Search results for: social networks sites (SNSs)
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 13513

Search results for: social networks sites (SNSs)

11713 MXene-Based Self-Sensing of Damage in Fiber Composites

Authors: Latha Nataraj, Todd Henry, Micheal Wallock, Asha Hall, Christine Hatter, Babak Anasori, Yury Gogotsi

Abstract:

Multifunctional composites with enhanced strength and toughness for superior damage tolerance are essential for advanced aerospace and military applications. Detection of structural changes prior to visible damage may be achieved by incorporating fillers with tunable properties such as two-dimensional (2D) nanomaterials with high aspect ratios and more surface-active sites. While 2D graphene with large surface areas, good mechanical properties, and high electrical conductivity seems ideal as a filler, the single-atomic thickness can lead to bending and rolling during processing, requiring post-processing to bond to polymer matrices. Lately, an emerging family of 2D transition metal carbides and nitrides, MXenes, has attracted much attention since their discovery in 2011. Metallic electronic conductivity and good mechanical properties, even with increased polymer content, coupled with hydrophilicity make MXenes a good candidate as a filler material in polymer composites and exceptional as multifunctional damage indicators in composites. Here, we systematically study MXene-based (Ti₃C₂) coated on glass fibers for fiber reinforced polymer composite for self-sensing using microscopy and micromechanical testing. Further testing is in progress through the investigation of local variations in optical, acoustic, and thermal properties within the damage sites in response to strain caused by mechanical loading.

Keywords: damage sensing, fiber composites, MXene, self-sensing

Procedia PDF Downloads 121
11712 Nonlinear Aerodynamic Parameter Estimation of a Supersonic Air to Air Missile by Using Artificial Neural Networks

Authors: Tugba Bayoglu

Abstract:

Aerodynamic parameter estimation is very crucial in missile design phase, since accurate high fidelity aerodynamic model is required for designing high performance and robust control system, developing high fidelity flight simulations and verification of computational and wind tunnel test results. However, in literature, there is not enough missile aerodynamic parameter identification study for three main reasons: (1) most air to air missiles cannot fly with constant speed, (2) missile flight test number and flight duration are much less than that of fixed wing aircraft, (3) variation of the missile aerodynamic parameters with respect to Mach number is higher than that of fixed wing aircraft. In addition to these challenges, identification of aerodynamic parameters for high wind angles by using classical estimation techniques brings another difficulty in the estimation process. The reason for this, most of the estimation techniques require employing polynomials or splines to model the behavior of the aerodynamics. However, for the missiles with a large variation of aerodynamic parameters with respect to flight variables, the order of the proposed model increases, which brings computational burden and complexity. Therefore, in this study, it is aimed to solve nonlinear aerodynamic parameter identification problem for a supersonic air to air missile by using Artificial Neural Networks. The method proposed will be tested by using simulated data which will be generated with a six degree of freedom missile model, involving a nonlinear aerodynamic database. The data will be corrupted by adding noise to the measurement model. Then, by using the flight variables and measurements, the parameters will be estimated. Finally, the prediction accuracy will be investigated.

Keywords: air to air missile, artificial neural networks, open loop simulation, parameter identification

Procedia PDF Downloads 279
11711 Social Enterprise Strategies for Financial Sustainability in the Economic Literature

Authors: Adam Bereczk

Abstract:

Due to persistent socioeconomic problems regarding sustainability and labour market equilibrium in Europe, the subjects of social economy gained considerable academic attention recently. At the meantime, social enterprises pursuing the double bottom line criteria, struggling to find the proper management philosophies and strategies to make their social purpose business financially sustainable. Despite the strategic management literature was developed mainly on the bases of large corporations, in the past years, the interpretation of strategy concepts became a frequent topic in scientific discussions in the case of small and medium-sized enterprises also. The topic of strategic orientations is a good example of the trend. However, less is known about the case of social enterprises, despite the fact, the majority of them are small businesses engaged in real business activities. The main purpose of this work is to give a comprehensive summary of different perspectives regarding the interpretations of strategic orientations of social enterprises. The novelty of this work is it shows the previous outcomes and models of scholars from various fields of economic science who tried to intertwine the two spheres in different forms, methodize the findings and draw attention to the shortcomings.

Keywords: social enterprises, business sustainability, strategic orientations, literature review

Procedia PDF Downloads 278
11710 Uncertainty Reduction and Dyadic Interaction through Social Media

Authors: Masrur Alam Khan

Abstract:

The purpose of this study was to examine the dyadic interaction techniques that social media users utilize to reduce uncertainty in their day to day business engagements in the absence of their physical interaction. The study empirically tested assumptions of uncertainty reduction theory while addressing self-disclosure, seeking questions to develop consensus, and subsequently to achieve intimacy in very conducive environment. Moreover, this study examined the effect of dyadic interaction through social media among business community while identifying the strength of their reciprocity in relationships and compares it with those having no dyadic relations due to absence of social media. Using socio-metric survey, the study revealed a better understanding of their partners for upholding their professional relations more credible. A sample of unacquainted, both male and female, was randomly asked questions regarding their nature of dyadic interaction within their office while using social media (face-to-face, visual CMC (webcam) or text-only). Primary results explored that the social media users develop their better know-how about their professional obligations to reduce ambiguity and align with one to one interact.

Keywords: dyadic-interaction, social media, uncertainty reduction, socio-metric survey, self-disclosure, intimacy, reciprocity in relationship

Procedia PDF Downloads 137
11709 South Asia’s Political Landscape: Precipitating Terrorism

Authors: Saroj Kumar Rath

Abstract:

India's Muslims represent 15 percent of the nation's population, the world's third largest group in any nation after Indonesia and Pakistan. Extremist groups like the Islamic State, Al Qaeda, the Taliban and the Haqqani network increasingly view India as a target. Several trends explain the rise: Terrorism threats in South Asia are linked and mobile - if one source is batted down, jihadists relocate to find another Islamic cause. As NATO withdraws from Afghanistan, some jihadists will eye India. Pakistan regards India as a top enemy and some officials even encourage terrorists to target areas like Kashmir or Mumbai. Meanwhile, a stream of Wahhabi preachers have visited India, offering hard-line messages; extremist groups like Al Qaeda and the Islamic State compete for influence, and militants even pay jihadists. Muslims as a minority population in India could offer fertile ground for the extremist recruiters. This paper argues that there is an urgent need for the Indian government to profile militants and examine social media sites to attack Wahhabi indoctrination while supporting education and entrepreneurship for all of India's citizens.

Keywords: Al Qaeda, terrorism, Islamic state, India, haqqani network, Pakistan, Taliban

Procedia PDF Downloads 617
11708 How Do You Blow Off Steam? : The Impact of Therapeutic Catharsis Seeking, Self-Construal, and Social Capital in Gaming Context

Authors: Hye Rim Lee, Eui Jun Jeong, Ju Woo Kim

Abstract:

This study will examine how the therapeutic factors (therapeutic catharsis-seeking and game-efficacy of the game player) and self-construal factors (independent and interdependent self-construal of the game player) as well as social capital factors (bonding and bridging social capital of the game player) affect trait aggression in the game. Results show that both therapeutic catharsis-seeking and game self-efficacy are particularly important to the players since they cause the game players’ aggressive tendencies to be greatly diminished. Independent self-construal reduces the level of the players’ aggression. Interestingly enough, the bonding social capital enhances the level of the players’ aggression, while individuals with bridging social capital did not show any significant effects. The results and implications will be discussed herein.

Keywords: aggression catharsis, game self-efficacy, self-construal, social capital, therapeutic catharsis seeking

Procedia PDF Downloads 523
11707 Horizontal Dimension of Constitutional Social Rights

Authors: Monika Florczak-Wątor

Abstract:

The main purpose of this paper is to determine the applicability of the constitutional social rights in the so-called horizontal relations, i.e. the relations between private entities. Nowadays the constitutional rights are more and more often violated by private entities and not only by the state. The private entities interfere with the privacy of individuals, limit their freedom of expression or disturb their peaceful gatherings. International corporations subordinate individuals in a way which may limit their constitutional rights. These new realities determine the new role of the constitution in protecting human rights. The paper will aim at answering two important questions. Firstly, are the private entities obliged to respect the constitutional social rights of other private entities and can they be liable for violation of these rights? Secondly, how the constitutional social rights can receive horizontal effect? Answers to these questions will have a significant meaning for the popularization of the practice of applying the Constitution among the citizens as well as for the courts which settle disputes between them.

Keywords: social rights, private relations, horizontality, constitutional rights

Procedia PDF Downloads 324
11706 Design of Smart Urban Lighting by Using Social Sustainability Approach

Authors: Mohsen Noroozi, Maryam Khalili

Abstract:

Creating cities, objects and spaces that are economically, environmentally and socially sustainable and which meet the challenge of social interaction and generation change will be one of the biggest tasks of designers. Social sustainability is about how individuals, communities and societies live with each other and set out to achieve the objectives of development model which they have chosen for themselves. Urban lightning as one of the most important elements of urban furniture that people constantly interact with it in public spaces; can be a significant object for designers. Using intelligence by internet of things for urban lighting makes it more interactive in public environments. It can encourage individuals to carry out appropriate behaviors and provides them the social awareness through new interactions. The greatest strength of this technology is its strong impact on many aspects of everyday life and users' behaviors. The analytical phase of the research is based on a multiple method survey strategy. Smart lighting proposed in this paper is an urban lighting designed on results obtained from a collective point of view about the social sustainability. In this paper, referring to behavioral design methods, the social behaviors of the people has been studied. Data show that people demands for a deeper experience of social participation, safety perception and energy saving with the meaningful use of interactive and colourful lighting effects. By using intelligent technology, some suggestions are provided in the field of future lighting to consider the new forms of social sustainability.

Keywords: behavior pattern, internet of things, social sustainability, urban lighting

Procedia PDF Downloads 194
11705 Embedded Hw-Sw Reconfigurable Techniques For Wireless Sensor Network Applications

Authors: B. Kirubakaran, C. Rajasekaran

Abstract:

Reconfigurable techniques are used in many engineering and industrial applications for the efficient data transmissions through the wireless sensor networks. Nowadays most of the industrial applications are work for try to minimize the size and cost. During runtime the reconfigurable technique avoid the unwanted hang and delay in the system performance. In recent world Field Programmable Gate Array (FPGA) as one of the most efficient reconfigurable device and widely used for most of the hardware and software reconfiguration applications. In this paper, the work deals with whatever going to make changes in the hardware and software during runtime it’s should not affect the current running process that’s the main objective of the paper our changes be done in a parallel manner at the same time concentrating the cost and power transmission problems during data trans-receiving. Analog sensor (Temperature) as an input for the controller (PIC) through that control the FPGA digital sensors in generalized manner.

Keywords: field programmable gate array, peripheral interrupt controller, runtime reconfigurable techniques, wireless sensor networks

Procedia PDF Downloads 407
11704 The Impact of Brand-Related User-Generated Content on Brand Positioning: A Study on Private Higher Education Institutes in Vietnam

Authors: Charitha Harshani Perera, Rajkishore Nayak, Long Thang Van Nguyen

Abstract:

With the advent of social media, Vietnam has changed the way customers perceive the information about the brand. In the context of higher education, the adoption of social media has received attention with the increasing rate of social media usage among undergraduates. Brand-related user-generated content (UGC) on social media emphasizes the social ties between users and users’ participation, which promotes the communication to build and maintain the relationship with the brands. Although brand positioning offers a significant competitive advantage, the association with brand-related user-generated content in social media with brand positioning in the context of higher education is still an under-researched area. Accordingly, using social identity theory and social exchange theory, this research aims to deepen our understanding of the influence of brand-related user-generated content on brand positioning and purchase intention. Employing a quantitative survey design,384 Vietnamese undergraduates were selected based on purposive sampling. The findings suggest that brand-related user-generated content influence brand positioning and brand choice intention. However, there is a significant mediating effect of the reliability and understandability of the content.

Keywords: brand positioning, brand-related user-generated content, emerging countries, higher education

Procedia PDF Downloads 177
11703 Comparative Analysis of Data Gathering Protocols with Multiple Mobile Elements for Wireless Sensor Network

Authors: Bhat Geetalaxmi Jairam, D. V. Ashoka

Abstract:

Wireless Sensor Networks are used in many applications to collect sensed data from different sources. Sensed data has to be delivered through sensors wireless interface using multi-hop communication towards the sink. The data collection in wireless sensor networks consumes energy. Energy consumption is the major constraints in WSN .Reducing the energy consumption while increasing the amount of generated data is a great challenge. In this paper, we have implemented two data gathering protocols with multiple mobile sinks/elements to collect data from sensor nodes. First, is Energy-Efficient Data Gathering with Tour Length-Constrained Mobile Elements in Wireless Sensor Networks (EEDG), in which mobile sinks uses vehicle routing protocol to collect data. Second is An Intelligent Agent-based Routing Structure for Mobile Sinks in WSNs (IAR), in which mobile sinks uses prim’s algorithm to collect data. Authors have implemented concepts which are common to both protocols like deployment of mobile sinks, generating visiting schedule, collecting data from the cluster member. Authors have compared the performance of both protocols by taking statistics based on performance parameters like Delay, Packet Drop, Packet Delivery Ratio, Energy Available, Control Overhead. Authors have concluded this paper by proving EEDG is more efficient than IAR protocol but with few limitations which include unaddressed issues likes Redundancy removal, Idle listening, Mobile Sink’s pause/wait state at the node. In future work, we plan to concentrate more on these limitations to avail a new energy efficient protocol which will help in improving the life time of the WSN.

Keywords: aggregation, consumption, data gathering, efficiency

Procedia PDF Downloads 497
11702 Mobile Network Users Amidst Ultra-Dense Networks in 5G Using an Improved Coordinated Multipoint (CoMP) Technology

Authors: Johnson O. Adeogo, Ayodele S. Oluwole, O. Akinsanmi, Olawale J. Olaluyi

Abstract:

In this 5G network, very high traffic density in densely populated areas, most especially in densely populated areas, is one of the key requirements. Radiation reduction becomes one of the major concerns to secure the future life of mobile network users in ultra-dense network areas using an improved coordinated multipoint technology. Coordinated Multi-Point (CoMP) is based on transmission and/or reception at multiple separated points with improved coordination among them to actively manage the interference for the users. Small cells have two major objectives: one, they provide good coverage and/or performance. Network users can maintain a good quality signal network by directly connecting to the cell. Two is using CoMP, which involves the use of multiple base stations (MBS) to cooperate by transmitting and/or receiving at the same time in order to reduce the possibility of electromagnetic radiation increase. Therefore, the influence of the screen guard with rubber condom on the mobile transceivers as one major piece of equipment radiating electromagnetic radiation was investigated by mobile network users amidst ultra-dense networks in 5g. The results were compared with the same mobile transceivers without screen guards and rubber condoms under the same network conditions. The 5 cm distance from the mobile transceivers was measured with the help of a ruler, and the intensity of Radio Frequency (RF) radiation was measured using an RF meter. The results show that the intensity of radiation from various mobile transceivers without screen guides and condoms was higher than the mobile transceivers with screen guides and condoms when call conversation was on at both ends.

Keywords: ultra-dense networks, mobile network users, 5g, coordinated multi-point.

Procedia PDF Downloads 103
11701 Instant Fire Risk Assessment Using Artifical Neural Networks

Authors: Tolga Barisik, Ali Fuat Guneri, K. Dastan

Abstract:

Major industrial facilities have a high potential for fire risk. In particular, the indices used for the detection of hidden fire are used very effectively in order to prevent the fire from becoming dangerous in the initial stage. These indices provide the opportunity to prevent or intervene early by determining the stage of the fire, the potential for hazard, and the type of the combustion agent with the percentage values of the ambient air components. In this system, artificial neural network will be modeled with the input data determined using the Levenberg-Marquardt algorithm, which is a multi-layer sensor (CAA) (teacher-learning) type, before modeling the modeling methods in the literature. The actual values produced by the indices will be compared with the outputs produced by the network. Using the neural network and the curves to be created from the resulting values, the feasibility of performance determination will be investigated.

Keywords: artifical neural networks, fire, Graham Index, levenberg-marquardt algoritm, oxygen decrease percentage index, risk assessment, Trickett Index

Procedia PDF Downloads 137
11700 Soil Degradation Processes in Marginal Uplands of Samar Island, Philippines

Authors: Dernie Taganna Olguera

Abstract:

Marginal uplands are fragile ecosystems in the tropics that need to be evaluated for sustainable utilization and land degradation mitigation. Thus, this study evaluated the dominant soil degradation processes in selected marginal uplands of Samar Island, Philippines; evaluated the important factors influencing soil degradation in the selected sites and identified the indicators of soil degradation in marginal uplands of the tropical landscape of Samar Island, Philippines. Two (2) sites were selected (Sta. Rita, Samar and Salcedo, Eastern, Samar) representing the western and eastern sides of Samar Island respectively. These marginal uplands represent different agro-climatic zones suitable for the study. Soil erosion is the major soil degradation process in the marginal uplands studied. It resulted in not only considerable soil losses but nutrient losses as well. Soil erosion varied with vegetation cover and site. It was much higher in the sweetpotato, cassava, and gabi crops than under natural vegetation. In addition, soil erosion was higher in Salcedo than in Sta. Rita, which is related to climatic and soil characteristics. Bulk density, porosity, aggregate stability, soil pH, organic matter, and carbon dioxide evolution are good indicators of soil degradation. The dominance of Saccharum spontaneum Linn., Imperata cylindrica Linn, Melastoma malabathricum Linn. and Psidium guajava Linn indicated degraded soil condition. Farmer’s practices particularly clean culture and organic fertilizer application influenced the degree of soil degradation in the marginal uplands of Samar Island, Philippines.

Keywords: soil degradation, soil erosion, marginal uplands, Samar island, Philippines

Procedia PDF Downloads 418
11699 Deposition of Size Segregated Particulate Matter in Human Respiratory Tract and Their Health Effects in Glass City Residents

Authors: Kalpana Rajouriya, Ajay Taneja

Abstract:

Particulates are ubiquitous in the air environment and cause serious threats to human beings, such as lung cancer, COPD, and Asthma. Particulates mainly arise from industrial effluent, vehicular emission, and other anthropogenic activities. In the glass industrial city Firozabad, real-time monitoring of size segregated Particulate Matter (PM) and black carbon was done by Aerosol Black Carbon Detector (ABCD) and GRIMM portable aerosol Spectrometer at two different sites in which one site is urban and another is rural. The average mass concentration of size segregated PM during the study period (March & April 2022) was recorded as PM10 (223.73 g/m⁻³), PM5.0 (44.955 g/m⁻³), PM2.5 (59.275 g/m⁻³), PM1.0 (33.02 g/m⁻³), PM0.5 (2.05 g/m⁻³), and PM0.25 (2.99 g/m⁻³). The highest concentration of BC was found in Urban due to the emissions from diesel engines and wood burning, while NO2 was highest at the rural sites. The average concentrations of PM10 (6.08 and 2.73 times) PM2.5 exceeded the NAAQS and WHO guidelines. Particulate Matter deposition and health risk assessment was done by MPPD and USEPA model to know about the particulate matter toxicity in industrial residents. Health risk assessment results showed that Children are most likely to be affected by exposure of PM10 and PM2.5 and may have various non-carcinogenic and carcinogenic diseases. Deposition results inferred that the sensitive exposed population, especially 9 years old children, have high PM deposition as well as visualization and may be at risk of developing health-related problems from exposure to size-segregated PM. They will be discussed during presentation.

Keywords: particulate matter, black carbon, NO2, deposition of PM, health risk

Procedia PDF Downloads 66
11698 Applying Critical Realism to Qualitative Social Work Research: A Critical Realist Approach for Social Work Thematic Analysis Method

Authors: Lynne Soon-Chean Park

Abstract:

Critical Realism (CR) has emerged as an alternative to both the positivist and constructivist perspectives that have long dominated social work research. By unpacking the epistemic weakness of two dogmatic perspectives, CR provides a useful philosophical approach that incorporates the ontological objectivist and subjectivist stance. The CR perspective suggests an alternative approach for social work researchers who have long been looking to engage in the complex interplay between perceived reality at the empirical level and the objective reality that lies behind the empirical event as a causal mechanism. However, despite the usefulness of CR in informing social work research, little practical guidance is available about how CR can inform methodological considerations in social work research studies. This presentation aims to provide a detailed description of CR-informed thematic analysis by drawing examples from a social work doctoral research of Korean migrants’ experiences and understanding of trust associated with their settlement experience in New Zealand. Because of its theoretical flexibility and accessibility as a qualitative analysis method, thematic analysis can be applied as a method that works both to search for the demi-regularities of the collected data and to identify the causal mechanisms that lay behind the empirical data. In so doing, this presentation seeks to provide a concrete and detailed exemplar for social work researchers wishing to employ CR in their qualitative thematic analysis process.

Keywords: critical Realism, data analysis, epistemology, research methodology, social work research, thematic analysis

Procedia PDF Downloads 212
11697 NFResNet: Multi-Scale and U-Shaped Networks for Deblurring

Authors: Tanish Mittal, Preyansh Agrawal, Esha Pahwa, Aarya Makwana

Abstract:

Multi-Scale and U-shaped Networks are widely used in various image restoration problems, including deblurring. Keeping in mind the wide range of applications, we present a comparison of these architectures and their effects on image deblurring. We also introduce a new block called as NFResblock. It consists of a Fast Fourier Transformation layer and a series of modified Non-Linear Activation Free Blocks. Based on these architectures and additions, we introduce NFResnet and NFResnet+, which are modified multi-scale and U-Net architectures, respectively. We also use three differ-ent loss functions to train these architectures: Charbonnier Loss, Edge Loss, and Frequency Reconstruction Loss. Extensive experiments on the Deep Video Deblurring dataset, along with ablation studies for each component, have been presented in this paper. The proposed architectures achieve a considerable increase in Peak Signal to Noise (PSNR) ratio and Structural Similarity Index (SSIM) value.

Keywords: multi-scale, Unet, deblurring, FFT, resblock, NAF-block, nfresnet, charbonnier, edge, frequency reconstruction

Procedia PDF Downloads 136
11696 Me and My Selfie: Identity Building Through Self Representation in Social Media

Authors: Revytia Tanera

Abstract:

This research is a pilot study to examine the rise of selfie trend in dealing with individual self representation and identity building in social media. The symbolic interactionism theory is used as the concept of the desired self image, and Cooley’s looking glass-self concept is used to analyze the mechanical reflection of ourselves; how do people perform their “digital self” in social media. In-depth interviews were conducted in the study with a non-random sample who owns a smartphone with a front camera feature and are active in social media. This research is trying to find out whether the selfie trend brings any influence on identity building on each individual. Through analysis of interview results, it can be concluded that people take selfie photos in order to express themselves and to boost their confidence. This study suggests a follow up and more in depth analysis on identity and self representation from various age groups.

Keywords: self representation, selfie, social media, symbolic interaction, looking glass-self

Procedia PDF Downloads 297
11695 Attitude towards the Consumption of Social Media: Analyzing Young Consumers’ Travel Behavior

Authors: Farzana Sharmin, Mohammad Tipu Sultan, Benqian Li

Abstract:

Advancement of new media technology and consumption of social media have altered the way of communication in the tourism industry, mostly for consumers’ travel planning, online purchase, and experience sharing activity. There is an accelerating trend among young consumers’ to utilize this new media technology. This paper aims to analyze the attitude of young consumers’ about social media use for travel purposes. The convenience random sample method used to collect data from an urban area of Shanghai (China), consists of 225 young consumers’. This survey identified behavioral determinants of social media consumption by the extended theory of planned behavior (TPB). The instrument developed support on previous research to test hypotheses. The results of structural analyses indicate that attitude towards the use of social media is affected by external factors such as availability and accessibility of technology. In addition, subjective norm and perceived behavioral control have partially influenced the attitude of respondents’. The results of this study could help to improve social media travel marketing and promotional strategies for respective groups.

Keywords: social media, theory of planned behavior, travel behavior, young consumer

Procedia PDF Downloads 195
11694 Juvenile Fish Associated with Pondweed and Charophyte Habitat: A Case Study Using Upgraded Pop-up Net in the Estuarine Part of the Curonian Lagoon

Authors: M. Bučas, A. Skersonas, E. Ivanauskas, J. Lesutienė, N. Nika, G. Srėbalienė, E. Tiškus, J. Gintauskas, A.Šaškov, G. Martin

Abstract:

Submerged vegetation enhances heterogeneity of sublittoral habitats; therefore, macrophyte stands are essential elements of aquatic ecosystems to maintain a diverse fish fauna. Fish-habitat relations have been extensively studied in streams and coastal waters, but in lakes and estuaries are still underestimated. The aim of this study is to assess temporal (diurnal and seasonal) patterns of fish juvenile assemblages associated with common submerged macrophyte habitats, which have significantly spread during the recent decade in the upper littoral part of the Curonian Lagoon. The assessment was performed by means of an upgraded pop-up net approach resulting in much precise sampling versus other techniques. The optimal number of samples (i.e., pop-up nets) required to cover>80% of the total number of fish species depended on the time of the day in both study sites: at least 7and 9 nets in the evening (18-24 pm) in the Southern and Northern study sites, respectively. In total, 14 fish species were recorded, where perch and roach dominated (respectively 48% and 24%). From multivariate analysis, water salinity and seasonality (temperature or sampling month) were primary factors determining fish assemblage composition. The southern littoral area, less affected by brackish water conditions, hosted a higher number of species (13) than in the Northern site (8). In the latter site, brackish water tolerant species (three-spined and nine-spined sticklebacks, spiny loach, roach, and round goby) were more abundant than in the Southern site. Perch and ruffe dominated in the Southern site. Spiny loach and nine-spined stickleback were more frequent in September, while ruffe, perch, and roach occurred more in July. The diel dynamics of the common species such as perch, roach, and ruffe followed the general pattern, but it was species specific and depended on the study site, habitat, and month. The species composition between macrophyte habitats did not significantly differ; however, it differed from the results obtained in 2005 at both study sites indicating the importance of expanded charophyte stands during the last decade in the littoral zone.

Keywords: diel dynamics, charophytes, pondweeds, herbivorous and benthivorous fishes, littoral, nursery habitat, shelter

Procedia PDF Downloads 189
11693 English Title Adaptive Comparison of Outdoor and Indoor Social Security in Damaged Area and New Residential Complex with Two-Way Anova Case Study: Qasr-Al-Dasht and Moalem District in Shiraz

Authors: Homa Parmoon, Narges Hamzeh

Abstract:

Since today's urban spaces are disposed towards behavioral disorders and lack of security, both qualitative and quantitative aspects of security especially social and physical security are considered as basic necessities in urban planning. This research focused on the variable of place of living, examined social security in the old and new textures, and investigated the amount of residents’ social security in Shiraz including safety, financial, emotional and moral security. To this end, two neighborhoods in region 1 of Shiraz- Qasr-Al-Dasht (old texture) and Moalem (new texture)- were examined through a comparative study of 60 samples lived in two neighborhoods. Data were gathered through two-way ANOVA between the variables of residential context and internal and external security. This analysis represents the significance or insignificance of the model as well as the individual effects of each independent variable on the dependent variable. It was tested by ANCOVA and F-test. Research findings indicated place of living has a significant effect on families’ social security. The safety, financial, emotional, and moral security also represented a great impact on social security. As a result, it can be concluded that social security changes with the changing in place of living.

Keywords: social security, damaged area, two-way ANOVA, Shiraz

Procedia PDF Downloads 139
11692 Anti-Western Sentiment amongst Arabs and How It Drives Support for Russia against Ukraine

Authors: Soran Tarkhani

Abstract:

A glance at social media shows that Russia's invasion of Ukraine receives considerable support among Arabs. This significant support for the Russian invasion of Ukraine is puzzling since most Arab leaders openly condemned the Russian invasion through the UN ES‑11/4 Resolution, and Arabs are among the first who experienced the devastating consequences of war firsthand. This article tries to answer this question by using multiple regression to analyze the online content of Arab responses to Russia's invasion of Ukraine on seven major news networks: CNN Arabic, BBC Arabic, Sky News Arabic, France24 Arabic, DW, Aljazeera, and Al-Arabiya. The article argues that the underlying reason for this Arab support is a reaction to the common anti-Western sentiments among Arabs. The empirical result from regression analysis supports the central arguments and uncovers the motivations behind the endorsement of the Russian invasion of Ukraine and the opposing Ukraine by many Arabs.

Keywords: Ukraine, Russia, Arabs, Ukrainians, Russians, Putin, invasion, Europe, war

Procedia PDF Downloads 75
11691 Integration of Social Media in Teaching and Learning Activities: A Case Study

Authors: A. Nagaletchimee Annamalai

Abstract:

The study investigated on how a small group of pre-service teachers and lecturers used social media to interact and collaborate to complete their tasks. The study is a qualitative case study that explored the lecturers’ reflections and pre-service teachers’ interviews. The lecturers were given the option to choose Facebook or any other social media as their teaching and learning platforms. However, certain guidelines based on were given to lecturers to conduct their teaching and learning activities. The findings revealed that although Facebook was a popular social networking site, it was not a preferred educational platform. Lecturers preferred to use WhatsApp, Canvas, and email. The focus group interview found positive and negative experiences of the pre-service teachers. The study suggested several pedagogical implications and importantly highlighted the need for changes in curriculum to ensure lecturers leverage the potential of technology in education.

Keywords: social media, interactions, collaboration, online learning environment

Procedia PDF Downloads 182
11690 Social and Peer Influences in College Choice

Authors: Ali Bhayani

Abstract:

College is a high involvement decision making where students are expected to evaluate several college offerings before selecting a college or a course to study. However, even in high involvement product like college, students get influenced by opinion leaders and suffer from social contagion. This narrative style study, involving 98 first year students, was able to demonstrate that social contagion differs with regards to gender, ethnicity and personality. Recommendations from students with academically strong background would impact on the college choice of the undergraduate students and limit information search. Study was able to identify the incidence of anchoring heuristics amongst the students. Managerial implications with regards to design of marketing campaign follows at the end of the study.

Keywords: social contagion, opinion leaders, higher education, consumer behavior

Procedia PDF Downloads 365
11689 Adaptive Energy-Aware Routing (AEAR) for Optimized Performance in Resource-Constrained Wireless Sensor Networks

Authors: Innocent Uzougbo Onwuegbuzie

Abstract:

Wireless Sensor Networks (WSNs) are crucial for numerous applications, yet they face significant challenges due to resource constraints such as limited power and memory. Traditional routing algorithms like Dijkstra, Ad hoc On-Demand Distance Vector (AODV), and Bellman-Ford, while effective in path establishment and discovery, are not optimized for the unique demands of WSNs due to their large memory footprint and power consumption. This paper introduces the Adaptive Energy-Aware Routing (AEAR) model, a solution designed to address these limitations. AEAR integrates reactive route discovery, localized decision-making using geographic information, energy-aware metrics, and dynamic adaptation to provide a robust and efficient routing strategy. We present a detailed comparative analysis using a dataset of 50 sensor nodes, evaluating power consumption, memory footprint, and path cost across AEAR, Dijkstra, AODV, and Bellman-Ford algorithms. Our results demonstrate that AEAR significantly reduces power consumption and memory usage while optimizing path weight. This improvement is achieved through adaptive mechanisms that balance energy efficiency and link quality, ensuring prolonged network lifespan and reliable communication. The AEAR model's superior performance underlines its potential as a viable routing solution for energy-constrained WSN environments, paving the way for more sustainable and resilient sensor network deployments.

Keywords: wireless sensor networks (WSNs), adaptive energy-aware routing (AEAR), routing algorithms, energy, efficiency, network lifespan

Procedia PDF Downloads 36
11688 Requirement Engineering for Intrusion Detection Systems in Wireless Sensor Networks

Authors: Afnan Al-Romi, Iman Al-Momani

Abstract:

The urge of applying the Software Engineering (SE) processes is both of vital importance and a key feature in critical, complex large-scale systems, for example, safety systems, security service systems, and network systems. Inevitably, associated with this are risks, such as system vulnerabilities and security threats. The probability of those risks increases in unsecured environments, such as wireless networks in general and in Wireless Sensor Networks (WSNs) in particular. WSN is a self-organizing network of sensor nodes connected by wireless links. WSNs consist of hundreds to thousands of low-power, low-cost, multi-function sensor nodes that are small in size and communicate over short-ranges. The distribution of sensor nodes in an open environment that could be unattended in addition to the resource constraints in terms of processing, storage and power, make such networks in stringent limitations such as lifetime (i.e. period of operation) and security. The importance of WSN applications that could be found in many militaries and civilian aspects has drawn the attention of many researchers to consider its security. To address this important issue and overcome one of the main challenges of WSNs, security solution systems have been developed by researchers. Those solutions are software-based network Intrusion Detection Systems (IDSs). However, it has been witnessed, that those developed IDSs are neither secure enough nor accurate to detect all malicious behaviours of attacks. Thus, the problem is the lack of coverage of all malicious behaviours in proposed IDSs, leading to unpleasant results, such as delays in the detection process, low detection accuracy, or even worse, leading to detection failure, as illustrated in the previous studies. Also, another problem is energy consumption in WSNs caused by IDS. So, in other words, not all requirements are implemented then traced. Moreover, neither all requirements are identified nor satisfied, as for some requirements have been compromised. The drawbacks in the current IDS are due to not following structured software development processes by researches and developers when developing IDS. Consequently, they resulted in inadequate requirement management, process, validation, and verification of requirements quality. Unfortunately, WSN and SE research communities have been mostly impermeable to each other. Integrating SE and WSNs is a real subject that will be expanded as technology evolves and spreads in industrial applications. Therefore, this paper will study the importance of Requirement Engineering when developing IDSs. Also, it will study a set of existed IDSs and illustrate the absence of Requirement Engineering and its effect. Then conclusions are drawn in regard of applying requirement engineering to systems to deliver the required functionalities, with respect to operational constraints, within an acceptable level of performance, accuracy and reliability.

Keywords: software engineering, requirement engineering, Intrusion Detection System, IDS, Wireless Sensor Networks, WSN

Procedia PDF Downloads 322
11687 Selfie: Redefining Culture of Narcissism

Authors: Junali Deka

Abstract:

“Pictures speak more than a thousand words”. It is the power of image which can have multiple meanings the way it is read by the viewers. This research article is an outcome of the extensive study of the phenomenon of‘selfie culture’ and dire need of self-constructed virtual identity among youths. In the recent times, there has been a revolutionary change in the concept of photography in terms of both techniques and applications. The popularity of ‘self-portraits’ mainly depend on the temporal space and time created on social networking sites like Facebook, Instagram. With reference to Stuart’s Hall encoding and decoding process, the article studies the behavior of the users who post photographs online. The photographic messages (Roland Barthes) are interpreted differently by different viewers. The notion of ‘self’, ‘self-love and practice of looking (Marita Sturken) and ways of seeing (John Berger) got new definition and dimensional together. After Oscars Night, show host Ellen DeGeneres’s selfie created the most buzz and hype in the social media. The term was judged the word of 2013, and has earned its place in the dictionary. “In November 2013, the word "selfie" was announced as being the "word of the year" by the Oxford English Dictionary. By the end of 2012, Time magazine considered selfie one of the "top 10 buzzwords" of that year; although selfies had existed long before, it was in 2012 that the term "really hit the big time an Australian origin. The present study was carried to understand the concept of ‘selfie-bug’ and the phenomenon it has created among youth (especially students) at large in developing a pseudo-image of its own. The topic was relevant and gave a platform to discuss about the cultural, psychological and sociological implications of selfie in the age of digital technology. At the first level, content analysis of the primary and secondary sources including newspapers articles and online resources was carried out followed by a small online survey conducted with the help of questionnaire to find out the student’s view on selfie and its social and psychological effects. The newspapers reports and online resources confirmed that selfie is a new trend in the digital media and it has redefined the notion of beauty and self-love. The Facebook and Instagram are the major platforms used to express one-self and creation of virtual identity. The findings clearly reflected the active participation of female students in comparison to male students. The study of the photographs of few selected respondents revealed the difference of attitude and image building among male and female users. The study underlines some basic questions about the desire of reconstruction of identity among young generation, such as - are they becoming culturally narcissist; responsible factors for cultural, social and moral changes in the society, psychological and technological effects caused by Smartphone as well, culminating into a big question mark whether the selfie is a social signifier of identity construction.

Keywords: Culture, Narcissist, Photographs, Selfie

Procedia PDF Downloads 407
11686 Adversarial Attacks and Defenses on Deep Neural Networks

Authors: Jonathan Sohn

Abstract:

Deep neural networks (DNNs) have shown state-of-the-art performance for many applications, including computer vision, natural language processing, and speech recognition. Recently, adversarial attacks have been studied in the context of deep neural networks, which aim to alter the results of deep neural networks by modifying the inputs slightly. For example, an adversarial attack on a DNN used for object detection can cause the DNN to miss certain objects. As a result, the reliability of DNNs is undermined by their lack of robustness against adversarial attacks, raising concerns about their use in safety-critical applications such as autonomous driving. In this paper, we focus on studying the adversarial attacks and defenses on DNNs for image classification. There are two types of adversarial attacks studied which are fast gradient sign method (FGSM) attack and projected gradient descent (PGD) attack. A DNN forms decision boundaries that separate the input images into different categories. The adversarial attack slightly alters the image to move over the decision boundary, causing the DNN to misclassify the image. FGSM attack obtains the gradient with respect to the image and updates the image once based on the gradients to cross the decision boundary. PGD attack, instead of taking one big step, repeatedly modifies the input image with multiple small steps. There is also another type of attack called the target attack. This adversarial attack is designed to make the machine classify an image to a class chosen by the attacker. We can defend against adversarial attacks by incorporating adversarial examples in training. Specifically, instead of training the neural network with clean examples, we can explicitly let the neural network learn from the adversarial examples. In our experiments, the digit recognition accuracy on the MNIST dataset drops from 97.81% to 39.50% and 34.01% when the DNN is attacked by FGSM and PGD attacks, respectively. If we utilize FGSM training as a defense method, the classification accuracy greatly improves from 39.50% to 92.31% for FGSM attacks and from 34.01% to 75.63% for PGD attacks. To further improve the classification accuracy under adversarial attacks, we can also use a stronger PGD training method. PGD training improves the accuracy by 2.7% under FGSM attacks and 18.4% under PGD attacks over FGSM training. It is worth mentioning that both FGSM and PGD training do not affect the accuracy of clean images. In summary, we find that PGD attacks can greatly degrade the performance of DNNs, and PGD training is a very effective way to defend against such attacks. PGD attacks and defence are overall significantly more effective than FGSM methods.

Keywords: deep neural network, adversarial attack, adversarial defense, adversarial machine learning

Procedia PDF Downloads 195
11685 Multimodal Characterization of Emotion within Multimedia Space

Authors: Dayo Samuel Banjo, Connice Trimmingham, Niloofar Yousefi, Nitin Agarwal

Abstract:

Technological advancement and its omnipresent connection have pushed humans past the boundaries and limitations of a computer screen, physical state, or geographical location. It has provided a depth of avenues that facilitate human-computer interaction that was once inconceivable such as audio and body language detection. Given the complex modularities of emotions, it becomes vital to study human-computer interaction, as it is the commencement of a thorough understanding of the emotional state of users and, in the context of social networks, the producers of multimodal information. This study first acknowledges the accuracy of classification found within multimodal emotion detection systems compared to unimodal solutions. Second, it explores the characterization of multimedia content produced based on their emotions and the coherence of emotion in different modalities by utilizing deep learning models to classify emotion across different modalities.

Keywords: affective computing, deep learning, emotion recognition, multimodal

Procedia PDF Downloads 158
11684 Heavy Metal Contamination of Mining-Impacted Mangrove Sediments and Its Correlation with Vegetation and Sediment Attributes

Authors: Jumel Christian P. Nicha, Severino G. Salmo III

Abstract:

This study investigated the concentration of heavy metals (HM) in mangrove sediments of Lake Uacon, Zambales, Philippines. The relationship among the studied HM (Cr, Ni, Pb, Cu, Cd, Fe) and the mangrove vegetation and sediment characteristics were assessed. Fourteen sampling plots were designated across the lake (10 vegetated and 4 un-vegetated) based on distance from the mining effluents. In each plot, three sediment cores were collected at 20 cm depth. Among the dominant mangrove species recorded were (in order of dominance): Sonneratia alba, Rhizophora stylosa, Avicennia marina, Excoecaria agallocha and Bruguiera gymnorrhiza. Sediment samples were digested with aqua regia, and the HM concentrations were quantified using Atomic Absorption Spectroscopy (AAS). Results showed that HM concentrations were higher in the vegetated plots as compared to the un-vegetated sites. Vegetated sites had high Ni (mean: 881.71 mg/kg) and Cr (mean: 776.36 mg/kg) that exceeded the threshold values (cf. by the United States Environmental Protection Agency; USEPA). Fe, Pb, Cu and Cd had a mean concentration of 2597.92 mg/kg, 40.94 mg/kg, 36.81 mg/kg and 2.22 mg/kg respectively. Vegetation variables were not significantly correlated with HM concentration. However, the HM concentration was significantly correlated with sediment variables particularly pH, redox, particle size, nitrogen, phosphorus, moisture and organic matter contents. The Pollution Load Index (PLI) indicated moderate to high pollution in the lake. Risk assessment and management should be designed in order to mitigate the ecological risk posed by HM. The need of a regular monitoring scheme for lake and mangrove rehabilitation programs and management should be designed.

Keywords: heavy metals, mangrove vegetation, mining, Philippines, sediment

Procedia PDF Downloads 160