Search results for: perception of threat
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 3038

Search results for: perception of threat

2108 Crossing Borders: A Case Study on the Entry and Asylum of Sirius Refugees in Turkey

Authors: Stephanie M. De Oliveira

Abstract:

For a long time, migrations are characterized as a difficult problem to solve. Various phenomena throughout human history caused personnel migrations, whether by the free will of migrants or not. Nowadays, governments that seek to give these people protection and dignity, either to asylum or to build a new life in a different country, make refugee protection. At present, a large amount of people, have been crossing their country's borders by land, air or sea, becoming refugees and seeking a new life away from fear, threat or violence they suffered in their country of origin. It is known that some countries have already instituted rights and rules for refugees who wish to become citizens in the country to which they immigrated, even though this is not what happens in most cases. The article will be based on research made with UN Refugee Agency (UNHCR) material as well as will analyze the interaction of the Turkish government with the European Union. Since Turkey is not part of the Union, it will be understood how the interaction was made, as well as the search for consensus, and not only humanitarian but also financial aid. The treatment of refugees and the defense of human rights within the country will also be considered.

Keywords: refugees, Turkey, asylum seekers, United Nations

Procedia PDF Downloads 368
2107 Media Engagement and Ethnic Identity: The Case of the Aeta Ambala of Pastolan Village

Authors: Kriztine R. Viray, Chona Rita R. Cruz

Abstract:

The paper explores the engagement of indigenous group, Aeta Ambala with different media and how this engagement affects their perception of their own ethnic identity. The researchers employed qualitative research as their approach and descriptive research method as their design. The paper integrates two theories. These are communication theory of identity by Michael Hecht and the Uses and Gratification Theory of Katz, Blumler, and Gurevitch. Among others, the paper exposes that the engagement of the Aeta-Ambala with the various forms of media certainly affected the way they perceived the outside world and their own ethnic group.

Keywords: Aeta Ambala, culture, ethnic, media engagement, Philippines

Procedia PDF Downloads 494
2106 A Study of Permission-Based Malware Detection Using Machine Learning

Authors: Ratun Rahman, Rafid Islam, Akin Ahmed, Kamrul Hasan, Hasan Mahmud

Abstract:

Malware is becoming more prevalent, and several threat categories have risen dramatically in recent years. This paper provides a bird's-eye view of the world of malware analysis. The efficiency of five different machine learning methods (Naive Bayes, K-Nearest Neighbor, Decision Tree, Random Forest, and TensorFlow Decision Forest) combined with features picked from the retrieval of Android permissions to categorize applications as harmful or benign is investigated in this study. The test set consists of 1,168 samples (among these android applications, 602 are malware and 566 are benign applications), each consisting of 948 features (permissions). Using the permission-based dataset, the machine learning algorithms then produce accuracy rates above 80%, except the Naive Bayes Algorithm with 65% accuracy. Of the considered algorithms TensorFlow Decision Forest performed the best with an accuracy of 90%.

Keywords: android malware detection, machine learning, malware, malware analysis

Procedia PDF Downloads 167
2105 Walkability with the Use of Mobile Apps

Authors: Dimitra Riza

Abstract:

This paper examines different ways of exploring a city by using smart phones' applications while walking, and the way this new attitude will change our perception of the urban environment. By referring to various examples of such applications we will consider options and possibilities that open up with new technologies, their advantages and disadvantages, as well as ways of experiencing and interpreting the urban environment. The widespread use of smart phones gave access to information, maps, knowledge, etc. at all times and places. The city tourism marketing takes advantage of this event and promotes the city's attractions through technology. Mobile mediated walking tours, provide new possibilities and modify the way we used to explore cities, for instance by giving directions proper to find easily destinations, by displaying our exact location on the map, by creating our own tours through picking points of interest and interconnecting them to create a route. These apps act as interactive ones, as they filter the user's interests, movements, etc. Discovering a city on foot and visiting interesting sites and landmarks, became very easy, and has been revolutionized through the help of navigational and other applications. In contrast to the re-invention of the city as suggested by the Baudelaire's Flâneur in the 19th century, or to the construction of situations by the Situationists in 60s, the new technological means do not allow people to "get lost", as these follow and record our moves. In the case of strolling or drifting around the city, the option of "getting lost" is desired, as the goal is not the "wayfinding" or the destination, but it is the experience of walking itself. Getting lost is not always about dislocation, but it is about getting a feeling, free of the urban environment while experiencing it. So, on the one hand, walking is considered to be a physical and embodied experience, as the observer becomes an actor and participates with all his senses in the city activities. On the other hand, the use of a screen turns out to become a disembodied experience of the urban environment, as we perceive it in a fragmented and distanced way. Relations with the city are similar to Alberti’s isolated viewer, detached from any urban stage. The smartphone, even if we are present, acts as a mediator: we interact directly with it and indirectly with the environment. Contrary to the Flaneur and to the Situationists, who discovered the city with their own bodies, today the body itself is being detached from that experience. While contemporary cities turn out to become more walkable, the new technological applications tend to open out all possibilities in order to explore them by suggesting multiple routes. Exploration becomes easier, but Perception changes.

Keywords: body, experience, mobile apps, walking

Procedia PDF Downloads 416
2104 Knowledge of Artificial Insemination and Agribusiness Management for Social Innovation in Rural Populations

Authors: Yasser Y. Lenis, Daniela Garcia Gonzalez, Cristian Solarte Bacca, Diego F. Carrillo González, Amy Jo Montgomery, Dursun Barrios

Abstract:

Introduction: Artificial insemination in bovines helps to promote genetic improvement and can positively impact the rural economy. The Colombian armed conflict has forced a large portion of the rural population to abandon their territory, affecting their education, family integration, and economics. Justification: The achievement of education in rural populations was one of the Millennium Development Goals (MDGs) made by the United Nations. During the last World Summit on Sustainable Development (WSSD), it was concluded that most of the world’s poor, illiterate and undernourished population lives in rural areas; therefore, access to education is considered one of the most significant challenges for governments in countries with developing economies. Objectives: To study the effects of training in artificial insemination and rural management on the perception of knowledge and the level of knowledge in rural residents affected by the armed conflict in Nariño, Colombia. Methods: The perception of knowledge and the theoretical-practical knowledge of 63 rural residents were evaluated on the topics of bovine agribusiness management, artificial insemination, and genetic improvement through the application of three surveys. 1) evaluated the perceived level of knowledge each rural resident had about each topic using the Likert scale, 2) evaluated the theoretical knowledge before training, and 3) evaluated the theoretical knowledge upon completion of training. Results/discussion: Of the surveyed rural residents, 54% stated that they knew how business management improved the performance of their bovine agribusiness, 54% answered the pre-training knowledge test correctly, while 83% correctly answered the post-training knowledge test. Only 6% of surveyed residents perceived that they had prior knowledge of artificial insemination and reproductive anatomy topics. Before training, 35% of surveyed residents answered correctly on these topics, while upon completion of training, 65% answered correctly. Regarding genetic improvement, 11% of participating rural residents stated that they knew this subject. The correct answers on this topic went from 57% to 89% before and post-training. Conclusion: Rural extension programs contribute to closing knowledge gaps in relation to the use of reproductive biotechnologies and bovine management in rural areas affected by armed conflict.

Keywords: agribusiness, insemination, knowledge, reproduction

Procedia PDF Downloads 176
2103 Personal Perception of the Acoustic Properties of Three Different Rooms for Music Lessons

Authors: Natalia Ivanova, Konstantin Adamov

Abstract:

The importance of acoustics in music classes made us analyse three music rooms in a Bulgarian school. The same music piece was performed in every one of the classrooms. The recording was played to 2 groups of students. A survey was then taken among those students in order to determine their personal preferences and impressions of the acoustic. The results show differences in the preferences of older students compared to younger ones. Results of the survey show a correlation between older students’ preferences and the standard requirements. However, we discover that younger students’ classrooms should be further analysed and adapted to their needs and preferences.

Keywords: acousic, building acoustic, sound quality, scool acoustic

Procedia PDF Downloads 104
2102 Saudi State Arabia’s Struggle for a Post-Rentier Regional Order

Authors: Omair Anas

Abstract:

The Persian Gulf has been in turmoil for a long time since the colonial administration has handed over the role to the small and weak kings and emirs who were assured of protection in return of many economic and security promises to them. The regional order, Saudi Arabia evolved was a rentier regional order secured by an expansion of rentier economy and taking responsibility for much of the expenses of the regional order on behalf of relatively poor countries. The two oil booms helped the Saudi state to expand the 'rentier order' driven stability and bring the countries like Egypt, Jordan, Syria, and Palestine under its tutelage. The disruptive misadventure, however, came with Iran's proclamation of the Islamic Revolution in 1979 which it wanted to be exported to its 'un-Islamic and American puppet' Arab neighbours. For Saudi Arabia, even the challenge presented by the socialist-nationalist Arab dictators like Gamal Abdul Nasser and Hafez Al-Assad was not that much threatening to the Saudi Arabia’s then-defensive realism. In the Arab uprisings, the Gulf monarchies saw a wave of insecurity and Iran found it an opportune time to complete the revolutionary process it could not complete after 1979. An alliance of convenience and ideology between Iran and Islamist groups had the real potential to challenge both Saudi Arabia’s own security and its leadership in the region. The disruptive threat appeared at a time when the Saudi state had already sensed an impending crisis originating from the shifts in the energy markets. Low energy prices, declining global demands, and huge investments in alternative energy resources required Saudi Arabia to rationalize its economy according to changing the global political economy. The domestic Saudi reforms remained gradual until the death of King Abdullah in 2015. What is happening now in the region, the Qatar crisis, the Lebanon crisis and the Saudi-Iranian proxy war in Iraq, Syria, and Yemen has combined three immediate objectives, rationalising Saudi economy and most importantly, the resetting the Saudi royal power for Saudi Arabia’s longest-serving future King Mohammad bin Salman. The Saudi King perhaps has no time to wait and watch the power vacuum appearing because of Iran’s expansionist foreign policy. The Saudis appear to be employing an offensive realism by advancing a pro-active regional policy to counter Iran’s threatening influence amid disappearing Western security from the region. As the Syrian civil war is coming to a compromised end with ceding much ground to Iran-controlled militias, Hezbollah and Al-Hashad, the Saudi state has lost much ground in these years and the threat from Iranian proxies is more than a reality, more clearly in Bahrain, Iraq, Syria, and Yemen. This paper attempts to analyse the changing Saudi behaviour in the region, which, the author understands, is shaped by an offensive-realist approach towards finding a favourable security environment for the Saudi-led regional order, a post-rentier order perhaps.

Keywords: terrorism, Saudi Arabia, Rentier State, gulf crisis

Procedia PDF Downloads 136
2101 Cross-Cultural Collaboration Shaping Co-Creation Methodology to Enhance Disaster Risk Management Approaches

Authors: Jeannette Anniés, Panagiotis Michalis, Chrysoula Papathanasiou, Selby Knudsen

Abstract:

RiskPACC project aims to bring together researchers, practitioners, and first responders from nine European countries following a co-creation approach aiming to develop customised solutions to meet the needs of end-users. The co-creation workshops target to enhance the communication pathways between local civil protection authorities (CPAs) and citizens, in an effort to close the risk perception-action gap (RPAG). The participants in the workshops include a variety of stakeholders, as well as citizens, fostering the dialogue between the groups and supporting citizen participation in disaster risk management (DRM). The co-creation methodology in place implements co-design elements due to the integration of four ICT tools. Such ICT tools include web-based and mobile application technical solutions in different development stages, ranging from formulation and validation of concepts to pilot demonstrations. In total, seven different case studies are foreseen in RiskPACC. The workflow of the workshops is designed to be adaptive to every of the seven case study countries and their cultures’ particular needs. This work aims to provide an overview of the the preparation and the conduction of the workshops in which researchers and practitioners focused on mapping these different needs from the end users. The latter included first responders but also volunteers and citizens who actively participated in the co-creation workshops. The strategies to improve communication between CPAs and citizens themselves differ in the countries, and the modules of the co-creation methodology are adapted in response to such differences. Moreover, the project partners experienced how the structure of such workshops is perceived differently in the seven case studies. Therefore, the co-creation methodology itself is a design method underlying several iterations, which are eventually shaped by cross-cultural collaboration. For example, some case studies applied other modules according to the participatory group recruited. The participants were technical experts, teachers, citizens, first responders, or volunteers, among others. This work aspires to present the divergent approaches of the seven case studies implementing the co-creation methodology proposed, in response to different perceptions of the modules. An analysis of the adaptations and implications will also be provided to assess where the case studies’ objective of improving disaster resilience has been obtained.

Keywords: citizen participation, co-creation, disaster resilience, risk perception, ICT tools

Procedia PDF Downloads 88
2100 Countering Terrorism and Defending Human Right after 9/11: The European Perspective

Authors: Anita Blagojević

Abstract:

It is well known that the terrorist attacks on the New York City and Washington, D.C. prompted unprecedented international action to enhance international cooperation in the prevention and suppression of terrorism. In the months (and years) after September 11, the world community focused on two main efforts: first, on efforts to bring those responsible for terrorist attacks to justice, and second, on efforts to prevent future terrorist attacks. In that sense, many governments took advantage of these efforts to strengthen their national security. In that process, however, human rights and civil liberties of certain groups of people were alleged. As a consequence, part of the price paid for protecting national security against terrorist attacks was the threat of infringement on people's fundamental rights and freedoms. The aim of this paper is to analyze the role of the European Union and the Council of Europe in finding the answer to the one of the main security dilemma for the present era: how to find the balance between the protection of national security and guarantee of the people's rights and fundamental freedoms?

Keywords: terrorism, antiterrorism, European Union, Council of Europe, human rights

Procedia PDF Downloads 378
2099 The Impact of Artificial Intelligence on Agricultural Machines and Plant Nutrition

Authors: Kirolos Gerges Yakoub Gerges

Abstract:

Self-sustaining agricultural machines act in stochastic surroundings and therefore, should be capable of perceive the surroundings in real time. This notion can be done using image sensors blended with superior device learning, mainly Deep mastering. Deep convolutional neural networks excel in labeling and perceiving colour pix and since the fee of RGB-cameras is low, the hardware cost of accurate notion relies upon heavily on memory and computation power. This paper investigates the opportunity of designing lightweight convolutional neural networks for semantic segmentation (pixel clever class) with reduced hardware requirements, to allow for embedded usage in self-reliant agricultural machines. The usage of compression techniques, a lightweight convolutional neural community is designed to carry out actual-time semantic segmentation on an embedded platform. The community is skilled on two big datasets, ImageNet and Pascal Context, to apprehend as much as four hundred man or woman instructions. The 400 training are remapped into agricultural superclasses (e.g. human, animal, sky, road, area, shelterbelt and impediment) and the capacity to provide correct actual-time perception of agricultural environment is studied. The network is carried out to the case of self-sufficient grass mowing the usage of the NVIDIA Tegra X1 embedded platform. Feeding case-unique pics to the community consequences in a fully segmented map of the superclasses within the picture. As the network remains being designed and optimized, handiest a qualitative analysis of the technique is entire on the abstract submission deadline. intending this cut-off date, the finalized layout is quantitatively evaluated on 20 annotated grass mowing pictures. Light-weight convolutional neural networks for semantic segmentation can be implemented on an embedded platform and show aggressive performance on the subject of accuracy and speed. It’s miles viable to offer value-efficient perceptive capabilities related to semantic segmentation for autonomous agricultural machines.

Keywords: centrifuge pump, hydraulic energy, agricultural applications, irrigationaxial flux machines, axial flux applications, coreless machines, PM machinesautonomous agricultural machines, deep learning, safety, visual perception

Procedia PDF Downloads 26
2098 Towards an Enhanced Compartmental Model for Profiling Malware Dynamics

Authors: Jessemyn Modiini, Timothy Lynar, Elena Sitnikova

Abstract:

We present a novel enhanced compartmental model for malware spread analysis in cyber security. This paper applies cyber security data features to epidemiological compartmental models to model the infectious potential of malware. Compartmental models are most efficient for calculating the infectious potential of a disease. In this paper, we discuss and profile epidemiologically relevant data features from a Domain Name System (DNS) dataset. We then apply these features to epidemiological compartmental models to network traffic features. This paper demonstrates how epidemiological principles can be applied to the novel analysis of key cybersecurity behaviours and trends and provides insight into threat modelling above that of kill-chain analysis. In applying deterministic compartmental models to a cyber security use case, the authors analyse the deficiencies and provide an enhanced stochastic model for cyber epidemiology. This enhanced compartmental model (SUEICRN model) is contrasted with the traditional SEIR model to demonstrate its efficacy.

Keywords: cybersecurity, epidemiology, cyber epidemiology, malware

Procedia PDF Downloads 107
2097 The Thoughts and Feelings of 60-72 Month Old Children about School and Teacher

Authors: Ayse Ozturk Samur, Gozde Inal Kiziltepe

Abstract:

No matter what level of education it is, starting a school is an exciting process as it includes new experiences. In this process, child steps into a different environment and institution except from the family institution which he was born into and feels secure. That new environment is different from home; it is a social environment which has its own rules, and involves duties and responsibilities that should be fulfilled and new vital experiences. The children who have a positive attitude towards school and like school are more enthusiastic and eager to participate in classroom activities. Moreover, a close relationship with the teacher enables the child to have positive emotions and ideas about the teacher and school and helps children adapt to school easily. In this study, it is aimed to identify children’s perceptions of academic competence, attitudes towards school and ideas about their teachers. In accordance with the aim a mixed method that includes both qualitative and quantitative data collection methods are used. The study is supported with qualitative data after collecting quantitative data. The study group of the research consists of randomly chosen 250 children who are 60-72 month old and attending a preschool institution in a city center located West Anatolian region of Turkey. Quantitative data was collected using Feelings about School scale. The scale consists of 12 items and 4 dimensions; school, teacher, mathematic, and literacy. Reliability and validity study for the scale used in the study was conducted by the researchers with 318 children who were 60-72 months old. For content validity experts’ ideas were asked, for construct validity confirmatory factor analysis was utilized. Reliability of the scale was examined by calculating internal consistency coefficient (Cronbach alpha). At the end of the analyses it was found that FAS is a valid and reliable instrument to identify 60-72 month old children’ perception of their academic competency, attitude toward school and ideas about their teachers. For the qualitative dimension of the study, semi-structured interviews were done with 30 children aged 60-72 month. At the end of the study, it was identified that children’s’ perceptions of their academic competencies and attitudes towards school was medium-level and their ideas about their teachers were high. Based on the semi structured interviews done with children, it is identified that they have a positive perception of school and teacher. That means quantitatively gathered data is supported by qualitatively collected data.

Keywords: feelings, preschool education, school, teacher, thoughts

Procedia PDF Downloads 224
2096 “I” on the Web: Social Penetration Theory Revised

Authors: Dr. Dionysis Panos Dpt. Communication, Internet Studies Cyprus University of Technology

Abstract:

The widespread use of New Media and particularly Social Media, through fixed or mobile devices, has changed in a staggering way our perception about what is “intimate" and "safe" and what is not, in interpersonal communication and social relationships. The distribution of self and identity-related information in communication now evolves under new and different conditions and contexts. Consequently, this new framework forces us to rethink processes and mechanisms, such as what "exposure" means in interpersonal communication contexts, how the distinction between the "private" and the "public" nature of information is being negotiated online, how the "audiences" we interact with are understood and constructed. Drawing from an interdisciplinary perspective that combines sociology, communication psychology, media theory, new media and social networks research, as well as from the empirical findings of a longitudinal comparative research, this work proposes an integrative model for comprehending mechanisms of personal information management in interpersonal communication, which can be applied to both types of online (Computer-Mediated) and offline (Face-To-Face) communication. The presentation is based on conclusions drawn from a longitudinal qualitative research study with 458 new media users from 24 countries for almost over a decade. Some of these main conclusions include: (1) There is a clear and evidenced shift in users’ perception about the degree of "security" and "familiarity" of the Web, between the pre- and the post- Web 2.0 era. The role of Social Media in this shift was catalytic. (2) Basic Web 2.0 applications changed dramatically the nature of the Internet itself, transforming it from a place reserved for “elite users / technical knowledge keepers" into a place of "open sociability” for anyone. (3) Web 2.0 and Social Media brought about a significant change in the concept of “audience” we address in interpersonal communication. The previous "general and unknown audience" of personal home pages, converted into an "individual & personal" audience chosen by the user under various criteria. (4) The way we negotiate the nature of 'private' and 'public' of the Personal Information, has changed in a fundamental way. (5) The different features of the mediated environment of online communication and the critical changes occurred since the Web 2.0 advance, lead to the need of reconsideration and updating the theoretical models and analysis tools we use in our effort to comprehend the mechanisms of interpersonal communication and personal information management. Therefore, is proposed here a new model for understanding the way interpersonal communication evolves, based on a revision of social penetration theory.

Keywords: new media, interpersonal communication, social penetration theory, communication exposure, private information, public information

Procedia PDF Downloads 371
2095 Create a Brand Value Assessment Model to Choosing a Cosmetic Brand in Tehran Combining DEMATEL Techniques and Multi-Stage ANFIS

Authors: Hamed Saremi, Suzan Taghavy, Seyed Mohammad Hanif Sanjari, Mostafa Kahali

Abstract:

One of the challenges in manufacturing and service companies to provide a product or service is recognized Brand to consumers in target markets. They provide most of their processes under the same capacity. But the constant threat of devastating internal and external resources to prevent a rise Brands and more companies are recognizing the stages are bankrupt. This paper has tried to identify and analyze effective indicators of brand equity and focuses on indicators and presents a model of intelligent create a model to prevent possible damage. In this study, the identified indicators of brand equity are based on literature study and according to expert opinions, set of indicators By techniques DEMATEL Then to used Multi-Step Adaptive Neural-Fuzzy Inference system (ANFIS) to design a multi-stage intelligent system for assessment of brand equity.

Keywords: brand, cosmetic product, ANFIS, DEMATEL

Procedia PDF Downloads 417
2094 Dual Mode “Turn On-Off-On” Photoluminescence Detection of EDTA and Lead Using Moringa Oleifera Gum-Derived Carbon Dots

Authors: Anisha Mandal, Swambabu Varanasi

Abstract:

Lead is one of the most prevalent toxic heavy metal ions, and its pollution poses a significant threat to the environment and human health. On the other hand, Ethylenediaminetetraacetic acid is a widely used metal chelating agent that, due to its poor biodegradability, is an incessant pollutant to the environment. For the first time, a green, simple, and cost-effective approach is used to hydrothermally synthesise photoluminescent carbon dots using Moringa Oleifera Gum in a single step. Then, using Moringa Oleifera Gum-derived carbon dots, a photoluminescent "ON-OFF-ON" mechanism for dual mode detection of trace Pb2+ and EDTA was proposed. MOG-CDs detect Pb2+ selectively and sensitively using a photoluminescence quenching mechanism, with a detection limit (LOD) of 0.000472 ppm. (1.24 nM). The quenched photoluminescence can be restored by adding EDTA to the MOG-CD+Pb2+ system; this strategy is used to quantify EDTA at a level of detection of 0.0026 ppm. (8.9 nM). The quantification of Pb2+ and EDTA in actual samples encapsulated the applicability and dependability of the proposed photoluminescent probe.

Keywords: carbon dots, photoluminescence, sensor, moringa oleifera gum

Procedia PDF Downloads 114
2093 Occasional Word-Formation in Postfeminist Fiction: Cognitive Approach

Authors: Kateryna Nykytchenko

Abstract:

Modern fiction and non-fiction writers commonly use their own lexical and stylistic devices to capture a reader’s attention and bring certain thoughts and feelings to his reader. Among such devices is the appearance of one of the neologic notions – individual author’s formations: occasionalisms or nonce words. To a significant extent, the host of examples of new words occurs in chick lit genre which has experienced exponential growth in recent years. Chick Lit is a new-millennial postfeminist fiction which focuses primarily on twenty- to thirtysomething middle-class women. It brings into focus the image of 'a new woman' of the 21st century who is always fallible, funny. This paper aims to investigate different types of occasional word-formation which reflect cognitive mechanisms of conveying women’s perception of the world. Chick lit novels of Irish author Marian Keyes present genuinely innovative mixture of forms, both literary and nonliterary which is displayed in different types of occasional word-formation processes such as blending, compounding, creative respelling, etc. Crossing existing mental and linguistic boundaries, adopting herself to new and overlapping linguistic spaces, chick lit author creates new words which demonstrate the result of development and progress of language and the relationship between language, thought and new reality, ultimately resulting in hybrid word-formation (e.g. affixation or pseudoborrowing). Moreover, this article attempts to present the main characteristics of chick-lit fiction genre with the help of the Marian Keyes’s novels and their influence on occasionalisms. There has been a lack of research concerning cognitive nature of occasionalisms. The current paper intends to account for occasional word-formation as a set of interconnected cognitive mechanisms, operations and procedures meld together to create a new word. The results of the generalized analysis solidify arguments that the kind of new knowledge an occasionalism manifests is inextricably linked with cognitive procedure underlying it, which results in corresponding type of word-formation processes. In addition, the findings of the study reveal that the necessity of creating occasionalisms in postmodern fiction novels arises from the need to write in a new way keeping up with a perpetually developing world, and thus the evolution of the speaker herself and her perception of the world.

Keywords: Chick Lit, occasionalism, occasional word-formation, cognitive linguistics

Procedia PDF Downloads 181
2092 SVID: Structured Vulnerability Intelligence for Building Deliberated Vulnerable Environment

Authors: Wenqing Fan, Yixuan Cheng, Wei Huang

Abstract:

The diversity and complexity of modern IT systems make it almost impossible for internal teams to find vulnerabilities in all software before the software is officially released. The emergence of threat intelligence and vulnerability reporting policy has greatly reduced the burden on software vendors and organizations to find vulnerabilities. However, to prove the existence of the reported vulnerability, it is necessary but difficult for security incident response team to build a deliberated vulnerable environment from the vulnerability report with limited and incomplete information. This paper presents a structured, standardized, machine-oriented vulnerability intelligence format, that can be used to automate the orchestration of Deliberated Vulnerable Environment (DVE). This paper highlights the important role of software configuration and proof of vulnerable specifications in vulnerability intelligence, and proposes a triad model, which is called DIR (Dependency Configuration, Installation Configuration, Runtime Configuration), to define software configuration. Finally, this paper has also implemented a prototype system to demonstrate that the orchestration of DVE can be automated with the intelligence.

Keywords: DIR triad model, DVE, vulnerability intelligence, vulnerability recurrence

Procedia PDF Downloads 121
2091 Farmers’ Perception, Willingness and Capacity in Utilization of Household Sewage Sludge as Organic Resources for Peri-Urban Agriculture around Jos Nigeria

Authors: C. C. Alamanjo, A. O. Adepoju, H. Martin, R. N. Baines

Abstract:

Peri-urban agriculture in Jos Nigeria serves as a major means of livelihood for both urban and peri-urban poor, and constitutes huge commercial inclination with a target market that has spanned beyond Plateau State. Yet, the sustainability of this sector is threatened by intensive application of urban refuse ash contaminated with heavy metals, as a result of the highly heterogeneous materials used in ash production. Hence, this research aimed to understand the current fertilizer employed by farmers, their perception and acceptability in utilization of household sewage sludge for agricultural purposes and their capacity in mitigating risks associated with such practice. Mixed methods approach was adopted, and data collection tools used include survey questionnaire, focus group discussion with farmers, participants and field observation. The study identified that farmers maintain a complex mixture of organic and chemical fertilizers, with mixture composition that is dependent on fertilizer availability and affordability. Also, farmers have decreased the rate of utilization of urban refuse ash due to labor and increased logistic cost and are keen to utilize household sewage sludge for soil fertility improvement but are mainly constrained by accessibility of this waste product. Nevertheless, farmers near to sewage disposal points have commenced utilization of household sewage sludge for improving soil fertility. Farmers were knowledgeable on composting but find their strategic method of dewatering and sun drying more convenient. Irrigation farmers were not enthusiastic for treatment, as they desired both water and sludge. Secondly, household sewage sludge observed in the field is heterogeneous due to nearness between its disposal point and that of urban refuse, which raises concern for possible cross-contamination of pollutants and also portrays lack of extension guidance as regards to treatment and management of household sewage sludge for agricultural purposes. Hence, farmers concerns need to be addressed, particularly in providing extension advice and establishment of decentralized household sewage sludge collection centers, for continuous availability of liquid and concentrated sludge. Urgent need is also required for the Federal Government of Nigeria to increase commitment towards empowering her subsidiaries for efficient discharge of corporate responsibilities.

Keywords: ash, farmers, household, peri-urban, refuse, sewage, sludge, urban

Procedia PDF Downloads 135
2090 Towards a Computational Model of Consciousness: Global Abstraction Workspace

Authors: Halim Djerroud, Arab Ali Cherif

Abstract:

We assume that conscious functions are implemented automatically. In other words that consciousness as well as the non-consciousness aspect of human thought, planning, and perception, are produced by biologically adaptive algorithms. We propose that the mechanisms of consciousness can be produced using similar adaptive algorithms to those executed by the mechanism. In this paper, we propose a computational model of consciousness, the ”Global Abstraction Workspace” which is an internal environmental modelling perceived as a multi-agent system. This system is able to evolve and generate new data and processes as well as actions in the environment.

Keywords: artificial consciousness, cognitive architecture, global abstraction workspace, multi-agent system

Procedia PDF Downloads 340
2089 The Hauntings of Empire: Imperial Nationalism and International Relations

Authors: Katie Hudson

Abstract:

A growing body of scholarship is dedicated to the concept of imperial nationalism, denoting a nostalgia for empire amongst former imperial powers and a yearning to recapture the grandeur of the imperial ‘golden age.’ Much research within this field has focused on Brexit, arguing that Britain’s imperialist identity has spawned Euroscepticism. However, the interaction between imperial nationalism and foreign policy remains underdeveloped and thus far has failed to consider cases outside of the UK. Using maximum variation sampling across post-2000 Britain, Spain and the Netherlands, this comparative analysis aims to explore the discursive invocation of empire in foreign policy framing, under which circumstances and in what ways imperial nationalism emerges. Preliminary findings demonstrate that empire is most often cited when there is a perceived threat to the sovereignty of the nation and that all cases frame foreign policy options according to their acute concerns with regaining the prestige associated with empire. This is present to a lesser extent in Spain, whose earlier period of decolonisation affected the extent to which imperialism has permeated their national psyche. This, therefore, provides an alternative lens through which we can view both Euroscepticism and international relations, conditioned by an imperial legacy.

Keywords: empire, nationalism, foreign policy, IR

Procedia PDF Downloads 94
2088 Posts by Influencers Promoting Water Saving: The Impact of Distance and the Perception of Effectiveness on Behavior

Authors: Sancho-Esper Franco, Rodríguez Sánchez Carla, Sánchez Carolina, Orús-Sanclemente Carlos

Abstract:

Water scarcity is a reality that affects many regions of the world and is aggravated by climate change and population growth. Saving water has become an urgent need to ensure the sustainability of the planet and the survival of many communities, where youth and social networks play a key role in promoting responsible practices and adopting habits that contribute to environmental preservation. This study analyzes the persuasion capacity of messages designed to promote pro-environmental behaviors among youth. Specifically, it studies how the efficacy (effectiveness) of the response (personal response efficacy/effectiveness) and the perception of distance from the source of the message influence the water-saving behavior of the audience. To do so, two communication frameworks are combined. First, the Construal Level Theory, which is based on the concept of "psychological distance", that is, people, objects or events can be perceived as psychologically near or far, and this subjective distance (i.e., social, temporal, or spatial) determines their attitudes, emotions, and actions. This perceived distance can be social, temporal, or spatial. This research focuses on studying the spatial distance and social distance generated by cultural differences between influencers and their audience to understand how cultural distance can influence the persuasiveness of a message. Research on the effects of psychological distance between influencers-followers in the pro-environmental field is very limited, being relevant because people could learn specific behaviors suggested by opinion leaders such as influencers in social networks. Second, different approaches to behavioral change suggest that the perceived efficacy of a behavior can explain individual pro-environmental actions. People will be more likely to adopt a new behavior if they perceive that they are capable of performing it (efficacy belief) and that their behavior will effectively contribute to solving that problem (personal response efficacy). It is also important to study the different actors (social and individual) that are perceived as responsible for addressing environmental problems. Specifically, we analyze to what extent the belief individual’s water-saving actions are effective in solving the problem can influence water-saving behavior since this individual effectiveness increases people's sense of obligation and responsibility with the problem. However, in this regard, empirical evidence presents mixed results. Our study addresses the call for experimental studies manipulating different subtypes of response effectiveness to generate robust causal evidence. Based on all the above, this research analyzes whether cultural distance (local vs. international influencer) and the perception of effectiveness of behavior (personal response efficacy) (personal/individual vs. collective) affect the actual behavior and the intention to conserve water of social network users. An experiment of 2 (local influencer vs. international influencer) x 2 (effectiveness of individual vs. collective response) is designed and estimated. The results show that a message from a local influencer appealing to individual responsibility exerts greater influence on intention and actual water-saving behavior, given the cultural closeness between influencer-follower, and the appeal to individual responsibility increases the feeling of obligation to participate in pro-environmental actions. These results offer important implications for social marketing campaigns that seek to promote water conservation.

Keywords: social marketing, influencer, message framing, experiment, personal response efficacy, water saving

Procedia PDF Downloads 62
2087 Structuring the Role of Indonesia's Dilemma Position in ASEAN to Combat Human Trafficking

Authors: Febi Eka Putri, Prabowo Anggorono

Abstract:

Human Trafficking has become a threat in the global phenomenon, including Indonesia as a country adopting democracy to uphold the human rights value. Indonesia is classified as a source of trafficking in persons which dominate by women and children for sexual exploitation and forced labor purposes. In this case, Indonesia has committed to combat trafficking in persons by enacted domestic law to criminalize all types of human trafficking in domestic and international level. Tracing to the efforts, we cannot just simplify it, however, in 2016 Indonesia has placed as a tier 2 country because the government does not fully achieve the minimum standard by U. S. Trafficking Victims Protection Act due to only making efforts as progress. While as a part of ASEAN member, Indonesia has signed ASEAN Human Rights Declaration but when it comes to Human Trafficking issue, there is only few ASEAN member who has ratified ASEAN Convention on Trafficking in Persons, in particular Women and Children such as Singapore, Cambodia, and Thailand. This brings the evidence to structuring the role of Indonesia to combat human trafficking.

Keywords: Indonesia, Association of Southeast Asian Nations (ASEAN), human trafficking, Tier 2 country

Procedia PDF Downloads 353
2086 Biomedical Countermeasures to Category a Biological Agents

Authors: Laura Cochrane

Abstract:

The United States Centers for Disease Control and Prevention has established three categories of biological agents based on their ease of spread and the severity of the disease they cause. Category A biological agents are the highest priority because of their high degree of morbidity and mortality, ease of dissemination, the potential to cause social disruption and panic, special requirements for public health preparedness, and past use as a biological weapon. Despite the threat of Category A biological agents, opportunities for medical intervention exist. This work summarizes public information, consolidated and reviewed across the situational usefulness and disease awareness to offer discussion to three specific Category A agents: anthrax (Bacillus anthracis), botulism (Clostridium botulinum toxin), and smallpox (variola major), and provides an overview on the management of medical countermeasures available to treat these three (3) different types of pathogens. The medical countermeasures are discussed in the setting of pre-exposure prophylaxis, post-exposure prophylaxis, and therapeutic treatments to provide a framework for requirements in public health preparedness.

Keywords: anthrax, botulism, smallpox, medical countermeasures

Procedia PDF Downloads 76
2085 Digital Watermarking Using Fractional Transform and (k,n) Halftone Visual Cryptography (HVC)

Authors: R. Rama Kishore, Sunesh Malik

Abstract:

Development in the usage of internet for different purposes in recent times creates great threat for the copy right protection of the digital images. Digital watermarking is the best way to rescue from the said problem. This paper presents detailed review of the different watermarking techniques, latest trends in the field and categorized like spatial and transform domain, blind and non-blind methods, visible and non visible techniques etc. It also discusses the different optimization techniques used in the field of watermarking in order to improve the robustness and imperceptibility of the method. Different measures are discussed to evaluate the performance of the watermarking algorithm. At the end, this paper proposes a watermarking algorithm using (k.n) shares of halftone visual cryptography (HVC) instead of (2, 2) share cryptography. (k,n) shares visual cryptography improves the security of the watermark. As halftone is a method of reprographic, it helps in improving the visual quality of watermark image. The proposed method uses fractional transformation to improve the robustness of the copyright protection of the method.

Keywords: digital watermarking, fractional transform, halftone, visual cryptography

Procedia PDF Downloads 355
2084 The Analysis of the Influence of Islamic Religiosity on Tax Morale among Self-Employed Taxpayers in Indonesia

Authors: Nurul Hidayat

Abstract:

Based on the data from the Indonesian Tax Authority, the contribution of self-employed taxpayers in Indonesia is just approximately 1-2 percent of total tax revenues during 2013 - 2015. This phenomenon requires greater attention to understand what factors that may affect it. The fact that Indonesia has the most prominent Muslim population in the world makes it important to analyze whether there potentially exists a correlation between Islamic religiosity and low tax contribution. The low level of tax contribution may provide an initial indication of low tax morale and tax compliance. This study will extend the existing literature by investigating the influence of Islamic religiosity as a moderating effect on the relationship between the perceptions of government legitimacy and tax morale among self-employed taxpayers. There are some factors to consider when taking into account the issue of Islamic religiosity and its relationship with tax morale in this study. Firstly, in Islam, there is a debate surrounding the lawfulness of tax. Some argue that Muslims should not have to pay tax; while others argue that the imposition of the tax is legitimate in circumstances. These views may have an impact on government legitimacy and tax morale. Secondly, according to Islamic sharia, Islam recognizes another compulsory payment, i.e. zakat, which to some extent has similar characteristics to tax. According to Indonesian Income Tax Law, zakat payment has just been accommodated as a deduction from taxable income. As a comparison, Malaysia treats zakat as a tax rebate. The treatment of zakat only as a taxable income deduction may also lead to a conflicting issue regarding the perception of tax fairness that possibly erode the perception of government legitimacy and tax morale. Based on the considerations above, perceptions of government legitimacy become important to influence the willingness of people to pay tax while the level of Islamic religiosity has a potential moderator effect on that correlation. In terms of measuring the relationship among the variables, this study utilizes mixed-quantitative and qualitative methods. The quantitative methods use surveys to approximately 400 targeted taxpayers while the qualitative methods employ in-depth interviews with 12 people, consist of experts, Islamic leaders and selected taxpayers. In particular, the research is being conducted in Indonesia, the country with the largest Muslim population in the world which has not fully implemented Islamic law as state law. The result indicates that Islamic religiosity becomes a moderating effect on the way taxpayers perceived government legitimacy that finally influences on tax morale. The findings of this study are supportive for the improvement of tax regulations by specifically considering tax deductions for zakat.

Keywords: Islamic religiosity, tax morale, government legitimacy, zakat

Procedia PDF Downloads 240
2083 The Proactive Approach of Digital Forensics Methodology against Targeted Attack Malware

Authors: Mohamed Fadzlee Sulaiman, Mohd Zabri Adil Talib, Aswami Fadillah Mohd Ariffin

Abstract:

Each individual organization has their own mechanism to build up cyber defense capability in protecting their information infrastructures from data breaches and cyber espionage. But, we can not deny the possibility of failing to detect and stop cyber attacks especially for those targeting credential information and intellectual property (IP). In this paper, we would like to share the modern approach of effective digital forensic methodology in order to identify the artifacts in tracing the trails of evidence while mitigating the infection from the target machine/s. This proposed approach will suit the digital forensic investigation to be conducted while resuming the business critical operation after mitigating the infection and minimizing the risk from the identified attack to transpire. Therefore, traditional digital forensics methodology has to be improvised to be proactive which not only focusing to discover the root caused and the threat actor but to develop the relevant mitigation plan in order to prevent from the same attack.

Keywords: digital forensic, detection, eradication, targeted attack, malware

Procedia PDF Downloads 275
2082 Development of Energy Management System Based on Internet of Things Technique

Authors: Wen-Jye Shyr, Chia-Ming Lin, Hung-Yun Feng

Abstract:

The purpose of this study was to develop an energy management system for university campuses based on the Internet of Things (IoT) technique. The proposed IoT technique based on WebAccess is used via network browser Internet Explore and applies TCP/IP protocol. The case study of IoT for lighting energy usage management system was proposed. Structure of proposed IoT technique included perception layer, equipment layer, control layer, application layer and network layer.

Keywords: energy management, IoT technique, sensor, WebAccess

Procedia PDF Downloads 334
2081 Technological Affordances: Guidelines for E-Learning Design

Authors: Clement Chimezie Aladi, Itamar Shabtai

Abstract:

A review of the literature in the last few years reveals that little attention has been paid to technological affordances in e-learning designs. However, affordances are key to engaging students and enabling teachers to actualize learning goals. E-learning systems (software and artifacts) need to be designed in such a way that the features facilitate perceptions of the affordances with minimal cognition. This study aimed to fill this gap in the literature and encourage further research in this area. It provides guidelines for facilitating the perception of affordances in e-learning design and advances Technology Affordance and Constraints Theory by incorporating the affordance-based design process, the principles of multimedia learning, e-learning design philosophy, and emotional and cognitive affordances.

Keywords: e-learning, technology affrodances, affordance based design, e-learning design

Procedia PDF Downloads 62
2080 Comparing of Hypogonadism Frequency between Metabolic Syndrome Men with Normal Men

Authors: Armaghan Moravej Aleali, Seyed Bahman Ghaderian, Homeira Rashidi, Mahmoud Mapar

Abstract:

Background and Objective The metabolic syndrome (MetS) is considered the most important public health threat of the 21st century. This syndrome is characterized by a cluster of cardiovascular risk factors including increased central abdominal obesity, elevated triglycerides, reduced high-density lipoprotein, high blood pressure, increased fasting glucose, and hyperinsulinemia. MetS has been associated with hypogonadism and erectile dysfunction (ED), and MetS may be considered a risk factor for ED. The aim of this study was finding an association between metabolic syndrome and hypogonadism in Khouzestan, Iran. Subjects and Methods: In this study, 60 patients divided into two groups consisted of 30 cases (with metabolic syndrome) and 30 controls. Total and free Serum Testosterone and FBS in all of them were measured. Data was analyzed with SPSS20 program. Results: There was a significant difference between two groups about free Testosterone (P=0.01), FBS (P=0.002) and LH (P=0.03). Conclusion: According to this finding, it is thought the prevalence of hypogonadism in men with metabolic syndrome is more than the general population.

Keywords: metabolic syndrome, fasting blood sugar, hypogonadism, testosterone

Procedia PDF Downloads 396
2079 Anti-Corruption Effect on Whistle Blowing Act

Authors: Na Young Kim

Abstract:

This is a study on the relation between the introduction bill of the Whistle Blowing Act and the CPI (Corruption Perception Index) from 1998 to 2019. It shows that the degree of corruption can be relatively lowered when WBA is introduced, and the system is matured. And when WBA was introduced at the national level and matured, it was found that it could have a greater impact on corruption. Secondly, it shows that OECD countries may have relatively low levels of corruption. In addition to the two variables representing democracy, when additional control variables (GDP (economic power), population size, HDI (education level), etc.) are controlled under the same conditions, the degree of corruption in countries with high political rights can be low (it means clean), while those with high civil freedom can be serious (it means not clean).

Keywords: Whistle Blowing Act, anti-corruption, CPI, GDP

Procedia PDF Downloads 61