Search results for: scope of cyber attacks
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 2029

Search results for: scope of cyber attacks

1099 Stock Characteristics and Herding Formation: Evidence from the United States Equity Market

Authors: Chih-Hsiang Chang, Fang-Jyun Su

Abstract:

This paper explores whether stock characteristics influence the herding formation among investors in the US equity market. To extend the research scope of the existing literature, this paper further examines the role that stock risk characteristics play in the US equity market, and the way they influence investors’ decision-making. First, empirical results show that whether general stocks or high-risk stocks, there are no herding behaviors among the investors in the US equity market during the whole research period or during four great events. Moreover, stock characteristics have great influence on investors’ trading decisions. Finally, there is a bidirectional lead-lag relationship of the herding formation between high-risk stocks and low-risk stocks, but the influence of high-risk stocks on the low-risk stocks is stronger than that of low-risk stocks on the high-risk stocks.

Keywords: stock characteristics, herding formation, investment decision, US equity market, lead-lag relationship

Procedia PDF Downloads 273
1098 The Relationship between Transcendence and Psychological Well-Being: A Systematic Scientific Literature Review

Authors: Monir Ahmed

Abstract:

The main purpose of this literature review was to investigate the existing quantitative clinical studies on the relationship between transcendence and psychological well-being. The primary objective of the literature review is to determine whether the existing studies adequately demonstrate the relationship between transcendence and psychological well-being, including spiritual well-being. A further objective of this literature review is to see if the ‘creatio ex nihilo’ doctrine is necessary to understand transcendence and its relationship with psychological well-being. Systematic literature review methods including studies identified from search engines, extracting data from the studies and assessing their quality for the planned review were used. The outcome of this literature review indicates that self-transcendence (STa), spiritual transcendence (STb) are positively related to psychological well-being. However, such positive relationships present limited scope for understanding transcendence and its relationship with well-being. The findings of this review support the need for further research in the area of transcendence and well-being. This literature review reveals the importance of developing a new transcendence tool for determining an individual’s ability to transcend and the relationship between his/her ability for transcendence and psychological well-being. The author of this paper proposes that the inclusion of the theological doctrine (‘creatio ex nihilo’) in understanding transcendence and psychological well-being is crucial, necessary and unavoidable.

Keywords: transcendence, psychological well-being, self-transcendence, spiritual transcendence, ‘creatio ex nihilo’

Procedia PDF Downloads 134
1097 Electrochemistry of Metal Chalcogenides Semiconductor Materials; Theory and Practical Applications

Authors: Mahmoud Elrouby

Abstract:

Metal chalcogenide materials have wide spectrum of properties, for that these materials can be used in electronics, optics, magnetics, solar energy conversion, catalysis, passivation, ion sensing, batteries, and fuel cells. This work aims to, how can obtain these materials via electrochemical methods simply for further applications. The work regards in particular the systems relevant to the sulphur sub-group elements, i.e., sulphur, selenium, and tellurium. The role of electrochemistry in synthesis, development, and characterization of the metal chalcogenide materials and related devices is vital and important. Electrochemical methods as preparation tool offer the advantages of soft chemistry to access bulk, thin, nano film and epitaxial growth of a wide range of alloys and compounds, while as a characterization tool provides exceptional assistance in specifying the physicochemical properties of materials. Moreover, quite important applications and modern devices base their operation on electrochemical principles. Thereupon, our scope in the first place was to organize existing facts on the electrochemistry of metal chalcogenides regarding their synthesis, properties, and applications.

Keywords: electrodeposition, metal chacogenides, semiconductors, applications

Procedia PDF Downloads 296
1096 Evaluation of Deformable Boundary Condition Using Finite Element Method and Impact Test for Steel Tubes

Authors: Abed Ahmed, Mehrdad Asadi, Jennifer Martay

Abstract:

Stainless steel pipelines are crucial components to transportation and storage in the oil and gas industry. However, the rise of random attacks and vandalism on these pipes for their valuable transport has led to more security and protection for incoming surface impacts. These surface impacts can lead to large global deformations of the pipe and place the pipe under strain, causing the eventual failure of the pipeline. Therefore, understanding how these surface impact loads affect the pipes is vital to improving the pipes’ security and protection. In this study, experimental test and finite element analysis (FEA) have been carried out on EN3B stainless steel specimens to study the impact behaviour. Low velocity impact tests at 9 m/s with 16 kg dome impactor was used to simulate for high momentum impact for localised failure. FEA models of clamped and deformable boundaries were modelled to study the effect of the boundaries on the pipes impact behaviour on its impact resistance, using experimental and FEA approach. Comparison of experimental and FE simulation shows good correlation to the deformable boundaries in order to validate the robustness of the FE model to be implemented in pipe models with complex anisotropic structure.

Keywords: dynamic impact, deformable boundary conditions, finite element modelling, LS-DYNA, stainless steel pipe

Procedia PDF Downloads 147
1095 Physical Education and Bodily Practices as an Alternative for Body Design and Acceptance in LGBTI Students

Authors: Aline Giardin, Maria Rosa Chitolina

Abstract:

In the last decades, there have been changes in the organization of society. It is not by chance that in our schools we have witnessed a growing interest in actions to address violence, prejudice, and discrimination against gays, lesbians, bisexuals, transvestites, and transsexuals. Considering that gender is a category that is present in the broad scope of relations that physical education covers, it seems that the theme has not aroused due attention. The body is not just a body. It is also their environment. Society forms not only personality and behavior, but also, how the body appears. In order to problematize gender in the field of physical education, it makes sense to put the body in focus because it is of bodily practices, that body's movement, which is spoken. The sports are part of the cultural manifestations of the most different social groups. Through workshops and interviews, we will investigate the role of Sports in the process of conception and acceptance of the body in LGBTTI students. From this work we intend to work towards a greater inclusion of these students in physical education classes, as well as a better understanding of their body and their sexuality. We hope that our work will enable greater acceptance and better body design of LGBTTI students.

Keywords: body, conception, LGBTTI students, physical education

Procedia PDF Downloads 363
1094 Effective Retirement Planning: Exploring Financial Planning Behavior in Malaysia

Authors: Stanley Yap Peng Lok, Chong Wei Ying, Leow Hon Wei, Fatemeh Kimiyaghalam

Abstract:

Purpose: This paper examines how people treat on the importance of financial planning for their retirement. There is lack of standard instrument that enable us to access the retirement planning behavior. This paper studies the reliability and validity of a proposed scale for accessing this behavior. Design/methodology/approach: The Retirement Planning Behavior scale (RPB) is developed from the results of reviewing different papers on this topic. A total of 900 Malaysians from the age of 18 and above are used as the sample. Findings: Our results show, firstly, the RPB meets all criteria from the instrument reliability and validity which based on the theory of planned behavior. Second, our findings propose two components for this RPB scale; attitude toward planning for retirement and intention towards retirement planning behavior. Practical implication: An effective retirement planning achieves financial independence after the retirement. Our findings have important implications for the scope and significance of the retirement planning behavior measurement, especially for retirees. Originality/value: This study proposes a new approach to cater consumers’ needs for retirement planning. Therefore, consumers are able to achieve financial independence in their retirement age.

Keywords: retirement planning behavior (RPB) scale, reliability, validity, retirement planning, financial independence

Procedia PDF Downloads 406
1093 Improved Throttled Load Balancing Approach for Cloud Environment

Authors: Sushant Singh, Anurag Jain, Seema Sabharwal

Abstract:

Cloud computing is advancing with a rapid speed. Already, it has been adopted by a huge set of users. Easy to use and anywhere access like potential of cloud computing has made it more attractive relative to other technologies. This has resulted in reduction of deployment cost on user side. It has also allowed the big companies to sell their infrastructure to recover the installation cost for the organization. Roots of cloud computing have extended from Grid computing. Along with the inherited characteristics of its predecessor technologies it has also adopted the loopholes present in those technologies. Some of the loopholes are identified and corrected recently, but still some are yet to be rectified. Two major areas where still scope of improvement exists are security and performance. The proposed work is devoted to performance enhancement for the user of the existing cloud system by improving the basic throttled mapping approach between task and resources. The improved procedure has been tested using the cloud analyst simulator. The results are compared with the original and it has been found that proposed work is one step ahead of existing techniques.

Keywords: cloud analyst, cloud computing, load balancing, throttled

Procedia PDF Downloads 248
1092 Identification Strategies for Unknown Victims from Mass Disasters and Unknown Perpetrators from Violent Crime or Terrorist Attacks

Authors: Michael Josef Schwerer

Abstract:

Background: The identification of unknown victims from mass disasters, violent crimes, or terrorist attacks is frequently facilitated through information from missing persons lists, portrait photos, old or recent pictures showing unique characteristics of a person such as scars or tattoos, or simply reference samples from blood relatives for DNA analysis. In contrast, the identification or at least the characterization of an unknown perpetrator from criminal or terrorist actions remains challenging, particularly in the absence of material or data for comparison, such as fingerprints, which had been previously stored in criminal records. In scenarios that result in high levels of destruction of the perpetrator’s corpse, for instance, blast or fire events, the chance for a positive identification using standard techniques is further impaired. Objectives: This study shows the forensic genetic procedures in the Legal Medicine Service of the German Air Force for the identification of unknown individuals, including such cases in which reference samples are not available. Scenarios requiring such efforts predominantly involve aircraft crash investigations, which are routinely carried out by the German Air Force Centre of Aerospace Medicine as one of the Institution’s essential missions. Further, casework by military police or military intelligence is supported based on administrative cooperation. In the talk, data from study projects, as well as examples from real casework, will be demonstrated and discussed with the audience. Methods: Forensic genetic identification in our laboratories involves the analysis of Short Tandem Repeats and Single Nucleotide Polymorphisms in nuclear DNA along with mitochondrial DNA haplotyping. Extended DNA analysis involves phenotypic markers for skin, hair, and eye color together with the investigation of a person’s biogeographic ancestry. Assessment of the biological age of an individual employs CpG-island methylation analysis using bisulfite-converted DNA. Forensic Investigative Genealogy assessment allows the detection of an unknown person’s blood relatives in reference databases. Technically, end-point-PCR, real-time PCR, capillary electrophoresis, pyrosequencing as well as next generation sequencing using flow-cell-based and chip-based systems are used. Results and Discussion: Optimization of DNA extraction from various sources, including difficult matrixes like formalin-fixed, paraffin-embedded tissues, degraded specimens from decomposed bodies or from decedents exposed to blast or fire events, provides soil for successful PCR amplification and subsequent genetic profiling. For cases with extremely low yields of extracted DNA, whole genome preamplification protocols are successfully used, particularly regarding genetic phenotyping. Improved primer design for CpG-methylation analysis, together with validated sampling strategies for the analyzed substrates from, e.g., lymphocyte-rich organs, allows successful biological age estimation even in bodies with highly degraded tissue material. Conclusions: Successful identification of unknown individuals or at least their phenotypic characterization using pigmentation markers together with age-informative methylation profiles, possibly supplemented by family tree search employing Forensic Investigative Genealogy, can be provided in specialized laboratories. However, standard laboratory procedures must be adapted to work with difficult and highly degraded sample materials.

Keywords: identification, forensic genetics, phenotypic markers, CPG methylation, biological age estimation, forensic investigative genealogy

Procedia PDF Downloads 48
1091 Cyberstalking as an Online Sexual Harassment: Evidence from Experience from Female University Students in Tanzanian Institutions of Higher Learning

Authors: Angela Mathias Kavishe

Abstract:

Sexual harassment directed at women is reported in many societies, including in Tanzania. The advent of ICT technology, especially in universities, seems to aggravate the situation by extending harassment to cyberspace in various forms, including cyberstalking. Evidence shows that online violence is more dangerous than physical one due to the ability to access multiple private information, attack many victims, mask the perpetrator's identity, suspend the threat for a long time and spread over time and space. The study aimed to measure the magnitude of cyber harassment in Tanzanian higher learning institutions and to assess institutional sensitivity to ICT-mediated gender-based violence. It was carried out in 4 higher learning institutions in Tanzania: Mwalimu Nyerere Memorial Academy and Institute of Finance Management in Dar es Salaam and SAUT, and the University of Dodoma, where a survey questionnaire was distributed to 400 students and 40 key informants were interviewed. It was found that in each institution, the majority of female students experienced online harassment on social media perpetrated by ex-partners, male students, and university male teaching staff. The perpetrators compelled the female students to post nude pictures, have sexual relations with them, or utilize the posted private photographs to force female students to practice online or offline sexual relations. These threats seem to emanate from social-cultural beliefs about the subordinate position of women in society and that women's bodies are perceived as sex objects. It is therefore concluded that cyberspace provides an alternative space for perpetrators to exercise violence towards women.

Keywords: cyberstalking, embodiment, gender-based violence, internet

Procedia PDF Downloads 48
1090 On the Design of a Secure Two-Party Authentication Scheme for Internet of Things Using Cancelable Biometrics and Physically Unclonable Functions

Authors: Behnam Zahednejad, Saeed Kosari

Abstract:

Widespread deployment of Internet of Things (IoT) has raised security and privacy issues in this environment. Designing a secure two-factor authentication scheme between the user and server is still a challenging task. In this paper, we focus on Cancelable Biometric (CB) as an authentication factor in IoT. We show that previous CB-based scheme fail to provide real two-factor security, Perfect Forward Secrecy (PFS) and suffer database attacks and traceability of the user. Then we propose our improved scheme based on CB and Physically Unclonable Functions (PUF), which can provide real two-factor security, PFS, user’s unlinkability, and resistance to database attack. In addition, Key Compromise Impersonation (KCI) resilience is achieved in our scheme. We also prove the security of our proposed scheme formally using both Real-Or-Random (RoR) model and the ProVerif analysis tool. For the usability of our scheme, we conducted a performance analysis and showed that our scheme has the least communication cost compared to the previous CB-based scheme. The computational cost of our scheme is also acceptable for the IoT environment.

Keywords: IoT, two-factor security, cancelable biometric, key compromise impersonation resilience, perfect forward secrecy, database attack, real-or-random model, ProVerif

Procedia PDF Downloads 100
1089 A Novel Methodology for Browser Forensics to Retrieve Searched Keywords from Windows 10 Physical Memory Dump

Authors: Dija Sulekha

Abstract:

Nowadays, a good percentage of reported cybercrimes involve the usage of the Internet, directly or indirectly for committing the crime. Usually, Web Browsers leave traces of browsing activities on the host computer’s hard disk, which can be used by investigators to identify internet-based activities of the suspect. But criminals, who involve in some organized crimes, disable browser file generation feature to hide the evidence while doing illegal activities through the Internet. In such cases, even though browser files were not generated in the storage media of the system, traces of recent and ongoing activities were generated in the Physical Memory of the system. As a result, the analysis of Physical Memory Dump collected from the suspect's machine retrieves lots of forensically crucial information related to the browsing history of the Suspect. This information enables the cyber forensic investigators to concentrate on a few highly relevant selected artefacts while doing the Offline Forensics analysis of storage media. This paper addresses the reconstruction of web browsing activities by conducting live forensics to identify searched terms, downloaded files, visited sites, email headers, email ids, etc. from the physical memory dump collected from Windows 10 Systems. Well-known entry points are available for retrieving all the above artefacts except searched terms. The paper describes a novel methodology to retrieve the searched terms from Windows 10 Physical Memory. The searched terms retrieved in this way can be used for doing advanced file and keyword search in the storage media files reconstructed from the file system recovery in offline forensics.

Keywords: browser forensics, digital forensics, live Forensics, physical memory forensics

Procedia PDF Downloads 115
1088 Phishing Detection: Comparison between Uniform Resource Locator and Content-Based Detection

Authors: Nuur Ezaini Akmar Ismail, Norbazilah Rahim, Norul Huda Md Rasdi, Maslina Daud

Abstract:

A web application is the most targeted by the attacker because the web application is accessible by the end users. It has become more advantageous to the attacker since not all the end users aware of what kind of sensitive data already leaked by them through the Internet especially via social network in shake on ‘sharing’. The attacker can use this information such as personal details, a favourite of artists, a favourite of actors or actress, music, politics, and medical records to customize phishing attack thus trick the user to click on malware-laced attachments. The Phishing attack is one of the most popular attacks for social engineering technique against web applications. There are several methods to detect phishing websites such as Blacklist/Whitelist based detection, heuristic-based, and visual similarity-based detection. This paper illustrated a comparison between the heuristic-based technique using features of a uniform resource locator (URL) and visual similarity-based detection techniques that compares the content of a suspected phishing page with the legitimate one in order to detect new phishing sites based on the paper reviewed from the past few years. The comparison focuses on three indicators which are false positive and negative, accuracy of the method, and time consumed to detect phishing website.

Keywords: heuristic-based technique, phishing detection, social engineering and visual similarity-based technique

Procedia PDF Downloads 173
1087 Anti Corruption Conventions in Nigeria: Legal and Administrative Challenges

Authors: Mohammed Albakariyu Kabir

Abstract:

There is a trend in development discourse to understand and explain the level of corruption in Nigeria, its anti-corruption crusade and why it is failing, as well as its level of compliance with International standards of United Nations Convention against Corruption (UNCAC) & African Union Convention on Converting and Preventing Corruption) to which Nigeria is a signatory. This paper discusses the legal and Constitutional provisions relating to corrupt practices and safeguards in Nigeria, as well as the obstacles to the implementation of these Conventions.The paper highlights the challenges posed to the Anti-Corruption crusade by analysing the loopholes that exist both in administrative structure and in scope of the relevant laws. The paper argues that Nigerian Constitution did not make adequate provisions for the implementation of the conventions, hence a proposal which will ensure adequate provision for implementing the conventions to better the lives of Nigerians. The paper concludes that there is the need to build institutional parameters, adequate constitutional and structural safeguards, as well as to synergise strategies, collaborations and alliances to facilitate the timely domestication and implementation of the conventions.

Keywords: anti-corruption, corruption, convention, domestication, poverty, state parties

Procedia PDF Downloads 447
1086 Consumer Behavior Towards Online Shopping in Kuwait: A Quantitative Analysis

Authors: Mitra Arami

Abstract:

The main objective of this paper is to identify the factors that influence Kuwaiti consumers’ behavior towards online shopping. A survey was conducted among B2C e-commerce customers using a structured self-administered questionnaire. The findings of this study show that B2C e-commerce customer behavior in Kuwait is strongly influenced by customer entertainment but weakly influenced by customer trust. While the overall research project involves exploratory research using mixed methods, the focus of this paper is on a quantitative analysis of responses obtained from a survey of Kuwaiti customers, with the design of the questionnaire instrument being based on the findings of a qualitative analysis. The main findings of the analysis include a list of key factors that affect Kuwait online shoppers, and quantitative indications of the relative strengths of the various relationships. This study provides a basis for further research and more in depth studies to find the scope of online shopping in Kuwait especially, the influence of hedonic and utilitarian motivations on user engagement.

Keywords: e-commerce, online shopping, customer behavior, quantitative analysis, Kuwait

Procedia PDF Downloads 375
1085 Ocular Manifestations of Recent Viral Pandemics: A Literature Review

Authors: Mohammad J. J. Taha, Mohammad T. Abuawwad, Warda A. Alrubasy, Shams Khalid Sameer, Taleb Alsafi, Yaqeen Al-Bustanji, Luai Abu-Ismail, Abdulqadir J. Nashwan

Abstract:

Viral pandemics often take the world by storm, urging the medical community to prioritize the most evident systemic manifestations, often causing ocular manifestations to go unnoticed. This literature review aims to highlight the ocular complications of monkeypox, SARS-CoV-2, MERS, ebola, H1N1, and zika viruses as the most recent viral pandemics. Since the emergence of the newly resurfacing monkeypox and the novel SARS-CoV-2, research aiming to uncover the effects of these pandemics began right away. Moreover, it also discusses the ocular complications of the vaccines and treatments that were used in the scope of the viral pandemics. To add, this work discussed the role of the eye as an important route of viral transmission, and thereafter, the American Academy of Ophthalmology (AAO) recommendations to reduce the incidence of viral transmission were mentioned. Finally, this paper aims to outline a platform for researchers who are interested in further investigating eye-related viral manifestations.

Keywords: ophthalmology, monkeypox, ebola, zika, MERS, H1N1, influenza, COVID-19

Procedia PDF Downloads 125
1084 Comparing the Experimental Thermal Conductivity Results Using Transient Methods

Authors: Sofia Mylona, Dale Hume

Abstract:

The main scope of this work is to compare the experimental thermal conductivity results of fluids between devices using transient techniques. A range of different liquids within a range of viscosities was measured with two or more devices, and the results were compared between the different methods and the reference equations wherever it was available. The liquids selected are the most commonly used in academic or industrial laboratories to calibrate their thermal conductivity instruments having a variety of thermal conductivity, viscosity, and density. Three transient methods (Transient Hot Wire, Transient Plane Source, and Transient Line Source) were compared for the thermal conductivity measurements taken by using them. These methods have been chosen as the most accurate and because they all follow the same idea; as a function of the logarithm of time, the thermal conductivity is calculated from the slope of a plot of sensor temperature rise. For all measurements, the selected temperature range was at the atmospheric level from 10 to 40 ° C. Our results are coming with an agreement with the objections of several scientists over the reliability of the results of a few popular devices. The observation was surprising that the device used in many laboratories for fast measurements of liquid thermal conductivity display deviations of 500 percent which can be very poorly reproduced.

Keywords: accurate data, liquids, thermal conductivity, transient methods.

Procedia PDF Downloads 158
1083 Soft Computing Approach for Diagnosis of Lassa Fever

Authors: Roseline Oghogho Osaseri, Osaseri E. I.

Abstract:

Lassa fever is an epidemic hemorrhagic fever caused by the Lassa virus, an extremely virulent arena virus. This highly fatal disorder kills 10% to 50% of its victims, but those who survive its early stages usually recover and acquire immunity to secondary attacks. One of the major challenges in giving proper treatment is lack of fast and accurate diagnosis of the disease due to multiplicity of symptoms associated with the disease which could be similar to other clinical conditions and makes it difficult to diagnose early. This paper proposed an Adaptive Neuro Fuzzy Inference System (ANFIS) for the prediction of Lass Fever. In the design of the diagnostic system, four main attributes were considered as the input parameters and one output parameter for the system. The input parameters are Temperature on admission (TA), White Blood Count (WBC), Proteinuria (P) and Abdominal Pain (AP). Sixty-one percent of the datasets were used in training the system while fifty-nine used in testing. Experimental results from this study gave a reliable and accurate prediction of Lassa fever when compared with clinically confirmed cases. In this study, we have proposed Lassa fever diagnostic system to aid surgeons and medical healthcare practictionals in health care facilities who do not have ready access to Polymerase Chain Reaction (PCR) diagnosis to predict possible Lassa fever infection.

Keywords: anfis, lassa fever, medical diagnosis, soft computing

Procedia PDF Downloads 268
1082 Precious and Rare Metals in Overburden Carbonaceous Rocks: Methods of Extraction

Authors: Tatyana Alexandrova, Alexandr Alexandrov, Nadezhda Nikolaeva

Abstract:

A problem of complex mineral resources development is urgent and priority, it is aimed at realization of the processes of their ecologically safe development, one of its components is revealing the influence of the forms of element compounds in raw materials and in the processing products. In view of depletion of the precious metal reserves at the traditional deposits in the XXI century the large-size open cast deposits, localized in black shale strata begin to play the leading role. Carbonaceous (black) shales carry a heightened metallogenic potential. Black shales with high content of carbon are widely distributed within the scope of Bureinsky massif. According to academician Hanchuk`s data black shales of Sutirskaya series contain generally PGEs native form. The presence of high absorptive towards carbonaceous matter gold and PGEs compounds in crude ore results in decrease of valuable components extraction because of their sorption into dissipated carbonaceous matter.

Keywords: сarbonaceous rocks, bitumens, precious metals, concentration, extraction

Procedia PDF Downloads 244
1081 Utility of Routine Colonoscopy in Acute Diverticulitis

Authors: Naya Masood, Russell Hodgson, Mark Tacey

Abstract:

Purpose: Patients with acute diverticulitis (AD) have an increased risk of underlying colorectal cancer (CRC); however, those with uncomplicated AD may have the same underlying population risk. This study informs on an Australian AD population who were not routinely offered colonoscopic follow-up. Methods: A 2-year (July 2016 – June 2018) retrospective study of patients admitted with CT-confirmed acute diverticulitis was conducted. CT findings were categorised as ‘complicated’ and ‘uncomplicated’ and were correlated with the detection of cancer in subsequent colonoscopy or follow-up. Results: 67.7% (n=292) of 431 patients were seen to have had complicated AD on an abdominopelvic CT scan. Patients were complicated most commonly due to bowel wall thickening reported on CT (90.4%), perforation (20.2%), or an abscess (12%). Follow-up colonoscopic evaluation was conducted in 52.9% (n=228) of total cases of AD, out of which 156 suffered complicated AD and the rest uncomplicated. None of the uncomplicated AD patients in our cohort were found to have CRC. Of those with complicated AD, six were found to have CRC. Conclusion: The only CRC diagnoses were made in patients with complicated AD. Despite available evidence, a significant proportion of uncomplicated AD patients were still undergoing colonoscopy. There is scope to further safely decrease the number of colonoscopies performed in AD patients.

Keywords: acute diverticulitis, colonoscopy, colorectal cancer, advanced adenoma, complicated diverticulitis

Procedia PDF Downloads 92
1080 Digital Twin Strategies and Technologies for Modern Supply Chains

Authors: Mayank Sharma, Anubhaw Kumar, Siddharth Desai, Ankit Tomar

Abstract:

With the advent of cost-effective hardware and communication technologies, the scope of digitalising operations within a supply chain has tremendously increased. This has provided the opportunity to create digital twins of entire supply chains through the use of Internet-of-Things (IoT) and communication technologies. Adverse events like the COVID-19 pandemic and unpredictable geo-political situations have further warranted the importance of digitalization and remote operability of day-to-day operations at critical nodes. Globalisation, rising consumerism & e-commerce has exponentially increased the complexities of existing supply chains. We discuss here a scalable, future-ready and inclusive framework for creating digital twins developed along with the industry leaders from Cisco, Bosch, Accenture, Intel, Deloitte & IBM. We have proposed field-tested key technologies and frameworks required for creating digital twins. We also present case studies of real-life stable deployments done by us in the supply chains of a few marquee industry leaders.

Keywords: internet-of-things, digital twins, smart factory, industry 4.0, smart manufacturing

Procedia PDF Downloads 93
1079 Technology Maps in Energy Applications Based on Patent Trends: A Case Study

Authors: Juan David Sepulveda

Abstract:

This article reflects the current stage of progress in the project “Determining technological trends in energy generation”. At first it was oriented towards finding out those trends by employing such tools as the scientometrics community had proved and accepted as effective for getting reliable results. Because a documented methodological guide for this purpose could not be found, the decision was made to reorient the scope and aim of this project, changing the degree of interest in pursuing the objectives. Therefore it was decided to propose and implement a novel guide from the elements and techniques found in the available literature. This article begins by explaining the elements and considerations taken into account when implementing and applying this methodology, and the tools that led to the implementation of a software application for patent revision. Univariate analysis helped recognize the technological leaders in the field of energy, and steered the way for a multivariate analysis of this sample, which allowed for a graphical description of the techniques of mature technologies, as well as the detection of emerging technologies. This article ends with a validation of the methodology as applied to the case of fuel cells.

Keywords: energy, technology mapping, patents, univariate analysis

Procedia PDF Downloads 475
1078 Provenance and Paleoweathering Conditions of Doganhisar Clay Beds

Authors: Mehmet Yavuz Huseyinca

Abstract:

The clay beds are located at the south-southeast of Doğanhisar and northwest of Konya in the Central Anatolia. In the scope of preliminary study, three types of samples were investigated including basement phyllite (Bp) overlain by the clay beds, weathered phyllite (Wp) and Doğanhisar clay (Dc). The Chemical Index of Alteration (CIA) values of Dc range from 81 to 88 with an average of 85. This value is higher than that of Post Archean Australian Shale (PAAS) and defines very intense chemical weathering in the source-area. On the other hand, the A-CN-K diagram indicates that Bp underwent high degree post-depositional K-metasomatism. The average reconstructed CIA value of the Bp prior to the K-metasomatism is mainly 81 which overlaps the CIA values of the Wp (83) and Dc (85). Similar CIA values indicate parallel weathering trends. Also, extrapolation of the samples back to the plagioclase-alkali feldspar line in the A-CN-K diagram suggests an identical provenance close to granite in composition. Hereby the weathering background of Dc includes two steps. First one is intense weathering process of a granitic source to Bp with post-depositional K-metasomatism and the latter is progressively weathering of Bp to premetasomatised conditions (formation of Wp) ending with Dc deposition.

Keywords: clay beds, Doganhisar, provenance, weathering

Procedia PDF Downloads 306
1077 Transporting the Setting of the Beloved Musical, Peter Pan, to Colonial India

Authors: R. Roznowski

Abstract:

This paper is an examination of a recent Michigan State University production of the classic musical, Peter Pan. In this production, approved by the licensor, the action was moved to Colonial India transforming the musical’s message to include themes of cultural identity, racism, classism and ultimately inclusion. Major character changes and casting decisions expanded the scope of the musical while still retaining the original book and score. Major changes included reframing the Darlings as British Colonials stationed in India. The Lost Boy’s as mixed race children of British officials and their Indian nannies, the Pirates were a female 'fishing fleet' a group of women sent from England to keep the British soldiers from mixing with the locals and the Michigan State University Bhangra Dance Team played the Indians in the production. Traditional Indian theatrical techniques were also employed in the storytelling. The presentation will cover the key changes to the musical, the rehearsal process, historical accuracy and audience reaction. A final analysis of cultural appropriation versus historical reframing will be examined.

Keywords: directing, history, musical theatre, producing

Procedia PDF Downloads 248
1076 Local Boundary Analysis for Generative Theory of Tonal Music: From the Aspect of Classic Music Melody Analysis

Authors: Po-Chun Wang, Yan-Ru Lai, Sophia I. C. Lin, Alvin W. Y. Su

Abstract:

The Generative Theory of Tonal Music (GTTM) provides systematic approaches to recognizing local boundaries of music. The rules have been implemented in some automated melody segmentation algorithms. Besides, there are also deep learning methods with GTTM features applied to boundary detection tasks. However, these studies might face constraints such as a lack of or inconsistent label data. The GTTM database is currently the most widely used GTTM database, which includes manually labeled GTTM rules and local boundaries. Even so, we found some problems with these labels. They are sometimes discrepancies with GTTM rules. In addition, since it is labeled at different times by multiple musicians, they are not within the same scope in some cases. Therefore, in this paper, we examine this database with musicians from the aspect of classical music and relabel the scores. The relabeled database - GTTM Database v2.0 - will be released for academic research usage. Despite the experimental and statistical results showing that the relabeled database is more consistent, the improvement in boundary detection is not substantial. It seems that we need more clues than GTTM rules for boundary detection in the future.

Keywords: dataset, GTTM, local boundary, neural network

Procedia PDF Downloads 144
1075 Social Data-Based Users Profiles' Enrichment

Authors: Amel Hannech, Mehdi Adda, Hamid Mcheick

Abstract:

In this paper, we propose a generic model of user profile integrating several elements that may positively impact the research process. We exploit the classical behavior of users and integrate a delimitation process of their research activities into several research sessions enriched with contextual and temporal information, which allows reflecting the current interests of these users in every period of time and infer data freshness. We argue that the annotation of resources gives more transparency on users' needs. It also strengthens social links among resources and users, and can so increase the scope of the user profile. Based on this idea, we integrate the social tagging practice in order to exploit the social users' behavior to enrich their profiles. These profiles are then integrated into a recommendation system in order to predict the interesting personalized items of users allowing to assist them in their researches and further enrich their profiles. In this recommendation, we provide users new research experiences.

Keywords: user profiles, topical ontology, contextual information, folksonomies, tags' clusters, data freshness, association rules, data recommendation

Procedia PDF Downloads 263
1074 Effects of Transformational Leadership and Political Competition on Corporate Performance of Nigeria National Petroleum Corporation

Authors: Justine Ugochukwu Osuagwu, Sazali Abd Wahab

Abstract:

The performance and operation of NNPC have faced series of attacks by all stakeholders as many have observed lots of inefficiency not only on the part of the management but the staff. This has raised questions of whether their operations and performance are being seriously affected by lack of transformational leadership, and the political competition prevalent in the country. The author has applied the administrative leadership theory and institutional theory as a guide to this study and empirically relates such theories to the study. The study also has utilized the quantitative approach where questionnaires were distributed to 370 participants, and the correctly filled and returned questionnaires were used for the analysis using structural equation modeling. The path coefficient of transformational leadership to performance is strong and positive with β = 0.672; t-value = 14.245; p-value = 0.000. Also, the result found that political competition does not mediate the relationship between transformational leadership and performance of NNPC. (β = -0.008; t-value = -0.600; p- value > 0.05). However, the indirect path is all insignificant, meaning that transformational leadership has relationship with corporate performance.The study found that,while political competition does not serve as a mediator in the relationship between transformational leadership and corporate performance, these styles of leadership have a direct and positive impact on corporate performance. The direct relationship between transformational leadership and political competition was not discovered, despite the fact that political competition has a direct and significant impact, both positive and negative, on corporate performance. As a result, both political competition and transformational leadership have the potential to significantly alter corporate performance.

Keywords: performance, transformational leadership, political competition, corporation performance, Nigeria national petroleum corporation

Procedia PDF Downloads 112
1073 Turkey-Syria Relations between 2002-2011 from the Perspective of Social Construction

Authors: Didem Aslantaş

Abstract:

In this study, the reforms carried out by the Justice and Development Party, which came to power in 2002, and how the foreign policy understanding it transformed reflected on the relations with Syria will be analyzed from the social constructivist theory. Contrary to the increasing security concerns of the states after the September 11 attacks, the main problem of the research is how the relations between Syria and Turkey developed and how they progressed in non-security dimensions. In order to find an answer to this question, the basic assumptions of the constructivist theory will be used. Since there is a limited number of studies in the literature, a comparative analysis of the Adana Consensus and the Cooperation Agreement between the Republic of Turkey and the Syrian Arab Republic, and the Joint Cooperation Agreement Against Terrorism and Terrorist Organizations will be included. In order to answer the main problem of the research and to support the arguments, document and archive scanning methods from qualitative research methods will be used. In the first part of the study, what the social constructivist theory is and its basic assumptions are explained, while in the second part, Turkey-Syria relations between 2002-2011 are included. In the third and last part, the relations between the two countries will be tried to be read through social constructivism by referring to the foreign policy features of the Ak Party period.

Keywords: Social Constructivist Theory, foreign policy analysis, Justice and Development Party, Syria

Procedia PDF Downloads 81
1072 Effect of Inventory Management on Financial Performance: Evidence from Nigerian Conglomerate Companies

Authors: Adamu Danlami Ahmed

Abstract:

Inventory management is the determinant of effective and efficient work for any manager. This study looked at the relationship between inventory management and financial performance. The population of the study comprises all conglomerate quoted companies in the Nigerian Stock Exchange market as at 31st December 2010. The scope of the study covered the period from 2010 to 2014. Descriptive, Pearson correlation and multiple regressions are used to analyze the data. It was found that inventory management is significantly related to the profitability of the company. This entails that an efficient management of the inventory cycle will enhance the profitability of the company. Also, lack of proper management of it will hinder the financial performance of organizations. Based on the results, it was recommended that a conglomerate company should try to see that inventories are kept to a minimum, as well as make sure the proper checks are maintained to make sure only needed inventories are in the store. As well as to keep track of the movement of goods, in order to avoid unnecessary delay of finished and work in progress (WIP) goods in the store and warehouse.

Keywords: finished goods, work in progress, financial performance, inventory

Procedia PDF Downloads 231
1071 Unsteady Characteristics Investigation on the Precessing Vortex Breakdown and Energy Separation in a Vortex Tube

Authors: Xiangji Guo, Bo Zhang

Abstract:

In this paper, the phenomenon of vortex breakdown in a vortex tube was analyzed within the scope of unsteady character in swirl flows. A 3-D Unsteady Reynolds-averaged Navier–Stokes (URANS) closed by the Reynolds Stress Model (RSM) was adopted to simulate the large-scale vortex structure in vortex tube, and the numerical model was verified by the steady results. The swirl number was calculated for the vortex tube and the flow field was classed as strong swirl flow. According to the results, a time-dependent spiral flow field gyrates around a central recirculation zone which is precessing around the axis of the tube, and manifests the flow structure is the spiral type (S-type) vortex breakdown. The vortex breakdown is crucial for the formation of the central recirculation zone (CRZ), a further discussion was about the affection on CRZ with the different external conditions of vortex tube, the study on the unsteady characters was expected to hope to design of vortex tube and analyze the energy separation effect.

Keywords: vortex tube, vortex breakdown, central recirculation zone, unsteady, energy separation

Procedia PDF Downloads 314
1070 A Theoretical Model for Pattern Extraction in Large Datasets

Authors: Muhammad Usman

Abstract:

Pattern extraction has been done in past to extract hidden and interesting patterns from large datasets. Recently, advancements are being made in these techniques by providing the ability of multi-level mining, effective dimension reduction, advanced evaluation and visualization support. This paper focuses on reviewing the current techniques in literature on the basis of these parameters. Literature review suggests that most of the techniques which provide multi-level mining and dimension reduction, do not handle mixed-type data during the process. Patterns are not extracted using advanced algorithms for large datasets. Moreover, the evaluation of patterns is not done using advanced measures which are suited for high-dimensional data. Techniques which provide visualization support are unable to handle a large number of rules in a small space. We present a theoretical model to handle these issues. The implementation of the model is beyond the scope of this paper.

Keywords: association rule mining, data mining, data warehouses, visualization of association rules

Procedia PDF Downloads 222