Search results for: online threats
1708 Applying Laser Scanning and Digital Photogrammetry for Developing an Archaeological Model Structure for Old Castle in Germany
Authors: Bara' Al-Mistarehi
Abstract:
Documentation and assessment of conservation state of an archaeological structure is a significant procedure in any management plan. However, it has always been a challenge to apply this with a low coast and safe methodology. It is also a time-demanding procedure. Therefore, a low cost, efficient methodology for documenting the state of a structure is needed. In the scope of this research, this paper will employ digital photogrammetry and laser scanner to one of highly significant structures in Germany, The Old Castle (German: Altes Schloss). The site is well known for its unique features. However, the castle suffers from serious deterioration threats because of the environmental conditions and the absence of continuous monitoring, maintenance and repair plans. Digital photogrammetry is a generally accepted technique for the collection of 3D representations of the environment. For this reason, this image-based technique has been extensively used to produce high quality 3D models of heritage sites and historical buildings for documentation and presentation purposes. Additionally, terrestrial laser scanners are used, which directly measure 3D surface coordinates based on the run-time of reflected light pulses. These systems feature high data acquisition rates, good accuracy and high spatial data density. Despite the potential of each single approach, in this research work maximum benefit is to be expected by a combination of data from both digital cameras and terrestrial laser scanners. Within the paper, the usage, application and advantages of the technique will be investigated in terms of building high realistic 3D textured model for some parts of the old castle. The model will be used as diagnosing tool of the conservation state of the castle and monitoring mean for future changes.Keywords: Digital photogrammetry, Terrestrial laser scanners, 3D textured model, archaeological structure
Procedia PDF Downloads 1751707 Potentials and Influencing Factors of Dynamic Pricing in Business: Empirical Insights of European Experts
Authors: Christopher Reichstein, Ralf-Christian Härting, Martina Häußler
Abstract:
With a continuously increasing speed of information exchange on the World Wide Web, retailers in the E-Commerce sector are faced with immense possibilities regarding different online purchase processes like dynamic price settings. By use of Dynamic Pricing, retailers are able to set short time price changes in order to optimize producer surplus. The empirical research illustrates the basics of Dynamic Pricing and identifies six influencing factors of Dynamic Pricing. The results of a structural equation modeling approach show five main drivers increasing the potential of dynamic price settings in the E-Commerce. Influencing factors are the knowledge of customers’ individual willingness to pay, rising sales, the possibility of customization, the data volume and the information about competitors’ pricing strategy.Keywords: e-commerce, empirical research, experts, dynamic pricing (DP), influencing factors, potentials
Procedia PDF Downloads 2611706 The Use of Budgeting as an Effective Management Tool for Small, Medium and Micro Enterprises during COVID-19 Pandemic: A Perspective from South Africa
Authors: Abongile Zweni, Grate Moyo, Ricardo Peters, Bingwen Yan
Abstract:
Budgets are one of the most important tools that organisations, big or small, need to use as management tools. When organisations, particularly Small, Medium and Micro Enterprises (SMMEs), do not use budgets, they are bound to fail in their infancy stage. The aim of this study was to assess whether or not SMMEs in South Africa used budgets as an effective management tool during the COVID-19 pandemic. For the purposes of this study, data was collected using an online questionnaire (survey). This study used the quantitative research approach. The study used descriptive statistics to analyse the research question. The study found that most SMMEs did not use budgets during the COVID-19 pandemic; one of the reasons, amongst others, was that most of them had to close down during the lockdown, and some of them did not even qualify for government bailout or government grants.Keywords: budget management, SMMEs, COVID-19, South Africa
Procedia PDF Downloads 1901705 The Online Advertising Speech that Effect to the Thailand Internet User Decision Making
Authors: Panprae Bunyapukkna
Abstract:
This study investigated figures of speech used in fragrance advertising captions on the Internet. The objectives of the study were to find out the frequencies of figures of speech in fragrance advertising captions and the types of figures of speech most commonly applied in captions. The relation between figures of speech and fragrance was also examined in order to analyze how figures of speech were used to represent fragrance. Thirty-five fragrance advertisements were randomly selected from the Internet. Content analysis was applied in order to consider the relation between figures of speech and fragrance. The results showed that figures of speech were found in almost every fragrance advertisement except one advertisement of Lancôme. Thirty-four fragrance advertising captions used at least one kind of figure of speech. Metaphor was most frequently found and also most frequently applied in fragrance advertising captions, followed by alliteration, rhyme, simile and personification, and hyperbole respectively.Keywords: advertising speech, fragrance advertisements, figures of speech, metaphor
Procedia PDF Downloads 2391704 Ontologies for Social Media Digital Evidence
Authors: Edlira Kalemi, Sule Yildirim-Yayilgan
Abstract:
Online Social Networks (OSNs) are nowadays being used widely and intensively for crime investigation and prevention activities. As they provide a lot of information they are used by the law enforcement and intelligence. An extensive review on existing solutions and models for collecting intelligence from this source of information and making use of it for solving crimes has been presented in this article. The main focus is on smart solutions and models where ontologies have been used as the main approach for representing criminal domain knowledge. A framework for a prototype ontology named SC-Ont will be described. This defines terms of the criminal domain ontology and the relations between them. The terms and the relations are extracted during both this review and the discussions carried out with domain experts. The development of SC-Ont is still ongoing work, where in this paper, we report mainly on the motivation for using smart ontology models and the possible benefits of using them for solving crimes.Keywords: criminal digital evidence, social media, ontologies, reasoning
Procedia PDF Downloads 3871703 Effects of Climate Change on Floods of Pakistan, and Gap Analysis of Existing Policies with Vision 2025
Authors: Saima Akbar, Tahseen Ullah Khan
Abstract:
The analysis of the climate change impact on flood frequency represents an important issue for water resource management and flood risk mitigation. This research was conducted to address the effects of climate change on flood incidents of Pakistan and find out gaps in existing policies to reducing the environmental aspects on floods and effects of global warming. The main objective of this research was to critically analyses the National Climate Change Policy (NCCP), National Disaster Management Authority (NDMA), Federal Flood Commission (FFC) and Vision 2025, as an effective policy document which is not only hitting the target of a climate resilient Pakistan but provides room for efficient and flexible policy implementation. The methodology integrates projected changes in monsoon patterns (since last 20 years and overall change in rainfall pattern since 1901 to 2015 from Pakistan Metrological Department), glacier melting, decreasing dam capacity and lacks in existing policies by using SWOT (Strength, Weakness, Opportunities, Threats) model in order to explore the relative impacts of global warming on the system performance. Results indicate the impacts of climate change are significant, but probably not large enough to justify a major effort for adapting the physical infrastructure to expected climatic conditions in Vision 2025 which is our shared destination to progress, ultimate aspiration to see Pakistan among the ten largest economies of the world by 2047– the centennial year of our independence. The conclusion of this research was to adapt sustainable measures to reduce flood impacts and make policies as neighboring countries are adapting for their sustainability.Keywords: climatic factors, monsoon, Pakistan, sustainability
Procedia PDF Downloads 1391702 A Framework for Protecting Teenagers from Cyber Crimes and Cyberbullying
Authors: Sultan Alanazi, Adwan Alanazi
Abstract:
Social applications consist of powerful tools that allow people to connect and interact with each other. However, its negative use cannot be ignored. Cyberbullying is a new and serious Internet problem. Cyberbullying is one of the most common risks for teenagers to go online. More than half of young people report that they do not tell their parents when this will occur, which can have significant physiological consequences. Cyberbullying involves the deliberate use of digital media on the Internet to convey false or embarrassing information about others. Therefore, this article provides a way to detect cyber-bullying in social media applications for parents. The purpose of our work is to develop an architectural model for identifying and measuring the state of Cyberbullying faced by children on social media applications. For parents, this will be a good tool for monitoring their children without invading their privacy. Finally, some interesting open-ended questions were raised, suggesting promising ideas for starting new research in this new field.Keywords: cyberbullying, cyber bullying, internet crimes, social media security, E-crimes
Procedia PDF Downloads 1361701 Gender Moderates the Association Between Symbolization Trait (But Not Internalization Trait) and Smoking Behaviour
Authors: Kuay Hue San, Muaz Haqim Shaharum, Nasir Yusoff
Abstract:
Gender plays a big role in psychosocial development. This study aimed to investigate whether gender moderates the relationship between moral identity (internalization and symbolization) and risk-smoking behavior. An online cross-sectional study was carried out on 388 (61% female) youths who fulfilled the study’s inclusion and exclusion criteria. While viewing images of smoking behavior, participants rated their emotional state, which ranged from unpleasant to pleasant. Participants were also asked to fill out the eight-item Moral Identity Scale and provide their socio-demographic information. Gender significantly moderated the relationship between symbolization and smoking behavior. However, the moderation effect was not shown by internalization Finding highlights the implication of gender on moral identity and smoking behavior and the importance of considering this in the public health intervention and program.Keywords: smoking behaviour, gender, emotion, moral identity
Procedia PDF Downloads 1071700 Orchids of Coastal Karnataka, India: Diversity, Trends in Population, Threats and Conservation Strategies
Authors: Sankaran Potti Narasimhan
Abstract:
Costal Karnataka is sandwiched between Arabian Sea and the biodiversity hotspot of Western Ghats. This has provided a rich vegetation, canopy and humidity for the sustainable growth and evolution of many orchid populations. Similar to many other biodiversity hostpot regions of India and the world, this region also faces threat from anthropogenic activities and climate change. Hence, there is a need to study the current orchid diversity and trends in population as well as an effective conservation strategy. Costal belt of Karnataka state of India extends over 325 kilometers and an area of 18,000 km2. The region encompasses two national parks such as the Anshi National Park and the Kudremukh National Park. The study regions also include two Wild Life Sanctuaries such as the Someshwara Wildlife Sanctuary and Mookambika Wildlife Sanctuary. The estimated number of orchids in the region includes 30 genera and 45 species. Both terrestrial and epiphytic orchids are found in this region. The region contains many red listed orchids such as Trias stocksii (Critically endangered), Eriad alzellii (Lower risk vulnerable) and Dendrobnium ovatum (Vulnerable). The important terrestrial orchids of the region are Geodorum, Habenaria, Lipparis, Malaxis, Nervilia, Pachystoma, Pectelis, Peristylus, Tropidia and Zeuxine. The epiphytic forms includes Acampe, Aerides, Bulbophyllum, Cleisostoma, Conchidum, Cottonia, Cymbidium, Dendronium, Eria, Flickingeria, Gastrochilus, Kingidium, Luisia, Oberonia, Phalaenopsis, Pholidota, Porpax, Rhynchostylis, Sirhookera and Trias. The current paper discusses the population strength and changes in the population structure of these orchids along with proposed conservation strategies.Keywords: orchid diversity, bulbophyllum, dendrobium, orchid conservation
Procedia PDF Downloads 3921699 Incorporating Circular Economy into Passive Design Strategies in Tropical Nigeria
Authors: Noah G. Akhimien, Eshrar Latif
Abstract:
The natural environment is in need for an urgent rescue due to dilapidation and recession of resources. Passive design strategies have proven to be one of the effective ways to reduce CO2 emissions and to improve building performance. On the other hand, there is a huge drop in material availability due to poor recycling culture. Consequently, building waste pose environmental hazard due to unrecycled building materials from construction and deconstruction. Buildings are seen to be material banks for a circular economy, therefore incorporating circular economy into passive housing will not only safe guide the climate but also improve resource efficiency. The study focuses on incorporating a circular economy in passive design strategies for an affordable energy and resource efficient residential building in Nigeria. Carbon dioxide (CO2) concentration is still on the increase as buildings are responsible for a significant amount of this emission globally. Therefore, prompt measures need to be taken to combat the effect of global warming and associated threats. Nigeria is rapidly growing in human population, resources on the other hand have receded greatly, and there is an abrupt need for recycling even in the built environment. It is necessary that Nigeria responds to these challenges effectively and efficiently considering building resource and energy. Passive design strategies were assessed using simulations to obtain qualitative and quantitative data which were inferred to case studies as it relates to the Nigeria climate. Building materials were analysed using the ReSOLVE model in order to explore possible recycling phase. This provided relevant information and strategies to illustrate the possibility of circular economy in passive buildings. The study offers an alternative approach, as it is the general principle for the reworking of an economy on ecological lines in passive housing and by closing material loops in circular economy.Keywords: building, circular, efficiency, environment, sustainability
Procedia PDF Downloads 2521698 Improving Public Service Delivery by E-Governance
Authors: Aneri Mehta, Neeti Chaudhary
Abstract:
Governments of the countries around the world have started utilizing the potential of technology to deliver online information and services to their citizens. Using ICT in the form of e-governance could yield great benefits in the reform and modernization of the public sector. The experience of e-governance in a number of developed and developing countries has shown that ICT can be a tool for greater service delivery with the goal of improving service quality. E-governance can also promote ‘good governance’, greater civic engagement can increase opportunities for direct representation and voice, and support for increased democracy. This paper discusses and presents the survey findings that seek to test the role of e-governance in improving service delivery by altering the principal-agent relationship. It further seeks to elucidate the quality aspects of public service. Strong leadership is required to implement e-governance to capture and internalize the benefits of quality services and satisfied citizens.Keywords: public service, service delivery, e-governance, good governance
Procedia PDF Downloads 4781697 The Effect of Engineering Construction in Online Consultancy
Authors: Mariam Wagih Nagib Eskandar
Abstract:
The engineering design process is the activities formulation, to help an engineer raising a plan with a specified goal and performance. The engineering design process is a multi-stage course of action including the conceptualization, research, feasibility studies, establishment of design parameters, preliminary and finally the detailed design. It is a progression from the abstract to the concrete; starting with probably abstract ideas about need, and thereafter elaborating detailed specifications of the object that would satisfy the needs, identified. Engineering design issues, problems, and solutions are discussed in this paper using qualitative approach from an information structure perspective. The objective is to identify the problems, to analyze them and propose solutions by integrating; innovation, practical experience, time and resource management, communications skills, isolating the problem in coordination with all stakeholders. Consequently, this would be beneficial for the engineering community to improve the Engineering design practices.Keywords: education, engineering, math, performanceengineering design, architectural engineering, team-based learning, construction safetyrequirement engineering, models, practices, organizations
Procedia PDF Downloads 781696 Big Brain: A Single Database System for a Federated Data Warehouse Architecture
Authors: X. Gumara Rigol, I. Martínez de Apellaniz Anzuola, A. Garcia Serrano, A. Franzi Cros, O. Vidal Calbet, A. Al Maruf
Abstract:
Traditional federated architectures for data warehousing work well when corporations have existing regional data warehouses and there is a need to aggregate data at a global level. Schibsted Media Group has been maturing from a decentralised organisation into a more globalised one and needed to build both some of the regional data warehouses for some brands at the same time as the global one. In this paper, we present the architectural alternatives studied and why a custom federated approach was the notable recommendation to go further with the implementation. Although the data warehouses are logically federated, the implementation uses a single database system which presented many advantages like: cost reduction and improved data access to global users allowing consumers of the data to have a common data model for detailed analysis across different geographies and a flexible layer for local specific needs in the same place.Keywords: data integration, data warehousing, federated architecture, Online Analytical Processing (OLAP)
Procedia PDF Downloads 2341695 An Embarrassingly Simple Semi-supervised Approach to Increase Recall in Online Shopping Domain to Match Structured Data with Unstructured Data
Authors: Sachin Nagargoje
Abstract:
Complete labeled data is often difficult to obtain in a practical scenario. Even if one manages to obtain the data, the quality of the data is always in question. In shopping vertical, offers are the input data, which is given by advertiser with or without a good quality of information. In this paper, an author investigated the possibility of using a very simple Semi-supervised learning approach to increase the recall of unhealthy offers (has badly written Offer Title or partial product details) in shopping vertical domain. The author found that the semisupervised learning method had improved the recall in the Smart Phone category by 30% on A=B testing on 10% traffic and increased the YoY (Year over Year) number of impressions per month by 33% at production. This also made a significant increase in Revenue, but that cannot be publicly disclosed.Keywords: semi-supervised learning, clustering, recall, coverage
Procedia PDF Downloads 1201694 Child Abuse: Emotional, Physical, Neglect, Sexual and the Psychological Effects: A Case Scenario in Lagos State
Authors: Aminu Ololade Matilda
Abstract:
Child abuse is a significant issue worldwide, affecting the socio-development and mental and physical health of young individuals. It is the maltreatment of a child by an adult or a child. This paper focuses on child abuse in Communities in Lagos State. The aim of this study is to investigate the extent of child abuse and its impact on the mood, social activities, self-worth, concentration, and academic performance of children in Communities in Lagos State. The primary research instrument used in this study was the interview (Forensic), which consisted of two sections. The first section gathered data on the details of the child and the forms and impacts of abuse experienced, while the second section focused on parental style. The study found that children who experienced various forms of abuse, such as emotional, neglect, physical, or sexual abuse, were hesitant to report it out of fear of threats or even death from the abuser. These abused children displayed withdrawn behaviour, depression, and low self-worth and underperformed academically compared to their peers who did not experience abuse. The findings align with socio-learning and intergenerational transmission of violence theories, which suggest that parents and caregivers who engage in child abuse often do so because they themselves experienced or witnessed abuse as children, thereby normalizing violence. The study highlights the prevalent issue of child abuse in Lagos State and emphasizes the need for advocacy programs and capacity building to raise awareness about child abuse and prevention. The distribution of the Child’s Rights Act in various sectors is also recommended to underscore the importance of protecting the rights of children. Additionally, the inclusion of courses on child abuse in the school curriculum is proposed to ensure children are educated on recognizing and reporting abuse.Keywords: abuse, child, awareness, effects, emotional, neglect, physical, psychological, sexual, recognize, reporting, right
Procedia PDF Downloads 791693 E-Learning in Life-Long Learning: Best Practices from the University of the Aegean
Authors: Chryssi Vitsilaki, Apostolos Kostas, Ilias Efthymiou
Abstract:
This paper presents selected best practices on online learning and teaching derived from a novel and innovating Lifelong Learning program through e-Learning, which has during the last five years been set up at the University of the Aegean in Greece. The university, capitalizing on an award-winning, decade-long experience in e-learning and blended learning in undergraduate and postgraduate studies, recently expanded into continuous education and vocational training programs in various cutting-edge fields. So, in this article we present: (a) the academic structure/infrastructure which has been developed for the administrative, organizational and educational support of the e-Learning process, including training the trainers, (b) the mode of design and implementation based on a sound pedagogical framework of open and distance education, and (c) the key results of the assessment of the e-learning process by the participants, as they are used to feedback on continuous organizational and teaching improvement and quality control.Keywords: distance education, e-learning, life-long programs, synchronous/asynchronous learning
Procedia PDF Downloads 3321692 Implementation and Performance Analysis of Data Encryption Standard and RSA Algorithm with Image Steganography and Audio Steganography
Authors: S. C. Sharma, Ankit Gambhir, Rajeev Arya
Abstract:
In today’s era data security is an important concern and most demanding issues because it is essential for people using online banking, e-shopping, reservations etc. The two major techniques that are used for secure communication are Cryptography and Steganography. Cryptographic algorithms scramble the data so that intruder will not able to retrieve it; however steganography covers that data in some cover file so that presence of communication is hidden. This paper presents the implementation of Ron Rivest, Adi Shamir, and Leonard Adleman (RSA) Algorithm with Image and Audio Steganography and Data Encryption Standard (DES) Algorithm with Image and Audio Steganography. The coding for both the algorithms have been done using MATLAB and its observed that these techniques performed better than individual techniques. The risk of unauthorized access is alleviated up to a certain extent by using these techniques. These techniques could be used in Banks, RAW agencies etc, where highly confidential data is transferred. Finally, the comparisons of such two techniques are also given in tabular forms.Keywords: audio steganography, data security, DES, image steganography, intruder, RSA, steganography
Procedia PDF Downloads 2871691 Market Value of Ethno-Medicinally Important Plants of the Dughalgay Valley District Swat, Pakistan
Authors: Akbar Zeb, Shujaul Mulk Khan, Habib Ahmad, Manzoor Hussain, Mujtaba Shah
Abstract:
An ethnobotanical project was carried out in the Dughalgay valley District Swat in Hindu Kush region. The Local population not only use indigenous knowledge to use medicinal plants for curing various diseases but also earn their live hood by selling some of them in the local markets. An ethnobotanical project was carried out in the Doghalgay valley of upper Swat. The Local population not only use indigenous medicinal plants for curing various diseases but also earn their live hood by selling some of them in the local market. 102 of these medicinal plants were reported to be used in the region during questionnaire survey in spring 2007. Out of them 10 species are used as diuretic, 9 in stomachic and laxative each. Similarly 6, 5, 5, 4, 4, and 4 species of them are used as antiseptic, Anthelmintic, Carminative, Expectorant, Astringent and purgative respectively, while the remaining species have one or more than one medicinal use in the local community. 30 of these species are collected for marketing purposes, in which these medicinal plants such as Berberis lycium, Origanum vulgare, Bergenia ciliata, Aesculus indica, Podophyllum emodi, Pteredium aquilinum, Bergenia himalyca, Viola spp., Ajuga bracteosa, Morchella esculenta, Paeonia emodi, Atropa acuminate, Aconitum violaceum, Polygonum amplexicaulis, Bupleurum longicaule, Juglans regia, Diospyrus lotus, and Mentha longifolia are important. Study concluded that availability of medicinal plants is decreasing day by day due to human population pressure, marketing pressure, grazing and unwise collection. Therefore it is recommended that Governmental organizations and non Governmental organization should pay possible attention to make aware the local people about the future threats.Keywords: indigenous knowledge, ethnomedicinal uses, marketing, Hindu Kush
Procedia PDF Downloads 5021690 The Power of Words: A Corpus Analysis of Campaign Speeches of President Donald J. Trump
Authors: Aiza Dalman
Abstract:
Words are powerful when these are used wisely and strategically. In this study, twelve (12) campaign speeches of President Donald J. Trump were analyzed as to frequently used words and ethos, pathos and logos being employed. The speeches were read thoroughly, analyzed and interpreted. With the use of Word Counter Tool and Text Analyzer software accessible online, it was found out that the word ‘will’ has the highest frequency of 121, followed by Hillary (58), American (38), going (35), plan and Clinton (32), illegal (30), government (28), corruption (26) and criminal (24). When the speeches were analyzed as to ethos, pathos and logos, on the other hand, it revealed that these were all employed in his speeches. The statements under these pointed out against Hillary or in his favor. The unique strategy of President Donald J. Trump as to frequently used words and ethos, pathos and logos in persuading people perhaps lead the way to his victory.Keywords: campaign speeches, corpus analysis, ethos, logos and pathos, power of words
Procedia PDF Downloads 2781689 Providing Support On-Time: Need to Establish De-Radicalization Hotlines
Authors: Ashir Ahmed
Abstract:
Peacekeeping is a collective responsibility of governments, law enforcement agencies, communities, families, and individuals. Moreover, the complex nature of peacekeeping activities requires a holistic and collaborative approach where various community sectors work together to form collective strategies that are likely to be more effective than strategies designed and delivered in isolation. Similarly, it is important to learn from past programs to evaluate the initiatives that have worked well and the areas that need further improvement. Review of recent peacekeeping initiatives suggests that there have been tremendous efforts and resources put in place to deal with the emerging threat of terrorism, radicalization and violent extremism through number of de-radicalization programs. Despite various attempts in designing and delivering successful programs for deradicalization, the threat of people being radicalized is growing more than ever before. This research reviews the prominent de-radicalization programs to draw an understanding of their strengths and weaknesses. Some of the weaknesses in the existing programs include. Inaccessibility: Limited resources, geographical location of potential participants (for offline programs), inaccessibility or inability to use various technologies (for online programs) makes it difficult for people to participate in de-radicalization programs. Timeliness: People might need to wait for a program on a set date/time to get the required information and to get their questions answered. This is particularly true for offline programs. Lack of trust: The privacy issues and lack of trust between participants and program organizers are another hurdle in the success of de-radicalization programs. The fear of sharing participants information with organizations (such as law enforcement agencies) without their consent led them not to participate in these programs. Generalizability: Majority of these programs are very generic in nature and do not cater the specific needs of an individual. Participants in these programs may feel that the contents are irrelevant to their individual situations and hence feel disconnected with purpose of the programs. To address the above-mentioned weaknesses, this research developed a framework that recommends some improvements in de-radicalization programs. One of the recommendations is to offer 24/7, secure, private and online hotline (also referred as helpline) for the people who have any question, concern or situation to discuss with someone who is qualified (a counsellor) to deal with people who are vulnerable to be radicalized. To make these hotline services viable and sustainable, the existing organizations offering support for depression, anxiety or suicidal ideation could additionally host these services. These helplines should be available via phone, the internet, social media and in-person. Since these services will be embedded within existing and well-known services, they would likely to get more visibility and promotion. The anonymous and secure conversation between a person and a counsellor would ensure that a person can discuss the issues without being afraid of information sharing with any third party – without his/her consent. The next stage of this project would include the operationalization of the framework by collaborating with other organizations to host de-radicalization hotlines and would assess the effectiveness of such initiatives.Keywords: de-radicalization, framework, hotlines, peacekeeping
Procedia PDF Downloads 2141688 A Conceptual Framework for Vulnerability Assessment of Climate Change Impact on Oil and Gas Critical Infrastructures in the Niger Delta
Authors: Justin A. Udie, Subhes C. Bhatthacharyya, Leticia Ozawa-Meida
Abstract:
The impact of climate change is severe in the Niger Delta and critical oil and gas infrastructures are vulnerable. This is partly due to lack of specific impact assessment framework to assess impact indices on both existing and new infrastructures. The purpose of this paper is to develop a framework for the assessment of climate change impact on critical oil and gas infrastructure in the region. Comparative and documentary methods as well as analysis of frameworks were used to develop a flexible, integrated and conceptual four dimensional framework underpinning; 1. Scoping – the theoretical identification of inherent climate burdens, review of exposure, adaptive capacities and delineation of critical infrastructure; 2. Vulnerability assessment – presents a systematic procedure for the assessment of infrastructure vulnerability. It provides real time re-scoping, practical need for data collection, analysis and review. Physical examination of systems is encouraged to complement the scoped data and ascertain the level of exposure to relevant climate risks in the area; 3. New infrastructure – consider infrastructures that are still at developmental level. It seeks to suggest the inclusion of flexible adaptive capacities in original design of infrastructures in line with climate threats and projections; 4. The Mainstreaming Climate Impact Assessment into government’s environmental decision making approach. Though this framework is designed specifically for the estimation of exposure, adaptive capacities and criticality of vulnerable oil and gas infrastructures in the Niger Delta to climate burdens; it is recommended for researchers and experts as a first-hand generic and practicable tool which can be used for the assessment of other infrastructures perceived as critical and vulnerable. The paper does not provide further tools that synch into the methodological approach but presents pointers upon which a pragmatic methodology can be developed.Keywords: adaptation, assessment, conceptual, climate, change, framework, vulnerability
Procedia PDF Downloads 3151687 Anti-Western Sentiment amongst Arabs and How It Drives Support for Russia against Ukraine
Authors: Soran Tarkhani
Abstract:
A glance at social media shows that Russia's invasion of Ukraine receives considerable support among Arabs. This significant support for the Russian invasion of Ukraine is puzzling since most Arab leaders openly condemned the Russian invasion through the UN ES‑11/4 Resolution, and Arabs are among the first who experienced the devastating consequences of war firsthand. This article tries to answer this question by using multiple regression to analyze the online content of Arab responses to Russia's invasion of Ukraine on seven major news networks: CNN Arabic, BBC Arabic, Sky News Arabic, France24 Arabic, DW, Aljazeera, and Al-Arabiya. The article argues that the underlying reason for this Arab support is a reaction to the common anti-Western sentiments among Arabs. The empirical result from regression analysis supports the central arguments and uncovers the motivations behind the endorsement of the Russian invasion of Ukraine and the opposing Ukraine by many Arabs.Keywords: Ukraine, Russia, Arabs, Ukrainians, Russians, Putin, invasion, Europe, war
Procedia PDF Downloads 741686 Structural Analysis of Username Segment in E-Mail Addresses of Engineering Institutes of Gujarat State of India
Authors: Jatinderkumar R. Saini
Abstract:
E-mail has become a key mechanism of electronic communication. This is truer for professional organizations that like to communicate with their subjects online and are slowly shifting to paper-less office. The current paper focuses specifically on academic institutions offering Engineering course in Gujarat state and attempts for textual analysis of the usernames of the institutional e-mail addresses. We found that the institutions tend to design the username segment of their e-mail addresses by choosing words or combination of words from specific categories. The paper also highlights the use of special characters, digits and random words in designing the usernames. On the sidelines, the paper lists the style of employing department names and designations for the design process. To the best of our knowledge, this is the first formal attempt to analyze the selection of words employed for designing username segment of e-mail addresses of Engineering institutions.Keywords: e-mail address, institute, engineering, username
Procedia PDF Downloads 3351685 Modelling the Dynamics and Optimal Control Strategies of Terrorism within the Southern Borno State Nigeria
Authors: Lubem Matthew Kwaghkor
Abstract:
Terrorism, which remains one of the largest threats faced by various nations and communities around the world, including Nigeria, is the calculated use of violence to create a general climate of fear in a population to attain particular goals that might be political, religious, or economical. Several terrorist groups are currently active in Nigeria, leading to attacks on both civil and military targets. Among these groups, Boko Haram is the deadliest terrorist group operating majorly in Borno State. The southern part of Borno State in North-Eastern Nigeria has been plagued by terrorism, insurgency, and conflict for several years. Understanding the dynamics of terrorism is crucial for developing effective strategies to mitigate its impact on communities and to facilitate peace-building efforts. This research aims to develop a mathematical model that captures the dynamics of terrorism within the southern part of Borno State, Nigeria, capturing both government and local community intervention strategies as control measures in combating terrorism. A compartmental model of five nonlinear differential equations is formulated. The model analyses show that a feasible solution set of the model exists and is bounded. Stability analyses show that both the terrorism free equilibrium and the terrorism endermic equilibrium are asymptotically stable, making the model to have biological meaning. Optimal control theory will be employed to identify the most effective strategy to prevent or minimize acts of terrorism. The research outcomes are expected to contribute towards enhancing security and stability in Southern Borno State while providing valuable insights for policymakers, security agencies, and researchers. This is an ongoing research.Keywords: modelling, terrorism, optimal control, susceptible, non-susceptible, community intervention
Procedia PDF Downloads 191684 Code-Switching in Facebook Chatting Among Maldivian Teenagers
Authors: Aaidha Hammad
Abstract:
This study examines the phenomenon of code switching among teenagers in the Maldives while they carry out conversations through Facebook in the form of “Facebook Chatting”. The current study aims at evaluating the frequency of code-switching and it investigates between what languages code-switching occurs. Besides the study identifies the types of words that are often codeswitched and the triggers for code switching. The methodology used in this study is mixed method of qualitative and quantitative approach. In this regard, the chat log of a group conversation between 10 teenagers was collected and analyzed. A questionnaire was also administered through online to 24 different teenagers from different corners of the Maldives. The age of teenagers ranged between 16 and 19 years. The findings of the current study revealed that while Maldivian teenagers chat in Facebook they very often code switch and these switches are most commonly between Dhivehi and English, but some other languages are also used to some extent. It also identified the different types of words that are being often code switched among the teenagers. Most importantly it explored different reasons behind code switching among the Maldivian teenagers in Facebook chatting.Keywords: code-switching, Facebook, Facebook chatting Maldivian teenagers
Procedia PDF Downloads 2431683 A Framework for Review Spam Detection Research
Authors: Mohammadali Tavakoli, Atefeh Heydari, Zuriati Ismail, Naomie Salim
Abstract:
With the increasing number of people reviewing products online in recent years, opinion sharing websites has become the most important source of customers’ opinions. Unfortunately, spammers generate and post fake reviews in order to promote or demote brands and mislead potential customers. These are notably destructive not only for potential customers but also for business holders and manufacturers. However, research in this area is not adequate, and many critical problems related to spam detection have not been solved to date. To provide green researchers in the domain with a great aid, in this paper, we have attempted to create a high-quality framework to make a clear vision on review spam-detection methods. In addition, this report contains a comprehensive collection of detection metrics used in proposed spam-detection approaches. These metrics are extremely applicable for developing novel detection methods.Keywords: fake reviews, feature collection, opinion spam, spam detection
Procedia PDF Downloads 4121682 Unprecedented Bioactive Naturally-occurring Compounds from the Rare and Endangered Plants Endemic to China
Authors: Jin-Feng Hu
Abstract:
Over the past decades, the global biodiversity has continued to decline. The threats to the terrestrial plant species have increased under anthropogenic activities and other massive ecological change impacts. The situation is much more serious in China, the third richest countries regarding plant biodiversity in the world. It was not until 1992 that the first volume of the China Plant Red Data Book was published. Nowadays, a significant number of Chinese endemic plants have been threatened (The IUCN Red List). Nevertheless, plant-originated natural products (NPs) have continued to play a crucial role in the drug discovery and development process. The opportunity for identifying new chemical entities for emerging and malignant diseases depends on a diversity of drug-producing species. Several statistical surveys unveiled that the rare and endangered plants (REPs) have proven to be better sources for drug discovery than other botanic sources. The identification of bioactive NPs from REPs reveals the importance of conservation efforts in preventing species diversity loss and addressing human diseases at the same time. Thus, there is an urgent need to investigate these fragile REPs. Since 2013, our group has initially launched a special program to systematically identify bioactive/novel NPs from REPs native to China. The selected plant species were generally collected from the remote Mountain areas, and have never been chemically or pharmacologically investigated. Due to the difficult collection of the mass-limited samples of REPs, studies on the secondary metabolites of REPs-associated endophytes would provide a promising alternative potential solution. This presentation details the achievements that related to a series of “Phytochemical and biological studies on rare and endangered plants endemic to China”.Keywords: bioactive naturally-occrring compounds, rare and endengered plants (REPs), plant endophytes, drug discovery
Procedia PDF Downloads 321681 The Influence of COVID-19 Pandemic: Global Policies Towards Chinese International Students
Authors: Xuefan Li, Donghua Li, Juanjuan Li
Abstract:
This study explores the changes in policies toward Chinese students studying abroad in different countries during the pre-pandemic, pandemic, and post-pandemic periods. Interviews and questionnaire surveys were conducted with participating institutions at the China International Education Exhibition. The results indicate that institutions were impacted by the pandemic differently, with a gradual recovery in the two years following the initial outbreak. Institutions encourage and support Chinese students to resume offline studies during the post-pandemic period. The impact of the pandemic on the recruitment of Chinese students by international institutions varied, with different measures being adopted by different institutions. Compared with universities, colleges were more affected in terms of student employment rates. Some institutions were able to respond quickly and effectively to the pandemic due to their online teaching platforms. Overall, this study is expected to provide insights into the changes in policies toward Chinese students studying abroad during the pandemic and highlights the diverse responses of international institutions.Keywords: international education, Chinese international education, COVID-19 pandemic, international institutions
Procedia PDF Downloads 861680 Its about Cortana, Microsoft’s Virtual Assistant
Authors: Aya Idriss, Esraa Othman, Lujain Malak
Abstract:
Artificial intelligence is the emulation of human intelligence processes by machines, particularly computer systems that act logically. Some of the specific applications of AI include natural language processing, speech recognition, and machine vision. Cortana is a virtual assistant and she’s an example of an AI Application. Microsoft made it possible for this app to be accessed not only on laptops and PCs but can be downloaded on mobile phones and used as a virtual assistant which was a huge success. Cortana can offer a lot apart from the basic orders such as setting alarms and marking the calendar. Its capabilities spread past that, for example, it provides us with listening to music and podcasts on the go, managing my to-do list and emails, connecting with my contacts hands-free by simply just telling the virtual assistant to call somebody, gives me instant answers and so on. A questionnaire was sent online to numerous friends and family members to perform the study, which is critical in evaluating Cortana's recognition capacity and the majority of the answers were in favor of Cortana’s capabilities. The results of the questionnaire assisted us in determining the level of Cortana's skills.Keywords: artificial intelligence, Cortana, AI, abstract
Procedia PDF Downloads 1731679 An Empirical Investigation of Big Data Analytics: The Financial Performance of Users versus Vendors
Authors: Evisa Mitrou, Nicholas Tsitsianis, Supriya Shinde
Abstract:
In the age of digitisation and globalisation, businesses have shifted online and are investing in big data analytics (BDA) to respond to changing market conditions and sustain their performance. Our study shifts the focus from the adoption of BDA to the impact of BDA on financial performance. We explore the financial performance of both BDA-vendors (business-to-business) and BDA-clients (business-to-customer). We distinguish between the five BDA-technologies (big-data-as-a-service (BDaaS), descriptive, diagnostic, predictive, and prescriptive analytics) and discuss them individually. Further, we use four perspectives (internal business process, learning and growth, customer, and finance) and discuss the significance of how each of the five BDA-technologies affects the performance measures of these four perspectives. We also present the analysis of employee engagement, average turnover, average net income, and average net assets for BDA-clients and BDA-vendors. Our study also explores the effect of the COVID-19 pandemic on business continuity for both BDA-vendors and BDA-clients.Keywords: BDA-clients, BDA-vendors, big data analytics, financial performance
Procedia PDF Downloads 122