Search results for: host security threats
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 3930

Search results for: host security threats

900 Applications of Internet of Things (IoTs) for Information Resources and Services: Survey of Academic Librarians

Authors: Sultan Aldaihani, Eiman Al-Fadhli

Abstract:

Internet of Things (IoTs) expected to change the future of academic libraries operations. It enables academic libraries to be smart libraries through, for example, the connection of the physical objects with the Internet. The implementation of IoTs will improve library resources and services. Therefore, this research aims to investigate the applications of Internet of Things (IoTs) for information resources and services. Understanding perceptions of academic librarians toward IoTs before adopting of such applications will assist decision-makers in academic libraries in their strategic planning. An online questionnaire was administered to academic librarians at Kuwait University. The findings of this study showed that academic librarians have awareness for the IoTs. They have strongly believed that the IoTs contributes to the development of information resources, services, and understanding of the user's information behavior. Identifying new applications of the IoTs in libraries was the highest possible reason for future adoption. Academic librarians indicated that lack of privacy and data penetration were the greatest problem in their future adoption of IoTs. Academic libraries need to implement the IoTs for enhancing their information resources and services. One important step in the success of future adoption is to conduct awareness and training programs for academic librarians. They also need to maintain higher security and privacy measurements in their implementation for the IoTs. This study will assist academic libraries in accommodating this technology.

Keywords: academic libraries, internet of things, information resources, information services

Procedia PDF Downloads 119
899 Magnetic Treatment of Irrigation Water and Its Effect on Water Salinity

Authors: Muhammad Waqar Ashraf

Abstract:

The influence of magnetic field on the structure of water and aqueous solutions are similar and can alter the physical and chemical properties of water-dispersed systems. With the application of magnetic field, hydration of salt ions and other impurities slides down and improve the possible technological characteristics of the water. Magnetic field can enhance the characteristic of water i.e. better salt solubility, kinetic changes in salt crystallization, accelerated coagulation, etc. Gulf countries are facing critical problem due to depletion of water resources and increasing food demands to cover the human needs; therefore water shortage is being increasingly accepted as a major limitation for increased agricultural production and food security. In arid and semi-arid regions sustainable agricultural development is influenced to a great extent by water quality that might be used economically and effectively in developing agriculture programs. In the present study, the possibility of using magnetized water to desalinate the soil is accounted for the enhanced dissolving capacity of the magnetized water. Magnetic field has been applied to treat brackish water. The study showed that the impact of magnetic field on saline water is sustained up to three hours (with and without shaking). These results suggest that even low magnetic field can decrease the electrical conductivity and total dissolved solids which are good for the removal of salinity from the irrigated land by using magnetized water.

Keywords: magnetic treatment, saline water, hardness of water, removal of salinity

Procedia PDF Downloads 459
898 Intrusion Detection in Computer Networks Using a Hybrid Model of Firefly and Differential Evolution Algorithms

Authors: Mohammad Besharatloo

Abstract:

Intrusion detection is an important research topic in network security because of increasing growth in the use of computer network services. Intrusion detection is done with the aim of detecting the unauthorized use or abuse in the networks and systems by the intruders. Therefore, the intrusion detection system is an efficient tool to control the user's access through some predefined regulations. Since, the data used in intrusion detection system has high dimension, a proper representation is required to show the basis structure of this data. Therefore, it is necessary to eliminate the redundant features to create the best representation subset. In the proposed method, a hybrid model of differential evolution and firefly algorithms was employed to choose the best subset of properties. In addition, decision tree and support vector machine (SVM) are adopted to determine the quality of the selected properties. In the first, the sorted population is divided into two sub-populations. These optimization algorithms were implemented on these sub-populations, respectively. Then, these sub-populations are merged to create next repetition population. The performance evaluation of the proposed method is done based on KDD Cup99. The simulation results show that the proposed method has better performance than the other methods in this context.

Keywords: intrusion detection system, differential evolution, firefly algorithm, support vector machine, decision tree

Procedia PDF Downloads 57
897 Detecting Venomous Files in IDS Using an Approach Based on Data Mining Algorithm

Authors: Sukhleen Kaur

Abstract:

In security groundwork, Intrusion Detection System (IDS) has become an important component. The IDS has received increasing attention in recent years. IDS is one of the effective way to detect different kinds of attacks and malicious codes in a network and help us to secure the network. Data mining techniques can be implemented to IDS, which analyses the large amount of data and gives better results. Data mining can contribute to improving intrusion detection by adding a level of focus to anomaly detection. So far the study has been carried out on finding the attacks but this paper detects the malicious files. Some intruders do not attack directly, but they hide some harmful code inside the files or may corrupt those file and attack the system. These files are detected according to some defined parameters which will form two lists of files as normal files and harmful files. After that data mining will be performed. In this paper a hybrid classifier has been used via Naive Bayes and Ripper classification methods. The results show how the uploaded file in the database will be tested against the parameters and then it is characterised as either normal or harmful file and after that the mining is performed. Moreover, when a user tries to mine on harmful file it will generate an exception that mining cannot be made on corrupted or harmful files.

Keywords: data mining, association, classification, clustering, decision tree, intrusion detection system, misuse detection, anomaly detection, naive Bayes, ripper

Procedia PDF Downloads 391
896 Fake News Domination and Threats on Democratic Systems

Authors: Laura Irimies, Cosmin Irimies

Abstract:

The public space all over the world is currently confronted with the aggressive assault of fake news that have lately impacted public agenda setting, collective decisions and social attitudes. Top leaders constantly call out most mainstream news as “fake news” and the public opinion get more confused. "Fake news" are generally defined as false, often sensational, information disseminated under the guise of news reporting and has been declared the word of the year 2017 by Collins Dictionary and it also has been one of the most debated socio-political topics of recent years. Websites which, deliberately or not, publish misleading information are often shared on social media where they essentially increase their reach and influence. According to international reports, the exposure to fake news is an undeniable reality all over the world as the exposure to completely invented information goes up to the 31 percent in the US, and it is even bigger in Eastern Europe countries, such as Hungary (42%) and Romania (38%) or in Mediterranean countries, such as Greece (44%) or Turkey (49%), and lower in Northern and Western Europe countries – Germany (9%), Denmark (9%) or Holland (10%). While the study of fake news (mechanism and effects) is still in its infancy, it has become truly relevant as the phenomenon seems to have a growing impact on democratic systems. Studies conducted by the European Commission show that 83% of respondents out of a total of 26,576 interviewees consider the existence of news that misrepresent reality as a threat for democracy. Studies recently conducted at Arizona State University show that people with higher education can more easily spot fake headlines, but over 30 percent of them can still be trapped by fake information. If we were to refer only to some of the most recent situations in Romania, fake news issues and hidden agenda suspicions related to the massive and extremely violent public demonstrations held on August 10th, 2018 with a strong participation of the Romanian diaspora have been massively reflected by the international media and generated serious debates within the European Commission. Considering the above framework, the study raises four main research questions: 1. Is fake news a problem or just a natural consequence of mainstream media decline and the abundance of sources of information? 2. What are the implications for democracy? 3. Can fake news be controlled without restricting fundamental human rights? 4. How could the public be properly educated to detect fake news? The research uses mostly qualitative but also quantitative methods, content analysis of studies, websites and media content, official reports and interviews. The study will prove the real threat fake news represent and also the need for proper media literacy education and will draw basic guidelines for developing a new and essential skill: that of detecting fake in news in a society overwhelmed by sources of information that constantly roll massive amounts of information increasing the risk of misinformation and leading to inadequate public decisions that could affect democratic stability.

Keywords: agenda setting democracy, fake news, journalism, media literacy

Procedia PDF Downloads 97
895 Bacterial Diversity in Human Intestinal Microbiota and Correlations with Nutritional Behavior, Physiology, Xenobiotics Intake and Antimicrobial Resistance in Obese, Overweight and Eutrophic Individuals

Authors: Thais O. de Paula, Marjorie R. A. Sarmiento, Francis M. Borges, Alessandra B. Ferreira-Machado, Juliana A. Resende, Dioneia E. Cesar, Vania L. Silva, Claudio G. Diniz

Abstract:

Obesity is currently a worldwide public health threat, being considered a pandemic multifactorial disease related to the human gut microbiota (GM). Add to that GM is considered an important reservoir of antimicrobial resistance genes (ARG) and little is known on GM and ARG in obesity, considering the altered physiology and xenobiotics intake. As regional and social behavior may play important roles in GM modulation, and most of the studies are based on small sample size and various methodological approaches resulting in difficulties for data comparisons, this study was focused on the investigation of GM bacterial diversity in obese (OB), overweight (OW) and eutrophic individuals (ET) considering their nutritional, clinical and social characteristics; and comparative screening of AGR related to their physiology and xenobiotics intake. Microbial community was accessed by FISH considering phyla as a taxonomic level, and PCR-DGGE followed by dendrograms evaluation (UPGMA method) from fecal metagenome of 72 volunteers classified according to their body mass index (BMI). Nutritional, clinical, social parameters and xenobiotics intake were recorded for correlation analysis. The fecal metagenome was also used as template for PCR targeting 59 different ARG. Overall, 62% of OB were hypertensive, and 12% or 4% were, regarding the OW and ET individuals. Most of the OB were rated as low income (80%). Lower relative bacterial densities were observed in the OB compared to ET for almost all studied taxa (p < 0.05) with Firmicutes/Bacteroidetes ratio increased in the OB group. OW individuals showed a bacterial density representative of GM more likely to the OB. All the participants were clustered in 3 different groups based on the PCR-DGGE fingerprint patterns (C1, C2, C3), being OB mostly grouped in C1 (83.3%) and ET mostly grouped in C3 (50%). The cluster C2 showed to be transitional. Among 27 ARG detected, a cluster of 17 was observed in all groups suggesting a common core. In general, ARG were observed mostly within OB individuals followed by OW and ET. The ratio between ARG and bacterial groups may suggest that AGR were more related to enterobacteria. Positive correlations were observed between ARG and BMI, calories and xenobiotics intake (especially use of sweeteners). As with nutritional and clinical characteristics, our data may suggest that GM of OW individuals behave in a heterogeneous pattern, occasionally more likely to the OB or to the ET. Regardless the regional and social behaviors of our population, the methodological approaches in this study were complementary and confirmatory. The imbalance of GM over the health-disease interface in obesity is a matter of fact, but its influence in host's physiology is still to be clearly elucidated to help understanding the multifactorial etiology of obesity. Although the results are in agreement with observations that GM is altered in obesity, the altered physiology in OB individuals seems to be also associated to the increased xenobiotics intake and may interfere with GM towards antimicrobial resistance, as observed by the fecal metagenome and ARG screening. Support: FAPEMIG, CNPQ, CAPES, PPGCBIO/UFJF.

Keywords: antimicrobial resistance, bacterial diversity, gut microbiota, obesity

Procedia PDF Downloads 133
894 Positive Incentives to Reduce Private Car Use: A Theory-Based Critical Analysis

Authors: Rafael Alexandre Dos Reis

Abstract:

Research has shown a substantial increase in the participation of Conventionally Fuelled Vehicles (CFVs) in the urban transport modal split. The reasons for this unsustainable reality are multiple, from economic interventions to individual behaviour. The development and delivery of positive incentives for the adoption of more environmental-friendly modes of transport is an emerging strategy to help in tackling the problem of excessive use of conventionally fuelled vehicles. The efficiency of this approach, like other information-based schemes, can benefit from the knowledge of their potential impacts in theoretical constructs of multiple behaviour change theories. The goal of this research is to critically analyse theories of behaviour that are relevant to transport research and the impacts of positive incentives on the theoretical determinants of behaviour, strengthening the current body of evidence about the benefits of this approach. The main method to investigate this will involve a literature review on two main topics: the current theories of behaviour that have empirical support in transport research and the past or ongoing positive incentives programs that had an impact on car use reduction. The reviewed programs of positive incentives were the following: The TravelSmart®; Spitsmijden®; Incentives for Singapore Commuters® (INSINC); COMMUTEGREENER®; MOVESMARTER®; STREETLIFE®; SUPERHUB®; SUNSET® and the EMPOWER® project. The theories analysed were the heory of Planned Behaviour (TPB); The Norm Activation Theory (NAM); Social Learning Theory (SLT); The Theory of Interpersonal Behaviour (TIB); The Goal-Setting Theory (GST) and The Value-Belief-Norm Theory (VBN). After the revisions of the theoretical constructs of each of the theories and their influence on car use, it can be concluded that positive incentives schemes impact on behaviour change in the following manners: -Changing individual’s attitudes through informational incentives; -Increasing feelings of moral obligations to reduce the use of CFVs; -Increase the perceived social pressure to engage in more sustainable mobility behaviours through the use of comparison mechanisms in social media, for example; -Increase the perceived control of behaviour through informational incentives and training incentives; -Increasing personal norms with reinforcing information; -Providing tools for self-monitoring and self-evaluation; -Providing real experiences in alternative modes to the car; -Making the observation of others’ car use reduction possible; -Informing about consequences of behaviour and emphasizing the individual’s responsibility with society and the environment; -Increasing the perception of the consequences of car use to an individual’s valued objects; -Increasing the perceived ability to reduce threats to environment; -Help establishing goals to reduce car use; - iving personalized feedback on the goal; -Increase feelings of commitment to the goal; -Reducing the perceived complexity of the use of alternatives to the car. It is notable that the emerging technique of delivering positive incentives are systematically connected to causal determinants of travel behaviour. The preliminary results of the reviewed programs evidence how positive incentives might strengthen these determinants and help in the process of behaviour change.

Keywords: positive incentives, private car use reduction, sustainable behaviour, voluntary travel behaviour change

Procedia PDF Downloads 307
893 Application of the Mobile Phone for Occupational Self-Inspection Program in Small-Scale Industries

Authors: Jia-Sin Li, Ying-Fang Wang, Cheing-Tong Yan

Abstract:

In this study, an integrated approach of Google Spreadsheet and QR code which is free internet resources was used to improve the inspection procedure. The mobile phone Application(App)was also designed to combine with a web page to create an automatic checklist in order to provide a new integrated information of inspection management system. By means of client-server model, the client App is developed for Android mobile OS and the back end is a web server. It can set up App accounts including authorized data and store some checklist documents in the website. The checklist document URL could generate QR code first and then print and paste on the machine. The user can scan the QR code by the app and filled the checklist in the factory. In the meanwhile, the checklist data will send to the server, it not only save the filled data but also executes the related functions and charts. On the other hand, it also enables auditors and supervisors to facilitate the prevention and response to hazards, as well as immediate report data checks. Finally, statistics and professional analysis are performed using inspection records and other relevant data to not only improve the reliability, integrity of inspection operations and equipment loss control, but also increase plant safety and personnel performance. Therefore, it suggested that the traditional paper-based inspection method could be replaced by the APP which promotes the promotion of industrial security and reduces human error.

Keywords: checklist, Google spreadsheet, APP, self-inspection

Procedia PDF Downloads 90
892 A Method for Identifying Unusual Transactions in E-commerce Through Extended Data Flow Conformance Checking

Authors: Handie Pramana Putra, Ani Dijah Rahajoe

Abstract:

The proliferation of smart devices and advancements in mobile communication technologies have permeated various facets of life with the widespread influence of e-commerce. Detecting abnormal transactions holds paramount significance in this realm due to the potential for substantial financial losses. Moreover, the fusion of data flow and control flow assumes a critical role in the exploration of process modeling and data analysis, contributing significantly to the accuracy and security of business processes. This paper introduces an alternative approach to identify abnormal transactions through a model that integrates both data and control flows. Referred to as the Extended Data Petri net (DPNE), our model encapsulates the entire process, encompassing user login to the e-commerce platform and concluding with the payment stage, including the mobile transaction process. We scrutinize the model's structure, formulate an algorithm for detecting anomalies in pertinent data, and elucidate the rationale and efficacy of the comprehensive system model. A case study validates the responsive performance of each system component, demonstrating the system's adeptness in evaluating every activity within mobile transactions. Ultimately, the results of anomaly detection are derived through a thorough and comprehensive analysis.

Keywords: database, data analysis, DPNE, extended data flow, e-commerce

Procedia PDF Downloads 24
891 Medical Image Watermark and Tamper Detection Using Constant Correlation Spread Spectrum Watermarking

Authors: Peter U. Eze, P. Udaya, Robin J. Evans

Abstract:

Data hiding can be achieved by Steganography or invisible digital watermarking. For digital watermarking, both accurate retrieval of the embedded watermark and the integrity of the cover image are important. Medical image security in Teleradiology is one of the applications where the embedded patient record needs to be extracted with accuracy as well as the medical image integrity verified. In this research paper, the Constant Correlation Spread Spectrum digital watermarking for medical image tamper detection and accurate embedded watermark retrieval is introduced. In the proposed method, a watermark bit from a patient record is spread in a medical image sub-block such that the correlation of all watermarked sub-blocks with a spreading code, W, would have a constant value, p. The constant correlation p, spreading code, W and the size of the sub-blocks constitute the secret key. Tamper detection is achieved by flagging any sub-block whose correlation value deviates by more than a small value, ℇ, from p. The major features of our new scheme include: (1) Improving watermark detection accuracy for high-pixel depth medical images by reducing the Bit Error Rate (BER) to Zero and (2) block-level tamper detection in a single computational process with simultaneous watermark detection, thereby increasing utility with the same computational cost.

Keywords: Constant Correlation, Medical Image, Spread Spectrum, Tamper Detection, Watermarking

Procedia PDF Downloads 164
890 Group Boundaries against and Due to Identity Threat

Authors: Anna Siegler, Sara Bigazzi, Sara Serdult, Ildiko Bokretas

Abstract:

Social identity emerging from group membership defines the representational processes of our social reality. Based on our theoretical assumption the subjective perception of identity threat leads to an instable identity structure. The need to re-establish the positive identity will lead us to strengthen group boundaries. Prejudice in our perspective offer psychological security those who thinking in exclusive barriers, and we suggest that those who identify highly with their ingroup/national identity and less with superordinate identities take distance from others and this is related to their perception of threat. In our study we used a newly developed questionnaire, the Multiple Threat and Prejudice Questionnaire (MTPQ) which measure identity threat at different dimensions of identification (national, existential, gender, religious) and the distancing of different outgroups, over and above we worked with Social Dominance Orientation (SDO) and Identification with All Humanity Scale (IWAH). We conduct one data collection (N=1482) in a Hungarian sample to examine the connection between national threat and distance-taking, and this survey includes the investigation (N=218) of identification with different group categories. Our findings confirmed that those who feel themselves threatened in their national identity aspects are less likely to identify themselves with superordinate groups and this correlation is much stronger when they think about the nation as a bio-cultural unit, while if nation defined as a social-economy entity this connection is less powerful and has just the opposite direction.

Keywords: group boundaries, identity threat, prejudice, superordinate groups

Procedia PDF Downloads 378
889 Identification of a Novel Maize Dehydration-Responsive Gene with a Potential Role in Improving Maize Drought Tolerance

Authors: Kyle Phillips, Ndiko Ludidi

Abstract:

Global climate change has resulted in altered rainfall patterns, which has resulted in annual losses in maize crop yields due to drought. Therefore it is important to produce maize cultivars that are more drought-tolerant, which is not an easily accomplished task as plants have a plethora of physical and biochemical adaptation methods. One such mechanism is the drought-induced expression of enzymatic and non-enzymatic proteins which assist plants to resist the effects of drought on their growth and development. One of these proteins is AtRD22 which has been identified in Arabidopsis thaliana. Using an in silico approach, a maize protein with 48% sequence homology to AtRD22 has been identified. This protein appears to be localized in the extracellular matrix, similarly to AtRD22. Promoter analysis of the encoding gene reveals cis-acting elements suggestive of induction of the gene’s expression by abscisic acid (ABA). Semi-quantitative transcriptomic analysis of the putative maize RD22 has revealed an increase in transcript levels after the exposure to drought. Current work elucidates the effect of up-regulation and silencing of the maize RD22 gene on the tolerance of maize to drought. The potential role of the maize RD22 gene in maize drought tolerance can be used as a tool to improve food security.

Keywords: abscisic acid, drought-responsive cis-acting elements, maize drought tolerance, RD22

Procedia PDF Downloads 426
888 Meeting India's Energy Demand: U.S.-India Energy Cooperation under Trump

Authors: Merieleen Engtipi

Abstract:

India's total share of global population is nearly 18%; however, its per capita energy consumption is only one-third of global average. The demand and supply of electricity are uneven in the country; around 240 million of the population have no access to electricity. However, with India's trajectory for modernisation and economic growth, the demand for energy is only expected to increase. India is at a crossroad, on the one hand facing the increasing demand for energy and on the other hand meeting the Paris climate policy commitments, and further the struggle to provide efficient energy. This paper analyses the policies to meet India’s need for energy, as the per capita energy consumption is likely to be double in 6-7 years period. Simultaneously, India's Paris commitment requires curbing of carbon emission from fossil fuels. There is an increasing need for renewables to be cheaply and efficiently available in the market and for clean technology to extract fossil fuels to meet climate policy goals. Fossil fuels are the most significant generator of energy in India; with the Paris agreement, the demand for clean energy technology is increasing. Finally, the U.S. decided to withdraw from the Paris Agreement; however, the two countries plan to continue engaging bilaterally on energy issues. The U.S. energy cooperation under Trump administration is significantly vital for greater energy security, transfer of technology and efficiency in energy supply and demand.

Keywords: energy demand, energy cooperation, fossil fuels, technology transfer

Procedia PDF Downloads 221
887 Comprehensive Review of Adversarial Machine Learning in PDF Malware

Authors: Preston Nabors, Nasseh Tabrizi

Abstract:

Portable Document Format (PDF) files have gained significant popularity for sharing and distributing documents due to their universal compatibility. However, the widespread use of PDF files has made them attractive targets for cybercriminals, who exploit vulnerabilities to deliver malware and compromise the security of end-user systems. This paper reviews notable contributions in PDF malware detection, including static, dynamic, signature-based, and hybrid analysis. It presents a comprehensive examination of PDF malware detection techniques, focusing on the emerging threat of adversarial sampling and the need for robust defense mechanisms. The paper highlights the vulnerability of machine learning classifiers to evasion attacks. It explores adversarial sampling techniques in PDF malware detection to produce mimicry and reverse mimicry evasion attacks, which aim to bypass detection systems. Improvements for future research are identified, including accessible methods, applying adversarial sampling techniques to malicious payloads, evaluating other models, evaluating the importance of features to malware, implementing adversarial defense techniques, and conducting comprehensive examination across various scenarios. By addressing these opportunities, researchers can enhance PDF malware detection and develop more resilient defense mechanisms against adversarial attacks.

Keywords: adversarial attacks, adversarial defense, adversarial machine learning, intrusion detection, PDF malware, malware detection, malware detection evasion

Procedia PDF Downloads 14
886 Attracting Tourists: Architecture for Tourism during the Period of Korean Empire, 1897–1910

Authors: Lina Shinhwa Koo

Abstract:

The Korean Empire, or Daehanjeguk, was proclaimed by King Gojong (1852–1919) in 1897 with the aim of promoting its sovereignty as a nation-state amid the political situation with threats from neighbouring countries, such as Japan and Russia. The Korean Empire period (1897–1910), which lasted until 1910, when Japan annexed Korea, is a pivotal time in the modern history of Korea. It was also during the period when many infrastructures for tourism, including transportation and lodging systems, were established. Throughout the Korean Empire period, tourists from Japan and Euro-American countries popularly visited Korea after it opened its doors relatively recently. The government of the Korean Empire also actively engaged with foreign officials and professionals. Train stations were built to connect Busan, where foreigners first arrived through the port of Jemulpo, with Seoul, the capital of Korea. In addition, hotels were built to accommodate the increasing number of tourists. Shedding new light on the modern architectural history of Korea, this paper discusses buildings that were made for tourism during the Korean Empire period to examine the historical background behind the tourism development in Korea and the concept of travelling related to architecture history. Foreigners came to Korea for varying reasons, from ethnographic research and diplomacy to business and missionary. They also played a key role in the transportation and hotel businesses. For instance, American entrepreneur James R. Morse received a concession to construct a railway between Busan and Seoul in 1896, which was later granted to a Japanese firm. Japanese entrepreneurs came to Korea and built hotels, such as Daebul Hotel in Incheon and Paseonggwan in Seoul. Sontag Hotel, Station Hotel and Hotel du Palais, all located in central areas of Seoul, were owned by German, British and French entrepreneurs, respectively. Each building showed distinctive architectural elements. For example, Sontag Hotel was built in Russian architectural style, whereas Paseonggwan was created with a combination of Japanese and European styles. Such various architectural designs indicated the multicultural urban scenes of the Korean Empire at the time. The existing scholarship has paid more attention to the royal buildings built during the Korean Empire period, such as Seokjojeon of the Duksu Palace. However, it is important to study the tourism-related architecture that reflected the societal situation of the Korean Empire when contrasting ideologies, landscapes, historical narratives and political tensions intertwined and co-existed. Examining both textual and visual resources, such as news articles and photographs, this paper surveys architectural styles and the trajectories of selective examples of hotels and train stations within the discussion of temporality and spatiality in the discipline of social science. In doing so, one can re-assess the history of the Korean Empire as the intersection of modern and traditional, intrinsic and extrinsic and national and international.

Keywords: Korean empire, modern Korean architecture, tourism, hotel, train station

Procedia PDF Downloads 43
885 Inequality and Poverty Assessment on Affordable Housing in Austria: A Comprehensive Perspective on SDG 1 and SDG 10 (UniNEtZ Project)

Authors: M. Bukowski, K. Kreissl

Abstract:

Social and environmental pressures in our times bear threats that often cross-border in scale, such as climate change, poverty-driven migration, demographic change as well as socio-economic developments. One of the hot topics is prevailing in many societies across Europe and worldwide, concerns 'affordable housing' and poverty-driven international and domestic migration (including displacements through gentrification processes), focusing here on the urban and regional context. The right to adequate housing and shelter is one of the recognized in the Universal Declaration of Human rights and International Covenant on Economic, Social and Cultural Rights, and as such considered as a human right of the second generation. The decreasing supply of affordable housing, especially in urban areas, has reached dimensions that have led to an increasing 'housing crisis'. This crisis, which has even reached middle-income homes, has an even more devastating impact on low income and poor households raising poverty levels. Therefore, the understanding of the connection between housing and poverty is vital to integrate and support the different stakeholders in order to tackle poverty. When it comes to issues of inequalities and poverty within the SDG framework, multi-faceted stakeholders with different claims, distribution of resources and interactions with other development goals (spill-over and trade-offs) account for a highly complex context. To contribute to a sustainable and fair society and hence to support the UN Sustainable Development Goals, the University of Salzburg participates in the Austrian-wide universities' network 'UniNEtZ'. Our joint target is to develop an options report for the Austrian Government regarding the seventeen SDGs, so far hosted by 18 Austrian universities. In this vein, the University of Salzburg; i.e., the Centre for Ethics and Poverty Research, the departments of Geography and Geology and the Department of Sociology and Political Science are focusing on the SDG 1 (No Poverty) and SDG 10 (Reduced Inequalities). Our target and research focus is to assess and evaluate the status of SDG 1 and 10 in Austria, to find possible solutions and to support stakeholders' integration. We aim at generating and deducing appropriate options as scientific support, from interdisciplinary research studies to 'Sustainability Developing Goals and their Targets' in action. For this reason, and to deal with the complexity of the Agenda 2030, we have developed a special Model for Inequalities and Poverty Assessment (IPAM). Through the example of 'affordable housing' we provide insight into the situation focusing on sustainable outcomes, including ethical and justice perceptions. The IPAM has proven to be a helpful tool in detecting the different imponderables on the Agenda 2030, assessing the situation, showing gaps and options for ethical SDG actions combining different SDG targets. Supported by expert and expert group interviews, this assessment allows different stakeholders to overview a complex and dynamic SDG challenge (here housing) which is necessary to be involved in an action finding process.

Keywords: affordable housing, inequality, poverty, sustainable development goals

Procedia PDF Downloads 79
884 Complementary Child-Care by Grandparents: Comparisons of Zambia and the Netherlands

Authors: Francis Sichimba

Abstract:

Literature has increasingly acknowledged the important role that grandparents play in child care with evidence highlighting differences in grand-parental investment between countries and cultures. However, there are very few systematic cross cultural studies on grandparents’ participation in child care. Thus, we decided to conduct this study in Zambia and the Netherlands because the two countries differ rather drastically socially and culturally. The objective of this study was to investigate grand-parental involvement in child care in Zambia and the Netherlands. In line with the general objective, four hypotheses were formulated using nationality, family size, social economic status (SES), attachment security as independent variables. The study sample consisted of 411 undergraduate students from the University of Zambia and the University of Leiden. A questionnaire was used to measure grand-parental involvement in child care. Results indicated that grandparent involvement in child care was prevalent in both Zambia and Netherlands. However, as predicted it was found that Zambian grandparents (M = 9.69, SD=2.40) provided more care for their grandchildren compared to their Dutch counterparts (M = 7.80, SD=3.31) even after controlling for parents being alive. Using hierarchical logistic regression analysis the study revealed that nationality and attachment-related avoidance were significant predictors of grand-parental involvement in child care. It was concluded that grand-parental care is a great resource in offering complementary care in both countries.

Keywords: attachment, care, grand-parenting involvement, social economic status

Procedia PDF Downloads 694
883 Vision-Based Collision Avoidance for Unmanned Aerial Vehicles by Recurrent Neural Networks

Authors: Yao-Hong Tsai

Abstract:

Due to the sensor technology, video surveillance has become the main way for security control in every big city in the world. Surveillance is usually used by governments for intelligence gathering, the prevention of crime, the protection of a process, person, group or object, or the investigation of crime. Many surveillance systems based on computer vision technology have been developed in recent years. Moving target tracking is the most common task for Unmanned Aerial Vehicle (UAV) to find and track objects of interest in mobile aerial surveillance for civilian applications. The paper is focused on vision-based collision avoidance for UAVs by recurrent neural networks. First, images from cameras on UAV were fused based on deep convolutional neural network. Then, a recurrent neural network was constructed to obtain high-level image features for object tracking and extracting low-level image features for noise reducing. The system distributed the calculation of the whole system to local and cloud platform to efficiently perform object detection, tracking and collision avoidance based on multiple UAVs. The experiments on several challenging datasets showed that the proposed algorithm outperforms the state-of-the-art methods.

Keywords: unmanned aerial vehicle, object tracking, deep learning, collision avoidance

Procedia PDF Downloads 129
882 Body of Dialectics: Exploring a Dynamic-Adaptational Model of Physical Self-Integrity and the Pursuit of Happiness in a Hostile World

Authors: Noam Markovitz

Abstract:

People with physical disabilities constitute a very large and simultaneously a diverse group of general population, as the term physical disabilities is extensive and covers a wide range of disabilities. Therefore, individuals with physical disabilities are often faced with a new, threatening and stressful reality leading possibly to a multi-crisis in their lives due to the great changes they experience in somatic, socio-economic, occupational and psychological level. The current study seeks to advance understanding of the complex adaptation to physical disabilities by expanding the dynamic-adaptational model of the pursuit of happiness in a hostile world with a new conception of physical self-integrity. Physical self-integrity incorporates an objective dimension, namely physical self-functioning (PSF), and a subjective dimension, namely physical self-concept (PSC). Both of these dimensions constitute an experience of wholeness in the individual’s identification with her or his physical body. The model guiding this work is dialectical in nature and depicts two systems in the individual’s sense of happiness: subjective well-being (SWB) and meaning in life (MIL). Both systems serve as self-adaptive agents that moderate the complementary system of the hostile-world scenario (HWS), which integrates one’s perceived threats to one’s integrity. Thus, in situations of increased HWS, the moderation may take a form of joint activity in which SWB and MIL are amplified or a form of compensation in which one system produces a stronger effect while the other system produces a weaker effect. The current study investigated PSC in relations to SWB and MIL through pleasantness and meanings that are physically or metaphorically grounded in one’s body. In parallel, PSC also relates to HWS by activating representations of inappropriateness, deformation and vulnerability. In view of possibly dialectical positions of opposing and complementary forces within the current model, the current field study that aims to explore PSC as appearing in an independent, cross-sectional, design addressing the model’s variables in a focal group of people with physical disabilities. This study delineated the participation of the PSC in the adaptational functions of SWB and MIL vis-à-vis HWS-related life adversities. The findings showed that PSC could fully complement the main variables of the pursuit of happiness in a hostile world model. The assumed dialectics in the form of a stronger relationship between SWB and MIL in the face of physical disabilities was not supported. However, it was found that when HWS increased, PSC and MIL were strongly linked, whereas PSC and SWB were weakly linked. This highlights the compensatory role of MIL. From a conceptual viewpoint, the current investigation may clarify the role of PSC as an adaptational agent of the individual’s positive health in complementary senses of bodily wholeness. Methodologically, the advantage of the current investigation is the application of an integrative, model-based approach within a specially focused design with a particular relevance to PSC. Moreover, from an applicative viewpoint, the current investigation may suggest how an innovative model may be translated to therapeutic interventions used by clinicians, counselors and practitioners in improving wellness and psychological well-being, particularly among people with physical disabilities.

Keywords: older adults, physical disabilities, physical self-concept, pursuit of happiness in a hostile-world

Procedia PDF Downloads 120
881 Explaining the Changes in Contentious Politics of China: A Comparative Study of Falun Gong and 'Diaosi'

Authors: Larry Lai, Evans Leung

Abstract:

Falun gong is a self-proclaimed religious group that has been under crackdown by Beijing for more than two decades. Diaosi, on the other hand, is an emerging community with members loosely connected on the internet through different online social platforms, centering around the sharing of different hobbies and interests. Diaosi community has been transformed from a potential threat to the Chinese authority for different causes to a pro-government force. This paper seeks to explain the different strategies adopted by the People's Republic of China (PRC) regime in handling these two potential threatening communities. Both communities share some obvious similarities: (1) both have massive nation-wide participation; (2) both have attempted to challenge the PRC's authority through contentious means; (3) both have high level of mobility, online or offline; and (4) both have at first been unnoticed until the threat against the PRC have taken form. But the strategies the PRC endorsed against the communities were, in many ways, different. The question is: if the strategy against Falun Gong has been an effective one, why used other strategies against Diaosi? The authors argue that the main reason for using different strategies lies in the differences between the two communities in terms of (i) the nature of the groups, and (ii) the group dynamics. Lastly, based on this analysis, the authors attempt to explore the possible strategies that the PRC would adopt against the Hong Kong cyber-world political community in light of the latest national security law in Hong Kong.

Keywords: contentious politics, Diaosi, Falun Gong, Hong Kong, People's Republic of China

Procedia PDF Downloads 116
880 Canadian Business Leaders’ Phenomenological Online Education Expansion

Authors: Amna Khaliq

Abstract:

This research project centers on Canadian business leaders’ phenomenological online education expansion by navigating the challenges faced by strategic leaders concerning the expansion of online education in the Canadian higher education sector from a business perspective. The study identifies the problems and opportunities of faculty members’ transition from traditional face-to-face to online instruction, particularly in the context of technology-enhanced learning (TEL), and their influence on the growth strategies of Canadian educational institutions. It explores strategic leaders’ approaches and the impact of emerging technologies to assist with developing and executing business strategies to expand online education in Canada. As online education has gained prominence in the country, this research addresses a relevant business problem for educational institutions. The research employs a phenomenological approach in the qualitative research design to conduct this investigation. The study interviews eighteen faculty members engaged in online education in Canada. The interview data is analyzed to answer the three research questions for strategic leaders to expand online education with higher education institutions in Canada. The recommendations include 1) data privacy, infrastructure, security, and technology, 2) support and training for student engagement, 3) accessibility and inclusion, and 4) collaboration among institutions associated with expanding online education.

Keywords: strategic leadership, Canada, education, technology

Procedia PDF Downloads 34
879 How to Assess the Attractiveness of Business Location According to the Mainstream Concepts of Comparative Advantages

Authors: Philippe Gugler

Abstract:

Goal of the study: The concept of competitiveness has been addressed by economic theorists and policymakers for several hundreds of years, with both groups trying to understand the drivers of economic prosperity and social welfare. The goal of this contribution is to address the major useful theoretical contributions that permit to identify the main drivers of a territory’s competitiveness. We first present the major contributions found in the classical and neo-classical theories. Then, we concentrate on two majors schools providing significant thoughts on the competitiveness of locations: the Economic Geography (EG) School and the International Business (IB) School. Methodology: The study is based on a literature review of the classical and neo-classical theories, on the economic geography theories and on the international business theories. This literature review establishes links between these theoretical mainstreams. This work is based on the academic framework establishing a meaningful literature review aimed to respond to our research question and to develop further research in this field. Results: The classical and neo-classical pioneering theories provide initial insights that territories are different and that these differences explain the discrepancies in their levels of prosperity and standards of living. These theories emphasized different factors impacting the level and the growth of productivity in a given area and therefore the degree of their competitiveness. However, these theories are not sufficient to more precisely identify the drivers and enablers of location competitiveness and to explain, in particular, the factors that drive the creation of economic activities, the expansion of economic activities, the creation of new firms and the attraction of foreign firms. Prosperity is due to economic activities created by firms. Therefore, we need more theoretical insights to scrutinize the competitive advantages of territories or, in other words, their ability to offer the best conditions that enable economic agents to achieve higher rates of productivity in open markets. Two major theories provide, to a large extent, the needed insights: the economic geography theory and the international business theory. The economic geography studies scrutinized in this study from Marshall to Porter, aim to explain the drivers of the concentration of specific industries and activities in specific locations. These activity agglomerations may be due to the creation of new enterprises, the expansion of existing firms, and the attraction of firms located elsewhere. Regarding this last possibility, the international business (IB) theories focus on the comparative advantages of locations as far as multinational enterprises (MNEs) strategies are concerned. According to international business theory, the comparative advantages of a location serves firms not only by exploiting their ownership advantages (mostly as far as market seeking, resource seeking and efficiency seeking investments are concerned) but also by augmenting and/or creating new ownership advantages (strategic asset seeking investments). The impact of a location on the competitiveness of firms is considered from both sides: the MNE’s home country and the MNE’s host country.

Keywords: competitiveness, economic geography, international business, attractiveness of businesses

Procedia PDF Downloads 114
878 Multilocal Youth and the Berlin Digital Industry: Productive Leisure as a Key Factor in European Migration

Authors: Stefano Pelaggi

Abstract:

The research is focused on youth labor and mobility in Berlin. Mobility has become a common denominator in our daily lives but it does not primarily move according to monetary incentives. Labor, knowledge and leisure overlap on this point as cities are trying to attract people who could participate in production of the innovations while the new migrants are experiencing the lifestyle of the host cities. The research will present the project of empirical study focused on Italian workers in the digital industry in Berlin, trying to underline the connection between pleasure, leisure with the choice of life abroad. Berlin has become the epicenter of the European Internet start-up scene, but people suitable to work for digital industries are not moving in Berlin to make a career, most of them are attracted to the city for different reasons. This point makes a clear exception to traditional migration flows, which are always originated from a specific search of employment opportunities or strong ties, usually families, in a place that could guarantee success in finding a job. Even the skilled migration has always been originated from a specific need, finding the right path for a successful professional life. In a society where the lack of free time in our calendar seems to be something to be ashamed, the actors of youth mobility incorporate some categories of experiential tourism within their own life path. Professional aspirations, lifestyle choices of the protagonists of youth mobility are geared towards meeting the desires and aspirations that define leisure. While most of creative work places, in particular digital industries, uses the category of fun as a primary element of corporate policy, virtually extending the time to work for the whole day; more and more people around the world are deciding their path in life, career choices on the basis of indicators linked to the realization of the self, which may include factors like a warm climate, cultural environment. All indicators that are usually eradicated from the hegemonic approach to labor. The interpretative framework commonly used seems to be mostly focused on a dualism between Florida's theories and those who highlight the absence of conflict in his studies. While the flexibility of the new creative industries is minimizing leisure, incorporating elements of leisure itself in work activities, more people choose their own path of life by placing great importance to basic needs, through a gaze on pleasure that is only partially driven by consumption. The multi localism is the co-existence of different identities and cultures that do not conflict because they reject the bind on territory. Local loses its strength of opposition to global, with an attenuation of the whole concept of citizenship, territory and even integration. A similar perspective could be useful to search a new approach to all the studies dedicated to the gentrification process, while studying the new migrations flow.

Keywords: brain drain, digital industry, leisure and gentrification, multi localism

Procedia PDF Downloads 222
877 Managing the Architectural Heritage of Tripoli-Libya: The Red Castle as a Case Study

Authors: Eman Mohamed Ali Elalwani

Abstract:

The Libyan heritage buildings are currently facing a number of crises that pose a threat to their structural integrity, functionality, and overall performance. One of the challenges pertains to the loss of community identity, which has arisen due to the lack of awareness and unconscious behavior of the residents. An additional issue arises from inadequate site management practices, including the implementation of modern techniques and innovative building materials that are incompatible with structural elements, resulting in the deformation of certain sections of the buildings. The security concerns of the city, along with the ongoing civil conflict, fostered a conducive environment for violations, resulting in the vandalism of certain monuments in the city. However, the degradation of this valuable heritage is mainly attributed to the city's neglect and pollution. The elevated groundwater level resulting from pollution has led to erosion in the building's foundations. Mitigating these negative consequences through strategic interventions and rehabilitation is required to preserve this treasure. In order to assist the local community in recovering from those crises, this paper stated a viable strategy for promoting preservation efforts that aimed at safeguarding the heritage sites while also providing guidance to decision-makers and the local community on how to avoid these crises, preserve, enhance, and recognize the significance of the Libyan heritage.

Keywords: cultural heritage, historical buildings, Tripoli’s old city, Red Castle, crises, preservation

Procedia PDF Downloads 94
876 Investigation of Hydrate Formation of Associated Petroleum Gas From Promoter Solutions for the Purpose of Utilization and Reduction of Its Burning

Authors: Semenov Matvei, Stoporev Andrey, Pavelyev Roman, Varfolomeev Mikhail

Abstract:

Gas hydrates are host-guest compounds. Guest molecules can be low molecular weight components of associated petroleum gas (C1-C4 hydrocarbons), carbon dioxide, hydrogen sulfide, and nitrogen. Gas hydrates have a number of unique properties that make them interesting from a technological point of view, for example, for storing hydrocarbon gases in solid form under moderate thermobaric conditions. The hydrate form of gas has a number of advantages, including a significant gas content in the hydrate, relative safety and environmental friendliness of the process. Such technology could be especially useful in cold regions, where hydrate production, storage and transportation can be more energy efficient. Recently, new developments have been proposed that seek to reduce the number of steps to obtain the finished hydrate, for example, using a pressing device/screw inside the reactor. However, the energy consumption required for the hydrate formation process remains a challenge. Thus, the goal of the current work is to study the patterns and mechanisms of the hydrate formation process using small additions of hydrate formation promoters under static conditions. The study of these aspects will help solve the problem of accelerated production of gas hydrates with minimal energy consumption. Currently, new compounds have been developed that can accelerate the formation of methane hydrate with a small amount of promoter in water, not exceeding 0.1% by weight. To test the influence of promoters on the process of hydrate formation, standard experiments are carried out under dynamic conditions with stirring. During such experiments, the time at which hydrate formation begins (induction period), the temperature at which formation begins (supercooling), the rate of hydrate formation, and the degree of conversion of water to hydrate are assessed. This approach helps to determine the most effective compound in comparative experiments with different promoters and select their optimal concentration. These experimental studies made it possible to study the features of the formation of associated petroleum gas hydrate from promoter solutions under static conditions. Phase transformations were studied using high-pressure micro-differential scanning calorimetry under various experimental conditions. Visual studies of the growth mode of methane hydrate depending on the type of promoter were also carried out. The work is an extension of the methodology for studying the effect of promoters on the process of associated petroleum gas hydrate formation in order to identify new ways to accelerate the formation of gas hydrates without the use of mixing. This work presents the results of a study of the process of associated petroleum gas hydrate formation using high-pressure differential scanning micro-calorimetry, visual investigation, gas chromatography, autoclaves study and stability data. It was found that the synthesized compounds multiply the conversion of water into hydrate under static conditions up to 96% due to a change in the growth mechanism of associated petroleum gas hydrate.

Keywords: gas hydrate, gas storage, promotor, associated petroleum gas

Procedia PDF Downloads 31
875 Innocent Victims and Immoral Women: Sex Workers in the Philippines through the Lens of Mainstream Media

Authors: Sharmila Parmanand

Abstract:

This paper examines dominant media representations of prostitution in the Philippines and interrogates sex workers’ interactions with the media establishment. This analysis of how sex workers are constituted in media, often as both innocent victims and immoral actors, contributes to an understanding of public discourse on sex work in the Philippines, where decriminalisation has recently been proposed and sex workers are currently classified as potential victims under anti-trafficking laws but also as criminals under the penal code. The first part is an analysis of media coverage of two prominent themes on prostitution: first, raid and rescue operations conducted by law enforcement; and second, prostitution on military bases and tourism hotspots. As a result of pressure from activists and international donors, these two themes often define the policy conversations on sex work in the Philippines. The discourses in written and televised news reports and documentaries from established local and international media sources that address these themes are explored through content analysis. Conclusions are drawn based on specific terms commonly used to refer to sex workers, how sex workers are seen as performing their cultural roles as mothers and wives, how sex work is depicted, associations made between sex work and public health, representations of clients and managers and ‘rescuers’ such as the police, anti-trafficking organisations, and faith-based groups, and which actors are presumed to be issue experts. Images of how prostitution is used as a metaphor for relations between the Philippines and foreign nations are also deconstructed, along with common tropes about developing world female subjects. In general, sex workers are simultaneously portrayed as bad mothers who endanger their family’s morality but also as long-suffering victims who endure exploitation for the sake of their children. They are also depicted as unclean, drug-addicted threats to public health. Their managers and clients are portrayed as cold, abusive, and sometimes violent, and their rescuers as moral and altruistic agents who are essential for sex workers’ rehabilitation and restoration as virtuous citizens. The second part explores sex workers’ own perceptions of their interactions with media, through interviews with members of the Philippine Sex Workers Collective, a loose organisation of sex workers around the Philippines. They reveal that they are often excluded by media practitioners and that they do not feel that they have space for meaningful self-revelation about their work when they do engage with journalists, who seem to have an overt agenda of depicting them as either victims or women of loose morals. In their assessment, media narratives do not necessarily reflect their lived experiences, and in some cases, coverage of rescues and raid operations endangers their privacy and instrumentalises their suffering. Media representations of sex workers may produce subject positions such as ‘victims’ or ‘criminals’ and legitimize specific interventions while foreclosing other ways of thinking. Further, in light of media’s power to reflect and shape public consciousness, it is a valuable academic and political project to examine whether sex workers are able to assert agency in determining how they are represented.

Keywords: discourse analysis, news media, sex work, trafficking

Procedia PDF Downloads 354
874 The Effect of Artificial Intelligence on the Production of Agricultural Lands and Labor

Authors: Ibrahim Makram Ibrahim Salib

Abstract:

Agriculture plays an essential role in providing food for the world's population. It also offers numerous benefits to countries, including non-food products, transportation, and environmental balance. Precision agriculture, which employs advanced tools to monitor variability and manage inputs, can help achieve these benefits. The increasing demand for food security puts pressure on decision-makers to ensure sufficient food production worldwide. To support sustainable agriculture, unmanned aerial vehicles (UAVs) can be utilized to manage farms and increase yields. This paper aims to provide an understanding of UAV usage and its applications in agriculture. The objective is to review the various applications of UAVs in agriculture. Based on a comprehensive review of existing research, it was found that different sensors provide varying analyses for agriculture applications. Therefore, the purpose of the project must be determined before using UAV technology for better data quality and analysis. In conclusion, identifying a suitable sensor and UAV is crucial to gather accurate data and precise analysis when using UAVs in agriculture.

Keywords: agriculture land, agriculture land loss, Kabul city, urban land expansion, urbanization agriculture yield growth, agriculture yield prediction, explorative data analysis, predictive models, regression models drone, precision agriculture, farmer income

Procedia PDF Downloads 30
873 Effective Validation Model and Use of Mobile-Health Apps for Elderly People

Authors: Leonardo Ramirez Lopez, Edward Guillen Pinto, Carlos Ramos Linares

Abstract:

The controversy brought about by the increasing use of mHealth apps and their effectiveness for disease prevention and diagnosis calls for immediate control. Although a critical topic in research areas such as medicine, engineering, economics, among others, this issue lacks reliable implementation models. However, projects such as Open Web Application Security Project (OWASP) and various studies have helped to create useful and reliable apps. This research is conducted under a quality model to optimize two mHealth apps for older adults. Results analysis on the use of two physical activity monitoring apps - AcTiv (physical activity) and SMCa (energy expenditure) - is positive and ideal. Through a theoretical and practical analysis, precision calculations and personal information control of older adults for disease prevention and diagnosis were performed. Finally, apps are validated by a physician and, as a result, they may be used as health monitoring tools in physical performance centers or any other physical activity. The results obtained provide an effective validation model for this type of mobile apps, which, in turn, may be applied by other software developers that along with medical staff would offer digital healthcare tools for elderly people.

Keywords: model, validation, effective, healthcare, elderly people, mobile app

Procedia PDF Downloads 193
872 Understanding the Selectional Preferences of the Twitter Mentions Network

Authors: R. Sudhesh Solomon, P. Y. K. L. Srinivas, Abhay Narayan, Amitava Das

Abstract:

Users in social networks either unicast or broadcast their messages. At mention is the popular way of unicasting for Twitter whereas general tweeting could be considered as broadcasting method. Understanding the information flow and dynamics within a Social Network and modeling the same is a promising and an open research area called Information Diffusion. This paper seeks an answer to a fundamental question - understanding if the at-mention network or the unicasting pattern in social media is purely random in nature or is there any user specific selectional preference? To answer the question we present an empirical analysis to understand the sociological aspects of Twitter mentions network within a social network community. To understand the sociological behavior we analyze the values (Schwartz model: Achievement, Benevolence, Conformity, Hedonism, Power, Security, Self-Direction, Stimulation, Traditional and Universalism) of all the users. Empirical results suggest that values traits are indeed salient cue to understand how the mention-based communication network functions. For example, we notice that individuals possessing similar values unicast among themselves more often than with other value type people. We also observe that traditional and self-directed people do not maintain very close relationship in the network with the people of different values traits.

Keywords: information diffusion, personality and values, social network analysis, twitter mentions network

Procedia PDF Downloads 347
871 Functional Switching of Serratia marcescens Transcriptional Regulator from Activator to Inhibitor of Quorum Sensing by Exogenous Addition

Authors: Norihiro Kato, Yuriko Takayama

Abstract:

Some gram-negative bacteria enable the simultaneous activation of gene expression involved in N-acylhomoserine lactone (AHL) dependent cell-to-cell communication system. Such regulatory system for the bacterial group behavior is termed as quorum sensing (QS) because a diffusible AHL signal can accumulate around the cell during the increase of the cell density and trigger activation of the sequential QS process. By blocking the QS, the expression of diverse genes related to infection, antibiotic production, and biofilm formation is inhibited. Conditioning of QS by regulation of the DNA-receptor-AHL interaction is a potential target for enhancing host defenses against pathogenicity. We focused on engineered application of transcriptional regulator SpnR produced in opportunistic human pathogen Serratia marcescens. The SpnR can interact with AHL signals at an N-terminal domain and also with a promoter region of a QS target gene at a C-terminal domain. As the initial process of the QS activation, the SpnR forms a complex with the AHL to enhance the expression of pig cluster; the SpnR normally acts as an activator for the expression of the QS-dependent gene. In this research, we attempt to artificially control QS by changing the role of SpnR. The QS-dependent prodigiosin production is expected to inhibit by externally added SpnR in the culture broth of AS-1 strain because the AHL concentration was kept below the threshold by AHL-SpnR complex formation. Maltose-binding protein (MBP)-tagged SpnR (MBP-SpnR) was overexpressed in Escherichia coli and purified using an affinity chromatography equipped with an amylose resin column. The specific interaction between AHL and MBP-SpnR was demonstrated by quartz crystal microbalance (QCM) sensor. AHL with amino end-group was coupled with COOH-terminated self-assembled monolayer prepared on a gold electrode of 27-MHz quartz crystal sensor using water-soluble carbodiimide. After the injection of MBP-SpnR into a cup-type sensor cell filled with the buffer solution, time course of resonant frequency change (ΔFs) was determined. A decrease of ΔFs clearly showed the uptake of MBP-SpnR onto the AHL-immobilized electrode. Furthermore, no binding affinity was observed after the heat-inactivation of MBP-SpnR at 80ºC. These results suggest that MBP-SpnR possesses a specific affinity for AHL. MBP-SpnR was added to the culture medium as an AHL trap to study inhibitory effects on intracellularly accumulated prodigiosin. With approximately 2 µM MBP-SpnR, the amount of prodigiosin induced was half that of the control without any additives. In conclusion, the function of SpnR could be switched by adding it to the cell culture. Exogenously added MBP-SpnR possesses high affinity for AHL derived from cells and acts as an inhibitor of AHL-mediated QS.

Keywords: intracellular signaling, microbial biotechnology, quorum sensing, transcriptional regulator

Procedia PDF Downloads 241