CINXE.COM

Search results for: tactical messages

<!DOCTYPE html> <html lang="en" dir="ltr"> <head> <!-- Google tag (gtag.js) --> <script async src="https://www.googletagmanager.com/gtag/js?id=G-P63WKM1TM1"></script> <script> window.dataLayer = window.dataLayer || []; function gtag(){dataLayer.push(arguments);} gtag('js', new Date()); gtag('config', 'G-P63WKM1TM1'); </script> <!-- Yandex.Metrika counter --> <script type="text/javascript" > (function(m,e,t,r,i,k,a){m[i]=m[i]||function(){(m[i].a=m[i].a||[]).push(arguments)}; m[i].l=1*new Date(); for (var j = 0; j < document.scripts.length; j++) {if (document.scripts[j].src === r) { return; }} k=e.createElement(t),a=e.getElementsByTagName(t)[0],k.async=1,k.src=r,a.parentNode.insertBefore(k,a)}) (window, document, "script", "https://mc.yandex.ru/metrika/tag.js", "ym"); ym(55165297, "init", { clickmap:false, trackLinks:true, accurateTrackBounce:true, webvisor:false }); </script> <noscript><div><img src="https://mc.yandex.ru/watch/55165297" style="position:absolute; left:-9999px;" alt="" /></div></noscript> <!-- /Yandex.Metrika counter --> <!-- Matomo --> <!-- End Matomo Code --> <title>Search results for: tactical messages</title> <meta name="description" content="Search results for: tactical messages"> <meta name="keywords" content="tactical messages"> <meta name="viewport" content="width=device-width, initial-scale=1, minimum-scale=1, maximum-scale=1, user-scalable=no"> <meta charset="utf-8"> <link href="https://cdn.waset.org/favicon.ico" type="image/x-icon" rel="shortcut icon"> <link href="https://cdn.waset.org/static/plugins/bootstrap-4.2.1/css/bootstrap.min.css" rel="stylesheet"> <link href="https://cdn.waset.org/static/plugins/fontawesome/css/all.min.css" rel="stylesheet"> <link href="https://cdn.waset.org/static/css/site.css?v=150220211555" rel="stylesheet"> </head> <body> <header> <div class="container"> <nav class="navbar navbar-expand-lg navbar-light"> <a class="navbar-brand" href="https://waset.org"> <img src="https://cdn.waset.org/static/images/wasetc.png" alt="Open Science Research Excellence" title="Open Science Research Excellence" /> </a> <button class="d-block d-lg-none navbar-toggler ml-auto" type="button" data-toggle="collapse" data-target="#navbarMenu" aria-controls="navbarMenu" aria-expanded="false" aria-label="Toggle navigation"> <span class="navbar-toggler-icon"></span> </button> <div class="w-100"> <div class="d-none d-lg-flex flex-row-reverse"> <form method="get" action="https://waset.org/search" class="form-inline my-2 my-lg-0"> <input class="form-control mr-sm-2" type="search" placeholder="Search Conferences" value="tactical messages" name="q" aria-label="Search"> <button class="btn btn-light my-2 my-sm-0" type="submit"><i class="fas fa-search"></i></button> </form> </div> <div class="collapse navbar-collapse mt-1" id="navbarMenu"> <ul class="navbar-nav ml-auto align-items-center" id="mainNavMenu"> <li class="nav-item"> <a class="nav-link" href="https://waset.org/conferences" title="Conferences in 2024/2025/2026">Conferences</a> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/disciplines" title="Disciplines">Disciplines</a> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/committees" rel="nofollow">Committees</a> </li> <li class="nav-item dropdown"> <a class="nav-link dropdown-toggle" href="#" id="navbarDropdownPublications" role="button" data-toggle="dropdown" aria-haspopup="true" aria-expanded="false"> Publications </a> <div class="dropdown-menu" aria-labelledby="navbarDropdownPublications"> <a class="dropdown-item" href="https://publications.waset.org/abstracts">Abstracts</a> <a class="dropdown-item" href="https://publications.waset.org">Periodicals</a> <a class="dropdown-item" href="https://publications.waset.org/archive">Archive</a> </div> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/page/support" title="Support">Support</a> </li> </ul> </div> </div> </nav> </div> </header> <main> <div class="container mt-4"> <div class="row"> <div class="col-md-9 mx-auto"> <form method="get" action="https://publications.waset.org/abstracts/search"> <div id="custom-search-input"> <div class="input-group"> <i class="fas fa-search"></i> <input type="text" class="search-query" name="q" placeholder="Author, Title, Abstract, Keywords" value="tactical messages"> <input type="submit" class="btn_search" value="Search"> </div> </div> </form> </div> </div> <div class="row mt-3"> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Commenced</strong> in January 2007</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Frequency:</strong> Monthly</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Edition:</strong> International</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Paper Count:</strong> 479</div> </div> </div> </div> <h1 class="mt-3 mb-3 text-center" style="font-size:1.6rem;">Search results for: tactical messages</h1> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">479</span> The Effectiveness of Teaching Games for Understanding in Improving the Hockey Tactical Skills and State Self-Confidence among 16 Years Old Students </h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Wee%20Akina%20Sia%20Seng%20Lee">Wee Akina Sia Seng Lee</a>, <a href="https://publications.waset.org/abstracts/search?q=Shabeshan%20Rengasamy"> Shabeshan Rengasamy</a>, <a href="https://publications.waset.org/abstracts/search?q=Lim%20Boon%20Hooi"> Lim Boon Hooi</a>, <a href="https://publications.waset.org/abstracts/search?q=Chandrakalavaratharajoo"> Chandrakalavaratharajoo</a>, <a href="https://publications.waset.org/abstracts/search?q=Mohd%20Ibrahim%20K.%20Azeez"> Mohd Ibrahim K. Azeez </a> </p> <p class="card-text"><strong>Abstract:</strong></p> This study was conducted to examine the effectiveness of Teaching Games For Understanding (TGFU) in improving the hockey tactical skills and state self-confidence among 16-year-old students. Two hundred fifty nine (259) school students were selected for the study based on the intact sampling method. One class was used as the control group (Boys=60, Girls=70), while another as the treatment group (Boys=60, Girls=69) underwent intervention with TGFU in physical education class conducted twice a week for four weeks. The Games Performance Assessment Instrument was used to observe the hockey tactical skills and The State Self-Confidence Inventory was used to determine the state of self-confidence among the students. After four weeks, ANCOVA analysis indicated the treatment groups had significant improvement in hockey tactical skills with F (1, 118) =313.37, p < .05 for school boys, and F (1, 136) =92.62, p < .05 for school girls. The Mann Whitney U test also showed the treatment groups had significant improvement in state self-confidence with U=428.50, z= -7.22, p < .05, r=.06 for school boys. ANCOVA analysis also showed the treatment group had significant improvement in state self-confidence with F (1, 136) =74.40, p < .05 for school girls. This indicates that TGFU in a 40 minute physical education class conducted twice a week for four weeks can significantly improve the hockey tactical skills and state self-confidence among 16-year-old students. The findings give new knowledge to PE teachers to implement the TGFU method as it enhances the hockey tactical skills and state self-confidence among 16-year-old students. Some recommendation was suggested for future research. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=Teaching%20Games%20For%20Understanding%20%28TGFU%29" title="Teaching Games For Understanding (TGFU)">Teaching Games For Understanding (TGFU)</a>, <a href="https://publications.waset.org/abstracts/search?q=traditional%20teaching" title=" traditional teaching"> traditional teaching</a>, <a href="https://publications.waset.org/abstracts/search?q=hockey%20tactical%20skills" title=" hockey tactical skills"> hockey tactical skills</a>, <a href="https://publications.waset.org/abstracts/search?q=state%20self-confidence" title=" state self-confidence "> state self-confidence </a> </p> <a href="https://publications.waset.org/abstracts/30742/the-effectiveness-of-teaching-games-for-understanding-in-improving-the-hockey-tactical-skills-and-state-self-confidence-among-16-years-old-students" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/30742.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">354</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">478</span> Tactical Urbanism and Sustainability: Tactical Experiences in the Promotion of Active Transportation</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Aline%20Fernandes%20Barata">Aline Fernandes Barata</a>, <a href="https://publications.waset.org/abstracts/search?q=Adriana%20Sans%C3%A3o%20Fontes"> Adriana Sansão Fontes</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The overvaluation of the use of automobile has detrimentally affected the importance of pedestrians within the city and consequently its public spaces. As a way of treating contemporary urban paradigms, Tactical Urbanism aims to recover and activate spaces through fast and easily-applied actions that demonstrate the possibility of large-scale and long-term changes in cities. Tactical interventions have represented an important practice of redefining public spaces and urban mobility. The concept of Active Transportation coheres with the idea of sustainable urban mobility, characterizing the means of transportation through human propulsion, such as walking and cycling. This paper aims to debate the potential of Tactical Urbanism in promoting Active Transportation by revealing opportunities of transformation in the urban space of contemporary cities through initiatives that promote the protection and valorization of the presence of pedestrians and cyclists in cities, and that subvert the importance of motorized vehicles. In this paper, we present the character of these actions in two different ways: when they are used as tests for permanent interventions and when they have pre-defined start and end periods. Using recent initiatives to illustrate, we aim to discuss the role of small-scale actions in promoting and incentivizing a more active, healthy, sustainable and responsive urban way of life, presenting how some of them have developed through public policies. For that, we will present some examples of tactical actions that illustrate the encouragement of Active Transportation and trials to balance the urban opportunities for pedestrians and cyclists. These include temporary closure of streets, the creation of new alternatives and more comfortable areas for walking and cycling, and the subversion of uses in public spaces where the usage of cars are predominant. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=tactical%20urbanism" title="tactical urbanism">tactical urbanism</a>, <a href="https://publications.waset.org/abstracts/search?q=active%20transportation" title=" active transportation"> active transportation</a>, <a href="https://publications.waset.org/abstracts/search?q=sustainable%20mobility" title=" sustainable mobility"> sustainable mobility</a>, <a href="https://publications.waset.org/abstracts/search?q=non-motorized%20means" title=" non-motorized means"> non-motorized means</a> </p> <a href="https://publications.waset.org/abstracts/73983/tactical-urbanism-and-sustainability-tactical-experiences-in-the-promotion-of-active-transportation" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/73983.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">243</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">477</span> The Evolution of Online Hate: How Decades of Tactical and Technological Innovation Created a Hate Epidemic</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Kashvi%20Jain">Kashvi Jain</a>, <a href="https://publications.waset.org/abstracts/search?q=Adam%20Burston"> Adam Burston</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Right-wing social movements are a dominant force in American politics, as evidenced by the January 6th Insurrection, the prevalence of extremist conspiracy theories, and a nationwide surge in hate crime. Despite an abundance of scholarship on contemporary right-wing extremism, there is little scholarship that explains their rise. This paper examines how the white power movement developed through tactical innovation and strategic use of increasingly powerful digital technologies. Using qualitative content analysis of archived digital bulletin boards and websites, we examine right-wing extremists’ digital communication during three consequential time periods of tactical and technological innovation: pre-internet (1980s), web 1.0 (1990s), and web 2.0 (2000s). Our analysis suggests that right-wing activists innovatively exploited the features and affordances of digital technologies and their knowledge of free speech rights to spread supremacist collective identity and ideology. Beyond our empirical contribution, we offer policy advice that school administrators can employ to limit hate. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=leaderless%20resistance" title="leaderless resistance">leaderless resistance</a>, <a href="https://publications.waset.org/abstracts/search?q=technological%20affordances" title=" technological affordances"> technological affordances</a>, <a href="https://publications.waset.org/abstracts/search?q=anti-defamation%20league" title=" anti-defamation league"> anti-defamation league</a>, <a href="https://publications.waset.org/abstracts/search?q=white%20power%20movement" title=" white power movement"> white power movement</a>, <a href="https://publications.waset.org/abstracts/search?q=tactical" title=" tactical"> tactical</a> </p> <a href="https://publications.waset.org/abstracts/171301/the-evolution-of-online-hate-how-decades-of-tactical-and-technological-innovation-created-a-hate-epidemic" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/171301.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">69</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">476</span> Modelling of the Fire Pragmatism in the Area of Military Management and Its Experimental Verification</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Ivana%20Mokr%C3%A1">Ivana Mokrá</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The article deals with modelling of the fire pragmatism in the area of military management and its experimental verification. Potential approaches are based on the synergy of mathematical and theoretical ideas, operational and tactical requirements and the military decision-making process. This issue has taken on importance in recent times, particularly with the increasing trend of digitized battlefield, the development of C4ISR systems and intention to streamline the command and control process at the lowest levels of command. From fundamental and philosophical point of view, these new approaches seek to significantly upgrade and enhance the decision-making process of the tactical commanders. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=military%20management" title="military management">military management</a>, <a href="https://publications.waset.org/abstracts/search?q=decision-making%20process" title=" decision-making process"> decision-making process</a>, <a href="https://publications.waset.org/abstracts/search?q=strike%20modeling" title=" strike modeling"> strike modeling</a>, <a href="https://publications.waset.org/abstracts/search?q=experimental%20evaluation" title=" experimental evaluation"> experimental evaluation</a>, <a href="https://publications.waset.org/abstracts/search?q=pragmatism" title=" pragmatism"> pragmatism</a>, <a href="https://publications.waset.org/abstracts/search?q=tactical%20strike%20modeling" title=" tactical strike modeling"> tactical strike modeling</a> </p> <a href="https://publications.waset.org/abstracts/19392/modelling-of-the-fire-pragmatism-in-the-area-of-military-management-and-its-experimental-verification" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/19392.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">388</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">475</span> Psychological Reactance to Anti-Piracy Messages Explained by Gender and Attitudes</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Kate%20Whitman">Kate Whitman</a>, <a href="https://publications.waset.org/abstracts/search?q=Zahra%20Murad"> Zahra Murad</a>, <a href="https://publications.waset.org/abstracts/search?q=Joe%20Cox"> Joe Cox</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Digital piracy is costly to creative economies across the world. Anti-piracy messages can cause people to pirate more rather than less, suggesting the presence of psychological reactance. Gender differences in message reactance and the moderating impact of attitudes have not been explored. In this paper, we examine whether messages based on real-world anti-piracy campaigns cause reactance and whether this effect is explained by gender and attitudes. An experiment compares two threatening and one prosocial message against a control group, with changes in piracy intention from past behavior for digital TV/film analysed. The results suggest that the prosocial message is ineffective for both genders. However, the threatening messages have significantly opposing effects on men and women. One threatening message influences women to reduce their piracy intentions by over 50% and men to increase it by 18%. Gender effects are moderated by pre-existing attitudes, with men and women who report the most favorable attitudes towards piracy having the most polarised changes in piracy intentions. The results suggest that men and women process threatening messages differently and that the creative industries should take care when targeting their messages. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=piracy" title="piracy">piracy</a>, <a href="https://publications.waset.org/abstracts/search?q=reactance" title=" reactance"> reactance</a>, <a href="https://publications.waset.org/abstracts/search?q=persuasive-messages" title=" persuasive-messages"> persuasive-messages</a>, <a href="https://publications.waset.org/abstracts/search?q=TV%2Ffilm" title=" TV/film"> TV/film</a>, <a href="https://publications.waset.org/abstracts/search?q=gender" title=" gender"> gender</a> </p> <a href="https://publications.waset.org/abstracts/161473/psychological-reactance-to-anti-piracy-messages-explained-by-gender-and-attitudes" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/161473.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">98</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">474</span> The Effects of Leadership on the Claim of Responsibility</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Katalin%20Kovacs">Katalin Kovacs</a> </p> <p class="card-text"><strong>Abstract:</strong></p> In most forms of violence the perpetrators intend to hide their identities. Terrorism is different. Terrorist groups often take responsibility for their attacks, and consequently they reveal their identities. This unique characteristic of terrorism has been largely overlooked, and scholars are still puzzled as to why terrorist groups claim responsibility for their attacks. Certainly, the claim of responsibility is worth analysing. It would help to have a clearer picture of what terrorist groups try to achieve and how, but also to develop an understanding of the strategic planning of terrorist attacks and the message the terrorists intend to deliver. The research aims to answer the question why terrorist groups choose to claim responsibility for some of their attacks and not for others. In order to do so the claim of responsibility is considered to be a tactical choice, based on the assumption that terrorists weigh the costs and benefits of claiming responsibility. The main argument is that terrorist groups do not claim responsibility in cases when there is no tactical advantage gained from claiming responsibility. The idea that the claim of responsibility has tactical value offers the opportunity to test these assertions using a large scale empirical analysis. The claim of responsibility as a tactical choice depends on other tactical choices, such as the choice of target, the internationality of the attack, the number of victims and whether the group occupies territory or operates as an underground group. The structure of the terrorist groups and the level of decision making also affects the claim of responsibility. Terrorists on the lower level are less disciplined than the leaders. This means that the terrorists on lower levels pay less attention to the strategic objectives and engage easier in indiscriminate violence, and consequently they would less like to claim responsibility. Therefore, the research argues that terrorists, who are on a highest level of decision making would claim responsibility for the attacks as those are who takes into account the strategic objectives. As most studies on terrorism fail to provide definitions; therefore the researches are fragmented and incomparable. Separate, isolated researches do not support comprehensive thinking. It is also very important to note that there are only a few researches using quantitative methods. The aim of the research is to develop a new and comprehensive overview of the claim of responsibility based on strong quantitative evidence. By using well-established definitions and operationalisation the current research focuses on a broad range of attributes that can have tactical values in order to determine circumstances when terrorists are more likely to claim responsibility. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=claim%20of%20responsibility" title="claim of responsibility">claim of responsibility</a>, <a href="https://publications.waset.org/abstracts/search?q=leadership" title=" leadership"> leadership</a>, <a href="https://publications.waset.org/abstracts/search?q=tactical%20choice" title=" tactical choice"> tactical choice</a>, <a href="https://publications.waset.org/abstracts/search?q=terrorist%20group" title=" terrorist group"> terrorist group</a> </p> <a href="https://publications.waset.org/abstracts/56548/the-effects-of-leadership-on-the-claim-of-responsibility" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/56548.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">313</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">473</span> Implicature of Jokes in Broadcast Messages</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Yuli%20Widiana">Yuli Widiana</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The study of implicature which is one of the discussions of pragmatics is an interesting and challenging topic to discuss. Implicature is a meaning which is implied in an utterance which is not the same as its literal meaning. The rapid development of information technology results in social networks as media to broadcast messages. The broadcast messages may be in the form of jokes which contain implicature. The research applies the pragmatic equivalent method to analyze the topics of jokes based on the implicatures contained in them. Furthermore, the method is also applied to reveal the purpose of creating implicature in jokes. The findings include the kinds of implicature found in jokes which are classified into conventional implicature and conversational implicature. Then, in detailed analysis, implicature in jokes is divided into implicature related to gender, culture, and social phenomena. Furthermore, implicature in jokes may not only be used to give entertainment but also to soften criticisms or satire so that it does not sound rude and harsh. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=implicature" title="implicature">implicature</a>, <a href="https://publications.waset.org/abstracts/search?q=broadcast%20messages" title=" broadcast messages"> broadcast messages</a>, <a href="https://publications.waset.org/abstracts/search?q=conventional%20implicature" title=" conventional implicature"> conventional implicature</a>, <a href="https://publications.waset.org/abstracts/search?q=conversational%20implicature" title=" conversational implicature"> conversational implicature</a> </p> <a href="https://publications.waset.org/abstracts/9554/implicature-of-jokes-in-broadcast-messages" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/9554.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">359</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">472</span> A System to Detect Inappropriate Messages in Online Social Networks </h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Shivani%20Singh">Shivani Singh</a>, <a href="https://publications.waset.org/abstracts/search?q=Shantanu%20Nakhare"> Shantanu Nakhare</a>, <a href="https://publications.waset.org/abstracts/search?q=Kalyani%20Nair"> Kalyani Nair</a>, <a href="https://publications.waset.org/abstracts/search?q=Rohan%20Shetty"> Rohan Shetty </a> </p> <p class="card-text"><strong>Abstract:</strong></p> As social networking is growing at a rapid pace today it is vital that we work on improving its management. Research has shown that the content present in online social networks may have significant influence on impressionable minds. If such platforms are misused, it will lead to negative consequences. Detecting insults or inappropriate messages continues to be one of the most challenging aspects of Online Social Networks (OSNs) today. We address this problem through a Machine Learning Based Soft Text Classifier approach using Support Vector Machine algorithm. The proposed system acts as a screening mechanism the alerts the user about such messages. The messages are classified according to their subject matter and each comment is labeled for the presence of profanity and insults. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=machine%20learning" title="machine learning">machine learning</a>, <a href="https://publications.waset.org/abstracts/search?q=online%20social%20networks" title=" online social networks"> online social networks</a>, <a href="https://publications.waset.org/abstracts/search?q=soft%20text%20classifier" title=" soft text classifier"> soft text classifier</a>, <a href="https://publications.waset.org/abstracts/search?q=support%20vector%20machine" title=" support vector machine"> support vector machine</a> </p> <a href="https://publications.waset.org/abstracts/22250/a-system-to-detect-inappropriate-messages-in-online-social-networks" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/22250.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">508</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">471</span> U-Turn on the Bridge to Freedom: An Interaction Process Analysis of Task and Relational Messages in Totalistic Organization Exit Conversations on Online Discussion Boards</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Nancy%20Di%20Tunnariello">Nancy Di Tunnariello</a>, <a href="https://publications.waset.org/abstracts/search?q=Jenna%20L.%20Currie-Mueller"> Jenna L. Currie-Mueller</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Totalistic organizations include organizations that operate by playing a prominent role in the life of its members through embedding values and practices. The Church of Scientology (CoS) is an example of a religious totalistic organization and has recently garnered attention because of the questionable treatment of members by those with authority, particularly when members try to leave the Church. The purpose of this study was to analyze exit communication and evaluate the task and relational messages discussed on online discussion boards for individuals with a previous or current connection to the totalistic CoS. Using organizational exit phases and interaction process analysis (IPA), researchers coded 30 boards consisting of 14,179 thought units from the Exscn.net website. Findings report all stages of exit were present, and post-exit surfaced most often. Posts indicated more tasks than relational messages, where individuals mainly provided orientation/information. After a discussion of the study’s contributions, limitations and directions for future research are explained. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=Bales%27%20IPA" title="Bales&#039; IPA">Bales&#039; IPA</a>, <a href="https://publications.waset.org/abstracts/search?q=organizational%20exit" title=" organizational exit"> organizational exit</a>, <a href="https://publications.waset.org/abstracts/search?q=relational%20messages" title=" relational messages"> relational messages</a>, <a href="https://publications.waset.org/abstracts/search?q=scientology" title=" scientology"> scientology</a>, <a href="https://publications.waset.org/abstracts/search?q=task%20messages" title=" task messages"> task messages</a>, <a href="https://publications.waset.org/abstracts/search?q=totalistic%20organizations" title=" totalistic organizations"> totalistic organizations</a> </p> <a href="https://publications.waset.org/abstracts/147925/u-turn-on-the-bridge-to-freedom-an-interaction-process-analysis-of-task-and-relational-messages-in-totalistic-organization-exit-conversations-on-online-discussion-boards" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/147925.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">129</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">470</span> Time Pressure and Its Effect at Tactical Level of Disaster Management</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Agoston%20Restas">Agoston Restas</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Introduction: In case of managing disasters decision makers can face many times such a special situation where any pre-sign of the drastically change is missing therefore the improvised decision making can be required. The complexity, ambiguity, uncertainty or the volatility of the situation can require many times the improvisation as decision making. It can be taken at any level of the management (strategic, operational and tactical) but at tactical level the main reason of the improvisation is surely time pressure. It is certainly the biggest problem during the management. Methods: The author used different tools and methods to achieve his goals; one of them was the study of the relevant literature, the other one was his own experience as a firefighting manager. Other results come from two surveys that are referred to; one of them was an essay analysis, the second one was a word association test, specially created for the research. Results and discussion: This article proves that, in certain situations, the multi-criteria, evaluating decision-making processes simply cannot be used or only in a limited manner. However, it can be seen that managers, directors or commanders are many times in situations that simply cannot be ignored when making decisions which should be made in a short time. The functional background of decisions made in a short time, their mechanism, which is different from the conventional, was studied lately and this special decision procedure was given the name recognition-primed decision. In the article, author illustrates the limits of the possibilities of analytical decision-making, presents the general operating mechanism of recognition-primed decision-making, elaborates on its special model relevant to managers at tactical level, as well as explore and systemize the factors that facilitate (catalyze) the processes with an example with fire managers. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=decision%20making" title="decision making">decision making</a>, <a href="https://publications.waset.org/abstracts/search?q=disaster%20managers" title=" disaster managers"> disaster managers</a>, <a href="https://publications.waset.org/abstracts/search?q=recognition%20primed%20decision" title=" recognition primed decision"> recognition primed decision</a>, <a href="https://publications.waset.org/abstracts/search?q=model%20for%20making%20decisions%20in%20emergencies" title=" model for making decisions in emergencies"> model for making decisions in emergencies</a> </p> <a href="https://publications.waset.org/abstracts/47916/time-pressure-and-its-effect-at-tactical-level-of-disaster-management" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/47916.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">259</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">469</span> Understanding Tactical Urbanisms in Derelict Areas</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Berna%20Yaylal%C4%B1">Berna Yaylalı</a>, <a href="https://publications.waset.org/abstracts/search?q=Isin%20Can%20Traunm%C3%BCller"> Isin Can Traunmüller</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This paper explores the emergent bottom-up practices in the fields of architecture and urban design within comparative perspectives of two cities. As a temporary, easily affordable intervention that gives the possibility of transforming neglected spaces into vibrant public spaces, tactical urbanism, together with creative place-making strategies, presents alternative ways of creating sustainable developments in derelict and underused areas. This study examines the potential of social and physical developments through a reading of case studies of two creative spatial practices: a pop-up garden transformed from an unused derelict space in Favoriten, Vienna, and an urban community garden in Kuzguncuk, Istanbul. Two cities are chosen according to their multicultural population and diversity. Istanbul was selected as a design city by UNESCO Creative Cities Network in 2017, and Vienna was declared an open and livable city by its local government. This research will use media archives and reports, interviews with locals and local governments, site observations, and visual recordings as methods to provide a critical reading on creative public spaces from the view of local users in these neighborhoods. Reflecting on these emergent ways, this study aims at discussing the production process of tactile urbanism with the practices of locals and the decision-making process with cases from İstanbul and Vienna. The comparison between their place-making strategies in tactical urbanism will give important insights for future developments. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=creative%20city" title="creative city">creative city</a>, <a href="https://publications.waset.org/abstracts/search?q=tactical%20urbanism" title=" tactical urbanism"> tactical urbanism</a>, <a href="https://publications.waset.org/abstracts/search?q=neglected%20area" title=" neglected area"> neglected area</a>, <a href="https://publications.waset.org/abstracts/search?q=public%20space" title=" public space"> public space</a> </p> <a href="https://publications.waset.org/abstracts/159499/understanding-tactical-urbanisms-in-derelict-areas" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/159499.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">103</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">468</span> The Morphology of Sri Lankan Text Messages</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Chamindi%20Dilkushi%20Senaratne">Chamindi Dilkushi Senaratne</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Communicating via a text or an SMS (Short Message Service) has become an integral part of our daily lives. With the increase in the use of mobile phones, text messaging has become a genre by itself worth researching and studying. It is undoubtedly a major phenomenon revealing language change. This paper attempts to describe the morphological processes of text language of urban bilinguals in Sri Lanka. It will be a typological study based on 500 English text messages collected from urban bilinguals residing in Colombo. The messages are selected by categorizing the deviant forms of language use apparent in text messages. These stylistic deviations are a deliberate skilled performance by the users of the language possessing an in-depth knowledge of linguistic systems to create new words and thereby convey their linguistic identity and individual and group solidarity via the message. The findings of the study solidifies arguments that the manipulation of language in text messages is both creative and appropriate. In addition, code mixing theories will be used to identify how existing morphological processes are adapted by bilingual users in Sri Lanka when texting. The study will reveal processes such as omission, initialism, insertion and alternation in addition to other identified linguistic features in text language. The corpus reveals the most common morphological processes used by Sri Lankan urban bilinguals when sending texts. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=bilingual" title="bilingual">bilingual</a>, <a href="https://publications.waset.org/abstracts/search?q=deviations" title=" deviations"> deviations</a>, <a href="https://publications.waset.org/abstracts/search?q=morphology" title=" morphology"> morphology</a>, <a href="https://publications.waset.org/abstracts/search?q=texts" title=" texts"> texts</a> </p> <a href="https://publications.waset.org/abstracts/57197/the-morphology-of-sri-lankan-text-messages" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/57197.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">269</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">467</span> Integrated Risk Management as a Framework for Organisational Success</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Olakunle%20Felix%20Adekunle">Olakunle Felix Adekunle</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Risk management is recognised as an essential tool to tackle the inevitable uncertainty associated with business and projects at all levels. But it frequently fails to meet expectations, with projects continuing to run late, over budget or under performing, and business is not gaining the expected benefits. The evident disconnect which often occurs between strategic vision and tactical project delivery typically arises from poorly defined project objectives and inadequate attention to the proactive management of risks that could affect those objectives. One of the main failings in the traditional approach to risk management arises from a narrow focus on the downside, restricted to the technical or operational field, addressing tactical threats to processes, performance or people. This shortcoming can be overcome by widening the scope of risk management to encompass both strategic risks and upside opportunities, creating an integrated approach which can bridge the gap between strategy and tactics. Integrated risk management addresses risk across a variety of levels in the organisation, including strategy and tactics, and covering both opportunity and threat. Effective implementation of integrated risk management can produce a number of benefits to the organisation which are not available from the typical limited-scope risk process. This paper explores how to expand risk management to deliver strategic advantage while retaining its use as a tactical tool. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=risk%20management" title="risk management">risk management</a>, <a href="https://publications.waset.org/abstracts/search?q=success" title=" success"> success</a>, <a href="https://publications.waset.org/abstracts/search?q=organization" title=" organization"> organization</a>, <a href="https://publications.waset.org/abstracts/search?q=strategy" title=" strategy"> strategy</a>, <a href="https://publications.waset.org/abstracts/search?q=project" title=" project"> project</a>, <a href="https://publications.waset.org/abstracts/search?q=tactis" title=" tactis"> tactis</a>, <a href="https://publications.waset.org/abstracts/search?q=vision" title=" vision"> vision</a> </p> <a href="https://publications.waset.org/abstracts/40821/integrated-risk-management-as-a-framework-for-organisational-success" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/40821.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">397</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">466</span> An Analysis of the Differences between Three Levels Water Polo Players Based on Indicators of Efficiency</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Mladen%20Hraste">Mladen Hraste</a>, <a href="https://publications.waset.org/abstracts/search?q=Igor%20Jelaska"> Igor Jelaska</a>, <a href="https://publications.waset.org/abstracts/search?q=Ivan%20Granic"> Ivan Granic</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The scope of this research is the identification and explanation of differences of three levels of water polo players in some parameters of effectiveness. The sample for this study was 132 matches of the Adriatic Water Polo League in the 2013/14 competition season. Using the Kruskal-Wallis test and multiple comparisons of mean ranks for all groups at the significance level of α=0, 05, the hypothesis that there are significant differences between groups of respondents in ten of the seventeen variables of effectiveness was confirmed. There is a reasonable possibility that the differences are caused by the degree of learned and implemented tactical knowledge, the degree of scoring ability and the best selection for certain roles in the team. The results of this study can be applied to selection of teams and players, for the selection of the appropriate match concept and for organizing training process. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=scoring%20abilities" title="scoring abilities">scoring abilities</a>, <a href="https://publications.waset.org/abstracts/search?q=selection" title=" selection"> selection</a>, <a href="https://publications.waset.org/abstracts/search?q=tactical%20knowledge" title=" tactical knowledge"> tactical knowledge</a>, <a href="https://publications.waset.org/abstracts/search?q=water%20polo%20effectiveness" title=" water polo effectiveness"> water polo effectiveness</a> </p> <a href="https://publications.waset.org/abstracts/21309/an-analysis-of-the-differences-between-three-levels-water-polo-players-based-on-indicators-of-efficiency" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/21309.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">500</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">465</span> A Blockchain-Based Protection Strategy against Social Network Phishing</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Francesco%20Buccafurri">Francesco Buccafurri</a>, <a href="https://publications.waset.org/abstracts/search?q=Celeste%20Romolo"> Celeste Romolo</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Nowadays phishing is the most frequent starting point of cyber-attack vectors. Phishing is implemented both via email and social network messages. While a wide scientific literature exists which addresses the problem of contrasting email spam-phishing, no specific countermeasure has been so far proposed for phishing included into private messages of social network platforms. Unfortunately, the problem is severe. This paper proposes an approach against social network phishing, based on a non invasive collaborative information-sharing approach which leverages blockchain. The detection method works by filtering candidate messages, by distilling them by means of a distance-preserving hash function, and by publishing hashes over a public blockchain through a trusted smart contract (thus avoiding denial of service attacks). Phishing detection exploits social information embedded into social network profiles to identify similar messages belonging to disjoint contexts. The main contribution of the paper is to introduce a new approach to contrasting the problem of social network phishing, which, despite its severity, received little attention by both research and industry. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=phishing" title="phishing">phishing</a>, <a href="https://publications.waset.org/abstracts/search?q=social%20networks" title=" social networks"> social networks</a>, <a href="https://publications.waset.org/abstracts/search?q=information%20sharing" title=" information sharing"> information sharing</a>, <a href="https://publications.waset.org/abstracts/search?q=blockchain" title=" blockchain"> blockchain</a> </p> <a href="https://publications.waset.org/abstracts/90849/a-blockchain-based-protection-strategy-against-social-network-phishing" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/90849.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">328</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">464</span> Improvement of Data Transfer over Simple Object Access Protocol (SOAP)</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Khaled%20Ahmed%20Kadouh">Khaled Ahmed Kadouh</a>, <a href="https://publications.waset.org/abstracts/search?q=Kamal%20Ali%20Albashiri"> Kamal Ali Albashiri</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This paper presents a designed algorithm involves improvement of transferring data over Simple Object Access Protocol (SOAP). The aim of this work is to establish whether using SOAP in exchanging XML messages has any added advantages or not. The results showed that XML messages without SOAP take longer time and consume more memory, especially with binary data. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=JAX-WS" title="JAX-WS">JAX-WS</a>, <a href="https://publications.waset.org/abstracts/search?q=SMTP" title=" SMTP"> SMTP</a>, <a href="https://publications.waset.org/abstracts/search?q=SOAP" title=" SOAP"> SOAP</a>, <a href="https://publications.waset.org/abstracts/search?q=web%20service" title=" web service"> web service</a>, <a href="https://publications.waset.org/abstracts/search?q=XML" title=" XML"> XML</a> </p> <a href="https://publications.waset.org/abstracts/5440/improvement-of-data-transfer-over-simple-object-access-protocol-soap" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/5440.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">495</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">463</span> Cognitive Semantics Study of Conceptual and Metonymical Expressions in Johnson&#039;s Speeches about COVID-19</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Hussain%20Hameed%20Mayuuf">Hussain Hameed Mayuuf</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The study is an attempt to investigate the conceptual metonymies is used in political discourse about COVID-19. Thus, this study tries to analyze and investigate how the conceptual metonymies in Johnson's speech about coronavirus are constructed. This study aims at: Identifying how are metonymies relevant to understand the messages in Boris Johnson speeches and to find out how can conceptual blending theory help people to understand the messages in the political speech about COVID-19. Lastly, it tries to Point out the kinds of integration networks are common in political speech. The study is based on the hypotheses that conceptual blending theory is a powerful tool for investigating the intended messages in Johnson's speech and there are different processes of blending networks and conceptual mapping that enable the listeners to identify the messages in political speech. This study presents a qualitative and quantitative analysis of four speeches about COVID-19; they are said by Boris Johnson. The selected data have been tackled from the cognitive-semantic perspective by adopting Conceptual Blending Theory as a model for the analysis. It concludes that CBT is applicable to the analysis of metonymies in political discourse. Its mechanisms enable listeners to analyze and understand these speeches. Also the listener can identify and understand the hidden messages in Biden and Johnson's discourse about COVID-19 by using different conceptual networks. Finally, it is concluded that the double scope networks are the most common types of blending of metonymies in the political speech. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=cognitive" title="cognitive">cognitive</a>, <a href="https://publications.waset.org/abstracts/search?q=semantics" title=" semantics"> semantics</a>, <a href="https://publications.waset.org/abstracts/search?q=conceptual" title=" conceptual"> conceptual</a>, <a href="https://publications.waset.org/abstracts/search?q=metonymical" title=" metonymical"> metonymical</a>, <a href="https://publications.waset.org/abstracts/search?q=Covid-19" title=" Covid-19"> Covid-19</a> </p> <a href="https://publications.waset.org/abstracts/157124/cognitive-semantics-study-of-conceptual-and-metonymical-expressions-in-johnsons-speeches-about-covid-19" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/157124.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">128</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">462</span> Impact Evaluation of Discriminant Analysis on Epidemic Protocol in Warships’s Scenarios</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Davi%20Marinho%20de%20Araujo%20Falc%C3%A3o">Davi Marinho de Araujo Falcão</a>, <a href="https://publications.waset.org/abstracts/search?q=Ronaldo%20Moreira%20Salles"> Ronaldo Moreira Salles</a>, <a href="https://publications.waset.org/abstracts/search?q=Paulo%20Henrique%20Maranh%C3%A3o"> Paulo Henrique Maranhão</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Disruption Tolerant Networks (DTN) are an evolution of Mobile Adhoc Networks (MANET) and work good in scenarioswhere nodes are sparsely distributed, with low density, intermittent connections and an end-to-end infrastructure is not possible to guarantee. Therefore, DTNs are recommended for high latency applications that can last from hours to days. The maritime scenario has mobility characteristics that contribute to a DTN network approach, but the concern with data security is also a relevant aspect in such scenarios. Continuing the previous work, which evaluated the performance of some DTN protocols (Epidemic, Spray and Wait, and Direct Delivery) in three warship scenarios and proposed the application of discriminant analysis, as a classification technique for secure connections, in the Epidemic protocol, thus, the current article proposes a new analysis of the directional discriminant function with opening angles smaller than 90 degrees, demonstrating that the increase in directivity influences the selection of a greater number of secure connections by the directional discriminant Epidemic protocol. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=DTN" title="DTN">DTN</a>, <a href="https://publications.waset.org/abstracts/search?q=discriminant%20function" title=" discriminant function"> discriminant function</a>, <a href="https://publications.waset.org/abstracts/search?q=epidemic%20protocol" title=" epidemic protocol"> epidemic protocol</a>, <a href="https://publications.waset.org/abstracts/search?q=security" title=" security"> security</a>, <a href="https://publications.waset.org/abstracts/search?q=tactical%20messages" title=" tactical messages"> tactical messages</a>, <a href="https://publications.waset.org/abstracts/search?q=warship%20scenario" title=" warship scenario"> warship scenario</a> </p> <a href="https://publications.waset.org/abstracts/141488/impact-evaluation-of-discriminant-analysis-on-epidemic-protocol-in-warshipss-scenarios" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/141488.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">191</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">461</span> A Socio-Pragmatic Investigation of Gender Enactment in New Month Text Messages</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Esther%20Robert">Esther Robert</a>, <a href="https://publications.waset.org/abstracts/search?q=Romanus%20Aboh"> Romanus Aboh</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This paper undertakes a socio-pragmatic investigation of gender enactment in new month text messages. This study employs Gumperz’s Interactional Sociolinguistics as its theoretical point of reference to investigate how people create meaning through social interaction. This theory attempts to analyse any social interaction based on contextualization cues and presuppositions. This study explores the appropriateness of language used in texting. The text messages are collected from different mobile phones from different genders, which form the data for this paper. The study observes remarkable differences between genders in the use of informal language. The study reveals that men and women differ remarkably in conversational interaction as well as in writing. While it is observed that women are emotional, orderly, and meticulous, detailed and observed certain grammatical rules, men are casual, brief and appear to show evidence that less attention is paid to grammatical rules. Also, the study shows women as relaxing, showing love, care, concern with their emotive, spirit-raising and touching language, while mean are direct, short, and straight to the point. It is discovered through the study that women behave this way because of their brain-wiring. That is why language and communication matter more to women than to men and this reflects in their new month text messages. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=difference" title="difference">difference</a>, <a href="https://publications.waset.org/abstracts/search?q=emotionalised%20expressions" title=" emotionalised expressions"> emotionalised expressions</a>, <a href="https://publications.waset.org/abstracts/search?q=gender" title=" gender"> gender</a>, <a href="https://publications.waset.org/abstracts/search?q=texting" title=" texting"> texting</a> </p> <a href="https://publications.waset.org/abstracts/55953/a-socio-pragmatic-investigation-of-gender-enactment-in-new-month-text-messages" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/55953.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">254</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">460</span> RSU Aggregated Message Delivery for VANET</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Auxeeliya%20Jesudoss">Auxeeliya Jesudoss</a>, <a href="https://publications.waset.org/abstracts/search?q=Ashraph%20Sulaiman"> Ashraph Sulaiman</a>, <a href="https://publications.waset.org/abstracts/search?q=Ratnakar%20Kotnana"> Ratnakar Kotnana</a> </p> <p class="card-text"><strong>Abstract:</strong></p> V2V communication brings up several questions of scalability issues although message sharing in vehicular ad-hoc networks comprises of both Vehicle-to-Vehicle communications (V2V) and Vehicle to Infrastructure communication (V2I). It is not an easy task for a vehicle to verify all signatures of the messages sent by its neighboring vehicles in a timely manner, without resulting in message loss. Moreover, the communication overhead of a vehicle to authenticate another vehicle would increase together with the security of the system. Another issue to be addressed is the continuous mobility of vehicles which requires at least some information on the node’s own position to be revealed to the neighboring vehicles. This may facilitate the attacker to congregate information on a node’s position or its mobility patterns. In order to tackle these issues, this paper introduces a RSU aggregated message deliverance scheme called RAMeD. With RAMeD, roadside units (RSUs) are responsible for verifying the identity of the vehicles entering in its range, collect messages from genuine vehicles and to aggregate similar messages into groups before sending them to all the vehicles in its communication range. This aggregation will tremendously improve the rate of message delivery and reduce the message lose ratio by avoiding similar messages being sent to the vehicles redundantly. The proposed protocol is analyzed extensively to evaluate its merits and efficiency for vehicular communication. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=vehicular%20ad-hoc%20networks" title="vehicular ad-hoc networks">vehicular ad-hoc networks</a>, <a href="https://publications.waset.org/abstracts/search?q=V2V" title=" V2V"> V2V</a>, <a href="https://publications.waset.org/abstracts/search?q=V2I" title=" V2I"> V2I</a>, <a href="https://publications.waset.org/abstracts/search?q=VANET%20communication" title=" VANET communication"> VANET communication</a>, <a href="https://publications.waset.org/abstracts/search?q=scalability" title=" scalability"> scalability</a>, <a href="https://publications.waset.org/abstracts/search?q=message%20aggregation" title=" message aggregation"> message aggregation</a> </p> <a href="https://publications.waset.org/abstracts/1449/rsu-aggregated-message-delivery-for-vanet" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/1449.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">408</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">459</span> Proposal of Commutation Protocol in Hybrid Sensors and Vehicular Networks for Intelligent Transport Systems</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Taha%20Bensiradj">Taha Bensiradj</a>, <a href="https://publications.waset.org/abstracts/search?q=Samira%20Moussaoui"> Samira Moussaoui</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Hybrid Sensors and Vehicular Networks (HSVN), represent a hybrid network, which uses several generations of Ad-Hoc networks. It is used especially in Intelligent Transport Systems (ITS). The HSVN allows making collaboration between the Wireless Sensors Network (WSN) deployed on the border of the road and the Vehicular Network (VANET). This collaboration is defined by messages exchanged between the two networks for the purpose to inform the drivers about the state of the road, provide road safety information and more information about traffic on the road. Moreover, this collaboration created by HSVN, also allows the use of a network and the advantage of improving another network. For example, the dissemination of information between the sensors quickly decreases its energy, and therefore, we can use vehicles that do not have energy constraint to disseminate the information between sensors. On the other hand, to solve the disconnection problem in VANET, the sensors can be used as gateways that allow sending the messages received by one vehicle to another. However, because of the short communication range of the sensor and its low capacity of storage and processing of data, it is difficult to ensure the exchange of road messages between it and the vehicle, which can be moving at high speed at the time of exchange. This represents the time where the vehicle is in communication range with the sensor. This work is the proposition of a communication protocol between the sensors and the vehicle used in HSVN. The latter has as the purpose to ensure the exchange of road messages in the available time of exchange. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=HSVN" title="HSVN">HSVN</a>, <a href="https://publications.waset.org/abstracts/search?q=ITS" title=" ITS"> ITS</a>, <a href="https://publications.waset.org/abstracts/search?q=VANET" title=" VANET"> VANET</a>, <a href="https://publications.waset.org/abstracts/search?q=WSN" title=" WSN"> WSN</a> </p> <a href="https://publications.waset.org/abstracts/54397/proposal-of-commutation-protocol-in-hybrid-sensors-and-vehicular-networks-for-intelligent-transport-systems" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/54397.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">361</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">458</span> University Students&#039; Perspectives on a Mindfulness-Based App for Weight, Weight Related Behaviors, and Stress: A Qualitative Focus Group Study</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Lynnette%20Lyzwinski">Lynnette Lyzwinski</a>, <a href="https://publications.waset.org/abstracts/search?q=Liam%20Caffery"> Liam Caffery</a>, <a href="https://publications.waset.org/abstracts/search?q=Matthew%20Bambling"> Matthew Bambling</a>, <a href="https://publications.waset.org/abstracts/search?q=Sisira%20Edirippulige"> Sisira Edirippulige</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Introduction: A novel method of delivering mindfulness interventions for populations at risk of weight gain and stress-related eating, in particular, college students, is through mHealth. While there have been qualitative studies on mHealth for weight loss, there has not been a study on mHealth for weight loss using mindfulness that has explored student perspectives on a student centred mindfulness app and mindfulness-based text messages for eating and stress. Student perspective data will provide valuable information for creating a specific purpose weight management app and mindfulness-based text messages (for the Mindfulness App study). Methods: A qualitative focus group study was undertaken at St Lucia campus at the University of Queensland in March 2017. Students over the age of 18 were eligible to participate. Interviews were audiotaped and transcribed. One week following the focus group, students were sent sample mindfulness-based text messages based on their responses. Students provided written feedback via email. Data were analysed using N Vivo software. Results: The key themes in a future mindfulness-based app are a simple design interface, a focus on education/practical tips, and real-life practical exercises. Social media should be avoided. Key themes surrounding barriers include the perceived difficulty of mindfulness and a lack of proper guidance or knowledge. The mindfulness-based text messages were received positively. Key themes were creating messages with practical tips about how to be mindful and how to integrate mindful reflection of both one’s body and environment while on campus. Other themes including creating positive, inspirational messages. There was lack of agreement on the ideal timing for messages. Discussion: This is the first study that explored student perspectives on a mindfulness-app and mindfulness-based text messages for stress and weight management as a pre-trial study for the Mindfulness App trial for stress, lifestyle, and weight in students. It is important to consider maximizing the potential facilitators of use and minimize potential identified barriers when developing and designing a future mHealth mindfulness-based intervention tailored to the student consumer. Conclusion: Future mHealth studies may consider integrating mindfulness-based text messages in their interventions for weight and stress as this is a novel feature that appears to be acceptable for participants. The results of this focus group provide the basis to develop content for a specific purpose student app for weight management. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=mindfulness" title="mindfulness">mindfulness</a>, <a href="https://publications.waset.org/abstracts/search?q=college%20students" title=" college students"> college students</a>, <a href="https://publications.waset.org/abstracts/search?q=mHealth" title=" mHealth"> mHealth</a>, <a href="https://publications.waset.org/abstracts/search?q=weight%20loss" title=" weight loss"> weight loss</a> </p> <a href="https://publications.waset.org/abstracts/91930/university-students-perspectives-on-a-mindfulness-based-app-for-weight-weight-related-behaviors-and-stress-a-qualitative-focus-group-study" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/91930.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">198</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">457</span> A Novel Approach of Secret Communication Using Douglas-Peucker Algorithm</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=R.%20Kiruthika">R. Kiruthika</a>, <a href="https://publications.waset.org/abstracts/search?q=A.%20Kannan"> A. Kannan</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Steganography is the problem of hiding secret messages in 'innocent – looking' public communication so that the presence of the secret message cannot be detected. This paper introduces a steganographic security in terms of computational in-distinguishability from a channel of probability distributions on cover messages. This method first splits the cover image into two separate blocks using Douglas – Peucker algorithm. The text message and the image will be hided in the Least Significant Bit (LSB) of the cover image. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=steganography" title="steganography">steganography</a>, <a href="https://publications.waset.org/abstracts/search?q=lsb" title=" lsb"> lsb</a>, <a href="https://publications.waset.org/abstracts/search?q=embedding" title=" embedding"> embedding</a>, <a href="https://publications.waset.org/abstracts/search?q=Douglas-Peucker%20algorithm" title=" Douglas-Peucker algorithm"> Douglas-Peucker algorithm</a> </p> <a href="https://publications.waset.org/abstracts/29673/a-novel-approach-of-secret-communication-using-douglas-peucker-algorithm" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/29673.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">363</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">456</span> Graffiti as Intelligence: an Analysis of Encoded Messages in Gang Graffiti Renderings</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Timothy%20Kephart">Timothy Kephart</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Many law enforcement officials believe that gangs communicate messages to both the community and to rival gangs through graffiti. Some social scientists have documented this as well, however no recent research has examined gang graffiti for its underlying meaning. Empirical research on gang graffiti and gang communication through graffiti is limited. This research can be described as an exploratory effort to better understand how, and perhaps why, gangs employ this medium for communication. Furthermore this research showcases how law enforcement agencies can utilize this hidden form of communication to better direct resources and impact gang violence. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=gangs" title="gangs">gangs</a>, <a href="https://publications.waset.org/abstracts/search?q=graffiti" title=" graffiti"> graffiti</a>, <a href="https://publications.waset.org/abstracts/search?q=juvenile%20justice" title=" juvenile justice"> juvenile justice</a>, <a href="https://publications.waset.org/abstracts/search?q=policing" title=" policing"> policing</a> </p> <a href="https://publications.waset.org/abstracts/28825/graffiti-as-intelligence-an-analysis-of-encoded-messages-in-gang-graffiti-renderings" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/28825.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">439</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">455</span> Modified InVEST for Whatsapp Messages Forensic Triage and Search through Visualization</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Agria%20Rhamdhan">Agria Rhamdhan</a> </p> <p class="card-text"><strong>Abstract:</strong></p> WhatsApp as the most popular mobile messaging app has been used as evidence in many criminal cases. As the use of mobile messages generates large amounts of data, forensic investigation faces the challenge of large data problems. The hardest part of finding this important evidence is because current practice utilizes tools and technique that require manual analysis to check all messages. That way, analyze large sets of mobile messaging data will take a lot of time and effort. Our work offers methodologies based on forensic triage to reduce large data to manageable sets resulting easier to do detailed reviews, then show the results through interactive visualization to show important term, entities and relationship through intelligent ranking using Term Frequency-Inverse Document Frequency (TF-IDF) and Latent Dirichlet Allocation (LDA) Model. By implementing this methodology, investigators can improve investigation processing time and result's accuracy. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=forensics" title="forensics">forensics</a>, <a href="https://publications.waset.org/abstracts/search?q=triage" title=" triage"> triage</a>, <a href="https://publications.waset.org/abstracts/search?q=visualization" title=" visualization"> visualization</a>, <a href="https://publications.waset.org/abstracts/search?q=WhatsApp" title=" WhatsApp"> WhatsApp</a> </p> <a href="https://publications.waset.org/abstracts/95674/modified-invest-for-whatsapp-messages-forensic-triage-and-search-through-visualization" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/95674.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">168</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">454</span> Exchanging Messages in Ancient Greek Tragedy: The Use of δέλτος in the Euripidean and Sophoclean Stage</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Maria-Agori%20Gravvani">Maria-Agori Gravvani</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The part of communication holds a significant place in human life. From the early beginning of human history, humans tried to communicate orally with other people in order to survive and to communicate their needs. The level of education that the majority of the Athenean citizens had the opportunity to acquire in the Classic period was very low. Only the wealthy ones had the opportunity of the upper form of education that led them to a career in politics, while the other ones struggled for their daily survival. In the corpus of Euripides' and Sophocles' tragedies, the type of communication is written, too. Not only in the Iphigenia's tragedies of Euripides but also in the Sophocles' Trachiniae, the use of δέλτος bonds significant messages with people. Those written means of private communication play an important role in the plot of the tragedy and have hidden private messages from their owners. The main aim of this paper is to analyze the power of the deltos' written text in the tragedies of Euripides Ifigenia Taurica and Ifigenia Aulidensis and Sophocles' Trachiniae. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=deltos" title="deltos">deltos</a>, <a href="https://publications.waset.org/abstracts/search?q=ancient%20greek%20tragedy" title=" ancient greek tragedy"> ancient greek tragedy</a>, <a href="https://publications.waset.org/abstracts/search?q=sophocles" title=" sophocles"> sophocles</a>, <a href="https://publications.waset.org/abstracts/search?q=euripides" title=" euripides"> euripides</a> </p> <a href="https://publications.waset.org/abstracts/170397/exchanging-messages-in-ancient-greek-tragedy-the-use-of-deltos-in-the-euripidean-and-sophoclean-stage" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/170397.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">66</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">453</span> Cluster Based Ant Colony Routing Algorithm for Mobile Ad-Hoc Networks</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Alaa%20Eddien%20Abdallah">Alaa Eddien Abdallah</a>, <a href="https://publications.waset.org/abstracts/search?q=Bajes%20Yousef%20Alskarnah"> Bajes Yousef Alskarnah </a> </p> <p class="card-text"><strong>Abstract:</strong></p> Ant colony based routing algorithms are known to grantee the packet delivery, but they su ffer from the huge overhead of control messages which are needed to discover the route. In this paper we utilize the network nodes positions to group the nodes in connected clusters. We use clusters-heads only on forwarding the route discovery control messages. Our simulations proved that the new algorithm has decreased the overhead dramatically without affecting the delivery rate. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=ad-hoc%20network" title="ad-hoc network">ad-hoc network</a>, <a href="https://publications.waset.org/abstracts/search?q=MANET" title=" MANET"> MANET</a>, <a href="https://publications.waset.org/abstracts/search?q=ant%20colony%20routing" title=" ant colony routing"> ant colony routing</a>, <a href="https://publications.waset.org/abstracts/search?q=position%20based%20routing" title=" position based routing"> position based routing</a> </p> <a href="https://publications.waset.org/abstracts/13698/cluster-based-ant-colony-routing-algorithm-for-mobile-ad-hoc-networks" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/13698.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">425</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">452</span> Evidence-Based Investigation of the Phonology of Nigerian Instant Messaging</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Emmanuel%20Uba">Emmanuel Uba</a>, <a href="https://publications.waset.org/abstracts/search?q=Lily%20Chimuanya"> Lily Chimuanya</a>, <a href="https://publications.waset.org/abstracts/search?q=Maryam%20Tar"> Maryam Tar</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Orthographic engineering is no longer the preserve of the Short Messaging Service (SMS), which is characterised by limited space. Such stylistic creativity or deviation is fast creeping into real-time messaging, popularly known as Instant Messaging (IM), despite the large number of characters allowed. This occurs at various linguistic levels: phonology, morphology, syntax, etc. Nigerians are not immune to this linguistic stylisation. This study investigates the phonological and meta-phonological conventions of the messages sent and received via WhatsApp by Nigerian graduates. This is ontological study of 250 instant messages collected from 98 graduates from different ethnic groups in Nigeria. The selection and analysis of the messages are based on figure and ground principle. The results reveal the use of accent stylisation, phoneme substitution, blending, consonantisation (a specialised form of deletion targeting vowels), numerophony (using a figure/number, usually 1-10, to represent a word or syllable that has the same sound) and phonetic respelling in the IMs sent by Nigerians. The study confirms the existence of linguistic creativity. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=figure%20and%20ground%20principle" title="figure and ground principle">figure and ground principle</a>, <a href="https://publications.waset.org/abstracts/search?q=instant%20messaging" title=" instant messaging"> instant messaging</a>, <a href="https://publications.waset.org/abstracts/search?q=linguistic%20stylisation" title=" linguistic stylisation"> linguistic stylisation</a>, <a href="https://publications.waset.org/abstracts/search?q=meta-phonology" title=" meta-phonology"> meta-phonology</a> </p> <a href="https://publications.waset.org/abstracts/70599/evidence-based-investigation-of-the-phonology-of-nigerian-instant-messaging" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/70599.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">396</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">451</span> Emotions and Message Sharing on the Chinese Microblog</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Yungeng%20Xie">Yungeng Xie</a>, <a href="https://publications.waset.org/abstracts/search?q=Cong%20Liu"> Cong Liu</a>, <a href="https://publications.waset.org/abstracts/search?q=Yi%20Liu"> Yi Liu</a>, <a href="https://publications.waset.org/abstracts/search?q=Xuanao%20Wan"> Xuanao Wan</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The study aims to explore microblog users&rsquo; emotion expression and sharing behaviors on the Chinese microblog (Weibo). The first theme of study analyzed whether microblog emotions impact readers&rsquo; message sharing behaviors, specifically, how the strength of emotion (positive and negative) in microblog messages facilitate/inhibit readers&rsquo; sharing behaviors. The second theme compared the differences among the three types of microblog users (i.e., verified enterprise users, verified individual users and unverified users) in terms of their profiles and microblog behaviors. A total of 7114 microblog messages about 24 hot public events in China were sampled from Sina Weibo. The first study results show that strength of negative emotions that microblog messages carry significantly increase the possibility of the message being shared. The second study results indicate that there are significant differences across the three types of users in terms of their emotion expression and its influence on microblog behaviors. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=emotion%20expression" title="emotion expression">emotion expression</a>, <a href="https://publications.waset.org/abstracts/search?q=information%20diffusion" title=" information diffusion"> information diffusion</a>, <a href="https://publications.waset.org/abstracts/search?q=microblog" title=" microblog"> microblog</a>, <a href="https://publications.waset.org/abstracts/search?q=sharing" title=" sharing"> sharing</a> </p> <a href="https://publications.waset.org/abstracts/43998/emotions-and-message-sharing-on-the-chinese-microblog" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/43998.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">239</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">450</span> Co-produced Databank of Tailored Messages to Support Enagagement to Digitial Health Interventions</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Menna%20Brown">Menna Brown</a>, <a href="https://publications.waset.org/abstracts/search?q=Tania%20Domun"> Tania Domun</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Digital health interventions are effective across a wide array of health conditions spanning physical health, lifestyle behaviour change, and mental health and wellbeing; furthermore, they are rapidly increasing in volume within both the academic literature and society as commercial apps continue to proliferate the digital health market. However, adherence and engagement to digital health interventions remains problematic. Technology-based personalised and tailored reminder strategies can support engagement to digital health interventions. Interventions which support individuals’ mental health and wellbeing are of critical importance in the wake if the COVID-19 pandemic. Student and young person’s mental health has been negatively affected and digital resources continue to offer cost effective means to address wellbeing at a population level. Develop a databank of digital co-produced tailored messages to support engagement to a range of digital health interventions including those focused on mental health and wellbeing, and lifestyle behaviour change. Qualitative research design. Participants discussed their views of health and wellbeing, engagement and adherence to digital health interventions focused around a 12-week wellbeing intervention via a series of focus group discussions. They worked together to co-create content following a participatory design approach. Three focus group discussions were facilitated with (n=15) undergraduate students at one Welsh university to provide an empirically derived, co-produced, databank of (n=145) tailored messages. Messages were explored and categorised thematically, and the following ten themes emerged: Autonomy, Recognition, Guidance, Community, Acceptance, Responsibility, Encouragement, Compassion, Impact and Ease. The findings provide empirically derived, co-produced tailored messages. These have been made available for use, via ‘ACTivate your wellbeing’ a digital, automated, 12-week health and wellbeing intervention programme, based on acceptance and commitment therapy (ACT). The purpose of which is to support future research to evaluate the impact of thematically categorised tailored messages on engagement and adherence to digital health interventions. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=digital%20health" title="digital health">digital health</a>, <a href="https://publications.waset.org/abstracts/search?q=engagement" title=" engagement"> engagement</a>, <a href="https://publications.waset.org/abstracts/search?q=wellbeing" title=" wellbeing"> wellbeing</a>, <a href="https://publications.waset.org/abstracts/search?q=participatory%20design" title=" participatory design"> participatory design</a>, <a href="https://publications.waset.org/abstracts/search?q=positive%20psychology" title=" positive psychology"> positive psychology</a>, <a href="https://publications.waset.org/abstracts/search?q=co-production" title=" co-production"> co-production</a> </p> <a href="https://publications.waset.org/abstracts/149935/co-produced-databank-of-tailored-messages-to-support-enagagement-to-digitial-health-interventions" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/149935.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">121</span> </span> </div> </div> <ul class="pagination"> <li class="page-item disabled"><span class="page-link">&lsaquo;</span></li> <li class="page-item active"><span class="page-link">1</span></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=tactical%20messages&amp;page=2">2</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=tactical%20messages&amp;page=3">3</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=tactical%20messages&amp;page=4">4</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=tactical%20messages&amp;page=5">5</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=tactical%20messages&amp;page=6">6</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=tactical%20messages&amp;page=7">7</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=tactical%20messages&amp;page=8">8</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=tactical%20messages&amp;page=9">9</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=tactical%20messages&amp;page=10">10</a></li> <li class="page-item disabled"><span class="page-link">...</span></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=tactical%20messages&amp;page=15">15</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=tactical%20messages&amp;page=16">16</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=tactical%20messages&amp;page=2" rel="next">&rsaquo;</a></li> </ul> </div> </main> <footer> <div id="infolinks" class="pt-3 pb-2"> <div class="container"> <div style="background-color:#f5f5f5;" class="p-3"> <div class="row"> <div class="col-md-2"> <ul class="list-unstyled"> About <li><a href="https://waset.org/page/support">About Us</a></li> <li><a href="https://waset.org/page/support#legal-information">Legal</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/WASET-16th-foundational-anniversary.pdf">WASET celebrates its 16th foundational anniversary</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Account <li><a href="https://waset.org/profile">My Account</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Explore <li><a href="https://waset.org/disciplines">Disciplines</a></li> <li><a href="https://waset.org/conferences">Conferences</a></li> <li><a href="https://waset.org/conference-programs">Conference Program</a></li> <li><a href="https://waset.org/committees">Committees</a></li> <li><a href="https://publications.waset.org">Publications</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Research <li><a href="https://publications.waset.org/abstracts">Abstracts</a></li> <li><a href="https://publications.waset.org">Periodicals</a></li> <li><a href="https://publications.waset.org/archive">Archive</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Open Science <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Science-Philosophy.pdf">Open Science Philosophy</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Science-Award.pdf">Open Science Award</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Society-Open-Science-and-Open-Innovation.pdf">Open Innovation</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Postdoctoral-Fellowship-Award.pdf">Postdoctoral Fellowship Award</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Scholarly-Research-Review.pdf">Scholarly Research Review</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Support <li><a href="https://waset.org/page/support">Support</a></li> <li><a href="https://waset.org/profile/messages/create">Contact Us</a></li> <li><a href="https://waset.org/profile/messages/create">Report Abuse</a></li> </ul> </div> </div> </div> </div> </div> <div class="container text-center"> <hr style="margin-top:0;margin-bottom:.3rem;"> <a href="https://creativecommons.org/licenses/by/4.0/" target="_blank" class="text-muted small">Creative Commons Attribution 4.0 International License</a> <div id="copy" class="mt-2">&copy; 2024 World Academy of Science, Engineering and Technology</div> </div> </footer> <a href="javascript:" id="return-to-top"><i class="fas fa-arrow-up"></i></a> <div class="modal" id="modal-template"> <div class="modal-dialog"> <div class="modal-content"> <div class="row m-0 mt-1"> <div class="col-md-12"> <button type="button" class="close" data-dismiss="modal" aria-label="Close"><span aria-hidden="true">&times;</span></button> </div> </div> <div class="modal-body"></div> </div> </div> </div> <script src="https://cdn.waset.org/static/plugins/jquery-3.3.1.min.js"></script> <script src="https://cdn.waset.org/static/plugins/bootstrap-4.2.1/js/bootstrap.bundle.min.js"></script> <script src="https://cdn.waset.org/static/js/site.js?v=150220211556"></script> <script> jQuery(document).ready(function() { /*jQuery.get("https://publications.waset.org/xhr/user-menu", function (response) { jQuery('#mainNavMenu').append(response); });*/ jQuery.get({ url: "https://publications.waset.org/xhr/user-menu", cache: false }).then(function(response){ jQuery('#mainNavMenu').append(response); }); }); </script> </body> </html>

Pages: 1 2 3 4 5 6 7 8 9 10