Search results for: online advertising mechanism
4782 Enhancing Financial Security: Real-Time Anomaly Detection in Financial Transactions Using Machine Learning
Authors: Ali Kazemi
Abstract:
The digital evolution of financial services, while offering unprecedented convenience and accessibility, has also escalated the vulnerabilities to fraudulent activities. In this study, we introduce a distinct approach to real-time anomaly detection in financial transactions, aiming to fortify the defenses of banking and financial institutions against such threats. Utilizing unsupervised machine learning algorithms, specifically autoencoders and isolation forests, our research focuses on identifying irregular patterns indicative of fraud within transactional data, thus enabling immediate action to prevent financial loss. The data we used in this study included the monetary value of each transaction. This is a crucial feature as fraudulent transactions may have distributions of different amounts than legitimate ones, such as timestamps indicating when transactions occurred. Analyzing transactions' temporal patterns can reveal anomalies (e.g., unusual activity in the middle of the night). Also, the sector or category of the merchant where the transaction occurred, such as retail, groceries, online services, etc. Specific categories may be more prone to fraud. Moreover, the type of payment used (e.g., credit, debit, online payment systems). Different payment methods have varying risk levels associated with fraud. This dataset, anonymized to ensure privacy, reflects a wide array of transactions typical of a global banking institution, ranging from small-scale retail purchases to large wire transfers, embodying the diverse nature of potentially fraudulent activities. By engineering features that capture the essence of transactions, including normalized amounts and encoded categorical variables, we tailor our data to enhance model sensitivity to anomalies. The autoencoder model leverages its reconstruction error mechanism to flag transactions that deviate significantly from the learned normal pattern, while the isolation forest identifies anomalies based on their susceptibility to isolation from the dataset's majority. Our experimental results, validated through techniques such as k-fold cross-validation, are evaluated using precision, recall, and the F1 score alongside the area under the receiver operating characteristic (ROC) curve. Our models achieved an F1 score of 0.85 and a ROC AUC of 0.93, indicating high accuracy in detecting fraudulent transactions without excessive false positives. This study contributes to the academic discourse on financial fraud detection and provides a practical framework for banking institutions seeking to implement real-time anomaly detection systems. By demonstrating the effectiveness of unsupervised learning techniques in a real-world context, our research offers a pathway to significantly reduce the incidence of financial fraud, thereby enhancing the security and trustworthiness of digital financial services.Keywords: anomaly detection, financial fraud, machine learning, autoencoders, isolation forest, transactional data analysis
Procedia PDF Downloads 574781 Teaching Swahili as a Foreign Languages to Young People in South Africa
Authors: Elizabeth Mahenge
Abstract:
Unemployment is a problem that face many graduates all over the world. Every year universities in many parts of the world produce graduates who are looking for an employment. Swahili, a Bantu language originated in East African coast, can be used as an avenue for youth’s employment in South Africa. This paper helps youth to know about job opportunities available through teaching Swahili language. The objective of this paper is capacity building to youths to be teachers of Swahili and be ready to compete in the marketplace. The methodology was through two weeks online training on how to teach Swahili as a foreign language. The communicative approach and task-based approach were used. Participants to this training were collected through a WhatsApp group advertisement about “short training for Swahili teachers for foreigners”. A total number of 30 participants registered but only 11 attended the training. Training was online via zoom. The contribution of this paper is that by being fluent in Swahili one would benefit with teaching job opportunities anywhere in the world. Hence the problem of unemployment among the youths would be reduced as they can employ themselves or being employed in academic institutions anywhere in the world. The paper calls for youths in South Africa to opt for Swahili language courses to be trained and become experts in the teaching Swahili as a foreign language.Keywords: foreign language, linguistic market, Swahili, employment
Procedia PDF Downloads 764780 Design and Evaluation of an Online Case-Based Library for Technology Integration in Teacher Education
Authors: Mustafa Tevfik Hebebci, Ismail Sahin, Sirin Kucuk, Ismail Celik, Ahmet Oguz Akturk
Abstract:
ADDIE is an instructional design model which has the five core elements: analyze, design, develop, implement, and evaluate. The ADDIE approach provides a systematic process for the analysis of instructional needs, the design and development of instructional programs and materials, implementation of a program, and the evaluation of the effectiveness of an instruction. The case-based study is an instructional design model that is a variant of project-oriented learning. Collecting and analyzing stories can be used in two primary ways -perform task analysis and as a learning support during instruction- by instructional designers. Besides, teachers use technology to develop students’ thinking, enriching the learning environment and providing permanent learning. The purpose of this paper is to introduce an interactive online case-study library website developed in a national project. The design goal of the website is to provide interactive, enhanced, case-based and online educational resource for educators through the purpose and within the scope of a national project. The ADDIE instructional design model was used in the development of the website for the interactive case-based library. This web-based library contains the navigation menus as the follows: “Homepage”, "Registration", "Branches", "Aim of The Research", "About TPACK", "National Project", "Contact Us", etc. This library is developed on a web-based platform, which is important in terms of manageability, accessibility, and updateability of data. Users are able to sort the displayed case-studies by their titles, dates, ratings, view counts, etc. In addition, they encouraged to rate and comment on the case-studies. The usability test is used and the expert opinion is taken for the evaluation of the website. This website is a tool to integrate technology in education. It is believed that this website will be beneficial for pre-service and in-service teachers in terms of their professional developments.Keywords: design, ADDIE, case based library, technology integration
Procedia PDF Downloads 4794779 Multi Cloud Storage Systems for Resource Constrained Mobile Devices: Comparison and Analysis
Authors: Rajeev Kumar Bedi, Jaswinder Singh, Sunil Kumar Gupta
Abstract:
Cloud storage is a model of online data storage where data is stored in virtualized pool of servers hosted by third parties (CSPs) and located in different geographical locations. Cloud storage revolutionized the way how users access their data online anywhere, anytime and using any device as a tablet, mobile, laptop, etc. A lot of issues as vendor lock-in, frequent service outage, data loss and performance related issues exist in single cloud storage systems. So to evade these issues, the concept of multi cloud storage introduced. There are a lot of multi cloud storage systems exists in the market for mobile devices. In this article, we are providing comparison of four multi cloud storage systems for mobile devices Otixo, Unclouded, Cloud Fuze, and Clouds and evaluate their performance on the basis of CPU usage, battery consumption, time consumption and data usage parameters on three mobile phones Nexus 5, Moto G and Nexus 7 tablet and using Wi-Fi network. Finally, open research challenges and future scope are discussed.Keywords: cloud storage, multi cloud storage, vendor lock-in, mobile devices, mobile cloud computing
Procedia PDF Downloads 4074778 Development of Surface Modification Technology for Control Element Drive Mechanism Nozzle and Fatigue Enhancement of Ni-Based Alloys
Authors: Auezhan Amanov, Inho Cho, Young-Sik Pyun
Abstract:
Control element drive mechanism (CEDM) nozzle is manufactured as welded on the reactor vessel and currently uses Alloy 690 material. The top of the reactor is equipped with about 100 CEDM nozzles with an internal diameter of about 70 mm. Relatively large Inlet/Outlet nozzles are equipped with two outlet nozzles and four inlet nozzles on the reactor wall. The inner diameter of the nozzle is vulnerable to stress corrosion cracking (SCC), and in order to solve this problem, an ultrasonic nanocrystal surface modification (UNSM) treatment is performed on the inner diameter of the nozzle and the weld surface. The ultimate goal is to improve the service life of parts by applying compressive residual stress and suppressing primary water stress corrosion cracking (PWSCC). The main purpose is to design and fabricate a UNSM treatment device for the internal diameter processing of CEDM nozzles and inlet/outlet nozzles. In order to develop the system, the basic technology such as the development of UNSM tooling is developed and the mechanical properties and fatigue performance of before and after UNSM treatment of reactor nozzle material made of Ni-based alloys using the specimen are compared and evaluated. The inner diameter of the nozzle was treated by a newly developed UNSM treatment under the optimized treatment parameters. It was found that the mechanical properties and fatigue performance of nozzle were improved in comparison with the untreated nozzle, which may be attributed to the increase in hardness, induced compressive residual stress.Keywords: control element drive mechanism nozzle, fatigue, Ni-based alloy, ultrasonic nanocrystal surface modification, UNSM
Procedia PDF Downloads 1104777 The Effectiveness of the Repositioning Campaign of PKO BP Brand on the Basis of Questionnaire Research
Authors: Danuta Szwajca
Abstract:
Image is a very important intangible asset of a contemporary enterprise, especially, in case of a bank as a public trust institution. A positive, demanded image may effectively distinguish the bank among the competition and build the customer confidence and loyalty. PKO BP is the biggest and largest bank functioning on the Polish financial market. Within the years not a very nice image of the bank has been embedded in the customers’ minds as an old-fashioned, stagnant, resistant to changes institution, what result in the customer loss, and ageing. For this reason, in 2010, the bank launched a campaign of radical image change along with a strategy of branches modernization and improvement of the product offer. The objective of the article is to make an attempt of effectiveness assessment of the brand repositioning campaign that lasted three years. The foundations of the assessment are the results of the questionnaire research concerning the way of bank’s perception before and after the campaign.Keywords: advertising campaign, brand repositioning, image of the bank, repositioning
Procedia PDF Downloads 4234776 Research on Models and Selection of Entry Strategies for Catering Industry Based on the Evolutionary Game Theory
Authors: Jianxin Zhu, Na Liu
Abstract:
Entry strategies play a vital role in the development of new enterprises in the catering industry. Different entry strategies will have different effects on the development of new enterprise. Based on the research of scholars at home and abroad, and combining the characteristics of the catering industry, the entry strategies are divided into low-price entry strategies and high-quality entry strategies. Facing the entry of new enterprise, the strategies of incumbent enterprises are divided into response strategies and non-response strategies. This paper uses evolutionary game theory to study the strategic interaction mechanism between incumbent companies and new enterprises. When different initial values and parameter values are set, which strategy will the two-game subjects choose, respectively? Using matlab2016 for numerical simulation, the results show that the choice of strategies for new enterprise and incumbent enterprise is influenced by more than one factor, and the system has different evolution trends under different circumstances. When the parameters were set, the choice of two subjects' strategies mainly depends on the net profit between the strategies.Keywords: catering industry, entry strategy, evolutionary game, strategic interaction mechanism
Procedia PDF Downloads 1324775 Investigation of Online Child Sexual Abuse: An Account of Covert Police Operations Across the Globe
Authors: Shivalaxmi Arumugham
Abstract:
Child sexual abuse (CSA) has taken several forms, particularly with the advent of internet technologies that provide pedophiles access to their targets anonymously at an affordable rate. To combat CSA which has far-reaching consequences on the physical and psychological health of the victims, a special act, the Protection of Children from Sexual Offences (POCSO) Act, was formulated amongst the existing laws. With its latest amendment criminalizing various online activities about child pornography also known as child sexual abuse materials in 2019, tremendous pressure is speculated on law enforcement to identify offenders online. Effective investigations of CSA cases help in not only to detect perpetrators but also in preventing the re-victimization of children. Understanding the vulnerability of the child population and that the offenders continue to develop stealthier strategies to operate, it is high time that traditional investigation, where the focus is on apprehending and prosecuting the offender, must make a paradigm shift to proactively investigate to prevent victimization at the first place. One of the proactive policing techniques involves understanding the psychology of the offenders and children and operating undercover to catch the criminals before a real child is victimized. With the fundamental descriptive approach to research, the article attempts to identify the multitude of issues associated with the investigation of child sexual abuse cases currently in practice in India. Then, the article contextualizes the various covert operations carried out by numerous law enforcement agencies across the globe. To provide this comprehensive overview, the paper examines various reports, websites, guidelines, protocols, judicial pronouncements, and research articles. Finally, the paper presents the challenges and ethical issues that are to be considered before getting into undercover operations either in the guise of a pedophile or as a child. The research hopes to contribute to the making of standard operating protocols for investigation officers and other relevant policymakers in this regard.Keywords: child sexual abuse, cybercrime against children, covert police operations, investigation of CSA
Procedia PDF Downloads 974774 From the Sharing Economy to Social Manufacturing: Analyzing Collaborative Service Networks in the Manufacturing Domain
Authors: Babak Mohajeri
Abstract:
In recent years, the conventional business model of ownership has been changed towards accessibility in a variety of markets. Two trends can be observed in the evolution of this rental-like business model. Firstly, the technological development that enables the emergence of new business models. These new business models increasingly become agile and flexible. For example Spotify, an online music stream company provides consumers access to over millions of music tracks, conveniently through the smartphone, tablet or computer. Similarly, Car2Go, the car sharing company accesses its members with flexible and nearby sharing cars. The second trend is the increasing communication and connections via social networks. This trend enables a shift to peer-to-peer accessibility based business models. Conventionally, companies provide access for their customers to own companies products or services. In peer-to-peer model, nonetheless, companies facilitate access and connection across their customers to use other customers owned property or skills, competencies or services .The is so-called the sharing economy business model. The aim of this study is to investigate into a new and emerging type of the sharing economy model in which role of customers and service providers may dramatically change. This new model is called Collaborative Service Networks. We propose a mechanism for Collaborative Service Networks business model. Uber and Airbnb, two successful growing companies, have been selected for our case studies and their business models are analyzed. Finally, we study the emergence of the collaborative service networks in the manufacturing domain. Our finding results to a new manufacturing paradigm called social manufacturing.Keywords: sharing economy, collaborative service networks, social manufacturing, manufacturing development
Procedia PDF Downloads 3174773 Low Energy Mechanism in Pelvic Trauma at Elderly
Authors: Ravid Yinon
Abstract:
Introduction: Pelvic trauma causes high mortality, particularly among the elderly population. Pelvic injury ranges from low-energy incidents such as falls to high-energy trauma like motor vehicle accidents. The mortality rate among high-energy trauma patients is higher, as can be expected. The elderly population is more vulnerable to pelvic trauma even at low energy mechanisms due to the fragility and diminished physiological reserve of these patients. The aim of this study is to examine whether there is a higher long-term mortality in pelvic injuries in the elderly from the low-energy mechanism than those injured in high energy. Methods: A retrospective cohort study was conducted in a level 1 trauma center with injured patients aged 65 years and over with pelvic trauma. The patients were divided into two groups of low and high-energy mechanisms of injury. Multivariate analysis was conducted to characterize the differences between the groups. Results: There were 585 consecutive injured patients over the age of 65 with a documented pelvic injury who were treated at the primary trauma center between 2008-2020. The injured in the high energy group were younger (mean HE- 75.18, LE-80.73), with fewer comorbidities (mean 0.78 comorbidities at HE and 1.28 at LE), more men (52.6% at HE and 27.4% at LE), were consumed more treatments facilities such as angioembolization, ICU admission, emergency surgeries and blood products transfusion and higher mortality rate at admission (HE- 19/133, 14.28%, LE- 10/452, 2.21%) compared to the low energy group. However, in a long-term follow-up of one year after the injury, mortality in the low-energy group was significantly higher (HE- 14/114, 12.28%, LE- 155/442, 35.06%). Discussion: Although it can be expected that in the mechanism of high energy, the mortality rate in the long term would be higher, it was found that mortality at the low energy patient was higher. Apparently, low-energy pelvic injury in geriatric patients is a measure of frailty in these patients, causes injury to more frail and morbid patients, and is a predictor of mortality in this population in the long term. Conclusion: The long-term follow-up of injured elderly with pelvic trauma should be more intense, and the healthcare provider should put more emphasis on the rehabilitation of these special patient populations in an attempt to prevent long-term mortality.Keywords: pelvic trauma, elderly trauma, high energy trauma, low energy trauma
Procedia PDF Downloads 524772 The Impact of Self-Viewing in Virtual Teamwork on Team Creativity: The Mediating Effect of Objective Self-Awareness and the Moderating Effect of Psychological Safety
Authors: Xueyang Li
Abstract:
This thesis investigates the impact of self-viewing on team creativity in virtual teamwork and examines the role of objective self-awareness and psychological safety in this context. The study uses a quantitative research approach and collects data from 304 participants working in virtual teams. We hypothesized that observing oneself in online meetings would lead to a heightened sense of objective self and thus lower team creativity and that psychological safety would moderate their relationship. We tested these hypotheses in a laboratory experiment manipulating whether participants were able to observe themselves during the completion of an online team creativity task and manipulating whether participants were subjected to a psychological safety intervention. The results indicate that self-observation has a negative effect on team creativity in virtual teamwork, while objective self-awareness mediates this relationship, and psychological safety plays a moderating role. We discuss several aspects of the theoretical explanation of the findings. This study contributes to the existing literature by highlighting the importance of self-observation in virtual teamwork and provides practical implications for managers and team leaders to promote creativity in virtual teams.Keywords: objective self-awareness, psychological safety, self-viewing, team creativity, virtual teamwork
Procedia PDF Downloads 1004771 Piezoelectric Actuator for Controlling Robotics Organs
Authors: Lemoussi Somia, Ouali Mohammed, Zemirline Adel
Abstract:
In precision engineering, including precision positioning, micro-manipulation, robotic systems... a majority of these applications actuated by piezo stack used the compliant amplifier mechanism to amplifying motion and guiding it as needed utilize the flexibility of their components, in this paper, we present a novel approach introducing a symmetric structure comprising three stages, featuring rectangular flexure hinges with a compact size of 77mm×42mm×10mm. This design provides the capability for rotation, translation or a combination of both movements in both directions. The system allows for a displacement of 2107.5 μm when the input displacement of PZT is 50 μm while considering the material constraints of the aluminum alloy (7075 T6) which has a maximum admissible stress of 500 MPa However, our proposed design imposes additional constraints to ensure the stress remains below 361 MPa for optimal performance. These findings were obtained through finite element simulations conducted using ANSYS Workbench. Furthermore, our module facilitates precise control of various components within robotic systems, allowing for adjustable speeds based on specific requirements or desired outcomes.Keywords: robotic, piezoelectric, compliant mechanism, flexure hinge
Procedia PDF Downloads 794770 Development of Digital Twin Concept to Detect Abnormal Changes in Structural Behaviour
Authors: Shady Adib, Vladimir Vinogradov, Peter Gosling
Abstract:
Digital Twin (DT) technology is a new technology that appeared in the early 21st century. The DT is defined as the digital representation of living and non-living physical assets. By connecting the physical and virtual assets, data are transmitted smoothly, allowing the virtual asset to fully represent the physical asset. Although there are lots of studies conducted on the DT concept, there is still limited information about the ability of the DT models for monitoring and detecting unexpected changes in structural behaviour in real time. This is due to the large computational efforts required for the analysis and an excessively large amount of data transferred from sensors. This paper aims to develop the DT concept to be able to detect the abnormal changes in structural behaviour in real time using advanced modelling techniques, deep learning algorithms, and data acquisition systems, taking into consideration model uncertainties. finite element (FE) models were first developed offline to be used with a reduced basis (RB) model order reduction technique for the construction of low-dimensional space to speed the analysis during the online stage. The RB model was validated against experimental test results for the establishment of a DT model of a two-dimensional truss. The established DT model and deep learning algorithms were used to identify the location of damage once it has appeared during the online stage. Finally, the RB model was used again to identify the damage severity. It was found that using the RB model, constructed offline, speeds the FE analysis during the online stage. The constructed RB model showed higher accuracy for predicting the damage severity, while deep learning algorithms were found to be useful for estimating the location of damage with small severity.Keywords: data acquisition system, deep learning, digital twin, model uncertainties, reduced basis, reduced order model
Procedia PDF Downloads 994769 Keypoint Detection Method Based on Multi-Scale Feature Fusion of Attention Mechanism
Authors: Xiaoxiao Li, Shuangcheng Jia, Qian Li
Abstract:
Keypoint detection has always been a challenge in the field of image recognition. This paper proposes a novelty keypoint detection method which is called Multi-Scale Feature Fusion Convolutional Network with Attention (MFFCNA). We verified that the multi-scale features with the attention mechanism module have better feature expression capability. The feature fusion between different scales makes the information that the network model can express more abundant, and the network is easier to converge. On our self-made street sign corner dataset, we validate the MFFCNA model with an accuracy of 97.8% and a recall of 81%, which are 5 and 8 percentage points higher than the HRNet network, respectively. On the COCO dataset, the AP is 71.9%, and the AR is 75.3%, which are 3 points and 2 points higher than HRNet, respectively. Extensive experiments show that our method has a remarkable improvement in the keypoint recognition tasks, and the recognition effect is better than the existing methods. Moreover, our method can be applied not only to keypoint detection but also to image classification and semantic segmentation with good generality.Keywords: keypoint detection, feature fusion, attention, semantic segmentation
Procedia PDF Downloads 1194768 Analysis on the Copyright Protection Dilemma of Webcast in 'Internet Plus' Era
Authors: Yi Yang
Abstract:
In the era of 'Internet plus', the rapid development of webcast has posed new challenges to the intellectual property law. Meanwhile, traditional copyright protection has also exposed the existing theoretical imbalance in webcast. Through the analysis of the outstanding problems in the copyright protection of the network live broadcast, this paper points out that the main causes of the problems are the unclear nature of the copyright of the network live broadcast, the copyright protection system of the game network live broadcast has not yet been constructed, and the copyright infringement of the pan entertainment live broadcast is mostly, and so on. Based on the current practice, this paper puts forward the specific thinking of the protection path of online live broadcast copyright. First of all, to provide a reasonable judicial solution for a large number of online live copyright cases, we need to integrate the right scope and regulatory behavior of broadcasting right and information network communication right. Secondly, in order to protect the rights of network anchors, the webcast should be regarded as works. Thirdly, in order to protect the copyright of webcast and prevent the infringement of copyright by webcast, the webcast platform will be used as an intermediary to provide solutions for solving the judicial dilemma. In the era of 'Internet plus', it is a theoretical attempt to explore the protection and method of copyright protection on webcast, which has positive guiding significance for judicial practice.Keywords: 'Internet Plus' era, webcast, copyright, protection dilemma
Procedia PDF Downloads 1134767 The Relationship of Television Viewers with Brand Awareness and Brand Loyalty: A Case Study of Bangkok, Thailand
Authors: Natnicha Hasoontree
Abstract:
The purposes of this research was to study the relationship of television viewers with brand awareness and brand loyalty from the perspective of customers in Bangkok. A probability random sampling of 482 television viewers was utilized. A Likert-five-scale questionnaire was designed to collect the data and small in-depth interviews were also used to obtain their opinions. The findings revealed that the majority of respondents reported a positive relationship between time of viewing television and brand awareness and brand loyalty. The more they watched the advertisement of a particular brand, the more positive the information was perceived and thereby increasing brand loyalty. Finally, the findings from the in-depth interviews with small group of television producers revealed that they are convinced that advertising exposure had a positive impact on brand awareness and brand loyalty.Keywords: brand awareness, brand loyalty, television viewers, advertisement
Procedia PDF Downloads 3124766 A Collaborative Teaching and Learning Model between Academy and Industry for Multidisciplinary Engineering Education
Authors: Moon-Soo Kim
Abstract:
In order to cope with the increasing demand for multidisciplinary learning between academy and industry, a collaborative teaching and learning model and related operational tools enabling applications to engineering education are essential. This study proposes a web-based collaborative framework for interactive teaching and learning between academy and industry as an initial step for the development of a web- and mobile-based integrated system for both engineering students and industrial practitioners. The proposed web-based collaborative teaching and learning framework defines several entities such as learner, solver and supporter or sponsor for industrial problems, and also has a systematic architecture to build information system including diverse functions enabling effective interaction among the defined entities regardless of time and places. Furthermore, the framework, which includes knowledge and information self-reinforcing mechanism, focuses on the previous problem-solving records as well as subsequent learners’ creative reusing in solving process of new problems.Keywords: collaborative teaching and learning model, academy and industry, web-based collaborative framework, self-reinforcing mechanism
Procedia PDF Downloads 3264765 Evaluation of Social Media Customer Engagement: A Content Analysis of Automobile Brand Pages
Authors: Adithya Jaikumar, Sudarsan Jayasingh
Abstract:
The dramatic technology led changes that continue to take place at the market place has led to the emergence and implication of online brand pages on social media networks. The Facebook brand page has become extremely popular among different brands. The primary aim of this study was to identify the impact of post formats and content type on customer engagement in Facebook brand pages. Methodology used for this study was to analyze and categorize 9037 content messages posted by 20 automobile brands in India during April 2014 to March 2015 and the customer activity it generated in return. The data was obtained from Fanpage karma- an online tool used for social media analytics. The statistical technique used to analyze the count data was negative binomial regression. The study indicates that there is a statistically significant relationship between the type of post and the customer engagement. The study shows that photos are the most posted format and highest engagement is found to be related to videos. The finding also reveals that social events and entertainment related content increases engagement with the message.Keywords: content analysis, customer engagement, digital engagement, facebook brand pages, social media
Procedia PDF Downloads 3224764 Interaction of Histone H1 with Chromatin-associated Protein HMGB1 Studied by Microscale Thermophoresis
Authors: Michal Štros, Eva Polanská, Šárka Pospíšilová
Abstract:
HMGB1 is an architectural protein in chromatin, acting also as a signaling molecule outside the cell. Recent reports from several laboratories provided evidence that a number of both the intracellular and extracellular functions of HMGB1 may depend on redox-sensitive cysteine residues of the protein. MALDI-TOF analysis revealed that mild oxidization of HMGB1 resulted in a conformational change of the protein due to formation of an intramolecular disulphide bond by opposing Cys23 and Cys45 residues. We have demonstrated that redox state of HMGB1 could significantly modulate the ability of the protein to bind and bend DNA. We have also shown that reduced HMGB1 could easily displace histone H1 from DNA, while oxidized HMGB1 had limited capacity for H1 displacement. Using microscale thermophoresis (MST) we have further studied mechanism of HMGB1 interaction with histone H1 in free solution or when histone H1 was bound to DNA. Our MST analysis indicated that reduced HMGB1 exhibited in free solution > 1000 higher affinity of for H1 (KD ~ 4.5 nM) than oxidized HMGB1 (KD <10 M). Finally, we present a novel mechanism for the HMGB1-mediated modulation of histone H1 binding to DNA.Keywords: HMGB1, histone H1, redox state, interaction, cross-linking, DNA bending, DNA end-joining, microscale thermophoresis
Procedia PDF Downloads 3354763 Kinetics and Mechanism Study of Photocatalytic Degradation Using Heterojunction Semiconductors
Authors: Ksenija Milošević, Davor Lončarević, Tihana Mudrinić, Jasmina Dostanić
Abstract:
Heterogeneous photocatalytic processes have gained growing interest as an efficient method to generate hydrogen by using clean energy sources and degrading various organic pollutants. The main obstacles that restrict efficient photoactivity are narrow light-response range and high rates of charge carrier recombination. The formation of heterojunction by combining a semiconductor with low VB and a semiconductor with high CB and a suitable band gap was found to be an efficient method to prepare more sensible materials with improved charge separation, appropriate oxidation and reduction ability, and enhanced visible-light harvesting. In our research, various binary heterojunction systems based on the wide-band gap (TiO₂) and narrow bandgap (g-C₃N₄, CuO, and Co₂O₃) photocatalyst were studied. The morphology, optical, and electrochemical properties of the photocatalysts were analyzed by X-ray diffraction (XRD), scanning electron microscopy (FE-SEM), N₂ physisorption, diffuse reflectance measurements (DRS), and Mott-Schottky analysis. The photocatalytic performance of the synthesized catalysts was tested in single and simultaneous systems. The synthesized photocatalysts displayed good adsorption capacity and enhanced visible-light photocatalytic performance. The mutual interactions of pollutants on their adsorption and degradation efficiency were investigated. The interfacial connection between photocatalyst constituents and the mechanism of the transport pathway of photogenerated charge species was discussed. A radical scavenger study revealed the interaction mechanisms of the photocatalyst constituents in single and multiple pollutant systems under solar and visible light irradiation, indicating the type of heterojunction system (Z scheme or type II).Keywords: bandgap alignment, heterojunction, photocatalysis, reaction mechanism
Procedia PDF Downloads 1024762 The Role of Cyfra 21-1 in Diagnosing Non Small Cell Lung Cancer (NSCLC)
Authors: H. J. T. Kevin Mozes, Dyah Purnamasari
Abstract:
Background: Lung cancer accounted for the fourth most common cancer in Indonesia. 85% of all lung cancer cases are the Non-Small Cell Lung Cancer (NSCLC). The indistinct signs and symptoms of NSCLC sometimes lead to misdiagnosis. The gold standard assessment for the diagnosis of NSCLC is the histopathological biopsy, which is invasive. Cyfra 21-1 is a tumor marker, which can be found in the intermediate protein structure in the epitel. The accuracy of Cyfra 21-1 in diagnosing NSCLC is not yet known, so this report is made to seek the answer for the question above. Methods: Literature searching is done using online databases. Proquest and Pubmed are online databases being used in this report. Then, literature selection is done by excluding and including based on inclusion criterias and exclusion criterias. The selected literature is then being appraised using the criteria of validity, importance, and validity. Results: From six journals appraised, five of them are valid. Sensitivity value acquired from all five literature is ranging from 50-84.5 %, meanwhile the specificity is 87.8 %-94.4 %. Likelihood the ratio of all appraised literature is ranging from 5.09 -10.54, which categorized to Intermediate High. Conclusion: Serum Cyfra 21-1 is a sensitive and very specific tumor marker for diagnosis of non-small cell lung cancer (NSCLC).Keywords: cyfra 21-1, diagnosis, nonsmall cell lung cancer, NSCLC, tumor marker
Procedia PDF Downloads 2324761 Knowledge Management and Tourism: An Exploratory Study Applied to Travel Agents in Egypt
Authors: Mohammad Soliman, Mohamed A. Abou-Shouk
Abstract:
Knowledge management focuses on the development, storage, retrieval, and dissemination of information and expertise. It has become an important tool to improve performance in tourism enterprises. This includes improving decision-making, developing customer services, and increasing sales and profits. Knowledge management adoption depends on human, organizational and technological factors. This study aims to explore the concept of knowledge management in travel agents in Egypt. It explores the requirements of adoption and its impact on performance in these agencies. The study targets Category A travel agents in Egypt. The population of the study encompasses Category A travel agents having online presence. An online questionnaire is used to collect data from managers of travel agents. This study is useful for travel agents who are in urgent need to restructure their intermediary role and support their survival in the global travel market. The study sheds light on the requirements of adoption and the expected impact on performance. This could help travel agents identify their situation and the determine the extent to which they are ready to adopt knowledge management. This study is contributing to knowledge by providing insights from the tourism sector in a developing country where the concept of knowledge management is still in its infancy stages.Keywords: knowledge management, knowledge management adoption, performance, travel agents
Procedia PDF Downloads 3974760 The Instrumentalization of Digital Media in the Context of Sexualized Violence
Authors: Katharina Kargel, Frederic Vobbe
Abstract:
Sexual online grooming is generally defined as digital interactions for the purpose of sexual exploitation of children or minors, i.e. as a process for preparing and framing sexual child abuse. Due to its conceptual history, sexual online grooming is often associated with perpetrators who are previously unknown to those affected. While the strategies of perpetrators and the perception of those affected are increasingly being investigated, the instrumentalisation of digital media has not yet been researched much. Therefore, the present paper aims at contributing to this research gap by examining in what kind of ways perpetrators instrumentalise digital media. Our analyses draw on 46 case documentations and 18 interviews with those affected. The cases and the partly narrative interviews were collected by ten cooperating specialist centers working on sexualized violence in childhood and youth. For this purpose, we designed a documentation grid allowing for a detailed case reconstruction i.e. including information on the violence, digital media use and those affected. By using Reflexive Grounded Theory, our analyses emphasize a) the subjective benchmark of professional practitioners as well as those affected and b) the interpretative implications resulting from our researchers’ subjective and emotional interaction with the data material. It should first be noted that sexualized online grooming can result in both online and offline sexualized violence as well as hybrid forms. Furthermore, the perpetrators either come from the immediate social environment of those affected or are unknown to them. The perpetrator-victim relationship plays a more important role with regard to the question of the instrumentalisation of digital media than the question of the space (on vs. off) in which the primary violence is committed. Perpetrators unknown to those affected instrumentalise digital media primarily to establish a sexualized system of norms, which is usually embedded in a supposed love relationship. In some cases, after an initial exchange of sexualized images or video recordings, a latent play on the position of power takes place. In the course of the grooming process, perpetrators from the immediate social environment increasingly instrumentalise digital media to establish an explicit relationship of power and dependence, which is directly determined by coercion, threats and blackmail. The knowledge of possible vulnerabilities is strategically used in the course of maintaining contact. The above explanations lead to the conclusion that the motive for the crime plays an essential role in the question of the instrumentalisation of digital media. It is therefore not surprising that it is mostly the near-field perpetrators without commercial motives who initiate a spiral of violence and stress by digitally distributing sexualized (violent) images and video recordings within the reference system of those affected.Keywords: sexualized violence, children and youth, grooming, offender strategies, digital media
Procedia PDF Downloads 1834759 Recommender System Based on Mining Graph Databases for Data-Intensive Applications
Authors: Mostafa Gamal, Hoda K. Mohamed, Islam El-Maddah, Ali Hamdi
Abstract:
In recent years, many digital documents on the web have been created due to the rapid growth of ’social applications’ communities or ’Data-intensive applications’. The evolution of online-based multimedia data poses new challenges in storing and querying large amounts of data for online recommender systems. Graph data models have been shown to be more efficient than relational data models for processing complex data. This paper will explain the key differences between graph and relational databases, their strengths and weaknesses, and why using graph databases is the best technology for building a realtime recommendation system. Also, The paper will discuss several similarity metrics algorithms that can be used to compute a similarity score of pairs of nodes based on their neighbourhoods or their properties. Finally, the paper will discover how NLP strategies offer the premise to improve the accuracy and coverage of realtime recommendations by extracting the information from the stored unstructured knowledge, which makes up the bulk of the world’s data to enrich the graph database with this information. As the size and number of data items are increasing rapidly, the proposed system should meet current and future needs.Keywords: graph databases, NLP, recommendation systems, similarity metrics
Procedia PDF Downloads 1044758 Investigation on the Kinetic Mechanism of the Reduction of Fe₂O₃/CoO-Decorated Carbon Xerogel
Authors: Mohammad Reza Ghaani, Michele Catti
Abstract:
The reduction of CoO/Fe₂O₃ oxides supported on carbon xerogels was studied to elucidate the effect of nano-size distribution of the catalyst in carbon matrices. Resorcinol formaldehyde xerogels were synthesized, impregnated with iron and cobalt nitrates, and subsequently heated to obtain the oxides. The mechanism of oxide reduction to metal was investigated by in-situ synchrotron X-ray diffraction in dynamic, non-isothermal conditions. Kinetic profiles of the reactions were obtained by plotting the diffraction intensities of selected Bragg peaks vs. temperature. The extracted Temperature-Programmed-Reduction (TPR) diagrams were analyzed by appropriate kinetic models, leading to best results with the Avrami-Erofeev model for all reduction reactions considered. The activation energies for the two-step reduction of iron oxide were 65 and 37 kJmol⁻¹, respectively. The average value for the reduction of CoO to Co was found to be around 21 kJ mol⁻¹. Such results may contribute to develop efficient and inexpensive non-noble metal-based catalysts in element form, e.g., Fe, Co, via heterogenization of metal complexes on mesoporous supports.Keywords: non-isothermal kinetics, carbon aerogel, in-situ synchrotron X-ray diffraction, reduction mechanisms
Procedia PDF Downloads 2404757 Gender Bias and the Role It Plays in Student Evaluation of Instructors
Authors: B. Garfolo, L. Kelpsh, R. Roak, R. Kuck
Abstract:
Often, student ratings of instructors play a significant role in the career path of an instructor in higher education. So then, how does a student view the effectiveness of instructor teaching? This question has been address by literally thousands of studies found in the literature. Yet, why does this question still persist? A literature review reveals that while it is true that student evaluations of instructors can be biased, there is still a considerable amount of work that needs to be done in understanding why. As student evaluations of instructors can be used in a variety of settings (formative or summative) it is critical to understand the nature of the bias. The authors believe that not only is some bias possible in student evaluations, it should be expected for the simple reason that a student evaluation is a human activity and as such, relies upon perception and interpersonal judgment. As such, student ratings are affected by the same factors that can potentially affect any rater’s judgment, such as stereotypes based on gender, culture, race, etc. Previous study findings suggest that student evaluations of teacher effectiveness differ between male and female raters. However, even though studies have shown that instructor gender does play an important role in influencing student ratings, the exact nature and extent of that role remains the subject of debate. Researchers, in their attempt to define good teaching, have looked for differences in student evaluations based on a variety of characteristics such as course type, class size, ability level of the student and grading practices in addition to instructor and student characteristics (gender, age, etc.) with inconsistent results. If a student evaluation represents more than an instructor’s teaching ability, for example, a physical characteristic such as gender, then this information must be taken into account if the evaluation is to have meaning with respect to instructor assessment. While the authors concede that it is difficult or nearly impossible to separate gender from student perception of teaching practices in person, it is, however, possible to shield an instructor’s gender identity with respect to an online teaching experience. The online teaching modality presents itself as a unique opportunity to experiment directly with gender identity. The analysis of the differences of online behavior of individuals when they perceive that they are interacting with a male or female could provide a wealth of data on how gender influences student perceptions of teaching effectiveness. Given the importance of the role student ratings play in hiring, retention, promotion, tenure, and salary deliberations in academic careers, this question warrants further attention as it is important to be aware of possible bias in student evaluations if they are to be used at all with respect to any academic considerations. For experimental purposes, the author’s constructed and online class where each instructors operate under two different gender identities. In this study, each instructor taught multiple sections of the same class using both a male identity and a female identity. The study examined student evaluations of teaching based on certain student and instructor characteristics in order to determine if and where male and female students might differ in their ratings of instructors based on instructor gender. Additionally, the authors examined if there are differences between undergraduate and graduate students' ratings with respect to the experimental criteria.Keywords: gender bias, ethics, student evaluations, student perceptions, online instruction
Procedia PDF Downloads 2664756 Application of Heuristic Integration Ant Colony Optimization in Path Planning
Authors: Zeyu Zhang, Guisheng Yin, Ziying Zhang, Liguo Zhang
Abstract:
This paper mainly studies the path planning method based on ant colony optimization (ACO), and proposes heuristic integration ant colony optimization (HIACO). This paper not only analyzes and optimizes the principle, but also simulates and analyzes the parameters related to the application of HIACO in path planning. Compared with the original algorithm, the improved algorithm optimizes probability formula, tabu table mechanism and updating mechanism, and introduces more reasonable heuristic factors. The optimized HIACO not only draws on the excellent ideas of the original algorithm, but also solves the problems of premature convergence, convergence to the sub optimal solution and improper exploration to some extent. HIACO can be used to achieve better simulation results and achieve the desired optimization. Combined with the probability formula and update formula, several parameters of HIACO are tested. This paper proves the principle of the HIACO and gives the best parameter range in the research of path planning.Keywords: ant colony optimization, heuristic integration, path planning, probability formula
Procedia PDF Downloads 2514755 Human Relationships in the Virtual Classrooms as Predictors of Students Academic Resilience and Performance
Authors: Eddiebal P. Layco
Abstract:
The purpose of this study is to describe students' virtual classroom relationships in terms of their relationship to their peers and teachers; academic resilience; and performance. Further, the researcher wants to examine if these virtual classroom relations predict students' resilience and performance in their academics. The data were collected from 720 junior and senior high school or grade 7 to 12 students in selected state universities and colleges (SUCs) in Region III offering online or virtual classes during S.Y. 2020-2021. Results revealed that virtual classroom relationships such as teacher-student and peer relationships predict academic resilience and performance. This implies that students' academic relations with their teachers and peers have something to do with their ability to bounce back and beat the odds amidst challenges they faced in the online or virtual learning environment. These virtual relationships significantly influence also their academic performance. Adequate teacher support and positive peer relations may lead to enhanced academic resilience, which may also promote a meaningful and fulfilled life academically. Result suggests that teachers should develop their students' academic resiliency and maintain good relationships in the classroom since these results in academic success.Keywords: virtual classroom relationships, teacher-pupil relationship, peer-relationship, academic resilience, academic performance
Procedia PDF Downloads 1534754 Co-Creating an International Flipped Faculty Development Model: A US-Afghan Case Study
Authors: G. Alex Ambrose, Melissa Paulsen, Abrar Fitwi, Masud Akbari
Abstract:
In 2016, a U.S. business college was awarded a sub grant to work with FHI360, a nonprofit human development organization, to support a university in Afghanistan funded by the State Department’s U.S. Agency for International Development (USAID). A newly designed Master’s Degree in Finance and Accounting is being implemented to support Afghanistan’s goal of 20% females in higher education and industry by 2020 and to use finance and accounting international standards to attract capital investment for economic development. This paper will present a case study to describe the co-construction of an approach to an International Flipped Faculty Development Model grounded in blended learning theory. Like education in general, faculty development is also evolving from the traditional face to face environment and interactions to the fully online and now to a best of both blends. Flipped faculty development is both a means and a model for careful integration of the strengths of the synchronous and asynchronous dynamics and technologies with the combination of intentional sequencing to pre-online interactions that prepares and enhances the face to face faculty development and mentorship residencies with follow-up post-online support. Initial benefits from this model include giving the Afghan faculty an opportunity to experience and apply modern teaching and learning strategies with technology in their own classroom. Furthermore, beyond the technological and pedagogical affordances, the reciprocal benefits gained from the mentor-mentee, face-to-face relationship will be explored. Evidence to support this model includes: empirical findings from pre- and post-Faculty Mentor/ Mentee survey results, Faculty Mentorship group debriefs, Faculty Mentorship contact logs, and student early/end of semester feedback. In addition to presenting and evaluating this model, practical challenges and recommendations for replicating international flipped faculty development partnerships will be provided.Keywords: educational development, faculty development, international development, flipped learning
Procedia PDF Downloads 1894753 Defense Mechanism Maturity and the Severity of Mood Disorder Symptoms
Authors: Maja Pandža, Sanjin Lovrić, Iva Čolak, Josipa Mandarić, Miro Klarić
Abstract:
This study explores the role of symptoms related to mood disorders salience on different types of defense mechanisms (mature, neurotic, immature) predominance. Total of 177 both clinical and non-clinical participants in Mostar, Bosnia & Herzegovina, completed a battery of questionnaires associated with defense mechanisms and self-reported depression and anxiety symptoms. The sample was additionally divided into four groups, given the level of symptoms experienced: 1. minimal, 2. mild, 3. moderate, 4. severe depression/anxiety. Participants with minimal anxiety and depression symptoms use mature defense mechanisms more often than other three groups. Immature mechanisms are most commonly used by the group with severe depression/anxiety levels in comparison with other groups. These differences are discussed on the dynamic level of analysis to have a better understanding of the relationship between defense mechanisms' maturity and degree of mood disorders' symptom severity. Also, results given could serve as an implication for the psychotherapeutic treatment plans.Keywords: anxiety/depression symptoms, clinical/non-clinical sample, defense mechanism maturity, dynamic approach
Procedia PDF Downloads 457