Search results for: fake news
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 456

Search results for: fake news

126 Investigating Dynamic Transition Process of Issues Using Unstructured Text Analysis

Authors: Myungsu Lim, William Xiu Shun Wong, Yoonjin Hyun, Chen Liu, Seongi Choi, Dasom Kim, Namgyu Kim

Abstract:

The amount of real-time data generated through various mass media has been increasing rapidly. In this study, we had performed topic analysis by using the unstructured text data that is distributed through news article. As one of the most prevalent applications of topic analysis, the issue tracking technique investigates the changes of the social issues that identified through topic analysis. Currently, traditional issue tracking is conducted by identifying the main topics of documents that cover an entire period at the same time and analyzing the occurrence of each topic by the period of occurrence. However, this traditional issue tracking approach has limitation that it cannot discover dynamic mutation process of complex social issues. The purpose of this study is to overcome the limitations of the existing issue tracking method. We first derived core issues of each period, and then discover the dynamic mutation process of various issues. In this study, we further analyze the mutation process from the perspective of the issues categories, in order to figure out the pattern of issue flow, including the frequency and reliability of the pattern. In other words, this study allows us to understand the components of the complex issues by tracking the dynamic history of issues. This methodology can facilitate a clearer understanding of complex social phenomena by providing mutation history and related category information of the phenomena.

Keywords: Data Mining, Issue Tracking, Text Mining, topic Analysis, topic Detection, Trend Detection

Procedia PDF Downloads 371
125 Identification of Flooding Attack (Zero Day Attack) at Application Layer Using Mathematical Model and Detection Using Correlations

Authors: Hamsini Pulugurtha, V.S. Lakshmi Jagadmaba Paluri

Abstract:

Distributed denial of service attack (DDoS) is one altogether the top-rated cyber threats presently. It runs down the victim server resources like a system of measurement and buffer size by obstructing the server to supply resources to legitimate shoppers. Throughout this text, we tend to tend to propose a mathematical model of DDoS attack; we discuss its relevancy to the choices like inter-arrival time or rate of arrival of the assault customers accessing the server. We tend to tend to further analyze the attack model in context to the exhausting system of measurement and buffer size of the victim server. The projected technique uses an associate in nursing unattended learning technique, self-organizing map, to make the clusters of identical choices. Lastly, the abstract applies mathematical correlation and so the standard likelihood distribution on the clusters and analyses their behaviors to look at a DDoS attack. These systems not exclusively interconnect very little devices exchanging personal data, but to boot essential infrastructures news standing of nuclear facilities. Although this interconnection brings many edges and blessings, it to boot creates new vulnerabilities and threats which might be conversant in mount attacks. In such sophisticated interconnected systems, the power to look at attacks as early as accomplishable is of paramount importance.

Keywords: application attack, bandwidth, buffer correlation, DDoS distribution flooding intrusion layer, normal prevention probability size

Procedia PDF Downloads 186
124 Multilingualism as an Impetus to Nigerian Religious and Political Crises: the Way Forward

Authors: Kehinde, Taye Adetutu

Abstract:

The fact that Nigeria as a nation is faced by myriads of problems associated with religious crises and political insecurity is no news, the spoken statement and actions of most political giant were the major cause of this unrest. The 'unlearnt' youth within the regions has encompassed the situation. This scenario is further compounded by multilingual nature of the country as it is estimated that there exists amount 400 indigenous languages in Nigeria. It is an indisputable fact that english language which has assumed the status of an official language in Nigeria, given its status has a language of power and captivity by a few with no privilege to attend school. However, educating people in their indigenous language; crises can be averted through the proper orientation and mass literacy campaign, especially for the timid illiterate one, so as to live in unity, peace, tranquillity, and harmony as indivisible nation. In investigating the problem in this study with an emphasis on three major Nigerian language (Yoruba, Igbo and Hausa), participants observations and survey questionnaire were administered to about one hundred and twenty (120) respondents who were randomly selected throughout the three major ethnic groups in Nigeria. Findings from this study reveals that teaching and learning of cognitive words and information are more effective in ones mother tongue and helps in stimulating new ideas and changes. This paper was able to explore and critically examine the current state of affairs in Nigeria and proffer possible solutions to the prevailing situations by identifying how indigenous languages and linguistics can be used to ameliorate the present political and religious crisis for Nigeria, thus providing a proper recommendation to achieve meaningful stability and coexistence within a nation.

Keywords: multilingualism, political crisis, religious, Nigeria

Procedia PDF Downloads 404
123 Multimedia Technologies Utilisation as Predictors of Lecturers’ Teaching Effectiveness in Colleges of Education in South-West, Nigeria

Authors: Abel Olusegun Egunjobi, Olusegun Oyeleye Adesanya

Abstract:

Teaching effectiveness of lecturers in a tertiary institution in Nigeria is one of the determinants of the lecturer’s productivity. In this study, therefore, lecturers’ teaching effectiveness was examined vis-à-vis their multimedia technologies utilisation in Colleges of Education (CoE) in South-West, Nigeria. This is for the purpose of ascertaining the relationship and contribution of multimedia technologies utilisation to lecturers’ teaching effectiveness in Nigerian colleges of education. The descriptive survey research design was adopted in the study, while a multi-stage sampling procedure was used in the study. A stratified sampling technique was used to select colleges of education, and a simple random sampling method was employed to select lecturers from the selected colleges of education. A total of 862 lecturers (627 males and 235 females) were selected from the colleges of education used for the study. The instrument used was lecturers’ questionnaire on multimedia technologies utilisation and teaching effectiveness with a reliability coefficient of 0.85 at 0.05 level of significance. The data collected were analysed using descriptive statistics, multiple regression, and t-test. The findings showed that the level of multimedia technologies utilisation in colleges of education was low, whereas lecturers’ teaching effectiveness was high. Findings also revealed that the lecturers used multimedia technologies purposely for personal and professional developments, so also for up to date news on economic and political matters. Also, findings indicated that laptop, Ipad, CD-ROMs, and computer instructional software were the multimedia technologies frequently utilised by the lecturers. There was also a significant difference in the teaching effectiveness between lecturers in the Federal and State COE. The government should, therefore, make adequate provision for multimedia technologies in the COE in Nigeria for lecturers’ utilisation in their instructions so as to boost their students’ learning outcomes.

Keywords: colleges of education, lecturers’ teaching effectiveness, multimedia technologies utilisation, Southwest Nigeria

Procedia PDF Downloads 107
122 Determinants of Youth Engagement with Health Information on Social Media Platforms in United Arab Emirates

Authors: Niyi Awofeso, Yunes Gaber, Moyosola Bamidele

Abstract:

Since most social media platforms are accessible anytime and anywhere where Internet connections and smartphones are available, the invisibility of the reader raises questions about accuracy, appropriateness and comprehensibility of social media communication. Furthermore, the identity and motives of individuals and organizations who post articles on social media sites are not always transparent. In the health sector, through socially networked platforms constitute a common source of health-related information, given their purported wealth of information. Nevertheless, fake blogs and sponsored postings for marketing 'natural cures' pervade most commonly used social media platforms, thus complicating readers’ abilities to access and understand trustworthy health-related information. This purposive sampling study of 120 participants aged 18-35 year in UAE was conducted between September and December 2017, and explored commonly used social media platforms, frequency of use of social media for accessing health related information, and approaches for assessing the trustworthiness of health information on social media platforms. Results indicate that WhatsApp (95%), Instagram (87%) and Youtube (82%) were the most commonly used social media platforms among respondents. Majority of respondents (81%) indicated that they regularly access social media to get health-associated information. More than half of respondents (55%) with non-chronic health status relied on unsolicited messages to obtain health-related information. Doctors’ health blogs (21%) and social media sites of international healthcare organizations (20%) constitute the most trusted source of health information among respondents, with UAE government health agencies’ social media accounts trusted by 15% of respondents. Cardiovascular diseases, diabetes, and hypertension were the most commonly searched topics on social media (29%), followed by nutrition (20%) and skin care (16%). Majority of respondents (41%) rely on reliability of hits on Google search engines, 22% check for health information only from 'reliable' social media sites, while 8% utilize 'logic' to ascertain reliability of health information. As social media has rapidly become an integral part of the health landscape, it is important that health care policy makers, healthcare providers and social media companies collaborate to promote the positive aspects of social media for young people, whilst mitigating the potential negatives. Utilizing popular social media platforms for posting reader-friendly health information will achieve high coverage. Improving youth digital literacy will facilitate easier access to trustworthy information on the internet.

Keywords: social media, United Arab Emirates, youth engagement, digital literacy

Procedia PDF Downloads 89
121 Basics for Corruption Reduction and Fraud Prevention in Industrial/Humanitarian Organizations through Supplier Management in Supply Chain Systems

Authors: Ibrahim Burki

Abstract:

Unfortunately, all organizations (Industrial and Humanitarian/ Non-governmental organizations) are prone to fraud and corruption in their supply chain management routines. The reputational and financial fallout can be disastrous. With the growing number of companies using suppliers based in the local market has certainly increased the threat of fraud as well as corruption. There are various potential threats like, poor or non-existent record keeping, purchasing of lower quality goods at higher price, excessive entertainment of staff by suppliers, deviations in communications between procurement staff and suppliers, such as calls or text messaging to mobile phones, staff demanding extended periods of notice before they allow an audit to take place, inexperienced buyers and more. But despite all the above-mentioned threats, this research paper emphasize upon the effectiveness of well-maintained vendor/s records and sorting/filtration of vendor/s to cut down the possible threats of corruption and fraud. This exercise is applied in a humanitarian organization of Pakistan but it is applicable to whole South Asia region due to the similarity of culture and contexts. In that firm, there were more than 550 (five hundred and fifty) registered vendors. As during the disasters or emergency phases requirements are met on urgent basis thus, providing golden opportunities for the fake companies or for the brother/sister companies of the already registered companies to be involved in the tendering process without declaration or even under some different (new) company’s name. Therefore, a list of required documents (along with checklist) was developed and sent to all of the vendor(s) in the current database and based upon the receipt of the requested documents vendors were sorted out. Furthermore, these vendors were divided into active (meeting the entire set criterion) and non-active groups. This initial filtration stage allowed the firm to continue its work without a complete shutdown that is only vendors falling in the active group shall be allowed to participate in the tenders by the time whole process is completed. Likewise only those companies or firms meeting the set criterion (active category) shall be allowed to get registered in the future along with a dedicated filing system (soft and hard shall be maintained), and all of the companies/firms in the active group shall be physically verified (visited) by the Committee comprising of senior members of at least Finance department, Supply Chain (other than procurement) and Security department.

Keywords: corruption reduction, fraud prevention, supplier management, industrial/humanitarian organizations

Procedia PDF Downloads 511
120 Uncertainties and Resilience: A Study of Pandemic Impact on the Pastoral-Nomadic Communities in India

Authors: Arati S. Kade, Iftikhar Hussain, Somnath Dadas

Abstract:

The paper studies resilience and uncertainties among nomadic-pastoral communities in India during large events such as pandemics and attempts to understand that with changing times and increased uncertainties, how nomadic communities historically showed their resilience. A review of the literature was performed concerning nomadism and development relations and conflicts by focusing on structural violence on nomadic communities from the caste class and patriarchy as a framework along with the role of the state. Philosophical views on the anti-nomad bias of political theories by Erik Ringmar, along with the decolonial approach by Linda Smith and debrahmanization by Braj Ranjan Mani were used to analyze criminalization of nomads. Data were collected using in-depth telephonic interviews and news reports published during the COVID-19 lockdown in India. Focusing on historical context of current crises, the paper leads to the discussion on how nomadic communities negotiate with the sedentary society during the COVID-19 pandemic. Findings of the current paper approve the hypotheses that the COVID-19 pandemic followed by lockdown deeply impacted the pastoral production system, building on the continued cycle of marginalization by the state and caste society in India, while traditional knowledge stood the test of time. Be it developmental states or pandemics, the nomadic communities have shown their resilience in a number of ways, such as keeping distance from sedentary society, usage of traditional medicine, and relying on traditional leadership.

Keywords: COVID-19, criminalization, India, nomadism, pandemic, pastoralism, resilience, traditional knowledge

Procedia PDF Downloads 59
119 An Exploration of the Place of Buddhism in the Tham Luang Cave Rescue and Its Aftermath

Authors: Hamish de Nett

Abstract:

On 23rd June 2018, twelve young footballers from the Wild Boar Academy and their coach went to explore the Tham Luang cave in the Doi Nang Non mountain range in Chiang Rai Province, Northern Thailand. Whilst they were inside the cave, monsoon rains hit, and the complex became partially flooded. In the following days, Thai Navy SEALs and an international team of expert divers assembled at the cave complex in order to rescue the boys. Although it was only marginally reported in the Western press, Buddhism and ritual activities played a major role in the rescue and its aftermath. This paper utilises numerous news articles and books written by reporters who covered the cave rescue to uncover what the place of Buddhism was in the Tham Luang cave rescue. This paper initially sets out the development of Thai Buddhism and the Thai nation state, paying particular note to the tension in Thai Buddhism between Buddhism as it is popularly practised and normative, state-favoured Buddhism. Secondly, this paper demonstrates that, during the Tham Luang cave rescue, Buddhism helped people cope with the disaster, provided an explanation for its occurrence, and allowed bystanders some efficacy in the process. Thirdly, this paper discusses how Buddhism helped people to give thanks after the rescue, achieve reconciliation, and gain closure. Finally, this paper analyses how the government and the political sphere utilised Buddhism during the rescue. The conclusion reached is that the Buddhism practiced during the Tham Luang cave rescue and its aftermath is representative of the wider tension between popular Buddhism and normative state-favoured Buddhism that is currently present within Thai Buddhism and has been for centuries.

Keywords: cave rescue, contemporary Buddhism, lived religion, Thai Buddhism, Tham Luang cave rescue

Procedia PDF Downloads 90
118 Two-Sided Information Dissemination in Takeovers: Disclosure and Media

Authors: Eda Orhun

Abstract:

Purpose: This paper analyzes a target firm’s decision to voluntarily disclose information during a takeover event and the effect of such disclosures on the outcome of the takeover. Such voluntary disclosures especially in the form of earnings forecasts made around takeover events may affect shareholders’ decisions about the target firm’s value and in return takeover result. This study aims to shed light on this question. Design/methodology/approach: The paper tries to understand the role of voluntary disclosures by target firms during a takeover event in the likelihood of takeover success both theoretically and empirically. A game-theoretical model is set up to analyze the voluntary disclosure decision of a target firm to inform the shareholders about its real worth. The empirical implication of model is tested by employing binary outcome models where the disclosure variable is obtained by identifying the target firms in the sample that provide positive news by issuing increasing management earnings forecasts. Findings: The model predicts that a voluntary disclosure of positive information by the target decreases the likelihood that the takeover succeeds. The empirical analysis confirms this prediction by showing that positive earnings forecasts by target firms during takeover events increase the probability of takeover failure. Overall, it is shown that information dissemination through voluntary disclosures by target firms is an important factor affecting takeover outcomes. Originality/Value: This study is the first to the author's knowledge that studies the impact of voluntary disclosures by the target firm during a takeover event on the likelihood of takeover success. The results contribute to information economics, corporate finance and M&As literatures.

Keywords: takeovers, target firm, voluntary disclosures, earnings forecasts, takeover success

Procedia PDF Downloads 288
117 Determining the Information Technologies Usage and Learning Preferences of Construction

Authors: Naci Büyükkaracığan, Yıldırım Akyol

Abstract:

Information technology is called the technology which provides transmission of information elsewhere regardless of time, location, distance. Today, information technology is providing the occurrence of ground breaking changes in all areas of our daily lives. Information can be reached quickly to millions of people with help of information technology. In this Study, effects of information technology on students for educations and their learning preferences were demonstrated with using data obtained from questionnaires administered to students of 2015-2016 academic year at Selcuk University Kadınhanı Faik İçil Vocational School Construction Department. The data was obtained by questionnaire consisting of 30 questions that was prepared by the researchers. SPSS 21.00 package programme was used for statistical analysis of data. Chi-square tests, Mann-Whitney U test, Kruskal-Wallis and Kolmogorov-Smirnov tests were used in the data analysis for Descriptiving statistics. In a study conducted with the participation of 61 students, 93.4% of students' reputation of their own information communication device (computer, smart phone, etc.) That have been shown to be at the same rate and to the internet. These are just a computer of itself, then 45.90% of the students. The main reasons for the students' use of the Internet, social networking sites are 85.24%, 13.11% following the news of the site, as seen. All student assignments in information technology, have stated that they use in the preparation of the project. When students acquire scientific knowledge in the profession regarding their preferred sources evaluated were seen exactly when their preferred internet. Male students showed that daily use of information technology while compared to female students was statistically significantly less. Construction Package program where students are eager to learn about the reputation of 72.13% and 91.80% identified in the well which they agreed that an indispensable element in the professional advancement of information technology.

Keywords: information technologies, computer, construction, internet, learning systems

Procedia PDF Downloads 264
116 Questioning the Sustainability in Development: The Resilience of Local Variety of Rice in the Changing Dayak Community of Central Kalimantan, Indonesia

Authors: Semiarto Aji Purwanto, Sutji Shinto

Abstract:

Over a quarter century, the idea of sustainable development has become a global discussion. In Indonesia, more than five decades since the development of the country took priority over any other matter, a discussion on the need of development is still an intriguing. Far from the enthusiasm of development programs run by the Indonesian government since 1967, the Dayak community in the interior of Kalimantan tropical forest was significantly abandoned from the changes. There were not many programs for the interior because the focus of development mostly was in Java island. Consequently, the Dayak live their life as shifting cultivator that has been practiced for centuries. Our ethnographic observation conducted in April-July 2016, found that today, they still maintain the knowledge and keeping the existence of local variety of rice. While in Java, these varieties have been replaced by more-productive-and-resistant-to-pest varieties, the Dayak still maintain more than 60s varieties. From the biodiversity’s perspective, it is a delightful news; while from the cultural perspective, the persistence of their custom regarding to the practice of traditional cultivation is fascinating as well. The local knowledge of agriculture is well conserved and practice daily. It is revealed that the resilience of those rice varieties is related to the local social structure since the distribution of each variety usually limited to the particular clans in the community. While experiencing the lack of programs for village development, the community has maintained the local leadership and its government structure at the village level. The paper will explore the effect of how a neglected area, which was disregarded by development program, sustains their culture and biodiversity. We would like to discuss the concept of sustainability whether it needed for the development programs, for the changes into a modern civilisation, or for the sake of the local to survive.

Keywords: sustainable development, local knowledge, rice, resilience, Kalimantan, Indonesia

Procedia PDF Downloads 256
115 Facilitating Conditions Mediating SME’s Intention to Use Social Media for Knowledge Sharing

Authors: Stevens Phaphadi Mamorobela

Abstract:

The Covid-19 pandemic has accelerated the use of social media in SMEs to stay abreast with information about the latest news and developments and to predict the future world of business. The national shutdown regulations for curbing the spread of the Covid-19 virus resulted in SMEs having to distribute large volumes of information through social media platforms to collaborate and conduct business remotely. How much of the information shared on social media is used by SMEs as significant knowledge for economic rent is yet to be known. This study aims to investigate the facilitating conditions that enable SMEs’ intention to use social media as a knowledge-sharing platform to create economic rent and to cope with the Covid-19 challenges. A qualitative research approach was applied where semi-structured interviews were conducted with 13 SME owners located in the Gauteng province in South Africa to identify and explain the facilitating conditions of SMEs towards their intention to use social media as a knowledge-sharing tool in the Covid-19 era. The study discovered that the national lockdown regulations towards curbing the spread of the Covid-19 pandemic had compelled SMEs to adopt digital technologies that enabled them to quickly transform their business processes to cope with the challenges of the pandemic. The facilitating conditions, like access to high bandwidth internet coverage in the Gauteng region, enable SMEs to have strong intentions to use social media to distribute content and to reach out to their target market. However, the content is shared informally using diverse social media platforms without any guidelines for transforming content into rent-yielding knowledge.

Keywords: facilitating conditions, knowledge sharing, social media, intention to use, SME

Procedia PDF Downloads 62
114 Automated Fact-Checking by Incorporating Contextual Knowledge and Multi-Faceted Search

Authors: Wenbo Wang, Yi-Fang Brook Wu

Abstract:

The spread of misinformation and disinformation has become a major concern, particularly with the rise of social media as a primary source of information for many people. As a means to address this phenomenon, automated fact-checking has emerged as a safeguard against the spread of misinformation and disinformation. Existing fact-checking approaches aim to determine whether a news claim is true or false, and they have achieved decent veracity prediction accuracy. However, the state-of-the-art methods rely on manually verified external information to assist the checking model in making judgments, which requires significant human resources. This study introduces a framework, SAC, which focuses on 1) augmenting the representation of a claim by incorporating additional context using general-purpose, comprehensive, and authoritative data; 2) developing a search function to automatically select relevant, new, and credible references; 3) focusing on the important parts of the representations of a claim and its reference that are most relevant to the fact-checking task. The experimental results demonstrate that 1) Augmenting the representations of claims and references through the use of a knowledge base, combined with the multi-head attention technique, contributes to improved performance of fact-checking. 2) SAC with auto-selected references outperforms existing fact-checking approaches with manual selected references. Future directions of this study include I) exploring knowledge graphs in Wikidata to dynamically augment the representations of claims and references without introducing too much noise, II) exploring semantic relations in claims and references to further enhance fact-checking.

Keywords: fact checking, claim verification, deep learning, natural language processing

Procedia PDF Downloads 26
113 Use of Social Media in PR: A Change of Trend

Authors: Tang Mui Joo, Chan Eang Teng

Abstract:

The use of social media has become more defined. It has been widely used for the purpose of business. More marketers are now using social media as tools to enhance their businesses. Whereas on the other hand, there are more and more people spending their time through mobile apps to be engaged in the social media sites like YouTube, Facebook, Twitter and others. Social media has even become common in Public Relations (PR). It has become number one platform for creating and sharing content. In view to this, social media has changed the rules in PR where it brings new challenges and opportunities to the profession. Although corporate websites, chat-rooms, email customer response facilities and electronic news release distribution are now viewed as standard aspects of PR practice, many PR practitioners are still struggling with the impact of new media though the implementation of social media is potentially reducing the cost of communication. It is to the point that PR practitioners are not fully embracing new media, they are ill-equipped to do so and they have a fear of the technology. Somehow that social media has become a new style of communication that is characterized by conversation and community. It has become a platform that allows individuals to interact with one another and build relationship among each other. Therefore, in the use of business world, consumers are able to interact with those companies that have joined any social media. Based on their experiences with social networking site interactions, they are also exposed to personal interaction while communicating. This paper is to study the impact of social media to PR. This paper discovers the potential changes of PR practices in a developing country like Malaysia. Eventually the study reflects on how PR practitioners are actually using social media in the country. This paper is based on two theories in its development of this research foundation. Media Ecology Theory is to support the impact and changes to PR. Social Penetration Theory is to reflect on how the use of social media is among PRs. This research is using survey with PR practitioners in its data collection. The results have shown that PR professionals value social media more than they actually use it and the way of organizations communicate had been changed due to the transformation of social media.

Keywords: new media, social media, PR, change of trend, communication, digital culture

Procedia PDF Downloads 281
112 The Image of Victim and Criminal in Love Crimes on Social Media in Egypt: Facebook Discourse Analysis

Authors: Sherehan Hamdalla

Abstract:

Egypt has experienced a series of terrifying love crimes in the last few months. This ‘trend’ of love crimes started with a young man caught on video slaughtering his ex-girlfriend in the street in the city of El Mansoura. The crime shocked all Egyptian citizens at all levels; unfortunately, not less than three similar crimes took place in other different Egyptian cities with the same killing trigger. The characteristics and easy access and reach of social media consider the reason why it is one of the most crucial online communication channels; users utilize social media platforms for sharing and exchanging ideas, news, and many other activities; they can freely share posts that reflect their mindset or personal views regarding any issues, these posts are going viral in all social media account by reposting or numbers of shares for these posts to support the content included, or even to attack. The repetition of sharing certain posts could mobilize other supporters with the same point of view, especially when that crowd’s online participation is confronting a public opinion case’s consequences. The death of that young woman was followed by similar crimes in other cities, such as El Sharkia and Port Said. These love crimes provoked a massive wave of contention among all social classes in Egypt. Strangely, some were supporting the criminal and defending his side for several reasons, which the study will uncover. Facebook, the most popular social media platform for Egyptians, reflects the debate between supporters of the victim and supporters of the criminal. Facebook pages were created specifically to disseminate certain viewpoints online, for example, asking for the maximum penalty to be given to criminals. These pages aimed to mobilize the maximum number of supporters and to affect the outcome of the trials.

Keywords: love crimes, victim, criminal, social media

Procedia PDF Downloads 43
111 Relationships between Chinese Talented Educated Women

Authors: Jianghe Niu, Zhu Xiao Di

Abstract:

This research uses a qualitative case study of the literature review approach to explore and analyze the relationship between three pairs of famous and talented women in China and uncovers certain regularities. From all kinds of available Chinese materials, such as biographies, memoirs, and news reports, both in papers and from the internet, we carefully selected the following 3 pairs of 6 Chinese women, whose relationships went through upheavals from friendship to jealousy and hostility, and we analyzed many factors contributing to this kind of relationship. (1) Hong Huang and Su Mang, both are leaders in the contemporary Chinese fashion industry as editors-in-chief of major fashion magazines. (2) Lin Huiyin and Xie Bingxin, both are phenomenally successful women in the field of literature and/or architecture throughout most of the 20th century. They are also quite similar in terms of age, family background, professional achievements, and celebrity status, but the former has multiple men's pursuit and admiration, while the latter has fewer. (3) Zhang Ailing and Su Qing, their achievements in the field of literature are remarkably similar, as top two female authors in metropolitan Shanghai during 1940s. They once admired each other's talents very much. Zhang’s husband used to have a relationship with Su Qing, and it was through Su Qing that he met Zhang Ailing. Major Findings: (1) Across the three pairs of case studies, it is observed that the more they are similar to each other in age, family background, education level, career positions, and social statues, the more they are likely to be in discord, jealousy, and hostility. (2) In the relationship between Chinese women, especially between talented, educated women, if there are men involved and one is more adored and favored by men than the other, such as in the 2nd and third pairs, the resulting jealousy deepens the negative relationship between them. (3) The relationship between talented and successful Chinese women, as shown in the third example, where a man was introduced by a woman to her close female friend, and then the man fell in love with her and married her, would undoubtedly deteriorate until jealousy, hatred, and hostility reached climax.

Keywords: relationship, Chinese, women, men

Procedia PDF Downloads 52
110 Air Pollution: The Journey from Single Particle Characterization to in vitro Fate

Authors: S. Potgieter-Vermaak, N. Bain, A. Brown, K. Shaw

Abstract:

It is well-known from public news media that air pollution is a health hazard and is responsible for early deaths. The quantification of the relationship between air quality and health is a probing question not easily answered. It is known that airborne particulate matter (APM) <2.5µm deposits in the tracheal and alveoli zones and our research probes the possibility of quantifying pulmonary injury by linking reactive oxygen species (ROS) in these particles to DNA damage. Currently, APM mass concentration is linked to early deaths and limited studies probe the influence of other properties on human health. To predict the full extent and type of impact, particles need to be characterised for chemical composition and structure. APMs are routinely analysed for their bulk composition, but of late analysis on a micro level probing single particle character, using micro-analytical techniques, are considered. The latter, single particle analysis (SPA), permits one to obtain detailed information on chemical character from nano- to micron-sized particles. This paper aims to provide a snapshot of studies using data obtained from chemical characterisation and its link with in-vitro studies to inform on personal health risks. For this purpose, two studies will be compared, namely, the bioaccessibility of the inhalable fraction of urban road dust versus total suspended solids (TSP) collected in the same urban environment. The significant influence of metals such as Cu and Fe in TSP on DNA damage is illustrated. The speciation of Hg (determined by SPA) in different urban environments proved to dictate its bioaccessibility in artificial lung fluids rather than its concentration.

Keywords: air pollution, human health, in-vitro studies, particulate matter

Procedia PDF Downloads 199
109 Kou Jump Diffusion Model: An Application to the SP 500; Nasdaq 100 and Russell 2000 Index Options

Authors: Wajih Abbassi, Zouhaier Ben Khelifa

Abstract:

The present research points towards the empirical validation of three options valuation models, the ad-hoc Black-Scholes model as proposed by Berkowitz (2001), the constant elasticity of variance model of Cox and Ross (1976) and the Kou jump-diffusion model (2002). Our empirical analysis has been conducted on a sample of 26,974 options written on three indexes, the S&P 500, Nasdaq 100 and the Russell 2000 that were negotiated during the year 2007 just before the sub-prime crisis. We start by presenting the theoretical foundations of the models of interest. Then we use the technique of trust-region-reflective algorithm to estimate the structural parameters of these models from cross-section of option prices. The empirical analysis shows the superiority of the Kou jump-diffusion model. This superiority arises from the ability of this model to portray the behavior of market participants and to be closest to the true distribution that characterizes the evolution of these indices. Indeed the double-exponential distribution covers three interesting properties that are: the leptokurtic feature, the memory less property and the psychological aspect of market participants. Numerous empirical studies have shown that markets tend to have both overreaction and under reaction over good and bad news respectively. Despite of these advantages there are not many empirical studies based on this model partly because probability distribution and option valuation formula are rather complicated. This paper is the first to have used the technique of nonlinear curve-fitting through the trust-region-reflective algorithm and cross-section options to estimate the structural parameters of the Kou jump-diffusion model.

Keywords: jump-diffusion process, Kou model, Leptokurtic feature, trust-region-reflective algorithm, US index options

Procedia PDF Downloads 400
108 Screening for Internet Addiction among Medical Students in a Saudi Community

Authors: Nawaf A. Alqahtani, Ali M. Alqahtani, Khalid A. Alqahtani, Huda S. Abdullfattah, Ebtehal A. Alessa, Khalid S. Al Gelban, Ossama A. Mostafa

Abstract:

Background: The internet is an exciting medium that is becoming an essential part of everyday life. Although the internet is fully observed in Saudi Arabia, young people may be vulnerable to problematic internet use, possibly leading to addiction. Aim of study: To explore the magnitude of internet addiction (IA) among medical students associated risk factors and its impact on students' academic achievement. Subjects and Methods: A cross sectional study was conducted in 2014 on 571 medical students (293 males and 278 females) at the College of Medicine, King Khalid University, Abha, Saudi Arabia. Data Collection was done through using the Arabic version of the Compulsive Internet Use Scale and a checklist of demographic characteristics. Results: Age of participants ranged from 19 to 26 years (Mean+SD: 21.9+1.5 years). Internet access was available to 97.4% of students at home and to 80.2% of students at their mobile phones. The most frequently accessed websites by medical students were the social media (90.7%), scientific website (50.4%) and the news websites (31.3%). IA was mild in 47.8% of medical students while 5.8% had moderate IA. None of the students had severe IA. Prevalence of IA was significantly higher among female medical students (p=0.002), availability of internet at home (p=0.022), and availability of internet at the students' mobile phone (p=0.041). The mean General Point Average (GPA) was highest among students with mild IA (4.0+0.6), compared with 3.6+0.6 among those with moderate addiction, and 3.9+0.6 among those who did not show IA. Differences in mean GPA according to grade of IA were statistically significant ((P=0.001). Conclusions: Prevalence of IA is high among medical students in Saudi Arabia. Risk factors for IA include female gender, availability of internet at home or at the mobile phone. IA has a significant impact on students' GPA. Periodic screening of medical students for IA and raising their awareness toward the possible risk of IA are recommended.

Keywords: internet addiction, medical students, risk factors, Saudi Arabia

Procedia PDF Downloads 482
107 Sick Minds and Social Media: Treacherous Trends in Online Stalking, Aggression, and Murder

Authors: Amanda Maitland

Abstract:

This preliminary study has examined ways in which social media may help cause stalker murder by individuals with personality disorders and a strong sense of sexual propriety. A public display on social media by the intended victim was felt to be a trigger that instigated interpersonal violence. To identify behavioural paradigms, case studies of intimate partner murders were explored using news media sources and documentaries. In all of the case studies, social media interaction and social media postings occurred shortly before the murder. The evidence suggested a preponderance of correlations between the social media postings, stalking behaviours, personality disorders, and the murder of an intimate partner. In addition to this, a profile for of Facebook/social media murder was gleaned from the paradigms of behavior found in the case studies. The evidence showed a complex relationship between severe violence, stalking, borderline personality, and intimate partner violence was identified through the study. The struggle clients have in dealing with the: public, ambiguous and unrelenting nature of social media postings was also observed. The murderers anguish and rage appeared to be further intensified by attitudes of sexual propriety and entitlement. These attitudes were evident in all the case studies. The study concluded with further research on how the public can protect themselves from entering situations where social media postings might trigger a violent response. Further to this, psychological approaches were identified that might support client’s with personality disorders to cope with perceived provocative and distressing data on the internet. Thus, the findings of this study will be of interest to: therapists, psychologists, nurses, criminologists and social workers.

Keywords: social media, borderline personality, murder, cyberstalking, intimate partner violence, sexual propriety, Facebook

Procedia PDF Downloads 211
106 The Capabilities of New Communication Devices in Development of Informing: Case Study Mobile Functions in Iran

Authors: Mohsen Shakerinejad

Abstract:

Due to the growing momentum of technology, the present age is called age of communication and information. And With Astounding progress of Communication and information tools, current world Is likened to the "global village". That a message can be sent from one point to another point of the world in a Time scale Less than a minute. However, one of the new sociologists -Alain Touraine- in describing the destructive effects of new changes arising from the development of information appliances refers to the "new fields for undemocratic social control And the incidence of acute and unrest social and political tensions", Yet, in this era That With the advancement of the industry, the life of people has been industrial too, quickly and accurately Data Transfer, Causes Blowing new life in the Body of Society And according to the features of each society and the progress of science and technology, Various tools should be used. One of these communication tools is Mobile. Cellular phone As Communication and telecommunication revolution in recent years, Has had a great influence on the individual and collective life of societies. This powerful communication tool Have had an Undeniable effect, On all aspects of life, including social, economic, cultural, scientific, etc. so that Ignoring It in Design, Implementation and enforcement of any system is not wise. Nowadays knowledge and information are one of the most important aspects of human life. Therefore, in this article, it has been tried to introduce mobile potentials in receive and transmit News and Information. As it follows, among the numerous capabilities of current mobile phones features such as sending text, photography, sound recording, filming, and Internet connectivity could indicate the potential of this medium of communication in the process of sending and receiving information. So that nowadays, mobile journalism as an important component of citizen journalism Has a unique role in information dissemination.

Keywords: mobile, informing, receiving information, mobile journalism, citizen journalism

Procedia PDF Downloads 364
105 When Your Change The Business Model ~ You Change The World

Authors: H. E. Amb. Terry Earthwind Nichols

Abstract:

Over the years Ambassador Nichols observed that successful companies all have one thing in common - belief in people. His observations of people in many companies, industries, and countries have also concluded one thing - groups of achievers far exceed the expectations and timelines of their superiors. His experience with achieving this has brought forth a model for the 21st century that will not only exceed expectations of companies, but it will also set visions for the future of business globally. It is time for real discussion around the future of work and the business model that will set the example for the world. Methodologies: In-person observations over 40 years – Ambassador Nichols present during the observations. Audio-visual observations – TV, Cinema, social media (YouTube, etc.), various news outlet Reading the autobiography of some of successful leaders over the last 75 years that lead their companies from a distinct perspective your people are your commodity. Major findings: People who believe in the leader’s vision for the company so much so that they remain excited about the future of the company and want to do anything in their power to ethically achieve that vision. People who are achieving regularly in groups, division, companies, etcetera: Live more healthfully lowering both sick time off and on-the-job accidents. Cannot wait to physically get to work as much as they can to feed off the high energy present in these companies. They are fully respected and supported resulting in near zero attrition. Simply put – they do not “Burn Out”. Conclusion: To the author’s best knowledge, 20th century practices in business are no longer valid and people are not going to work in those environments any longer. The average worker in the post-covid world is better educated than 50 years ago and most importantly, they have real-time information about any subject and can stream injustices as they happen. The Consortium Model is just the model for the evolution of both humankind and business in the 21st century.

Keywords: business model, future of work, people, paradigm shift, business management

Procedia PDF Downloads 44
104 Exploring the Role of Media Activity Theory as a Conceptual Basis for Advancing Journalism Education: A Comprehensive Analysis of Its Impact on News Production and Consumption in the Digital Age

Authors: Shohnaza Uzokova Beknazarovna

Abstract:

This research study provides a comprehensive exploration of the Theory of Media Activity and its relevance as a conceptual framework for journalism education. The author offers a thorough review of existing literature on media activity theory, emphasizing its potential to enhance the understanding of the evolving media landscape and its implications for journalism practice. Through a combination of theoretical analysis and practical examples, the paper elucidates the ways in which the Theory of Media Activity can inform and enrich journalism education, particularly in relation to the interactive and participatory nature of contemporary media. The author presents a compelling argument for the integration of media activity theory into journalism curricula, emphasizing its capacity to equip students with a nuanced understanding of the reciprocal relationship between media producers and consumers. Furthermore, the paper discusses the implications of technological advancements on media production and consumption, highlighting the need for journalism educators to prepare students to navigate and contribute to the future of journalism in a rapidly changing media environment. Overall, this research paper offers valuable insights into the potential benefits of embracing the Theory of Media Activity as a foundational framework for journalism education. Its thorough analysis and practical implications make it a valuable resource for educators, researchers, and practitioners seeking to enhance journalism pedagogy in response to the dynamic nature of contemporary media.

Keywords: theory of media activity, journalism education, media landscape, media production, media consumption, interactive media, participatory media, technological advancements, media producers, media consumers, journalism practice, contemporary media environment, journalism pedagogy, media theory, media studies

Procedia PDF Downloads 16
103 Cost Overrun in Delivery of Public Projects in the Saudi Construction Industry: A Review

Authors: A. Aljohani, D. Moore, D. D. Ahiaga-Dagbui

Abstract:

Cost overruns are endemic in the delivery of construction projects. The problem is global. It occurs irrespective of type and size of the project, its location, procurement method or client. The size of overruns can be as high as 200% in some cases. Projects thus unfortunately often make the news headlines, not for their immense socio-economic contribution to society, but for being poorly procured. In Saudi Arabia, two-thirds of construction projects are publicly procured by the Saudi government, which has been invested Billions of dollars in infrastructure projects each year as part of an ambitious strategic development agenda to shift from mainly oil dependency to multi-source dependency. However, reports show that about 3,000 public projects face diverse issues related to time and cost overrun. As part of an on-going study to develop a framework for effective public procurement for the Saudi Arabian construction industry, this paper reports the initial findings of the causes of cost overruns in the context of the Gulf State. It also evaluates the interface between some of the front-end loading issues in public procurement in Saudi and their effects on project performance. A systematic review of the existing literature on construction cost overruns, with focus on the Saudi Arabian construction industry has been used. One of the initial findings is that a fixed-price contract is usually used by the client in an attempt to transfer all financial risks to the contractors. This has the unintended consequence of creating a turbulent environment for the delivery of the project which leads to project abandonment by contractors, poor quality of work and substantial rework. Further work is being undertaken to empirically verify the initial findings reported in this paper and their generalizability for the construction industry as a whole.

Keywords: cost overrun, public procurement, Saudi Arabia, construction projects

Procedia PDF Downloads 238
102 Deployment of Information and Communication Technology (ICT) to Reduce Occurrences of Terrorism in Nigeria

Authors: Okike Benjamin

Abstract:

Terrorism is the use of violence and threat to intimidate or coerce a person, group, society or even government especially for political purposes. Terrorism may be a way of resisting government by some group who may feel marginalized. It could also be a way of expressing displeasure over the activities of government. On 26th December, 2009, US placed Nigeria as a terrorist nation. Recently, the occurrences of terrorism in Nigeria have increased considerably. In Jos, Plateau state, Nigeria, there was a bomb blast which claimed many lives on the eve of 2010 Christmas. Similarly, there was another bomb blast in Mugadishi (Sani Abacha) Barracks Mammy market on the eve of 2011 New Year. For some time now, it is no longer news that bomb exploded in some Northern part of Nigeria. About 25 years ago, stopping terrorism in America by the Americans relied on old-fashioned tools such as strict physical security at vulnerable places, intelligence gathering by government agents, or individuals, vigilance on the part of all citizens, and a sense of community in which citizens do what could be done to protect each other. Just as technology has virtually been used to better the way many other things are done, so also this powerful new weapon called computer technology can be used to detect and prevent terrorism not only in Nigeria, but all over the world. This paper will x-ray the possible causes and effects of bomb blast, which is an act of terrorism and suggest ways in which Explosive Detection Devices (EDDs) and computer software technology could be deployed to reduce the occurrences of terrorism in Nigeria. This become necessary with the abduction of over 200 schoolgirls in Chibok, Borno State from their hostel by members of Boko Haram sect members on 14th April, 2014. Presently, Barrack Obama and other world leaders have sent some of their military personnel to help rescue those innocent schoolgirls whose offence is simply seeking to acquire western education which the sect strongly believe is forbidden.

Keywords: terrorism, bomb blast, computer technology, explosive detection devices, Nigeria

Procedia PDF Downloads 235
101 Examining the Possibility of Establishing Regional Environmental Governance in the Middle East

Authors: Somayeh Bahrami, Seyed Jalal Dehghani Firoozabadi

Abstract:

Environmental governance is an interdisciplinary concept in political ecology and environmental policy focusing on the necessity of embedding the environmental issues in all levels of decision-making and act of states. Similar to sustainable development the concept of environmental governance believes that economic and political life of societies and countries need to be considered as a subset of the environment. This concept has been accepted by North Countries, those that have done the most irreparable environmental damage since the Industrial Revolution. Although North Countries are more responsible for damage to the environment, considering the global fluidity logic of environmental challenges, such an impression doesn’t cause developing countries to disavow responsibility for regional and international cooperation to protect the environment. Establishing an environmental governance at all levels of local, national, regional and global is one of the most significant ways to improve sustainable development. Given to the various political and economic difficulties developing countries including the Middle East face, building environmental governance in these countries is difficult but feasible, as these difficulties have not impeded their mutual partnership for confronting joint environmental issues. However, the environmental issues wouldn’t be solved only by mutual partnership but by establishing environmental governance, establishing regional environmental institutions (an introduction to building Regional Environmental Governance) and delegation of some environmental authorities to the mentioned institutions. The research is aimed at examining necessities, opportunities, and barriers to establishing Regional Environmental Governance in the Middle East. Therefore, this research seeks to answer the question of whether establishing Regional Environmental Governance is possible in the Middle East and if so then why. This study used descriptive-analytical methods and the inferential methodology has been used to reach the goals. Data has been collected by using library and internet sources as well as news sources on the basis of objective-historical data.

Keywords: environmental democracy (ED), environmental governance (EG), middle east (ME), regional environmental governance (REG)

Procedia PDF Downloads 419
100 Building Transparent Supply Chains through Digital Tracing

Authors: Penina Orenstein

Abstract:

In today’s world, particularly with COVID-19 a constant worldwide threat, organizations need greater visibility over their supply chains more than ever before, in order to find areas for improvement and greater efficiency, reduce the chances of disruption and stay competitive. The concept of supply chain mapping is one where every process and route is mapped in detail between each vendor and supplier. The simplest method of mapping involves sourcing publicly available data including news and financial information concerning relationships between suppliers. An additional layer of information would be disclosed by large, direct suppliers about their production and logistics sites. While this method has the advantage of not requiring any input from suppliers, it also doesn’t allow for much transparency beyond the first supplier tier and may generate irrelevant data—noise—that must be filtered out to find the actionable data. The primary goal of this research is to build data maps of supply chains by focusing on a layered approach. Using these maps, the secondary goal is to address the question as to whether the supply chain is re-engineered to make improvements, for example, to lower the carbon footprint. Using a drill-down approach, the end result is a comprehensive map detailing the linkages between tier-one, tier-two, and tier-three suppliers super-imposed on a geographical map. The driving force behind this idea is to be able to trace individual parts to the exact site where they’re manufactured. In this way, companies can ensure sustainability practices from the production of raw materials through the finished goods. The approach allows companies to identify and anticipate vulnerabilities in their supply chain. It unlocks predictive analytics capabilities and enables them to act proactively. The research is particularly compelling because it unites network science theory with empirical data and presents the results in a visual, intuitive manner.

Keywords: data mining, supply chain, empirical research, data mapping

Procedia PDF Downloads 143
99 A Preliminary Investigation on Factors That Influence Road Users' Speeding Behaviour on Selected Roads in Peninsular Malaysia

Authors: Farah Fazlinda Binti Mohamad, Ahmad Saifizul Abdullah, Mohamed Rehan Karim , Jamilah Mohamad, Siti Hikmah Musthar

Abstract:

Road safety is an important issue in Malaysia. It become important as it is discussed widely throughout printed and electronic media. Most of the news portrays on road accident and fatalities have increased the concern of everyone. This issue affects everyone's life as everyone shares the roads. The most vulnerable victims are the road user who uses the roads every day. It is appalling when World Health Organization (WHO) reported that in every 100,000 of population in Malaysia, 23 fatalities recorded due to road accident alone. This figure is quite alarming and requires serious attention. Furthermore, research by Malaysian Institute of Road Safety Research concluded that that speeding has contributed to 60% of all road accident in the country. Therefore, this study aims to elucidate the factors that influence road users’ speeding behaviour on selected roads in Peninsular Malaysia. To achieve this, set of questionnaires has distributed to 500 respondents on selected roads in Peninsular Malaysia. The respondents came from various demographic backgrounds in order to have a fair opinion on the issue. Using descriptive analysis, the results have indicated that psychological factors such as emotion and attitude of road user are the prominent factors that influence the road user’s speeding behaviour. Furthermore, the results have shown that male road users were dominant in speeding compared to female, which led to increased vulnerability to road injuries and fatalities. These findings are very useful in order for us to understand road users’ driving behaviour. Relevant authorities should also revise the existing countermeasures and find ways to reduce road accident. Engineers and road experts could cooperate in designing new road specifications for the road user. Nevertheless, it is important to comprehend this speeding issue and factors associated with it. Each road user should take this matter seriously and responsibly as road safety is a responsibility of all.

Keywords: countermeasures, psychological, road safety, speeding

Procedia PDF Downloads 497
98 Forestalling Heritage: Photography inside the Narrative of Catastrophe

Authors: Claudia Pimentel, Nuno Resende, Maria Fatima Lambert

Abstract:

In the present time, catastrophe seems to be inevitable, and individuals are permanently overwhelmed with challenges that test one’s ability to cope with reality. Undoubtedly, photography surpassed the barrier of efficient communication in a world filled with omnifarious narratives. It wandered an outing shorter than words and younger than other sciences but became, nowadays, imperative in the context of several fields of knowledge, namely Heritage studies. Heritage and photography thus emerge as unapologetically related concepts, a fact that makes them equally relevant in today's society. Political, economic, social and humanitarian challenges alter the way in which the relationship with the past is managed and the way in which identities and ideas for the future are constructed. Ruins and destruction have become part of aesthetics discourse since the 18th century and are an area of interest when we discuss cultural heritage preservation. The image proves to be a unique way of revealing the event details when we refer to a catastrophic situation, whether it be anthropic, social or climatic. Like poetry, which has a challenging connection with silence, image is capable of creating spaces of sound and silence, and it is often these “pseudo-voids” that capture the attention of the spectator, of the one who sees/observes/contacts with the photography. The way we look at the catastrophe, how we describe it, and the images we keep in our memory will determine the record/capture/news of the event. We, thus, have a visual record, a document that will contribute to the creation of individual and collective identity, in a jigsaw puzzle of memories, pseudo memories and post memories. Based on photographic records in the Portuguese press, we intend to rethink the earthquake at Angra do Heroísmo – Azores in 1980, exploring the viewer´s perspective on the catastrophe’s iconography under the perspective of aesthetics and genealogy of the catastrophe.

Keywords: photography, aesthetics, catastrophe, Portugal

Procedia PDF Downloads 33
97 Adapting Tools for Text Monitoring and for Scenario Analysis Related to the Field of Social Disasters

Authors: Svetlana Cojocaru, Mircea Petic, Inga Titchiev

Abstract:

Humanity faces more and more often with different social disasters, which in turn can generate new accidents and catastrophes. To mitigate their consequences, it is important to obtain early possible signals about the events which are or can occur and to prepare the corresponding scenarios that could be applied. Our research is focused on solving two problems in this domain: identifying signals related that an accident occurred or may occur and mitigation of some consequences of disasters. To solve the first problem, methods of selecting and processing texts from global network Internet are developed. Information in Romanian is of special interest for us. In order to obtain the mentioned tools, we should follow several steps, divided into preparatory stage and processing stage. Throughout the first stage, we manually collected over 724 news articles and classified them into 10 categories of social disasters. It constitutes more than 150 thousand words. Using this information, a controlled vocabulary of more than 300 keywords was elaborated, that will help in the process of classification and identification of the texts related to the field of social disasters. To solve the second problem, the formalism of Petri net has been used. We deal with the problem of inhabitants’ evacuation in useful time. The analysis methods such as reachability or coverability tree and invariants technique to determine dynamic properties of the modeled systems will be used. To perform a case study of properties of extended evacuation system by adding time, the analysis modules of PIPE such as Generalized Stochastic Petri Nets (GSPN) Analysis, Simulation, State Space Analysis, and Invariant Analysis have been used. These modules helped us to obtain the average number of persons situated in the rooms and the other quantitative properties and characteristics related to its dynamics.

Keywords: lexicon of disasters, modelling, Petri nets, text annotation, social disasters

Procedia PDF Downloads 173