CINXE.COM
Search results for: message framing
<!DOCTYPE html> <html lang="en" dir="ltr"> <head> <!-- Google tag (gtag.js) --> <script async src="https://www.googletagmanager.com/gtag/js?id=G-P63WKM1TM1"></script> <script> window.dataLayer = window.dataLayer || []; function gtag(){dataLayer.push(arguments);} gtag('js', new Date()); gtag('config', 'G-P63WKM1TM1'); </script> <!-- Yandex.Metrika counter --> <script type="text/javascript" > (function(m,e,t,r,i,k,a){m[i]=m[i]||function(){(m[i].a=m[i].a||[]).push(arguments)}; m[i].l=1*new Date(); for (var j = 0; j < document.scripts.length; j++) {if (document.scripts[j].src === r) { return; }} k=e.createElement(t),a=e.getElementsByTagName(t)[0],k.async=1,k.src=r,a.parentNode.insertBefore(k,a)}) (window, document, "script", "https://mc.yandex.ru/metrika/tag.js", "ym"); ym(55165297, "init", { clickmap:false, trackLinks:true, accurateTrackBounce:true, webvisor:false }); </script> <noscript><div><img src="https://mc.yandex.ru/watch/55165297" style="position:absolute; left:-9999px;" alt="" /></div></noscript> <!-- /Yandex.Metrika counter --> <!-- Matomo --> <!-- End Matomo Code --> <title>Search results for: message framing</title> <meta name="description" content="Search results for: message framing"> <meta name="keywords" content="message framing"> <meta name="viewport" content="width=device-width, initial-scale=1, minimum-scale=1, maximum-scale=1, user-scalable=no"> <meta charset="utf-8"> <link href="https://cdn.waset.org/favicon.ico" type="image/x-icon" rel="shortcut icon"> <link href="https://cdn.waset.org/static/plugins/bootstrap-4.2.1/css/bootstrap.min.css" rel="stylesheet"> <link href="https://cdn.waset.org/static/plugins/fontawesome/css/all.min.css" rel="stylesheet"> <link href="https://cdn.waset.org/static/css/site.css?v=150220211555" rel="stylesheet"> </head> <body> <header> <div class="container"> <nav class="navbar navbar-expand-lg navbar-light"> <a class="navbar-brand" href="https://waset.org"> <img src="https://cdn.waset.org/static/images/wasetc.png" alt="Open Science Research Excellence" title="Open Science Research Excellence" /> </a> <button class="d-block d-lg-none navbar-toggler ml-auto" type="button" data-toggle="collapse" data-target="#navbarMenu" aria-controls="navbarMenu" aria-expanded="false" aria-label="Toggle navigation"> <span class="navbar-toggler-icon"></span> </button> <div class="w-100"> <div class="d-none d-lg-flex flex-row-reverse"> <form method="get" action="https://waset.org/search" class="form-inline my-2 my-lg-0"> <input class="form-control mr-sm-2" type="search" placeholder="Search Conferences" value="message framing" name="q" aria-label="Search"> <button class="btn btn-light my-2 my-sm-0" type="submit"><i class="fas fa-search"></i></button> </form> </div> <div class="collapse navbar-collapse mt-1" id="navbarMenu"> <ul class="navbar-nav ml-auto align-items-center" id="mainNavMenu"> <li class="nav-item"> <a class="nav-link" href="https://waset.org/conferences" title="Conferences in 2024/2025/2026">Conferences</a> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/disciplines" title="Disciplines">Disciplines</a> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/committees" rel="nofollow">Committees</a> </li> <li class="nav-item dropdown"> <a class="nav-link dropdown-toggle" href="#" id="navbarDropdownPublications" role="button" data-toggle="dropdown" aria-haspopup="true" aria-expanded="false"> Publications </a> <div class="dropdown-menu" aria-labelledby="navbarDropdownPublications"> <a class="dropdown-item" href="https://publications.waset.org/abstracts">Abstracts</a> <a class="dropdown-item" href="https://publications.waset.org">Periodicals</a> <a class="dropdown-item" href="https://publications.waset.org/archive">Archive</a> </div> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/page/support" title="Support">Support</a> </li> </ul> </div> </div> </nav> </div> </header> <main> <div class="container mt-4"> <div class="row"> <div class="col-md-9 mx-auto"> <form method="get" action="https://publications.waset.org/abstracts/search"> <div id="custom-search-input"> <div class="input-group"> <i class="fas fa-search"></i> <input type="text" class="search-query" name="q" placeholder="Author, Title, Abstract, Keywords" value="message framing"> <input type="submit" class="btn_search" value="Search"> </div> </div> </form> </div> </div> <div class="row mt-3"> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Commenced</strong> in January 2007</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Frequency:</strong> Monthly</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Edition:</strong> International</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Paper Count:</strong> 543</div> </div> </div> </div> <h1 class="mt-3 mb-3 text-center" style="font-size:1.6rem;">Search results for: message framing</h1> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">543</span> Exploring Framing Effect and Repetition Effect of the Persuasive Message on Moral Decision Making in Conflict of Interests</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Sae-Yeon%20Seong">Sae-Yeon Seong</a>, <a href="https://publications.waset.org/abstracts/search?q=EunSun%20Chung"> EunSun Chung</a>, <a href="https://publications.waset.org/abstracts/search?q=Dongjoo%20Chin"> Dongjoo Chin</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Conflict of interest (COI) is one of the dominant circumstantial factors of moral corruption across various fields. Several management strategies have been proposed to prevent self-interested decision making in COIs. Among these strategies, message persuasion has been considered as a practical and effective approach. Framing and repetition are two of the major factors in the persuasion effect of message. Therefore, their effect on moral decision making in COI should be explored systematically. The purpose of this study was to compare the differential effects of positively framed message and negatively framed message, and secondly, to investigate how the effectiveness of persuasive message changes through repetitive exposures. A total of 63 participants were randomly assigned to one of 3 framing conditions: positive framing, negative framing, and no-message condition. Prior to the online experiment involving a consultation task, the differently framed persuasive message was presented to the participants. This process was repeated four times in a row. The results showed that participants with positive-framing message were less likely to provide self-interested consultation than participants in the no-message condition. Also, a U-shaped quadric relation between repetition and self-interest consultation was found. Implications and limitations are further discussed. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=conflicts%20of%20interest" title="conflicts of interest">conflicts of interest</a>, <a href="https://publications.waset.org/abstracts/search?q=persuasive%20message" title=" persuasive message"> persuasive message</a>, <a href="https://publications.waset.org/abstracts/search?q=framing%20effect" title=" framing effect"> framing effect</a>, <a href="https://publications.waset.org/abstracts/search?q=repetition%20effect" title=" repetition effect"> repetition effect</a>, <a href="https://publications.waset.org/abstracts/search?q=self-interested%20behavior" title=" self-interested behavior"> self-interested behavior</a> </p> <a href="https://publications.waset.org/abstracts/97223/exploring-framing-effect-and-repetition-effect-of-the-persuasive-message-on-moral-decision-making-in-conflict-of-interests" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/97223.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">176</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">542</span> When Messages Cause Distraction from Advertising: An Eye-Tracking Study</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Nilamadhab%20Mohanty">Nilamadhab Mohanty</a> </p> <p class="card-text"><strong>Abstract:</strong></p> It is essential to use message formats that make communication understandable and correct. It is because; the information format can influence consumer decision on the purchase of a product. This study combines information from qualitative inquiry, media trend analysis, eye tracking experiment, and questionnaire data to examine the impact of specific message format and consumer perceived risk on attention to the information and risk retention. We investigated the influence of message framing (goal framing, attribute framing, and mix framing) on consumer memory, study time, and decisional uncertainty while deciding on the purchase of drugs. Furthermore, we explored the impact of consumer perceived risk (associated with the use of the drug, i.e., RISK-AB and perceived risk associated with the non-use of the drug, i.e., RISK-EB) on message format preference. The study used eye-tracking methods to understand the differences in message processing. Findings of the study suggest that the message format influences information processing, and participants' risk perception impacts message format preference. Eye tracking can be used to understand the format differences and design effective advertisements. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=message%20framing" title="message framing">message framing</a>, <a href="https://publications.waset.org/abstracts/search?q=consumer%20perceived%20risk" title=" consumer perceived risk"> consumer perceived risk</a>, <a href="https://publications.waset.org/abstracts/search?q=advertising" title=" advertising"> advertising</a>, <a href="https://publications.waset.org/abstracts/search?q=eye%20tracking" title=" eye tracking"> eye tracking</a> </p> <a href="https://publications.waset.org/abstracts/109706/when-messages-cause-distraction-from-advertising-an-eye-tracking-study" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/109706.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">122</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">541</span> How Message Framing and Temporal Distance Affect Word of Mouth</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Camille%20Lacan">Camille Lacan</a>, <a href="https://publications.waset.org/abstracts/search?q=Pierre%20Desmet"> Pierre Desmet</a> </p> <p class="card-text"><strong>Abstract:</strong></p> In the crowdfunding model, a campaign succeeds by collecting the funds required over a predefined duration. The success of a CF campaign depends both on the capacity to attract members of the online communities concerned, and on the community members’ involvement in online word-of-mouth recommendations. To maximize the campaign's success probability, project creators (i.e., an organization appealing for financial resources) send messages to contributors to ask them to issue word of mouth. Internet users relay information about projects through Word of Mouth which is defined as “a critical tool for facilitating information diffusion throughout online communities”. The effectiveness of these messages depends on the message framing and the time at which they are sent to contributors (i.e., at the start of the campaign or close to the deadline). This article addresses the following question: What are the effect of message framing and temporal distance on the willingness to share word of mouth? Drawing on Perspectives Theory and Construal Level Theory, this study examines the interplay between message framing (Gains vs. Losses) and temporal distance (message while the deadline is coming vs. far) on intention to share word of mouth. A between-subject experimental design is conducted to test the research model. Results show significant differences between a loss-framed message (lack of benefits if the campaign fails) associated with a short deadline (ending tomorrow) compared to a gain-framed message (benefits if the campaign succeeds) associated with a distant deadline (ending in three months). However, this effect is moderated by the anticipated regret of a campaign failure and the temporal orientation. These moderating effects contribute to specifying the boundary condition of the framing effect. Handling the message framing and the temporal distance are thus the key decisions to influence the willingness to share word of mouth. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=construal%20levels" title="construal levels">construal levels</a>, <a href="https://publications.waset.org/abstracts/search?q=crowdfunding" title=" crowdfunding"> crowdfunding</a>, <a href="https://publications.waset.org/abstracts/search?q=message%20framing" title=" message framing"> message framing</a>, <a href="https://publications.waset.org/abstracts/search?q=word%20of%20mouth" title=" word of mouth"> word of mouth</a> </p> <a href="https://publications.waset.org/abstracts/58854/how-message-framing-and-temporal-distance-affect-word-of-mouth" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/58854.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">252</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">540</span> Application of Modulo-2 Arithmetic in Securing Communicated Messages throughout the Globe </h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Ejd%20Garba">Ejd Garba</a>, <a href="https://publications.waset.org/abstracts/search?q=Okike%20Benjamin"> Okike Benjamin</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Today, the word encryption has become very popular even among non-computer professionals. There is no doubt that some works have been carried out in this area, but more works need to be done. Presently, most of the works on encryption is concentrated on the sender of the message without paying any attention to the message recipient. However, it is a good practice if any message sent to someone is received by the particular person whom the message is sent to. This work seeks to ensure that at the receiving end of the message, there is a security to ensure that the recipient computes a key that would enable the encrypted message to be accessed. This key would be in form of password. This would make it possible for a given message to be sent to several people at the same time. When this happens, it is only those people who computes the key correctly that would be given the opportunity to access even the encrypted message, which can in turn be decrypted using the appropriate key. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=arithmetic" title="arithmetic">arithmetic</a>, <a href="https://publications.waset.org/abstracts/search?q=cyber%20space" title=" cyber space"> cyber space</a>, <a href="https://publications.waset.org/abstracts/search?q=modulo-2" title=" modulo-2"> modulo-2</a>, <a href="https://publications.waset.org/abstracts/search?q=information%20security" title=" information security "> information security </a> </p> <a href="https://publications.waset.org/abstracts/30281/application-of-modulo-2-arithmetic-in-securing-communicated-messages-throughout-the-globe" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/30281.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">320</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">539</span> Advertising Message Strategy on Ghana’s TV</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Aisha%20Iddrisu">Aisha Iddrisu</a>, <a href="https://publications.waset.org/abstracts/search?q=Ferruh%20Uztu%C4%9F"> Ferruh Uztuğ</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This study is a quantitative content analysis of advertising message strategies used in Ghana’s TV commercials (2020-2021) using the modified strategy of Wang and Praet (2016) with the objective of exploring the various advertising message strategies used in Ghana’s TV advertisement, its variation according to product category including the most widely used message strategy. The findings indicate that, out of the 220 commercials used in the study, the Affective message strategy (n=122, 55%) was the dominant message strategy used in Ghana’s TV commercials. The most advertised product category in Ghana’s TV commercials (2020-2021) was the food category, and a significant relationship was observed between message strategy and product category as well as message strategy and brand type. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=advertising" title="advertising">advertising</a>, <a href="https://publications.waset.org/abstracts/search?q=message%20strategy" title=" message strategy"> message strategy</a>, <a href="https://publications.waset.org/abstracts/search?q=Ghana" title=" Ghana"> Ghana</a>, <a href="https://publications.waset.org/abstracts/search?q=television" title=" television"> television</a> </p> <a href="https://publications.waset.org/abstracts/170306/advertising-message-strategy-on-ghanas-tv" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/170306.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">184</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">538</span> Mathematical Model That Using Scrambling and Message Integrity Methods in Audio Steganography</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Mohammed%20Salem%20Atoum">Mohammed Salem Atoum</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The success of audio steganography is to ensure imperceptibility of the embedded message in stego file and withstand any form of intentional or un-intentional degradation of message (robustness). Audio steganographic that utilized LSB of audio stream to embed message gain a lot of popularity over the years in meeting the perceptual transparency, robustness and capacity. This research proposes an XLSB technique in order to circumvent the weakness observed in LSB technique. Scrambling technique is introduce in two steps; partitioning the message into blocks followed by permutation each blocks in order to confuse the contents of the message. The message is embedded in the MP3 audio sample. After extracting the message, the permutation codebook is used to re-order it into its original form. Md5sum and SHA-256 are used to verify whether the message is altered or not during transmission. Experimental result shows that the XLSB performs better than LSB. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=XLSB" title="XLSB">XLSB</a>, <a href="https://publications.waset.org/abstracts/search?q=scrambling" title=" scrambling"> scrambling</a>, <a href="https://publications.waset.org/abstracts/search?q=audio%20steganography" title=" audio steganography"> audio steganography</a>, <a href="https://publications.waset.org/abstracts/search?q=security" title=" security"> security</a> </p> <a href="https://publications.waset.org/abstracts/42449/mathematical-model-that-using-scrambling-and-message-integrity-methods-in-audio-steganography" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/42449.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">363</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">537</span> Persuading ICT Consumers to Disconnect from Work: An Experimental Study on the Influence of Message Frame, Regulatory Focus, Ad Believability and Attitude toward the Ad on Message Effectiveness</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Katharina%20Ninaus">Katharina Ninaus</a>, <a href="https://publications.waset.org/abstracts/search?q=Ralf%20Terlutter"> Ralf Terlutter</a>, <a href="https://publications.waset.org/abstracts/search?q=Sandra%20Diehl"> Sandra Diehl</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Information and communication technologies (ICT) have become pervasive in all areas of modern life, both in work and leisure. Technological developments and particularly the ubiquity of smartphones have made it possible for ICT consumers to be constantly connected to work, fostering an always-on mentality and increasing the pressure to be accessible at all times. However, performing work tasks outside of working hours using ICT results in a lack of mental detachment and recovery from work. It is, therefore, necessary to develop effective behavioral interventions to increase risk awareness of a constant connection to the workplace in the employed population. Drawing on regulatory focus theory, this study aims to investigate the persuasiveness of tailoring messages to individuals’ chronic regulatory focus in order to encourage ICT consumers to set boundaries by defining fixed times for professional accessibility outside of working hours in order to contribute to the well-being of ICT consumers with high ICT involvement in their work life. The experimental study examines the interaction effect between consumers’ chronic regulatory focus (i.e. promotion focus versus prevention focus) and positive or negative message framing (i.e. gain frame versus loss frame) on consumers’ intention to perform the advocated behavior. Based on the assumption that congruent messages create regulatory fit and increase message effectiveness, it is hypothesized that behavioral intention will be higher in the condition of regulatory fit compared to regulatory non-fit. It is further hypothesized that ad believability and attitude toward the ad will mediate the effect of regulatory fit on behavioral intention given that ad believability and ad attitude both determine consumer behavioral responses. Results confirm that the interaction between regulatory focus and message frame emerged as a predictor of behavioral intention such as that consumers’ intentions to set boundaries by defining fixed times for professional accessibility outside of working hours increased as congruency with their regulatory focus increased. The loss-framed ad was more effective for consumers with a predominant prevention focus, while the gain-framed ad was more effective for consumers with a predominant promotion focus. Ad believability and attitude toward the ad both emerged as predictors of behavioral intention. Mediation analysis revealed that the direct effect of the interaction between regulatory focus and message frame on behavioral intention was no longer significant when including ad believability and ad attitude as mediators in the model, indicating full mediation. However, while the indirect effect through ad believability was significant, the indirect effect through attitude toward the ad was not significant. Hence, regulatory fit increased ad believability, which then increased behavioral intention. Ad believability appears to have a superior effect indicating that behavioral intention does not depend on attitude toward the ad, but it depends on whether or not the ad is perceived as believable. The study shows that the principle of regulatory fit holds true in the context of ICT consumption and responds to calls for more research on mediators of health message framing effects. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=always-on%20mentality" title="always-on mentality">always-on mentality</a>, <a href="https://publications.waset.org/abstracts/search?q=Information%20and%20communication%20technologies%20%28ICT%29%20consumption" title=" Information and communication technologies (ICT) consumption"> Information and communication technologies (ICT) consumption</a>, <a href="https://publications.waset.org/abstracts/search?q=message%20framing" title=" message framing"> message framing</a>, <a href="https://publications.waset.org/abstracts/search?q=regulatory%20focus" title=" regulatory focus"> regulatory focus</a> </p> <a href="https://publications.waset.org/abstracts/70435/persuading-ict-consumers-to-disconnect-from-work-an-experimental-study-on-the-influence-of-message-frame-regulatory-focus-ad-believability-and-attitude-toward-the-ad-on-message-effectiveness" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/70435.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">210</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">536</span> Wood Framing Roof Resistant Support for Hurricane</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=P.%20Hajyalikhani">P. Hajyalikhani</a>, <a href="https://publications.waset.org/abstracts/search?q=E.%20Gilmore"> E. Gilmore</a>, <a href="https://publications.waset.org/abstracts/search?q=C.%20Petty"> C. Petty</a>, <a href="https://publications.waset.org/abstracts/search?q=J.%20Duron"> J. Duron</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Wood framed construction is the most popular method of construction for residential buildings. The typical roof framing for wood-framed buildings is sloped and consists of several structural members, such as rafters, hips, and valleys that link to the ridge and ceiling joists. The most common type of wood framing used is platform framing, also known as stick framing. Failures of the wood framing structures are among the most common types of wind damage in densely populated regions. Wood-framed buildings are under uplift during tornadoes and hurricanes which cause the failure in the roof. The bracing long structure members such as hip and valley have a large impact on the resilience of wood-framed buildings. As a result, the common failures in wood-framed buildings are reviewed, and the critical support locations for lengthy hips and valleys with various slopes are analyzed and recommended. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=rafters" title="rafters">rafters</a>, <a href="https://publications.waset.org/abstracts/search?q=hips" title=" hips"> hips</a>, <a href="https://publications.waset.org/abstracts/search?q=valleys" title=" valleys"> valleys</a>, <a href="https://publications.waset.org/abstracts/search?q=hip" title=" hip"> hip</a>, <a href="https://publications.waset.org/abstracts/search?q=ceiling%20joist" title=" ceiling joist"> ceiling joist</a>, <a href="https://publications.waset.org/abstracts/search?q=roof%20failures" title=" roof failures"> roof failures</a>, <a href="https://publications.waset.org/abstracts/search?q=residential%20and%20commercial%20structures" title=" residential and commercial structures"> residential and commercial structures</a>, <a href="https://publications.waset.org/abstracts/search?q=hurricane" title=" hurricane"> hurricane</a>, <a href="https://publications.waset.org/abstracts/search?q=tornadoes" title=" tornadoes"> tornadoes</a>, <a href="https://publications.waset.org/abstracts/search?q=building%20codes" title=" building codes"> building codes</a> </p> <a href="https://publications.waset.org/abstracts/183819/wood-framing-roof-resistant-support-for-hurricane" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/183819.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">67</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">535</span> Political News Coverage in Philippine Tabloid Sheets: A Critical Discourse Analysis</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Michael%20Steve%20Lopez%20Bernabe">Michael Steve Lopez Bernabe</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Political news coverage of tabloid sheets as one of the print media molds or influences public opinions and perceptions. In this study, Critical Discourse Analysis was employed to 30 political news taken from major tabloid sheets in the Philippines in order to determine the linguistics features and other features characterizing the political news in tabloids such as discursive styles, news topics or contexts, journalistic roles and news sources. The political underpinnings through framing were also explored in the study. The results revealed that the linguistics features of the news coverage include moods and modalities (morphology), passivity and transitivity, nominalization, appositives and embedding (syntax), and pre-modifications, the use of verbs and omissions (grammatical features). The discursive features were direct or indirect speech; cohesion; endophora and classifications. In terms of news sources were politicians, experts, and journalists; and the tabloid perform the journalistic roles such as an intervention, watchdog, loyal-facilitator, service, infotainment and civic. The news was also evident of different political underpinnings such as game or strategic framing, conflict framing, human interest framing, attrition of responsibility framing, morality framing, economic consequences framing and issue framing. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=critical%20discourse%20analysis" title="critical discourse analysis">critical discourse analysis</a>, <a href="https://publications.waset.org/abstracts/search?q=political%20news" title=" political news"> political news</a>, <a href="https://publications.waset.org/abstracts/search?q=applied%20linguistics" title=" applied linguistics"> applied linguistics</a>, <a href="https://publications.waset.org/abstracts/search?q=Philippines" title=" Philippines"> Philippines</a>, <a href="https://publications.waset.org/abstracts/search?q=tabloid%20sheets" title=" tabloid sheets"> tabloid sheets</a> </p> <a href="https://publications.waset.org/abstracts/185742/political-news-coverage-in-philippine-tabloid-sheets-a-critical-discourse-analysis" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/185742.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">45</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">534</span> Pattern in Splitting Sequence in Okike’s Merged Irregular Transposition Cipher for Encrypting Cyberspace Messages</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Okike%20Benjamin">Okike Benjamin</a>, <a href="https://publications.waset.org/abstracts/search?q=E.%20J.%20D.%20Garba"> E. J. D. Garba </a> </p> <p class="card-text"><strong>Abstract:</strong></p> The protection of sensitive information against unauthorized access or fraudulent changes has been of prime concern throughout the centuries. Modern communication techniques, using computers connected through networks, make all data even more vulnerable to these threats. The researchers in this work propose a new encryption technique to be known as Merged Irregular Transposition Cipher. In this proposed encryption technique, a message to be encrypted will first of all be split into multiple parts depending on the length of the message. After the split, different keywords are chosen to encrypt different parts of the message. After encrypting all parts of the message, the positions of the encrypted message could be swapped to other position thereby making it very difficult to decrypt by any unauthorized user. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=information%20security" title="information security">information security</a>, <a href="https://publications.waset.org/abstracts/search?q=message%20splitting" title=" message splitting"> message splitting</a>, <a href="https://publications.waset.org/abstracts/search?q=pattern" title=" pattern"> pattern</a>, <a href="https://publications.waset.org/abstracts/search?q=sequence" title=" sequence "> sequence </a> </p> <a href="https://publications.waset.org/abstracts/22633/pattern-in-splitting-sequence-in-okikes-merged-irregular-transposition-cipher-for-encrypting-cyberspace-messages" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/22633.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">289</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">533</span> The Factors Constitute the Interaction between Teachers and Students: An Empirical Study at the Notion of Framing</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Tien-Hui%20Chiang">Tien-Hui Chiang</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The code theory, proposed by Basil Bernstein, indicates that framing can be viewed as the core element in constituting the phenomenon of cultural reproduction because it is able to regulate the transmission of pedagogical information. Strong framing increases the social relation boundary between a teacher and pupils, which obstructs information transmission, so that in order to improve underachieving students’ academic performances, teachers need to reduce to strength of framing. Weak framing enables them to transform academic knowledge into commonsense knowledge in daily life language. This study posits that most teachers would deliver strong framing due to their belief mainly confined within the aspect of instrumental rationality that deprives their critical minds. This situation could make them view the normal distribution bell curve of students’ academic performances as a natural outcome. In order to examine the interplay between framing, instrumental rationality and pedagogical action, questionnaires were completed by over 5,000 primary school teachers in Henan province, China, who were stratified sample. The statistical results show that most teachers employed psychological concepts to measure students’ academic performances and, in turn, educational inequity was legitimatized as a natural outcome in the efficiency-led approach. Such efficiency-led minds made them perform as the agent practicing the mechanism of social control and in turn sustaining the phenomenon of cultural reproduction. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=code" title="code">code</a>, <a href="https://publications.waset.org/abstracts/search?q=cultural%20reproduction" title=" cultural reproduction"> cultural reproduction</a>, <a href="https://publications.waset.org/abstracts/search?q=framing" title=" framing"> framing</a>, <a href="https://publications.waset.org/abstracts/search?q=instrumental%20rationality" title=" instrumental rationality"> instrumental rationality</a>, <a href="https://publications.waset.org/abstracts/search?q=social%20relation%20and%20interaction" title=" social relation and interaction"> social relation and interaction</a> </p> <a href="https://publications.waset.org/abstracts/101994/the-factors-constitute-the-interaction-between-teachers-and-students-an-empirical-study-at-the-notion-of-framing" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/101994.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">151</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">532</span> Use of Personal Rhythm to Authenticate Encrypted Messages</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Carlos%20Gonzalez">Carlos Gonzalez</a> </p> <p class="card-text"><strong>Abstract:</strong></p> When communicating using private and secure keys, there is always the doubt as to the identity of the message creator. We introduce an algorithm that uses the personal typing rhythm (keystroke dynamics) of the message originator to increase the trust of the authenticity of the message originator by the message recipient. The methodology proposes the use of a Rhythm Certificate Authority (RCA) to validate rhythm information. An illustrative example of the communication between Bob and Alice and the RCA is included. An algorithm of how to communicate with the RCA is presented. This RCA can be an independent authority or an enhanced Certificate Authority like the one used in public key infrastructure (PKI). <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=authentication" title="authentication">authentication</a>, <a href="https://publications.waset.org/abstracts/search?q=digital%20signature" title=" digital signature"> digital signature</a>, <a href="https://publications.waset.org/abstracts/search?q=keystroke%20dynamics" title=" keystroke dynamics"> keystroke dynamics</a>, <a href="https://publications.waset.org/abstracts/search?q=personal%20rhythm" title=" personal rhythm"> personal rhythm</a>, <a href="https://publications.waset.org/abstracts/search?q=public-key%20encryption" title=" public-key encryption"> public-key encryption</a> </p> <a href="https://publications.waset.org/abstracts/66737/use-of-personal-rhythm-to-authenticate-encrypted-messages" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/66737.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">304</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">531</span> Unsupervised Sentiment Analysis for Indonesian Political Message on Twitter </h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Omar%20Abdillah">Omar Abdillah</a>, <a href="https://publications.waset.org/abstracts/search?q=Mirna%20Adriani"> Mirna Adriani</a> </p> <p class="card-text"><strong>Abstract:</strong></p> In this work, we perform new approach for analyzing public sentiment towards the presidential candidate in the 2014 Indonesian election that expressed in Twitter. In this study we propose such procedure for analyzing sentiment over Indonesian political message by understanding the behavior of Indonesian society in sending message on Twitter. We took different approach from previous works by utilizing punctuation mark and Indonesian sentiment lexicon that completed with the new procedure in determining sentiment towards the candidates. Our experiment shows the performance that yields up to 83.31% of average precision. In brief, this work makes two contributions: first, this work is the preliminary study of sentiment analysis in the domain of political message that has not been addressed yet before. Second, we propose such method to conduct sentiment analysis by creating decision making procedure in which it is in line with the characteristic of Indonesian message on Twitter. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=unsupervised%20sentiment%20analysis" title="unsupervised sentiment analysis">unsupervised sentiment analysis</a>, <a href="https://publications.waset.org/abstracts/search?q=political%20message" title=" political message"> political message</a>, <a href="https://publications.waset.org/abstracts/search?q=lexicon%20based" title=" lexicon based"> lexicon based</a>, <a href="https://publications.waset.org/abstracts/search?q=user%20behavior%20understanding" title=" user behavior understanding"> user behavior understanding</a> </p> <a href="https://publications.waset.org/abstracts/20304/unsupervised-sentiment-analysis-for-indonesian-political-message-on-twitter" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/20304.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">480</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">530</span> Carrier Communication through Power Lines</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Pavuluri%20Gopikrishna">Pavuluri Gopikrishna</a>, <a href="https://publications.waset.org/abstracts/search?q=B.%20Neelima"> B. Neelima</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Power line carrier communication means audio power transmission via power line and reception of the amplified audio power at the receiver as in the form of speaker output signal using power line as the channel medium. The main objective of this suggested work is to transmit our message signal after frequency modulation by the help of FM modulator IC LM565 which gives output proportional to the input voltage of the input message signal. And this audio power is received from the power line by the help of isolation circuit and demodulated from IC LM565 which uses the concept of the PLL and produces FM demodulated signal to the listener. Message signal will be transmitted over the carrier signal that will be generated from the FM modulator IC LM565. Using this message signal will not damage because of no direct contact of message signal from the power line, but noise can disturb our information. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=amplification" title="amplification">amplification</a>, <a href="https://publications.waset.org/abstracts/search?q=fm%20demodulator%20ic%20565" title=" fm demodulator ic 565"> fm demodulator ic 565</a>, <a href="https://publications.waset.org/abstracts/search?q=fm%20modulator%20ic%20565" title=" fm modulator ic 565"> fm modulator ic 565</a>, <a href="https://publications.waset.org/abstracts/search?q=phase%20locked%20loop" title=" phase locked loop"> phase locked loop</a>, <a href="https://publications.waset.org/abstracts/search?q=power%20isolation" title=" power isolation"> power isolation</a> </p> <a href="https://publications.waset.org/abstracts/31017/carrier-communication-through-power-lines" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/31017.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">552</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">529</span> The Effect of ‘Love Accounting’ on Gift Budgeting</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Yanan%20Wang">Yanan Wang</a> </p> <p class="card-text"><strong>Abstract:</strong></p> It is proposed that when people give a gift they engage in 'love accounting', so that they will spend less on it if they include a written expression of love with it. This hypothesis was tested with college students (N = 308). It was found that participants who wrote a love message to accompany a Mother's Day gift budgeted less for the gift itself than control participants (Experiment 1), and this effect was replicated for a Christmas gift (Experiment 2). The amount of effort expended by the giver on preparing the love message did not account for the effect (Experiment 3). It is concluded that a gift and its accompanying love message are mentally computed as belonging to the same love account, implying that consumers’ excessive splurging on gifts might be controlled by writing a love message before gift shopping. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=expression%20of%20love" title="expression of love">expression of love</a>, <a href="https://publications.waset.org/abstracts/search?q=gift-giving" title=" gift-giving"> gift-giving</a>, <a href="https://publications.waset.org/abstracts/search?q=gift-budgeting" title=" gift-budgeting"> gift-budgeting</a>, <a href="https://publications.waset.org/abstracts/search?q=mental%20accounting" title=" mental accounting"> mental accounting</a> </p> <a href="https://publications.waset.org/abstracts/40374/the-effect-of-love-accounting-on-gift-budgeting" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/40374.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">328</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">528</span> A New Method for Fault Detection</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Mehmet%20Hakan%20Karaata">Mehmet Hakan Karaata</a>, <a href="https://publications.waset.org/abstracts/search?q=Ali%20Hamdan"> Ali Hamdan</a>, <a href="https://publications.waset.org/abstracts/search?q=Omer%20Yusuf%20Adam%20Mohamed"> Omer Yusuf Adam Mohamed</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Consider a distributed system that delivers messages from a process to another. Such a system is often required to deliver each message to its destination regardless of whether or not the system components experience arbitrary forms of faults. In addition, each message received by the destination must be a message sent by a system process. In this paper, we first identify the necessary and sufficient conditions to detect some restricted form of Byzantine faults referred to as modifying Byzantine faults. An observable form of a Byzantine fault whose effect is limited to the modification of a message metadata or content, timing and omission faults, and message replay is referred to as a modifying Byzantine fault. We then present a distributed protocol to detect modifying Byzantine faults using optimal number of messages over node-disjoint paths. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=Byzantine%20faults" title="Byzantine faults">Byzantine faults</a>, <a href="https://publications.waset.org/abstracts/search?q=distributed%20systems" title=" distributed systems"> distributed systems</a>, <a href="https://publications.waset.org/abstracts/search?q=fault%20detection" title=" fault detection"> fault detection</a>, <a href="https://publications.waset.org/abstracts/search?q=network%20protocols" title=" network protocols"> network protocols</a>, <a href="https://publications.waset.org/abstracts/search?q=node-disjoint%20paths" title=" node-disjoint paths"> node-disjoint paths</a> </p> <a href="https://publications.waset.org/abstracts/21437/a-new-method-for-fault-detection" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/21437.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">448</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">527</span> Modifying Byzantine Fault Detection Using Disjoint Paths</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Mehmet%20Hakan%20Karaata">Mehmet Hakan Karaata</a>, <a href="https://publications.waset.org/abstracts/search?q=Ali%20Hamdan"> Ali Hamdan</a>, <a href="https://publications.waset.org/abstracts/search?q=Omer%20Yusuf%20Adam%20Mohamed"> Omer Yusuf Adam Mohamed</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Consider a distributed system that delivers messages from a process to another. Such a system is often required to deliver each message to its destination regardless of whether or not the system components experience arbitrary forms of faults. In addition, each message received by the destination must be a message sent by a system process. In this paper, we first identify the necessary and sufficient conditions to detect some restricted form of Byzantine faults referred to as modifying Byzantine faults. An observable form of a Byzantine fault whose effect is limited to the modification of a message metadata or content, timing and omission faults, and message replay is referred to as a modifying Byzantine fault. We then present a distributed protocol to detect modifying Byzantine faults using optimal number of messages over node-disjoint paths. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=Byzantine%20faults" title="Byzantine faults">Byzantine faults</a>, <a href="https://publications.waset.org/abstracts/search?q=distributed%20systems" title=" distributed systems"> distributed systems</a>, <a href="https://publications.waset.org/abstracts/search?q=fault%20detection" title=" fault detection"> fault detection</a>, <a href="https://publications.waset.org/abstracts/search?q=network%20pro-%20tocols" title=" network pro- tocols"> network pro- tocols</a>, <a href="https://publications.waset.org/abstracts/search?q=node-disjoint%20paths" title=" node-disjoint paths"> node-disjoint paths</a> </p> <a href="https://publications.waset.org/abstracts/30672/modifying-byzantine-fault-detection-using-disjoint-paths" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/30672.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">565</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">526</span> Secure Content Centric Network</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Syed%20Umair%20Aziz">Syed Umair Aziz</a>, <a href="https://publications.waset.org/abstracts/search?q=Muhammad%20Faheem"> Muhammad Faheem</a>, <a href="https://publications.waset.org/abstracts/search?q=Sameer%20Hussain"> Sameer Hussain</a>, <a href="https://publications.waset.org/abstracts/search?q=Faraz%20Idris"> Faraz Idris</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Content centric network is the network based on the mechanism of sending and receiving the data based on the interest and data request to the specified node (which has cached data). In this network, the security is bind with the content not with the host hence making it host independent and secure. In this network security is applied by taking content’s MAC (message authentication code) and encrypting it with the public key of the receiver. On the receiver end, the message is first verified and after verification message is saved and decrypted using the receiver's private key. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=content%20centric%20network" title="content centric network">content centric network</a>, <a href="https://publications.waset.org/abstracts/search?q=client-server" title=" client-server"> client-server</a>, <a href="https://publications.waset.org/abstracts/search?q=host%20security%20threats" title=" host security threats"> host security threats</a>, <a href="https://publications.waset.org/abstracts/search?q=message%20authentication%20code" title=" message authentication code"> message authentication code</a>, <a href="https://publications.waset.org/abstracts/search?q=named%20data%20network" title=" named data network"> named data network</a>, <a href="https://publications.waset.org/abstracts/search?q=network%20caching" title=" network caching"> network caching</a>, <a href="https://publications.waset.org/abstracts/search?q=peer-to-peer" title=" peer-to-peer"> peer-to-peer</a> </p> <a href="https://publications.waset.org/abstracts/32149/secure-content-centric-network" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/32149.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">644</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">525</span> Newspaper Framing of President Buhari’s Handling of Insecurity in Nigeria, January 2016 - December 2017</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Onyekwere%20Okpara">Onyekwere Okpara</a>, <a href="https://publications.waset.org/abstracts/search?q=Kingsley%20C.%20Izuogu"> Kingsley C. Izuogu</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This paper examined newspaper framing of President Buhari's handling of insecurity in Nigeria between January 2016-December 2017. The objectives were to examine the tone and sources of news frames used in reporting President Buhari's handling of insecurity in Nigeria. This paper did a content analysis of three newspapers-Daily Sun, The Nation, and the Leadership. Using a systematic random sampling, the study sampled a total of 732 editions of the selected newspapers and found out that the newspapers used neutral tone and government frame. The study, therefore, recommended that newspapers should improve their investigative reporting efforts. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=insecurity" title="insecurity">insecurity</a>, <a href="https://publications.waset.org/abstracts/search?q=newspapers" title=" newspapers"> newspapers</a>, <a href="https://publications.waset.org/abstracts/search?q=framing" title=" framing"> framing</a>, <a href="https://publications.waset.org/abstracts/search?q=media" title=" media"> media</a> </p> <a href="https://publications.waset.org/abstracts/151615/newspaper-framing-of-president-buharis-handling-of-insecurity-in-nigeria-january-2016-december-2017" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/151615.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">94</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">524</span> RSU Aggregated Message Delivery for VANET</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Auxeeliya%20Jesudoss">Auxeeliya Jesudoss</a>, <a href="https://publications.waset.org/abstracts/search?q=Ashraph%20Sulaiman"> Ashraph Sulaiman</a>, <a href="https://publications.waset.org/abstracts/search?q=Ratnakar%20Kotnana"> Ratnakar Kotnana</a> </p> <p class="card-text"><strong>Abstract:</strong></p> V2V communication brings up several questions of scalability issues although message sharing in vehicular ad-hoc networks comprises of both Vehicle-to-Vehicle communications (V2V) and Vehicle to Infrastructure communication (V2I). It is not an easy task for a vehicle to verify all signatures of the messages sent by its neighboring vehicles in a timely manner, without resulting in message loss. Moreover, the communication overhead of a vehicle to authenticate another vehicle would increase together with the security of the system. Another issue to be addressed is the continuous mobility of vehicles which requires at least some information on the node’s own position to be revealed to the neighboring vehicles. This may facilitate the attacker to congregate information on a node’s position or its mobility patterns. In order to tackle these issues, this paper introduces a RSU aggregated message deliverance scheme called RAMeD. With RAMeD, roadside units (RSUs) are responsible for verifying the identity of the vehicles entering in its range, collect messages from genuine vehicles and to aggregate similar messages into groups before sending them to all the vehicles in its communication range. This aggregation will tremendously improve the rate of message delivery and reduce the message lose ratio by avoiding similar messages being sent to the vehicles redundantly. The proposed protocol is analyzed extensively to evaluate its merits and efficiency for vehicular communication. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=vehicular%20ad-hoc%20networks" title="vehicular ad-hoc networks">vehicular ad-hoc networks</a>, <a href="https://publications.waset.org/abstracts/search?q=V2V" title=" V2V"> V2V</a>, <a href="https://publications.waset.org/abstracts/search?q=V2I" title=" V2I"> V2I</a>, <a href="https://publications.waset.org/abstracts/search?q=VANET%20communication" title=" VANET communication"> VANET communication</a>, <a href="https://publications.waset.org/abstracts/search?q=scalability" title=" scalability"> scalability</a>, <a href="https://publications.waset.org/abstracts/search?q=message%20aggregation" title=" message aggregation"> message aggregation</a> </p> <a href="https://publications.waset.org/abstracts/1449/rsu-aggregated-message-delivery-for-vanet" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/1449.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">408</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">523</span> Model Estimation and Error Level for Okike’s Merged Irregular Transposition Cipher</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Okike%20Benjamin">Okike Benjamin</a>, <a href="https://publications.waset.org/abstracts/search?q=Garba%20E.%20J.%20D."> Garba E. J. D.</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The researcher has developed a new encryption technique known as Merged Irregular Transposition Cipher. In this cipher method of encryption, a message to be encrypted is split into parts and each part encrypted separately. Before the encrypted message is transmitted to the recipient(s), the positions of the split in the encrypted messages could be swapped to ensure more security. This work seeks to develop a model by considering the split number, S and the average number of characters per split, L as the message under consideration is split from 2 through 10. Again, after developing the model, the error level in the model would be determined. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=merged%20irregular%20transposition" title="merged irregular transposition">merged irregular transposition</a>, <a href="https://publications.waset.org/abstracts/search?q=error%20level" title=" error level"> error level</a>, <a href="https://publications.waset.org/abstracts/search?q=model%20estimation" title=" model estimation"> model estimation</a>, <a href="https://publications.waset.org/abstracts/search?q=message%20splitting" title=" message splitting"> message splitting</a> </p> <a href="https://publications.waset.org/abstracts/22331/model-estimation-and-error-level-for-okikes-merged-irregular-transposition-cipher" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/22331.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">314</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">522</span> Thinking in a Foreign Language Overcomes the Developmental Reversal in Risky Decision-Making: The Foreign Language Effect in Risky Decision-Making</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Rendong%20Cai">Rendong Cai</a>, <a href="https://publications.waset.org/abstracts/search?q=Bei%20Peng"> Bei Peng</a>, <a href="https://publications.waset.org/abstracts/search?q=Yanping%20Dong"> Yanping Dong</a> </p> <p class="card-text"><strong>Abstract:</strong></p> In risk decision making, individuals are found to be susceptible to 'frames': people tend to be risk averse when the choice is described in terms of potential 'gains' (gain frame), whereas they tend to be risk seeking when the same choice is described in terms of potential 'losses' (loss frame); this effect is termed the framing effect. The framing effect has been well documented and some studies even find a developmental reversal in the framing effect: The more experience an individual has in a certain field, the easier for him to be influenced by the frame relevant to the field, resulting in greater decision inconsistency. Recent studies reported that using a foreign language can reduce the framing effect. However, it is not clear whether foreign language use can overcome the developmental reversal in the framing effect. The present study investigated three potential factors that may influence the developmental reversal in the framing effect: specialized knowledge of the participants, the language in which the problem is presented, and the types of problems. The present study examined the decision making behavior of 188 Chinese-English bilinguals who majored in Finance, with a group of 277 English majors as the control group. They were asked to solve a financial problem (experimental condition) and a life problem (control condition). Each problem was presented in one of the following four versions: native language-gain frame, foreign language-gain frame, native language-loss frame, and foreign language-loss frame. Results revealed that for the life problem, under the native condition, both groups were affected by the frame; but under the foreign condition, this framing effect disappeared for the financial majors. This confirmed that foreign language use modulates framing effects in general decision making, which served as an effective baseline. For the financial problem, under the native condition, only the financial major was observed to be influenced by the frame, which was a developmental reversal; under the foreign condition, however, this framing effect disappeared. The results provide further empirical evidence for the universal of the developmental reversal in risky decision making. More importantly, the results suggest that using a foreign language can overcome such reversal, which has implications for the reduction of decision biases in professionals. The findings also shed new light on the complex interaction between general decision-making and bilingualism. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=the%20foreign%20language%20effect" title="the foreign language effect">the foreign language effect</a>, <a href="https://publications.waset.org/abstracts/search?q=developmental%20reversals" title=" developmental reversals"> developmental reversals</a>, <a href="https://publications.waset.org/abstracts/search?q=the%20framing%20effect" title=" the framing effect"> the framing effect</a>, <a href="https://publications.waset.org/abstracts/search?q=bilingualism" title=" bilingualism"> bilingualism</a> </p> <a href="https://publications.waset.org/abstracts/48095/thinking-in-a-foreign-language-overcomes-the-developmental-reversal-in-risky-decision-making-the-foreign-language-effect-in-risky-decision-making" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/48095.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">370</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">521</span> Political Behavior and Democratic Values: Framing Analysis of Political Discussion Programs in Pakistan</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Umair%20Nadeem">Umair Nadeem</a>, <a href="https://publications.waset.org/abstracts/search?q=Sidra%20Umair"> Sidra Umair</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Political behavior of voters and democratic values have been observed an emerging phenomenon in recent years in Pakistan. Privatized TV news channels are taking one sided position on the political issues, corresponding with respective political parties. Since last decade, TV News Channels have undermined this monopoly. Elections 2013 were unique in Pakistan with reference to political behavior and democratic values. Partisan narratives and counter narratives have been witnessed on different TV channels, in last few years. These mediated events seem very important to study the political behavior and democratic values as the country is approaching towards elections 2018. This endeavor is an attempt to capture the framing of the parties, issues in the partisan media culture and framing effects on political behavior of voters. Data for this research come from two data set. Content analysis of selected representative talks shows broadcast on mainstream news channels provide an assessment of the framing while quantitative survey of the discussion program’s viewers from Lahore city provide an evidence of framing effects on political behavior on voters and on democratic values. Regression results help us to argue that the highly partisan shows are strong predictors of polarized views among the audience. Study also grasp the attention of scholars towards the implications of this phenomenon. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=democratic%20values" title="democratic values">democratic values</a>, <a href="https://publications.waset.org/abstracts/search?q=partisan%20media" title=" partisan media"> partisan media</a>, <a href="https://publications.waset.org/abstracts/search?q=polarized%20views" title=" polarized views"> polarized views</a>, <a href="https://publications.waset.org/abstracts/search?q=political%20behavior" title=" political behavior"> political behavior</a> </p> <a href="https://publications.waset.org/abstracts/97569/political-behavior-and-democratic-values-framing-analysis-of-political-discussion-programs-in-pakistan" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/97569.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">183</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">520</span> Impact of Negative News on Ethical Fashion: Case Study to Investigate the Effect of Fashion CSR Ad Framing on Purchase Intention</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Dana%20Lee">Dana Lee</a>, <a href="https://publications.waset.org/abstracts/search?q=Young%20Chan%20Kim"> Young Chan Kim</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The purpose of this paper is to examine the relationship between the fashion corporate social responsibility (CSR) ad framing and consumer purchase behaviours with the focus on consumer’s concern and involvement towards fashion brands. A self-completion questionnaire was administered to 200 respondents. Factor analysis and other statistical analyses were applied to test hypotheses. The results suggested that the quality of the product was the most important factor when consumers purchase fashion brand products with high level of responsibility towards unethical practices but surprisingly favourability for fast fashion. Unexpectedly, it was shown that consumers took the plenty of blame, but not much responsibility on buying fast fashion evading their responsibility to CSR ad, and their purchase intentions remained unchanged. The result, on the other hand, showed that fashion CSR ads can significantly moderate individuals’ emotions even though this had no significant correlation with the purchase intentions. Despite the limited sample size and geographical region, this research has important implications for contemporary fashion brands that use ad framing to understand how consumers’ involvement and concernedness toward the CSR actions in ad, influence their favourability (purchase intention) for fashion brands. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=framing%20effect" title="framing effect">framing effect</a>, <a href="https://publications.waset.org/abstracts/search?q=CSR%20advertisements" title=" CSR advertisements"> CSR advertisements</a>, <a href="https://publications.waset.org/abstracts/search?q=consumer%20behaviour" title=" consumer behaviour"> consumer behaviour</a>, <a href="https://publications.waset.org/abstracts/search?q=purchase%20intention" title=" purchase intention"> purchase intention</a> </p> <a href="https://publications.waset.org/abstracts/92445/impact-of-negative-news-on-ethical-fashion-case-study-to-investigate-the-effect-of-fashion-csr-ad-framing-on-purchase-intention" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/92445.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">210</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">519</span> Propagation of the Effects of Certain Types of Military Psychological Operations in a Networked Population</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Colette%20Faucher">Colette Faucher</a> </p> <p class="card-text"><strong>Abstract:</strong></p> In modern asymmetric conflicts, the Armed Forces generally have to intervene in countries where the internal peace is in danger. They must make the local population an ally in order to be able to deploy the necessary military actions with its support. For this purpose, psychological operations (PSYOPs) are used to shape people’s behaviors and emotions by the modification of their attitudes in acting on their perceptions. PSYOPs aim at elaborating and spreading a message that must be read, listened to and/or looked at, then understood by the info-targets in order to get from them the desired behavior. A message can generate in the info-targets, reasoned thoughts, spontaneous emotions or reflex behaviors, this effect partly depending on the means of conveyance used to spread this message. In this paper, we focus on psychological operations that generate emotions. We present a method based on the Intergroup Emotion Theory, that determines, from the characteristics of the conveyed message and of the people from the population directly reached by the means of conveyance (direct info-targets), the emotion likely to be triggered in them and we simulate the propagation of the effects of such a message on indirect info-targets that are connected to them through the social networks that structure the population. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=military%20psychological%20operations" title="military psychological operations">military psychological operations</a>, <a href="https://publications.waset.org/abstracts/search?q=social%20identity" title=" social identity"> social identity</a>, <a href="https://publications.waset.org/abstracts/search?q=social%20network" title=" social network"> social network</a>, <a href="https://publications.waset.org/abstracts/search?q=emotion%20propagation" title=" emotion propagation"> emotion propagation</a> </p> <a href="https://publications.waset.org/abstracts/22457/propagation-of-the-effects-of-certain-types-of-military-psychological-operations-in-a-networked-population" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/22457.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">409</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">518</span> Prosody of Text Communication: Inducing Synchronization and Coherence in Chat Conversations</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Karolina%20Ziembowicz">Karolina Ziembowicz</a>, <a href="https://publications.waset.org/abstracts/search?q=Andrzej%20Nowak"> Andrzej Nowak</a> </p> <p class="card-text"><strong>Abstract:</strong></p> In the current study, we examined the consequences of adding prosodic cues to text communication by allowing users to observe the process of message creation while engaged in dyadic conversations. In the first condition, users interacted through a traditional chat that requires pressing ‘enter’ to make a message visible to an interlocutor. In another, text appeared on the screen simultaneously as the sender was writing it, letter after letter (Synchat condition), so that users could observe the varying rhythm of message production, precise timing of message appearance, typos and their corrections. The results show that the ability to observe the dynamics of message production had a twofold effect on the social interaction process. First, it enhanced the relational aspect of communication – interlocutors synchronized their emotional states during the interaction, their communication included more statements on relationship building, and they evaluated the Synchat medium as more personal and emotionally engaging. Second, it increased the coherence of communication, reflected in greater continuity of the topics raised in Synchat conversations. The results are discussed from the interaction design (IxD) perspective. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=chat%20communication" title="chat communication">chat communication</a>, <a href="https://publications.waset.org/abstracts/search?q=online%20conversation" title=" online conversation"> online conversation</a>, <a href="https://publications.waset.org/abstracts/search?q=prosody" title=" prosody"> prosody</a>, <a href="https://publications.waset.org/abstracts/search?q=social%20synchronization" title=" social synchronization"> social synchronization</a>, <a href="https://publications.waset.org/abstracts/search?q=interaction%20incoherence" title=" interaction incoherence"> interaction incoherence</a>, <a href="https://publications.waset.org/abstracts/search?q=relationship%20building" title=" relationship building"> relationship building</a> </p> <a href="https://publications.waset.org/abstracts/97727/prosody-of-text-communication-inducing-synchronization-and-coherence-in-chat-conversations" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/97727.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">141</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">517</span> Islam, Tolerance and Anti-Terrorism: A Critical Assessment with Reference to the Royal 'Amman Message'</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Adnan%20M.%20Al%20Assaf">Adnan M. Al Assaf</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This research project aims to assess the methods of enhancing tolerant thinking and behavior among Muslim societies. This is in addition to spreading the anti-terrorist approach in their communities. The critical assessment for the Islamic major texts in question is the selected way for convincing, as Muslims adopt these sources as the authentic references for their lives and cultures. Moreover, this research devotes a special room to the analysis of the royal ‘Amman Message’ as a contemporary Islamic approach for enhancing tolerance and anti-terrorism from an Islamic perspective. The paper includes the study of the related concepts, texts, practical applications, with some reference to the history of Islam in human interaction, accepting the others, mercy with minorities, protecting human rights. Furthermore, it assesses the methods of enhancing tolerance and minimizing the terrorist thinking and behavior practically, in the view of Amman message, as well. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=Islam" title="Islam">Islam</a>, <a href="https://publications.waset.org/abstracts/search?q=tolerance" title=" tolerance"> tolerance</a>, <a href="https://publications.waset.org/abstracts/search?q=anti-terrorism" title=" anti-terrorism"> anti-terrorism</a>, <a href="https://publications.waset.org/abstracts/search?q=coexistence" title=" coexistence"> coexistence</a>, <a href="https://publications.waset.org/abstracts/search?q=Amman%20Message" title=" Amman Message"> Amman Message</a> </p> <a href="https://publications.waset.org/abstracts/83277/islam-tolerance-and-anti-terrorism-a-critical-assessment-with-reference-to-the-royal-amman-message" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/83277.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">459</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">516</span> Hip and Valley Support Location in Wood Framing</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=P.%20Hajyalikhani">P. Hajyalikhani</a>, <a href="https://publications.waset.org/abstracts/search?q=B.%20Hudson"> B. Hudson</a>, <a href="https://publications.waset.org/abstracts/search?q=D.%20Boll"> D. Boll</a>, <a href="https://publications.waset.org/abstracts/search?q=L.%20Boren"> L. Boren</a>, <a href="https://publications.waset.org/abstracts/search?q=Z.%20Sparks"> Z. Sparks</a>, <a href="https://publications.waset.org/abstracts/search?q=M.%20Ward"> M. Ward</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Wood Light frame construction is one of the most common types of construction methods for residential and light commercial building in North America and parts of Europe. The typical roof framing for wood framed building is sloped and consists of several structural members such as rafters, hips, and valleys which are connected to the ridge and ceiling joists. The common slopes for roofs are 3/12, 8/12, and 12/12. Wood framed residential roof failure is most commonly caused by wind damage in such buildings. In the recent study, one of the weaknesses of wood framed roofs is long unsupported structural member lengths, such as hips and valleys. The purpose of this research is to find the critical support location for long hips and valleys with different slopes. ForteWeb software is used to find the critical location. The analysis results demonstrating the maximum unbraced hip and valley length are from 8.5 to 10.25 ft. dependent on the slope and roof type. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=wood%20frame" title="wood frame">wood frame</a>, <a href="https://publications.waset.org/abstracts/search?q=stick%20framing" title=" stick framing"> stick framing</a>, <a href="https://publications.waset.org/abstracts/search?q=hip" title=" hip"> hip</a>, <a href="https://publications.waset.org/abstracts/search?q=valley" title=" valley"> valley</a> </p> <a href="https://publications.waset.org/abstracts/128039/hip-and-valley-support-location-in-wood-framing" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/128039.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">117</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">515</span> Nation Branding as Reframing: From the Perspective of Translation Studies</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Ye%20Tian">Ye Tian</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Soft power has replaced hard power and become one of the most attractive ways nations pursue to expand their international influence. One of the ways to improve a nation’s soft power is to commercialise the country and brand or rebrand it to the international audience, and thus attract interests or foreign investments. In this process, translation has often been regarded as merely a tool, and researches in it are either in translating literature as culture export or in how (in)accuracy of translation influences the branding campaign. This paper proposes to analyse nation branding campaign with framing theory, and thus gives an entry for translation studies to come to a central stage in today’s soft power research. To frame information or elements of a text, an event, or, as in this paper, a nation is to put them in a mental structure. This structure can be built by outsiders or by those who create the text, the event, or by citizens of the nation. To frame information like this can be regarded as a process of translation, as what translation does in its traditional meaning of ‘translating a text’ is to put a framework on the text to, deliberately or not, highlight some of the elements while hiding the others. In the discourse of nations, then, people unavoidably simplify a national image and put the nation into their imaginary framework. In this way, problems like stereotype and prejudice come into being. Meanwhile, if nations seek ways to frame or reframe themselves, they make efforts to have in control what and who they are in the eyes of international audiences, and thus make profits, economically or politically, from it. The paper takes African nations, which are usually perceived as a whole, and the United Kingdom as examples to justify passive and active framing process, and assesses both positive and negative influence framing has on nations. In conclusion, translation as framing causes problems like prejudice, and the image of a nation is not always in the hands of nation branders, but reframing the nation in a positive way has the potential to turn the tide. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=framing" title="framing">framing</a>, <a href="https://publications.waset.org/abstracts/search?q=nation%20branding" title=" nation branding"> nation branding</a>, <a href="https://publications.waset.org/abstracts/search?q=stereotype" title=" stereotype"> stereotype</a>, <a href="https://publications.waset.org/abstracts/search?q=translation" title=" translation"> translation</a> </p> <a href="https://publications.waset.org/abstracts/109362/nation-branding-as-reframing-from-the-perspective-of-translation-studies" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/109362.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">155</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">514</span> Secure Message Transmission Using Meaningful Shares</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Ajish%20Sreedharan">Ajish Sreedharan</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Visual cryptography encodes a secret image into shares of random binary patterns. If the shares are exerted onto transparencies, the secret image can be visually decoded by superimposing a qualified subset of transparencies, but no secret information can be obtained from the superposition of a forbidden subset. The binary patterns of the shares, however, have no visual meaning and hinder the objectives of visual cryptography. In the Secret Message Transmission through Meaningful Shares a secret message to be transmitted is converted to grey scale image. Then (2,2) visual cryptographic shares are generated from this converted gray scale image. The shares are encrypted using A Chaos-Based Image Encryption Algorithm Using Wavelet Transform. Two separate color images which are of the same size of the shares, taken as cover image of the respective shares to hide the shares into them. The encrypted shares which are covered by meaningful images so that a potential eavesdropper wont know there is a message to be read. The meaningful shares are transmitted through two different transmission medium. During decoding shares are fetched from received meaningful images and decrypted using A Chaos-Based Image Encryption Algorithm Using Wavelet Transform. The shares are combined to regenerate the grey scale image from where the secret message is obtained. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=visual%20cryptography" title="visual cryptography">visual cryptography</a>, <a href="https://publications.waset.org/abstracts/search?q=wavelet%20transform" title=" wavelet transform"> wavelet transform</a>, <a href="https://publications.waset.org/abstracts/search?q=meaningful%20shares" title=" meaningful shares"> meaningful shares</a>, <a href="https://publications.waset.org/abstracts/search?q=grey%20scale%20image" title=" grey scale image"> grey scale image</a> </p> <a href="https://publications.waset.org/abstracts/16629/secure-message-transmission-using-meaningful-shares" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/16629.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">455</span> </span> </div> </div> <ul class="pagination"> <li class="page-item disabled"><span class="page-link">‹</span></li> <li class="page-item active"><span class="page-link">1</span></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=message%20framing&page=2">2</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=message%20framing&page=3">3</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=message%20framing&page=4">4</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=message%20framing&page=5">5</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=message%20framing&page=6">6</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=message%20framing&page=7">7</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=message%20framing&page=8">8</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=message%20framing&page=9">9</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=message%20framing&page=10">10</a></li> <li class="page-item disabled"><span class="page-link">...</span></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=message%20framing&page=18">18</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=message%20framing&page=19">19</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=message%20framing&page=2" rel="next">›</a></li> </ul> </div> </main> <footer> <div id="infolinks" class="pt-3 pb-2"> <div class="container"> <div style="background-color:#f5f5f5;" class="p-3"> <div class="row"> <div class="col-md-2"> <ul class="list-unstyled"> About <li><a href="https://waset.org/page/support">About Us</a></li> <li><a href="https://waset.org/page/support#legal-information">Legal</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/WASET-16th-foundational-anniversary.pdf">WASET celebrates its 16th foundational anniversary</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Account <li><a href="https://waset.org/profile">My Account</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Explore <li><a href="https://waset.org/disciplines">Disciplines</a></li> <li><a href="https://waset.org/conferences">Conferences</a></li> <li><a href="https://waset.org/conference-programs">Conference Program</a></li> <li><a href="https://waset.org/committees">Committees</a></li> <li><a href="https://publications.waset.org">Publications</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Research <li><a href="https://publications.waset.org/abstracts">Abstracts</a></li> <li><a href="https://publications.waset.org">Periodicals</a></li> <li><a href="https://publications.waset.org/archive">Archive</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Open Science <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Science-Philosophy.pdf">Open Science Philosophy</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Science-Award.pdf">Open Science Award</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Society-Open-Science-and-Open-Innovation.pdf">Open Innovation</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Postdoctoral-Fellowship-Award.pdf">Postdoctoral Fellowship Award</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Scholarly-Research-Review.pdf">Scholarly Research Review</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Support <li><a href="https://waset.org/page/support">Support</a></li> <li><a href="https://waset.org/profile/messages/create">Contact Us</a></li> <li><a href="https://waset.org/profile/messages/create">Report Abuse</a></li> </ul> </div> </div> </div> </div> </div> <div class="container text-center"> <hr style="margin-top:0;margin-bottom:.3rem;"> <a href="https://creativecommons.org/licenses/by/4.0/" target="_blank" class="text-muted small">Creative Commons Attribution 4.0 International License</a> <div id="copy" class="mt-2">© 2024 World Academy of Science, Engineering and Technology</div> </div> </footer> <a href="javascript:" id="return-to-top"><i class="fas fa-arrow-up"></i></a> <div class="modal" id="modal-template"> <div class="modal-dialog"> <div class="modal-content"> <div class="row m-0 mt-1"> <div class="col-md-12"> <button type="button" class="close" data-dismiss="modal" aria-label="Close"><span aria-hidden="true">×</span></button> </div> </div> <div class="modal-body"></div> </div> </div> </div> <script src="https://cdn.waset.org/static/plugins/jquery-3.3.1.min.js"></script> <script src="https://cdn.waset.org/static/plugins/bootstrap-4.2.1/js/bootstrap.bundle.min.js"></script> <script src="https://cdn.waset.org/static/js/site.js?v=150220211556"></script> <script> jQuery(document).ready(function() { /*jQuery.get("https://publications.waset.org/xhr/user-menu", function (response) { jQuery('#mainNavMenu').append(response); });*/ jQuery.get({ url: "https://publications.waset.org/xhr/user-menu", cache: false }).then(function(response){ jQuery('#mainNavMenu').append(response); }); }); </script> </body> </html>