Search results for: tax evasion
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 42

Search results for: tax evasion

42 Tax Evasion and Macroeconomic (In)stability

Authors: Wei-Neng Wang, Jhy-Yuan Shieh, Jhy-Hwa Chen, Juin-Jen Chang

Abstract:

This paper incorporate tax evasion into a one-sector real business cycle (RBC) model to explores the quantitative interrelations between income tax rate and equilibrium (in)determinacy, and income tax rate is endogenously determined in order to balance the government budget. We find that the level of the effective income tax rate is key factor for equilibrium (in)determinacy, instead of the level of income tax rate in a tax evasion economy. Under an economy with tax evasion, the higher income tax rate is not sufficiently to lead to equilibrium indeterminate, it must combine with a necessary condition which is the lower fraction of tax evasion and that can result in agents' optimistic expectations to become self-fulfilling and sunspot fluctuation more likely to occur. On the other hand, an economy with tax evasion can see its macroeconomy become more stabilize, and a higher fraction of income tax evasion may has a stronger stabilizing effect.

Keywords: tax evasion, balanced-budget rule, equlibirium (in)determinacy, effective income tax rate

Procedia PDF Downloads 19
41 The Impact of Global Financial Crises and Corporate Financial Crisis (Bankruptcy Risk) on Corporate Tax Evasion: Evidence from Emerging Markets

Authors: Seyed Sajjad Habibi

Abstract:

The aim of this study is to investigate the impact of global financial crises and corporate financial crisis on tax evasion of companies listed on the Tehran Stock Exchange. For this purpose, panel data in the periods of financial crisis period (2007 to 2012) and without a financial crisis (2004, 2005, 2006, 2013, 2014, and 2015) was analyzed using multivariate linear regression. The results indicate a significant relationship between the corporate financial crisis (bankruptcy risk) and tax evasion in the global financial crisis period. The results also showed a significant relationship between the corporate bankruptcy risk and tax evasion in the period with no global financial crisis. A significant difference was found between the bankruptcy risk and tax evasion in the period of the global financial crisis and that with no financial crisis so that tax evasion increased in the financial crisis period.

Keywords: global financial crisis, corporate financial crisis, bankruptcy risk, tax evasion risk, emerging markets

Procedia PDF Downloads 249
40 The Modeling and Effectiveness Evaluation for Vessel Evasion to Acoustic Homing Torpedo

Authors: Li Minghui, Min Shaorong, Zhang Jun

Abstract:

This paper aims for studying the operational efficiency of surface warship’s motorized evasion to acoustic homing torpedo. It orderly developed trajectory model, self-guide detection model, vessel evasion model, as well as anti-torpedo error model in three-dimensional space to make up for the deficiency of precious researches analyzing two-dimensionally confrontational models. Then, making use of the Monte Carlo method, it carried out the simulation for the confrontation process of evasion in the environment of MATLAB. At last, it quantitatively analyzed the main factors which determine vessel’s survival probability. The results show that evasion relative bearing and speed will affect vessel’s survival probability significantly. Thus, choosing appropriate evasion relative bearing and speed according to alarming range and alarming relative bearing for torpedo, improving alarming range and positioning accuracy and reducing the response time against torpedo will improve the vessel’s survival probability significantly.

Keywords: acoustic homing torpedo, vessel evasion, monte carlo method, torpedo defense, vessel's survival probability

Procedia PDF Downloads 418
39 The Reflection of Greek Reality Concerning Taxation from the Perspective of Both Tax Payers and Taxmen

Authors: Evagelia Makri, Maria Tsourela, Dimitris Paschaloudis, Dafni M. Nerantzaki

Abstract:

One of the biggest financial and social problems, which at the same time constitute one of the greater challenges that Greek society faces today, is the illegal avoidance of tax payments. Tax evasion may negate financial data and community budgets, as well as breed financial chaos. This research seeks to reflect Greek reality concerning tax measures. Also, there will be an effort to record the factors surrounding tax evasion. Greek tax system’s data will be rendered in financial terms. Questionnaires will be handed out to tax payers, and interviews will be conducted to taxmen. The quantitative analysis of the questionnaire answers will define the tax payers’ opinion towards the existence of tax evasion. The qualitative analysis of the interviews will reveal the main reason that boosts tax evasion. At the end, there will be some realistic proposals about how to better collect taxes, through the creation of a strong regulatory mechanism.

Keywords: tax evasion, tax collection measures, insurance recovery measures, Greek tax system

Procedia PDF Downloads 332
38 Tax Evasion in Brazil: The Case of Specialists

Authors: Felippe Clemente, Viviani S. Lírio

Abstract:

Brazilian tax evasion is very high. It causes many problems for economics as budget realization, income distribution and no allocation of productive resources. Therefore, the purpose of this article is to use the instrumental game theory to understand tax evasion agents and tax authority in Brazil (Federal Revenue and Federal Police). By means of Game Theory approaches, the main results from considering cases both with and without specialists show that, in a high dropout situation, penalizing taxpayers with either high fines or deprivations of liberty may not be very effective. The analysis also shows that audit and inspection costs play an important role in driving the equilibrium system. This would suggest that a policy of investing in tax inspectors would be a more effective tool in combating non-compliance with tax obligations than penalties or fines.

Keywords: tax evasion, Brazil, game theory, specialists

Procedia PDF Downloads 298
37 Tax Evasion with Mobility between the Regular and Irregular Sectors

Authors: Xavier Ruiz Del Portal

Abstract:

This paper incorporates mobility between the legal and black economies into a model of tax evasion with endogenous labor supply in which underreporting is possible in one sector but impossible in the other. We have found that the results of the effects along the extensive margin (number of evaders) become more robust and conclusive than those along the intensive margin (hours of illegal work) usually considered by the literature. In particular, it is shown that the following policies reduce the number of evaders: (a) larger and more progressive evasion penalties; (b) higher detection probabilities; (c) an increase in the legal sector wage rate; (d) a decrease in the moonlighting wage rate; (e) higher costs for creating opportunities to evade; (f) lower opportunities to evade, and (g) greater psychological costs of tax evasion. When tax concealment and illegal work also are taken into account, the effects do not vary significantly under the assumptions in Cowell (1985), except for the fact that policies (a) and (b) only hold as regards low- and middle-income groups and policies (e) and (f) as regards high-income groups.

Keywords: income taxation, tax evasion, extensive margin responses, the penalty system

Procedia PDF Downloads 126
36 The Characteristics of a Fair and Efficient Tax Auditing Information System as a Tool against Tax Evasion: A Theoretical Framework

Authors: Dimitris Balios, Stefanos Tantos

Abstract:

Economic growth and social evolution are connected to trust relationships in a society. The quality of the accounting information, the tax information system and the tax audit mechanism evolve multiple benefits in an economy. Tax evasion, the illegal practice where people and companies do not pay taxes, is a crime because of the negative effect in economy and society. In this paper, we describe a theoretical framework on the characteristics of a fair and efficient tax auditing information system which could be a tool against tax evasion, a tool for an economy to grow, especially in countries that face fluctuations in economic activity. We conclude that a fair and efficient tax auditing information system increases the reliability of tax administration, improves taxpayers’ tax compliance and causes a developmental trajectory for the economy.

Keywords: auditing information system, auditing mechanism, tax evasion, taxation

Procedia PDF Downloads 121
35 The Effect of Taxpayer Political Beliefs on Tax Evasion Behavior: An Empirical Study Applied to Tunisian Case

Authors: Nadia Elouaer

Abstract:

Tax revenue is the main state resource and one of the important variables in tax policy. Nevertheless, this resource is continually decreasing, so it is important to focus on the reasons for this decline. Several studies show that the taxpayer is reluctant to pay taxes, especially in countries at risk or in countries in transition, including Tunisia. This study focuses on the tax evasion behavior of a Tunisian taxpayer under the influence of his political beliefs, as well as the influence of different tax compliance variables. Using a questionnaire, a sample of 500 Tunisian taxpayers is used to examine the relationship between political beliefs and taxpayer affiliations and tax compliance variables, as well as the study of the causal link between political beliefs and fraudulent behavior. The data were examined using correlation, factor, and regression analysis and found a positive and statistically significant relationship between the different tax compliance variables and the tax evasion behavior. There is also a positive and statistically significant relationship between tax evasion and political beliefs and affiliations. The study of the relationship between political beliefs and compliance variables shows that they are closely related. The conclusion is to admit that tax evasion and political beliefs are closely linked, and the government should update its tax policy and modernize its administration in order to strengthen the credibility and disclosure of information in order to restore a relationship of trust between public authorities and the taxpayer.

Keywords: fiscal policy, political beliefs, tax evasion, taxpayer behavior

Procedia PDF Downloads 123
34 Comprehensive Review of Adversarial Machine Learning in PDF Malware

Authors: Preston Nabors, Nasseh Tabrizi

Abstract:

Portable Document Format (PDF) files have gained significant popularity for sharing and distributing documents due to their universal compatibility. However, the widespread use of PDF files has made them attractive targets for cybercriminals, who exploit vulnerabilities to deliver malware and compromise the security of end-user systems. This paper reviews notable contributions in PDF malware detection, including static, dynamic, signature-based, and hybrid analysis. It presents a comprehensive examination of PDF malware detection techniques, focusing on the emerging threat of adversarial sampling and the need for robust defense mechanisms. The paper highlights the vulnerability of machine learning classifiers to evasion attacks. It explores adversarial sampling techniques in PDF malware detection to produce mimicry and reverse mimicry evasion attacks, which aim to bypass detection systems. Improvements for future research are identified, including accessible methods, applying adversarial sampling techniques to malicious payloads, evaluating other models, evaluating the importance of features to malware, implementing adversarial defense techniques, and conducting comprehensive examination across various scenarios. By addressing these opportunities, researchers can enhance PDF malware detection and develop more resilient defense mechanisms against adversarial attacks.

Keywords: adversarial attacks, adversarial defense, adversarial machine learning, intrusion detection, PDF malware, malware detection, malware detection evasion

Procedia PDF Downloads 11
33 Educational Data Mining: The Case of the Department of Mathematics and Computing in the Period 2009-2018

Authors: Mário Ernesto Sitoe, Orlando Zacarias

Abstract:

University education is influenced by several factors that range from the adoption of strategies to strengthen the whole process to the academic performance improvement of the students themselves. This work uses data mining techniques to develop a predictive model to identify students with a tendency to evasion and retention. To this end, a database of real students’ data from the Department of University Admission (DAU) and the Department of Mathematics and Informatics (DMI) was used. The data comprised 388 undergraduate students admitted in the years 2009 to 2014. The Weka tool was used for model building, using three different techniques, namely: K-nearest neighbor, random forest, and logistic regression. To allow for training on multiple train-test splits, a cross-validation approach was employed with a varying number of folds. To reduce bias variance and improve the performance of the models, ensemble methods of Bagging and Stacking were used. After comparing the results obtained by the three classifiers, Logistic Regression using Bagging with seven folds obtained the best performance, showing results above 90% in all evaluated metrics: accuracy, rate of true positives, and precision. Retention is the most common tendency.

Keywords: evasion and retention, cross-validation, bagging, stacking

Procedia PDF Downloads 52
32 Significance of Life Values in Relationship: A Detailed Analysis of Teenage Population

Authors: Preeti Nakhat

Abstract:

Background: Values are essential part of one's life. They are inculcated since the early years of life and shape the personality of the individual. They play a tremendous role in decision making. Teenagers are seen perplexed about the values of their life. The challenge faced by majority of the teenage population in choosing between a positive and negative value is high. The values they adopt remain throughout their life and in every decision, hence it is a crucial topic of research. Research Methodology: This research aimed at finding out the value conflict of teenagers in relations. Hypothesis of the study are: H₀- There is no significant association between the life values and value conflict of higher secondary students; H₁– There is a significant association between the life values and value conflict of higher secondary students. For the same, the standardized tool, value conflict scale by R. L. Bhardwaj has been used. The tool consists 24 questions of different life situations with multiple choice options. Findings: There is 96% variation in value conflict due to evasion vs. fortitude, dependence vs. self-reliance, selfishness vs. probity, hate vs. love, fear vs. assertion and pragmatism vs. idealism life values. There is a positive association between all the life values and value conflict of higher secondary school students. Percentages of association are: 0.17% between value conflict and evasion vs. fortitude value, 0.16% between value conflict and dependence vs. self-reliance value, 0.17% between value conflict and selfishness vs. probity value, 0.16% between value conflict and hate vs. love value, 0.17% between value conflict and fear vs. assertion, 0.17% between value conflict and pragmatism vs. idealism value. Discussions: The dilemma faced by the students regarding value conflict is high. Bewilderment of being honest or lying, of loving or hating family and friends, being pragmatic or idealistic in life decision, being selfish or selfless is seen among the students. It is the challenge for the future. Teaching of values with a practical aspect should be added in the school curriculum.

Keywords: dilemma, conflict, school, values

Procedia PDF Downloads 208
31 A Trends Analysis of Yatch Simulator

Authors: Jae-Neung Lee, Keun-Chang Kwak

Abstract:

This paper describes an analysis of Yacht Simulator international trends and also explains about Yacht. Examples of yacht Simulator using Yacht Simulator include image processing for totaling the total number of vehicles, edge/target detection, detection and evasion algorithm, image processing using SIFT (scale invariant features transform) matching, and application of median filter and thresholding.

Keywords: yacht simulator, simulator, trends analysis, SIFT

Procedia PDF Downloads 401
30 Institutional Quality and Tax Compliance: A Cross-Country Regression Evidence

Authors: Debi Konukcu Onal, Tarkan Cavusoglu

Abstract:

In modern societies, the costs of public goods and services are shared through taxes paid by citizens. However, taxation has always been a frictional issue, as tax obligations are perceived to be a financial burden for taxpayers rather than being merit that fulfills the redistribution, regulation and stabilization functions of the welfare state. The tax compliance literature evolves into discussing why people still pay taxes in systems with low costs of legal enforcement. Related empirical and theoretical works show that a wide range of socially oriented behavioral factors can stimulate voluntary compliance and subversive effects as well. These behavioral motivations are argued to be driven by self-enforcing rules of informal institutions, either independently or through interactions with legal orders set by formal institutions. The main focus of this study is to investigate empirically whether institutional particularities have a significant role in explaining the cross-country differences in the tax noncompliance levels. A part of the controversy about the driving forces behind tax noncompliance may be attributed to the lack of empirical evidence. Thus, this study aims to fill this gap through regression estimates, which help to trace the link between institutional quality and noncompliance on a cross-country basis. Tax evasion estimates of Buehn and Schneider is used as the proxy measure for the tax noncompliance levels. Institutional quality is quantified by three different indicators (percentile ranks of Worldwide Governance Indicators, ratings of the International Country Risk Guide, and the country ratings of the Freedom in the World). Robust Least Squares and Threshold Regression estimates based on the sample of the Organization for Economic Co-operation and Development (OECD) countries imply that tax compliance increases with institutional quality. Moreover, a threshold-based asymmetry is detected in the effect of institutional quality on tax noncompliance. That is, the negative effects of tax burdens on compliance are found to be more pronounced in countries with institutional quality below a certain threshold. These findings are robust to all alternative indicators of institutional quality, supporting the significant interaction of societal values with the individual taxpayer decisions.

Keywords: institutional quality, OECD economies, tax compliance, tax evasion

Procedia PDF Downloads 103
29 European Countries Challenge’s in Value Added Tax

Authors: Fatbardha Kadiu, Nulifer Caliskan

Abstract:

The value added tax came as a necessity of substituting the old tax on sales. Based on the advantages of this new tax in our days it is used successfully in more than 140 countries around the world. The aim of the paper is to describe the nature of this tax with its advantages and disadvantages. Also it will describe the way how it functions in most of the European countries and the actual challenges of these countries on value added tax. It will be present the types of goods which are exempt from this tax, the reasons and the consequences of those exemptions. The paper will be based on secondary data taken from respective literature. An econometric model will be present in order to identify the dependence of value tax from other parameters. The analyzing most refers to the two main principles of harmonization and billing on the fiscal system and the ways how to restructures the system in order to minimize the fiscal evasion.

Keywords: value added tax, revenues, complexity, legal uncertainty

Procedia PDF Downloads 368
28 Triple Immunotherapy to Overcome Immune Evasion by Tumors in a Melanoma Mouse Model

Authors: Mary-Ann N. Jallad, Dalal F. Jaber, Alexander M. Abdelnoor

Abstract:

Introduction: Current evidence confirms that both innate and adaptive immune systems are capable of recognizing and abolishing malignant cells. The emergence of cancerous tumors in patients is, therefore, an indication that certain cancer cells can resist elimination by the immune system through a process known as “immune evasion”. In fact, cancer cells often exploit regulatory mechanisms to escape immunity. Such mechanisms normally exist to control the immune responses and prohibit exaggerated or autoimmune reactions. Recently, immunotherapies have shown promising yet limited results. Therefore this study investigates several immunotherapeutic combinations and devises a triple immunotherapy which harnesses the innate and acquired immune responses towards the annihilation of malignant cells through overcoming their ability of immune evasion, consequently hampering malignant progression and eliminating established tumors. The aims of the study are to rule out acute/chronic toxic effects of the proposed treatment combinations, to assess the effect of these combinations on tumor growth and survival rates, and to investigate potential mechanisms underlying the phenotypic results through analyzing serum levels of anti-tumor cytokines, angiogenic factors and tumor progression indicator, and the tumor-infiltrating immune-cells populations. Methodology: For toxicity analysis, cancer-free C57BL/6 mice are randomized into 9 groups: Group 1 untreated, group 2 treated with sterile saline (solvent of used treatments), group 3 treated with Monophosphoryl-lipid-A, group 4 with anti-CTLA4-antibodies, group 5 with 1-Methyl-Tryptophan (Indolamine-Dioxygenase-1 inhibitor), group 6 with both MPLA and anti-CTLA4-antibodies, group 7 with both MPLA and 1-MT, group 8 with both anti-CTLA4-antibodies and 1-MT, and group 9 with all three: MPLA, anti-CTLA4-antibodies and 1-MT. Mice are monitored throughout the treatment period and for three following months. At that point, histological sections from their main organs are assessed. For tumor progression and survival analysis, a murine melanoma model is generated by injecting analogous mice with B16F10 melanoma cells. These mice are segregated into the listed nine groups. Their tumor size and survival are monitored. For a depiction of underlying mechanisms, melanoma-bearing mice from each group are sacrificed at several time-points. Sera are tested to assess the levels of Interleukin-12 (IL-12), Vascular-Endothelial-Growth Factor (VEGF), and S100B. Furthermore, tumors are excised for analysis of infiltrated immune cell populations including T-cells, macrophages, natural killer cells and immune-regulatory cells. Results: Toxicity analysis shows that all treated groups present no signs of neither acute nor chronic toxicity. Their appearance and weights were comparable to those of control groups throughout the treatment period and for the following 3 months. Moreover, histological sections from their hearts, kidneys, lungs, and livers were normal. Work is ongoing for completion of the remaining study aims. Conclusion: Toxicity was the major concern for the success of the proposed comprehensive combinational therapy. Data generated so far ruled out any acute or chronic toxic effects. Consequently, ongoing work is quite promising and may significantly contribute to the development of more effective immunotherapeutic strategies for the treatment of cancer patients.

Keywords: cancer immunotherapy, check-point blockade, combination therapy, melanoma

Procedia PDF Downloads 89
27 Closing down the Loop Holes: How North Korea and Other Bad Actors Manipulate Global Trade in Their Favor

Authors: Leo Byrne, Neil Watts

Abstract:

In the complex and evolving landscape of global trade, maritime sanctions emerge as a critical tool wielded by the international community to curb illegal activities and alter the behavior of non-compliant states and entities. These sanctions, designed to restrict or prohibit trade by sea with sanctioned jurisdictions, entities, or individuals, face continuous challenges due to the sophisticated evasion tactics employed by countries like North Korea. As the Democratic People's Republic of Korea (DPRK) diverts significant resources to circumvent these measures, understanding the nuances of their methodologies becomes imperative for maintaining the integrity of global trade systems. The DPRK, one of the most sanctioned nations globally, has developed an intricate network to facilitate its trade in illicit goods, ensuring the flow of revenue from designated activities continues unabated. Given its geographic and economic conditions, North Korea predominantly relies on maritime routes, utilizing foreign ports to route its illicit trade. This reliance on the sea is exploited through various sophisticated methods, including the use of front companies, falsification of documentation, commingling of bulk cargos, and physical alterations to vessels. These tactics enable the DPRK to navigate through the gaps in regulatory frameworks and lax oversight, effectively undermining international sanctions regimes Maritime sanctions carry significant implications for global trade, imposing heightened risks in the maritime domain. The deceptive practices employed not only by the DPRK but also by other high-risk jurisdictions, necessitate a comprehensive understanding of UN targeted sanctions. For stakeholders in the maritime sector—including maritime authorities, vessel owners, shipping companies, flag registries, and financial institutions serving the shipping industry—awareness and compliance are paramount. Violations can lead to severe consequences, including reputational damage, sanctions, hefty fines, and even imprisonment. To mitigate risks associated with these deceptive practices, it is crucial for maritime sector stakeholders to employ rigorous due diligence and regulatory compliance screening measures. Effective sanctions compliance serves as a protective shield against legal, financial, and reputational risks, preventing exploitation by international bad actors. This requires not only a deep understanding of the sanctions landscape but also the capability to identify and manage risks through informed decision-making and proactive risk management practices. As the DPRK and other sanctioned entities continue to evolve their sanctions evasion tactics, the international community must enhance its collective efforts to demystify and counter these practices. By leveraging more stringent compliance measures, stakeholders can safeguard against the illicit use of the maritime domain, reinforcing the effectiveness of maritime sanctions as a tool for global security. This paper seeks to dissect North Korea's adaptive strategies in the face of maritime sanctions. By examining up-to-date, geographically, and temporally relevant case studies, it aims to shed light on the primary nodes through which Pyongyang evades sanctions and smuggles goods via third-party ports. The goal is to propose multi-level interaction strategies, ranging from governmental interventions to localized enforcement mechanisms, to counteract these evasion tactics.

Keywords: maritime, maritime sanctions, international sanctions, compliance, risk

Procedia PDF Downloads 20
26 Tax Morale Dimensions Analysis in Portugal and Spain

Authors: Cristina Sá, Carlos Gomes, António Martins

Abstract:

The reasons that explain different behaviors towards tax obligations in similar countries are not completely understood yet. The main purpose of this paper is to identify and compare the factors that influence tax morale levels in Portugal and Spain. We use data from European Values Study (EVS). Using a sample of 2,652 individuals, a factor analysis was used to extract the underlying dimensions of tax morale of Portuguese and Spanish taxpayers. Based on a factor analysis, the results of this paper show that sociological and behavioral factors, psychological factors and political factors are important for a good understanding of taxpayers’ behavior in Iberian Peninsula. This paper added value relies on the analyses of a wide range of variables and on the comparison between Portugal and Spain. Our conclusions provided insights that tax authorities and politicians can use to better focus their strategies and actions in order to increase compliance, reduce tax evasion, fight underground economy and increase country´s competitiveness.

Keywords: compliance, tax morale, Portugal, Spain

Procedia PDF Downloads 278
25 Self-denigration in Doctoral Defense Sessions: Scale Development and Validation

Authors: Alireza Jalilifar, Nadia Mayahi

Abstract:

The dissertation defense as a complicated conflict-prone context entails the adoption of elegant interactional strategies, one of which is self-denigration. This study aimed to develop and validate a self-denigration model that fits the context of doctoral defense sessions in applied linguistics. Two focus group discussions provided the basis for developing this conceptual model, which assumed 10 functions for self-denigration, namely good manners, modesty, affability, altruism, assertiveness, diffidence, coercive self-deprecation, evasion, diplomacy, and flamboyance. These functions were used to design a 40-item questionnaire on the attitudes of applied linguists concerning self-denigration in defense sessions. The confirmatory factor analysis of the questionnaire indicated the predictive ability of the measurement model. The findings of this study suggest that self-denigration in doctoral defense sessions is the social representation of the participants’ values, ideas and practices adopted as a negotiation strategy and a conflict management policy for the purpose of establishing harmony and maintaining resilience. This study has implications for doctoral students and academics and illuminates further research on self-denigration in other contexts.

Keywords: academic discourse, politeness, self-denigration, grounded theory, dissertation defense

Procedia PDF Downloads 106
24 Towards an Adversary-Aware ML-Based Detector of Spam on Twitter Hashtags

Authors: Niddal Imam, Vassilios G. Vassilakis

Abstract:

After analysing messages posted by health-related spam campaigns in Twitter Arabic hashtags, we found that these campaigns use unique hijacked accounts (we call them adversarial hijacked accounts) as adversarial examples to fool deployed ML-based spam detectors. Existing ML-based models build a behaviour profile for each user to detect hijacked accounts. This approach is not applicable for detecting spam in Twitter hashtags since they are computationally expensive. Hence, we propose an adversary-aware ML-based detector, which includes a newly designed feature (avg posts) to improve the detection of spam tweets posted by the adversarial hijacked accounts at a tweet-level in trending hashtags. The proposed detector was designed considering three key points: robustness, adaptability, and interpretability. The new feature leverages the account’s temporal patterns (i.e., account age and number of posts). It is faster to compute compared to features discussed in the literature and improves the accuracy of detecting the identified hijacked accounts by 73%.

Keywords: Twitter spam detection, adversarial examples, evasion attack, adversarial concept drift, account hijacking, trending hashtag

Procedia PDF Downloads 33
23 Debt Portfolios of the Poor: The Case of Street Vendors in Cali, Colombia

Authors: Lina Martinez, Juan David Rivera Acevedo, Isabella Franco

Abstract:

The informal economy plays a significant role in the job market in Colombia. Cali, the third largest city in the country, is characterized by a high percentage of socially and economically vulnerable population groups who take part in the urban informal economy, with street vending as their primary source of income. This paper studies the socio-economic dimensions of street vendors in Cali. In particular, it examines why they are unable to capitalize on their comparatively high earnings and are not likely to escape poverty even though they usually profit from government welfare and tax evasion due to the non-regulated character of informality. The analysis of an observational study and two surveys with 637 and 300 participants show that street vending is a cash-based day-to-day activity. Since most of the street vendors do not have access to formal banking systems, they depend on payday loans with incomparably high interest rates which absorb a large share of their income and maintain a continuous indebtedness. This is one of the main reasons why they are unable to improve their living conditions. However, the daily cash flow masks the high opportunity cost of loans and long-term deficits.

Keywords: Colombia, informal economy, payday loans, street vendors

Procedia PDF Downloads 287
22 The Strategy of Orbit Avoidance for Optical Remote Sensing Satellite

Authors: Dianxun Zheng, Wuxing Jing, Lin Hetong

Abstract:

Optical remote sensing satellite, always running on the Sun-synchronous orbit, equipped laser warning equipment to alert CCD camera from laser attack. There have three ways to protect the CCD camera, closing the camera cover satellite attitude maneuver and satellite orbit avoidance. In order to enhance the safety of optical remote sensing satellite in orbit, this paper explores the strategy of satellite avoidance. The avoidance strategy is expressed as the evasion of pre-determined target points in the orbital coordinates of virtual satellite. The so-called virtual satellite is a passive vehicle which superposes a satellite at the initial stage of avoidance. The target points share the consistent cycle time and the same semi-major axis with the virtual satellite, which ensures the properties of the Sun-synchronous orbit remain unchanged. Moreover, to further strengthen the avoidance capability of satellite, it can perform multi-object avoid maneuvers. On occasions of fulfilling the orbit tasks of the satellite, the orbit can be restored back to virtual satellite through orbit maneuvers. There into, the avoid maneuvers adopts pulse guidance. and the fuel consumption is also optimized. The avoidance strategy discussed in this article is applicable to avoidance for optical remote sensing satellite when encounter the laser hostile attacks.

Keywords: optical remote sensing satellite, always running on the sun-synchronous

Procedia PDF Downloads 370
21 Research on the Strategy of Orbital Avoidance for Optical Remote Sensing Satellite

Authors: Zheng DianXun, Cheng Bo, Lin Hetong

Abstract:

This paper focuses on the orbit avoidance strategies of optical remote sensing satellite. The optical remote sensing satellite, moving along the Sun-synchronous orbit, is equipped with laser warning equipment to alert CCD camera from laser attacks. There are three ways to protect the CCD camera: closing the camera cover, satellite attitude maneuver and satellite orbit avoidance. In order to enhance the safety of optical remote sensing satellite in orbit, this paper explores the strategy of satellite avoidance. The avoidance strategy is expressed as the evasion of pre-determined target points in the orbital coordinates of virtual satellite. The so-called virtual satellite is a passive vehicle which superposes the satellite at the initial stage of avoidance. The target points share the consistent cycle time and the same semi-major axis with the virtual satellite, which ensures the properties of the satellite’s Sun-synchronous orbit remain unchanged. Moreover, to further strengthen the avoidance capability of satellite, it can perform multi-target-points avoid maneuvers. On occasions of fulfilling the satellite orbit tasks, the orbit can be restored back to virtual satellite through orbit maneuvers. Thereinto, the avoid maneuvers adopts pulse guidance. And the fuel consumption is also optimized. The avoidance strategy discussed in this article is applicable to optical remote sensing satellite when it is encountered with hostile attack of space-based laser anti-satellite.

Keywords: optical remote sensing satellite, satellite avoidance, virtual satellite, avoid target-point, avoid maneuver

Procedia PDF Downloads 369
20 Development of High-Performance Conductive Polybenzoxazine/Graphite-Copper Nanoomposite for Electromagnetic Interference Shielding Applications

Authors: Noureddine Ramdani

Abstract:

In recent years, extensive attention has been given to the study of conductive nanocomposites due to their unique properties, which are dependent on their size and shape. The potential applications of these materials include electromagnetic interference shielding, energy storage, photovoltaics, and others. These outstanding properties have led to increased interest and research in this field. In this work, a conductive poly benzoxazine nanocomposite, PBZ/Gr-Cu, was synthesized through a compression molding technique to achieve a high-performance material suitable for electromagnetic interference (EMI) shielding applications. The microstructure of the nanocomposites was analyzed using scanning electron microscopy (SEM) and Fourier transform infrared spectroscopy (FTIR). The thermal stability, electrical conductivity, and EMI shielding properties of the nanocomposites were evaluated using thermogravimetric analysis, a four-point probe, and a VNA analyzer, respectively. The TGA results revealed that the thermal stability and electrical conductivity of the nanocomposites were significantly enhanced by the incorporation of Gr/Cu nanoparticles. The nanocomposites exhibited a low percolation threshold of about 3.5 wt.% and an increase in carrier concentration and mobility of the carriers with increasing hybrid nanofiller content, causing the composites to behave as n-type semiconductors. These nanocomposites also displayed a high dielectric constant and a high dissipation factor in the frequency range of 8-12 GHz, resulting in higher EMI shielding effectiveness (SE) of 25-44 dB. These characteristics make them promising candidates for lightweight EMI shielding materials in aerospace and radar evasion applications.

Keywords: polybenzoxazine matrix, conductive nanocomposites, electrical conductivity, EMI shielding

Procedia PDF Downloads 51
19 Economic and Financial Crime, Forensic Accounting and Sustainable Developments Goals (SDGs). Bibliometric Analysis

Authors: Monica Violeta Achim, Sorin Nicolae Borlea

Abstract:

This aim of this work is to stress the needs for enhancing the role of forensic accounting in fighting economic and financial crime, in the context of the new international regulation movements in this area enhanced by the International Federation of Accountants (IFAC). Corruption, money laundering, tax evasion and other frauds significant hamper the economic growth and human development and, ultimately, the UN Sustainable Development Goals. The present paper also stresses the role of good governance in fighting the frauds, in order to achieve the most suitable sustainable development of the society. In this view, we made a bibliometric systematic review on forensic accounting and its contribution towards fraud detection and prevention and theirs relationship with good governance and Sustainable Developments Goals (SDGs). In this view, two powerful bibliometric visual software tools, VosViewer and CiteSpace are used in order to analyze published papers identifies in Scopus and Web of Science databases over the time. Our findings reveal the main red flags identified in literature as used tools by forensic accounting, the evolution in time of the interest of the topic, the distribution in space among world countries and connectivity with patterns of a good governance. Visual designs and scientific maps are useful to show these findings, in a visual way. Our findings are useful for managers and policy makers to provide important avenues that may help in reaching the 2030 Agenda for Sustainable Development, adopted by all United Nations Member States in 2015, in the area of using forensic accounting in preventing frauds.

Keywords: forensic accounting, frauds, red flags, SDGs

Procedia PDF Downloads 84
18 Difference in Virulence Factor Genes Between Transient and Persistent Streptococcus Uberis Intramammary Infection in Dairy Cattle

Authors: Anyaphat Srithanasuwan, Noppason Pangprasit, Montira Intanon, Phongsakorn Chuammitri, Witaya Suriyasathaporn, Ynte H. Schukken

Abstract:

Streptococcus uberis is one of the most common mastitis-causing pathogens, with a wide range of intramammary infection (IMI) durations and pathogenicity. This study aimed to compare shared or unique virulence factor gene clusters distinguishing persistent and transient strains of S. uberis. A total of 139 S. uberis strains were isolated from three small-holder dairy herds with a high prevalence of S. uberis mastitis. The duration of IMI was used to categorize bacteria into two groups: transient and persistent strains with an IMI duration of less than 1 month and longer than 2 months, respectively. Six representative S. uberis strains, three from each group (transience and persistence) were selected for analysis. All transient strains exhibited multi-locus sequence types (MLST), indicating a highly diverse population of transient S. uberis. In contrast, MLST of persistent strains was available in an online database (pubMLST). Identification of virulence genes was performed using whole-genome sequencing (WGS) data. Differences in genomic size and number of virulent genes were found. For example, the BCA gene or alpha-c protein and the gene associated with capsule formation (hasAB), found in persistent strains, are important for attachment and invasion, as well as the evasion of the antimicrobial mechanisms and survival persistence, respectively. These findings suggest a genetic-level difference between the two strain types. Consequently, a comprehensive study of 139 S. uberis isolates will be conducted to perform an in-depth genetic assessment through WGS analysis on an Illumina platform.

Keywords: Streptococcus Uberis, mastitis, whole genome sequence, intramammary infection, persistent S. Uberis, transient s. Uberis

Procedia PDF Downloads 17
17 The Role of a Novel DEAD-Box Containing Protein in NLRP3 Inflammasome Activation

Authors: Yi-Hui Lai, Chih-Hsiang Yang, Li-Chung Hsu

Abstract:

The inflammasome is a protein complex that modulates caspase-1 activity, resulting in proteolytic cleavage of proinflammatory cytokines such as IL-1β and IL-18, into their bioactive forms. It has been shown that the inflammasomes play a crucial role in the clearance of pathogenic infection and tissue repair. However, dysregulated inflammasome activation contributes to a wide range of human diseases such as cancers and auto-inflammatory diseases. Yet, regulation of NLRP3 inflammasome activation remains largely unknown. We discovered a novel DEAD box protein, whose biological function has not been reported, not only negatively regulates NLRP3 inflammasome activation by interfering NLRP3 inflammasome assembly and cellular localization but also mitigate pyroptosis upon pathogen evasion. The DEAD-box protein is the first DEAD-box protein gets involved in modulation of the inflammasome activation. In our study, we found that caspase-1 activation and mature IL-1β production were largely enhanced upon LPS challenge in the DEAD box-containing protein- deleted THP-1 macrophages and bone marrow-derived macrophages (BMDMs). In addition, this DEAD box-containing protein migrates from the nucleus to the cytoplasm upon LPS stimulation, which is required for its inhibitory role in NLRP3 inflammasome activation. The DEAD box-containing protein specifically interacted with the LRR motif of NLRP3 via its DEAD domain. Furthermore, due to the crucial role of the NLRP3 LRR domain in the recruitment of NLRP3 to mitochondria and binding to its adaptor ASC, we found that the interaction of NLRP3 and ASC was downregulated in the presence of the DEAD box-containing protein. In addition to the mechanical study, we also found that this DEAD box protein protects host cells from inflammasome-triggered cell death in response to broad-ranging pathogens such as Candida albicans, Streptococcus pneumoniae, etc., involved in nosocomial infections and severe fever shock. Collectively, our results suggest that this novel DEAD box molecule might be a key therapeutic strategy for various infectious diseases.

Keywords: inflammasome, inflammation, innate immunity, pyroptosis

Procedia PDF Downloads 255
16 In-Depth Analysis on Sequence Evolution and Molecular Interaction of Influenza Receptors (Hemagglutinin and Neuraminidase)

Authors: Dong Tran, Thanh Dac Van, Ly Le

Abstract:

Hemagglutinin (HA) and Neuraminidase (NA) play an important role in host immune evasion across influenza virus evolution process. The correlation between HA and NA evolution in respect to epitopic evolution and drug interaction has yet to be investigated. In this study, combining of sequence to structure evolution and statistical analysis on epitopic/binding site specificity, we identified potential therapeutic features of HA and NA that show specific antibody binding site of HA and specific binding distribution within NA active site of current inhibitors. Our approach introduces the use of sequence variation and molecular interaction to provide an effective strategy in establishing experimental based distributed representations of protein-protein/ligand complexes. The most important advantage of our method is that it does not require complete dataset of complexes but rather directly inferring feature interaction from sequence variation and molecular interaction. Using correlated sequence analysis, we additionally identified co-evolved mutations associated with maintaining HA/NA structural and functional variability toward immunity and therapeutic treatment. Our investigation on the HA binding specificity revealed unique conserved stalk domain interacts with unique loop domain of universal antibodies (CR9114, CT149, CR8043, CR8020, F16v3, CR6261, F10). On the other hand, NA inhibitors (Oseltamivir, Zaninamivir, Laninamivir) showed specific conserved residue contribution and similar to that of NA substrate (sialic acid) which can be exploited for drug design. Our study provides an important insight into rational design and identification of novel therapeutics targeting universally recognized feature of influenza HA/NA.

Keywords: influenza virus, hemagglutinin (HA), neuraminidase (NA), sequence evolution

Procedia PDF Downloads 131
15 A Machine Learning-Based Model to Screen Antituberculosis Compound Targeted against LprG Lipoprotein of Mycobacterium tuberculosis

Authors: Syed Asif Hassan, Syed Atif Hassan

Abstract:

Multidrug-resistant Tuberculosis (MDR-TB) is an infection caused by the resistant strains of Mycobacterium tuberculosis that do not respond either to isoniazid or rifampicin, which are the most important anti-TB drugs. The increase in the occurrence of a drug-resistance strain of MTB calls for an intensive search of novel target-based therapeutics. In this context LprG (Rv1411c) a lipoprotein from MTB plays a pivotal role in the immune evasion of Mtb leading to survival and propagation of the bacterium within the host cell. Therefore, a machine learning method will be developed for generating a computational model that could predict for a potential anti LprG activity of the novel antituberculosis compound. The present study will utilize dataset from PubChem database maintained by National Center for Biotechnology Information (NCBI). The dataset involves compounds screened against MTB were categorized as active and inactive based upon PubChem activity score. PowerMV, a molecular descriptor generator, and visualization tool will be used to generate the 2D molecular descriptors for the actives and inactive compounds present in the dataset. The 2D molecular descriptors generated from PowerMV will be used as features. We feed these features into three different classifiers, namely, random forest, a deep neural network, and a recurring neural network, to build separate predictive models and choosing the best performing model based on the accuracy of predicting novel antituberculosis compound with an anti LprG activity. Additionally, the efficacy of predicted active compounds will be screened using SMARTS filter to choose molecule with drug-like features.

Keywords: antituberculosis drug, classifier, machine learning, molecular descriptors, prediction

Procedia PDF Downloads 354
14 A Review: Role of Chromium in Broiler

Authors: Naveed Zahra, Zahid Kamran, Shakeel Ahmad

Abstract:

Heat stress is one of the most important environmental stressors challenging poultry production worldwide. The detrimental effect of heat stress results in reduction in the productive performance of poultry with high incidences of mortality. Researchers have made efforts to prevent such damage to poultry production through dietary manipulation. Supplementation with Chromium (Cr) might have some positive effects on some aspect of blood parameters and broilers performance. Chromium (Cr) the element whose trivalent Cr (III) organic state is present in trace amounts in animal feed and water is found to be a key element in evading heat stress and thus cutting down the heavy expenditure on air conditioning in broiler sheds. Chromium, along with other essential minerals is lost due to increased excretion during heat stress and thus its inclusion in broiler diet is kind of mandatory in areas of hot climate. Chromium picolinate in broiler diet has shown a hike in growth rate including muscle gain with body fat reduction under environmental stress. Fat reduction is probably linked to the ability of chromium to increase the sensitivity of the insulin receptors on tissues and thus the uptake of sugar from blood increases which decreases the amount of glucose to be converted to amino acids and stored in adipose tissue as triglycerides. Organic chromium has also shown to increase lymphocyte proliferation rate and antioxidant levels. So, the immune competency, muscle gain and fat reduction along with evasion of heat stress are good enough signs that indicate the fruitful inclusion of dietary chromium for broiler. This promising element may bring the much needed break in the local poultry industry. The task is now to set the exact dose of the element in the diet that would be useful enough and still not toxic to broiler. In conclusion there is a growing body of evidence which suggest that chromium may be an essential trace element for livestock and poultry. The nutritional requirement for chromium may vary with different species and physiological state within a species.

Keywords: broiler, chromium, heat stress, performance

Procedia PDF Downloads 234
13 Exploring the Role of Immune-Modulators in Pathogen Recognition Receptor NOD2 Mediated Protection against Visceral Leishmaniasis

Authors: Junaid Jibran Jawed, Prasanta Saini, Subrata Majumdar

Abstract:

Background: Leishmania donovani infection causes severe host immune-suppression through the modulation of pathogen recognition receptors. Apart from TLRs (Toll Like Receptor), recent studies focus on the important contribution of NLR (NOD-Like Receptor) family member NOD1 and NOD2 as these receptors are capable of triggering host innate immunity. The aim of this study was to decipher the role of NOD1/NOD2 receptors during experimental visceral leishmaniasis (VL) and the important link between host failure and parasite evasion strategy. Method: The status of NOD1 and NOD2 receptors were analysed in uninfected and infected cells through western blotting and RT-PCR. The active contributions of these receptors in reducing parasite burden were confirmed by siRNA mediated silencing, and over-expression studies and the parasite numbers were calculated through microscopic examination of the Giemsa-stained slides. In-vivo studies were done by using non-toxic dose of Mw (Mycobacterium indicus pranii), Ara-LAM(Arabinoasylated lipoarabinomannan) along with MDP (Muramyl dipeptide) administration. Result: Leishmania donovani infection of the macrophages reduced the expression of NOD2 receptors whereas NOD1 remain unaffected. MDP, a NOD2-ligand, treatment during over-expression of NOD2, reduced the parasite burden effectively which was associated with increased pro-inflammatory cytokine generation and NO production. In experimental mouse model, Ara-LAM treatment increased the expression of NOD2 and in combination with MDP it showed active therapeutic potential against VL and found to be more effective than Mw which was already reported to be involved in NOD2 modulation. Conclusion: This work explores the essential contribution of NOD2 during experimental VL and mechanistic understanding of Ara-LAM + MDP combination therapy to work against this disease and highlighted NOD2 as an essential therapeutic target.

Keywords: Ara-LAM (Arabinoacylated Lipoarabinomannan), NOD2 (nucleotide binding oligomerization receptor 2), MDP (muramyl di peptide), visceral Leishmaniasis

Procedia PDF Downloads 139