CINXE.COM

Search results for: anonymous

<!DOCTYPE html> <html lang="en" dir="ltr"> <head> <!-- Google tag (gtag.js) --> <script async src="https://www.googletagmanager.com/gtag/js?id=G-P63WKM1TM1"></script> <script> window.dataLayer = window.dataLayer || []; function gtag(){dataLayer.push(arguments);} gtag('js', new Date()); gtag('config', 'G-P63WKM1TM1'); </script> <!-- Yandex.Metrika counter --> <script type="text/javascript" > (function(m,e,t,r,i,k,a){m[i]=m[i]||function(){(m[i].a=m[i].a||[]).push(arguments)}; m[i].l=1*new Date(); for (var j = 0; j < document.scripts.length; j++) {if (document.scripts[j].src === r) { return; }} k=e.createElement(t),a=e.getElementsByTagName(t)[0],k.async=1,k.src=r,a.parentNode.insertBefore(k,a)}) (window, document, "script", "https://mc.yandex.ru/metrika/tag.js", "ym"); ym(55165297, "init", { clickmap:false, trackLinks:true, accurateTrackBounce:true, webvisor:false }); </script> <noscript><div><img src="https://mc.yandex.ru/watch/55165297" style="position:absolute; left:-9999px;" alt="" /></div></noscript> <!-- /Yandex.Metrika counter --> <!-- Matomo --> <!-- End Matomo Code --> <title>Search results for: anonymous</title> <meta name="description" content="Search results for: anonymous"> <meta name="keywords" content="anonymous"> <meta name="viewport" content="width=device-width, initial-scale=1, minimum-scale=1, maximum-scale=1, user-scalable=no"> <meta charset="utf-8"> <link href="https://cdn.waset.org/favicon.ico" type="image/x-icon" rel="shortcut icon"> <link href="https://cdn.waset.org/static/plugins/bootstrap-4.2.1/css/bootstrap.min.css" rel="stylesheet"> <link href="https://cdn.waset.org/static/plugins/fontawesome/css/all.min.css" rel="stylesheet"> <link href="https://cdn.waset.org/static/css/site.css?v=150220211555" rel="stylesheet"> </head> <body> <header> <div class="container"> <nav class="navbar navbar-expand-lg navbar-light"> <a class="navbar-brand" href="https://waset.org"> <img src="https://cdn.waset.org/static/images/wasetc.png" alt="Open Science Research Excellence" title="Open Science Research Excellence" /> </a> <button class="d-block d-lg-none navbar-toggler ml-auto" type="button" data-toggle="collapse" data-target="#navbarMenu" aria-controls="navbarMenu" aria-expanded="false" aria-label="Toggle navigation"> <span class="navbar-toggler-icon"></span> </button> <div class="w-100"> <div class="d-none d-lg-flex flex-row-reverse"> <form method="get" action="https://waset.org/search" class="form-inline my-2 my-lg-0"> <input class="form-control mr-sm-2" type="search" placeholder="Search Conferences" value="anonymous" name="q" aria-label="Search"> <button class="btn btn-light my-2 my-sm-0" type="submit"><i class="fas fa-search"></i></button> </form> </div> <div class="collapse navbar-collapse mt-1" id="navbarMenu"> <ul class="navbar-nav ml-auto align-items-center" id="mainNavMenu"> <li class="nav-item"> <a class="nav-link" href="https://waset.org/conferences" title="Conferences in 2024/2025/2026">Conferences</a> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/disciplines" title="Disciplines">Disciplines</a> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/committees" rel="nofollow">Committees</a> </li> <li class="nav-item dropdown"> <a class="nav-link dropdown-toggle" href="#" id="navbarDropdownPublications" role="button" data-toggle="dropdown" aria-haspopup="true" aria-expanded="false"> Publications </a> <div class="dropdown-menu" aria-labelledby="navbarDropdownPublications"> <a class="dropdown-item" href="https://publications.waset.org/abstracts">Abstracts</a> <a class="dropdown-item" href="https://publications.waset.org">Periodicals</a> <a class="dropdown-item" href="https://publications.waset.org/archive">Archive</a> </div> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/page/support" title="Support">Support</a> </li> </ul> </div> </div> </nav> </div> </header> <main> <div class="container mt-4"> <div class="row"> <div class="col-md-9 mx-auto"> <form method="get" action="https://publications.waset.org/abstracts/search"> <div id="custom-search-input"> <div class="input-group"> <i class="fas fa-search"></i> <input type="text" class="search-query" name="q" placeholder="Author, Title, Abstract, Keywords" value="anonymous"> <input type="submit" class="btn_search" value="Search"> </div> </div> </form> </div> </div> <div class="row mt-3"> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Commenced</strong> in January 2007</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Frequency:</strong> Monthly</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Edition:</strong> International</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Paper Count:</strong> 137</div> </div> </div> </div> <h1 class="mt-3 mb-3 text-center" style="font-size:1.6rem;">Search results for: anonymous</h1> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">137</span> Fears of Strangers: Causes of Anonymity Rejection on Virtual World</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Proud%20Arunrangsiwed">Proud Arunrangsiwed</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This research is a collaborative narrative research, which is mixed with issues of selected papers and researcher's experience as an anonymous user on social networking sites. The objective of this research is to understand the reasons of the regular users who reject to contact with anonymous users, and to study the communication traditions used in the selected studies. Anonymous users are rejected by regular users, because of the fear of cyber bully, the fear of unpleasant behaviors, and unwillingness of changing communication norm. The suggestion for future research design is to use longitudinal design or quantitative design; and the theory in rhetorical tradition should be able to help develop a strong trust message. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=anonymous" title="anonymous">anonymous</a>, <a href="https://publications.waset.org/abstracts/search?q=anonymity" title=" anonymity"> anonymity</a>, <a href="https://publications.waset.org/abstracts/search?q=online%20identity" title=" online identity"> online identity</a>, <a href="https://publications.waset.org/abstracts/search?q=trust%20message" title=" trust message"> trust message</a>, <a href="https://publications.waset.org/abstracts/search?q=reliability" title=" reliability"> reliability</a> </p> <a href="https://publications.waset.org/abstracts/10507/fears-of-strangers-causes-of-anonymity-rejection-on-virtual-world" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/10507.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">359</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">136</span> Secure Network Coding-Based Named Data Network Mutual Anonymity Transfer Protocol</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Tao%20Feng">Tao Feng</a>, <a href="https://publications.waset.org/abstracts/search?q=Fei%20Xing"> Fei Xing</a>, <a href="https://publications.waset.org/abstracts/search?q=Ye%20Lu"> Ye Lu</a>, <a href="https://publications.waset.org/abstracts/search?q=Jun%20Li%20Fang"> Jun Li Fang</a> </p> <p class="card-text"><strong>Abstract:</strong></p> NDN is a kind of future Internet architecture. Due to the NDN design introduces four privacy challenges,Many research institutions began to care about the privacy issues of naming data network(NDN).In this paper, we are in view of the major NDN’s privacy issues to investigate privacy protection,then put forwards more effectively anonymous transfer policy for NDN.Firstly,based on mutual anonymity communication for MP2P networks,we propose NDN mutual anonymity protocol.Secondly,we add interest package authentication mechanism in the protocol and encrypt the coding coefficient, security of this protocol is improved by this way.Finally, we proof the proposed anonymous transfer protocol security and anonymity. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=NDN" title="NDN">NDN</a>, <a href="https://publications.waset.org/abstracts/search?q=mutual%20anonymity" title=" mutual anonymity"> mutual anonymity</a>, <a href="https://publications.waset.org/abstracts/search?q=anonymous%20routing" title=" anonymous routing"> anonymous routing</a>, <a href="https://publications.waset.org/abstracts/search?q=network%20coding" title=" network coding"> network coding</a>, <a href="https://publications.waset.org/abstracts/search?q=authentication%20mechanism" title=" authentication mechanism"> authentication mechanism</a> </p> <a href="https://publications.waset.org/abstracts/28422/secure-network-coding-based-named-data-network-mutual-anonymity-transfer-protocol" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/28422.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">451</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">135</span> The Role of Virtual Group Anonymity in the Generation, Selection, and Refinement of Ideas</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Jonali%20Baruah">Jonali Baruah</a>, <a href="https://publications.waset.org/abstracts/search?q=Keesha%20Green"> Keesha Green</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This experimental study examines the effects of anonymity in video meeting groups across the stages of innovation (idea generation, selection, and refinement) on various measures of creativity. A sample of 92 undergraduate students participated in small groups of three to four members to complete creativity, decision-making, and idea-refinement task in either anonymous or identified conditions. The study followed two anonymity (anonymous and identified) X 3 stages of innovation (idea generation, idea selection, and idea refinement) in a mixed factorial design. Results revealed that the anonymous groups produced ideas of the highest average quality in the refinement phase of innovation. The results of this study enhanced our understanding of the productivity and creativity of groups in computer-mediated communication. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=creativity" title="creativity">creativity</a>, <a href="https://publications.waset.org/abstracts/search?q=anonymity" title=" anonymity"> anonymity</a>, <a href="https://publications.waset.org/abstracts/search?q=idea-generation" title=" idea-generation"> idea-generation</a>, <a href="https://publications.waset.org/abstracts/search?q=idea-refinement" title=" idea-refinement"> idea-refinement</a>, <a href="https://publications.waset.org/abstracts/search?q=innovation" title=" innovation"> innovation</a> </p> <a href="https://publications.waset.org/abstracts/152534/the-role-of-virtual-group-anonymity-in-the-generation-selection-and-refinement-of-ideas" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/152534.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">137</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">134</span> Anonymity and Irreplaceability: Gross Anatomical Practices in Japanese Medical Education</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Ayami%20Umemura">Ayami Umemura</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Without exception, all the bodies dissected in the gross anatomical practices are bodies that have lived irreplaceable lives, laughing and talking with family and friends. While medical education aims to cultivate medical knowledge that is universally applicable to all human bodies, it relies on a unique, irreplaceable, and singular entity. In this presentation, we will explore the ``irreplaceable relationship'' that is cultivated between medical students and anonymous cadavers during gross anatomical practices, drawing on Emmanuel Levinas's ``ethics of the face'' and Martin Buber's discussion of “I-Thou.'' Through this, we aim to present ``a different ethic'' that emerges only in the context of face-to-face relationships, which differs from the generalized, institutionalized, mass-produced ethics like seen in so-called ``ethics codes.'' Since the 1990s, there has been a movement around the world to use gross anatomical practices as an "educational tool" for medical professionalism and medical ethics, and some educational institutions have started disclosing the actual names, occupations, and places of birth of corpses to medical students. These efforts have also been criticized because they lack medical calmness. In any case, the issue here is that this information is all about the past that medical students never know directly. The critical fact that medical students are building relationships from scratch and spending precious time together without any information about the corpses before death is overlooked. Amid gross anatomical practices, a medical student is exposed to anonymous cadavers with faces and touching and feeling them. In this presentation, we will examine a collection of essays written by medical students on gross anatomical practices collected by the Japanese Association for Volunteer Body Donation from medical students across the country since 1978. There, we see the students calling out to the corpse, being called out to, being encouraged, superimposing the carcasses on their own immediate family, regretting parting, and shedding tears. Then, medical students can be seen addressing the dead body in the second person singular, “you.” These behaviors reveal an irreplaceable relationship between the anonymous cadavers and the medical students. The moment they become involved in an irreplaceable relationship between “I and you,” an accidental and anonymous encounter becomes inevitable. When medical students notice being the inevitable takers of voluntary and addressless gifts, they pledge to become “Good Doctors” owing the anonymous persons. This presentation aims to present “a different ethic” based on uniqueness and irreplaceability that comes from the faces of the others embedded in each context, which is different from “routine” and “institutionalized” ethics. That can only be realized ``because of anonymity''. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=anonymity" title="anonymity">anonymity</a>, <a href="https://publications.waset.org/abstracts/search?q=irreplaceability" title=" irreplaceability"> irreplaceability</a>, <a href="https://publications.waset.org/abstracts/search?q=uniqueness" title=" uniqueness"> uniqueness</a>, <a href="https://publications.waset.org/abstracts/search?q=singularlity" title=" singularlity"> singularlity</a>, <a href="https://publications.waset.org/abstracts/search?q=emanuel%20levinas" title=" emanuel levinas"> emanuel levinas</a>, <a href="https://publications.waset.org/abstracts/search?q=martin%20buber" title=" martin buber"> martin buber</a>, <a href="https://publications.waset.org/abstracts/search?q=alain%20badiou" title=" alain badiou"> alain badiou</a>, <a href="https://publications.waset.org/abstracts/search?q=medical%20education" title=" medical education"> medical education</a> </p> <a href="https://publications.waset.org/abstracts/175836/anonymity-and-irreplaceability-gross-anatomical-practices-in-japanese-medical-education" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/175836.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">62</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">133</span> How to Reach Adolescents Vulnerable for Suicidal Behaviour: A Qualitative Study</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Birgit%20Reime">Birgit Reime</a>, <a href="https://publications.waset.org/abstracts/search?q=Sonja%20Gscheidle"> Sonja Gscheidle</a>, <a href="https://publications.waset.org/abstracts/search?q=Toni%20H%C3%BCbener"> Toni Hübener</a>, <a href="https://publications.waset.org/abstracts/search?q=Lara%20H%C3%BCbener"> Lara Hübener</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Suicide in individuals under 30 years is a global public health concern. The objective of this study was to identify strategies for the prevention of suicide and suicidal behavior preferred by adolescents and young adults who are vulnerable to suicidal behavior and by relevant experts. Using semi-structured interviews with n= 17 adolescents and young adults (18-25 years of age) and with n= 11 experts from relevant fields, we have applied an inductive approach and applied thematic content analysis. Six strategies for suicide prevention in young individuals were reported. These were digital solutions with appealing designs, anonymous support, trained peer support, spiritual support, improving existing structures, and raising suicide literacy. Accessibility of anonymous digital support may contribute to suicide prevention in young people. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=suicide%20prevention" title="suicide prevention">suicide prevention</a>, <a href="https://publications.waset.org/abstracts/search?q=adolescents" title=" adolescents"> adolescents</a>, <a href="https://publications.waset.org/abstracts/search?q=E-health" title=" E-health"> E-health</a>, <a href="https://publications.waset.org/abstracts/search?q=Germany" title=" Germany"> Germany</a> </p> <a href="https://publications.waset.org/abstracts/143088/how-to-reach-adolescents-vulnerable-for-suicidal-behaviour-a-qualitative-study" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/143088.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">185</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">132</span> Need for Cognition: An Important, Neglected Personality Variable in the Development of Spirituality Within the Context of Twelve Step Recovery from Addictive Disorders</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Paul%20E.%20Priester">Paul E. Priester</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The Twelve Step approach to recovery from substance use and addictive disorders is considered an evidence-based model that assists many who recover from a chronic, progressive, fatal disease. Two key processes that contribute to the success of obtaining recovery from substance use disorders (SUD) are meeting engagement and the development of spiritual beliefs. Beyond establishing that there is a positive relationship between the development of spiritual beliefs in recovery from SUD’s, there has been a paucity of research exploring individual differences among individuals in this development of spiritual beliefs. One such personality variable that deserves exploration is that of the need for cognition. The need for cognition is a personality variable that explains the cognitive style of individuals. Individuals with a high need for cognition enjoy examining the complexities of a situation before coming to a conclusion. While individuals with a low need for cognition do not value or spend time cognitively dissecting a situation or decision. It is important to point out that a high need for cognition does not necessarily imply a high level of cognitive ability. Indeed, one could make the argument that a low need for cognition individual is not “wasting” cognitive energy in perseverating the multitude of aspects of a particular decision. This paper will present two case studies demonstrating the development of spiritual beliefs that enabled long-term recovery from SUD. The first case study presents an agnostic individual with a low need for cognition cognitive style in his development of spirituality in support of his recovery from alcoholism within the context of Alcoholics Anonymous. The second case study represents an adamant atheist with a high need for cognition cognitive style. This second individual is an intravenous cocaine addict and alcoholic who recovers through the development of spirituality within the contexts of Alcoholics Anonymous and Narcotics Anonymous. The two case studies will be contrasted with each other, noting how the individuals’ cognitive style mediated the development of spirituality that supported their long-term recovery from alcoholism and addiction. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=spirituality" title="spirituality">spirituality</a>, <a href="https://publications.waset.org/abstracts/search?q=twelve%20step%20recovery" title=" twelve step recovery"> twelve step recovery</a>, <a href="https://publications.waset.org/abstracts/search?q=need%20for%20cognition" title=" need for cognition"> need for cognition</a>, <a href="https://publications.waset.org/abstracts/search?q=individual%20differences%20in%20recovery%20from%20addictions" title=" individual differences in recovery from addictions"> individual differences in recovery from addictions</a> </p> <a href="https://publications.waset.org/abstracts/178419/need-for-cognition-an-important-neglected-personality-variable-in-the-development-of-spirituality-within-the-context-of-twelve-step-recovery-from-addictive-disorders" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/178419.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">93</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">131</span> Fostering Students&#039; Engagement with Historical Issues Surrounding the Field of Graphic Design</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Sara%20Corvino">Sara Corvino</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The aim of this study is to explore the potential of inclusive learning and assessment strategies to foster students' engagement with historical debates surrounding the field of graphic design. The goal is to respond to the diversity of L4 Graphic Design students, at Nottingham Trent University, in a way that instead of 'lowering standards' can benefit everyone. This research tests, measures, and evaluates the impact of a specific intervention, an assessment task, to develop students' critical visual analysis skills and stimulate a deeper engagement with the subject matter. Within the action research approach, this work has followed a case study research method to understand students' views and perceptions of a specific project. The primary methods of data collection have been: anonymous electronic questionnaire and a paper-based anonymous critical incident questionnaire. NTU College of Business Law and Social Sciences Research Ethics Committee granted the Ethical approval for this research in November 2019. Other methods used to evaluate the impact of this assessment task have been Evasys's report and students' performance. In line with the constructivist paradigm, this study embraces an interpretative and contextualized analysis of the collected data within the triangulation analytical framework. The evaluation of both qualitative and quantitative data demonstrates that active learning strategies and the disruption of thinking patterns can foster greater students' engagement and can lead to meaningful learning. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=active%20learning" title="active learning">active learning</a>, <a href="https://publications.waset.org/abstracts/search?q=assessment%20for%20learning" title=" assessment for learning"> assessment for learning</a>, <a href="https://publications.waset.org/abstracts/search?q=graphic%20design" title=" graphic design"> graphic design</a>, <a href="https://publications.waset.org/abstracts/search?q=higher%20education" title=" higher education"> higher education</a>, <a href="https://publications.waset.org/abstracts/search?q=student%20engagement" title=" student engagement"> student engagement</a> </p> <a href="https://publications.waset.org/abstracts/128671/fostering-students-engagement-with-historical-issues-surrounding-the-field-of-graphic-design" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/128671.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">177</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">130</span> Cognition in Context: Investigating the Impact of Persuasive Outcomes across Face-to-Face, Social Media and Virtual Reality Environments</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Claire%20Tranter">Claire Tranter</a>, <a href="https://publications.waset.org/abstracts/search?q=Coral%20Dando"> Coral Dando</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Gathering information from others is a fundamental goal for those concerned with investigating crime, and protecting national and international security. Persuading an individual to move from an opposing to converging viewpoint, and an understanding on the cognitive style behind this change can serve to increase understanding of traditional face-to-face interactions, as well as synthetic environments (SEs) often used for communication across varying geographical locations. SEs are growing in usage, and with this increase comes an increase in crime being undertaken online. Communication technologies can allow people to mask their real identities, supporting anonymous communication which can raise significant challenges for investigators when monitoring and managing these conversations inside SEs. To date, the psychological literature concerning how to maximise information-gain in SEs for real-world interviewing purposes is sparse, and as such this aspect of social cognition is not well understood. Here, we introduce an overview of a novel programme of PhD research which seeks to enhance understanding of cross-cultural and cross-gender communication in SEs for maximising information gain. Utilising a dyadic jury paradigm, participants interacted with a confederate who attempted to persuade them to the opposing verdict across three distinct environments: face-to-face, instant messaging, and a novel virtual reality environment utilising avatars. Participants discussed a criminal scenario, acting as a two-person (male; female) jury. Persuasion was manipulated by the confederate claiming an opposing viewpoint (guilty v. not guilty) to the naïve participants from the outset. Pre and post discussion data, and observational digital recordings (voice and video) of participant’ discussion performance was collected. Information regarding cognitive style was also collected to ascertain participants need for cognitive closure and biases towards jumping to conclusions. Findings revealed that individuals communicating via an avatar in a virtual reality environment reacted in a similar way, and thus equally persuasive, when compared to individuals communicating face-to-face. Anonymous instant messaging however created a resistance to persuasion in participants, with males showing a significant decline in persuasive outcomes compared to face to face. The findings reveal new insights particularly regarding the interplay of persuasion on gender and modality, with anonymous instant messaging enhancing resistance to persuasion attempts. This study illuminates how varying SE can support new theoretical and applied understandings of how judgments are formed and modified in response to advocacy. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=applied%20cognition" title="applied cognition">applied cognition</a>, <a href="https://publications.waset.org/abstracts/search?q=persuasion" title=" persuasion"> persuasion</a>, <a href="https://publications.waset.org/abstracts/search?q=social%20media" title=" social media"> social media</a>, <a href="https://publications.waset.org/abstracts/search?q=virtual%20reality" title=" virtual reality"> virtual reality</a> </p> <a href="https://publications.waset.org/abstracts/94027/cognition-in-context-investigating-the-impact-of-persuasive-outcomes-across-face-to-face-social-media-and-virtual-reality-environments" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/94027.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">144</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">129</span> Materials and Techniques of Anonymous Egyptian Polychrome Cartonnage Mummy Mask: A Multiple Analytical Study</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Hanaa%20A.%20Al-Gaoudi">Hanaa A. Al-Gaoudi</a>, <a href="https://publications.waset.org/abstracts/search?q=Hassan%20Ebeid"> Hassan Ebeid</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The research investigates the materials and processes used in the manufacturing of an Egyptian polychrome cartonnage mummy mask with the aim of dating this object and establishing trade patterns of certain materials that were used and available at the time of ancient Egypt. This anonymous-source object was held in the basement storage of the Egyptian Museum in Cairo (EMC) and has never been on display. Furthermore, there is no information available regarding its owner, provenance, date, and even the time of its possession by the museum. Moreover, the object is in a very poor condition where almost two-thirds of the mask was bent and has never received any previous conservation treatment. This research has utilized well-established multi-analytical methods to identify the considerable diversity of materials that have been used in the manufacturing of this object. These methods include Computed Tomography Scan (CT scan) to acquire detailed pictures of the inside physical structure and condition of the bended layers. Dino-Lite portable digital microscope, scanning electron microscopy with energy dispersive X-ray spectrometer (SEM-EDX), and the non-invasive imaging technique of multispectral imaging (MSI) to obtain information about the physical characteristics and condition of the painted layers and to examine the microstructure of the materials. Portable XRF Spectrometer (PXRF) and X-Ray powder diffraction (XRD) to identify mineral phases and the bulk element composition in the gilded layer, ground, and pigments; Fourier-transform infrared (FTIR) to identify organic compounds and their molecular characterization; accelerator mass spectrometry (AMS 14C) to date the object. Preliminary results suggest that there are no human remains inside the object, and the textile support is linen fibres with tabby weave 1/1 and these fibres are in a very bad condition. Several pigments have been identified, such as Egyptian blue, Magnetite, Egyptian green frit, Hematite, Calcite, and Cinnabar; moreover, the gilded layers are pure gold and the binding media in the pigments is Arabic gum and animal glue in the textile support layer. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=analytical%20methods" title="analytical methods">analytical methods</a>, <a href="https://publications.waset.org/abstracts/search?q=Egyptian%20museum" title=" Egyptian museum"> Egyptian museum</a>, <a href="https://publications.waset.org/abstracts/search?q=mummy%20mask" title=" mummy mask"> mummy mask</a>, <a href="https://publications.waset.org/abstracts/search?q=pigments" title=" pigments"> pigments</a>, <a href="https://publications.waset.org/abstracts/search?q=textile" title=" textile"> textile</a> </p> <a href="https://publications.waset.org/abstracts/115089/materials-and-techniques-of-anonymous-egyptian-polychrome-cartonnage-mummy-mask-a-multiple-analytical-study" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/115089.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">124</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">128</span> Early Prediction of Disposable Addresses in Ethereum Blockchain</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Ahmad%20Saleem">Ahmad Saleem</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Ethereum is the second largest crypto currency in blockchain ecosystem. Along with standard transactions, it supports smart contracts and NFT’s. Current research trends are focused on analyzing the overall structure of the network its growth and behavior. Ethereum addresses are anonymous and can be created on fly. The nature of Ethereum network and addresses make it hard to predict their behavior. The activity period of an ethereum address is not much analyzed. Using machine learning we can make early prediction about the disposability of the address. In this paper we analyzed the lifetime of the addresses. We also identified and predicted the disposable addresses using machine learning models and compared the results. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=blockchain" title="blockchain">blockchain</a>, <a href="https://publications.waset.org/abstracts/search?q=Ethereum" title=" Ethereum"> Ethereum</a>, <a href="https://publications.waset.org/abstracts/search?q=cryptocurrency" title=" cryptocurrency"> cryptocurrency</a>, <a href="https://publications.waset.org/abstracts/search?q=prediction" title=" prediction"> prediction</a> </p> <a href="https://publications.waset.org/abstracts/156656/early-prediction-of-disposable-addresses-in-ethereum-blockchain" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/156656.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">97</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">127</span> Finite Element Analysis of Rom Silo Subjected to 5000 Tons Monotic Loads at an Anonymous Mine in Zimbabwe</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=T.%20Mushiri">T. Mushiri</a>, <a href="https://publications.waset.org/abstracts/search?q=K.%20Tengende"> K. Tengende</a>, <a href="https://publications.waset.org/abstracts/search?q=C.%20Mbohwa"> C. Mbohwa</a>, <a href="https://publications.waset.org/abstracts/search?q=T.%20Garikayi"> T. Garikayi</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This paper introduces finite element analysis of Run off Mine (ROM) silo subjected to dynamic loading. The proposed procedure is based on the use of theoretical equations to come up with pressure and forces exerted by Platinum Group Metals (PGMs) ore to the silo wall. Finite Element Analysis of the silo involves the use of CAD software (AutoCAD) for3D creation and CAE software (T-FLEX) for the simulation work with an optimization routine to minimize the mass and also ensure structural stiffness and stability. In this research an efficient way to design and analysis of a silo in 3D T-FLEX (CAD) program was created the silo to stay within the constrains and so as to know the points of failure due dynamic loading. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=reinforced%20concrete%20silo" title="reinforced concrete silo">reinforced concrete silo</a>, <a href="https://publications.waset.org/abstracts/search?q=finite%20element%20analysis" title=" finite element analysis"> finite element analysis</a>, <a href="https://publications.waset.org/abstracts/search?q=T-FLEX%20software" title=" T-FLEX software"> T-FLEX software</a>, <a href="https://publications.waset.org/abstracts/search?q=AutoCAD" title=" AutoCAD"> AutoCAD</a> </p> <a href="https://publications.waset.org/abstracts/12797/finite-element-analysis-of-rom-silo-subjected-to-5000-tons-monotic-loads-at-an-anonymous-mine-in-zimbabwe" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/12797.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">482</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">126</span> Willingness and Attitude towards Organ Donation of Nurses in Taiwan</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=ShuYing%20Chung">ShuYing Chung</a>, <a href="https://publications.waset.org/abstracts/search?q=Minchuan%20Huang"> Minchuan Huang</a>, <a href="https://publications.waset.org/abstracts/search?q=Iping%20Chen"> Iping Chen</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Taking the medical staff in an emergency ward of a medical center in Central Taiwan as the research object, the questionnaire data were collected by anonymous and voluntary reporting methods with structured questionnaire to explore the actual situation, willingness and attitude of organ donation. Only 80 valid questionnaires were collected. Among the 8 questions, the average correct rate was 5.9 + 1.2, and the correct rate was 73.13%. The willingness of organ donation that 7.5% of the people are not willing; 92.5% of the people are willing, of which 62.5% have considered but have not yet decided; 21.3% are willing but have not signed the consent of organ donation; They have signed the consent of organ donation 8.7%. The average total score (standard deviation) of attitude towards organ donation was 36.2. There is no significant difference between the demographic variables and the awareness and willingness of organ donation, but there is a significant correlation between the marital status and the attitude of organ donation. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=clinical%20psychology" title="clinical psychology">clinical psychology</a>, <a href="https://publications.waset.org/abstracts/search?q=organ%20donation" title=" organ donation"> organ donation</a>, <a href="https://publications.waset.org/abstracts/search?q=doctors%20affecting%20psychological%20disorders" title=" doctors affecting psychological disorders"> doctors affecting psychological disorders</a>, <a href="https://publications.waset.org/abstracts/search?q=commitment" title=" commitment"> commitment</a> </p> <a href="https://publications.waset.org/abstracts/136786/willingness-and-attitude-towards-organ-donation-of-nurses-in-taiwan" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/136786.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">137</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">125</span> A Grounded Theory of Educational Leadership Development Using Generative Dialogue</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Elizabeth%20Hartney">Elizabeth Hartney</a>, <a href="https://publications.waset.org/abstracts/search?q=Keith%20Borkowsky"> Keith Borkowsky</a>, <a href="https://publications.waset.org/abstracts/search?q=Jo%20Axe"> Jo Axe</a>, <a href="https://publications.waset.org/abstracts/search?q=Doug%20Hamilton"> Doug Hamilton</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The aim of this research is to develop a grounded theory of educational leadership development, using an approach to initiating and maintaining professional growth in school principals and vice principals termed generative dialogue. The research was conducted in a relatively affluent, urban school district in Western Canada. Generative dialogue interviews were conducted by a team of consultants, and anonymous data in the form of handwritten notes were voluntarily submitted to the research team. The data were transcribed and analyzed using grounded theory. The results indicate that a key focus of educational leadership development is focused on navigating relationships within the school setting and that the generative dialogue process is helpful for principals and vice principals to explore how they might do this. Applicability and limitations of the study are addressed. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=generative%20dialogue" title="generative dialogue">generative dialogue</a>, <a href="https://publications.waset.org/abstracts/search?q=school%20principals" title=" school principals"> school principals</a>, <a href="https://publications.waset.org/abstracts/search?q=grounded%20theory" title=" grounded theory"> grounded theory</a>, <a href="https://publications.waset.org/abstracts/search?q=leadership%20development" title=" leadership development"> leadership development</a> </p> <a href="https://publications.waset.org/abstracts/92456/a-grounded-theory-of-educational-leadership-development-using-generative-dialogue" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/92456.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">356</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">124</span> Improving University Operations with Data Mining: Predicting Student Performance</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Mladen%20Dragi%C4%8Devi%C4%87">Mladen Dragičević</a>, <a href="https://publications.waset.org/abstracts/search?q=Mirjana%20Peji%C4%87%20Bach"> Mirjana Pejić Bach</a>, <a href="https://publications.waset.org/abstracts/search?q=Vanja%20%C5%A0imi%C4%8Devi%C4%87"> Vanja Šimičević</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The purpose of this paper is to develop models that would enable predicting student success. These models could improve allocation of students among colleges and optimize the newly introduced model of government subsidies for higher education. For the purpose of collecting data, an anonymous survey was carried out in the last year of undergraduate degree student population using random sampling method. Decision trees were created of which two have been chosen that were most successful in predicting student success based on two criteria: Grade Point Average (GPA) and time that a student needs to finish the undergraduate program (time-to-degree). Decision trees have been shown as a good method of classification student success and they could be even more improved by increasing survey sample and developing specialized decision trees for each type of college. These types of methods have a big potential for use in decision support systems. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=data%20mining" title="data mining">data mining</a>, <a href="https://publications.waset.org/abstracts/search?q=knowledge%20discovery%20in%20databases" title=" knowledge discovery in databases"> knowledge discovery in databases</a>, <a href="https://publications.waset.org/abstracts/search?q=prediction%20models" title=" prediction models"> prediction models</a>, <a href="https://publications.waset.org/abstracts/search?q=student%20success" title=" student success"> student success</a> </p> <a href="https://publications.waset.org/abstracts/7653/improving-university-operations-with-data-mining-predicting-student-performance" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/7653.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">407</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">123</span> Half-Human: Examining Right-Wing Authoritarianism and Social Dominance Orientation Effects on Dehumanization Tendencies</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Brianna%20Ross">Brianna Ross</a>, <a href="https://publications.waset.org/abstracts/search?q=John%20Sollers"> John Sollers</a>, <a href="https://publications.waset.org/abstracts/search?q=Christopher%20Edwards"> Christopher Edwards</a> </p> <p class="card-text"><strong>Abstract:</strong></p> In the age of heightened social and political discourse, there is a tendency for individuals and media sources to use dehumanization as a tool to influence group thoughts and attitudes. When considering individual interactions, there is a need to determine what characteristics increase or predict dehumanization. The present study investigated dehumanization tendencies related to social dominance orientation (SDO) and right-wing authoritarianism (RWA) while factoring in political affiliation. Two-hundred and seven individuals participated in an anonymous study to reveal that there was a significant relationship between high SDO and high RWA scores. There was also a significant correlation between the dehumanization of Black Lives Matter and SDO. These findings suggest that those who are “double high” (scoring highly on both SDO and RWA are more likely to dehumanize others, particularly social groups they disagree with. Acknowledging that there are significant changes occurring in the sociopolitical atmosphere, it is essential that researchers understand dehumanization tendencies in modern society to better define the concept of othering and its consequences on social interaction. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=dehumanization" title="dehumanization">dehumanization</a>, <a href="https://publications.waset.org/abstracts/search?q=social%20dominance%20orientation" title=" social dominance orientation"> social dominance orientation</a>, <a href="https://publications.waset.org/abstracts/search?q=right-wing%20authoritarianism" title=" right-wing authoritarianism"> right-wing authoritarianism</a>, <a href="https://publications.waset.org/abstracts/search?q=political%20affiliation" title=" political affiliation"> political affiliation</a> </p> <a href="https://publications.waset.org/abstracts/129328/half-human-examining-right-wing-authoritarianism-and-social-dominance-orientation-effects-on-dehumanization-tendencies" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/129328.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">136</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">122</span> Thai Teenage Prostitution Online</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Somdech%20Rungsrisawat">Somdech Rungsrisawat</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The purposes of this research are to investigate Thai teens’ attitude toward prostitution on the internet, to discover the causes of teenage prostitution and to study the relationship between teenage promiscuity and the causes of teenage prostitution. This study is a mixed research which utilized both qualitative and quantitative approach. The population of this study included teenagers and early adults between 14-21 years old who were studying in high schools, colleges, or universities. A total of 600 respondents was sampled for interviews using a questionnaire, and 48 samples were chosen for an in-depth interview. The findings revealed that the majority of respondents recognized that teenage prostitution on line was real. The reasons for choosing the internet to contact with customers included easy, convenient, safe, and anonymous. Moreover, the internet allowed teen prostitutes to contact customers anywhere and anytime. The correlation showed that promiscuity was related to the trend of teen prostitution. Other factors that contributed to increasing widespread teen prostitution online included their need for quick money to buy luxurious products and to support their extravagant behavior. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=internet" title="internet">internet</a>, <a href="https://publications.waset.org/abstracts/search?q=prostitutes" title=" prostitutes"> prostitutes</a>, <a href="https://publications.waset.org/abstracts/search?q=online" title=" online"> online</a>, <a href="https://publications.waset.org/abstracts/search?q=Thai%20teens" title=" Thai teens"> Thai teens</a> </p> <a href="https://publications.waset.org/abstracts/8122/thai-teenage-prostitution-online" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/8122.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">309</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">121</span> Decentralized Data Marketplace Framework Using Blockchain-Based Smart Contract</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Meshari%20Aljohani">Meshari Aljohani</a>, <a href="https://publications.waset.org/abstracts/search?q=Stephan%20Olariu"> Stephan Olariu</a>, <a href="https://publications.waset.org/abstracts/search?q=Ravi%20Mukkamala"> Ravi Mukkamala</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Data is essential for enhancing the quality of life. Its value creates chances for users to profit from data sales and purchases. Users in data marketplaces, however, must share and trade data in a secure and trusted environment while maintaining their privacy. The first main contribution of this paper is to identify enabling technologies and challenges facing the development of decentralized data marketplaces. The second main contribution is to propose a decentralized data marketplace framework based on blockchain technology. The proposed framework enables sellers and buyers to transact with more confidence. Using a security deposit, the system implements a unique approach for enforcing honesty in data exchange among anonymous individuals. Before the transaction is considered complete, the system has a time frame. As a result, users can submit disputes to the arbitrators which will review them and respond with their decision. Use cases are presented to demonstrate how these technologies help data marketplaces handle issues and challenges. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=blockchain" title="blockchain">blockchain</a>, <a href="https://publications.waset.org/abstracts/search?q=data" title=" data"> data</a>, <a href="https://publications.waset.org/abstracts/search?q=data%20marketplace" title=" data marketplace"> data marketplace</a>, <a href="https://publications.waset.org/abstracts/search?q=smart%20contract" title=" smart contract"> smart contract</a>, <a href="https://publications.waset.org/abstracts/search?q=reputation%20system" title=" reputation system"> reputation system</a> </p> <a href="https://publications.waset.org/abstracts/149122/decentralized-data-marketplace-framework-using-blockchain-based-smart-contract" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/149122.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">158</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">120</span> The Economic Implications of Cryptocurrency and Its Potential to Disrupt Traditional Financial Systems as a Store of Value</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=G.%20L.%20Rithika">G. L. Rithika</a>, <a href="https://publications.waset.org/abstracts/search?q=Arvind%20B.%20S."> Arvind B. S.</a>, <a href="https://publications.waset.org/abstracts/search?q=Akash%20R."> Akash R.</a>, <a href="https://publications.waset.org/abstracts/search?q=Ananda%20Vinayak"> Ananda Vinayak</a>, <a href="https://publications.waset.org/abstracts/search?q=Hema%20M.%20S."> Hema M. S.</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Cryptocurrencies were first launched in the year 2009 and have been a great asset to own. Cryptocurrencies are a representation of a completely distinct decentralization model for money. They also contribute to the elimination of currency monopolies and the liberation of money from control. The fact that no government agency can determine a coin's value or flow is what cryptocurrency advocates believe makes them safe and secure. The aim of this paper is to analyze the economic implications of cryptocurrency and how it would disrupt traditional financial systems. This paper analyses the growth of Cryptocurrency over the years and the potential threats of cryptocurrency to financial systems. Our analysis shows that although the DeFi design, like the traditional financial system, may have the ability to lower transaction costs, there are multiple layers where rents might build up because of endogenous competition limitations. The permissionless and anonymous design of DeFi poses issues for ensuring tax compliance, anti-money laundering laws and regulations, and preventing financial misconduct. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=cryptocurrencies" title="cryptocurrencies">cryptocurrencies</a>, <a href="https://publications.waset.org/abstracts/search?q=bitcoin" title=" bitcoin"> bitcoin</a>, <a href="https://publications.waset.org/abstracts/search?q=blockchain%20technology" title=" blockchain technology"> blockchain technology</a>, <a href="https://publications.waset.org/abstracts/search?q=traditional%20financial%20systems" title=" traditional financial systems"> traditional financial systems</a>, <a href="https://publications.waset.org/abstracts/search?q=decentralisation" title=" decentralisation"> decentralisation</a>, <a href="https://publications.waset.org/abstracts/search?q=regulatory%20framework" title=" regulatory framework"> regulatory framework</a> </p> <a href="https://publications.waset.org/abstracts/184313/the-economic-implications-of-cryptocurrency-and-its-potential-to-disrupt-traditional-financial-systems-as-a-store-of-value" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/184313.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">50</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">119</span> Perception of Inclusion in Higher Education</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Hoi%20Nga%20Ng">Hoi Nga Ng</a>, <a href="https://publications.waset.org/abstracts/search?q=Kam%20Weng%20Boey"> Kam Weng Boey</a>, <a href="https://publications.waset.org/abstracts/search?q=Chi%20Wai%20Kwan"> Chi Wai Kwan</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Supporters of Inclusive education proclaim that all students, regardless of disabilities or special educational needs (SEN), have the right to study in the normal school setting. It is asserted that students with SEN would benefit in academic performance and psychosocial adjustment via participation in common learning activities within the ordinary school system. When more and more students of SEN completed their early schooling, institute of higher education become the setting where students of SEN continue their learning. This study aimed to investigate the school well-being, social relationship, and academic self-concept of students of SEN in higher education. The Perception of Inclusion Questionnaire (PIQ) was used as the measuring instruments. PIQ was validated and incorporated in a questionnaire designed for online survey. Participation was voluntary and anonymous. A total of 90 students with SEN and 457 students without SEN responded to the online survey. Results showed no significant differences in school well-being and social relationship between students with and without SEN, but students with SEN, particularly those with learning and development impairment and those with mental illness and emotional problems, were significantly poorer in academic self-concept. Implications of the findings were discussed. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=ccademic%20self-concept" title="ccademic self-concept">ccademic self-concept</a>, <a href="https://publications.waset.org/abstracts/search?q=school%20well-being" title=" school well-being"> school well-being</a>, <a href="https://publications.waset.org/abstracts/search?q=social%20relationship" title=" social relationship"> social relationship</a>, <a href="https://publications.waset.org/abstracts/search?q=special%20educational%20needs" title=" special educational needs"> special educational needs</a> </p> <a href="https://publications.waset.org/abstracts/147318/perception-of-inclusion-in-higher-education" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/147318.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">184</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">118</span> Equation to an Unknown (1980): Visibility, Community, and Rendering Queer Utopia</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Ted%20Silva">Ted Silva</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Dietrich de Velsa's Équation à un inconnu / Equation to an Unknown hybridizes art cinema style with the sexually explicit aesthetics of pornography to envision a uniquely queer world unmoored by heteronormative influence. This stylization evokes the memory of a queer history that once approximated such a prospect. With this historical and political context in mind, this paper utilizes formal analysis to assess how the film frames queer sexual encounters as tender acts of care, sometimes literally mending physical wounds. However, Equation to Unknown also highlights the transience of these sexual exchanges. By emphasizing the homogeneity of the protagonist’s sexual conquests, the film reveals that these practices have a darker meaning when the men reject the individualized connection to pursue purely visceral gratification. Given the lack of diversity or even recognizable identifying factors, the men become more anonymous to each other the more they pair up. Ultimately, Equation to an Unknown both celebrates and problematizes its vision of a queer utopia, highlighting areas in the community wherein intimacy and care flourish and locating those spots in which they are neglected. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=pornography%20studies" title="pornography studies">pornography studies</a>, <a href="https://publications.waset.org/abstracts/search?q=queer%20cinema" title=" queer cinema"> queer cinema</a>, <a href="https://publications.waset.org/abstracts/search?q=French%20cinema" title=" French cinema"> French cinema</a>, <a href="https://publications.waset.org/abstracts/search?q=history" title=" history"> history</a> </p> <a href="https://publications.waset.org/abstracts/140876/equation-to-an-unknown-1980-visibility-community-and-rendering-queer-utopia" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/140876.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">135</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">117</span> Anonymous Editing Prevention Technique Using Gradient Method for High-Quality Video</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Jiwon%20Lee">Jiwon Lee</a>, <a href="https://publications.waset.org/abstracts/search?q=Chanho%20Jung"> Chanho Jung</a>, <a href="https://publications.waset.org/abstracts/search?q=Si-Hwan%20Jang"> Si-Hwan Jang</a>, <a href="https://publications.waset.org/abstracts/search?q=Kyung-Ill%20Kim"> Kyung-Ill Kim</a>, <a href="https://publications.waset.org/abstracts/search?q=Sanghyun%20Joo"> Sanghyun Joo</a>, <a href="https://publications.waset.org/abstracts/search?q=Wook-Ho%20Son"> Wook-Ho Son</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Since the advances in digital imaging technologies have led to development of high quality digital devices, there are a lot of illegal copies of copyrighted video content on the internet. Thus, we propose a high-quality (HQ) video watermarking scheme that can prevent these illegal copies from spreading out. The proposed scheme is applied spatial and temporal gradient methods to improve the fidelity and detection performance. Also, the scheme duplicates the watermark signal temporally to alleviate the signal reduction caused by geometric and signal-processing distortions. Experimental results show that the proposed scheme achieves better performance than previously proposed schemes and it has high fidelity. The proposed scheme can be used in broadcast monitoring or traitor tracking applications which need fast detection process to prevent illegally recorded video content from spreading out. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=editing%20prevention%20technique" title="editing prevention technique">editing prevention technique</a>, <a href="https://publications.waset.org/abstracts/search?q=gradient%20method" title=" gradient method"> gradient method</a>, <a href="https://publications.waset.org/abstracts/search?q=luminance%20change" title=" luminance change"> luminance change</a>, <a href="https://publications.waset.org/abstracts/search?q=video%20watermarking" title=" video watermarking"> video watermarking</a> </p> <a href="https://publications.waset.org/abstracts/42072/anonymous-editing-prevention-technique-using-gradient-method-for-high-quality-video" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/42072.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">456</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">116</span> Use of Social Networks and Mobile Technologies in Education</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=V%C3%A1clav%20Man%C4%9Bna">Václav Maněna</a>, <a href="https://publications.waset.org/abstracts/search?q=Roman%20Dost%C3%A1l"> Roman Dostál</a>, <a href="https://publications.waset.org/abstracts/search?q=%C5%A0t%C4%9Bp%C3%A1n%20Hub%C3%A1lovsk%C3%BD"> Štěpán Hubálovský</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Social networks play an important role in the lives of children and young people. Along with the high penetration of mobile technologies such as smartphones and tablets among the younger generation, there is an increasing use of social networks already in elementary school. The paper presents the results of research, which was realized at schools in the Hradec Kr&aacute;lov&eacute; region. In this research, the authors focused on issues related to communications on social networks for children, teenagers and young people in the Czech Republic. This research was conducted at selected elementary, secondary and high schools using anonymous questionnaires. The results are evaluated and compared with the results of the research, which has been realized in 2008. The authors focused on the possibilities of using social networks in education. The paper presents the possibility of using the most popular social networks in education, with emphasis on increasing motivation for learning. The paper presents comparative analysis of social networks, with regard to the possibility of using in education as well. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=social%20networks" title="social networks">social networks</a>, <a href="https://publications.waset.org/abstracts/search?q=motivation" title=" motivation"> motivation</a>, <a href="https://publications.waset.org/abstracts/search?q=e-learning" title=" e-learning"> e-learning</a>, <a href="https://publications.waset.org/abstracts/search?q=mobile%20technology" title=" mobile technology"> mobile technology</a> </p> <a href="https://publications.waset.org/abstracts/61088/use-of-social-networks-and-mobile-technologies-in-education" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/61088.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">313</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">115</span> Coping Orientation of Academic Community in the Time of COVID-19 Pandemic: A Pilot Survey Study</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Fereshteh%20Ahmadi">Fereshteh Ahmadi</a>, <a href="https://publications.waset.org/abstracts/search?q=%C3%96nver%20Cetrez"> Önver Cetrez</a>, <a href="https://publications.waset.org/abstracts/search?q=Said%20Zandi"> Said Zandi</a>, <a href="https://publications.waset.org/abstracts/search?q=Sharareh%20Akhavan"> Sharareh Akhavan</a> </p> <p class="card-text"><strong>Abstract:</strong></p> In this paper, we have mapped the coping methods used to address the coronavirus pandemic by members of the academic community. We conducted an anonymous survey of a convenient sample of 674 faculty/staff members and students from September to December 2020. A modified version of the RCOPE scale was used for data collection. The results indicate that both religious and existential coping methods were used by respondents. The study also indicates that even though 71% of in-formants believed in God or another religious figure, 61% reported that they had tried to gain control of the situation directly without the help of God or another religious figure. The ranking of the coping strategies used indicates that the first five methods used by informants were all non-religious coping methods (i.e., secular existential coping methods): regarding life as a part of a greater whole, regarding nature as an important resource, listening to the sound of surrounding nature, being alone and con-templating, and walking/engaging in any activities outdoors giving a spiritual feeling. Our results contribute to the new area of research on academic community’s coping with pandemic-related stress and challenges. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=academic%20staff" title="academic staff">academic staff</a>, <a href="https://publications.waset.org/abstracts/search?q=academics" title=" academics"> academics</a>, <a href="https://publications.waset.org/abstracts/search?q=coping%20strategies" title=" coping strategies"> coping strategies</a>, <a href="https://publications.waset.org/abstracts/search?q=coronavirus%20epidemic" title=" coronavirus epidemic"> coronavirus epidemic</a>, <a href="https://publications.waset.org/abstracts/search?q=higher%20education." title=" higher education."> higher education.</a> </p> <a href="https://publications.waset.org/abstracts/165033/coping-orientation-of-academic-community-in-the-time-of-covid-19-pandemic-a-pilot-survey-study" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/165033.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">83</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">114</span> Authorship Profiling of Unidentified Corpora in Saudi Social Media</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Abdulaziz%20Fageeh">Abdulaziz Fageeh</a> </p> <p class="card-text"><strong>Abstract:</strong></p> In the bustling digital landscape of Saudi Arabia, a chilling wave of cybercrime has swept across the nation. Among the most nefarious acts are financial blackmail schemes, perpetrated by anonymous actors lurking within the shadows of social media platforms. This chilling reality necessitates the utilization of forensic linguistic techniques to unravel the identities of these virtual villains. This research delves into the complex world of authorship profiling, investigating the effectiveness of various linguistic features in identifying the perpetrators of malicious messages within the Saudi social media environment. By meticulously analyzing patterns of language, vocabulary choice, and stylistic nuances, the study endeavors to uncover the hidden characteristics of the individuals responsible for these heinous acts. Through this linguistic detective work, the research aims to provide valuable insights to investigators and policymakers in the ongoing battle against cybercrime and to shed light on the evolution of malicious online behavior within the Saudi context. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=authorship%20profiling" title="authorship profiling">authorship profiling</a>, <a href="https://publications.waset.org/abstracts/search?q=arabic%20linguistics" title=" arabic linguistics"> arabic linguistics</a>, <a href="https://publications.waset.org/abstracts/search?q=saudi%20social%20media" title=" saudi social media"> saudi social media</a>, <a href="https://publications.waset.org/abstracts/search?q=cybercrime" title=" cybercrime"> cybercrime</a>, <a href="https://publications.waset.org/abstracts/search?q=financial%20blackmail" title=" financial blackmail"> financial blackmail</a>, <a href="https://publications.waset.org/abstracts/search?q=linguistic%20features" title=" linguistic features"> linguistic features</a>, <a href="https://publications.waset.org/abstracts/search?q=forensic%20linguistics" title=" forensic linguistics"> forensic linguistics</a>, <a href="https://publications.waset.org/abstracts/search?q=online%20threats" title=" online threats"> online threats</a> </p> <a href="https://publications.waset.org/abstracts/193123/authorship-profiling-of-unidentified-corpora-in-saudi-social-media" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/193123.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">11</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">113</span> Emotional Intelligence in the Modern World: A Quantitative and Qualitative Study of the UMCS Students</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Anna%20Dabrowska">Anna Dabrowska</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Taking Daniel Goleman’s (1994) belief that success in life depends on IQ in 20% and in 80% on emotional intelligence, and that it is worth considering emotional intelligence as an important factor in human performance and development potential, the aim of the paper is to explore the range of emotions experienced by university students who represent Society 5.0. This quantitative and qualitative study is meant to explore not only the list of the most and least experienced emotions by the students, but also the main reasons behind these feelings. The database of the study consists of 115 respondents out of 129 students of the 1st and 5th year of Applied Linguistics at Maria Curie-Skłodowska University, which constitutes 89% of those being surveyed. The data is extracted from the anonymous questionnaire, which comprises young people’s answers and discourse concerning the causes of their most experienced emotions. Following Robert Plutchik’s theory of eight primary emotions, i.e. anger, fear, sadness, disgust, surprise, anticipation, trust, and joy, we adopt his argument for the primacy of these emotions by showing each to be the trigger of behaviour with high survival value. In fact, all other emotions are mixed or derivative states; that is, they occur as combinations, mixtures, or compounds of the primary emotions. Accordingly, the eight primary emotions, and their mixed states, are checked in the study on the students. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=emotions" title="emotions">emotions</a>, <a href="https://publications.waset.org/abstracts/search?q=intelligence" title=" intelligence"> intelligence</a>, <a href="https://publications.waset.org/abstracts/search?q=students" title=" students"> students</a>, <a href="https://publications.waset.org/abstracts/search?q=discourse%20study" title=" discourse study"> discourse study</a>, <a href="https://publications.waset.org/abstracts/search?q=emotional%20intelligence" title=" emotional intelligence"> emotional intelligence</a> </p> <a href="https://publications.waset.org/abstracts/187320/emotional-intelligence-in-the-modern-world-a-quantitative-and-qualitative-study-of-the-umcs-students" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/187320.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">40</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">112</span> Revealing Corruption through Strategic Narration in Mandla Langa’s Memory of Stones (2000)</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Dzunisani%20Sibuyi">Dzunisani Sibuyi</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This article demonstrates how corruption is revealed in Mandla Langa’s Memory of Stones (2000) through the deployment of narrational strategies by applying narrative theories by Gerard Genette’s Narrative Discourse and Narrative Discourse Revisited, as well as Mikhail Bakhtin’s Dialogic Imagination to the text. This is accomplished by analysing Langa’s use of extradiegetic-heterodiegetic and intradiegetic-homodiegetic narrational strategies respectively employed by the anonymous narrator and character narrator Mpanza. The narration provided by these narrators is multi-voiced in its approach to the events depicting corruption from various completing and explanatory perspectives. In addition, Langa also employs narrative techniques of narrating times such as simultaneous, subsequent, and interpolated narration to highlight corruption taking place, which is highlighted by situating the story in its presentness moments coinciding with the corruption action. As a result, by emphasising the events portraying the plight of the main characters and their struggle to resist and defeat corrupt leaders, the narration strategically reveals corruption. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=narrational%20strategies" title="narrational strategies">narrational strategies</a>, <a href="https://publications.waset.org/abstracts/search?q=narrating%20voice" title=" narrating voice"> narrating voice</a>, <a href="https://publications.waset.org/abstracts/search?q=dialogism" title=" dialogism"> dialogism</a>, <a href="https://publications.waset.org/abstracts/search?q=corruption" title=" corruption"> corruption</a>, <a href="https://publications.waset.org/abstracts/search?q=G%C3%A9rard%20Genette" title=" Gérard Genette"> Gérard Genette</a>, <a href="https://publications.waset.org/abstracts/search?q=Mandla%20Langa" title=" Mandla Langa"> Mandla Langa</a>, <a href="https://publications.waset.org/abstracts/search?q=Mikhail%20Bakhtin" title=" Mikhail Bakhtin"> Mikhail Bakhtin</a>, <a href="https://publications.waset.org/abstracts/search?q=time%28s%29%20of%20the%20narration" title=" time(s) of the narration"> time(s) of the narration</a> </p> <a href="https://publications.waset.org/abstracts/158672/revealing-corruption-through-strategic-narration-in-mandla-langas-memory-of-stones-2000" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/158672.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">103</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">111</span> Statistical Shape Analysis of the Human Upper Airway</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Ramkumar%20Gunasekaran">Ramkumar Gunasekaran</a>, <a href="https://publications.waset.org/abstracts/search?q=John%20Cater"> John Cater</a>, <a href="https://publications.waset.org/abstracts/search?q=Vinod%20Suresh"> Vinod Suresh</a>, <a href="https://publications.waset.org/abstracts/search?q=Haribalan%20Kumar"> Haribalan Kumar</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The main objective of this project is to develop a statistical shape model using principal component analysis that could be used for analyzing the shape of the human airway. The ultimate goal of this project is to identify geometric risk factors for diagnosis and management of Obstructive Sleep Apnoea (OSA). Anonymous CBCT scans of 25 individuals were obtained from the Otago Radiology Group. The airways were segmented between the hard-palate and the aryepiglottic fold using snake active contour segmentation. The point data cloud of the segmented images was then fitted with a bi-cubic mesh, and pseudo landmarks were placed to perform PCA on the segmented airway to analyze the shape of the airway and to find the relationship between the shape and OSA risk factors. From the PCA results, the first four modes of variation were found to be significant. Mode 1 was interpreted to be the overall length of the airway, Mode 2 was related to the anterior-posterior width of the retroglossal region, Mode 3 was related to the lateral dimension of the oropharyngeal region and Mode 4 was related to the anterior-posterior width of the oropharyngeal region. All these regions are subjected to the risk factors of OSA. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=medical%20imaging" title="medical imaging">medical imaging</a>, <a href="https://publications.waset.org/abstracts/search?q=image%20processing" title=" image processing"> image processing</a>, <a href="https://publications.waset.org/abstracts/search?q=FEM%2FBEM" title=" FEM/BEM"> FEM/BEM</a>, <a href="https://publications.waset.org/abstracts/search?q=statistical%20modelling" title=" statistical modelling"> statistical modelling</a> </p> <a href="https://publications.waset.org/abstracts/83934/statistical-shape-analysis-of-the-human-upper-airway" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/83934.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">514</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">110</span> Exploring Syntactic and Semantic Features for Text-Based Authorship Attribution</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Haiyan%20Wu">Haiyan Wu</a>, <a href="https://publications.waset.org/abstracts/search?q=Ying%20Liu"> Ying Liu</a>, <a href="https://publications.waset.org/abstracts/search?q=Shaoyun%20Shi"> Shaoyun Shi</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Authorship attribution is to extract features to identify authors of anonymous documents. Many previous works on authorship attribution focus on statistical style features (e.g., sentence/word length), content features (e.g., frequent words, n-grams). Modeling these features by regression or some transparent machine learning methods gives a portrait of the authors' writing style. But these methods do not capture the syntactic (e.g., dependency relationship) or semantic (e.g., topics) information. In recent years, some researchers model syntactic trees or latent semantic information by neural networks. However, few works take them together. Besides, predictions by neural networks are difficult to explain, which is vital in authorship attribution tasks. In this paper, we not only utilize the statistical style and content features but also take advantage of both syntactic and semantic features. Different from an end-to-end neural model, feature selection and prediction are two steps in our method. An attentive n-gram network is utilized to select useful features, and logistic regression is applied to give prediction and understandable representation of writing style. Experiments show that our extracted features can improve the state-of-the-art methods on three benchmark datasets. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=authorship%20attribution" title="authorship attribution">authorship attribution</a>, <a href="https://publications.waset.org/abstracts/search?q=attention%20mechanism" title=" attention mechanism"> attention mechanism</a>, <a href="https://publications.waset.org/abstracts/search?q=syntactic%20feature" title=" syntactic feature"> syntactic feature</a>, <a href="https://publications.waset.org/abstracts/search?q=feature%20extraction" title=" feature extraction"> feature extraction</a> </p> <a href="https://publications.waset.org/abstracts/129270/exploring-syntactic-and-semantic-features-for-text-based-authorship-attribution" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/129270.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">136</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">109</span> Walmart Sales Forecasting using Machine Learning in Python</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Niyati%20%20Sharma">Niyati Sharma</a>, <a href="https://publications.waset.org/abstracts/search?q=Om%20%20Anand"> Om Anand</a>, <a href="https://publications.waset.org/abstracts/search?q=Sanjeev%20Kumar%20Prasad"> Sanjeev Kumar Prasad</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Assuming future sale value for any of the organizations is one of the major essential characteristics of tactical development. Walmart Sales Forecasting is the finest illustration to work with as a beginner; subsequently, it has the major retail data set. Walmart uses this sales estimate problem for hiring purposes also. We would like to analyzing how the internal and external effects of one of the largest companies in the US can walk out their Weekly Sales in the future. Demand forecasting is the planned prerequisite of products or services in the imminent on the basis of present and previous data and different stages of the market. Since all associations is facing the anonymous future and we do not distinguish in the future good demand. Hence, through exploring former statistics and recent market statistics, we envisage the forthcoming claim and building of individual goods, which are extra challenging in the near future. As a result of this, we are producing the required products in pursuance of the petition of the souk in advance. We will be using several machine learning models to test the exactness and then lastly, train the whole data by Using linear regression and fitting the training data into it. Accuracy is 8.88%. The extra trees regression model gives the best accuracy of 97.15%. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=random%20forest%20algorithm" title="random forest algorithm">random forest algorithm</a>, <a href="https://publications.waset.org/abstracts/search?q=linear%20regression%20algorithm" title=" linear regression algorithm"> linear regression algorithm</a>, <a href="https://publications.waset.org/abstracts/search?q=extra%20trees%20classifier" title=" extra trees classifier"> extra trees classifier</a>, <a href="https://publications.waset.org/abstracts/search?q=mean%20absolute%20error" title=" mean absolute error"> mean absolute error</a> </p> <a href="https://publications.waset.org/abstracts/138978/walmart-sales-forecasting-using-machine-learning-in-python" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/138978.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">149</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">108</span> Blocking of Random Chat Apps at Home Routers for Juvenile Protection in South Korea</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Min%20Jin%20Kwon">Min Jin Kwon</a>, <a href="https://publications.waset.org/abstracts/search?q=Seung%20Won%20Kim"> Seung Won Kim</a>, <a href="https://publications.waset.org/abstracts/search?q=Eui%20Yeon%20Kim"> Eui Yeon Kim</a>, <a href="https://publications.waset.org/abstracts/search?q=Haeyoung%20Lee"> Haeyoung Lee</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Numerous anonymous chat apps that help people to connect with random strangers have been released in South Korea. However, they become a serious problem for young people since young people often use them for channels of prostitution or sexual violence. Although ISPs in South Korea are responsible for making inappropriate content inaccessible on their networks, they do not block traffic of random chat apps since 1) the use of random chat apps is entirely legal. 2) it is reported that they use HTTP proxy blocking so that non-HTTP traffic cannot be blocked. In this paper, we propose a service model that can block random chat apps at home routers. A service provider manages a blacklist that contains blocked apps’ information. Home routers that subscribe the service filter the traffic of the apps out using deep packet inspection. We have implemented a prototype of the proposed model, including a centralized server providing the blacklist, a Raspberry Pi-based home router that can filter traffic of the apps out, and an Android app used by the router’s administrator to locally customize the blacklist. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=deep%20packet%20inspection" title="deep packet inspection">deep packet inspection</a>, <a href="https://publications.waset.org/abstracts/search?q=internet%20filtering" title=" internet filtering"> internet filtering</a>, <a href="https://publications.waset.org/abstracts/search?q=juvenile%20protection" title=" juvenile protection"> juvenile protection</a>, <a href="https://publications.waset.org/abstracts/search?q=technical%20blocking" title=" technical blocking"> technical blocking</a> </p> <a href="https://publications.waset.org/abstracts/66686/blocking-of-random-chat-apps-at-home-routers-for-juvenile-protection-in-south-korea" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/66686.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">349</span> </span> </div> </div> <ul class="pagination"> <li class="page-item disabled"><span class="page-link">&lsaquo;</span></li> <li class="page-item active"><span class="page-link">1</span></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=anonymous&amp;page=2">2</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=anonymous&amp;page=3">3</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=anonymous&amp;page=4">4</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=anonymous&amp;page=5">5</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=anonymous&amp;page=2" rel="next">&rsaquo;</a></li> </ul> </div> </main> <footer> <div id="infolinks" class="pt-3 pb-2"> <div class="container"> <div style="background-color:#f5f5f5;" class="p-3"> <div class="row"> <div class="col-md-2"> <ul class="list-unstyled"> About <li><a href="https://waset.org/page/support">About Us</a></li> <li><a href="https://waset.org/page/support#legal-information">Legal</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/WASET-16th-foundational-anniversary.pdf">WASET celebrates its 16th foundational anniversary</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Account <li><a href="https://waset.org/profile">My Account</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Explore <li><a href="https://waset.org/disciplines">Disciplines</a></li> <li><a href="https://waset.org/conferences">Conferences</a></li> <li><a href="https://waset.org/conference-programs">Conference Program</a></li> <li><a href="https://waset.org/committees">Committees</a></li> <li><a href="https://publications.waset.org">Publications</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Research <li><a href="https://publications.waset.org/abstracts">Abstracts</a></li> <li><a href="https://publications.waset.org">Periodicals</a></li> <li><a href="https://publications.waset.org/archive">Archive</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Open Science <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Science-Philosophy.pdf">Open Science Philosophy</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Science-Award.pdf">Open Science Award</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Society-Open-Science-and-Open-Innovation.pdf">Open Innovation</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Postdoctoral-Fellowship-Award.pdf">Postdoctoral Fellowship Award</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Scholarly-Research-Review.pdf">Scholarly Research Review</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Support <li><a href="https://waset.org/page/support">Support</a></li> <li><a href="https://waset.org/profile/messages/create">Contact Us</a></li> <li><a href="https://waset.org/profile/messages/create">Report Abuse</a></li> </ul> </div> </div> </div> </div> </div> <div class="container text-center"> <hr style="margin-top:0;margin-bottom:.3rem;"> <a href="https://creativecommons.org/licenses/by/4.0/" target="_blank" class="text-muted small">Creative Commons Attribution 4.0 International License</a> <div id="copy" class="mt-2">&copy; 2024 World Academy of Science, Engineering and Technology</div> </div> </footer> <a href="javascript:" id="return-to-top"><i class="fas fa-arrow-up"></i></a> <div class="modal" id="modal-template"> <div class="modal-dialog"> <div class="modal-content"> <div class="row m-0 mt-1"> <div class="col-md-12"> <button type="button" class="close" data-dismiss="modal" aria-label="Close"><span aria-hidden="true">&times;</span></button> </div> </div> <div class="modal-body"></div> </div> </div> </div> <script src="https://cdn.waset.org/static/plugins/jquery-3.3.1.min.js"></script> <script src="https://cdn.waset.org/static/plugins/bootstrap-4.2.1/js/bootstrap.bundle.min.js"></script> <script src="https://cdn.waset.org/static/js/site.js?v=150220211556"></script> <script> jQuery(document).ready(function() { /*jQuery.get("https://publications.waset.org/xhr/user-menu", function (response) { jQuery('#mainNavMenu').append(response); });*/ jQuery.get({ url: "https://publications.waset.org/xhr/user-menu", cache: false }).then(function(response){ jQuery('#mainNavMenu').append(response); }); }); </script> </body> </html>

Pages: 1 2 3 4 5 6 7 8 9 10