Search results for: persuasive messages
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 451

Search results for: persuasive messages

421 Application of Chinese Remainder Theorem to Find The Messages Sent in Broadcast

Authors: Ayubi Wirara, Ardya Suryadinata

Abstract:

Improper application of the RSA algorithm scheme can cause vulnerability to attacks. The attack utilizes the relationship between broadcast messages sent to the user with some fixed polynomial functions that belong to each user. Scheme attacks carried out by applying the Chinese Remainder Theorem to obtain a general polynomial equation with the same modulus. The formation of the general polynomial becomes a first step to get back the original message. Furthermore, to solve these equations can use Coppersmith's theorem.

Keywords: RSA algorithm, broadcast message, Chinese Remainder Theorem, Coppersmith’s theorem

Procedia PDF Downloads 306
420 A Contrastive Rhetoric Study: The Use of Textual and Interpersonal Metadiscoursal Markers in Persian and English Newspaper Editorials

Authors: Habibollah Mashhady, Moslem Fatollahi

Abstract:

This study tries to contrast the use of metadiscoursal markers in English and Persian Newspaper Editorials as persuasive text types. These markers are linguistic elements in the text which do not add to the propositional content of it, rather they serve to realize the Halliday’s (1985) textual and interpersonal functions of language. At first, some of the most common markers from five subcategories of Text Connectives, Illocution Markers, Hedges, Emphatics, and Attitude Markers were identified in both English and Persian newspapers. Then, the frequency of occurrence of these markers in both English and Persian corpus consisting of 44 randomly selected editorials (18,000 words in each) from several English and Persian newspapers was recorded. After that, using a two-way chi square analysis, the overall x2 obs was found to be highly significant. So, the null hypothesis of no difference was confidently rejected. Finally, in order to determine the contribution of each subcategory to the overall x 2 value, one-way chi square analyses were applied to the individual subcategories. The results indicated that only two of the five subcategories of markers were statistically significant. This difference is then attributed to the differing spirits prevailing in the linguistic communities involved. Regarding the minor research question it was found that, in contrast to English writers, Persian writers are more writer-oriented in their writings.

Keywords: metadiscoursal markers, textual meta-function, interpersonal meta-function, persuasive texts, English and Persian newspaper editorials

Procedia PDF Downloads 547
419 The Inhibition of Sexual Pleasure and Its Associations with Cultural Messages

Authors: Fabiola Trejo Perez, Rolando Diaz Loving

Abstract:

Sexual pleasure consists of the positively valued feelings induced by sexual stimuli, but it is also weighed down by pop-psychological baggage, and subjected to cross-cultural and cross-historical variation. Social and individual interpretations of what can or can’t be considered as pleasurable are intertwined with culture’s predominant values, norms and beliefs. For each culture, sexual norms work as a guide to be followed in order to model socially accepted behaviors. Therefore, cultural messages regarding sexuality are usually directed to restrict men and women from enjoyment, sexual satisfaction and specifically orgasm. Given that sexual pleasure hasn’t been recognized as an accepted topic of open discussion, particularly for women, people have to eventually complement their knowledge using their own experience filling in the blanks from what little has been said. Thus, this research aims to identify which are the particular social messages associated with the easing or inhibition of sexual pleasure. Three hundred Mexican men and women ages 25 to 35 years old answered a self-report survey composed by the Inventory of facilitators and inhibitors of sexual pleasure and the Sexual premises questionnaire via pencil-paper and online. Results show a high endorsement to double standard messages associated with higher levels of sexual pleasure inhibitors like feeling pressured to have sexual activity, guilt and inability to reach orgasm, in contrast with people who endorse more permissive norms and beliefs, feeling connected to their sexual partners and confident with themselves. These results illustrate that the shaping of sexuality, from experience to society, is comprised of an important relationship between culture and sexual pleasure.

Keywords: culture, sexual double standard, sexual norms and beliefs, sexual pleasure

Procedia PDF Downloads 199
418 Wireless Communication in Sunlight

Authors: Karmveer Sheoran

Abstract:

To make wireless communication a vast success is to use sunlight for wireless communication. We can use sunlight in upper atmosphere to encode messages to efficiently use sunlight. This use of sunlight for wireless communication will need encoders which will encode sunlight according to our message and then resultant will be spread in all atmospheres wherever sunlight goes, it will take our messages with it. With minimum requirement of cost in equipment used at the edge of atmosphere is where sunlight is being encoded. In this way a very high efficient wireless communication system can be designed. On receiver side we will need light detectors which will detect sunlight variations and will finally give the information contained i it. Sunlight can be encoded at a very high speed that nobody will be annoyed by flickering. It will be most sophisticated and efficient wireless communication ever designed. There are far more possibilities in this sunlight communication. Let us call it “Sunlight Communication".

Keywords: sunlight communication, emerging trends, wireless communication, wifi

Procedia PDF Downloads 372
417 Social Media Mining with R. Twitter Analyses

Authors: Diana Codat

Abstract:

Tweets' analysis is part of text mining. Each document is a written text. It's possible to apply the usual text search techniques, in particular by switching to the bag-of-words representation. But the tweets induce peculiarities. Some may enrich the analysis. Thus, their length is calibrated (at least as far as public messages are concerned), special characters make it possible to identify authors (@) and themes (#), the tweet and retweet mechanisms make it possible to follow the diffusion of the information. Conversely, other characteristics may disrupt the analyzes. Because space is limited, authors often use abbreviations, emoticons to express feelings, and they do not pay much attention to spelling. All this creates noise that can complicate the task. The tweets carry a lot of potentially interesting information. Their exploitation is one of the main axes of the analysis of the social networks. We show how to access Twitter-related messages. We will initiate a study of the properties of the tweets, and we will follow up on the exploitation of the content of the messages. We will work under R with the package 'twitteR'. The study of tweets is a strong focus of analysis of social networks because Twitter has become an important vector of communication. This example shows that it is easy to initiate an analysis from data extracted directly online. The data preparation phase is of great importance.

Keywords: data mining, language R, social networks, Twitter

Procedia PDF Downloads 151
416 Functionality of Promotional and Advertising Texts: Pragmatic Implications for English-Arabic Translation

Authors: Jamal Gaber Abdalla

Abstract:

In business promotion and advertising, language is used intentionally to create a powerful influence over people and their behavior. In commercial and marketing activities, the choice of language to convey specific messages with the intention of influencing people is pragmatically important. Design and visual content in promotional and advertising texts also have a great persuasive impact on consumers. It is the functional combination of design, language and visual content that helps people to identify a product or service and remember it. Translating promotional and advertising texts between structurally and culturally different languages, such as English and Arabic, usually involves pragmatic/functional shifts that decide the quality of translation. This study explores some of these shifts in translating promotional and advertising texts between English and Arabic and their implications for translation quality. The study is based on a contrastive analysis of data collected from real samples of English-Arabic translations of promotional and advertising texts. The samples cover different promotional and advertising text types and different business domains. The aim is to identify the most recurrent translation shifts and most used translation approaches/strategies that achieve quality in view of the functional nature of promotional and advertising texts and target language culture conventions. The study shows that linguistic shifts and visual shifts are recurrent in English-Arabic translations of promotional and advertising texts. The study also shows that the most commonly used translation approaches/strategies are functional translation, domestication, communicative translation.

Keywords: advertising, Arabic, English, functional translation, promotion

Procedia PDF Downloads 330
415 Research Repository System (RRS) for Academics

Authors: Ajayi Olusola Olajide, O. Ojeyinka Taiwo, Adeolara Oluwawemimo Janet, Isheyemi Olufemi Gabriel, Lawal Muideen Adekunle

Abstract:

In an academic world where research work is the tool for promotion and elevation to higher cadres, the quest for a system that secure researchers’ work, monitor as well as alert researchers of pending academic research work, cannot be over-emphasized. This study describes how a research repository system for academics is designed. The invention further relates to a system for archiving any paperwork and journal that comprises of a database for storing all researches. It relates to a method for users to communicate through messages which will also allow reviewing all the messages. To create this research repository system, PHP and MySQL were married together for the system implementation.

Keywords: research, repository, academic, archiving, secure, system, implementation

Procedia PDF Downloads 559
414 Hidden Truths of Advertising: An Unspoken Fact in Making Ethical Diffusions

Authors: Mustafa Hyder, Shamaila Burney, Roohi Mumtaz

Abstract:

The aim of this study is to determine the consequences of silent or hidden messages and their effectiveness in deteriorating or altering our ethical norms and values. The study also focuses the repercussions of subconscious messages and possibilities of ethical diffusion in our society. The research based on the question that what are the different factors that motivate advertisers to include subliminal messages and how much these unspoken truths affecting our ethical values silently. What are the causes and effects of the subliminal messages in general and the level of ethical diffusion and its acceptance? The concept of advertising is to promote and highlight the salient features of the products and services, a company offers. Advertising is the best option nowadays to convey the related information to the consumers so that they attracted more towards the products or services proposed. The other thing advertisers concentrate, is the psychological characteristics using to persuade consumers choice. Using skills and tactics of advertising to promote a product in such a way that it creates a sensation, controversy or brand consciousness among the consumers or customers. The purpose to have increase purchase or to gain popularity in comparison to their competitors, they sometimes use such tactics and techniques, which is highly unethical and immoral for any society. These kinds of stuff used very smartly within the ads that only the conscious mind subconsciously catches the meaning of those glittery images, posters, phrases, tag lines and non-verbal clues. This study elucidates the subliminal advertising their repercussions and impact on consumer’s behaviour in our society with the help of few ads embedded subliminally and the trends of profitability. The methods used to accomplish our research are based on qualitative research along with the research articles, books and feedback from focused groups regarding the topic. The basic objective of this study was that, there is no significant change in the behaviour and attitude observed. These messages capture very short-term life on the viewer’s subconscious mind but in long run people get used to it and hence not only have the diffusion power but also has the high level of acceptance as well that reflects mostly through their social behaviours and attitudes.

Keywords: ethical diffusion, subconscious, subliminal advertising, unspoken facts

Procedia PDF Downloads 306
413 Narratives in Science as Covert Prestige Indicators

Authors: Zinaida Shelkovnikova

Abstract:

The language in science is changing and meets the demands of the society. We shall argue that in the varied modern world there are important reasons for the integration of narratives into scientific discourse. As far as nowadays scientists are faced with extremely prompt science development and progress; modern scientific society lives in the conditions of tough competition. The integration of narratives into scientific discourse is thus a good way to prompt scientific experience to different audiences and to express covert prestige of the discourse. Narratives also form the identity of the persuasive narrator. Using the narrative approach to the scientific discourse analysis we reveal the sociocultural diversity of the scientists. If you want to attract audience’s attention to your scientific research, narratives should be integrated into your scientific discourse. Those who understand this consistent pattern are considered the leading scientists. Taking into account that it is prestigious to be renowned, celebrated in science, it is a covert prestige to write narratives in science. We define a science narrative as the intentional, consequent, coherent, event discourse or a discourse fragment, which contains the author creativity, in some cases intrigue, and gives mostly qualitative information (compared with quantitative data) in order to provide maximum understanding of the research. Science narratives also allow the effective argumentation and consequently construct the identity of the persuasive narrator. However, skills of creating appropriate scientific discourse reflect the level of prestige. In order to teach postgraduate students to be successful in English scientific writing and to be prestigious in the scientific society, we have defined the science narrative and outlined its main features and characteristics. Narratives contribute to audience’s involvement with the narrator and his/her narration. In general, the way in which a narrative is performed may result in (limited or greater) contact with the audience. To gain these aim authors use emotional fictional elements; descriptive elements: adjectives; adverbs; comparisons and so on; author’s evaluative elements. Thus, the features of science narrativity are the following: descriptive tools; authors evaluation; qualitative information exceeds the quantitative data; facts take the event status; understandability; accessibility; creativity; logics; intrigue; esthetic nature; fiction. To conclude, narratives function covert prestige of the scientific discourse and shape the identity of the persuasive scientist.

Keywords: covert prestige, narrativity, scientific discourse, scientific narrative

Procedia PDF Downloads 375
412 Transitivity, Mood and Modality Analysis in Malaysian News Headlines on Healthy Eating

Authors: Faith Fang Xi Ooi, Kam-Fong Lee

Abstract:

Headlines are generally the summary of the content of news articles. With the added influence of hectic lifestyles, readers may rely solely on the headlines for information. In the media, what is reported concerning health issues are government responses and community involvement. There is a need for a call to action to curb health issues and not just reporting on what the government is doing about these health-related issues. In other words, linguistic elements of persuasive communicative function should be realized when reporting on health issues. Hence, this paper aims at identifying and analyzing the transitivity, Mood and Modality systems in two hundred news headlines from two Malaysian online news portals, namely The Star Online and New Straits Times. This study employs the purposive sampling method to obtain the news headlines on healthy eating using the search keyword ‘healthy eating’ and is based on Halliday’s Systemic Functional Linguistics (SFL) framework. The results show that the Material process dominates the process types along with its participants of Scope and Goal. The mood type that constitutes most of the headlines in the two newspapers is the declarative mood. Moreover, for Modality, the median Probability constitutes the highest in the headlines on healthy eating. This study contributes to the implications of being a source of reference for news writers and producers in constructing news headlines and for health campaign strategists to realize the persuasive appeals to influence behaviors and attitudes of the public towards healthy eating.

Keywords: healthy eating, modality, mood, news headlines, SFL

Procedia PDF Downloads 146
411 The Use of Mobile Phones as a Direct Marketing Tool and Consumer Attitudes

Authors: Abdülcelil Mücahid Zengin, Göksel Şimşek

Abstract:

Mobile phones are one of the direct marketing tools that can be used to reach todays hard to reach consumers. Mobile phones are very personal devices and they are always carried with the consumer, where ever they go. This creates an opportunity for marketers to create personalized marketing communications messages and send them on the right time and place. This study examines consumer attitudes toward mobile marketing, especially toward SMS marketing. Unlike similar studies, this study does not focus on the young, but includes consumers who are in the 18-70 age range to the field research. According to the results, it has been concluded that most participants think SMS marketing is disturbing. Most important problems with SMS marketing are about getting subscribed to message lists without the permission of the receiver; the high number of messages sent; and the irrelevancy of the message content.

Keywords: direct marketing, mobile phones mobile marketing, sms advertising, sms marketing

Procedia PDF Downloads 313
410 Bioarm, a Prothesis without Surgery

Authors: J. Sagouis, A. Chamel, E. Carre, C. Casasreales, G. Rudnik, M. Cerdan

Abstract:

Robotics provides answers to amputees. The most expensive solutions surgically connect the prosthesis to nerve endings. There are also several types of non-invasive technologies that recover nerve messages passing through the muscles. After analyzing these messages, myoelectric prostheses perform the desired movement. The main goal is to avoid all surgeries, which can be heavy and offer cheaper alternatives. For an amputee, we use valid muscles to recover the electrical signal involved in a muscle movement. EMG sensors placed on the muscle allows us to measure a potential difference, which our program transforms into control for a robotic arm with two degrees of freedom. We have shown the feasibility of non-invasive prostheses with two degrees of freedom. Signal analysis and an increase in degrees of freedom is still being improved.

Keywords: prosthesis, electromyography (EMG), robotic arm, nerve message

Procedia PDF Downloads 230
409 The Influence of Group Heuristics on Corporate Social Responsibility Messages Designed to Reduce Illegal Consumption

Authors: Kate Whitman, Zahra Murad, Joe Cox

Abstract:

Corporate social responsibility projects are suggested to motivate consumers to reciprocate good corporate deeds with their custom. When the projects benefit the ingroup vs the outgroup, such as locals rather than foreigners, the effect on reciprocity is suggested to be more powerful. This may be explained by group heuristics, a theory which indicates that favours to the ingroup (but not outgroup) are expected to be reciprocated, resulting in ingroup favouritism. The heuristic is theorised to explain prosocial behaviours towards the ingroup. The aim of this study is to test whether group heuristics similarly explain a reduction in antisocial behaviours towards the ingroup, measured by illegal consumption which harms a group that consumers identify with. In order to test corporate social responsibility messages, a population of interested consumers is required, so sport fans are recruited. A pre-registered experiment (N = 600) tests the influence of a focused “team” benefiting message vs a broader “sport” benefiting message on change in illegal intentions. The influence of group (team) identity and trait reciprocity on message efficacy are tested as measures of group heuristics. Results suggest that the “team” treatment significantly reduces illegal consumption intentions. The “sport” treatment interacted with the team identification measure, increasing illegal consumption intentions for low team identification individuals. The results suggest that corporate social responsibility may be effective in reducing illegal consumption, if the messages are delivered directly from brands to consumers with brand identification. Messages delivered on the behalf of an industry may have an undesirable effect.

Keywords: live sports, piracy, counterfeiting, corporate social responsibility, group heuristics, ingroup bias, team identification

Procedia PDF Downloads 50
408 The Effect of Artificial Intelligence on Marketing Distribution

Authors: Yousef Wageh Nagy Fahmy

Abstract:

Mobile phones are one of the direct marketing tools used to reach today's hard-to-reach consumers. Cell phones are very personal devices and you can have them with you anytime, anywhere. This offers marketers the opportunity to create personalized marketing messages and send them at the right time and place. The study examined consumer attitudes towards mobile marketing, particularly SMS marketing. Unlike similar studies, this study does not focus on young people, but includes consumers between the ages of 18 and 70 in the field study.The results showed that the majority of participants found SMS marketing disruptive. The biggest problems with SMS marketing are subscribing to message lists without the recipient's consent; large number of messages sent; and the irrelevance of message content

Keywords: direct marketing, mobile phones mobile marketing, sms advertising, marketing sponsorship, marketing communication theories, marketing communication tools

Procedia PDF Downloads 36
407 Multimodal Analysis of News Magazines' Front-Page Portrayals of the US, Germany, China, and Russia

Authors: Alena Radina

Abstract:

On the global stage, national image is shaped by historical memory of wars and alliances, government ideology and particularly media stereotypes which represent countries in positive or negative ways. News magazine covers are a key site for national representation. The object of analysis in this paper is the portrayals of the US, Germany, China, and Russia in the front pages and cover stories of “Time”, “Der Spiegel”, “Beijing Review”, and “Expert”. Political comedy helps people learn about current affairs even if politics is not their area of interest, and thus satire indirectly sets the public agenda. Coupled with satirical messages, cover images and the linguistic messages embedded in the covers become persuasive visual and verbal factors, known to drive about 80% of magazine sales. Preliminary analysis identified satirical elements in magazine covers, which are known to influence and frame understandings and attract younger audiences. Multimodal and transnational comparative framing analyses lay the groundwork to investigate why journalists, editors and designers deploy certain frames rather than others. This research investigates to what degree frames used in covers correlate with frames within the cover stories and what these framings can tell us about media professionals’ representations of their own and other nations. The study sample includes 32 covers consisting of two covers representing each of the four chosen countries from the four magazines. The sampling framework considers two time periods to compare countries’ representation with two different presidents, and between men and women when present. The countries selected for analysis represent each category of the international news flows model: the core nations are the US and Germany; China is a semi-peripheral country; and Russia is peripheral. Examining textual and visual design elements on the covers and images in the cover stories reveals not only what editors believe visually attracts the reader’s attention to the magazine but also how the magazines frame and construct national images and national leaders. The cover is the most powerful editorial and design page in a magazine because images incorporate less intrusive framing tools. Thus, covers require less cognitive effort of audiences who may therefore be more likely to accept the visual frame without question. Analysis of design and linguistic elements in magazine covers helps to understand how media outlets shape their audience’s perceptions and how magazines frame global issues. While previous multimodal research of covers has focused mostly on lifestyle magazines or newspapers, this paper examines the power of current affairs magazines’ covers to shape audience perception of national image.

Keywords: framing analysis, magazine covers, multimodality, national image, satire

Procedia PDF Downloads 75
406 Communication Aesthetics of Techno-Scenery and Lighting in Bolanle Austen-Peters Queen Moremi the Musical

Authors: Badeji Adebayo John

Abstract:

Technology has immense contribution in every aspect of human endeavor; it has not only made work easier but also provided exhilarating impression in the mind of the people. Theatre is not exempted from the multifaceted influence of technology on phenomenon. Therefore, theatre performances have experienced the excellence of technology in the contemporary era such that audiences have unforgettable experiences after seeing theatre performances. Some of these technological advancements that have amplified the aesthetics of performances in the theatre are techno-scenery (3D mapping) and lighting. In view of this, the objective of this study is to explore how techno-scenery and lighting technologies were used to communicate messages in the performance of Queen Moremi the Musical. In so doing, Participant-Observation Method and Content Analysis are adopted. Berlo’s model of communication is also employed to explain the communicative aesthetics of these theatre technologies in the performance. Techno-scenery and lighting are communication media modifier that facilitates audiences’ comprehension of the messages in the performance of Queen Moremi the Musical. They also create clear motion pictures of the setting which the performers cannot communicate in their acting, dances and singing, to ease the audiences’ decoding of messages that the performers are sending to the audience. Therefore, consistent incorporation of these technologies to theatre performances will facilitate easy flow of communication in-between the performers who are the sender, the message which is the performance and the audience who are the receiver.

Keywords: communication, aesthetics, techno-scenery, lighting, musical

Procedia PDF Downloads 54
405 Spanish Language Violence Corpus: An Analysis of Offensive Language in Twitter

Authors: Beatriz Botella-Gil, Patricio Martínez-Barco, Lea Canales

Abstract:

The Internet and ICT are an integral element of and omnipresent in our daily lives. Technologies have changed the way we see the world and relate to it. The number of companies in the ICT sector is increasing every year, and there has also been an increase in the work that occurs online, from sending e-mails to the way companies promote themselves. In social life, ICT’s have gained momentum. Social networks are useful for keeping in contact with family or friends that live far away. This change in how we manage our relationships using electronic devices and social media has been experienced differently depending on the age of the person. According to currently available data, people are increasingly connected to social media and other forms of online communication. Therefore, it is no surprise that violent content has also made its way to digital media. One of the important reasons for this is the anonymity provided by social media, which causes a sense of impunity in the victim. Moreover, it is not uncommon to find derogatory comments, attacking a person’s physical appearance, hobbies, or beliefs. This is why it is necessary to develop artificial intelligence tools that allow us to keep track of violent comments that relate to violent events so that this type of violent online behavior can be deterred. The objective of our research is to create a guide for detecting and recording violent messages. Our annotation guide begins with a study on the problem of violent messages. First, we consider the characteristics that a message should contain for it to be categorized as violent. Second, the possibility of establishing different levels of aggressiveness. To download the corpus, we chose the social network Twitter for its ease of obtaining free messages. We chose two recent, highly visible violent cases that occurred in Spain. Both of them experienced a high degree of social media coverage and user comments. Our corpus has a total of 633 messages, manually tagged, according to the characteristics we considered important, such as, for example, the verbs used, the presence of exclamations or insults, and the presence of negations. We consider it necessary to create wordlists that are present in violent messages as indicators of violence, such as lists of negative verbs, insults, negative phrases. As a final step, we will use automatic learning systems to check the data obtained and the effectiveness of our guide.

Keywords: human language technologies, language modelling, offensive language detection, violent online content

Procedia PDF Downloads 99
404 Destination Port Detection For Vessels: An Analytic Tool For Optimizing Port Authorities Resources

Authors: Lubna Eljabu, Mohammad Etemad, Stan Matwin

Abstract:

Port authorities have many challenges in congested ports to allocate their resources to provide a safe and secure loading/ unloading procedure for cargo vessels. Selecting a destination port is the decision of a vessel master based on many factors such as weather, wavelength and changes of priorities. Having access to a tool which leverages AIS messages to monitor vessel’s movements and accurately predict their next destination port promotes an effective resource allocation process for port authorities. In this research, we propose a method, namely, Reference Route of Trajectory (RRoT) to assist port authorities in predicting inflow and outflow traffic in their local environment by monitoring Automatic Identification System (AIS) messages. Our RRoT method creates a reference route based on historical AIS messages. It utilizes some of the best trajectory similarity measure to identify the destination of a vessel using their recent movement. We evaluated five different similarity measures such as Discrete Fr´echet Distance (DFD), Dynamic Time Warping (DTW), Partial Curve Mapping (PCM), Area between two curves (Area) and Curve length (CL). Our experiments show that our method identifies the destination port with an accuracy of 98.97% and an fmeasure of 99.08% using Dynamic Time Warping (DTW) similarity measure.

Keywords: spatial temporal data mining, trajectory mining, trajectory similarity, resource optimization

Procedia PDF Downloads 90
403 WormHex: Evidence Retrieval Tool of Social Media from Volatile Memory

Authors: Norah Almubairik, Wadha Almattar, Amani Alqarni

Abstract:

Social media applications are increasingly being used in our everyday communications. These applications utilise end-to-end encryption mechanisms, which make them suitable tools for criminals to exchange messages. These messages are preserved in the volatile memory until the device is restarted. Therefore, volatile forensics has become an important branch of digital forensics. In this study, the WormHex tool was developed to inspect the memory dump files of Windows and Mac-based workstations. The tool supports digital investigators to extract valuable data written in Arabic and English through web-based WhatsApp and Twitter applications. The results verify that social media applications write their data into the memory regardless of the operating system running the application, with there being no major differences between Windows and Mac.

Keywords: volatile memory, REGEX, digital forensics, memory acquisition

Procedia PDF Downloads 155
402 Study on the Efficient Routing Algorithms in Delay-Tolerant Networks

Authors: Si-Gwan Kim

Abstract:

In Delay Tolerant Networks (DTN), there may not exist an end-to-end path between source and destination at the time of message transmission. Employing ‘Store Carry and Forward’ delivery mechanism for message transmission in such networks usually incurs long message delays. In this paper, we present the modified Binary Spray and Wait (BSW) routing protocol that enhances the performance of the original one. Our proposed algorithm adjusts the number of forward messages depending on the number of neighbor nodes. By using beacon messages periodically, the number of neighbor nodes can be managed. The simulation using ONE simulator results shows that our modified version gives higher delivery ratio and less latency as compared to BSW.

Keywords: delay tolerant networks, store carry and forward, one simulator, binary spray and wait

Procedia PDF Downloads 101
401 Effectuation of Interactive Advertising: An Empirical Study on Egyptian Tourism Advertising

Authors: Bassant Eyada, Hanan Atef Kamal Eldin

Abstract:

Advertising has witnessed a diffusion and development in technology to promote products and services, increasingly relying on the interactivity between the consumer and the advertisement. Consumers seek, self-select, process, use and respond to the information provided, hence, providing the potential to increase consumers’ efficiency, involvement, trustworthiness, response, and satisfaction towards the advertised product or service. The power of interactive personalized messages shifts the focus of traditional advertising to more concentrated consumers, sending out tailored messages with more specific individual needs and preferences, defining the importance and relevance that consumers attach to the advertisement, therefore, enhancing the ability to persuade, and the quality of decision making. In this paper, the researchers seek to discuss and explore innovative interactive advertising, its’ effectiveness on consumers and the benefits the advertisements provide, through designing an interactive ad to be placed at the international airports promoting tourism in Egypt.

Keywords: advertising, effectiveness, interactivity, Egypt

Procedia PDF Downloads 286
400 A New Method for Fault Detection

Authors: Mehmet Hakan Karaata, Ali Hamdan, Omer Yusuf Adam Mohamed

Abstract:

Consider a distributed system that delivers messages from a process to another. Such a system is often required to deliver each message to its destination regardless of whether or not the system components experience arbitrary forms of faults. In addition, each message received by the destination must be a message sent by a system process. In this paper, we first identify the necessary and sufficient conditions to detect some restricted form of Byzantine faults referred to as modifying Byzantine faults. An observable form of a Byzantine fault whose effect is limited to the modification of a message metadata or content, timing and omission faults, and message replay is referred to as a modifying Byzantine fault. We then present a distributed protocol to detect modifying Byzantine faults using optimal number of messages over node-disjoint paths.

Keywords: Byzantine faults, distributed systems, fault detection, network protocols, node-disjoint paths

Procedia PDF Downloads 421
399 An Approach to Secure Mobile Agent Communication in Multi-Agent Systems

Authors: Olumide Simeon Ogunnusi, Shukor Abd Razak, Michael Kolade Adu

Abstract:

Inter-agent communication manager facilitates communication among mobile agents via message passing mechanism. Until now, all Foundation for Intelligent Physical Agents (FIPA) compliant agent systems are capable of exchanging messages following the standard format of sending and receiving messages. Previous works tend to secure messages to be exchanged among a community of collaborative agents commissioned to perform specific tasks using cryptosystems. However, the approach is characterized by computational complexity due to the encryption and decryption processes required at the two ends. The proposed approach to secure agent communication allows only agents that are created by the host agent server to communicate via the agent communication channel provided by the host agent platform. These agents are assumed to be harmless. Therefore, to secure communication of legitimate agents from intrusion by external agents, a 2-phase policy enforcement system was developed. The first phase constrains the external agent to run only on the network server while the second phase confines the activities of the external agent to its execution environment. To implement the proposed policy, a controller agent was charged with the task of screening any external agent entering the local area network and preventing it from migrating to the agent execution host where the legitimate agents are running. On arrival of the external agent at the host network server, an introspector agent was charged to monitor and restrain its activities. This approach secures legitimate agent communication from Man-in-the Middle and Replay attacks.

Keywords: agent communication, introspective agent, isolation of agent, policy enforcement system

Procedia PDF Downloads 275
398 Effectuation of Interactive Advertising: An Empirical Study on Egyptian Tourism Advert

Authors: Bassant Eyada, Hanan Atef Kamal Eldin

Abstract:

Advertising has witnessed a diffusion and development in technology to promote products and services, increasingly relying on the interactivity between the consumer and the advertisement. Consumers seek, self-select, process, use and respond to the information provided, hence, providing the potential to increase consumers’ efficiency, involvement, trustworthiness, response and satisfaction towards the advertised product or service. The power of interactive personalized messages shifts the focus of traditional advertising to more concentrated consumers, sending out tailored messages with more specific individual needs and preferences, defining the importance and relevance that consumers attach to the advertisement, therefore, enhancing the ability to persuade, and the quality of decision making. In this paper, the researchers seek to discuss and explore innovative interactive advertising, its’ effectiveness on consumers and the benefits the advertisements provide, through designing an interactive ad to be placed at the international airports promoting tourism in Egypt.

Keywords: advertising, effectiveness, interactivity, Egypt

Procedia PDF Downloads 260
397 Perception of Young Consumers about SMS Marketing in Pakistan

Authors: Raja Irfan Sabir, Nargis Dewan

Abstract:

This study examines the role of SMS marketing on perception of young consumers and its impact on society by keeping in mind the culture, values and communication norms of Pakistan. The study focused on the consumer’s perception towards SMS Marketing of Entertainment, Informativeness, Credibility and Irritation factor which can have influence on the perception of young consumer positively or negatively. It’s also observed that some of the message contents do have good or bad impact on the society’s norm. The result derived from a sample of 200 consumers indicate that communication medium ‘SMS marketing’ positively influence the consumers perception but the messages that consumers receive from these companies are against the social norms and have bad impact. So Pakistani entrepreneurs of cellular industries should be more aware that there is need to somehow modify their message content strategies according to culture, norms and values of our society and environmental situation.

Keywords: SMS marketing, messages content, consumers’ perception, cultural values and norms

Procedia PDF Downloads 369
396 Hybrid Method for Smart Suggestions in Conversations for Online Marketplaces

Authors: Yasamin Rahimi, Ali Kamandi, Abbas Hoseini, Hesam Haddad

Abstract:

Online/offline chat is a convenient approach in the electronic markets of second-hand products in which potential customers would like to have more information about the products to fill the information gap between buyers and sellers. Online peer in peer market is trying to create artificial intelligence-based systems that help customers ask more informative questions in an easier way. In this article, we introduce a method for the question/answer system that we have developed for the top-ranked electronic market in Iran called Divar. When it comes to secondhand products, incomplete product information in a purchase will result in loss to the buyer. One way to balance buyer and seller information of a product is to help the buyer ask more informative questions when purchasing. Also, the short time to start and achieve the desired result of the conversation was one of our main goals, which was achieved according to A/B tests results. In this paper, we propose and evaluate a method for suggesting questions and answers in the messaging platform of the e-commerce website Divar. Creating such systems is to help users gather knowledge about the product easier and faster, All from the Divar database. We collected a dataset of around 2 million messages in Persian colloquial language, and for each category of product, we gathered 500K messages, of which only 2K were Tagged, and semi-supervised methods were used. In order to publish the proposed model to production, it is required to be fast enough to process 10 million messages daily on CPU processors. In order to reach that speed, in many subtasks, faster and simplistic models are preferred over deep neural models. The proposed method, which requires only a small amount of labeled data, is currently used in Divar production on CPU processors, and 15% of buyers and seller’s messages in conversations is directly chosen from our model output, and more than 27% of buyers have used this model suggestions in at least one daily conversation.

Keywords: smart reply, spell checker, information retrieval, intent detection, question answering

Procedia PDF Downloads 156
395 Modifying Byzantine Fault Detection Using Disjoint Paths

Authors: Mehmet Hakan Karaata, Ali Hamdan, Omer Yusuf Adam Mohamed

Abstract:

Consider a distributed system that delivers messages from a process to another. Such a system is often required to deliver each message to its destination regardless of whether or not the system components experience arbitrary forms of faults. In addition, each message received by the destination must be a message sent by a system process. In this paper, we first identify the necessary and sufficient conditions to detect some restricted form of Byzantine faults referred to as modifying Byzantine faults. An observable form of a Byzantine fault whose effect is limited to the modification of a message metadata or content, timing and omission faults, and message replay is referred to as a modifying Byzantine fault. We then present a distributed protocol to detect modifying Byzantine faults using optimal number of messages over node-disjoint paths.

Keywords: Byzantine faults, distributed systems, fault detection, network pro- tocols, node-disjoint paths

Procedia PDF Downloads 534
394 Impacts on Regional Economy by the Upgrade of Railway Infrastructure

Authors: Dimitrios J. Dimitriou, Maria F. Sartzetaki

Abstract:

Transport is often the key driver for growth, especially for regions providing key opportunities for connectivity between busy areas and mature markets. Even though the benefits of transports are essential, limited research is published regarding the linkage of inland transport systems and other business sectors, the spillover effects on regional economy and the overall contribution to regional development. This paper deals with the determination of the key socioeconomic benefits on regions caused by the upgrade and the modernization of a railway corridor. The analysis framework is following a four-step analysis, providing key messages to planners, managers and decision makers. The provided case study is the upgrade of the railway corridor in North Greece, which is a very sensitive region suffering long time from economic stress. The application results are essential for comparisons with other destinations and provide key messages regarding the relationship of railway and economic development.

Keywords: regional development, economic impact assessment variables, railway infrastructure, strategic planning

Procedia PDF Downloads 279
393 Secure Automatic Key SMS Encryption Scheme Using Hybrid Cryptosystem: An Approach for One Time Password Security Enhancement

Authors: Pratama R. Yunia, Firmansyah, I., Ariani, Ulfa R. Maharani, Fikri M. Al

Abstract:

Nowadays, notwithstanding that the role of SMS as a means of communication has been largely replaced by online applications such as WhatsApp, Telegram, and others, the fact that SMS is still used for certain and important communication needs is indisputable. Among them is for sending one time password (OTP) as an authentication media for various online applications ranging from chatting, shopping to online banking applications. However, the usage of SMS does not pretty much guarantee the security of transmitted messages. As a matter of fact, the transmitted messages between BTS is still in the form of plaintext, making it extremely vulnerable to eavesdropping, especially if the message is confidential, for instance, the OTP. One solution to overcome this problem is to use an SMS application which provides security services for each transmitted message. Responding to this problem, in this study, an automatic key SMS encryption scheme was designed as a means to secure SMS communication. The proposed scheme allows SMS sending, which is automatically encrypted with keys that are constantly changing (automatic key update), automatic key exchange, and automatic key generation. In terms of the security method, the proposed scheme applies cryptographic techniques with a hybrid cryptosystem mechanism. Proofing the proposed scheme, a client to client SMS encryption application was developed using Java platform with AES-256 as encryption algorithm, RSA-768 as public and private key generator and SHA-256 for message hashing function. The result of this study is a secure automatic key SMS encryption scheme using hybrid cryptosystem which can guarantee the security of every transmitted message, so as to become a reliable solution in sending confidential messages through SMS although it still has weaknesses in terms of processing time.

Keywords: encryption scheme, hybrid cryptosystem, one time password, SMS security

Procedia PDF Downloads 105
392 Cognition in Context: Investigating the Impact of Persuasive Outcomes across Face-to-Face, Social Media and Virtual Reality Environments

Authors: Claire Tranter, Coral Dando

Abstract:

Gathering information from others is a fundamental goal for those concerned with investigating crime, and protecting national and international security. Persuading an individual to move from an opposing to converging viewpoint, and an understanding on the cognitive style behind this change can serve to increase understanding of traditional face-to-face interactions, as well as synthetic environments (SEs) often used for communication across varying geographical locations. SEs are growing in usage, and with this increase comes an increase in crime being undertaken online. Communication technologies can allow people to mask their real identities, supporting anonymous communication which can raise significant challenges for investigators when monitoring and managing these conversations inside SEs. To date, the psychological literature concerning how to maximise information-gain in SEs for real-world interviewing purposes is sparse, and as such this aspect of social cognition is not well understood. Here, we introduce an overview of a novel programme of PhD research which seeks to enhance understanding of cross-cultural and cross-gender communication in SEs for maximising information gain. Utilising a dyadic jury paradigm, participants interacted with a confederate who attempted to persuade them to the opposing verdict across three distinct environments: face-to-face, instant messaging, and a novel virtual reality environment utilising avatars. Participants discussed a criminal scenario, acting as a two-person (male; female) jury. Persuasion was manipulated by the confederate claiming an opposing viewpoint (guilty v. not guilty) to the naïve participants from the outset. Pre and post discussion data, and observational digital recordings (voice and video) of participant’ discussion performance was collected. Information regarding cognitive style was also collected to ascertain participants need for cognitive closure and biases towards jumping to conclusions. Findings revealed that individuals communicating via an avatar in a virtual reality environment reacted in a similar way, and thus equally persuasive, when compared to individuals communicating face-to-face. Anonymous instant messaging however created a resistance to persuasion in participants, with males showing a significant decline in persuasive outcomes compared to face to face. The findings reveal new insights particularly regarding the interplay of persuasion on gender and modality, with anonymous instant messaging enhancing resistance to persuasion attempts. This study illuminates how varying SE can support new theoretical and applied understandings of how judgments are formed and modified in response to advocacy.

Keywords: applied cognition, persuasion, social media, virtual reality

Procedia PDF Downloads 124