diverse and heterogeneous knowledge to prosper, further facilitating individuals to build up connections among diverse even distant ideas. On the other hand, strong ties with the relational mechanism of cooperation and trust may benefit the accumulation of psychological capital, ultimately to motivate and sustain creativity. We suggest that differential ties play different roles for individual creativity: Weak ties deliver informational benefit directly rifling individual creativity from informational resource aspect; strong ties offer solidarity benefits to reinforce psychological capital, which further inspires individual creativity engagement from a psychological viewpoint. Social capital embedded in network ties influence individuals’ informational acquisition, motivation, as well as cognitive ability to be creative. Besides, we also consider the moderating effects constraining the relatedness between network ties and creativity, such as knowledge articulability. We hypothesize that when the extent of knowledge articulability is low, that is, with low knowledge codifiability, and high dependency and ambiguity, weak ties previous serving as knowledge reservoir will not become ineffective on individual creativity. Two-wave survey will be employed in Mainland China to empirically test mentioned propositions.

Keywords: network ties, social capital, psychological capital, knowledge articulability, individual creativity

Procedia PDF Downloads 405
331 Use of Smartphones in 6th and 7th Grade (Elementary Schools) in Istria: Pilot Study

Authors: Maja Ruzic-Baf, Vedrana Keteles, Andrea Debeljuh

Abstract:

Younger and younger children are now using a smartphone, a device which has become ‘a must have’ and the life of children would be almost ‘unthinkable’ without one. Devices are becoming lighter and lighter but offering an array of options and applications as well as the unavoidable access to the Internet, without which it would be almost unusable. Numerous features such as taking of photographs, listening to music, information search on the Internet, access to social networks, usage of some of the chatting and messaging services, are only some of the numerous features offered by ‘smart’ devices. They have replaced the alarm clock, home phone, camera, tablet and other devices. Their use and possession have become a part of the everyday image of young people. Apart from the positive aspects, the use of smartphones has also some downsides. For instance, free time was usually spent in nature, playing, doing sports or other activities enabling children an adequate psychophysiological growth and development. The greater usage of smartphones during classes to check statuses on social networks, message your friends, play online games, are just some of the possible negative aspects of their application. Considering that the age of the population using smartphones is decreasing and that smartphones are no longer ‘foreign’ to children of pre-school age (smartphones are used at home or in coffee shops or shopping centers while waiting for their parents, playing video games often inappropriate to their age), particular attention must be paid to a very sensitive group, the teenagers who almost never separate from their ‘pets’. This paper is divided into two sections, theoretical and empirical ones. The theoretical section gives an overview of the pros and cons of the usage of smartphones, while the empirical section presents the results of a research conducted in three elementary schools regarding the usage of smartphones and, specifically, their usage during classes, during breaks and to search information on the Internet, check status updates and 'likes’ on the Facebook social network.

Keywords: education, smartphone, social networks, teenagers

Procedia PDF Downloads 453
330 Jelly and Beans: Appropriate Use of Ultrasound in Acute Kidney Injury

Authors: Raja Ezman Raja Shariff

Abstract:

Acute kidney injury (AKI) is commonly seen in inpatients, and places a great cost on the NHS and patients. Timely and appropriate management is both nephron sparing and potentially life-saving. Ultrasound scanning (USS) is a well-recognised method for stratifying patients. Subsequently, the NICE AKI guidance has defined groups in whom scanning is recommended within 6 hours of request (pyonephrosis), within 24 hours (obstruction/cause unknown), and in whom routine scanning isn't recommended (cause for AKI identified). The audit looks into whether Stockport NHS Trust USS practice was in line with such recommendations. The audit evaluated 92 patients with AKI who had USS, between 01/01/14 to 30/04/14. Data collection was divided into 2 parts. Firstly, radiology request cards and the online imaging software (PACS) were evaluated. Then, the electronic case notes (ADVANTIS) was evaluated further. Based on request cards, 10% of requests were for pyonephrosis. Only 33% were scanned within 6hours and a further 33% within 24hours. 75% were requested for possible obstructions and unknown cause collectively. Of those due to possible obstruction, 71% of patients were scanned within 24 hours. Of those with unknown cause, 50% were scanned within 24 hours. 15% of requests had a cause declared and so potentially did not require scanning. Evaluation of the patients’ notes suggested further interesting findings. Firstly, potentially 39% of patients had a known cause for AKI, therefore, did not need USS. Subsequently, the cohort of unknown cause and possible obstruction was collectively reduced to 45%. Alarmingly the patient cohort with possible pyonephrosis went up to 16%, suggesting an under-recognition of this life-threatening condition. We plan to highlight these findings within our institution and make changes to encourage more appropriate requesting and timely scanning. Time will tell if we manage to save or increase our costs in this cost-conscious NHS. Patient benefits, though, seem to be guaranteed.

Keywords: AKI, ARF, kidney, renal

Procedia PDF Downloads 400
329 AI-Powered Models for Real-Time Fraud Detection in Financial Transactions to Improve Financial Security

Authors: Shanshan Zhu, Mohammad Nasim

Abstract:

Financial fraud continues to be a major threat to financial institutions across the world, causing colossal money losses and undermining public trust. Fraud prevention techniques, based on hard rules, have become ineffective due to evolving patterns of fraud in recent times. Against such a background, the present study probes into distinct methodologies that exploit emergent AI-driven techniques to further strengthen fraud detection. We would like to compare the performance of generative adversarial networks and graph neural networks with other popular techniques, like gradient boosting, random forests, and neural networks. To this end, we would recommend integrating all these state-of-the-art models into one robust, flexible, and smart system for real-time anomaly and fraud detection. To overcome the challenge, we designed synthetic data and then conducted pattern recognition and unsupervised and supervised learning analyses on the transaction data to identify which activities were fishy. With the use of actual financial statistics, we compare the performance of our model in accuracy, speed, and adaptability versus conventional models. The results of this study illustrate a strong signal and need to integrate state-of-the-art, AI-driven fraud detection solutions into frameworks that are highly relevant to the financial domain. It alerts one to the great urgency that banks and related financial institutions must rapidly implement these most advanced technologies to continue to have a high level of security.

Keywords: AI-driven fraud detection, financial security, machine learning, anomaly detection, real-time fraud detection

Procedia PDF Downloads 42
328 Person-Led Organizations Nurture Bullying Behavior: A Qualitative Study

Authors: Shreya Mishra, Manosi Chaudhuri, Ajoy K. Dey

Abstract:

Workplace bullying is a social phenomenon which has proved to be hazardous not only for employees’ well-being but also organizations. Despite being prevalent across geographical boundaries, Indian organizations have failed to acknowledge its vices. This paper aims to understand targets’ perception on what makes bullying nurture in organizations. The paper suggests that person-led Indian work settings give birth to bullying behavior as it lacks professional acumen and systems. An analysis of 13 in-depth interviews of employees from the organized sector suggests that organizations, where decision making lies with single individual, may be a hub of hostile behavior due to the culture which promotes ‘yesmanship’, ‘authoritarianism’ and/or blind belief of leaders on certain set of employees. The study used constructivist grounded theory approach, and the data was analyzed using R Based Qualitative Data Analysis (RQDA) software. Respondents reported that bullying behavior is taken lightly by the management with 'just ignore it' attitude. According to the respondents, the behavior prolong as the perpetrator have a direct approach to the top authority. The study concludes that person-led organizations may create a family-like environment which is favored by employees; however, authoritative leaders are unable to gain the trust of employees. Also, employees who are close to the leader may either be a perpetrator or a target of bullying. It is recommended that leaders in such organizations need to acknowledge the presence of bullying which affects an employees’ commitment towards their job and/or organization. They need to have an assertive check on individuals who hide behind ‘yesman’ attitude. This may help employees feel safe in such work settings.

Keywords: constructivist grounded theory, person-led organization, RQDA, workplace bullying

Procedia PDF Downloads 205
327 A Modified Nonlinear Conjugate Gradient Algorithm for Large Scale Unconstrained Optimization Problems

Authors: Tsegay Giday Woldu, Haibin Zhang, Xin Zhang, Yemane Hailu Fissuh

Abstract:

It is well known that nonlinear conjugate gradient method is one of the widely used first order methods to solve large scale unconstrained smooth optimization problems. Because of the low memory requirement, attractive theoretical features, practical computational efficiency and nice convergence properties, nonlinear conjugate gradient methods have a special role for solving large scale unconstrained optimization problems. Large scale optimization problems are with important applications in practical and scientific world. However, nonlinear conjugate gradient methods have restricted information about the curvature of the objective function and they are likely less efficient and robust compared to some second order algorithms. To overcome these drawbacks, the new modified nonlinear conjugate gradient method is presented. The noticeable features of our work are that the new search direction possesses the sufficient descent property independent of any line search and it belongs to a trust region. Under mild assumptions and standard Wolfe line search technique, the global convergence property of the proposed algorithm is established. Furthermore, to test the practical computational performance of our new algorithm, numerical experiments are provided and implemented on the set of some large dimensional unconstrained problems. The numerical results show that the proposed algorithm is an efficient and robust compared with other similar algorithms.

Keywords: conjugate gradient method, global convergence, large scale optimization, sufficient descent property

Procedia PDF Downloads 206
326 Re-Thinking and Practicing Critical Pedagogy in Education through Art

Authors: Dalya Markovich

Abstract:

In the last decade art-educators strive to integrate critical pedagogy within the art classroom. Critical pedagogy aims to deconstruct the oppressive social reality and the false consciousness in which learners from both privileged and underprivileged groups are caught. Understanding oppression as a product of socio-political conditions seeks to instigate processes of change anchored in the student's views. Yet, growing empirical evidence show that these efforts often has resulted in art projects in which art teachers play an active role in the process of critical teaching, while the students remain passive listeners. In this common scenario, the teachers/artists become authoritarian moral guides of critical thinking and acting, while the students are often found to be indifferent or play along to satisfy the teachers'/artists aspirations. These responses indicate that the message of critical pedagogy – transforming the students' way of thinking and acting – mostly do not fulfill its emancipation goals. The study analyses the critical praxis embedded in new art projects and their influence on the participants. This type of projects replaces the individual producer with a collaborative work; switch the finite work with an ongoing project; and transforms the passive learner to an engaged co-producer. The research delves into the pedagogical framework of two of these art projects by using qualitative methods. In-depth interviews were conducted with 4 of the projects' initiator and managers, in order to access understandings of the art projects goals and pedagogical methods. Field work included 4 participant observation (two in each project) during social encounters in the project's settings, focusing on how critical thinking is enacted (or not) by the participants. The analysis exposes how the new art projects avoid the prepackaged "critical" assumptions and praxis, thus turning the participants from passive carriers of critical thinking to agents that actively use criticism. Findings invite researchers to explore new avenues for understanding critical pedagogy and developing various ways to implement critical pedagogy during art education, in view of the growing need of critical thinking and acting in school/society.

Keywords: critical pedagogy, education through art, collaborative work, agency

Procedia PDF Downloads 144