Search results for: tax evasion
44 Tax Evasion and Macroeconomic (In)stability
Authors: Wei-Neng Wang, Jhy-Yuan Shieh, Jhy-Hwa Chen, Juin-Jen Chang
Abstract:
This paper incorporate tax evasion into a one-sector real business cycle (RBC) model to explores the quantitative interrelations between income tax rate and equilibrium (in)determinacy, and income tax rate is endogenously determined in order to balance the government budget. We find that the level of the effective income tax rate is key factor for equilibrium (in)determinacy, instead of the level of income tax rate in a tax evasion economy. Under an economy with tax evasion, the higher income tax rate is not sufficiently to lead to equilibrium indeterminate, it must combine with a necessary condition which is the lower fraction of tax evasion and that can result in agents' optimistic expectations to become self-fulfilling and sunspot fluctuation more likely to occur. On the other hand, an economy with tax evasion can see its macroeconomy become more stabilize, and a higher fraction of income tax evasion may has a stronger stabilizing effect.Keywords: tax evasion, balanced-budget rule, equlibirium (in)determinacy, effective income tax rate
Procedia PDF Downloads 6243 The Impact of Global Financial Crises and Corporate Financial Crisis (Bankruptcy Risk) on Corporate Tax Evasion: Evidence from Emerging Markets
Authors: Seyed Sajjad Habibi
Abstract:
The aim of this study is to investigate the impact of global financial crises and corporate financial crisis on tax evasion of companies listed on the Tehran Stock Exchange. For this purpose, panel data in the periods of financial crisis period (2007 to 2012) and without a financial crisis (2004, 2005, 2006, 2013, 2014, and 2015) was analyzed using multivariate linear regression. The results indicate a significant relationship between the corporate financial crisis (bankruptcy risk) and tax evasion in the global financial crisis period. The results also showed a significant relationship between the corporate bankruptcy risk and tax evasion in the period with no global financial crisis. A significant difference was found between the bankruptcy risk and tax evasion in the period of the global financial crisis and that with no financial crisis so that tax evasion increased in the financial crisis period.Keywords: global financial crisis, corporate financial crisis, bankruptcy risk, tax evasion risk, emerging markets
Procedia PDF Downloads 27942 The Modeling and Effectiveness Evaluation for Vessel Evasion to Acoustic Homing Torpedo
Authors: Li Minghui, Min Shaorong, Zhang Jun
Abstract:
This paper aims for studying the operational efficiency of surface warship’s motorized evasion to acoustic homing torpedo. It orderly developed trajectory model, self-guide detection model, vessel evasion model, as well as anti-torpedo error model in three-dimensional space to make up for the deficiency of precious researches analyzing two-dimensionally confrontational models. Then, making use of the Monte Carlo method, it carried out the simulation for the confrontation process of evasion in the environment of MATLAB. At last, it quantitatively analyzed the main factors which determine vessel’s survival probability. The results show that evasion relative bearing and speed will affect vessel’s survival probability significantly. Thus, choosing appropriate evasion relative bearing and speed according to alarming range and alarming relative bearing for torpedo, improving alarming range and positioning accuracy and reducing the response time against torpedo will improve the vessel’s survival probability significantly.Keywords: acoustic homing torpedo, vessel evasion, monte carlo method, torpedo defense, vessel's survival probability
Procedia PDF Downloads 45441 The Reflection of Greek Reality Concerning Taxation from the Perspective of Both Tax Payers and Taxmen
Authors: Evagelia Makri, Maria Tsourela, Dimitris Paschaloudis, Dafni M. Nerantzaki
Abstract:
One of the biggest financial and social problems, which at the same time constitute one of the greater challenges that Greek society faces today, is the illegal avoidance of tax payments. Tax evasion may negate financial data and community budgets, as well as breed financial chaos. This research seeks to reflect Greek reality concerning tax measures. Also, there will be an effort to record the factors surrounding tax evasion. Greek tax system’s data will be rendered in financial terms. Questionnaires will be handed out to tax payers, and interviews will be conducted to taxmen. The quantitative analysis of the questionnaire answers will define the tax payers’ opinion towards the existence of tax evasion. The qualitative analysis of the interviews will reveal the main reason that boosts tax evasion. At the end, there will be some realistic proposals about how to better collect taxes, through the creation of a strong regulatory mechanism.Keywords: tax evasion, tax collection measures, insurance recovery measures, Greek tax system
Procedia PDF Downloads 36140 Tax Evasion in Brazil: The Case of Specialists
Authors: Felippe Clemente, Viviani S. Lírio
Abstract:
Brazilian tax evasion is very high. It causes many problems for economics as budget realization, income distribution and no allocation of productive resources. Therefore, the purpose of this article is to use the instrumental game theory to understand tax evasion agents and tax authority in Brazil (Federal Revenue and Federal Police). By means of Game Theory approaches, the main results from considering cases both with and without specialists show that, in a high dropout situation, penalizing taxpayers with either high fines or deprivations of liberty may not be very effective. The analysis also shows that audit and inspection costs play an important role in driving the equilibrium system. This would suggest that a policy of investing in tax inspectors would be a more effective tool in combating non-compliance with tax obligations than penalties or fines.Keywords: tax evasion, Brazil, game theory, specialists
Procedia PDF Downloads 32539 Tax Evasion with Mobility between the Regular and Irregular Sectors
Authors: Xavier Ruiz Del Portal
Abstract:
This paper incorporates mobility between the legal and black economies into a model of tax evasion with endogenous labor supply in which underreporting is possible in one sector but impossible in the other. We have found that the results of the effects along the extensive margin (number of evaders) become more robust and conclusive than those along the intensive margin (hours of illegal work) usually considered by the literature. In particular, it is shown that the following policies reduce the number of evaders: (a) larger and more progressive evasion penalties; (b) higher detection probabilities; (c) an increase in the legal sector wage rate; (d) a decrease in the moonlighting wage rate; (e) higher costs for creating opportunities to evade; (f) lower opportunities to evade, and (g) greater psychological costs of tax evasion. When tax concealment and illegal work also are taken into account, the effects do not vary significantly under the assumptions in Cowell (1985), except for the fact that policies (a) and (b) only hold as regards low- and middle-income groups and policies (e) and (f) as regards high-income groups.Keywords: income taxation, tax evasion, extensive margin responses, the penalty system
Procedia PDF Downloads 15338 The Characteristics of a Fair and Efficient Tax Auditing Information System as a Tool against Tax Evasion: A Theoretical Framework
Authors: Dimitris Balios, Stefanos Tantos
Abstract:
Economic growth and social evolution are connected to trust relationships in a society. The quality of the accounting information, the tax information system and the tax audit mechanism evolve multiple benefits in an economy. Tax evasion, the illegal practice where people and companies do not pay taxes, is a crime because of the negative effect in economy and society. In this paper, we describe a theoretical framework on the characteristics of a fair and efficient tax auditing information system which could be a tool against tax evasion, a tool for an economy to grow, especially in countries that face fluctuations in economic activity. We conclude that a fair and efficient tax auditing information system increases the reliability of tax administration, improves taxpayers’ tax compliance and causes a developmental trajectory for the economy.Keywords: auditing information system, auditing mechanism, tax evasion, taxation
Procedia PDF Downloads 15337 The Effect of Taxpayer Political Beliefs on Tax Evasion Behavior: An Empirical Study Applied to Tunisian Case
Authors: Nadia Elouaer
Abstract:
Tax revenue is the main state resource and one of the important variables in tax policy. Nevertheless, this resource is continually decreasing, so it is important to focus on the reasons for this decline. Several studies show that the taxpayer is reluctant to pay taxes, especially in countries at risk or in countries in transition, including Tunisia. This study focuses on the tax evasion behavior of a Tunisian taxpayer under the influence of his political beliefs, as well as the influence of different tax compliance variables. Using a questionnaire, a sample of 500 Tunisian taxpayers is used to examine the relationship between political beliefs and taxpayer affiliations and tax compliance variables, as well as the study of the causal link between political beliefs and fraudulent behavior. The data were examined using correlation, factor, and regression analysis and found a positive and statistically significant relationship between the different tax compliance variables and the tax evasion behavior. There is also a positive and statistically significant relationship between tax evasion and political beliefs and affiliations. The study of the relationship between political beliefs and compliance variables shows that they are closely related. The conclusion is to admit that tax evasion and political beliefs are closely linked, and the government should update its tax policy and modernize its administration in order to strengthen the credibility and disclosure of information in order to restore a relationship of trust between public authorities and the taxpayer.Keywords: fiscal policy, political beliefs, tax evasion, taxpayer behavior
Procedia PDF Downloads 14636 The Effect of Tax Evasion and Avoidance on Somalia’s Economy
Authors: Mohamed Salad Ahmed
Abstract:
This study explores the impact of tax evasion and avoidance on the economy of Somalia. Somalia's economy is largely informal and cash-based, making it challenging to accurately assess the extent of tax evasion and avoidance. However, it is widely recognized that these practices have significant negative effects on the economy, including reduced government revenue, an uneven playing field for businesses, corruption, and a lack of access to international aid and investment. The study focuses on identifying strategies and solutions to reduce tax evasion and avoidance and increase revenue collection. This includes improving the government's capacity to enforce tax laws and regulations, creating a more transparent and accountable tax system, and increasing public awareness of the importance of paying taxes. By addressing these issues, Somalia can improve its economic stability and enhance its ability to provide essential public services, reduce poverty, and promote growth and development. Tax evasion and avoidance have a significant negative impact on the economy of Somalia. The informal nature of the country's economy and the difficulty in accurately assessing the extent of tax evasion and avoidance make it challenging to address these issues effectively. The lack of government revenue resulting from tax evasion and avoidance makes it difficult for the government to fund essential services, leading to a decline in the quality of public services and hindering economic growth. Tax evasion and avoidance also create an uneven playing field for businesses, discourage investment, contribute to corruption, and undermine the rule of law. Additionally, tax evasion and avoidance can make it more difficult for Somalia to access international aid and investment. Addressing these issues will require a concerted effort by the government to strengthen tax collection and enforcement, as well as by the international community to provide technical assistance and support. This abstract highlights the importance of addressing tax evasion and avoidance in Somalia and the potential benefits of doing so.Keywords: tax evasion, tax avoidance, Somalia economy, revenue collection, informal economy, corruption economic growth, investment, tax policy, tax administration, governance, private sector
Procedia PDF Downloads 935 Comprehensive Review of Adversarial Machine Learning in PDF Malware
Authors: Preston Nabors, Nasseh Tabrizi
Abstract:
Portable Document Format (PDF) files have gained significant popularity for sharing and distributing documents due to their universal compatibility. However, the widespread use of PDF files has made them attractive targets for cybercriminals, who exploit vulnerabilities to deliver malware and compromise the security of end-user systems. This paper reviews notable contributions in PDF malware detection, including static, dynamic, signature-based, and hybrid analysis. It presents a comprehensive examination of PDF malware detection techniques, focusing on the emerging threat of adversarial sampling and the need for robust defense mechanisms. The paper highlights the vulnerability of machine learning classifiers to evasion attacks. It explores adversarial sampling techniques in PDF malware detection to produce mimicry and reverse mimicry evasion attacks, which aim to bypass detection systems. Improvements for future research are identified, including accessible methods, applying adversarial sampling techniques to malicious payloads, evaluating other models, evaluating the importance of features to malware, implementing adversarial defense techniques, and conducting comprehensive examination across various scenarios. By addressing these opportunities, researchers can enhance PDF malware detection and develop more resilient defense mechanisms against adversarial attacks.Keywords: adversarial attacks, adversarial defense, adversarial machine learning, intrusion detection, PDF malware, malware detection, malware detection evasion
Procedia PDF Downloads 3834 Educational Data Mining: The Case of the Department of Mathematics and Computing in the Period 2009-2018
Authors: Mário Ernesto Sitoe, Orlando Zacarias
Abstract:
University education is influenced by several factors that range from the adoption of strategies to strengthen the whole process to the academic performance improvement of the students themselves. This work uses data mining techniques to develop a predictive model to identify students with a tendency to evasion and retention. To this end, a database of real students’ data from the Department of University Admission (DAU) and the Department of Mathematics and Informatics (DMI) was used. The data comprised 388 undergraduate students admitted in the years 2009 to 2014. The Weka tool was used for model building, using three different techniques, namely: K-nearest neighbor, random forest, and logistic regression. To allow for training on multiple train-test splits, a cross-validation approach was employed with a varying number of folds. To reduce bias variance and improve the performance of the models, ensemble methods of Bagging and Stacking were used. After comparing the results obtained by the three classifiers, Logistic Regression using Bagging with seven folds obtained the best performance, showing results above 90% in all evaluated metrics: accuracy, rate of true positives, and precision. Retention is the most common tendency.Keywords: evasion and retention, cross-validation, bagging, stacking
Procedia PDF Downloads 8133 Significance of Life Values in Relationship: A Detailed Analysis of Teenage Population
Authors: Preeti Nakhat
Abstract:
Background: Values are essential part of one's life. They are inculcated since the early years of life and shape the personality of the individual. They play a tremendous role in decision making. Teenagers are seen perplexed about the values of their life. The challenge faced by majority of the teenage population in choosing between a positive and negative value is high. The values they adopt remain throughout their life and in every decision, hence it is a crucial topic of research. Research Methodology: This research aimed at finding out the value conflict of teenagers in relations. Hypothesis of the study are: H₀- There is no significant association between the life values and value conflict of higher secondary students; H₁– There is a significant association between the life values and value conflict of higher secondary students. For the same, the standardized tool, value conflict scale by R. L. Bhardwaj has been used. The tool consists 24 questions of different life situations with multiple choice options. Findings: There is 96% variation in value conflict due to evasion vs. fortitude, dependence vs. self-reliance, selfishness vs. probity, hate vs. love, fear vs. assertion and pragmatism vs. idealism life values. There is a positive association between all the life values and value conflict of higher secondary school students. Percentages of association are: 0.17% between value conflict and evasion vs. fortitude value, 0.16% between value conflict and dependence vs. self-reliance value, 0.17% between value conflict and selfishness vs. probity value, 0.16% between value conflict and hate vs. love value, 0.17% between value conflict and fear vs. assertion, 0.17% between value conflict and pragmatism vs. idealism value. Discussions: The dilemma faced by the students regarding value conflict is high. Bewilderment of being honest or lying, of loving or hating family and friends, being pragmatic or idealistic in life decision, being selfish or selfless is seen among the students. It is the challenge for the future. Teaching of values with a practical aspect should be added in the school curriculum.Keywords: dilemma, conflict, school, values
Procedia PDF Downloads 23732 A Trends Analysis of Yatch Simulator
Authors: Jae-Neung Lee, Keun-Chang Kwak
Abstract:
This paper describes an analysis of Yacht Simulator international trends and also explains about Yacht. Examples of yacht Simulator using Yacht Simulator include image processing for totaling the total number of vehicles, edge/target detection, detection and evasion algorithm, image processing using SIFT (scale invariant features transform) matching, and application of median filter and thresholding.Keywords: yacht simulator, simulator, trends analysis, SIFT
Procedia PDF Downloads 43131 Institutional Quality and Tax Compliance: A Cross-Country Regression Evidence
Authors: Debi Konukcu Onal, Tarkan Cavusoglu
Abstract:
In modern societies, the costs of public goods and services are shared through taxes paid by citizens. However, taxation has always been a frictional issue, as tax obligations are perceived to be a financial burden for taxpayers rather than being merit that fulfills the redistribution, regulation and stabilization functions of the welfare state. The tax compliance literature evolves into discussing why people still pay taxes in systems with low costs of legal enforcement. Related empirical and theoretical works show that a wide range of socially oriented behavioral factors can stimulate voluntary compliance and subversive effects as well. These behavioral motivations are argued to be driven by self-enforcing rules of informal institutions, either independently or through interactions with legal orders set by formal institutions. The main focus of this study is to investigate empirically whether institutional particularities have a significant role in explaining the cross-country differences in the tax noncompliance levels. A part of the controversy about the driving forces behind tax noncompliance may be attributed to the lack of empirical evidence. Thus, this study aims to fill this gap through regression estimates, which help to trace the link between institutional quality and noncompliance on a cross-country basis. Tax evasion estimates of Buehn and Schneider is used as the proxy measure for the tax noncompliance levels. Institutional quality is quantified by three different indicators (percentile ranks of Worldwide Governance Indicators, ratings of the International Country Risk Guide, and the country ratings of the Freedom in the World). Robust Least Squares and Threshold Regression estimates based on the sample of the Organization for Economic Co-operation and Development (OECD) countries imply that tax compliance increases with institutional quality. Moreover, a threshold-based asymmetry is detected in the effect of institutional quality on tax noncompliance. That is, the negative effects of tax burdens on compliance are found to be more pronounced in countries with institutional quality below a certain threshold. These findings are robust to all alternative indicators of institutional quality, supporting the significant interaction of societal values with the individual taxpayer decisions.Keywords: institutional quality, OECD economies, tax compliance, tax evasion
Procedia PDF Downloads 13230 European Countries Challenge’s in Value Added Tax
Authors: Fatbardha Kadiu, Nulifer Caliskan
Abstract:
The value added tax came as a necessity of substituting the old tax on sales. Based on the advantages of this new tax in our days it is used successfully in more than 140 countries around the world. The aim of the paper is to describe the nature of this tax with its advantages and disadvantages. Also it will describe the way how it functions in most of the European countries and the actual challenges of these countries on value added tax. It will be present the types of goods which are exempt from this tax, the reasons and the consequences of those exemptions. The paper will be based on secondary data taken from respective literature. An econometric model will be present in order to identify the dependence of value tax from other parameters. The analyzing most refers to the two main principles of harmonization and billing on the fiscal system and the ways how to restructures the system in order to minimize the fiscal evasion.Keywords: value added tax, revenues, complexity, legal uncertainty
Procedia PDF Downloads 39829 Triple Immunotherapy to Overcome Immune Evasion by Tumors in a Melanoma Mouse Model
Authors: Mary-Ann N. Jallad, Dalal F. Jaber, Alexander M. Abdelnoor
Abstract:
Introduction: Current evidence confirms that both innate and adaptive immune systems are capable of recognizing and abolishing malignant cells. The emergence of cancerous tumors in patients is, therefore, an indication that certain cancer cells can resist elimination by the immune system through a process known as “immune evasion”. In fact, cancer cells often exploit regulatory mechanisms to escape immunity. Such mechanisms normally exist to control the immune responses and prohibit exaggerated or autoimmune reactions. Recently, immunotherapies have shown promising yet limited results. Therefore this study investigates several immunotherapeutic combinations and devises a triple immunotherapy which harnesses the innate and acquired immune responses towards the annihilation of malignant cells through overcoming their ability of immune evasion, consequently hampering malignant progression and eliminating established tumors. The aims of the study are to rule out acute/chronic toxic effects of the proposed treatment combinations, to assess the effect of these combinations on tumor growth and survival rates, and to investigate potential mechanisms underlying the phenotypic results through analyzing serum levels of anti-tumor cytokines, angiogenic factors and tumor progression indicator, and the tumor-infiltrating immune-cells populations. Methodology: For toxicity analysis, cancer-free C57BL/6 mice are randomized into 9 groups: Group 1 untreated, group 2 treated with sterile saline (solvent of used treatments), group 3 treated with Monophosphoryl-lipid-A, group 4 with anti-CTLA4-antibodies, group 5 with 1-Methyl-Tryptophan (Indolamine-Dioxygenase-1 inhibitor), group 6 with both MPLA and anti-CTLA4-antibodies, group 7 with both MPLA and 1-MT, group 8 with both anti-CTLA4-antibodies and 1-MT, and group 9 with all three: MPLA, anti-CTLA4-antibodies and 1-MT. Mice are monitored throughout the treatment period and for three following months. At that point, histological sections from their main organs are assessed. For tumor progression and survival analysis, a murine melanoma model is generated by injecting analogous mice with B16F10 melanoma cells. These mice are segregated into the listed nine groups. Their tumor size and survival are monitored. For a depiction of underlying mechanisms, melanoma-bearing mice from each group are sacrificed at several time-points. Sera are tested to assess the levels of Interleukin-12 (IL-12), Vascular-Endothelial-Growth Factor (VEGF), and S100B. Furthermore, tumors are excised for analysis of infiltrated immune cell populations including T-cells, macrophages, natural killer cells and immune-regulatory cells. Results: Toxicity analysis shows that all treated groups present no signs of neither acute nor chronic toxicity. Their appearance and weights were comparable to those of control groups throughout the treatment period and for the following 3 months. Moreover, histological sections from their hearts, kidneys, lungs, and livers were normal. Work is ongoing for completion of the remaining study aims. Conclusion: Toxicity was the major concern for the success of the proposed comprehensive combinational therapy. Data generated so far ruled out any acute or chronic toxic effects. Consequently, ongoing work is quite promising and may significantly contribute to the development of more effective immunotherapeutic strategies for the treatment of cancer patients.Keywords: cancer immunotherapy, check-point blockade, combination therapy, melanoma
Procedia PDF Downloads 12028 Closing down the Loop Holes: How North Korea and Other Bad Actors Manipulate Global Trade in Their Favor
Authors: Leo Byrne, Neil Watts
Abstract:
In the complex and evolving landscape of global trade, maritime sanctions emerge as a critical tool wielded by the international community to curb illegal activities and alter the behavior of non-compliant states and entities. These sanctions, designed to restrict or prohibit trade by sea with sanctioned jurisdictions, entities, or individuals, face continuous challenges due to the sophisticated evasion tactics employed by countries like North Korea. As the Democratic People's Republic of Korea (DPRK) diverts significant resources to circumvent these measures, understanding the nuances of their methodologies becomes imperative for maintaining the integrity of global trade systems. The DPRK, one of the most sanctioned nations globally, has developed an intricate network to facilitate its trade in illicit goods, ensuring the flow of revenue from designated activities continues unabated. Given its geographic and economic conditions, North Korea predominantly relies on maritime routes, utilizing foreign ports to route its illicit trade. This reliance on the sea is exploited through various sophisticated methods, including the use of front companies, falsification of documentation, commingling of bulk cargos, and physical alterations to vessels. These tactics enable the DPRK to navigate through the gaps in regulatory frameworks and lax oversight, effectively undermining international sanctions regimes Maritime sanctions carry significant implications for global trade, imposing heightened risks in the maritime domain. The deceptive practices employed not only by the DPRK but also by other high-risk jurisdictions, necessitate a comprehensive understanding of UN targeted sanctions. For stakeholders in the maritime sector—including maritime authorities, vessel owners, shipping companies, flag registries, and financial institutions serving the shipping industry—awareness and compliance are paramount. Violations can lead to severe consequences, including reputational damage, sanctions, hefty fines, and even imprisonment. To mitigate risks associated with these deceptive practices, it is crucial for maritime sector stakeholders to employ rigorous due diligence and regulatory compliance screening measures. Effective sanctions compliance serves as a protective shield against legal, financial, and reputational risks, preventing exploitation by international bad actors. This requires not only a deep understanding of the sanctions landscape but also the capability to identify and manage risks through informed decision-making and proactive risk management practices. As the DPRK and other sanctioned entities continue to evolve their sanctions evasion tactics, the international community must enhance its collective efforts to demystify and counter these practices. By leveraging more stringent compliance measures, stakeholders can safeguard against the illicit use of the maritime domain, reinforcing the effectiveness of maritime sanctions as a tool for global security. This paper seeks to dissect North Korea's adaptive strategies in the face of maritime sanctions. By examining up-to-date, geographically, and temporally relevant case studies, it aims to shed light on the primary nodes through which Pyongyang evades sanctions and smuggles goods via third-party ports. The goal is to propose multi-level interaction strategies, ranging from governmental interventions to localized enforcement mechanisms, to counteract these evasion tactics.Keywords: maritime, maritime sanctions, international sanctions, compliance, risk
Procedia PDF Downloads 6927 Tax Morale Dimensions Analysis in Portugal and Spain
Authors: Cristina Sá, Carlos Gomes, António Martins
Abstract:
The reasons that explain different behaviors towards tax obligations in similar countries are not completely understood yet. The main purpose of this paper is to identify and compare the factors that influence tax morale levels in Portugal and Spain. We use data from European Values Study (EVS). Using a sample of 2,652 individuals, a factor analysis was used to extract the underlying dimensions of tax morale of Portuguese and Spanish taxpayers. Based on a factor analysis, the results of this paper show that sociological and behavioral factors, psychological factors and political factors are important for a good understanding of taxpayers’ behavior in Iberian Peninsula. This paper added value relies on the analyses of a wide range of variables and on the comparison between Portugal and Spain. Our conclusions provided insights that tax authorities and politicians can use to better focus their strategies and actions in order to increase compliance, reduce tax evasion, fight underground economy and increase country´s competitiveness.Keywords: compliance, tax morale, Portugal, Spain
Procedia PDF Downloads 30626 Self-denigration in Doctoral Defense Sessions: Scale Development and Validation
Authors: Alireza Jalilifar, Nadia Mayahi
Abstract:
The dissertation defense as a complicated conflict-prone context entails the adoption of elegant interactional strategies, one of which is self-denigration. This study aimed to develop and validate a self-denigration model that fits the context of doctoral defense sessions in applied linguistics. Two focus group discussions provided the basis for developing this conceptual model, which assumed 10 functions for self-denigration, namely good manners, modesty, affability, altruism, assertiveness, diffidence, coercive self-deprecation, evasion, diplomacy, and flamboyance. These functions were used to design a 40-item questionnaire on the attitudes of applied linguists concerning self-denigration in defense sessions. The confirmatory factor analysis of the questionnaire indicated the predictive ability of the measurement model. The findings of this study suggest that self-denigration in doctoral defense sessions is the social representation of the participants’ values, ideas and practices adopted as a negotiation strategy and a conflict management policy for the purpose of establishing harmony and maintaining resilience. This study has implications for doctoral students and academics and illuminates further research on self-denigration in other contexts.Keywords: academic discourse, politeness, self-denigration, grounded theory, dissertation defense
Procedia PDF Downloads 13625 Towards an Adversary-Aware ML-Based Detector of Spam on Twitter Hashtags
Authors: Niddal Imam, Vassilios G. Vassilakis
Abstract:
After analysing messages posted by health-related spam campaigns in Twitter Arabic hashtags, we found that these campaigns use unique hijacked accounts (we call them adversarial hijacked accounts) as adversarial examples to fool deployed ML-based spam detectors. Existing ML-based models build a behaviour profile for each user to detect hijacked accounts. This approach is not applicable for detecting spam in Twitter hashtags since they are computationally expensive. Hence, we propose an adversary-aware ML-based detector, which includes a newly designed feature (avg posts) to improve the detection of spam tweets posted by the adversarial hijacked accounts at a tweet-level in trending hashtags. The proposed detector was designed considering three key points: robustness, adaptability, and interpretability. The new feature leverages the account’s temporal patterns (i.e., account age and number of posts). It is faster to compute compared to features discussed in the literature and improves the accuracy of detecting the identified hijacked accounts by 73%.Keywords: Twitter spam detection, adversarial examples, evasion attack, adversarial concept drift, account hijacking, trending hashtag
Procedia PDF Downloads 7724 Debt Portfolios of the Poor: The Case of Street Vendors in Cali, Colombia
Authors: Lina Martinez, Juan David Rivera Acevedo, Isabella Franco
Abstract:
The informal economy plays a significant role in the job market in Colombia. Cali, the third largest city in the country, is characterized by a high percentage of socially and economically vulnerable population groups who take part in the urban informal economy, with street vending as their primary source of income. This paper studies the socio-economic dimensions of street vendors in Cali. In particular, it examines why they are unable to capitalize on their comparatively high earnings and are not likely to escape poverty even though they usually profit from government welfare and tax evasion due to the non-regulated character of informality. The analysis of an observational study and two surveys with 637 and 300 participants show that street vending is a cash-based day-to-day activity. Since most of the street vendors do not have access to formal banking systems, they depend on payday loans with incomparably high interest rates which absorb a large share of their income and maintain a continuous indebtedness. This is one of the main reasons why they are unable to improve their living conditions. However, the daily cash flow masks the high opportunity cost of loans and long-term deficits.Keywords: Colombia, informal economy, payday loans, street vendors
Procedia PDF Downloads 32323 The Strategy of Orbit Avoidance for Optical Remote Sensing Satellite
Authors: Dianxun Zheng, Wuxing Jing, Lin Hetong
Abstract:
Optical remote sensing satellite, always running on the Sun-synchronous orbit, equipped laser warning equipment to alert CCD camera from laser attack. There have three ways to protect the CCD camera, closing the camera cover satellite attitude maneuver and satellite orbit avoidance. In order to enhance the safety of optical remote sensing satellite in orbit, this paper explores the strategy of satellite avoidance. The avoidance strategy is expressed as the evasion of pre-determined target points in the orbital coordinates of virtual satellite. The so-called virtual satellite is a passive vehicle which superposes a satellite at the initial stage of avoidance. The target points share the consistent cycle time and the same semi-major axis with the virtual satellite, which ensures the properties of the Sun-synchronous orbit remain unchanged. Moreover, to further strengthen the avoidance capability of satellite, it can perform multi-object avoid maneuvers. On occasions of fulfilling the orbit tasks of the satellite, the orbit can be restored back to virtual satellite through orbit maneuvers. There into, the avoid maneuvers adopts pulse guidance. and the fuel consumption is also optimized. The avoidance strategy discussed in this article is applicable to avoidance for optical remote sensing satellite when encounter the laser hostile attacks.Keywords: optical remote sensing satellite, always running on the sun-synchronous
Procedia PDF Downloads 39922 Research on the Strategy of Orbital Avoidance for Optical Remote Sensing Satellite
Authors: Zheng DianXun, Cheng Bo, Lin Hetong
Abstract:
This paper focuses on the orbit avoidance strategies of optical remote sensing satellite. The optical remote sensing satellite, moving along the Sun-synchronous orbit, is equipped with laser warning equipment to alert CCD camera from laser attacks. There are three ways to protect the CCD camera: closing the camera cover, satellite attitude maneuver and satellite orbit avoidance. In order to enhance the safety of optical remote sensing satellite in orbit, this paper explores the strategy of satellite avoidance. The avoidance strategy is expressed as the evasion of pre-determined target points in the orbital coordinates of virtual satellite. The so-called virtual satellite is a passive vehicle which superposes the satellite at the initial stage of avoidance. The target points share the consistent cycle time and the same semi-major axis with the virtual satellite, which ensures the properties of the satellite’s Sun-synchronous orbit remain unchanged. Moreover, to further strengthen the avoidance capability of satellite, it can perform multi-target-points avoid maneuvers. On occasions of fulfilling the satellite orbit tasks, the orbit can be restored back to virtual satellite through orbit maneuvers. Thereinto, the avoid maneuvers adopts pulse guidance. And the fuel consumption is also optimized. The avoidance strategy discussed in this article is applicable to optical remote sensing satellite when it is encountered with hostile attack of space-based laser anti-satellite.Keywords: optical remote sensing satellite, satellite avoidance, virtual satellite, avoid target-point, avoid maneuver
Procedia PDF Downloads 40321 Development of High-Performance Conductive Polybenzoxazine/Graphite-Copper Nanoomposite for Electromagnetic Interference Shielding Applications
Authors: Noureddine Ramdani
Abstract:
In recent years, extensive attention has been given to the study of conductive nanocomposites due to their unique properties, which are dependent on their size and shape. The potential applications of these materials include electromagnetic interference shielding, energy storage, photovoltaics, and others. These outstanding properties have led to increased interest and research in this field. In this work, a conductive poly benzoxazine nanocomposite, PBZ/Gr-Cu, was synthesized through a compression molding technique to achieve a high-performance material suitable for electromagnetic interference (EMI) shielding applications. The microstructure of the nanocomposites was analyzed using scanning electron microscopy (SEM) and Fourier transform infrared spectroscopy (FTIR). The thermal stability, electrical conductivity, and EMI shielding properties of the nanocomposites were evaluated using thermogravimetric analysis, a four-point probe, and a VNA analyzer, respectively. The TGA results revealed that the thermal stability and electrical conductivity of the nanocomposites were significantly enhanced by the incorporation of Gr/Cu nanoparticles. The nanocomposites exhibited a low percolation threshold of about 3.5 wt.% and an increase in carrier concentration and mobility of the carriers with increasing hybrid nanofiller content, causing the composites to behave as n-type semiconductors. These nanocomposites also displayed a high dielectric constant and a high dissipation factor in the frequency range of 8-12 GHz, resulting in higher EMI shielding effectiveness (SE) of 25-44 dB. These characteristics make them promising candidates for lightweight EMI shielding materials in aerospace and radar evasion applications.Keywords: polybenzoxazine matrix, conductive nanocomposites, electrical conductivity, EMI shielding
Procedia PDF Downloads 8420 Comparison of Visio-spatial Intelligence Between Amateur Rugby and Netball Players Using a Hand-Eye Coordination Specific Visual Test Battery
Authors: Lourens Millard, Gerrit Jan Breukelman, Nonkululeko Mathe
Abstract:
Aim: The research aims to investigate the differences in visio-spatial skills (VSS) between athletes and non-athletes, as well as variations across sports, presenting conflicting findings. Therefore, the objective of this study was to determine if there exist significant differences in visio-spatial intelligence skills between rugby players and netball players, and whether such disparities are present when comparing both groups to non-athletes. Methods: Participants underwent an optometric assessment, followed by an evaluation of VSS using six established tests: the Hart Near Far Rock, saccadic eye movement, evasion, accumulator, flash memory, and ball wall toss tests. Results: The results revealed that rugby players significantly outperformed netball players in speed of recognition, peripheral awareness, and hand-eye coordination (p=.000). Moreover, both rugby players and netball players performed significantly better than non-athletes in five of the six tests (p=.000), with the exception being the visual memory test (p=.809). Conclusion: This discrepancy in performance suggests that certain VSS are superior in athletes compared to non-athletes, highlighting potential implications for theories of vision, test selection, and the development of sport-specific VSS testing batteries. Furthermore, the use of a hand-eye coordination-specific VSS test battery effectively differentiated between different sports. However, this pattern was not consistent across all VSS tests, indicating that further research should explore the training methods employed by both sports, as these factors may contribute to the observed differences.Keywords: visio-spatial intelligence (VSI), rugby vision, netball vision, visual skills, sport vision.
Procedia PDF Downloads 5019 Economic and Financial Crime, Forensic Accounting and Sustainable Developments Goals (SDGs). Bibliometric Analysis
Authors: Monica Violeta Achim, Sorin Nicolae Borlea
Abstract:
This aim of this work is to stress the needs for enhancing the role of forensic accounting in fighting economic and financial crime, in the context of the new international regulation movements in this area enhanced by the International Federation of Accountants (IFAC). Corruption, money laundering, tax evasion and other frauds significant hamper the economic growth and human development and, ultimately, the UN Sustainable Development Goals. The present paper also stresses the role of good governance in fighting the frauds, in order to achieve the most suitable sustainable development of the society. In this view, we made a bibliometric systematic review on forensic accounting and its contribution towards fraud detection and prevention and theirs relationship with good governance and Sustainable Developments Goals (SDGs). In this view, two powerful bibliometric visual software tools, VosViewer and CiteSpace are used in order to analyze published papers identifies in Scopus and Web of Science databases over the time. Our findings reveal the main red flags identified in literature as used tools by forensic accounting, the evolution in time of the interest of the topic, the distribution in space among world countries and connectivity with patterns of a good governance. Visual designs and scientific maps are useful to show these findings, in a visual way. Our findings are useful for managers and policy makers to provide important avenues that may help in reaching the 2030 Agenda for Sustainable Development, adopted by all United Nations Member States in 2015, in the area of using forensic accounting in preventing frauds.Keywords: forensic accounting, frauds, red flags, SDGs
Procedia PDF Downloads 13818 Difference in Virulence Factor Genes Between Transient and Persistent Streptococcus Uberis Intramammary Infection in Dairy Cattle
Authors: Anyaphat Srithanasuwan, Noppason Pangprasit, Montira Intanon, Phongsakorn Chuammitri, Witaya Suriyasathaporn, Ynte H. Schukken
Abstract:
Streptococcus uberis is one of the most common mastitis-causing pathogens, with a wide range of intramammary infection (IMI) durations and pathogenicity. This study aimed to compare shared or unique virulence factor gene clusters distinguishing persistent and transient strains of S. uberis. A total of 139 S. uberis strains were isolated from three small-holder dairy herds with a high prevalence of S. uberis mastitis. The duration of IMI was used to categorize bacteria into two groups: transient and persistent strains with an IMI duration of less than 1 month and longer than 2 months, respectively. Six representative S. uberis strains, three from each group (transience and persistence) were selected for analysis. All transient strains exhibited multi-locus sequence types (MLST), indicating a highly diverse population of transient S. uberis. In contrast, MLST of persistent strains was available in an online database (pubMLST). Identification of virulence genes was performed using whole-genome sequencing (WGS) data. Differences in genomic size and number of virulent genes were found. For example, the BCA gene or alpha-c protein and the gene associated with capsule formation (hasAB), found in persistent strains, are important for attachment and invasion, as well as the evasion of the antimicrobial mechanisms and survival persistence, respectively. These findings suggest a genetic-level difference between the two strain types. Consequently, a comprehensive study of 139 S. uberis isolates will be conducted to perform an in-depth genetic assessment through WGS analysis on an Illumina platform.Keywords: Streptococcus Uberis, mastitis, whole genome sequence, intramammary infection, persistent S. Uberis, transient s. Uberis
Procedia PDF Downloads 6417 The Role of a Novel DEAD-Box Containing Protein in NLRP3 Inflammasome Activation
Authors: Yi-Hui Lai, Chih-Hsiang Yang, Li-Chung Hsu
Abstract:
The inflammasome is a protein complex that modulates caspase-1 activity, resulting in proteolytic cleavage of proinflammatory cytokines such as IL-1β and IL-18, into their bioactive forms. It has been shown that the inflammasomes play a crucial role in the clearance of pathogenic infection and tissue repair. However, dysregulated inflammasome activation contributes to a wide range of human diseases such as cancers and auto-inflammatory diseases. Yet, regulation of NLRP3 inflammasome activation remains largely unknown. We discovered a novel DEAD box protein, whose biological function has not been reported, not only negatively regulates NLRP3 inflammasome activation by interfering NLRP3 inflammasome assembly and cellular localization but also mitigate pyroptosis upon pathogen evasion. The DEAD-box protein is the first DEAD-box protein gets involved in modulation of the inflammasome activation. In our study, we found that caspase-1 activation and mature IL-1β production were largely enhanced upon LPS challenge in the DEAD box-containing protein- deleted THP-1 macrophages and bone marrow-derived macrophages (BMDMs). In addition, this DEAD box-containing protein migrates from the nucleus to the cytoplasm upon LPS stimulation, which is required for its inhibitory role in NLRP3 inflammasome activation. The DEAD box-containing protein specifically interacted with the LRR motif of NLRP3 via its DEAD domain. Furthermore, due to the crucial role of the NLRP3 LRR domain in the recruitment of NLRP3 to mitochondria and binding to its adaptor ASC, we found that the interaction of NLRP3 and ASC was downregulated in the presence of the DEAD box-containing protein. In addition to the mechanical study, we also found that this DEAD box protein protects host cells from inflammasome-triggered cell death in response to broad-ranging pathogens such as Candida albicans, Streptococcus pneumoniae, etc., involved in nosocomial infections and severe fever shock. Collectively, our results suggest that this novel DEAD box molecule might be a key therapeutic strategy for various infectious diseases.Keywords: inflammasome, inflammation, innate immunity, pyroptosis
Procedia PDF Downloads 28216 In-Depth Analysis on Sequence Evolution and Molecular Interaction of Influenza Receptors (Hemagglutinin and Neuraminidase)
Authors: Dong Tran, Thanh Dac Van, Ly Le
Abstract:
Hemagglutinin (HA) and Neuraminidase (NA) play an important role in host immune evasion across influenza virus evolution process. The correlation between HA and NA evolution in respect to epitopic evolution and drug interaction has yet to be investigated. In this study, combining of sequence to structure evolution and statistical analysis on epitopic/binding site specificity, we identified potential therapeutic features of HA and NA that show specific antibody binding site of HA and specific binding distribution within NA active site of current inhibitors. Our approach introduces the use of sequence variation and molecular interaction to provide an effective strategy in establishing experimental based distributed representations of protein-protein/ligand complexes. The most important advantage of our method is that it does not require complete dataset of complexes but rather directly inferring feature interaction from sequence variation and molecular interaction. Using correlated sequence analysis, we additionally identified co-evolved mutations associated with maintaining HA/NA structural and functional variability toward immunity and therapeutic treatment. Our investigation on the HA binding specificity revealed unique conserved stalk domain interacts with unique loop domain of universal antibodies (CR9114, CT149, CR8043, CR8020, F16v3, CR6261, F10). On the other hand, NA inhibitors (Oseltamivir, Zaninamivir, Laninamivir) showed specific conserved residue contribution and similar to that of NA substrate (sialic acid) which can be exploited for drug design. Our study provides an important insight into rational design and identification of novel therapeutics targeting universally recognized feature of influenza HA/NA.Keywords: influenza virus, hemagglutinin (HA), neuraminidase (NA), sequence evolution
Procedia PDF Downloads 16215 A Machine Learning-Based Model to Screen Antituberculosis Compound Targeted against LprG Lipoprotein of Mycobacterium tuberculosis
Authors: Syed Asif Hassan, Syed Atif Hassan
Abstract:
Multidrug-resistant Tuberculosis (MDR-TB) is an infection caused by the resistant strains of Mycobacterium tuberculosis that do not respond either to isoniazid or rifampicin, which are the most important anti-TB drugs. The increase in the occurrence of a drug-resistance strain of MTB calls for an intensive search of novel target-based therapeutics. In this context LprG (Rv1411c) a lipoprotein from MTB plays a pivotal role in the immune evasion of Mtb leading to survival and propagation of the bacterium within the host cell. Therefore, a machine learning method will be developed for generating a computational model that could predict for a potential anti LprG activity of the novel antituberculosis compound. The present study will utilize dataset from PubChem database maintained by National Center for Biotechnology Information (NCBI). The dataset involves compounds screened against MTB were categorized as active and inactive based upon PubChem activity score. PowerMV, a molecular descriptor generator, and visualization tool will be used to generate the 2D molecular descriptors for the actives and inactive compounds present in the dataset. The 2D molecular descriptors generated from PowerMV will be used as features. We feed these features into three different classifiers, namely, random forest, a deep neural network, and a recurring neural network, to build separate predictive models and choosing the best performing model based on the accuracy of predicting novel antituberculosis compound with an anti LprG activity. Additionally, the efficacy of predicted active compounds will be screened using SMARTS filter to choose molecule with drug-like features.Keywords: antituberculosis drug, classifier, machine learning, molecular descriptors, prediction
Procedia PDF Downloads 390