CINXE.COM

Search results for: email content

<!DOCTYPE html> <html lang="en" dir="ltr"> <head> <!-- Google tag (gtag.js) --> <script async src="https://www.googletagmanager.com/gtag/js?id=G-P63WKM1TM1"></script> <script> window.dataLayer = window.dataLayer || []; function gtag(){dataLayer.push(arguments);} gtag('js', new Date()); gtag('config', 'G-P63WKM1TM1'); </script> <!-- Yandex.Metrika counter --> <script type="text/javascript" > (function(m,e,t,r,i,k,a){m[i]=m[i]||function(){(m[i].a=m[i].a||[]).push(arguments)}; m[i].l=1*new Date(); for (var j = 0; j < document.scripts.length; j++) {if (document.scripts[j].src === r) { return; }} k=e.createElement(t),a=e.getElementsByTagName(t)[0],k.async=1,k.src=r,a.parentNode.insertBefore(k,a)}) (window, document, "script", "https://mc.yandex.ru/metrika/tag.js", "ym"); ym(55165297, "init", { clickmap:false, trackLinks:true, accurateTrackBounce:true, webvisor:false }); </script> <noscript><div><img src="https://mc.yandex.ru/watch/55165297" style="position:absolute; left:-9999px;" alt="" /></div></noscript> <!-- /Yandex.Metrika counter --> <!-- Matomo --> <!-- End Matomo Code --> <title>Search results for: email content</title> <meta name="description" content="Search results for: email content"> <meta name="keywords" content="email content"> <meta name="viewport" content="width=device-width, initial-scale=1, minimum-scale=1, maximum-scale=1, user-scalable=no"> <meta charset="utf-8"> <link href="https://cdn.waset.org/favicon.ico" type="image/x-icon" rel="shortcut icon"> <link href="https://cdn.waset.org/static/plugins/bootstrap-4.2.1/css/bootstrap.min.css" rel="stylesheet"> <link href="https://cdn.waset.org/static/plugins/fontawesome/css/all.min.css" rel="stylesheet"> <link href="https://cdn.waset.org/static/css/site.css?v=150220211555" rel="stylesheet"> </head> <body> <header> <div class="container"> <nav class="navbar navbar-expand-lg navbar-light"> <a class="navbar-brand" href="https://waset.org"> <img src="https://cdn.waset.org/static/images/wasetc.png" alt="Open Science Research Excellence" title="Open Science Research Excellence" /> </a> <button class="d-block d-lg-none navbar-toggler ml-auto" type="button" data-toggle="collapse" data-target="#navbarMenu" aria-controls="navbarMenu" aria-expanded="false" aria-label="Toggle navigation"> <span class="navbar-toggler-icon"></span> </button> <div class="w-100"> <div class="d-none d-lg-flex flex-row-reverse"> <form method="get" action="https://waset.org/search" class="form-inline my-2 my-lg-0"> <input class="form-control mr-sm-2" type="search" placeholder="Search Conferences" value="email content" name="q" aria-label="Search"> <button class="btn btn-light my-2 my-sm-0" type="submit"><i class="fas fa-search"></i></button> </form> </div> <div class="collapse navbar-collapse mt-1" id="navbarMenu"> <ul class="navbar-nav ml-auto align-items-center" id="mainNavMenu"> <li class="nav-item"> <a class="nav-link" href="https://waset.org/conferences" title="Conferences in 2024/2025/2026">Conferences</a> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/disciplines" title="Disciplines">Disciplines</a> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/committees" rel="nofollow">Committees</a> </li> <li class="nav-item dropdown"> <a class="nav-link dropdown-toggle" href="#" id="navbarDropdownPublications" role="button" data-toggle="dropdown" aria-haspopup="true" aria-expanded="false"> Publications </a> <div class="dropdown-menu" aria-labelledby="navbarDropdownPublications"> <a class="dropdown-item" href="https://publications.waset.org/abstracts">Abstracts</a> <a class="dropdown-item" href="https://publications.waset.org">Periodicals</a> <a class="dropdown-item" href="https://publications.waset.org/archive">Archive</a> </div> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/page/support" title="Support">Support</a> </li> </ul> </div> </div> </nav> </div> </header> <main> <div class="container mt-4"> <div class="row"> <div class="col-md-9 mx-auto"> <form method="get" action="https://publications.waset.org/abstracts/search"> <div id="custom-search-input"> <div class="input-group"> <i class="fas fa-search"></i> <input type="text" class="search-query" name="q" placeholder="Author, Title, Abstract, Keywords" value="email content"> <input type="submit" class="btn_search" value="Search"> </div> </div> </form> </div> </div> <div class="row mt-3"> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Commenced</strong> in January 2007</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Frequency:</strong> Monthly</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Edition:</strong> International</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Paper Count:</strong> 6203</div> </div> </div> </div> <h1 class="mt-3 mb-3 text-center" style="font-size:1.6rem;">Search results for: email content</h1> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">6203</span> Personalized Email Marketing Strategy: A Reinforcement Learning Approach</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Lei%20Zhang">Lei Zhang</a>, <a href="https://publications.waset.org/abstracts/search?q=Tingting%20Xu"> Tingting Xu</a>, <a href="https://publications.waset.org/abstracts/search?q=Jun%20He"> Jun He</a>, <a href="https://publications.waset.org/abstracts/search?q=Zhenyu%20Yan"> Zhenyu Yan</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Email marketing is one of the most important segments of online marketing. It has been proved to be the most effective way to acquire and retain customers. The email content is vital to customers. Different customers may have different familiarity with a product, so a successful marketing strategy must personalize email content based on individual customers’ product affinity. In this study, we build our personalized email marketing strategy with three types of emails: nurture, promotion, and conversion. Each type of email has a different influence on customers. We investigate this difference by analyzing customers’ open rates, click rates and opt-out rates. Feature importance from response models is also analyzed. The goal of the marketing strategy is to improve the click rate on conversion-type emails. To build the personalized strategy, we formulate the problem as a reinforcement learning problem and adopt a Q-learning algorithm with variations. The simulation results show that our model-based strategy outperforms the current marketer’s strategy. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=email%20marketing" title="email marketing">email marketing</a>, <a href="https://publications.waset.org/abstracts/search?q=email%20content" title=" email content"> email content</a>, <a href="https://publications.waset.org/abstracts/search?q=reinforcement%20learning" title=" reinforcement learning"> reinforcement learning</a>, <a href="https://publications.waset.org/abstracts/search?q=machine%20learning" title=" machine learning"> machine learning</a>, <a href="https://publications.waset.org/abstracts/search?q=Q-learning" title=" Q-learning"> Q-learning</a> </p> <a href="https://publications.waset.org/abstracts/152253/personalized-email-marketing-strategy-a-reinforcement-learning-approach" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/152253.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">194</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">6202</span> sing Eye Tracking to Measure the Impact of Persuasion Principles in Phishing Emails</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Laura%20Bishop">Laura Bishop</a>, <a href="https://publications.waset.org/abstracts/search?q=Isabel%20Jones"> Isabel Jones</a>, <a href="https://publications.waset.org/abstracts/search?q=Linn%20Halvorsen"> Linn Halvorsen</a>, <a href="https://publications.waset.org/abstracts/search?q=Angela%20Smith"> Angela Smith</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Phishing emails are a form of social engineering where attackers deceive email users into revealing sensitive information or installing malware such as ransomware. Scammers often use persuasion techniques to influence email users to interact with malicious content. This study will use eye-tracking equipment to analyze how participants respond to and process Cialdini’s persuasion principles when utilized within phishing emails. Eye tracking provides insights into what is happening on the subconscious level of the brain that the participant may not be aware of. An experiment is conducted to track participant eye movements, whilst interacting with and then filing a series of persuasive emails delivered at random. Eye tracking metrics will be analyzed in relation to whether a malicious email has been identified as phishing (filed as ‘suspicious’) or not phishing (filed in any other folder). This will help determine the most influential persuasion techniques and those 'areas of interest' within an email that require intervention. The results will aid further research on how to reduce the effects of persuasion on human decision-making when interacting with phishing emails. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=cybersecurity" title="cybersecurity">cybersecurity</a>, <a href="https://publications.waset.org/abstracts/search?q=human-centric" title=" human-centric"> human-centric</a>, <a href="https://publications.waset.org/abstracts/search?q=phishing" title=" phishing"> phishing</a>, <a href="https://publications.waset.org/abstracts/search?q=psychology" title=" psychology"> psychology</a> </p> <a href="https://publications.waset.org/abstracts/178193/sing-eye-tracking-to-measure-the-impact-of-persuasion-principles-in-phishing-emails" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/178193.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">83</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">6201</span> Measurement of Susceptibility Users Using Email Phishing Attack</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Cindy%20Sahera">Cindy Sahera</a>, <a href="https://publications.waset.org/abstracts/search?q=Sarwono%20Sutikno"> Sarwono Sutikno</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Rapid technological developments also have negative impacts, namely the increasing criminal cases based on technology or cybercrime. One technique that can be used to conduct cybercrime attacks are phishing email. The issue is whether the user is aware that email can be misused by others so that it can harm the user's own? This research was conducted to measure the susceptibility of selected targets against email abuse. The objectives of this research are measurement of targets’ susceptibility and find vulnerability in email recipient. There are three steps being taken in this research, (1) the information gathering phase, (2) the design phase, and (3) the execution phase. The first step includes the collection of the information necessary to carry out an attack on a target. The next step is to make the design of an attack against a target. The last step is to send phishing emails to the target. The levels of susceptibility are three: level 1, level 2 and level 3. Level 1 indicates a low level of targets’ susceptibility, level 2 indicates the intermediate level of targets’ susceptibility, and level 3 indicates a high level of targets’ susceptibility. The results showed that users who are on level 1 and level 2 more that level 3, which means the user is not too careless. However, it does not mean the user to be safe. There are still vulnerabilities that may occur, such as automatic location detection when opening emails and automatic downloaded malware as user clicks a link in the email. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=cybercrime" title="cybercrime">cybercrime</a>, <a href="https://publications.waset.org/abstracts/search?q=email%20phishing" title=" email phishing"> email phishing</a>, <a href="https://publications.waset.org/abstracts/search?q=susceptibility" title=" susceptibility"> susceptibility</a>, <a href="https://publications.waset.org/abstracts/search?q=vulnerability" title=" vulnerability"> vulnerability</a> </p> <a href="https://publications.waset.org/abstracts/66869/measurement-of-susceptibility-users-using-email-phishing-attack" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/66869.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">289</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">6200</span> Email Based Global Automation with Raspberry Pi and Control Circuit Module: Development of Smart Home Application</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Lochan%20Basyal">Lochan Basyal</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Global Automation is an emerging technology of today&rsquo;s era and is based on Internet of Things (IoT). Global automation deals with the controlling of electrical appliances throughout the world. The fabrication of this system has been carried out with interfacing an electrical control system module to Raspberry Pi. An electrical control system module includes a relay driver mechanism through which appliances are controlled automatically in respective condition. In this research project, one email ID has been assigned to Raspberry Pi, and the users from different location having different email ID can mail to Raspberry Pi on assigned email address &ldquo;<a href="/cdn-cgi/l/email-protection" class="__cf_email__" data-cfemail="a1d3c0d2d1c3c4d3d3d8d1c8cdcec2c9c0cf9897e1c6ccc0c8cd8fc2cecc">[email&#160;protected]</a>&rdquo; with subject heading &ldquo;Device Control&rdquo; with predefined command on compose email line. Also, a notification regarding current working condition of this system has been updated on respective user email ID. This approach is an innovative way of implementing smart automation system through which a user can control their electrical appliances like light, fan, television, refrigerator, etc. in their home with the use of email facility. The development of this project helps to enhance the concept of smart home application as well as industrial automation. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=control%20circuit" title="control circuit">control circuit</a>, <a href="https://publications.waset.org/abstracts/search?q=e-mail" title=" e-mail"> e-mail</a>, <a href="https://publications.waset.org/abstracts/search?q=global%20automation" title=" global automation"> global automation</a>, <a href="https://publications.waset.org/abstracts/search?q=internet%20of%20things" title=" internet of things"> internet of things</a>, <a href="https://publications.waset.org/abstracts/search?q=IOT" title=" IOT"> IOT</a>, <a href="https://publications.waset.org/abstracts/search?q=Raspberry%20Pi" title=" Raspberry Pi"> Raspberry Pi</a> </p> <a href="https://publications.waset.org/abstracts/95492/email-based-global-automation-with-raspberry-pi-and-control-circuit-module-development-of-smart-home-application" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/95492.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">167</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">6199</span> Enhancing Email Security: A Multi-Layered Defense Strategy Approach and an AI-Powered Model for Identifying and Mitigating Phishing Attacks</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Anastasios%20Papathanasiou">Anastasios Papathanasiou</a>, <a href="https://publications.waset.org/abstracts/search?q=George%20Liontos"> George Liontos</a>, <a href="https://publications.waset.org/abstracts/search?q=Athanasios%20Katsouras"> Athanasios Katsouras</a>, <a href="https://publications.waset.org/abstracts/search?q=Vasiliki%20Liagkou"> Vasiliki Liagkou</a>, <a href="https://publications.waset.org/abstracts/search?q=Euripides%20Glavas"> Euripides Glavas</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Email remains a crucial communication tool due to its efficiency, accessibility and cost-effectiveness, enabling rapid information exchange across global networks. However, the global adoption of email has also made it a prime target for cyber threats, including phishing, malware and Business Email Compromise (BEC) attacks, which exploit its integral role in personal and professional realms in order to perform fraud and data breaches. To combat these threats, this research advocates for a multi-layered defense strategy incorporating advanced technological tools such as anti-spam and anti-malware software, machine learning algorithms and authentication protocols. Moreover, we developed an artificial intelligence model specifically designed to analyze email headers and assess their security status. This AI-driven model examines various components of email headers, such as "From" addresses, ‘Received’ paths and the integrity of SPF, DKIM and DMARC records. Upon analysis, it generates comprehensive reports that indicate whether an email is likely to be malicious or benign. This capability empowers users to identify potentially dangerous emails promptly, enhancing their ability to avoid phishing attacks, malware infections and other cyber threats. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=email%20security" title="email security">email security</a>, <a href="https://publications.waset.org/abstracts/search?q=artificial%20intelligence" title=" artificial intelligence"> artificial intelligence</a>, <a href="https://publications.waset.org/abstracts/search?q=header%20analysis" title=" header analysis"> header analysis</a>, <a href="https://publications.waset.org/abstracts/search?q=threat%20detection" title=" threat detection"> threat detection</a>, <a href="https://publications.waset.org/abstracts/search?q=phishing" title=" phishing"> phishing</a>, <a href="https://publications.waset.org/abstracts/search?q=DMARC" title=" DMARC"> DMARC</a>, <a href="https://publications.waset.org/abstracts/search?q=DKIM" title=" DKIM"> DKIM</a>, <a href="https://publications.waset.org/abstracts/search?q=SPF" title=" SPF"> SPF</a>, <a href="https://publications.waset.org/abstracts/search?q=ai%20model" title=" ai model"> ai model</a> </p> <a href="https://publications.waset.org/abstracts/185525/enhancing-email-security-a-multi-layered-defense-strategy-approach-and-an-ai-powered-model-for-identifying-and-mitigating-phishing-attacks" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/185525.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">59</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">6198</span> An Experimental Study for Assessing Email Classification Attributes Using Feature Selection Methods </h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Issa%20Qabaja">Issa Qabaja</a>, <a href="https://publications.waset.org/abstracts/search?q=Fadi%20Thabtah"> Fadi Thabtah</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Email phishing classification is one of the vital problems in the online security research domain that have attracted several scholars due to its impact on the users payments performed daily online. One aspect to reach a good performance by the detection algorithms in the email phishing problem is to identify the minimal set of features that significantly have an impact on raising the phishing detection rate. This paper investigate three known feature selection methods named Information Gain (IG), Chi-square and Correlation Features Set (CFS) on the email phishing problem to separate high influential features from low influential ones in phishing detection. We measure the degree of influentially by applying four data mining algorithms on a large set of features. We compare the accuracy of these algorithms on the complete features set before feature selection has been applied and after feature selection has been applied. After conducting experiments, the results show 12 common significant features have been chosen among the considered features by the feature selection methods. Further, the average detection accuracy derived by the data mining algorithms on the reduced 12-features set was very slight affected when compared with the one derived from the 47-features set. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=data%20mining" title="data mining">data mining</a>, <a href="https://publications.waset.org/abstracts/search?q=email%20classification" title=" email classification"> email classification</a>, <a href="https://publications.waset.org/abstracts/search?q=phishing" title=" phishing"> phishing</a>, <a href="https://publications.waset.org/abstracts/search?q=online%20security" title=" online security"> online security</a> </p> <a href="https://publications.waset.org/abstracts/19757/an-experimental-study-for-assessing-email-classification-attributes-using-feature-selection-methods" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/19757.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">432</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">6197</span> Investigating (Im)Politeness Strategies in Email Communication: The Case Algerian PhD Supervisees and Irish Supervisors</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Zehor%20Ktitni">Zehor Ktitni</a> </p> <p class="card-text"><strong>Abstract:</strong></p> In pragmatics, politeness is regarded as a feature of paramount importance to successful interpersonal relationships. On the other hand, emails have recently become one of the indispensable means of communication in educational settings. This research puts email communication at the core of the study and analyses it from a politeness perspective. More specifically, it endeavours to look closely at how the concept of (im)politeness is reflected through students’ emails. To this end, a corpus of Algerian supervisees’ email threads, exchanged with their Irish supervisors, was compiled. Leech’s model of politeness (2014) was selected as the main theoretical framework of this study, in addition to making reference to Brown and Levinson’s model (1987) as it is one of the most influential models in the area of pragmatic politeness. Further, some follow-up interviews are to be conducted with Algerian students to reinforce the results derived from the corpus. Initial findings suggest that Algerian Ph.D. students’ emails tend to include more politeness markers than impoliteness ones, they heavily make use of academic titles when addressing their supervisors (Dr. or Prof.), and they rely on hedging devices in order to sound polite. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=politeness" title="politeness">politeness</a>, <a href="https://publications.waset.org/abstracts/search?q=email%20communication" title=" email communication"> email communication</a>, <a href="https://publications.waset.org/abstracts/search?q=corpus%20pragmatics" title=" corpus pragmatics"> corpus pragmatics</a>, <a href="https://publications.waset.org/abstracts/search?q=Algerian%20PhD%20supervisees" title=" Algerian PhD supervisees"> Algerian PhD supervisees</a>, <a href="https://publications.waset.org/abstracts/search?q=Irish%20supervisors" title=" Irish supervisors"> Irish supervisors</a> </p> <a href="https://publications.waset.org/abstracts/176737/investigating-impoliteness-strategies-in-email-communication-the-case-algerian-phd-supervisees-and-irish-supervisors" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/176737.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">70</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">6196</span> R-Killer: An Email-Based Ransomware Protection Tool</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=B.%20Lokuketagoda">B. Lokuketagoda</a>, <a href="https://publications.waset.org/abstracts/search?q=M.%20Weerakoon"> M. Weerakoon</a>, <a href="https://publications.waset.org/abstracts/search?q=U.%20Madushan"> U. Madushan</a>, <a href="https://publications.waset.org/abstracts/search?q=A.%20N.%20Senaratne"> A. N. Senaratne</a>, <a href="https://publications.waset.org/abstracts/search?q=K.%20Y.%20Abeywardena"> K. Y. Abeywardena</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Ransomware has become a common threat in past few years and the recent threat reports show an increase of growth in Ransomware infections. Researchers have identified different variants of Ransomware families since 2015. Lack of knowledge of the user about the threat is a major concern. Ransomware detection methodologies are still growing through the industry. Email is the easiest method to send Ransomware to its victims. Uninformed users tend to click on links and attachments without much consideration assuming the emails are genuine. As a solution to this in this paper R-Killer Ransomware detection tool is introduced. Tool can be integrated with existing email services. The core detection Engine (CDE) discussed in the paper focuses on separating suspicious samples from emails and handling them until a decision is made regarding the suspicious mail. It has the capability of preventing execution of identified ransomware processes. On the other hand, Sandboxing and URL analyzing system has the capability of communication with public threat intelligence services to gather known threat intelligence. The R-Killer has its own mechanism developed in its Proactive Monitoring System (PMS) which can monitor the processes created by downloaded email attachments and identify potential Ransomware activities. R-killer is capable of gathering threat intelligence without exposing the user’s data to public threat intelligence services, hence protecting the confidentiality of user data. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=ransomware" title="ransomware">ransomware</a>, <a href="https://publications.waset.org/abstracts/search?q=deep%20learning" title=" deep learning"> deep learning</a>, <a href="https://publications.waset.org/abstracts/search?q=recurrent%20neural%20networks" title=" recurrent neural networks"> recurrent neural networks</a>, <a href="https://publications.waset.org/abstracts/search?q=email" title=" email"> email</a>, <a href="https://publications.waset.org/abstracts/search?q=core%20detection%20engine" title=" core detection engine"> core detection engine</a> </p> <a href="https://publications.waset.org/abstracts/82679/r-killer-an-email-based-ransomware-protection-tool" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/82679.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">215</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">6195</span> Digital Forensic Exploration Framework for Email and Instant Messaging Applications</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=T.%20Manesh">T. Manesh</a>, <a href="https://publications.waset.org/abstracts/search?q=Abdalla%20A.%20Alameen"> Abdalla A. Alameen</a>, <a href="https://publications.waset.org/abstracts/search?q=M.%20Mohemmed%20Sha"> M. Mohemmed Sha</a>, <a href="https://publications.waset.org/abstracts/search?q=A.%20Mohamed%20Mustaq%20Ahmed"> A. Mohamed Mustaq Ahmed</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Email and instant messaging applications are foremost and extensively used electronic communication methods in this era of information explosion. These applications are generally used for exchange of information using several frontend applications from various service providers by its users. Almost all such communications are now secured using SSL or TLS security over HTTP communication. At the same time, it is also noted that cyber criminals and terrorists have started exchanging information using these methods. Since communication is encrypted end-to-end, tracing significant forensic details and actual content of messages are found to be unattended and severe challenges by available forensic tools. These challenges seriously affect in procuring substantial evidences against such criminals from their working environments. This paper presents a vibrant forensic exploration and architectural framework which not only decrypts any communication or network session but also reconstructs actual message contents of email as well as instant messaging applications. The framework can be effectively used in proxy servers and individual computers and it aims to perform forensic reconstruction followed by analysis of webmail and ICQ messaging applications. This forensic framework exhibits a versatile nature as it is equipped with high speed packet capturing hardware, a well-designed packet manipulating algorithm. It regenerates message contents over regular as well as SSL encrypted SMTP, POP3 and IMAP protocols and catalyzes forensic presentation procedure for prosecution of cyber criminals by producing solid evidences of their actual communication as per court of law of specific countries. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=forensics" title="forensics">forensics</a>, <a href="https://publications.waset.org/abstracts/search?q=network%20sessions" title=" network sessions"> network sessions</a>, <a href="https://publications.waset.org/abstracts/search?q=packet%20reconstruction" title=" packet reconstruction"> packet reconstruction</a>, <a href="https://publications.waset.org/abstracts/search?q=packet%20reordering" title=" packet reordering"> packet reordering</a> </p> <a href="https://publications.waset.org/abstracts/57591/digital-forensic-exploration-framework-for-email-and-instant-messaging-applications" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/57591.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">344</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">6194</span> Local Interpretable Model-agnostic Explanations (LIME) Approach to Email Spam Detection</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Rohini%20Hariharan">Rohini Hariharan</a>, <a href="https://publications.waset.org/abstracts/search?q=Yazhini%20R."> Yazhini R.</a>, <a href="https://publications.waset.org/abstracts/search?q=Blessy%20Maria%20Mathew"> Blessy Maria Mathew</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The task of detecting email spam is a very important one in the era of digital technology that needs effective ways of curbing unwanted messages. This paper presents an approach aimed at making email spam categorization algorithms transparent, reliable and more trustworthy by incorporating Local Interpretable Model-agnostic Explanations (LIME). Our technique assists in providing interpretable explanations for specific classifications of emails to help users understand the decision-making process by the model. In this study, we developed a complete pipeline that incorporates LIME into the spam classification framework and allows creating simplified, interpretable models tailored to individual emails. LIME identifies influential terms, pointing out key elements that drive classification results, thus reducing opacity inherent in conventional machine learning models. Additionally, we suggest a visualization scheme for displaying keywords that will improve understanding of categorization decisions by users. We test our method on a diverse email dataset and compare its performance with various baseline models, such as Gaussian Naive Bayes, Multinomial Naive Bayes, Bernoulli Naive Bayes, Support Vector Classifier, K-Nearest Neighbors, Decision Tree, and Logistic Regression. Our testing results show that our model surpasses all other models, achieving an accuracy of 96.59% and a precision of 99.12%. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=text%20classification" title="text classification">text classification</a>, <a href="https://publications.waset.org/abstracts/search?q=LIME%20%28local%20interpretable%20model-agnostic%20explanations%29" title=" LIME (local interpretable model-agnostic explanations)"> LIME (local interpretable model-agnostic explanations)</a>, <a href="https://publications.waset.org/abstracts/search?q=stemming" title=" stemming"> stemming</a>, <a href="https://publications.waset.org/abstracts/search?q=tokenization" title=" tokenization"> tokenization</a>, <a href="https://publications.waset.org/abstracts/search?q=logistic%20regression." title=" logistic regression."> logistic regression.</a> </p> <a href="https://publications.waset.org/abstracts/184494/local-interpretable-model-agnostic-explanations-lime-approach-to-email-spam-detection" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/184494.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">47</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">6193</span> Phishing Attacks Facilitated by Open Source Intelligence</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Urva%20Maryam">Urva Maryam</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Information has become an important asset to the current cosmos. Globally, various tactics are being observed to confine the spread of information as it makes people vulnerable to security attacks. Open Source Intelligence (OSINT) is a publicly available source that has disseminated information about users or website, companies, and various organizations. This paper focuses on the quantitative method of exploring various OSINT tools that reveal public information of personals. This information could further facilitate the phishing attacks. Phishing attacks can be launched on email addresses, open ports, and unsecured web-surfing. This study allows to analyze information retrieved from OSINT tools i.e., the Harvester, and Maltego, that can be used to send phishing attacks to individuals. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=OSINT" title="OSINT">OSINT</a>, <a href="https://publications.waset.org/abstracts/search?q=phishing" title=" phishing"> phishing</a>, <a href="https://publications.waset.org/abstracts/search?q=spear%20phishing" title=" spear phishing"> spear phishing</a>, <a href="https://publications.waset.org/abstracts/search?q=email%20spoofing" title=" email spoofing"> email spoofing</a>, <a href="https://publications.waset.org/abstracts/search?q=the%20harvester" title=" the harvester"> the harvester</a>, <a href="https://publications.waset.org/abstracts/search?q=maltego" title=" maltego"> maltego</a> </p> <a href="https://publications.waset.org/abstracts/159721/phishing-attacks-facilitated-by-open-source-intelligence" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/159721.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">81</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">6192</span> Insider Theft Detection in Organizations Using Keylogger and Machine Learning</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Shamatha%20Shetty">Shamatha Shetty</a>, <a href="https://publications.waset.org/abstracts/search?q=Sakshi%20Dhabadi"> Sakshi Dhabadi</a>, <a href="https://publications.waset.org/abstracts/search?q=Prerana%20M."> Prerana M.</a>, <a href="https://publications.waset.org/abstracts/search?q=Indushree%20B."> Indushree B.</a> </p> <p class="card-text"><strong>Abstract:</strong></p> About 66% of firms claim that insider attacks are more likely to happen. The frequency of insider incidents has increased by 47% in the last two years. The goal of this work is to prevent dangerous employee behavior by using keyloggers and the Machine Learning (ML) model. Every keystroke that the user enters is recorded by the keylogging program, also known as keystroke logging. Keyloggers are used to stop improper use of the system. This enables us to collect all textual data, save it in a CSV file, and analyze it using an ML algorithm and the VirusTotal API. Many large companies use it to methodically monitor how their employees use computers, the internet, and email. We are utilizing the SVM algorithm and the VirusTotal API to improve overall efficiency and accuracy in identifying specific patterns and words to automate and offer the report for improved monitoring. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=cyber%20security" title="cyber security">cyber security</a>, <a href="https://publications.waset.org/abstracts/search?q=machine%20learning" title=" machine learning"> machine learning</a>, <a href="https://publications.waset.org/abstracts/search?q=cyclic%20process" title=" cyclic process"> cyclic process</a>, <a href="https://publications.waset.org/abstracts/search?q=email%20notification" title=" email notification"> email notification</a> </p> <a href="https://publications.waset.org/abstracts/180246/insider-theft-detection-in-organizations-using-keylogger-and-machine-learning" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/180246.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">57</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">6191</span> Library Outreach After COVID: Making the Case for In-Person Library Visits</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Lucas%20Berrini">Lucas Berrini</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Academic libraries have always struggled with engaging with students and faculty. Striking the balance between what the community needs and what the library can afford has also been a point of contention for libraries. As academia begins to return to a new normal after COVID, library staff are rethinking how remind patrons that the library is open and ready for business. NC Wesleyan, a small liberal arts school in eastern North Carolina, decided to be proactive and reach out to the academic community. After shutting down in 2020 for COVID, the campus library saw a marked decrease in in-person attendance. For a small school whose operational budget was tied directly to tuition payments, it was imperative for the library to remind faculty and staff that they were open for business. At the beginning of the Summer 2022 term and continuing into the fall, the reference team created a marketing plan using email, physical meetings, and virtual events targeted at students and faculty as well as community members who utilized the facilities prior to COVID. The email blasts were gentle reminders that the building was open and available for use The target audiences were the community at large. Several of the emails contained reminders of previous events in the library that were student centered. The next phase of the email campaign centers on reminding the community about the libraries physical and electronic resources, including the makerspace lab. Language will indicate that student voices are needed, and a QR code is included for students to leave feedback as to what they want to see in the library. The final phase of the email blasts were faculty focused and invited them to connect with library reference staff for an in-person consultation on their research needs. While this phase is ongoing, the response has been positive, and staff are compiling data in hopes of working with administration to implement some of the requested services and materials. These email blasts will be followed up by in-person meetings with faculty and students who responded to the QR codes. This research is ongoing. This type of targeted outreach is new for Wesleyan. It is the hope of the library that by the end of Fall 2022, there will be a plan in place to address the needs and concerns of the students and faculty. Furthermore, the staff hopes to create a new sense of community for the students and staff of the university. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=academic" title="academic">academic</a>, <a href="https://publications.waset.org/abstracts/search?q=education" title=" education"> education</a>, <a href="https://publications.waset.org/abstracts/search?q=libraries" title=" libraries"> libraries</a>, <a href="https://publications.waset.org/abstracts/search?q=outreach" title=" outreach"> outreach</a> </p> <a href="https://publications.waset.org/abstracts/151856/library-outreach-after-covid-making-the-case-for-in-person-library-visits" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/151856.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">94</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">6190</span> Metadiscourse in Chinese and Thai Request Emails: Analysis and Pedagogical Application</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Chia-Ling%20Hsieh">Chia-Ling Hsieh</a>, <a href="https://publications.waset.org/abstracts/search?q=Kankanit%20Potikit"> Kankanit Potikit</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Metadiscourse refers to linguistic resources employed by writers to organize text and interact with readers. While metadiscourse has received considerable attention within the field of discourse analysis, few studies have explored the use of metadiscourse in email, one of the most popular forms of computer-mediated communication. Furthermore, the diversity of cross-linguistic research required to uncover the influence of cultural factors on metadiscourse use is lacking. The present study compares metadiscourse markers employed in Chinese and Thai-language request emails with the purpose of discovering cross-cultural similarities and differences that are meaningful and applicable to foreign language teaching. The analysis is based on a corpus of 200 request emails: 100 composed in Chinese and 100 in Thai, with half of the emails from each language data set addressed to professors and the other half addressed to classmates. Adopting Hyland’s model as an analytical framework, two primary categories of metadiscourse are identified. Textual metadiscourse helps to create text coherence, while interpersonal metadiscourse functions to convey authorial stance. Results of the study make clear that both Chinese and Thai-language emails use significantly more interpersonal markers than textual markers, indicating that email, as a unique communicative medium, is characterized by high degrees of concision and interactivity. Users of both languages further deploy similar patterns in writing emails to recipients of different social statuses. Compared with emails addressed to classmates, emails addressed to professors are notably longer and include more transition and engagement markers. Nevertheless, cultural factors do play a role. Emails composed in Thai, for example, include more textual markers than those in Chinese, as Thai favors formal expressions and detailed explanations, while in contrast, emails composed in Chinese employ more interpersonal markers than those in Thai, since Chinese tends to emphasize recipient involvement and attitudinal warmth. These findings thereby demonstrate the combined effects of email as a communicative medium, social status, and cultural values on metadiscourse usage. The study concludes by applying these findings to pedagogical suggestions for teaching email writing to Chinese and Thai language learners based on similarities and differences in metadiscourse strategy between the two languages. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=discourse%20analysis" title="discourse analysis">discourse analysis</a>, <a href="https://publications.waset.org/abstracts/search?q=email" title=" email"> email</a>, <a href="https://publications.waset.org/abstracts/search?q=metadiscourse" title=" metadiscourse"> metadiscourse</a>, <a href="https://publications.waset.org/abstracts/search?q=writing%20instruction" title=" writing instruction"> writing instruction</a> </p> <a href="https://publications.waset.org/abstracts/135790/metadiscourse-in-chinese-and-thai-request-emails-analysis-and-pedagogical-application" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/135790.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">127</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">6189</span> A Scalable Media Job Framework for an Open Source Search Engine</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Pooja%20Mishra">Pooja Mishra</a>, <a href="https://publications.waset.org/abstracts/search?q=Chris%20Pollett"> Chris Pollett</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This paper explores efficient ways to implement various media-updating features like news aggregation, video conversion, and bulk email handling. All of these jobs share the property that they are periodic in nature, and they all benefit from being handled in a distributed fashion. The data for these jobs also often comes from a social or collaborative source. We isolate the class of periodic, one round map reduce jobs as a useful setting to describe and handle media updating tasks. As such tasks are simpler than general map reduce jobs, programming them in a general map reduce platform could easily become tedious. This paper presents a MediaUpdater module of the Yioop Open Source Search Engine Web Portal designed to handle such jobs via an extension of a PHP class. We describe how to implement various media-updating tasks in our system as well as experiments carried out using these implementations on an Amazon Web Services cluster. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=distributed%20jobs%20framework" title="distributed jobs framework">distributed jobs framework</a>, <a href="https://publications.waset.org/abstracts/search?q=news%20aggregation" title=" news aggregation"> news aggregation</a>, <a href="https://publications.waset.org/abstracts/search?q=video%20conversion" title=" video conversion"> video conversion</a>, <a href="https://publications.waset.org/abstracts/search?q=email" title=" email"> email</a> </p> <a href="https://publications.waset.org/abstracts/43880/a-scalable-media-job-framework-for-an-open-source-search-engine" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/43880.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">298</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">6188</span> Email Phishing Detection Using Natural Language Processing and Convolutional Neural Network</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=M.%20Hilani">M. Hilani</a>, <a href="https://publications.waset.org/abstracts/search?q=B.%20Nassih"> B. Nassih</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Phishing is one of the oldest and best known scams on the Internet. It can be defined as any type of telecommunications fraud that uses social engineering tricks to obtain confidential data from its victims. It’s a cybercrime aimed at stealing your sensitive information. Phishing is generally done via private email, so scammers impersonate large companies or other trusted entities to encourage victims to voluntarily provide information such as login credentials or, worse yet, credit card numbers. The COVID-19 theme is used by cybercriminals in multiple malicious campaigns like phishing. In this environment, messaging filtering solutions have become essential to protect devices that will now be used outside of the secure perimeter. Despite constantly updating methods to avoid these cyberattacks, the end result is currently insufficient. Many researchers are looking for optimal solutions to filter phishing emails, but we still need good results. In this work, we concentrated on solving the problem of detecting phishing emails using the different steps of NLP preprocessing, and we proposed and trained a model using one-dimensional CNN. Our study results show that our model obtained an accuracy of 99.99%, which demonstrates how well our model is working. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=phishing" title="phishing">phishing</a>, <a href="https://publications.waset.org/abstracts/search?q=e-mail" title=" e-mail"> e-mail</a>, <a href="https://publications.waset.org/abstracts/search?q=NLP%20preprocessing" title=" NLP preprocessing"> NLP preprocessing</a>, <a href="https://publications.waset.org/abstracts/search?q=CNN" title=" CNN"> CNN</a>, <a href="https://publications.waset.org/abstracts/search?q=e-mail%20filtering" title=" e-mail filtering"> e-mail filtering</a> </p> <a href="https://publications.waset.org/abstracts/157571/email-phishing-detection-using-natural-language-processing-and-convolutional-neural-network" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/157571.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">126</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">6187</span> A Discourse Completion Test Analysis of Email Request Strategies as Used by Tunisian Postgraduate Students</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Imen%20Aribi%20Ben%20Amor">Imen Aribi Ben Amor</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The aim of the present study is to analyze the performance of requests in emails among a group of Tunisian postgraduate students. It also seeks to determine the influence of the social factors on the participants’ requests performance. For this purpose, the data were collected using a discourse completion test (DCT). Accordingly, 42 Tunisian postgraduate students were asked to respond in English to eight different situations in which they carried out the speech act of request in emails. The data were analyzed based on the degree of directness. A detailed analysis of the head acts found in the DCT revealed that Tunisian Postgraduate students use a varied repertoire of request strategies (direct, conventionally indirect and non-conventionally indirect) but at the same time rely heavily on direct request strategies. They tended to address their requestees directly except for distant superiors. DCT results suggest that the participants are to some extent aware of the influence of the ranking of imposition and social distance but fail to acknowledge the weight of social power when performing requests in emails. The preference of the participants to use direct strategies may be the result of the effect of Tunisian culture and the negative transfer of Tunisian communicative strategies. Accordingly, this study suggests some pedagogical implications and suggestions for Tunisian EFL (English as a Foreign Language) instructors. They are required to pay closer attention to the pragmalinguistic nuances of the ways in which requests in emails are realized. Teachers can also help students understand academic email etiquettes by explicitly explaining what they expect in the student email. Thus, EFL teachers and syllabus designers should devote more attention to developing EFL learners’ pragmatic competence through teaching L2 pragmatics. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=directness" title="directness">directness</a>, <a href="https://publications.waset.org/abstracts/search?q=ranking%20of%20imposition" title=" ranking of imposition"> ranking of imposition</a>, <a href="https://publications.waset.org/abstracts/search?q=request%20strategies" title=" request strategies"> request strategies</a>, <a href="https://publications.waset.org/abstracts/search?q=social%20distance" title=" social distance"> social distance</a>, <a href="https://publications.waset.org/abstracts/search?q=social%20power" title=" social power"> social power</a> </p> <a href="https://publications.waset.org/abstracts/72047/a-discourse-completion-test-analysis-of-email-request-strategies-as-used-by-tunisian-postgraduate-students" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/72047.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">231</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">6186</span> A Study of the Weld Properties of Inconel 625 Based on Nb Content</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=JongWon%20Han">JongWon Han</a>, <a href="https://publications.waset.org/abstracts/search?q=NoHoon%20Kim"> NoHoon Kim</a>, <a href="https://publications.waset.org/abstracts/search?q=HyoIk%20Ahn"> HyoIk Ahn</a>, <a href="https://publications.waset.org/abstracts/search?q=HaeWoo%20Lee"> HaeWoo Lee</a> </p> <p class="card-text"><strong>Abstract:</strong></p> In this study, shielded metal arc welding was performed as a function of Nb content at 2.24 wt%, 3.25 wt%, and 4.26 wt%. The microstructure was observed using scanning electron microscopy/energy dispersive X-ray spectroscopy (SEM/EDS) and showed the development of a columnar dendrite structure in the specimen having the least Nb content. From the hardness test, the hardness value was confirmed to reduce with decreasing Nb content. From electron backscatter diffraction (EBSD) analysis, the largest grain size was found in the specimen with Nb content of 2.24 wt%. The potentiodynamic polarization test was carried out to determine the pitting corrosion resistance; there was no significant difference in the pitting corrosion resistance with increasing Nb content. To evaluate the degree of sensitization to intergranular corrosion, the Double Loop Electrochemical Potentiodynamic Reactivation(DL-EPR test) was conducted. A similar degree of sensitization was found in two specimens except with a Nb content of 2.24 wt%, while a relatively high degree of sensitization was found in the specimen with a Nb content of 2.24 wt%. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=inconel%20625" title="inconel 625">inconel 625</a>, <a href="https://publications.waset.org/abstracts/search?q=Nb%20content" title=" Nb content"> Nb content</a>, <a href="https://publications.waset.org/abstracts/search?q=potentiodynamic%20test" title=" potentiodynamic test"> potentiodynamic test</a>, <a href="https://publications.waset.org/abstracts/search?q=DL-EPR%20test" title=" DL-EPR test"> DL-EPR test</a> </p> <a href="https://publications.waset.org/abstracts/85849/a-study-of-the-weld-properties-of-inconel-625-based-on-nb-content" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/85849.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">308</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">6185</span> A Blockchain-Based Protection Strategy against Social Network Phishing</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Francesco%20Buccafurri">Francesco Buccafurri</a>, <a href="https://publications.waset.org/abstracts/search?q=Celeste%20Romolo"> Celeste Romolo</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Nowadays phishing is the most frequent starting point of cyber-attack vectors. Phishing is implemented both via email and social network messages. While a wide scientific literature exists which addresses the problem of contrasting email spam-phishing, no specific countermeasure has been so far proposed for phishing included into private messages of social network platforms. Unfortunately, the problem is severe. This paper proposes an approach against social network phishing, based on a non invasive collaborative information-sharing approach which leverages blockchain. The detection method works by filtering candidate messages, by distilling them by means of a distance-preserving hash function, and by publishing hashes over a public blockchain through a trusted smart contract (thus avoiding denial of service attacks). Phishing detection exploits social information embedded into social network profiles to identify similar messages belonging to disjoint contexts. The main contribution of the paper is to introduce a new approach to contrasting the problem of social network phishing, which, despite its severity, received little attention by both research and industry. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=phishing" title="phishing">phishing</a>, <a href="https://publications.waset.org/abstracts/search?q=social%20networks" title=" social networks"> social networks</a>, <a href="https://publications.waset.org/abstracts/search?q=information%20sharing" title=" information sharing"> information sharing</a>, <a href="https://publications.waset.org/abstracts/search?q=blockchain" title=" blockchain"> blockchain</a> </p> <a href="https://publications.waset.org/abstracts/90849/a-blockchain-based-protection-strategy-against-social-network-phishing" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/90849.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">328</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">6184</span> Sentiment Analysis of Ensemble-Based Classifiers for E-Mail Data</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Muthukumarasamy%20Govindarajan">Muthukumarasamy Govindarajan</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Detection of unwanted, unsolicited mails called spam from email is an interesting area of research. It is necessary to evaluate the performance of any new spam classifier using standard data sets. Recently, ensemble-based classifiers have gained popularity in this domain. In this research work, an efficient email filtering approach based on ensemble methods is addressed for developing an accurate and sensitive spam classifier. The proposed approach employs Naive Bayes (NB), Support Vector Machine (SVM) and Genetic Algorithm (GA) as base classifiers along with different ensemble methods. The experimental results show that the ensemble classifier was performing with accuracy greater than individual classifiers, and also hybrid model results are found to be better than the combined models for the e-mail dataset. The proposed ensemble-based classifiers turn out to be good in terms of classification accuracy, which is considered to be an important criterion for building a robust spam classifier. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=accuracy" title="accuracy">accuracy</a>, <a href="https://publications.waset.org/abstracts/search?q=arcing" title=" arcing"> arcing</a>, <a href="https://publications.waset.org/abstracts/search?q=bagging" title=" bagging"> bagging</a>, <a href="https://publications.waset.org/abstracts/search?q=genetic%20algorithm" title=" genetic algorithm"> genetic algorithm</a>, <a href="https://publications.waset.org/abstracts/search?q=Naive%20Bayes" title=" Naive Bayes"> Naive Bayes</a>, <a href="https://publications.waset.org/abstracts/search?q=sentiment%20mining" title=" sentiment mining"> sentiment mining</a>, <a href="https://publications.waset.org/abstracts/search?q=support%20vector%20machine" title=" support vector machine"> support vector machine</a> </p> <a href="https://publications.waset.org/abstracts/112240/sentiment-analysis-of-ensemble-based-classifiers-for-e-mail-data" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/112240.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">142</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">6183</span> Impact of Social Media on Content of Saudi Television News Networks</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Majed%20Alshaibani">Majed Alshaibani</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Social media has emerged as a serious contender to TV news networks in Saudi Arabia. The growing usage of social media as a source of news and information has led to significant impact on the content presented by the news networks in Saudi Arabia. This study explored the various ways in which social media has influenced content aired on Saudi news networks. Data were collected by using semi structured interviews with 13 journalists and content editors working for four Saudi TV news networks and six senior academic experts on TV and media teaching in Saudi universities. The findings of the study revealed that social media has affected four aspects of the content on Saudi TV news networks. As a result the content aired on Saudi news networks is more neutral, real time, diverse in terms of sources and includes content on broader subjects and from different parts of the world. This research concludes that social media has contributed positively and significantly to improving the content on Saudi TV news networks. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=TV%20news%20networks" title="TV news networks">TV news networks</a>, <a href="https://publications.waset.org/abstracts/search?q=Saudi%20Arabia" title=" Saudi Arabia"> Saudi Arabia</a>, <a href="https://publications.waset.org/abstracts/search?q=social%20media" title=" social media"> social media</a>, <a href="https://publications.waset.org/abstracts/search?q=media%20content" title=" media content"> media content</a> </p> <a href="https://publications.waset.org/abstracts/125622/impact-of-social-media-on-content-of-saudi-television-news-networks" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/125622.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">237</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">6182</span> A Phishing Email Detection Approach Using Machine Learning Techniques</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Kenneth%20Fon%20Mbah">Kenneth Fon Mbah</a>, <a href="https://publications.waset.org/abstracts/search?q=Arash%20Habibi%20Lashkari"> Arash Habibi Lashkari</a>, <a href="https://publications.waset.org/abstracts/search?q=Ali%20A.%20Ghorbani"> Ali A. Ghorbani</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Phishing e-mails are a security issue that not only annoys online users, but has also resulted in significant financial losses for businesses. Phishing advertisements and pornographic e-mails are difficult to detect as attackers have been becoming increasingly intelligent and professional. Attackers track users and adjust their attacks based on users’ attractions and hot topics that can be extracted from community news and journals. This research focuses on deceptive Phishing attacks and their variants such as attacks through advertisements and pornographic e-mails. We propose a framework called Phishing Alerting System (PHAS) to accurately classify e-mails as Phishing, advertisements or as pornographic. PHAS has the ability to detect and alert users for all types of deceptive e-mails to help users in decision making. A well-known email dataset has been used for these experiments and based on previously extracted features, 93.11% detection accuracy is obtainable by using J48 and KNN machine learning techniques. Our proposed framework achieved approximately the same accuracy as the benchmark while using this dataset. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=phishing%20e-mail" title="phishing e-mail">phishing e-mail</a>, <a href="https://publications.waset.org/abstracts/search?q=phishing%20detection" title=" phishing detection"> phishing detection</a>, <a href="https://publications.waset.org/abstracts/search?q=anti%20phishing" title=" anti phishing"> anti phishing</a>, <a href="https://publications.waset.org/abstracts/search?q=alarm%20system" title=" alarm system"> alarm system</a>, <a href="https://publications.waset.org/abstracts/search?q=machine%20learning" title=" machine learning"> machine learning</a> </p> <a href="https://publications.waset.org/abstracts/61290/a-phishing-email-detection-approach-using-machine-learning-techniques" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/61290.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">341</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">6181</span> Open Source Knowledge Management Approach to Manage and Disseminate Distributed Content in a Global Enterprise</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Rahul%20Thakur">Rahul Thakur</a>, <a href="https://publications.waset.org/abstracts/search?q=Onkar%20Chandel"> Onkar Chandel</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Red Hat is the world leader in providing open source software and solutions. A global enterprise, like Red Hat, has unique issues of connecting employees with content because of distributed offices, multiple teams spread across geographies, multiple languages, and different cultures. Employees, of a global company, create content that is distributed across departments, teams, regions, and countries. This makes finding the best content difficult since owners keep iterating on the existing content. When employees are unable to find the content, they end up creating it once again and in the process duplicating existing material and effort. Also, employees may not find the relevant content and spend time reviewing obsolete duplicate, or irrelevant content. On an average, a person spends 15 minutes/day in failed searches that might result in missed business opportunities, employee frustration, and substandard deliverables. Red Hat Knowledge Management Office (KMO) applied 'open source strategy' to solve the above problems. Under the Open Source Strategy, decisions are taken collectively. The strategy aims at accomplishing common goals with the help of communities. The objectives of this initiative were to save employees' time, get them authentic content, improve their content search experience, avoid duplicate content creation, provide context based search, improve analytics, improve content management workflows, automate content classification, and automate content upload. This session will describe open source strategy, its applicability in content management, challenges, recommended solutions, and outcome. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=content%20classification" title="content classification">content classification</a>, <a href="https://publications.waset.org/abstracts/search?q=content%20management" title=" content management"> content management</a>, <a href="https://publications.waset.org/abstracts/search?q=knowledge%20management" title=" knowledge management"> knowledge management</a>, <a href="https://publications.waset.org/abstracts/search?q=open%20source" title=" open source"> open source</a> </p> <a href="https://publications.waset.org/abstracts/85051/open-source-knowledge-management-approach-to-manage-and-disseminate-distributed-content-in-a-global-enterprise" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/85051.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">210</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">6180</span> Mailchimp AI Application For Marketing Employees</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Alia%20El%20Akhrass">Alia El Akhrass</a>, <a href="https://publications.waset.org/abstracts/search?q=Raheed%20Al%20Jifri"> Raheed Al Jifri</a>, <a href="https://publications.waset.org/abstracts/search?q=Sara%20Babalghoum"> Sara Babalghoum</a>, <a href="https://publications.waset.org/abstracts/search?q=Jana%20Bushnag"> Jana Bushnag</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This project delves into exploring the functionalities of Mailchimp, an artificial intelligence application. The objective is to comprehend its operations through the AI tools it offers. To achieve this, a survey was conducted among peers, seeking insights into Mailchimp's functionality, accessibility, efficiency, and overall benefits. The survey aimed to gather valuable feedback for analysis. Subsequently, a thorough analysis of the collected data was performed to identify trends, patterns, and areas of improvement. Visual representations were then crafted to effectively summarize the findings, aiding in conveying the research outcomes clearly. Founded in 2001, Mailchimp initially provided email marketing services but has since expanded into a comprehensive marketing platform. Its focus on simplicity and accessibility has contributed to its success among businesses of all sizes. Alternative platforms such as Constant Contact, AWeber, and GetResponse offer similar services with their own unique strengths. Mailchimp's journey exemplifies the importance of vision and adaptability in the ever-evolving digital marketing landscape. By prioritizing innovation, user-centricity, and customer service, Mailchimp has established itself as a trusted partner in the field of digital marketing, enabling businesses to effectively connect with their customers and achieve their marketing goals. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=email%20marketing" title="email marketing">email marketing</a>, <a href="https://publications.waset.org/abstracts/search?q=ai%20tool" title=" ai tool"> ai tool</a>, <a href="https://publications.waset.org/abstracts/search?q=connect" title=" connect"> connect</a>, <a href="https://publications.waset.org/abstracts/search?q=communicate" title=" communicate"> communicate</a>, <a href="https://publications.waset.org/abstracts/search?q=generate" title=" generate"> generate</a> </p> <a href="https://publications.waset.org/abstracts/186337/mailchimp-ai-application-for-marketing-employees" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/186337.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">41</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">6179</span> Eucalyptus camendulensis and Its Drying Effect on Water and Essential Oil Content</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Mehani%20Mouna">Mehani Mouna</a>, <a href="https://publications.waset.org/abstracts/search?q=Segni%20Ladjel"> Segni Ladjel</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Medicinal and aromatic plants are promising and are characterized by the biosynthesis of odorous molecules that make up the so-called essential oils (EO), which have long been known for their antiseptic and therapeutic activity in folk medicine. The objective of this study was to evaluate the influence of drying in the shade on the water content and on the content of essential oils extracted from leaves of Eucalyptus camendulensis for better quality control of medicinal and aromatic plants. The water content of the Eucalyptus camendulensis plant material decreases during the drying process. It increased from 100 % to 0.006 % for the drying in the shade after ten days. The moisture content is practically constant at the end of the drying period. The drying in the shade increases the concentration of essential oils of Eucalyptus camendulensis. When the leaves of Eucalyptus camendulensis plant are in the shade, the maximum of the essential oil content was obtained on the eighth days; the recorded value was 1.43% ± 0.01%. Beyond these periods, the content continuously drops in before stabilizing. The optimum drying time is between 6 and 9 days. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=Eucalyptus%20camendulensis" title="Eucalyptus camendulensis">Eucalyptus camendulensis</a>, <a href="https://publications.waset.org/abstracts/search?q=drying" title=" drying"> drying</a>, <a href="https://publications.waset.org/abstracts/search?q=essential%20oils" title=" essential oils"> essential oils</a>, <a href="https://publications.waset.org/abstracts/search?q=water" title=" water"> water</a>, <a href="https://publications.waset.org/abstracts/search?q=content" title=" content"> content</a> </p> <a href="https://publications.waset.org/abstracts/36039/eucalyptus-camendulensis-and-its-drying-effect-on-water-and-essential-oil-content" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/36039.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">357</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">6178</span> Teaching Science Content Area Literacy to 21st Century Learners</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Melissa%20C.%20Ingram">Melissa C. Ingram</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The use of new literacies within science classrooms needs to be balanced by teachers to both teach different forms of communication while assessing content area proficiency. Using new literacies such as Twitter and Facebook needs to be incorporated into science content area literacy studies in addition to continuing to use generally-accepted forms of scientific content area presentation, which include scientific papers and textbooks. The research question this literature review seeks to answer is “What are some ways in which new forms of literacy are better suited to teach scientific content area literacy to 21st Century learners?” The research question is addressed through a literature review that highlights methods currently being used to educate the next wave of learners in the world of science content area literacy. Both temporal discourse analysis (TDA) and critical discourse analysis (CDA) were used to determine the need to use new literacies to teach science content area literacy. Increased use of digital technologies and a change in science content area pedagogy were explored. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=science%20content%20area%20literacy" title="science content area literacy">science content area literacy</a>, <a href="https://publications.waset.org/abstracts/search?q=new%20literacies" title=" new literacies"> new literacies</a>, <a href="https://publications.waset.org/abstracts/search?q=critical%20discourse%20analysis" title=" critical discourse analysis"> critical discourse analysis</a>, <a href="https://publications.waset.org/abstracts/search?q=temporal%20discourse%20analysis" title=" temporal discourse analysis"> temporal discourse analysis</a> </p> <a href="https://publications.waset.org/abstracts/140690/teaching-science-content-area-literacy-to-21st-century-learners" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/140690.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">222</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">6177</span> Examining Social Connectivity through Email Network Analysis: Study of Librarians&#039; Emailing Groups in Pakistan</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Muhammad%20Arif%20Khan">Muhammad Arif Khan</a>, <a href="https://publications.waset.org/abstracts/search?q=Haroon%20Idrees"> Haroon Idrees</a>, <a href="https://publications.waset.org/abstracts/search?q=Imran%20Aziz"> Imran Aziz</a>, <a href="https://publications.waset.org/abstracts/search?q=Sidra%20Mushtaq"> Sidra Mushtaq</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Social platforms like online discussion and mailing groups are well aligned with academic as well as professional learning spaces. Professional communities are increasingly moving to online forums for sharing and capturing the intellectual abilities. This study investigated dynamics of social connectivity of yahoo mailing groups of Pakistani Library and Information Science (LIS) professionals using Graph Theory technique. Design/Methodology: Social Network Analysis is the increasingly concerned domain for scientists in identifying whether people grow together through online social interaction or, whether they just reflect connectivity. We have conducted a longitudinal study using Network Graph Theory technique to analyze the large data-set of email communication. The data was collected from three yahoo mailing groups using network analysis software over a period of six months i.e. January to June 2016. Findings of the network analysis were reviewed through focus group discussion with LIS experts and selected respondents of the study. Data were analyzed in Microsoft Excel and network diagrams were visualized using NodeXL and ORA-Net Scene package. Findings: Findings demonstrate that professionals and students exhibit intellectual growth the more they get tied within a network by interacting and participating in communication through online forums. The study reports on dynamics of the large network by visualizing the email correspondence among group members in a network consisting vertices (members) and edges (randomized correspondence). The model pair wise relationship between group members was illustrated to show characteristics, reasons, and strength of ties. Connectivity of nodes illustrated the frequency of communication among group members through examining node coupling, diffusion of networks, and node clustering has been demonstrated in-depth. Network analysis was found to be a useful technique in investigating the dynamics of the large network. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=emailing%20networks" title="emailing networks">emailing networks</a>, <a href="https://publications.waset.org/abstracts/search?q=network%20graph%20theory" title=" network graph theory"> network graph theory</a>, <a href="https://publications.waset.org/abstracts/search?q=online%20social%20platforms" title=" online social platforms"> online social platforms</a>, <a href="https://publications.waset.org/abstracts/search?q=yahoo%20mailing%20groups" title=" yahoo mailing groups"> yahoo mailing groups</a> </p> <a href="https://publications.waset.org/abstracts/60149/examining-social-connectivity-through-email-network-analysis-study-of-librarians-emailing-groups-in-pakistan" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/60149.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">239</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">6176</span> The Impact of Content Familiarity of Receptive Skills on Language Learning</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Sara%20Fallahi">Sara Fallahi</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This paper reviews the importance of content familiarity of receptive skills and offers solutions to the issue of content unfamiliarity in language learning materials. Presently, language learning materials are mainly comprised of global issues and target language speakers’ culture(s) in receptive skills. This might leadlearners to focus on content rather than the language. As a solution, materials on receptive skills can be developed with a focus on learners’culture and social concerns, especially in the beginner levels of learning. Language learners often learn their target language through the receptive skills of listening and reading before language production ensues through speaking and writing. Students’ journey from receptive skills to productive skills is mainly concentrated on by teachers. There are barriers to language learning, such as time and energy, that can hinder learners’ understanding and ability to build the required background knowledge of the content. This is generated due to learners’ unfamiliarity with the skill’s content. Therefore, materials that improve content familiarity will help learners improve their language comprehension, learning, and usage. This presentation will conclude with practical solutions to help teachers and learners more authentically integrate language and culture to elevate language learning. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=language%20learning" title="language learning">language learning</a>, <a href="https://publications.waset.org/abstracts/search?q=listening%20content" title=" listening content"> listening content</a>, <a href="https://publications.waset.org/abstracts/search?q=reading%20content" title=" reading content"> reading content</a>, <a href="https://publications.waset.org/abstracts/search?q=content%20familiarity" title=" content familiarity"> content familiarity</a>, <a href="https://publications.waset.org/abstracts/search?q=ESL%20books" title=" ESL books"> ESL books</a>, <a href="https://publications.waset.org/abstracts/search?q=language%20learning%20books" title=" language learning books"> language learning books</a>, <a href="https://publications.waset.org/abstracts/search?q=cultural%20familiarity" title=" cultural familiarity"> cultural familiarity</a> </p> <a href="https://publications.waset.org/abstracts/149934/the-impact-of-content-familiarity-of-receptive-skills-on-language-learning" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/149934.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">118</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">6175</span> Characterization of Biodiesel Produced from Cow-Tallow</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Nwadike%20Emmanuel%20Chinagoron">Nwadike Emmanuel Chinagoron</a>, <a href="https://publications.waset.org/abstracts/search?q=Achebe%20Chukwunonso"> Achebe Chukwunonso</a>, <a href="https://publications.waset.org/abstracts/search?q=Ezeliora%20Chukwuemeka%20Daniel"> Ezeliora Chukwuemeka Daniel</a>, <a href="https://publications.waset.org/abstracts/search?q=Azaka%20Onyemazuwa%20Andrew"> Azaka Onyemazuwa Andrew</a> </p> <p class="card-text"><strong>Abstract:</strong></p> In this research work, the process of biodiesel production in a pilot plant was studied using cow tallow as raw material, methanol as the solvent and potassium hydroxide as catalysts. The biodiesel quality was determined by characterization. The tallow used in the production had a molecular weight of 860g. Its oil had a density value of 0.8g/ml, iodine value of 63.45, viscosity at 300C was 9.83pas, acid value was 1.96, free fatty acid (FFA) of 0.98%, saponification value of 82.75mleq/kg, specific gravity of 0.898, flash point of 1100C, cloud point of 950C and Calorific value also called Higher Heating Value (HHV) of 38.365MJ/Kg. The produced biodiesel had a density of 0.82g/ml, iodine value of 126.9, viscosity of 4.32pas at 300C, acid value of 0.561, FFA of 0.2805%, saponification value of 137.45 mleq/kg.Flash point, cloud point and centane number of the biodiesel produced are 1390C, 980C and 57.5 respectively, with fat content, protein content, ash content, moisture content, fiber content and carbohydrate content values of 10%, 2.8%, 5%, 5%, 20%, and 37.2% respectively. The biodiesel higher heating values (calorific values) when estimated from viscosity, density and flash points were 41.4MJ/Kg, 63.8MJ/Kg, and 34.6MJ/Kg respectively. The biodiesel was blended with conventional diesel. The blend B-10 had values of 1320C and 960C for flash and cloud points, with Calorific value (or HHV) of 34.6 MJ/Kg (when estimated from its Flash point) and fat content, protein content, ash content, moisture content, fiber content and carbohydrate content values of 5%, 2.1%,10%, 5%, 15%, and 62.9% respectively. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=biodiesel" title="biodiesel">biodiesel</a>, <a href="https://publications.waset.org/abstracts/search?q=characterization" title=" characterization"> characterization</a>, <a href="https://publications.waset.org/abstracts/search?q=cow-tallow" title=" cow-tallow"> cow-tallow</a>, <a href="https://publications.waset.org/abstracts/search?q=cetane%20rating" title=" cetane rating"> cetane rating</a> </p> <a href="https://publications.waset.org/abstracts/20149/characterization-of-biodiesel-produced-from-cow-tallow" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/20149.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">537</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">6174</span> Impact of Foliar Application of Zinc on Micro and Macro Elements Distribution in Phyllanthus amarus</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Nguyen%20Cao%20Nguyen">Nguyen Cao Nguyen</a>, <a href="https://publications.waset.org/abstracts/search?q=Krasimir%20I.%20Ivanov"> Krasimir I. Ivanov</a>, <a href="https://publications.waset.org/abstracts/search?q=Penka%20S.%20Zapryanova"> Penka S. Zapryanova</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The present study was carried out to investigate the interaction of foliar applied zinc with other elements in<em> Phyllanthus amarus </em>plants. The plant samples for our experiment were collected from Lam Dong province, Vietnam. Seven suspension solutions of nanosized zinc hydroxide nitrate (Zn<sub>5</sub>(OH)<sub>8</sub>(NO<sub>3</sub>)<sub>2</sub>&middot;2H<sub>2</sub>O) with different Zn concentration were used. Fertilization and irrigation were the same for all variants. The Zn content and the content of selected micro (Cu, Fe, Mn) and macro (Ca, Mg, P and K) nutrients in plant roots, and stems and leaves were determined. It was concluded that the zinc content of plant roots varies narrowly, with no significant impact of ZnHN fertilization. The same trend can be seen in the content of Cu, Mn, and macronutrients. The zinc content of plant stems and leaves varies within wide limits, with the significant impact of ZnHN fertilization. The trends in the content of Cu, Mn, and macronutrients are kept the same as in the root, whereas the iron trends to increase its content at increasing the zinc content. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=Phyllanthus%20amarus" title="Phyllanthus amarus">Phyllanthus amarus</a>, <a href="https://publications.waset.org/abstracts/search?q=Zinc" title=" Zinc"> Zinc</a>, <a href="https://publications.waset.org/abstracts/search?q=Micro%20and%20macro%20elements" title=" Micro and macro elements"> Micro and macro elements</a>, <a href="https://publications.waset.org/abstracts/search?q=foliar%20fertilizer" title=" foliar fertilizer"> foliar fertilizer</a> </p> <a href="https://publications.waset.org/abstracts/106560/impact-of-foliar-application-of-zinc-on-micro-and-macro-elements-distribution-in-phyllanthus-amarus" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/106560.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">151</span> </span> </div> </div> <ul class="pagination"> <li class="page-item disabled"><span class="page-link">&lsaquo;</span></li> <li class="page-item active"><span class="page-link">1</span></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=email%20content&amp;page=2">2</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=email%20content&amp;page=3">3</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=email%20content&amp;page=4">4</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=email%20content&amp;page=5">5</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=email%20content&amp;page=6">6</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=email%20content&amp;page=7">7</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=email%20content&amp;page=8">8</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=email%20content&amp;page=9">9</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=email%20content&amp;page=10">10</a></li> <li class="page-item disabled"><span class="page-link">...</span></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=email%20content&amp;page=206">206</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=email%20content&amp;page=207">207</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=email%20content&amp;page=2" rel="next">&rsaquo;</a></li> </ul> </div> </main> <footer> <div id="infolinks" class="pt-3 pb-2"> <div class="container"> <div style="background-color:#f5f5f5;" class="p-3"> <div class="row"> <div class="col-md-2"> <ul class="list-unstyled"> About <li><a href="https://waset.org/page/support">About Us</a></li> <li><a href="https://waset.org/page/support#legal-information">Legal</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/WASET-16th-foundational-anniversary.pdf">WASET celebrates its 16th foundational anniversary</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Account <li><a href="https://waset.org/profile">My Account</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Explore <li><a href="https://waset.org/disciplines">Disciplines</a></li> <li><a href="https://waset.org/conferences">Conferences</a></li> <li><a href="https://waset.org/conference-programs">Conference Program</a></li> <li><a href="https://waset.org/committees">Committees</a></li> <li><a href="https://publications.waset.org">Publications</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Research <li><a href="https://publications.waset.org/abstracts">Abstracts</a></li> <li><a href="https://publications.waset.org">Periodicals</a></li> <li><a href="https://publications.waset.org/archive">Archive</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Open Science <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Science-Philosophy.pdf">Open Science Philosophy</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Science-Award.pdf">Open Science Award</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Society-Open-Science-and-Open-Innovation.pdf">Open Innovation</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Postdoctoral-Fellowship-Award.pdf">Postdoctoral Fellowship Award</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Scholarly-Research-Review.pdf">Scholarly Research Review</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Support <li><a href="https://waset.org/page/support">Support</a></li> <li><a href="https://waset.org/profile/messages/create">Contact Us</a></li> <li><a href="https://waset.org/profile/messages/create">Report Abuse</a></li> </ul> </div> </div> </div> </div> </div> <div class="container text-center"> <hr style="margin-top:0;margin-bottom:.3rem;"> <a href="https://creativecommons.org/licenses/by/4.0/" target="_blank" class="text-muted small">Creative Commons Attribution 4.0 International License</a> <div id="copy" class="mt-2">&copy; 2024 World Academy of Science, Engineering and Technology</div> </div> </footer> <a href="javascript:" id="return-to-top"><i class="fas fa-arrow-up"></i></a> <div class="modal" id="modal-template"> <div class="modal-dialog"> <div class="modal-content"> <div class="row m-0 mt-1"> <div class="col-md-12"> <button type="button" class="close" data-dismiss="modal" aria-label="Close"><span aria-hidden="true">&times;</span></button> </div> </div> <div class="modal-body"></div> </div> </div> </div> <script data-cfasync="false" src="/cdn-cgi/scripts/5c5dd728/cloudflare-static/email-decode.min.js"></script><script src="https://cdn.waset.org/static/plugins/jquery-3.3.1.min.js"></script> <script src="https://cdn.waset.org/static/plugins/bootstrap-4.2.1/js/bootstrap.bundle.min.js"></script> <script src="https://cdn.waset.org/static/js/site.js?v=150220211556"></script> <script> jQuery(document).ready(function() { /*jQuery.get("https://publications.waset.org/xhr/user-menu", function (response) { jQuery('#mainNavMenu').append(response); });*/ jQuery.get({ url: "https://publications.waset.org/xhr/user-menu", cache: false }).then(function(response){ jQuery('#mainNavMenu').append(response); }); }); </script> </body> </html>

Pages: 1 2 3 4 5 6 7 8 9 10