Search results for: secret sharing
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 1127

Search results for: secret sharing

677 The Trend of Competitive Balance in Turkish Football Super League

Authors: Tugbay Inan

Abstract:

Competitive balance is known to have an important effect in determining the result of football matches. The degree of competitiveness is referred as competitive balance in football. Sports economics are the extent to which overall league attendances will be raised by measures, such as media effect, home advantage, revenue sharing, which aim to improve competitive balance. The purpose of present study was to measure the competitive balance in the football league of Turkey. In this study, by using long term competitive balance analysis, some facing problems and precautions were discussed through the seasons (1987-2014) in Turkish Football Super League (TSL). Within the practice of this study, The way that competitive balance level followed was determined in the history of super league (27 years). Based on this purpose, C5 Competitive Balance Index (C5CBI) and a Herfindahl index of competitive balance (HICB) were used. Finally, it is seen that in Super League, competitive balance factor took place time to time, however in total, a view apart from competitive balance is obviously seen.

Keywords: competitive balance, turkish football, c5 competitive balance index, Herfindahl-Hirschman Index

Procedia PDF Downloads 532
676 Podcasting as an Instructional Method: Case Study of a School Psychology Class

Authors: Jeff A. Tysinger, Dawn P. Tysinger

Abstract:

There has been considerable growth in online learning. Researchers continue to explore the impact various methods of delivery. Podcasting is a popular method for sharing information. The purpose of this study was to examine the impact of student motivation and the perception of the acquisition of knowledge in an online environment of a skill-based class. 25 students in a school psychology graduate class completed a pretest and posttest examining podcast use and familiarity. In addition, at the completion of the course they were administered a modified version of the Instructional Materials Motivation Survey. The four subscales were examined (attention, relevance, confidence, and satisfaction). Results indicated that students are motivated, they perceive podcasts as positive instructional tools, and students are successful in acquiring the needed information. Additional benefits of using podcasts and recommendations in school psychology training are discussed.

Keywords: motivation, online learning, pedagogy, podcast

Procedia PDF Downloads 97
675 A Framework for Review Spam Detection Research

Authors: Mohammadali Tavakoli, Atefeh Heydari, Zuriati Ismail, Naomie Salim

Abstract:

With the increasing number of people reviewing products online in recent years, opinion sharing websites has become the most important source of customers’ opinions. Unfortunately, spammers generate and post fake reviews in order to promote or demote brands and mislead potential customers. These are notably destructive not only for potential customers but also for business holders and manufacturers. However, research in this area is not adequate, and many critical problems related to spam detection have not been solved to date. To provide green researchers in the domain with a great aid, in this paper, we have attempted to create a high-quality framework to make a clear vision on review spam-detection methods. In addition, this report contains a comprehensive collection of detection metrics used in proposed spam-detection approaches. These metrics are extremely applicable for developing novel detection methods.

Keywords: fake reviews, feature collection, opinion spam, spam detection

Procedia PDF Downloads 384
674 Knowledge Management in Practice: An Exploratory Study Applied to Consulting Firms

Authors: Evgeniya Ivanova

Abstract:

Nowadays, in the literature, there is still no fixed definition of knowledge management that often remains only as an academic discipline. The current market situation is changing very quickly, the need of new technologies is high, and knowledge management is the area that ensures that the know-how has not been lost during market development and adoption. The study examines how knowledge management is being leveraged and practiced in the management consultancy companies and provides not only the tips and best practices of applied knowledge management approaches but also the validation matrix for its successful or unsuccessful implementation. Different knowledge management approaches are explored on the basis of their practical implementation, including related challenges, knowledge sharing process, and barriers that are typical for consulting firms mostly driven by the agile working culture. The relevance of proposed topic is confirmed by the finding that corporate working culture and the exponentially developing technologies have a direct impact on the success of practical implementation of knowledge management.

Keywords: knowledge management, knowledge management in practice, consulting firm, knowledge management success

Procedia PDF Downloads 167
673 Who Killed Kalief? Examining the Effects of Solitary Confinement on Juvenile Detainees in the United States

Authors: Esther Baldwin

Abstract:

It is well settled that the use of solitary confinement can cause psychological and physical harm to detainees. For juveniles, who are more susceptible to irreparable harm due to their underdeveloped psyches, the risks are exacerbated. Despite these risks, across the United States juvenile detainees are regularly held in isolation for prolonged periods of time. This essay will examine the broad impact of solitary confinement on juvenile detainees while giving particular focus to the story of Kalief Browder, a juvenile awaiting trial on Rikers Island in New York for a period of three years, nearly two years of which were spent in solitary confinement. Although sadly, his story is not uncommon, Kalief’s story offers a unique perspective in that it provides first-hand insight on the effects of solitary confinement on juveniles. It is our hope that by sharing his story, we will demand better detention practices and policies for juveniles under correctional control in the United States.

Keywords: criminal justice system, juveniles, Kalief browder, solitary confinement

Procedia PDF Downloads 302
672 Integrated Model for Enhancing Data Security Performance in Cloud Computing

Authors: Amani A. Saad, Ahmed A. El-Farag, El-Sayed A. Helali

Abstract:

Cloud computing is an important and promising field in the recent decade. Cloud computing allows sharing resources, services and information among the people of the whole world. Although the advantages of using clouds are great, but there are many risks in a cloud. The data security is the most important and critical problem of cloud computing. In this research a new security model for cloud computing is proposed for ensuring secure communication system, hiding information from other users and saving the user's times. In this proposed model Blowfish encryption algorithm is used for exchanging information or data, and SHA-2 cryptographic hash algorithm is used for data integrity. For user authentication process a user-name and password is used, the password uses SHA-2 for one way encryption. The proposed system shows an improvement of the processing time of uploading and downloading files on the cloud in secure form.

Keywords: cloud Ccomputing, data security, SAAS, PAAS, IAAS, Blowfish

Procedia PDF Downloads 451
671 Motivations for Using Social Networking Sites by College Students for Educational Purposes

Authors: Kholoud H. Al-Zedjali, Abir S. Al-Harrasi, Ali H. Al-Badi

Abstract:

Recently there has been a dramatic proliferation in the number of social networking sites (SNSs) users; however, little is published about what motivates college students to use SNSs in education. The main goal of this research is to explore the college students’ motives for using SNSs in education. A conceptual framework has therefore been developed to identify the main factors that influence/motivate students to use social networking sites for learning purposes. To achieve the research objectives a quantitative method was used to collect data. A questionnaire has been distributed amongst college students. The results reveal that social influence, perceived enjoyment, institute regulation, perceived usefulness, ranking up-lift, attractiveness, communication tools, free of charge, sharing material and course nature all play an important role in the motivation of college students to use SNSs for learning purposes.

Keywords: Social Networking Sites (SNSs), education, college students, motivations

Procedia PDF Downloads 230
670 Using Photogrammetry to Survey the Côa Valley Iron Age Rock Art Motifs: Vermelhosa Panel 3 Case Study

Authors: Natália Botica, Luís Luís, Paulo Bernardes

Abstract:

The Côa Valley, listed World Heritage since 1998, presents more than 1300 open-air engraved rock panels. The Archaeological Park of the Côa Valley recorded the rock art motifs, testing various techniques based on direct tracing processes on the rock, using natural and artificial lighting. In this work, integrated in the "Open Access Rock Art Repository" (RARAA) project, we present the methodology adopted for the vectorial drawing of the rock art motifs based on orthophotos taken from the photogrammetric survey and 3D models of the rocks. We also present the information system designed to integrate the vector drawing and the characterization data of the motifs, as well as the open access sharing, in order to promote their reuse in multiple areas. The 3D models themselves constitute a very detailed record, ensuring the digital preservation of the rock and iconography. Thus, even if a rock or motif disappears, it can continue to be studied and even recreated.

Keywords: rock art, archaeology, iron age, 3D models

Procedia PDF Downloads 59
669 Crowdalert: An Android Application for Increasing the Awareness and Response Initiatives of the Citizens through Crowdsourcing

Authors: John Benedict Bernardo

Abstract:

Crowdsourcing is a way of collecting information provided by the volunteers. This crowdsourced information has the capacity to increase the people’s situational awareness in times of disasters. The research reflected in this paper strives to demonstrate the benefits of crowdsourcing during natural disasters and the ways of utilizing it for disaster response. Shared information regarding natural disasters from social media is often scattered as the inputs from these media are uncategorized. For this reason, the study aims to equip the citizens a medium that is solely intended for sharing and/or obtaining natural disaster-related information. Ergo, an android application was developed to gather and publicize this volunteered information. The capability of crowdsourcing and the effectiveness of the application were evaluated and the result shows overwhelming agreement that this study is indeed efficient in increasing the awareness and response initiatives of the citizens during natural disasters.

Keywords: crowdsourcing, natural disasters, mobile application, social media

Procedia PDF Downloads 293
668 Information Technology Application for Knowledge Management in Medium-Size Businesses

Authors: S. Thongchai

Abstract:

Result of the study on knowledge management systems in businesses was shown that the most of these businesses provide internet accessibility for their employees in order to study new knowledge via internet, corporate website, electronic mail, and electronic learning system. These business organizations use information technology application for knowledge management because of convenience, time saving, ease of use, accuracy of information and knowledge usefulness. The result indicated prominent improvements for corporate knowledge management systems as the following; 1) administrations must support corporate knowledge management system 2) the goal of corporate knowledge management must be clear 3) corporate culture should facilitate the exchange and sharing of knowledge within the organization 4) cooperation of personnel of all levels must be obtained 5) information technology infrastructure must be provided 6) they must develop the system regularly and constantly.

Keywords: business organizations, information technology application, knowledge management systems, prominent improvements

Procedia PDF Downloads 363
667 Relevance in the Water-Energy-Food nexus: an Opportunity for Promoting Socio Economic Development in Algeria

Authors: Nadjib Drouiche

Abstract:

Water resources in Algeria are scarce, often low quality, fragile, and unevenly distributed in space and time. The pressure on water resources can be associated with industrial development, a steady population growth, and demanding land irrigation measures. These conditions createa tense competitionfor managing waterresourcesand sharing thembetween agricultural development, drinking water supply, industrial activities, etc. Moreover, the impact of climate change has placed in the forefront national policies focused on the water-energy-food nexus (WEF). In this context, desalination membrane technologies could play an increasing rolefor supporting segments of the Algerian economy that are heavily water-dependent. By implementing water reuse and desalination strategies together in the agricultural sector, there is an opportunity to expand the access to healthy food and clean water, thereby keeping the WEF nexus effects under control.

Keywords: desalination, mitigation, climate change, sustainable development goals

Procedia PDF Downloads 69
666 Contestation of Local and Non-Local Knowledge in Developing Bali Cattle at Barru Regency, Province of South Sulawesi, Indonesia

Authors: A. Amidah Amrawaty, M. Saleh S. Ali, Darmawan Salman

Abstract:

The aim of this study was to identify local and non local knowledge in Bali cattle development, to analyze the contestation between local and non-local knowledge. The paradigm used was constructivism paradigm with a qualitative approach. descriptive type of research using case study method. The study was conducted in four villages subjected to Agropolitan Program, i.e. Palakka, Tompo, Galung and Anabanua in Barru District, province of South Sulawesi. The results indicated that the local knowledge of the farmers were: a) knowledge of animal housing, b) knowledge of the prevention and control disease, c) knowledge of the feed, d) knowledge of breed selection, e) knowledge of sharing arrangement, f) knowledge of marketing, Generally, there are three patterns of knowledge contestation namely coexistence, ‘zero sum game’ and hybridization but in this research only coexistence and zero sum game patterns took place, while the pattern of hybridization did not occur.

Keywords: contestation, local knowledge, non-local knowledge, developing of Bali cattle

Procedia PDF Downloads 371
665 Interaction between University Art Gallery and the Community through Public Art Exhibitions

Authors: Qiao Mao

Abstract:

Starting from the theoretical viewpoints of relational aesthetics, this study explores the relationship between the university art gallery and the communities, taking Art Scattering Program in the Name of Trees of the Art Gallery of National Taiwan Normal University (NTNU) as a case. The researcher uses observational and interview methods to obtain research materials to explore how university art galleries interact with communities through public art exhibitions and strengthen the relatively weak relationships with community residents. The researcher also observes how community residents can change their opinions about the university gallery by participating in public art exhibitions. The results show that the university art gallery can effectively establish the interaction with the community residents and repair the relationship with them through such programs as "collection-sharing," "teacher-student co-creation," "artist stationing," and "education promotion activities," playing an active role in promoting interpersonal communication, sustaining the natural environment development and improving community public space.

Keywords: university art gallery, public art, relational aesthetics, communities, interaction

Procedia PDF Downloads 62
664 The Role of Indigenous Informal Local Institutions and Social Capital for Adoption of Agricultural Innovation: A Special Emphasis in Ethiopia

Authors: Molla Tadesse Lakew

Abstract:

Researchers tried to find out the socio-economic and supply-side constraint factors to adoption. However, they overlooked the role of social networks and relationships among the community. Therefore, the aims of this review were to review the roles and negative effects of social capital. Based on its contents, relevancy, and time duration, only 121 (journals, books, and paper reports) were selected. It concludes that social capital has an indispensable role in facilitating cooperation and connection between members of the farmers' community, informal and experiential knowledge sharing, and access to research-based knowledge and contributes to reducing the transaction cost of adoption. On the contrary, inside the black box of social capital, the negative effects include the exclusion of outsider’s knowledge and experiences, excessive claims on group members, and restrictions on individual freedom.

Keywords: social capital, local institutions, adoption, Ethiopia

Procedia PDF Downloads 46
663 Two-Tier Mudarabah in Islamic Banks: Fiqh Transformation in Business

Authors: Ahmad Dahlan, Aries Indrianto

Abstract:

Conceptually, mudarabah is the practice of fiqh (jurisprudence) in the bank institutions business that became the basis of the economic development model of modern Islamic financial system. In mudarabah, profit and loss sharing mechanism are integrated between mudarabah on liability side (funding) with mudarabah on the asset side (financing). Islamic (Sharia) Bank is positioned as an intermediary institution like investment manager, although the bank is also involved in direct investment based on bank equity. In practice, mudarabah cannot be done as much as effective at financing because the dominance of debt-financing products. This is a major criticism among experts and Islamic banks practitioners. Ironically, the criticism gets less attention by practitioners of Islamic banks due to many factors. The epistemologies of Islamic banks prioritize shareholder values than stakeholder values, and social culture that has not been ready with the mudarabah totally.

Keywords: two tier mudarabah, intermediary institution, shareholder value, stakeholder value

Procedia PDF Downloads 138
662 An Attribute Based Access Control Model with POL Module for Dynamically Granting and Revoking Authorizations

Authors: Gang Liu, Huimin Song, Can Wang, Runnan Zhang, Lu Fang

Abstract:

Currently, resource sharing and system security are critical issues. This paper proposes a POL module composed of PRIV ILEGE attribute (PA), obligation and log which improves attribute based access control (ABAC) model in dynamically granting authorizations and revoking authorizations. The following describes the new model termed PABAC in terms of the POL module structure, attribute definitions, policy formulation and authorization architecture, which demonstrate the advantages of it. The POL module addresses the problems which are not predicted before and not described by access control policy. It can be one of the subject attributes or resource attributes according to the practical application, which enhances the flexibility of the model compared with ABAC. A scenario that illustrates how this model is applied to the real world is provided.

Keywords: access control, attribute based access control, granting authorizations, privilege, revoking authorizations, system security

Procedia PDF Downloads 333
661 Agroecology Approaches Towards Sustainable Agriculture and Food System: Reviewing and Exploring Selected Policies and Strategic Documents through an Agroecological Lens

Authors: Dereje Regasa

Abstract:

The global food system is at a crossroads, which requires prompt action to minimize the effects of the crises. Agroecology is gaining prominence due to its contributions to sustainable food systems. To support efforts in mitigating the crises, the Food and Agriculture Organization (FAO) established alternative approaches for sustainable agri-food systems. Agroecological elements and principles were developed to guide and support measures that countries need to achieve the Sustainable Development Goals (SDGs). The SDGs require the systemic integration of practices for a smart intensification or adaptation of traditional or industrial agriculture. As one of the countries working towards SDGs, the agricultural practices in Ethiopia need to be guided by these agroecological elements and principles. Aiming at the identification of challenging aspects of a sustainable agri-food system and the characterization of an enabling environment for agroecology, as well as exploring to what extent the existing policies and strategies support the agroecological transition process, five policy and strategy documents were reviewed. These documents are the Rural Development Policy and Strategy, the Environment Policy, the Biodiversity Policy, and the Soil Strategy of the Ministry of Agriculture (MoA). Using the Agroecology Criteria Tool (ACT), the contents were reviewed, focusing on agroecological requirements and the inclusion of sustainable practices. ACT is designed to support a self-assessment of elements supporting agroecology. For each element, binary values were assigned based on the inclusion of the minimum requirements index and then validated through discussion with the document owners. The results showed that the documents were well below the requirements for an agroecological transition of the agri-food system. The Rural Development Policy and Strategy only suffice to 83% in Human and Social Value. It does not support the transition concerning the other elements. The Biodiversity Policy and Soil Strategy suffice regarding the inclusion of Co-creation and Sharing of knowledge (100%), while the remaining elements were not considered sufficiently. In contrast, the Environment Policy supports the transition with three elements accounting for 100%. These are Resilience, Recycling, and Human and Social Care. However, when the four documents were combined, elements such as Synergies, Diversity, Efficiency, Human and Social value, Responsible governance, and Co-creation and Sharing of knowledge were identified as fully supportive (100%). This showed that the policies and strategies complemented one another to a certain extent. However, the evaluation results call for improvements concerning elements like Culture and food traditions, Circular and solidarity economy, Resilience, Recycling, and Regulation and balance since the majority of the elements were not sufficiently observed. Consequently, guidance for the smart intensification of local practices is needed, as well as traditional knowledge enriched with advanced technologies. Ethiopian agricultural and environmental policies and strategies should provide sufficient support and guidance for the intensification of sustainable practices and should provide a framework for an agroecological transition towards a sustainable agri-food system.

Keywords: agroecology, diversity, recycling, sustainable food system, transition

Procedia PDF Downloads 56
660 Application of Blockchain on Manufacturing Process Control and Pricing Policy

Authors: Chieh Lee

Abstract:

Today, supply chain managers face extensive disruptions in raw material pricing, transportation block, and quality issue due to product complexity. While digitalization might help managers to mitigate the disruption risk and increase supply chain resilience by sharing information between sellers and buyers through the supply chain, entities are reluctant to build such a system. The main reason is it is not clear what information should be shared and who has access to the stored information. In this research, we propose a smart contract built by blockchain technology. This contract helps both buyer and seller to identify the type of information, the access to the information, and how to trace the information. This contract helps managers control their orders through the supply chain and address any disruption they see fit. Furthermore, with the same smart contract, the supplier can track the production process of an order and increase production efficiency by eliminating waste.

Keywords: blockchain, production process, smart contract, supply chain resilience

Procedia PDF Downloads 52
659 The Promotion Effects for a Supply Chain System with a Dominant Retailer

Authors: Tai-Yue Wang, Yi-Ho Chen

Abstract:

In this study, we investigate a two-echelon supply chain with two suppliers and three retailers among which one retailer dominates other retailers. A price competition demand function is used to model this dominant retailer, which is leading market. The promotion strategies and negotiation schemes are integrated to form decision-making models under different scenarios. These models are then formulated into different mathematical programming models. The decision variables such as promotional costs, retailer prices, wholesale price, and order quantity are included in these models. At last, the distributions of promotion costs under different cost allocation strategies are discussed. Finally, an empirical example used to validate our models. The results from this empirical example show that the profit model will create the largest profit for the supply chain but with different profit-sharing results. At the same time, the more risk a member can take, the more profits are distributed to that member in the utility model.

Keywords: supply chain, price promotion, mathematical models, dominant retailer

Procedia PDF Downloads 381
658 Importance of Ethics in Cloud Security

Authors: Pallavi Malhotra

Abstract:

This paper examines the importance of ethics in cloud computing. In the modern society, cloud computing is offering individuals and businesses an unlimited space for storing and processing data or information. Most of the data and information stored in the cloud by various users such as banks, doctors, architects, engineers, lawyers, consulting firms, and financial institutions among others require a high level of confidentiality and safeguard. Cloud computing offers centralized storage and processing of data, and this has immensely contributed to the growth of businesses and improved sharing of information over the internet. However, the accessibility and management of data and servers by a third party raise concerns regarding the privacy of clients’ information and the possible manipulations of the data by third parties. This document suggests the approaches various stakeholders should take to address various ethical issues involving cloud-computing services. Ethical education and training is key to all stakeholders involved in the handling of data and information stored or being processed in the cloud.

Keywords: IT ethics, cloud computing technology, cloud privacy and security, ethical education

Procedia PDF Downloads 303
657 Digital Repositories in Algerian Universities: Content and Search Possibilities

Authors: Hakim Benoumelghar

Abstract:

The launch in 1999 of the open access Initiative (OAI) and the protocol for sharing metadata, OAI-PMH, in parallel with the provision of deposit platforms, open-source software, such as DSpace in 2002, which allow libraries to develop digital repositories and play a leading role in the open access movement, and by building institutional open archives alongside the theme. This study focuses on Algerian universities and their projects and platforms for digital repositories of theses and scientific papers and the possibilities of access to the university community to develop research and access to archives of scientific digital content offered by the scientific community. This contribution attempts to compare Algerian and foreign institutional deposits in developed countries in order to have development and perspectives to facilitate scientific research and give more possibilities to the scientific community in documentary matters.

Keywords: digital repository, repository software, university, algeria

Procedia PDF Downloads 41
656 Assessing Finance by Ethnic Entrepreneurs in United Kingdom and Policy Implication

Authors: Aliyu Aminu Baba

Abstract:

Ethnic entrepreneurship is defined as a set of connections and regular patterns of interaction among people sharing common national background or migration experience. The disadvantage faced by ethnic minority on paid labour induced them to become self-employed. Also, enclaves motivates trading, creativity, innovation are all to provide specific service or products to certain people. These ethnic minorities are African –Caribbean, Indians, Pakistanis, Banghaladashi and Chinese. For policy development ethnic diversity was among the problem of developing policy in United Kingdom. The study finds that there is a danger in treating all ethnic minority businesses as homogeneous rather than heterogeneous. The diversity is due to religious beliefs, culture and race. This indicates that there is a wide range have shortfall in addressing the peculiarities of ethnic minority businesses in policy formulation. Also, there are differences between ethnic minorities in accessing finance. It is recommended that diversity and peculiarities between ethnic minorities should be considered in policy formulation.

Keywords: ethnic entrepreneurship, finance, policy implication, diversity

Procedia PDF Downloads 343
655 Community Forest Management Practice in Nepal: Public Understanding of Forest Benefit

Authors: Chandralal Shrestha

Abstract:

In the developing countries like Nepal, the community based forest management approach has often been glorified as one of the best forest management alternatives to maximize the forest benefits. Though the approach has succeeded to construct a local level institution and conserve the forest biodiversity, how the local communities perceived about the forest benefits, the question always remains silent among the researchers and policy makers. The paper aims to explore the understanding of forest benefits from the perspective of local communities who used the forests in terms of institutional stability, equity and livelihood opportunity, and ecological stability. The paper revealed that the local communities have mixed understanding over the forest benefits. The institutional and ecological activities carried out by the local communities indicated that they have better understanding over the forest benefits. However, inequality while sharing the forest benefits, low pricing strategy and its negative consequences in valuation of forest products and limited livelihood opportunities indicated the poor understanding.

Keywords: community based forest management, forest benefits, lowland, Nepal

Procedia PDF Downloads 287
654 Islamic Banking: An Ultimate Source of Financial Inclusion

Authors: Tasawar Nawaz

Abstract:

Promotion of socioeconomic justice through redistribution of wealth is one of the most salient features of Islamic economic system. Islamic financial institutions known as Islamic banks are used to implement this in practice under the guidelines of Islamic Shariah law. Islamic banking systems strive to promote and achieve financial inclusion among the society by offering interest-free banking and risk-sharing financing solutions. Shariah-compliant micro finance is one of the most popular financial instruments used by Islamic banks to enhance access to finance. Benevolent loan (or Qard-al-Hassanah) is one of the popular financial tools used by the Islamic banks to promote financial inclusion. This aspect of Islamic banking is empirically examined in this paper with specific reference to firm’s resources, largely defined here as intellectual capital. The paper finds that Islamic banks promote financial inclusion by exploiting available resources especially, the human intellectual capital.

Keywords: financial inclusion, intellectual capital, Qard-al-Hassanah, Islamic banking

Procedia PDF Downloads 286
653 Sentiment Analysis on the East Timor Accession Process to the ASEAN

Authors: Marcelino Caetano Noronha, Vosco Pereira, Jose Soares Pinto, Ferdinando Da C. Saores

Abstract:

One particularly popular social media platform is Youtube. It’s a video-sharing platform where users can submit videos, and other users can like, dislike or comment on the videos. In this study, we conduct a binary classification task on YouTube’s video comments and review from the users regarding the accession process of Timor Leste to become the eleventh member of the Association of South East Asian Nations (ASEAN). We scrape the data directly from the public YouTube video and apply several pre-processing and weighting techniques. Before conducting the classification, we categorized the data into two classes, namely positive and negative. In the classification part, we apply Support Vector Machine (SVM) algorithm. By comparing with Naïve Bayes Algorithm, the experiment showed SVM achieved 84.1% of Accuracy, 94.5% of Precision, and Recall 73.8% simultaneously.

Keywords: classification, YouTube, sentiment analysis, support sector machine

Procedia PDF Downloads 69
652 Utilizing Grid Computing to Enhance Power Systems Performance

Authors: Rafid A. Al-Khannak, Fawzi M. Al-Naima

Abstract:

Power load is one of the most important controlling keys which decide power demands and illustrate power usage to shape power market. Hence, power load forecasting is the parameter which facilitates understanding and analyzing all these aspects. In this paper, power load forecasting is solved under MATLAB environment by constructing a neural network for the power load to find an accurate simulated solution with the minimum error. A developed algorithm to achieve load forecasting application with faster technique is the aim for this paper. The algorithm is used to enable MATLAB power application to be implemented by multi machines in the Grid computing system, and to accomplish it within much less time, cost and with high accuracy and quality. Grid Computing, the modern computational distributing technology, has been used to enhance the performance of power applications by utilizing idle and desired Grid contributor(s) by sharing computational power resources.

Keywords: DeskGrid, Grid Server, idle contributor(s), grid computing, load forecasting

Procedia PDF Downloads 448
651 Gluteal Augmentation: A Historical Perspective on Society's Fascination with Buttock Size

Authors: Shane R. Jackson

Abstract:

Gluteal augmentation with fat grafting, commonly referred to as the Brazilian Butt Lift, is the fastest-growing cosmetic surgical procedure, despite the risks and controversy that surrounds it. While many commentators attribute this rise in popularity with current societal trends towards public sharing of private life, the fascination with buttock size is in fact a much older human trait. By searching beyond medical literature and delving into historical sources, from ancient civilisations, through the Renaissance and Victorian eras to the ‘Instagram generation’ of the present day, this paper examines the differences – and similarities – in society’s ideal buttock shape and size. Furthermore, the ways in which these various cultures have altered their appearance to achieve this ideal are also examined, looking at the influence of the broader historical context. A deeper understanding of the historical, cultural and psychosocial factors that influence a patient’s desire for buttock augmentation allows the clinician to formulate a well-rounded surgical plan.

Keywords: augmentation, Brazilian butt lift, buttock, fat graft, gluteal

Procedia PDF Downloads 168
650 Mordechai Vanunu: “The Atomic Spy” as a Nuclear Threat to Discourse in Israeli Society

Authors: Ada Yurman

Abstract:

Using the case of Israeli Atomic Spy Mordechai Vanunu as an example, this study sought to examine social response to political deviance whereby social response can be mobilized in order to achieve social control. Mordechai Vanunu, a junior technician in the Dimona Atomic Research Center, played a normative role in the militaristic discourse while working in the “holy shrine” of the Israeli defense system for many years. At a certain stage, however, Vanunu decided to detach himself from this collective and launched an assault on this top-secret circle. Israeli society in general and the security establishment in particular found this attack intolerable and unforgivable. They presented Vanunu as a ticking time bomb, delegitimized him and portrayed him as “other”. In addition, Israeli enforcement authorities imposed myriad prohibitions and sanctions on Vanunu even after his release from prison – “as will be done to he who desecrates holiness.” Social response to Vanunu at the time of his capture and trial was studied by conducting a content analysis of six contemporary daily newspapers. The analysis focused on use of language and forms of expression. In contrast with traditional content analysis methodology, this study did not just look at frequency of expressions of ideas and terms in the text and covert content; rather, the text was analyzed as a structural whole, and included examination of style, tone and unusual use of imagery, and more, in order to uncover hidden messages within the text. The social response to this case was extraordinarily intense, not only because in this case of political deviance, involving espionage and treason, Vanunu’s actions comprised a real potential threat to the country, but also because of the threat his behavior posed to the symbolic universe of society. Therefore, the response to this instance of political deviance can be seen as being part of a mechanism of social control aiming to protect world view of society as a whole, as well as to punish the criminal.

Keywords: militarism, political deviance, social construction, social control

Procedia PDF Downloads 93
649 Integrated Model for Enhancing Data Security Processing Time in Cloud Computing

Authors: Amani A. Saad, Ahmed A. El-Farag, El-Sayed A. Helali

Abstract:

Cloud computing is an important and promising field in the recent decade. Cloud computing allows sharing resources, services and information among the people of the whole world. Although the advantages of using clouds are great, but there are many risks in a cloud. The data security is the most important and critical problem of cloud computing. In this research a new security model for cloud computing is proposed for ensuring secure communication system, hiding information from other users and saving the user's times. In this proposed model Blowfish encryption algorithm is used for exchanging information or data, and SHA-2 cryptographic hash algorithm is used for data integrity. For user authentication process a simple user-name and password is used, the password uses SHA-2 for one way encryption. The proposed system shows an improvement of the processing time of uploading and downloading files on the cloud in secure form.

Keywords: cloud computing, data security, SAAS, PAAS, IAAS, Blowfish

Procedia PDF Downloads 324
648 A Security Cloud Storage Scheme Based Accountable Key-Policy Attribute-Based Encryption without Key Escrow

Authors: Ming Lun Wang, Yan Wang, Ning Ruo Sun

Abstract:

With the development of cloud computing, more and more users start to utilize the cloud storage service. However, there exist some issues: 1) cloud server steals the shared data, 2) sharers collude with the cloud server to steal the shared data, 3) cloud server tampers the shared data, 4) sharers and key generation center (KGC) conspire to steal the shared data. In this paper, we use advanced encryption standard (AES), hash algorithms, and accountable key-policy attribute-based encryption without key escrow (WOKE-AKP-ABE) to build a security cloud storage scheme. Moreover, the data are encrypted to protect the privacy. We use hash algorithms to prevent the cloud server from tampering the data uploaded to the cloud. Analysis results show that this scheme can resist conspired attacks.

Keywords: cloud storage security, sharing storage, attributes, Hash algorithm

Procedia PDF Downloads 355