CINXE.COM

Search results for: offensive lineman

<!DOCTYPE html> <html lang="en" dir="ltr"> <head> <!-- Google tag (gtag.js) --> <script async src="https://www.googletagmanager.com/gtag/js?id=G-P63WKM1TM1"></script> <script> window.dataLayer = window.dataLayer || []; function gtag(){dataLayer.push(arguments);} gtag('js', new Date()); gtag('config', 'G-P63WKM1TM1'); </script> <!-- Yandex.Metrika counter --> <script type="text/javascript" > (function(m,e,t,r,i,k,a){m[i]=m[i]||function(){(m[i].a=m[i].a||[]).push(arguments)}; m[i].l=1*new Date(); for (var j = 0; j < document.scripts.length; j++) {if (document.scripts[j].src === r) { return; }} k=e.createElement(t),a=e.getElementsByTagName(t)[0],k.async=1,k.src=r,a.parentNode.insertBefore(k,a)}) (window, document, "script", "https://mc.yandex.ru/metrika/tag.js", "ym"); ym(55165297, "init", { clickmap:false, trackLinks:true, accurateTrackBounce:true, webvisor:false }); </script> <noscript><div><img src="https://mc.yandex.ru/watch/55165297" style="position:absolute; left:-9999px;" alt="" /></div></noscript> <!-- /Yandex.Metrika counter --> <!-- Matomo --> <!-- End Matomo Code --> <title>Search results for: offensive lineman</title> <meta name="description" content="Search results for: offensive lineman"> <meta name="keywords" content="offensive lineman"> <meta name="viewport" content="width=device-width, initial-scale=1, minimum-scale=1, maximum-scale=1, user-scalable=no"> <meta charset="utf-8"> <link href="https://cdn.waset.org/favicon.ico" type="image/x-icon" rel="shortcut icon"> <link href="https://cdn.waset.org/static/plugins/bootstrap-4.2.1/css/bootstrap.min.css" rel="stylesheet"> <link href="https://cdn.waset.org/static/plugins/fontawesome/css/all.min.css" rel="stylesheet"> <link href="https://cdn.waset.org/static/css/site.css?v=150220211555" rel="stylesheet"> </head> <body> <header> <div class="container"> <nav class="navbar navbar-expand-lg navbar-light"> <a class="navbar-brand" href="https://waset.org"> <img src="https://cdn.waset.org/static/images/wasetc.png" alt="Open Science Research Excellence" title="Open Science Research Excellence" /> </a> <button class="d-block d-lg-none navbar-toggler ml-auto" type="button" data-toggle="collapse" data-target="#navbarMenu" aria-controls="navbarMenu" aria-expanded="false" aria-label="Toggle navigation"> <span class="navbar-toggler-icon"></span> </button> <div class="w-100"> <div class="d-none d-lg-flex flex-row-reverse"> <form method="get" action="https://waset.org/search" class="form-inline my-2 my-lg-0"> <input class="form-control mr-sm-2" type="search" placeholder="Search Conferences" value="offensive lineman" name="q" aria-label="Search"> <button class="btn btn-light my-2 my-sm-0" type="submit"><i class="fas fa-search"></i></button> </form> </div> <div class="collapse navbar-collapse mt-1" id="navbarMenu"> <ul class="navbar-nav ml-auto align-items-center" id="mainNavMenu"> <li class="nav-item"> <a class="nav-link" href="https://waset.org/conferences" title="Conferences in 2024/2025/2026">Conferences</a> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/disciplines" title="Disciplines">Disciplines</a> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/committees" rel="nofollow">Committees</a> </li> <li class="nav-item dropdown"> <a class="nav-link dropdown-toggle" href="#" id="navbarDropdownPublications" role="button" data-toggle="dropdown" aria-haspopup="true" aria-expanded="false"> Publications </a> <div class="dropdown-menu" aria-labelledby="navbarDropdownPublications"> <a class="dropdown-item" href="https://publications.waset.org/abstracts">Abstracts</a> <a class="dropdown-item" href="https://publications.waset.org">Periodicals</a> <a class="dropdown-item" href="https://publications.waset.org/archive">Archive</a> </div> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/page/support" title="Support">Support</a> </li> </ul> </div> </div> </nav> </div> </header> <main> <div class="container mt-4"> <div class="row"> <div class="col-md-9 mx-auto"> <form method="get" action="https://publications.waset.org/abstracts/search"> <div id="custom-search-input"> <div class="input-group"> <i class="fas fa-search"></i> <input type="text" class="search-query" name="q" placeholder="Author, Title, Abstract, Keywords" value="offensive lineman"> <input type="submit" class="btn_search" value="Search"> </div> </div> </form> </div> </div> <div class="row mt-3"> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Commenced</strong> in January 2007</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Frequency:</strong> Monthly</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Edition:</strong> International</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Paper Count:</strong> 41</div> </div> </div> </div> <h1 class="mt-3 mb-3 text-center" style="font-size:1.6rem;">Search results for: offensive lineman</h1> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">41</span> Evaluating the Performance of Offensive Lineman in the National Football League</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Nikhil%20Byanna">Nikhil Byanna</a>, <a href="https://publications.waset.org/abstracts/search?q=Abdolghani%20Ebrahimi"> Abdolghani Ebrahimi</a>, <a href="https://publications.waset.org/abstracts/search?q=Diego%20Klabjan"> Diego Klabjan</a> </p> <p class="card-text"><strong>Abstract:</strong></p> How does one objectively measure the performance of an individual offensive lineman in the NFL? The existing literature proposes various measures that rely on subjective assessments of game film, but has yet to develop an objective methodology to evaluate performance. Using a variety of statistics related to an offensive lineman’s performance, we develop a framework to objectively analyze the overall performance of an individual offensive lineman and determine specific linemen who are overvalued or undervalued relative to their salary. We identify eight players across the 2013-2014 and 2014-2015 NFL seasons that are considered to be overvalued or undervalued and corroborate the results with existing metrics that are based on subjective evaluation. To the best of our knowledge, the techniques set forth in this work have not been utilized in previous works to evaluate the performance of NFL players at any position, including offensive linemen. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=offensive%20lineman" title="offensive lineman">offensive lineman</a>, <a href="https://publications.waset.org/abstracts/search?q=player%20performance" title=" player performance"> player performance</a>, <a href="https://publications.waset.org/abstracts/search?q=NFL" title=" NFL"> NFL</a>, <a href="https://publications.waset.org/abstracts/search?q=machine%20learning" title=" machine learning"> machine learning</a> </p> <a href="https://publications.waset.org/abstracts/137608/evaluating-the-performance-of-offensive-lineman-in-the-national-football-league" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/137608.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">144</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">40</span> The Consumer Responses toward the Offensive Product Advertising</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Chin%20Tangtarntana">Chin Tangtarntana</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The main purpose of this study was to investigate the effects of animation in offensive product advertising. Experiment was conducted to collect consumer responses toward animated and static ads of offensive and non-offensive products. The study was conducted by distributing questionnaires to the target respondents. According to statistics from Innovative Internet Research Center, Thailand, majority of internet users are 18 &ndash; 44 years old. The results revealed an interaction between ad design and offensive product. Specifically, when used in offensive product advertisements, animated ads were not effective for consumer attention, but yielded positive response in terms of attitude toward product. The findings support that information processing model is accurate in predicting consumer cognitive response toward cartoon ads, whereas U&amp;G, arousal, and distinctive theory is more accurate in predicting consumer affective response. In practical, these findings can also be used to guide ad designers and marketers that are suitable for offensive products. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=animation" title="animation">animation</a>, <a href="https://publications.waset.org/abstracts/search?q=banner%20ad%20design" title=" banner ad design"> banner ad design</a>, <a href="https://publications.waset.org/abstracts/search?q=consumer%20responses" title=" consumer responses"> consumer responses</a>, <a href="https://publications.waset.org/abstracts/search?q=offensive%20product%20advertising" title=" offensive product advertising"> offensive product advertising</a>, <a href="https://publications.waset.org/abstracts/search?q=stock%20exchange%20of%20Thailand" title=" stock exchange of Thailand"> stock exchange of Thailand</a> </p> <a href="https://publications.waset.org/abstracts/55242/the-consumer-responses-toward-the-offensive-product-advertising" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/55242.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">269</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">39</span> Biological Expressions of Hamilton’s Rule in Human Populations: The Deep Psychological Influence of Defensive and Offensive Motivations Found in Human Conflicts and Sporting Events</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Monty%20Vacura">Monty Vacura</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Hamilton’s Rule is a universal law of biology expressed in protists, plants and animals. When applied to human populations, this model explains: 1) Origin of religion in society as a biopsychological need naturally selected to increase population size; 2) Instincts of racism expressed through intergroup competition; 3) Simultaneous selection for human cooperation and conflict, love and hate; 4) Places Dawkins’s selfish gene as the r, relationship variable; 5) Flipping the equation variable themes (close relationship to distant relationship, and benefit to threat) the new equation can now be used to identify the offensive and defensive sides of conflict; 6) Connection between sporting events and instinctive social messaging for stimulating offensive and defensive responses; 6) Pathway to reduce human sacrifice through manipulation of variables. This paper discusses the deep psychological influences of Hamilton’s Rule. Suggestions are provided to reduce human deaths via our instinctive sacrificial behavior, by consciously monitoring Hamilton’s Rule variables highlighted throughout our media outlets. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=psychology" title="psychology">psychology</a>, <a href="https://publications.waset.org/abstracts/search?q=Hamilton%E2%80%99s%20rule" title=" Hamilton’s rule"> Hamilton’s rule</a>, <a href="https://publications.waset.org/abstracts/search?q=evolution" title=" evolution"> evolution</a>, <a href="https://publications.waset.org/abstracts/search?q=human%20instincts" title=" human instincts"> human instincts</a> </p> <a href="https://publications.waset.org/abstracts/187335/biological-expressions-of-hamiltons-rule-in-human-populations-the-deep-psychological-influence-of-defensive-and-offensive-motivations-found-in-human-conflicts-and-sporting-events" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/187335.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">50</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">38</span> Development and Validation of the Dimensional Social Anxiety Scale: Assessment for the Offensive Type of Social Anxiety</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Ryotaro%20Ishikawa">Ryotaro Ishikawa</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Social Anxiety Disorder (SAD) is marked by the persistent fear of social or performance situations in which embarrassment may occur. In contrast, SA in Japan and in China is understood differently. Taijin Kyofusho (TKS) is a culture-bound subtype of SAD which has been the focus of recent research. TKS refers to a unique form of SAD found in Japanese and East Asian cultures characterized by a fear of offending others, in contrast to prototypical SAD in which the source of fear is typically concerned about one’s own embarrassment, humiliation, or rejection by others. Criteria for TKS partially overlap with but are distinct from SAD; a primary factor distinguishing TKS from SAD appears to be individualistic versus interdependent or collectivistic self-construals. The aim of this study was to develop a scale to assess the typical SAD and offensive type of SAD (TKS). This study aimed to test the internal consistency and validity of the scale (Dimensional Social Anxiety Scale: DSAS) using university students sample. For this, 148 university students were enrolled (male=90, female=58, age=19.77, Standard Deviation=1.04). As a result of confirmatory factor analysis, three-factor models of DSAS were verified (χ2(74) =128.36). These three factors were named ‘general’, ‘perfomance’, and ‘offensive’. DSAS were significantly correlated with the Liebowitz Social Anxiety Scale (r = .538, p < .001). Good internal consistencies were indicated on the three subscales (α = .76 to 89). In conclusion, this study indicated DSAS has adequate internal consistency and validity for assessing of multi-type of SADs. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=social%20anxiety" title="social anxiety">social anxiety</a>, <a href="https://publications.waset.org/abstracts/search?q=cognitive%20theory" title=" cognitive theory"> cognitive theory</a>, <a href="https://publications.waset.org/abstracts/search?q=assessment" title=" assessment"> assessment</a>, <a href="https://publications.waset.org/abstracts/search?q=anxiety%20disorder" title=" anxiety disorder"> anxiety disorder</a> </p> <a href="https://publications.waset.org/abstracts/110013/development-and-validation-of-the-dimensional-social-anxiety-scale-assessment-for-the-offensive-type-of-social-anxiety" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/110013.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">114</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">37</span> Predicting National Football League (NFL) Match with Score-Based System</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Marcho%20Setiawan%20Handok">Marcho Setiawan Handok</a>, <a href="https://publications.waset.org/abstracts/search?q=Samuel%20S.%20Lemma"> Samuel S. Lemma</a>, <a href="https://publications.waset.org/abstracts/search?q=Abdoulaye%20Fofana"> Abdoulaye Fofana</a>, <a href="https://publications.waset.org/abstracts/search?q=Naseef%20Mansoor"> Naseef Mansoor</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This paper is proposing a method to predict the outcome of the National Football League match with data from 2019 to 2022 and compare it with other popular models. The model uses open-source statistical data of each team, such as passing yards, rushing yards, fumbles lost, and scoring. Each statistical data has offensive and defensive. For instance, a data set of anticipated values for a specific matchup is created by comparing the offensive passing yards obtained by one team to the defensive passing yards given by the opposition. We evaluated the model’s performance by contrasting its result with those of established prediction algorithms. This research is using a neural network to predict the score of a National Football League match and then predict the winner of the game. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=game%20prediction" title="game prediction">game prediction</a>, <a href="https://publications.waset.org/abstracts/search?q=NFL" title=" NFL"> NFL</a>, <a href="https://publications.waset.org/abstracts/search?q=football" title=" football"> football</a>, <a href="https://publications.waset.org/abstracts/search?q=artificial%20neural%20network" title=" artificial neural network"> artificial neural network</a> </p> <a href="https://publications.waset.org/abstracts/160270/predicting-national-football-league-nfl-match-with-score-based-system" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/160270.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">84</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">36</span> The Use of Geographic Information System in Spatial Location of Waste Collection Points and the Attendant Impacts in Bida Urban Centre, Nigeria</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Daramola%20Japheth">Daramola Japheth</a>, <a href="https://publications.waset.org/abstracts/search?q=Tabiti%20S.%20Tabiti"> Tabiti S. Tabiti</a>, <a href="https://publications.waset.org/abstracts/search?q=Daramola%20Elizabeth%20Lara"> Daramola Elizabeth Lara</a>, <a href="https://publications.waset.org/abstracts/search?q=Hussaini%20Yusuf%20Atulukwu"> Hussaini Yusuf Atulukwu</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Bida urban centre is faced with solid waste management problems which are evident in the processes of waste generation, onsite storage, collection, transfer and transport, processing and disposal of solid waste. As a result of this the urban centre is defaced with litters of garbage and offensive odours due to indiscriminate dumping of refuse within the neighborhood. The partial removal of the fuel subsidy by the Federal Government in January 2012 leads to the formation of Subsidy Reinvestment Programmes (SURE-P), the Federal Government’s share is 41 per cent of the savings while the States and Local Government shared the remaining 59 percent. The SURE-P Committee in carrying out the mandate entrusted upon it by the President by identifying few critical infrastructure and social Safety nets that will ameliorate the sufferings of Nigerians. Waste disposal programme as an aspect of Solid waste management is one of the areas of focus for Niger State SURE-programmes incorporated under Niger State Environmental Protection Agency. The emergence of this programme as related to waste management in Bida has left behind a huge refuse spots along major corridors leading to a serious state of mess. Major roads within the LGA is now turned to dumping site, thereby obstructing traffic movements, while the aesthetic nature of the town became something else with offensive odours all over. This paper however wishes to underscore the use of geographical Information System in identifying solid waste sports towards effective solid waste management in the Bida urban centre. The paper examined the spatial location of dumping points and its impact on the environment. Hand held Global Position System was use to pick the dumping points location; where a total number of 91 dumping points collected were uploaded to ArcGis 10.2 for analysis. Interview method was used to derive information from households living near the dumping site. It was discovered that the people now have to cope with offensive odours, rodents invasion, dog and cats coming around the house as a result of inadequate and in prompt collection of waste around the neighborhood. The researchers hereby recommend that more points needs to be created with prompt collections of waste within the neighborhood by the necessary SURE - P agencies. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=dumping%20site" title="dumping site">dumping site</a>, <a href="https://publications.waset.org/abstracts/search?q=neighborhood" title=" neighborhood"> neighborhood</a>, <a href="https://publications.waset.org/abstracts/search?q=refuse" title=" refuse"> refuse</a>, <a href="https://publications.waset.org/abstracts/search?q=waste" title=" waste"> waste</a> </p> <a href="https://publications.waset.org/abstracts/25435/the-use-of-geographic-information-system-in-spatial-location-of-waste-collection-points-and-the-attendant-impacts-in-bida-urban-centre-nigeria" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/25435.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">529</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">35</span> Self-Supervised Learning for Hate-Speech Identification</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Shrabani%20Ghosh">Shrabani Ghosh</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Automatic offensive language detection in social media has become a stirring task in today's NLP. Manual Offensive language detection is tedious and laborious work where automatic methods based on machine learning are only alternatives. Previous works have done sentiment analysis over social media in different ways such as supervised, semi-supervised, and unsupervised manner. Domain adaptation in a semi-supervised way has also been explored in NLP, where the source domain and the target domain are different. In domain adaptation, the source domain usually has a large amount of labeled data, while only a limited amount of labeled data is available in the target domain. Pretrained transformers like BERT, RoBERTa models are fine-tuned to perform text classification in an unsupervised manner to perform further pre-train masked language modeling (MLM) tasks. In previous work, hate speech detection has been explored in Gab.ai, which is a free speech platform described as a platform of extremist in varying degrees in online social media. In domain adaptation process, Twitter data is used as the source domain, and Gab data is used as the target domain. The performance of domain adaptation also depends on the cross-domain similarity. Different distance measure methods such as L2 distance, cosine distance, Maximum Mean Discrepancy (MMD), Fisher Linear Discriminant (FLD), and CORAL have been used to estimate domain similarity. Certainly, in-domain distances are small, and between-domain distances are expected to be large. The previous work finding shows that pretrain masked language model (MLM) fine-tuned with a mixture of posts of source and target domain gives higher accuracy. However, in-domain performance of the hate classifier on Twitter data accuracy is 71.78%, and out-of-domain performance of the hate classifier on Gab data goes down to 56.53%. Recently self-supervised learning got a lot of attention as it is more applicable when labeled data are scarce. Few works have already been explored to apply self-supervised learning on NLP tasks such as sentiment classification. Self-supervised language representation model ALBERTA focuses on modeling inter-sentence coherence and helps downstream tasks with multi-sentence inputs. Self-supervised attention learning approach shows better performance as it exploits extracted context word in the training process. In this work, a self-supervised attention mechanism has been proposed to detect hate speech on Gab.ai. This framework initially classifies the Gab dataset in an attention-based self-supervised manner. On the next step, a semi-supervised classifier trained on the combination of labeled data from the first step and unlabeled data. The performance of the proposed framework will be compared with the results described earlier and also with optimized outcomes obtained from different optimization techniques. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=attention%20learning" title="attention learning">attention learning</a>, <a href="https://publications.waset.org/abstracts/search?q=language%20model" title=" language model"> language model</a>, <a href="https://publications.waset.org/abstracts/search?q=offensive%20language%20detection" title=" offensive language detection"> offensive language detection</a>, <a href="https://publications.waset.org/abstracts/search?q=self-supervised%20learning" title=" self-supervised learning"> self-supervised learning</a> </p> <a href="https://publications.waset.org/abstracts/147950/self-supervised-learning-for-hate-speech-identification" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/147950.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">106</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">34</span> The Online Power of Values: Adolescents’ Values as Predicting Factors of Their Online Bystanders’ Behavior While Witnessing Cyberbullying</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Sharon%20Cayzer-Haller">Sharon Cayzer-Haller</a>, <a href="https://publications.waset.org/abstracts/search?q=Shir%20Ginosar-Yaari"> Shir Ginosar-Yaari</a>, <a href="https://publications.waset.org/abstracts/search?q=Ariel%20Knafo-Noam"> Ariel Knafo-Noam</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The 21st century emerged as the digital century, and it is marked by a wide range of technological developments and changes, followed by potential changes in human communication skills. This technological revolution has changed human means of communication in many different ways: children and adolescents are spending much of their time in front of screens, participating in all sorts of online activities (even more so since the outbreak of COVID-19). The current study focuses on the role of values in adolescents' online bystanders' behavior. Values are cognitive, abstract representations of desirable goals that motivate behavior, and we hypothesized finding significant associations between specific values and differential online bystanders' feelings and behavior. Data was collected through online questionnaires that measured the participants' values, using Schwartz's short version of the Portrait Values Questionnaire (Schwartz, 2012). Participants’ online behavior was assessed in a questionnaire addressing reactions to situations of cyber shaming and cyberbullying, and specifically positive feelings and pro-social behavior (e.g., more supportive reactions) toward the victims, as opposed to different offensive behavioral reactions (such as laughing at the victim or ignoring the situation). Participants were recruited with a commercial research panel company, and 308 Israeli adolescents' values and online behavior were examined (mean age 15.2). As hypothesized, results show significant associations between self-transcendence values (universalism and benevolence) and conservation values (conformity, tradition, and security). These two groups of values were positively correlated with pro-social bystanders' feelings and behavior. On the opposite side of the values scale, the value of power was negatively associated with the participants' pro-social behavior, and positively associated with offensive behavioral reactions. Further research is needed, but we conclude that values serve as crucial guiding factors in directing adolescents' online feelings and behavior. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=adolescents" title="adolescents">adolescents</a>, <a href="https://publications.waset.org/abstracts/search?q=values" title=" values"> values</a>, <a href="https://publications.waset.org/abstracts/search?q=cyberbullying" title=" cyberbullying"> cyberbullying</a>, <a href="https://publications.waset.org/abstracts/search?q=online%20behavior" title=" online behavior"> online behavior</a>, <a href="https://publications.waset.org/abstracts/search?q=power" title=" power"> power</a> </p> <a href="https://publications.waset.org/abstracts/172350/the-online-power-of-values-adolescents-values-as-predicting-factors-of-their-online-bystanders-behavior-while-witnessing-cyberbullying" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/172350.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">66</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">33</span> Thermal Conductivity and Diffusivity of Alternative Refrigerants as Retrofit for Freon 12</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Mutalubi%20Aremu%20Akintunde">Mutalubi Aremu Akintunde</a>, <a href="https://publications.waset.org/abstracts/search?q=John%20Isa"> John Isa</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The negative impact on the atmosphere, of chlorofluorocarbon refrigerants (CFC) radical changes and measures were put in place to replace them. This has led to search for alternative refrigerants over the past decades. This paper presents thermal conductivity, diffusivity and performance of two alternative refrigerants as replacement to R12, which has been a versatile refrigerant which had turned the refrigeration industries around for decades, but one of the offensive refrigerants. The new refrigerants were coded RA1 (50%R600a/50%R134a;) and RA2 (70%R600a/30%R134a). The diffusivities for RA1 and RA2 were estimated to be, 2.76384 X 10-8 m2/s and 2.74386 X 10-8 m2/s respectively, while that of R12 under the same experimental condition is 2.43772 X 10-8 m2/s. The performances of the two refrigerants in a refrigerator initially designed for R12, were very close to that of R12. Other thermodynamic parameters showed that R12 can be replaced with both RA1 and RA2. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=alternative%20refrigerants" title="alternative refrigerants">alternative refrigerants</a>, <a href="https://publications.waset.org/abstracts/search?q=conductivity" title=" conductivity"> conductivity</a>, <a href="https://publications.waset.org/abstracts/search?q=diffusivity" title=" diffusivity"> diffusivity</a>, <a href="https://publications.waset.org/abstracts/search?q=performance" title=" performance"> performance</a>, <a href="https://publications.waset.org/abstracts/search?q=refrigerants" title=" refrigerants"> refrigerants</a> </p> <a href="https://publications.waset.org/abstracts/135834/thermal-conductivity-and-diffusivity-of-alternative-refrigerants-as-retrofit-for-freon-12" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/135834.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">162</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">32</span> Spanish Language Violence Corpus: An Analysis of Offensive Language in Twitter</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Beatriz%20Botella-Gil">Beatriz Botella-Gil</a>, <a href="https://publications.waset.org/abstracts/search?q=Patricio%20Mart%C3%ADnez-Barco"> Patricio Martínez-Barco</a>, <a href="https://publications.waset.org/abstracts/search?q=Lea%20Canales"> Lea Canales</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The Internet and ICT are an integral element of and omnipresent in our daily lives. Technologies have changed the way we see the world and relate to it. The number of companies in the ICT sector is increasing every year, and there has also been an increase in the work that occurs online, from sending e-mails to the way companies promote themselves. In social life, ICT’s have gained momentum. Social networks are useful for keeping in contact with family or friends that live far away. This change in how we manage our relationships using electronic devices and social media has been experienced differently depending on the age of the person. According to currently available data, people are increasingly connected to social media and other forms of online communication. Therefore, it is no surprise that violent content has also made its way to digital media. One of the important reasons for this is the anonymity provided by social media, which causes a sense of impunity in the victim. Moreover, it is not uncommon to find derogatory comments, attacking a person’s physical appearance, hobbies, or beliefs. This is why it is necessary to develop artificial intelligence tools that allow us to keep track of violent comments that relate to violent events so that this type of violent online behavior can be deterred. The objective of our research is to create a guide for detecting and recording violent messages. Our annotation guide begins with a study on the problem of violent messages. First, we consider the characteristics that a message should contain for it to be categorized as violent. Second, the possibility of establishing different levels of aggressiveness. To download the corpus, we chose the social network Twitter for its ease of obtaining free messages. We chose two recent, highly visible violent cases that occurred in Spain. Both of them experienced a high degree of social media coverage and user comments. Our corpus has a total of 633 messages, manually tagged, according to the characteristics we considered important, such as, for example, the verbs used, the presence of exclamations or insults, and the presence of negations. We consider it necessary to create wordlists that are present in violent messages as indicators of violence, such as lists of negative verbs, insults, negative phrases. As a final step, we will use automatic learning systems to check the data obtained and the effectiveness of our guide. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=human%20language%20technologies" title="human language technologies">human language technologies</a>, <a href="https://publications.waset.org/abstracts/search?q=language%20modelling" title=" language modelling"> language modelling</a>, <a href="https://publications.waset.org/abstracts/search?q=offensive%20language%20detection" title=" offensive language detection"> offensive language detection</a>, <a href="https://publications.waset.org/abstracts/search?q=violent%20online%20content" title=" violent online content"> violent online content</a> </p> <a href="https://publications.waset.org/abstracts/114711/spanish-language-violence-corpus-an-analysis-of-offensive-language-in-twitter" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/114711.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">131</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">31</span> Adaptations to Hamilton&#039;s Rule in Human Populations</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Monty%20Vacura">Monty Vacura</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Hamilton’s Rule is a universal law of biology expressed in protists, plants and animals. When applied to human populations, this model explains: 1) Origin of religion in society as a biopsychological need selected to increase population size; 2) Instincts of racism expressed through intergroup competition; 3) Simultaneous selection for human cooperation and conflict, love and hate; 4) Connection between sporting events and instinctive social messaging for stimulating offensive and defensive responses; 5) Pathway to reduce human sacrifice. This chapter discusses the deep psychological influences of Hamilton’s Rule. Suggestions are provided to reduce human deaths via our instinctive sacrificial behavior, by consciously monitoring Hamilton’s Rule variables highlighted throughout our media outlets. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=psychology" title="psychology">psychology</a>, <a href="https://publications.waset.org/abstracts/search?q=Hamilton%E2%80%99s%20rule" title=" Hamilton’s rule"> Hamilton’s rule</a>, <a href="https://publications.waset.org/abstracts/search?q=evolution" title=" evolution"> evolution</a>, <a href="https://publications.waset.org/abstracts/search?q=human%20instincts" title=" human instincts"> human instincts</a> </p> <a href="https://publications.waset.org/abstracts/179985/adaptations-to-hamiltons-rule-in-human-populations" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/179985.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">60</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">30</span> Democrat Support to Antiterorrism of USA from Hollywood: Homeland Series</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Selman%20Selim%20Aky%C3%BCz">Selman Selim Akyüz</a>, <a href="https://publications.waset.org/abstracts/search?q=Mete%20Kazaz"> Mete Kazaz</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Since The First Gulf War, USA, “Leader of The Free World” has been in trouble with terror. The USA created a complexity in The Middle East and paid the price with terrorist attacks in homeland. USA has made serious mistakes in terms of antiterrorism and fight against its supporters. Democrats have repaired damages caused by the Republican Party's management. Old methods about antiterrorism have been slowly abandoned. Hollywood, too, has played an important part in this war. Sometimes, Hollywood became an unquestioned patriot, sometimes it cried for the death of American Soldiers far away. In this study, messages in The Homeland, broadcast in the USA and a lot of countries around the world, are analyzed in terms of Washington’s foreign policy and position of the CIA in the fight against antiterrorism. The series reflect an orientalist viewpoint and has been criticized for offensive policy against the government. Homeland wanted to offer a perspective for the USA to be the “Leader of The Free World” again but with a liberal-democrat approach, dialogue and rational intelligence methods. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=antiterrorism" title="antiterrorism">antiterrorism</a>, <a href="https://publications.waset.org/abstracts/search?q=CIA" title=" CIA"> CIA</a>, <a href="https://publications.waset.org/abstracts/search?q=homeland" title=" homeland"> homeland</a>, <a href="https://publications.waset.org/abstracts/search?q=USA" title=" USA"> USA</a> </p> <a href="https://publications.waset.org/abstracts/7266/democrat-support-to-antiterorrism-of-usa-from-hollywood-homeland-series" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/7266.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">361</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">29</span> Existence of Financial Service Authority Prior to 2045</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Syafril%20Hendrik%20Hutabarat">Syafril Hendrik Hutabarat</a>, <a href="https://publications.waset.org/abstracts/search?q=Hartiwiningsih"> Hartiwiningsih</a>, <a href="https://publications.waset.org/abstracts/search?q=Pujiyono%20Suwadi"> Pujiyono Suwadi</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The Financial Service Authority (FSA) was formed as a response to the 1997 monetary crisis and the 2008 financial crisis so that it was more defensive in nature while developments in information and communication technology have required state policies to be more offensive to keep up with times. Reconstruction of Authorities of the FSA's Investigator is intended to keep the agency worthy to be part of an integrated criminal justice system in Indonesia which has implications for expanding its authority in line with efforts to protect and increase the welfare of the people. The results show that internal synergy between sub-sectors in the financial services sector is not optimised, some are even left behind so that the FSA is not truly an authority in the financial services sector. This research method is empirical. The goal of synergy must begin with internal synergy which has its moment when Indonesia gets a demographic bonus in the 2030s and becomes an international logistics hub supported by the national financial services sector. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=reconstruction" title="reconstruction">reconstruction</a>, <a href="https://publications.waset.org/abstracts/search?q=authorities" title=" authorities"> authorities</a>, <a href="https://publications.waset.org/abstracts/search?q=FSA%20investigators" title=" FSA investigators"> FSA investigators</a>, <a href="https://publications.waset.org/abstracts/search?q=synergy" title=" synergy"> synergy</a>, <a href="https://publications.waset.org/abstracts/search?q=demography" title=" demography"> demography</a> </p> <a href="https://publications.waset.org/abstracts/167372/existence-of-financial-service-authority-prior-to-2045" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/167372.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">77</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">28</span> Child Molesters’ Perceptions of Their Abusive Behavior in a Greek Prison</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Polychronis%20Voultsos">Polychronis Voultsos</a>, <a href="https://publications.waset.org/abstracts/search?q=Theodora%20Pandelidou"> Theodora Pandelidou</a>, <a href="https://publications.waset.org/abstracts/search?q=Alexandra%20K.%20Tsaroucha"> Alexandra K. Tsaroucha</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Aim: To explore child molesters' perceptions of their sexually offensive behavior in Greece. To our knowledge, there is a relative research gap on this topic. Method: A prospective qualitative study using in-depth interviews with eight child molesters who were convicted and imprisoned in a Greek prison. The research was conducted in May 2022. Results: Child molesters' cognitive distortions including justifications, rationalizations and minimizations emerged from our data analysis (content analysis). Importantly, child molesters. adopted a particularly daring ‘role reversal’. Participants reported themselves as being ‘victims’. They said that the children (namely, their victims) were the ones who made the first move and got them in the mood for having sex with the children. Furthermore, we discuss our results in the context of the existing international academic literature on the area of this research. Conclusions: Child molesters' different cognitive distortions emerged from our data analysis, with ‘role reversal’ being prevalent. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=child%20molesters" title="child molesters">child molesters</a>, <a href="https://publications.waset.org/abstracts/search?q=sex%20offenders" title=" sex offenders"> sex offenders</a>, <a href="https://publications.waset.org/abstracts/search?q=cognitive%20distortions" title=" cognitive distortions"> cognitive distortions</a>, <a href="https://publications.waset.org/abstracts/search?q=Greece" title=" Greece"> Greece</a> </p> <a href="https://publications.waset.org/abstracts/154123/child-molesters-perceptions-of-their-abusive-behavior-in-a-greek-prison" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/154123.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">124</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">27</span> Saudi State Arabia’s Struggle for a Post-Rentier Regional Order</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Omair%20Anas">Omair Anas</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The Persian Gulf has been in turmoil for a long time since the colonial administration has handed over the role to the small and weak kings and emirs who were assured of protection in return of many economic and security promises to them. The regional order, Saudi Arabia evolved was a rentier regional order secured by an expansion of rentier economy and taking responsibility for much of the expenses of the regional order on behalf of relatively poor countries. The two oil booms helped the Saudi state to expand the 'rentier order' driven stability and bring the countries like Egypt, Jordan, Syria, and Palestine under its tutelage. The disruptive misadventure, however, came with Iran's proclamation of the Islamic Revolution in 1979 which it wanted to be exported to its 'un-Islamic and American puppet' Arab neighbours. For Saudi Arabia, even the challenge presented by the socialist-nationalist Arab dictators like Gamal Abdul Nasser and Hafez Al-Assad was not that much threatening to the Saudi Arabia’s then-defensive realism. In the Arab uprisings, the Gulf monarchies saw a wave of insecurity and Iran found it an opportune time to complete the revolutionary process it could not complete after 1979. An alliance of convenience and ideology between Iran and Islamist groups had the real potential to challenge both Saudi Arabia’s own security and its leadership in the region. The disruptive threat appeared at a time when the Saudi state had already sensed an impending crisis originating from the shifts in the energy markets. Low energy prices, declining global demands, and huge investments in alternative energy resources required Saudi Arabia to rationalize its economy according to changing the global political economy. The domestic Saudi reforms remained gradual until the death of King Abdullah in 2015. What is happening now in the region, the Qatar crisis, the Lebanon crisis and the Saudi-Iranian proxy war in Iraq, Syria, and Yemen has combined three immediate objectives, rationalising Saudi economy and most importantly, the resetting the Saudi royal power for Saudi Arabia’s longest-serving future King Mohammad bin Salman. The Saudi King perhaps has no time to wait and watch the power vacuum appearing because of Iran’s expansionist foreign policy. The Saudis appear to be employing an offensive realism by advancing a pro-active regional policy to counter Iran’s threatening influence amid disappearing Western security from the region. As the Syrian civil war is coming to a compromised end with ceding much ground to Iran-controlled militias, Hezbollah and Al-Hashad, the Saudi state has lost much ground in these years and the threat from Iranian proxies is more than a reality, more clearly in Bahrain, Iraq, Syria, and Yemen. This paper attempts to analyse the changing Saudi behaviour in the region, which, the author understands, is shaped by an offensive-realist approach towards finding a favourable security environment for the Saudi-led regional order, a post-rentier order perhaps. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=terrorism" title="terrorism">terrorism</a>, <a href="https://publications.waset.org/abstracts/search?q=Saudi%20Arabia" title=" Saudi Arabia"> Saudi Arabia</a>, <a href="https://publications.waset.org/abstracts/search?q=Rentier%20State" title=" Rentier State"> Rentier State</a>, <a href="https://publications.waset.org/abstracts/search?q=gulf%20crisis" title=" gulf crisis"> gulf crisis</a> </p> <a href="https://publications.waset.org/abstracts/90116/saudi-state-arabias-struggle-for-a-post-rentier-regional-order" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/90116.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">136</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">26</span> Conversion of Carcinogenic Liquid-Wastes of Poly Vinyl Chloride (PVC) Industry to ‎an Environmentally Safe Product: Corrosion Inhibitor and Biocide</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Mohamed%20A.%20Hegazy">Mohamed A. Hegazy</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Most of Poly Vinyl Chloride (PVC) petrochemical companies produce huge amount of byproduct which characterized as carcinogenic liquid-wastes, insoluble in water, highly corrosive and highly offensive. This byproduct is partially use, a small part, in the production of hydrochloric acid and the huge part is a waste. Therefore, the aim of this work was to conversion of such PVC wastes, to an environmentally safe product that act as a corrosion Inhibitor for metals in ‎aqueous media and as a biocide for microorganisms. This conversion method was accomplished mainly to protect the environment and to produce high economic value-products. The conversion process was established and the final product was tested for the toxicity, water solubility in comparison to the crude product. Furthermore, the end product was tested as a corrosion inhibitor in 1M HCl and as a broad-spectrum biocide against standard microbial strains and against the environmentally isolated Sulfate-reducing bacteria (SRB) microbial community. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=PVC" title="PVC">PVC</a>, <a href="https://publications.waset.org/abstracts/search?q=surfactant" title=" surfactant"> surfactant</a>, <a href="https://publications.waset.org/abstracts/search?q=corrosion%20inhibitor" title=" corrosion inhibitor"> corrosion inhibitor</a>, <a href="https://publications.waset.org/abstracts/search?q=biocide" title=" biocide"> biocide</a>, <a href="https://publications.waset.org/abstracts/search?q=SRB" title=" SRB"> SRB</a> </p> <a href="https://publications.waset.org/abstracts/127122/conversion-of-carcinogenic-liquid-wastes-of-poly-vinyl-chloride-pvc-industry-to-an-environmentally-safe-product-corrosion-inhibitor-and-biocide" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/127122.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">123</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">25</span> Multiplicity of Themes in Philip Roth&#039;s Fiction: Expressing Contemporariness</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Shivani%20Sharma">Shivani Sharma</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Philip Roth is one of the most significant contemporary American novelists and is always engaged in creative activities. He is a recognized and prolific novelist of post-World War II period, an author of over 29 books where his text serves as a picture as well as critiques of contemporary culture from World War II to post 9/11 America. Roth is an honored author who has been awarded with prestigious literary awards. In his works he explains what is important to contemporary American Jews. His fiction is known for its autobiographical character, for blurring the distinction between reality and fiction, also for challenging exploration of Jewish and American identity. In many ways Roth is also considered as postmodern writer as his works can be read in the context of being a postmodern narration. He also stands as one of the most offensive novelist living today and has been read as a misogynist, a liberal defender, a solipsist, an anti-communist, and even an anti-Semite. It is not only the variety of contemporary issues that are discussed in his works but we can also see the strong element of multiplicity of themes in his writings. This paper is an attempt to explore the multiplicity of themes in the fiction of Philip Roth. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=multiple%20themes" title="multiple themes">multiple themes</a>, <a href="https://publications.waset.org/abstracts/search?q=Jewish-American%20literature" title=" Jewish-American literature"> Jewish-American literature</a>, <a href="https://publications.waset.org/abstracts/search?q=Philip%20Roth" title=" Philip Roth"> Philip Roth</a>, <a href="https://publications.waset.org/abstracts/search?q=expressing%20contemporariness" title=" expressing contemporariness"> expressing contemporariness</a> </p> <a href="https://publications.waset.org/abstracts/21768/multiplicity-of-themes-in-philip-roths-fiction-expressing-contemporariness" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/21768.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">446</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">24</span> Hate Speech Detection in Tunisian Dialect</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Helmi%20Baazaoui">Helmi Baazaoui</a>, <a href="https://publications.waset.org/abstracts/search?q=Mounir%20Zrigui"> Mounir Zrigui</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This study addresses the challenge of hate speech detection in Tunisian Arabic text, a critical issue for online safety and moderation. Leveraging the strengths of the AraBERT model, we fine-tuned and evaluated its performance against the Bi-LSTM model across four distinct datasets: T-HSAB, TNHS, TUNIZI-Dataset, and a newly compiled dataset with diverse labels such as Offensive Language, Racism, and Religious Intolerance. Our experimental results demonstrate that AraBERT significantly outperforms Bi-LSTM in terms of Recall, Precision, F1-Score, and Accuracy across all datasets. The findings underline the robustness of AraBERT in capturing the nuanced features of Tunisian Arabic and its superior capability in classification tasks. This research not only advances the technology for hate speech detection but also provides practical implications for social media moderation and policy-making in Tunisia. Future work will focus on expanding the datasets and exploring more sophisticated architectures to further enhance detection accuracy, thus promoting safer online interactions. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=hate%20speech%20detection" title="hate speech detection">hate speech detection</a>, <a href="https://publications.waset.org/abstracts/search?q=Tunisian%20Arabic" title=" Tunisian Arabic"> Tunisian Arabic</a>, <a href="https://publications.waset.org/abstracts/search?q=AraBERT" title=" AraBERT"> AraBERT</a>, <a href="https://publications.waset.org/abstracts/search?q=Bi-LSTM" title=" Bi-LSTM"> Bi-LSTM</a>, <a href="https://publications.waset.org/abstracts/search?q=Gemini%20annotation%20tool" title=" Gemini annotation tool"> Gemini annotation tool</a>, <a href="https://publications.waset.org/abstracts/search?q=social%20media%20moderation" title=" social media moderation"> social media moderation</a> </p> <a href="https://publications.waset.org/abstracts/193877/hate-speech-detection-in-tunisian-dialect" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/193877.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">11</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">23</span> Guided Information Campaigns for Counter-Terrorism: Behavioral Approach to Interventions Regarding Polarized Societal Network</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Joshua%20Midha">Joshua Midha</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The basis for information campaigns and behavioral interventions has long reigned as a tactic. From the Soviet-era propaganda machines to the opinion hijacks in Iran, these measures are now commonplace and are used for dissemination and disassembly. However, the use of these tools for strategic diffusion, specifically in a counter-terrorism setting, has only been explored on the surface. This paper aims to introduce a larger conceptual portion of guided information campaigns into preexisting terror cells and situations. It provides an alternative, low-risk intervention platform for future military strategy. This paper highlights a theoretical framework to lay out the foundationary details and explanations for behavioral interventions and moves into using a case study to highlight the possibility of implementation. It details strategies, resources, circumstances, and risk factors for intervention. It also sets an expanding foundation for offensive PsyOps and argues for tactical diffusion of information to battle extremist sentiment. The two larger frameworks touch on the internal spread of information within terror cells and external political sway, thus charting a larger holistic purpose of strategic operations. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=terrorism" title="terrorism">terrorism</a>, <a href="https://publications.waset.org/abstracts/search?q=behavioral%20intervention" title=" behavioral intervention"> behavioral intervention</a>, <a href="https://publications.waset.org/abstracts/search?q=propaganda" title=" propaganda"> propaganda</a>, <a href="https://publications.waset.org/abstracts/search?q=SNA" title=" SNA"> SNA</a>, <a href="https://publications.waset.org/abstracts/search?q=extremism" title=" extremism"> extremism</a> </p> <a href="https://publications.waset.org/abstracts/155474/guided-information-campaigns-for-counter-terrorism-behavioral-approach-to-interventions-regarding-polarized-societal-network" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/155474.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">95</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">22</span> The Role of the Defense and Future War in Ukraine</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Matthew%20J.%20Flynn">Matthew J. Flynn</a> </p> <p class="card-text"><strong>Abstract:</strong></p> In early 2022, a thirty-mile column of Russian armor and assault vehicles sat poised to move south on the road to Kiev. That force has withdrawn as the Russians concentrate on attacking eastern Ukraine. Vladimir Putin’s armies appear content to destroy cities in an effort to attrit the Ukrainian will to continue fighting. That pivot signifies the acceptance of the ascendancy of the defense that now dictates any battlefield world-wide. To defeat what military theorist Carl von Clausewitz labeled “the stronger form of war” with a successful offensive requires an exercise in future war. In the past, the ascendancy of the defense has been overcome by a number of things including the application of superior leadership, better technology, organizational adaptation, and surpassing environmental limitations. A look at how each of these factors came to impact battle can tell us a great deal about what Ukraine means to tomorrow’s fight, and where the focus should lie to win the next war. Civilians presently secure the defensive ascendancy impacting warfare by dominating the shifts from domain to domain thanks to controlling access to cyberspace. That mandate will be tested and eventually falter. This paper tests the desirability of that proposition, as well as hoping for something more from humanity other than repeated and frequent wars making future war look much like past wars. As nations struggle to control cyberspace, a referendum on war as part of the human condition comes into focus. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=cyber" title="cyber">cyber</a>, <a href="https://publications.waset.org/abstracts/search?q=domains" title=" domains"> domains</a>, <a href="https://publications.waset.org/abstracts/search?q=future%20war" title=" future war"> future war</a>, <a href="https://publications.waset.org/abstracts/search?q=Putin" title=" Putin"> Putin</a>, <a href="https://publications.waset.org/abstracts/search?q=Ukraine" title=" Ukraine"> Ukraine</a> </p> <a href="https://publications.waset.org/abstracts/154053/the-role-of-the-defense-and-future-war-in-ukraine" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/154053.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">113</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">21</span> Predicting the Next Offensive Play Types will be Implemented to Maximize the Defense’s Chances of Success in the National Football League</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Chris%20Schoborg">Chris Schoborg</a>, <a href="https://publications.waset.org/abstracts/search?q=Morgan%20C.%20Wang"> Morgan C. Wang</a> </p> <p class="card-text"><strong>Abstract:</strong></p> In the realm of the National Football League (NFL), substantial dedication of time and effort is invested by both players and coaches in meticulously analyzing the game footage of their opponents. The primary aim is to anticipate the actions of the opposing team. Defensive players and coaches are especially focused on deciphering their adversaries' intentions to effectively counter their strategies. Acquiring insights into the specific play type and its intended direction on the field would confer a significant competitive advantage. This study establishes pre-snap information as the cornerstone for predicting both the play type (e.g., deep pass, short pass, or run) and its spatial trajectory (right, left, or center). The dataset for this research spans the regular NFL season data for all 32 teams from 2013 to 2022. This dataset is acquired using the nflreadr package, which conveniently extracts play-by-play data from NFL games and imports it into the R environment as structured datasets. In this study, we employ a recently developed machine learning algorithm, XGBoost. The final predictive model achieves an impressive lift of 2.61. This signifies that the presented model is 2.61 times more effective than random guessing—a significant improvement. Such a model has the potential to markedly enhance defensive coaches' ability to formulate game plans and adequately prepare their players, thus mitigating the opposing offense's yardage and point gains. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=lift" title="lift">lift</a>, <a href="https://publications.waset.org/abstracts/search?q=NFL" title=" NFL"> NFL</a>, <a href="https://publications.waset.org/abstracts/search?q=sports%20analytics" title=" sports analytics"> sports analytics</a>, <a href="https://publications.waset.org/abstracts/search?q=XGBoost" title=" XGBoost"> XGBoost</a> </p> <a href="https://publications.waset.org/abstracts/175354/predicting-the-next-offensive-play-types-will-be-implemented-to-maximize-the-defenses-chances-of-success-in-the-national-football-league" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/175354.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">56</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">20</span> Bioremediation of Paper Mill Effluent by Microbial Consortium Comprising Bacterial and Fungal Strain and Optimizing the Effect of Carbon Source</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Priya%20Tomar">Priya Tomar</a>, <a href="https://publications.waset.org/abstracts/search?q=Pallavi%20Mittal"> Pallavi Mittal</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Bioremediation has been recognized as an environment friendly and less expensive method which involves the natural processes resulting in the efficient conversion of hazardous compounds into innocuous products. The pulp and paper mill effluent is one of the high polluting effluents amongst the effluents obtained from polluting industries. The colouring body present in the wastewater from pulp and paper mill is organic in nature and is comprised of wood extractives, tannin, resins, synthetic dyes, lignin, and its degradation products formed by the action of chlorine on lignin which imparts an offensive colour to the water. These mills use different chemical process for paper manufacturing due to which lignified chemicals are released into the environment. Therefore, the chemical oxygen demand (COD) of the emanating stream is quite high. For solving the above problem we present this paper with some new techniques that were developed for the efficiency of paper mill effluents. In the present study we utilized the consortia of fungal and bacterial strain and the treatment named as C1, C2, and C3 for the decolourization of paper mill effluent. During the study, role of carbon source i.e. glucose was studied for decolourization. From the results it was observed that a maximum colour reduction of 66.9%, COD reduction of 51.8%, TSS reduction of 0.34%, TDS reduction of 0.29% and pH changes of 4.2 is achieved by consortia of Aspergillus niger with Pseudomonas aeruginosa. Data indicated that consortia of Aspergillus niger with Pseudomonas aeruginosa is giving better result with glucose. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=bioremediation" title="bioremediation">bioremediation</a>, <a href="https://publications.waset.org/abstracts/search?q=decolourization" title=" decolourization"> decolourization</a>, <a href="https://publications.waset.org/abstracts/search?q=black%20liquor" title=" black liquor"> black liquor</a>, <a href="https://publications.waset.org/abstracts/search?q=mycoremediation" title=" mycoremediation"> mycoremediation</a> </p> <a href="https://publications.waset.org/abstracts/33152/bioremediation-of-paper-mill-effluent-by-microbial-consortium-comprising-bacterial-and-fungal-strain-and-optimizing-the-effect-of-carbon-source" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/33152.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">411</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">19</span> Collagen Scaffold Incorporated with Macrotyloma uniflorum Plant Extracts as a–Burn/Wound Dressing Material, in Vitro and in Vivo Evaluation</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Thangavelu%20Muthukumar">Thangavelu Muthukumar</a>, <a href="https://publications.waset.org/abstracts/search?q=Thotapalli%20Parvathaleswara%20Sastry"> Thotapalli Parvathaleswara Sastry</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Collagen is the most abundantly available connective tissue protein, which is being used as a biomaterial for various biomedical applications. Presently, fish wastes are disposed improperly which is causing serious environmental pollution resulting in offensive odour. Fish scales are promising source of Type I collagen. Medicinal plants have been used since time immemorial for treatment of various ailments of skin and dermatological disorders especially cuts, wounds, and burns. Developing biomaterials from the natural sources which are having wound healing properties within the search of a common man is the need of hour, particularly in developing and third world countries. With these objectives in view we have developed a wound dressing material containing fish scale collagen (FSC) incorporated with Macrotyloma uniflorum plant extract (PE). The wound dressing composite was characterized for its physiochemical properties using conventional methods. SEM image revealed that the composite has fibrous and porous surface which helps in transportation of oxygen as well as absorbing wound fluids. The biomaterial has shown 95% biocompatibility with required mechanical strength and has exhibited antimicrobial properties. This biomaterial has been used as a wound dressing material in experimental wounds of rats. The healing pattern was evaluated by macroscopic observations, panimetric studies, biochemical, histopathological observations. The results showed faster healing pattern in the wounds treated with CSPE compared to the other composites used in this study and untreated control. These experiments clearly suggest that CSPE can be used as wound/burn dressing materials. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=collagen" title="collagen">collagen</a>, <a href="https://publications.waset.org/abstracts/search?q=wound%20dressing" title=" wound dressing"> wound dressing</a>, <a href="https://publications.waset.org/abstracts/search?q=Macrotyloma%20uniflorum" title=" Macrotyloma uniflorum"> Macrotyloma uniflorum</a>, <a href="https://publications.waset.org/abstracts/search?q=burn%20dressing" title=" burn dressing"> burn dressing</a> </p> <a href="https://publications.waset.org/abstracts/4243/collagen-scaffold-incorporated-with-macrotyloma-uniflorum-plant-extracts-as-a-burnwound-dressing-material-in-vitro-and-in-vivo-evaluation" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/4243.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">417</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">18</span> Disrupting Microaggressions in the Academic Workplace: The Role of Bystanders</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Tugba%20Metinyurt">Tugba Metinyurt</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Microaggressions are small, everyday verbal and behavioral slights that communicate derogatory messages to individuals on the basis of their group membership. They are often unintentional and not intended to do harm, and yet research has shown that their cumulative effect can be quite detrimental. The current pilot study focuses on the role of bystanders disrupting gender microaggressions and potential barriers of challenging them in the academic workplace at University of Massachusetts Lowell (UML). The participants in this study included 9 male and 20 female from faculty of different disciplines at UML. A Barriers to Intervening Questionnaire asks respondents 1) to rate barriers to intervening in situations described in three short vignettes and 2) to identify more general factors that make it more or less likely that UML faculty will intervene in microaggressions as bystanders through response to an open-ended question. Responses to the questionnaire scales that ask about respondents’ own reactions to the vignettes indicated that faculty may hesitate to interrupt gender microaggressions to avoid being perceived as offensive, losing their relationship with their coworkers, and engaging possible arguments. Responses to the open-ended question, which asked more generally about perceived barriers, revealed a few additional barriers; lack of interpersonal and institutional support, repercussion to self, personal orientation/personality, and privilege. Interestingly, participants tended to describe the obstacles presented in the questionnaire as unlikely to prevent them from intervening, yet the same barriers were suggested to be issues for others on the open-ended questions. Limitations and future directions are discussed. The barriers identified in this research can inform efforts to create bystander trainings to interrupt microaggressions in the academic workplaces. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=academic%20workplace" title="academic workplace">academic workplace</a>, <a href="https://publications.waset.org/abstracts/search?q=bystander%20behavior" title=" bystander behavior"> bystander behavior</a>, <a href="https://publications.waset.org/abstracts/search?q=implicit%20bias" title=" implicit bias"> implicit bias</a>, <a href="https://publications.waset.org/abstracts/search?q=microaggressions" title=" microaggressions"> microaggressions</a> </p> <a href="https://publications.waset.org/abstracts/96219/disrupting-microaggressions-in-the-academic-workplace-the-role-of-bystanders" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/96219.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">152</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">17</span> Application of 3-6 Years Old Children Basketball Appropriate Forms of Teaching Auxiliary Equipment in Early Childhood Basketball Game</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Hai%20Zeng">Hai Zeng</a>, <a href="https://publications.waset.org/abstracts/search?q=Anqing%20Liu"> Anqing Liu</a>, <a href="https://publications.waset.org/abstracts/search?q=Shuguang%20Dan"> Shuguang Dan</a>, <a href="https://publications.waset.org/abstracts/search?q=Ying%20Zhang"> Ying Zhang</a>, <a href="https://publications.waset.org/abstracts/search?q=Yan%20Li"> Yan Li</a>, <a href="https://publications.waset.org/abstracts/search?q=Zihang%20Zeng"> Zihang Zeng</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Children are strong; the country strong, the development of children Basketball is a strategic advantage. Common forms of basketball equipment has been difficult to meet the needs of young children teaching the game of basketball, basketball development for 3-6 years old children in the form of appropriate teaching aids is a breakthrough basketball game teaching children bottlenecks, improve teaching critical path pleasure, but also the development of early childhood basketball a necessary requirement. In this study, literature, questionnaires, focus group interviews, comparative analysis, for domestic and foreign use of 12 kinds of basketball teaching aids (cloud computing MINI basketball, adjustable basketball MINI, MINI basketball court, shooting assist paw print ball, dribble goggles, dribbling machine, machine cartoon shooting, rebounding machine, against the mat, elastic belt, ladder, fitness ball), from fun and improve early childhood shooting technique, dribbling technology, as well as offensive and defensive rebounding against technology conduct research on conversion technology. The results show that by using appropriate forms of teaching children basketball aids, can effectively improve children's fun basketball game, targeted to improve a technology, different types of aids from different perspectives enrich the connotation of children basketball game. Recommended for children of color psychology, cartoon and environmentally friendly material production aids, and increase research efforts basketball aids children, encourage children to sports teachers aids applications. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=appropriate%20forms%20of%20children%20basketball" title="appropriate forms of children basketball">appropriate forms of children basketball</a>, <a href="https://publications.waset.org/abstracts/search?q=auxiliary%20equipment" title=" auxiliary equipment"> auxiliary equipment</a>, <a href="https://publications.waset.org/abstracts/search?q=appli" title=" appli"> appli</a>, <a href="https://publications.waset.org/abstracts/search?q=MINI%20basketball" title=" MINI basketball"> MINI basketball</a>, <a href="https://publications.waset.org/abstracts/search?q=3-6%20years%20old%20children" title=" 3-6 years old children"> 3-6 years old children</a>, <a href="https://publications.waset.org/abstracts/search?q=teaching" title=" teaching"> teaching</a> </p> <a href="https://publications.waset.org/abstracts/46262/application-of-3-6-years-old-children-basketball-appropriate-forms-of-teaching-auxiliary-equipment-in-early-childhood-basketball-game" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/46262.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">386</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">16</span> Evaluating the Use of Manned and Unmanned Aerial Vehicles in Strategic Offensive Tasks</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Yildiray%20Korkmaz">Yildiray Korkmaz</a>, <a href="https://publications.waset.org/abstracts/search?q=Mehmet%20Aksoy"> Mehmet Aksoy</a> </p> <p class="card-text"><strong>Abstract:</strong></p> In today's operations, countries want to reach their aims in the shortest way due to economical, political and humanitarian aspects. The most effective way of achieving this goal is to be able to penetrate strategic targets. Strategic targets are generally located deep inside of the countries and are defended by modern and efficient surface to air missiles (SAM) platforms which are operated as integrated with Intelligence, Surveillance and Reconnaissance (ISR) systems. On the other hand, these high valued targets are buried deep underground and hardened with strong materials against attacks. Therefore, to penetrate these targets requires very detailed intelligence. This intelligence process should include a wide range that is from weaponry to threat assessment. Accordingly, the framework of the attack package will be determined. This mission package has to execute missions in a high threat environment. The way to minimize the risk which depends on loss of life is to use packages which are formed by UAVs. However, some limitations arising from the characteristics of UAVs restricts the performance of the mission package consisted of UAVs. So, the mission package should be formed with UAVs under the leadership of a fifth generation manned aircraft. Thus, we can minimize the limitations, easily penetrate in the deep inside of the enemy territory with minimum risk, make a decision according to ever-changing conditions and finally destroy the strategic targets. In this article, the strengthens and weakness aspects of UAVs are examined by SWOT analysis. And also, it revealed features of a mission package and presented as an example what kind of a mission package we should form in order to get marginal benefit and penetrate into strategic targets with the development of autonomous mission execution capability in the near future. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=UAV" title="UAV">UAV</a>, <a href="https://publications.waset.org/abstracts/search?q=autonomy" title=" autonomy"> autonomy</a>, <a href="https://publications.waset.org/abstracts/search?q=mission%20package" title=" mission package"> mission package</a>, <a href="https://publications.waset.org/abstracts/search?q=strategic%20attack" title=" strategic attack"> strategic attack</a>, <a href="https://publications.waset.org/abstracts/search?q=mission%20planning" title=" mission planning"> mission planning</a> </p> <a href="https://publications.waset.org/abstracts/10355/evaluating-the-use-of-manned-and-unmanned-aerial-vehicles-in-strategic-offensive-tasks" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/10355.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">550</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">15</span> Fashion Appropriation: A Study in Awareness of Crossing Cultural Boundaries in Design</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Anahita%20Suri">Anahita Suri</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Myriad cultures form the warp and weft of the fabric of this world. The last century saw mass migration of people across geographical boundaries, owing to industrialization and globalization. These people took with them their cultures, costumes, traditions, and folklore, which mingled with the local cultures to create something new and place it in a different context to make it contemporary. With the surge in population and growth of the fashion industry, there has been an increasing demand for innovative and individual fashion, from street markets to luxury brands. Exhausted by local influences, designers take inspiration from the so called ‘low’ culture and create artistic products, place it in a different context, and the end-product is categorized as ‘high’ culture. It is challenging as to why a design/culture is ‘high’ or ‘low’. Who decides which works, practices, activities, etc., are ‘high’ and which are ‘low’? The justification for this distinction is often found not in the design itself but the context attached to it. Also, the concept of high/ low is relative to time- what is ‘high’ today can be ‘low’ tomorrow and ‘high’ again the day after. This raises certain concerns. Firstly, it is sad that a culture which offers inspiration is looked down upon as ‘low’ culture. Secondly, it is ironic because the so designated ‘high’ culture is a manipulation of the truth from the authentic ‘low’ culture, which is capable of true expression. When you borrow from a different culture, you pretend to be authentic because you actually are not. Finally, it is important to be aware of crossing cultural boundaries and the context attached to a design/product so as to use it a responsible way that communicates the design without offending anyone. Is it ok for a person’s cultural identity to become another person’s fashion accessory? This essay explores the complex, multi-layered subject of fashion appropriation and aims to provoke debate over cultural ‘borrowing’ and create awareness that commodification of cultural symbols and iconography in fashion is inappropriate and offensive and not the same as ‘celebrating cultural differences’. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=context" title="context">context</a>, <a href="https://publications.waset.org/abstracts/search?q=culture" title=" culture"> culture</a>, <a href="https://publications.waset.org/abstracts/search?q=fashion%20appropriation" title=" fashion appropriation"> fashion appropriation</a>, <a href="https://publications.waset.org/abstracts/search?q=inoffensive" title=" inoffensive"> inoffensive</a>, <a href="https://publications.waset.org/abstracts/search?q=responsible" title=" responsible"> responsible</a> </p> <a href="https://publications.waset.org/abstracts/127266/fashion-appropriation-a-study-in-awareness-of-crossing-cultural-boundaries-in-design" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/127266.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">124</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">14</span> Experiences of Homophobia, Machismo and Misogyny in Tourist Destinations: A Netnography in a Facebook Community of LGBT Backpackers</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Renan%20De%20Caldas%20Honorato">Renan De Caldas Honorato</a>, <a href="https://publications.waset.org/abstracts/search?q=Ana%20Augusta%20Ferreira%20De%20Freitas"> Ana Augusta Ferreira De Freitas</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Homosexuality is still criminalized in a large number of countries. In some of them, being gay or lesbian can even be punished by death. Added to this context, the experiences of social discrimination faced by the LGBT population, including homophobia, machismo and misogyny, cause numerous restrictions throughout their lives. The possibility of confronting these challenges in moments that should be pleasant, such as on a trip or on vacation, is unpleasant, to say the least. In the current scenario of intensifying the use of Social network sites (SNSs) to search for information, including in the tourist area, this work aims to analyze the sharing of tourist experiences with situations of confrontation and perceptions of homophobia, machismo and misogyny, and restrictions suffered in tourist destinations. The fieldwork is a community of LGBT backpackers based on Facebook. Netnography was the core method adopted. A qualitative approach was conducted and 463 publications posted from January to December 2020 were assessed through the computer-mediated discourse analysis (CMDA). The results suggest that these publications exist to identify the potential exposure to these offensive behaviors while traveling. Individuals affirm that the laws, positive or not, in relation to the LGBT public are not the only factors for a place to be defined as safe or not for gay travelers. The social situation of a country and its laws are quite different and this is the main target of these publications. The perception of others about the chosen destination is more important than knowing your rights and the legal status of each country and it also lessens uncertainty, even when they are never totally confident when choosing a travel destination. In certain circumstances, sexual orientation also needs to be protected from the judgment of hosts and residents. The systemic treatment of homophobic behavior and the construction of a more inclusive society are urgent. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=homophobia" title="homophobia">homophobia</a>, <a href="https://publications.waset.org/abstracts/search?q=hospitality" title=" hospitality"> hospitality</a>, <a href="https://publications.waset.org/abstracts/search?q=machismo" title=" machismo"> machismo</a>, <a href="https://publications.waset.org/abstracts/search?q=misogyny" title=" misogyny"> misogyny</a> </p> <a href="https://publications.waset.org/abstracts/137051/experiences-of-homophobia-machismo-and-misogyny-in-tourist-destinations-a-netnography-in-a-facebook-community-of-lgbt-backpackers" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/137051.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">188</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">13</span> 2016 Taiwan&#039;s &#039;Health and Physical Education Field of 12-Year Basic Education Curriculum Outline (Draft)&#039; Reform and Its Implications</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Hai%20Zeng">Hai Zeng</a>, <a href="https://publications.waset.org/abstracts/search?q=Yisheng%20Li"> Yisheng Li</a>, <a href="https://publications.waset.org/abstracts/search?q=Jincheng%20Huang"> Jincheng Huang</a>, <a href="https://publications.waset.org/abstracts/search?q=Chenghui%20Huang"> Chenghui Huang</a>, <a href="https://publications.waset.org/abstracts/search?q=Ying%20Zhang"> Ying Zhang</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Children are strong; the country strong, the development of children Basketball is a strategic advantage. Common forms of basketball equipment has been difficult to meet the needs of young children teaching the game of basketball, basketball development for 3-6 years old children in the form of appropriate teaching aids is a breakthrough basketball game teaching children bottlenecks, improve teaching critical path pleasure, but also the development of early childhood basketball a necessary requirement. In this study, literature, questionnaires, focus group interviews, comparative analysis, for domestic and foreign use of 12 kinds of basketball teaching aids (cloud computing MINI basketball, adjustable basketball MINI, MINI basketball court, shooting assist paw print ball, dribble goggles, dribbling machine, machine cartoon shooting, rebounding machine, against the mat, elastic belt, ladder, fitness ball), from fun and improve early childhood shooting technique, dribbling technology, as well as offensive and defensive rebounding against technology conduct research on conversion technology. The results show that by using appropriate forms of teaching children basketball aids, can effectively improve children's fun basketball game, targeted to improve a technology, different types of aids from different perspectives enrich the connotation of children basketball game. Recommended for children of color psychology, cartoon and environmentally friendly material production aids, and increase research efforts basketball aids children, encourage children to sports teachers aids applications. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=health%20and%20physical%20education%20field%20of%20curriculum%20outline" title="health and physical education field of curriculum outline">health and physical education field of curriculum outline</a>, <a href="https://publications.waset.org/abstracts/search?q=health%20fitness" title=" health fitness"> health fitness</a>, <a href="https://publications.waset.org/abstracts/search?q=sports%20and%20health%20curriculum%20reform" title=" sports and health curriculum reform"> sports and health curriculum reform</a>, <a href="https://publications.waset.org/abstracts/search?q=Taiwan" title=" Taiwan"> Taiwan</a>, <a href="https://publications.waset.org/abstracts/search?q=twelve%20years%20basic%20education" title=" twelve years basic education"> twelve years basic education</a> </p> <a href="https://publications.waset.org/abstracts/46328/2016-taiwans-health-and-physical-education-field-of-12-year-basic-education-curriculum-outline-draft-reform-and-its-implications" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/46328.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">393</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">12</span> Evaluation of Paper Effluent with Two Bacterial Strain and Their Consortia</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Priya%20Tomar">Priya Tomar</a>, <a href="https://publications.waset.org/abstracts/search?q=Pallavi%20Mittal"> Pallavi Mittal</a> </p> <p class="card-text"><strong>Abstract:</strong></p> As industrialization is inevitable and progress with rapid acceleration, the need for innovative ways to get rid of waste has increased. Recent advancement in bioresource technology paves novel ideas for recycling of factory waste that has been polluting the agro-industry, soil and water bodies. Paper industries in India are in a considerable number, where molasses and impure alcohol are still being used as raw materials for manufacturing of paper. Paper mills based on nonconventional agro residues are being encouraged due to increased demand of paper and acute shortage of forest-based raw materials. The colouring body present in the wastewater from pulp and paper mill is organic in nature and is comprised of wood extractives, tannin, resins, synthetic dyes, lignin and its degradation products formed by the action of chlorine on lignin which imparts an offensive colour to the water. These mills use different chemical process for paper manufacturing due to which lignified chemicals are released into the environment. Therefore, the chemical oxygen demand (COD) of the emanating stream is quite high. This paper presents some new techniques that were developed for the efficiency of bioremediation on paper industry. A short introduction to paper industry and a variety of presently available methods of bioremediation on paper industry and different strategies are also discussed here. For solving the above problem, two bacterial strains (Pseudomonas aeruginosa and Bacillus subtilis) and their consortia (Pseudomonas aeruginosa and Bacillus subtilis) were utilized for the pulp and paper mill effluent. Pseudomonas aeruginosa and Bacillus subtilis named as T–1, T–2, T–3, T–4, T–5, T–6, for the decolourisation of paper industry effluent. The results indicated that a maximum colour reduction is (60.5%) achieved by Pseudomonas aeruginosa and COD reduction is (88.8%) achieved by Bacillus subtilis, maximum pH changes is (4.23) achieved by Pseudomonas aeruginosa, TSS reduction is (2.09 %) achieved by Bacillus subtilis, and TDS reduction is (0.95 %) achieved by Bacillus subtilis. When the wastewater was supplemented with carbon (glucose) and nitrogen (yeast extract) source and data revealed the efficiency of Bacillus subtilis, having more with glucose than Pseudomonas aeruginosa. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=bioremediation" title="bioremediation">bioremediation</a>, <a href="https://publications.waset.org/abstracts/search?q=paper%20and%20pulp%20mill%20effluent" title=" paper and pulp mill effluent"> paper and pulp mill effluent</a>, <a href="https://publications.waset.org/abstracts/search?q=treated%20effluent" title=" treated effluent"> treated effluent</a>, <a href="https://publications.waset.org/abstracts/search?q=lignin" title=" lignin"> lignin</a> </p> <a href="https://publications.waset.org/abstracts/8372/evaluation-of-paper-effluent-with-two-bacterial-strain-and-their-consortia" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/8372.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">251</span> </span> </div> </div> <ul class="pagination"> <li class="page-item disabled"><span class="page-link">&lsaquo;</span></li> <li class="page-item active"><span class="page-link">1</span></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=offensive%20lineman&amp;page=2">2</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=offensive%20lineman&amp;page=2" rel="next">&rsaquo;</a></li> </ul> </div> </main> <footer> <div id="infolinks" class="pt-3 pb-2"> <div class="container"> <div style="background-color:#f5f5f5;" class="p-3"> <div class="row"> <div class="col-md-2"> <ul class="list-unstyled"> About <li><a href="https://waset.org/page/support">About Us</a></li> <li><a href="https://waset.org/page/support#legal-information">Legal</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/WASET-16th-foundational-anniversary.pdf">WASET celebrates its 16th foundational anniversary</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Account <li><a href="https://waset.org/profile">My Account</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Explore <li><a href="https://waset.org/disciplines">Disciplines</a></li> <li><a href="https://waset.org/conferences">Conferences</a></li> <li><a href="https://waset.org/conference-programs">Conference Program</a></li> <li><a href="https://waset.org/committees">Committees</a></li> <li><a href="https://publications.waset.org">Publications</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Research <li><a href="https://publications.waset.org/abstracts">Abstracts</a></li> <li><a href="https://publications.waset.org">Periodicals</a></li> <li><a href="https://publications.waset.org/archive">Archive</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Open Science <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Science-Philosophy.pdf">Open Science Philosophy</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Science-Award.pdf">Open Science Award</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Society-Open-Science-and-Open-Innovation.pdf">Open Innovation</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Postdoctoral-Fellowship-Award.pdf">Postdoctoral Fellowship Award</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Scholarly-Research-Review.pdf">Scholarly Research Review</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Support <li><a href="https://waset.org/page/support">Support</a></li> <li><a href="https://waset.org/profile/messages/create">Contact Us</a></li> <li><a href="https://waset.org/profile/messages/create">Report Abuse</a></li> </ul> </div> </div> </div> </div> </div> <div class="container text-center"> <hr style="margin-top:0;margin-bottom:.3rem;"> <a href="https://creativecommons.org/licenses/by/4.0/" target="_blank" class="text-muted small">Creative Commons Attribution 4.0 International License</a> <div id="copy" class="mt-2">&copy; 2024 World Academy of Science, Engineering and Technology</div> </div> </footer> <a href="javascript:" id="return-to-top"><i class="fas fa-arrow-up"></i></a> <div class="modal" id="modal-template"> <div class="modal-dialog"> <div class="modal-content"> <div class="row m-0 mt-1"> <div class="col-md-12"> <button type="button" class="close" data-dismiss="modal" aria-label="Close"><span aria-hidden="true">&times;</span></button> </div> </div> <div class="modal-body"></div> </div> </div> </div> <script src="https://cdn.waset.org/static/plugins/jquery-3.3.1.min.js"></script> <script src="https://cdn.waset.org/static/plugins/bootstrap-4.2.1/js/bootstrap.bundle.min.js"></script> <script src="https://cdn.waset.org/static/js/site.js?v=150220211556"></script> <script> jQuery(document).ready(function() { /*jQuery.get("https://publications.waset.org/xhr/user-menu", function (response) { jQuery('#mainNavMenu').append(response); });*/ jQuery.get({ url: "https://publications.waset.org/xhr/user-menu", cache: false }).then(function(response){ jQuery('#mainNavMenu').append(response); }); }); </script> </body> </html>

Pages: 1 2 3 4 5 6 7 8 9 10