Refine Search

New Search

Results in Journal Proceedings: 5,918

(searched for: journal_id:(31226))
Page of 119
Articles per Page
by
Show export options
  Select all
Published: 8 May 2021
Proceedings, Volume 52; doi:10.3390/proceedings2020052006

Abstract:
Growing technological development causes industrial products to be discontinued and consequently replaced with greater advancements.
Published: 7 May 2021
Proceedings, Volume 77; doi:10.3390/proceedings2021077015

Abstract:
This presentation summarizes a register-based study on women who have been identified as belonging to three violent extremist milieus in Sweden: violent Islamic, violent far-right, and violent far-left extremism. We studied the women in these milieus along a number of analytical dimensions, ranging from demographic and educational to criminal background and network relationships, and compared them to three reference groups: (i) non-extremist biological sisters to female extremists in the study population; (ii) men in the respective extremist milieus; and (iii) female members of other antagonistic milieus such as organized crime. Our results showed that there are both similarities and differences between groups. In some cases, like age and region of birth, there are commonalities between violent far-right and violent far-left women. Regarding region of birth and migration background, women affiliated to violent far-right and violent far-left extremism are predominantly born in Sweden. Women affiliated to violent Islamic extremism tend to be born in Sweden to a greater extent than men in the same milieu, but to a much lesser degree than women in the violent far-right and violent far-left. When it comes to education, women in the violent Islamic milieu are closer to women in violent far-right extremism. Women in violent far-left extremism perform best at school, with consistently higher grades. The average score of women in violent far-left extremism is identical to that of their sisters, and women in violent far-left extremism perform on average substantially better than men in the same milieu. Women in violent Islamic extremism, in contrast, perform on average similarly to men in violent far-left extremism, and they perform better than their biological sisters. Regarding labor market attachment, violent Islamic extremists have the weakest attachment and the highest dependency upon financial assistance as well as a low employment share (36 percent in 2016), but also a relatively high share of individuals with a high number of unemployment days, suggesting that women in violent Islamic extremism experience higher social exclusion. We find the highest employment share among women in violent far-left extremism, where 89 percent are gainfully employed in 2016 (80 percent for at least three of the last five years) and about a 20 percent unemployment share. Men in violent far-left extremism have an employment share around 10 percent below that of the women in far-left extremism for 2016. The highest fractions of individuals that have not been in contact with the health system due to mental disorders are among violent Islamic extremism, with the women’s fraction at 84 percent, compared to their non-extremist sisters and men in the same milieu that are just above 79 percent. Women in violent far-left extremism have the highest share of in-patient major mental disorders among the extremist milieus (3 percent), higher than men in the same milieu (less than 1 percent) as well as than women and their sisters in the other categories. During the period 2007–2016, 68 percent of individuals in the extremist milieus are covered by the register of suspected individuals. The coverage is substantially higher for men, 72 percent than for women, 43 percent. Compared to their sisters, women in all three milieus are criminally active to a much higher extent. However, women in all three milieus are less criminally active than women in other antagonistic milieus, among whom 67 percent have been suspected at least once. In all three milieus, the share of men with a criminal record is about twice as large as that of women. As far as the gender aspect is concerned, we know that extremist milieus generally have a conservative view of the role of women in society. In our results, this is reflected in the low rates of crime in women compared to men, and relatively marginal positions in the co-offending networks. The fact that women in violent far-left extremism have stronger positions in their networks than the other women in the study population is expected, given that the ideology of this milieu allows for greater equality. This means that women in violent far-left extremism participate more often than, e.g., women in violent far-right extremism, in political actions where violence is common. This pattern of gender roles and criminal involvement also holds concerning women in violent Islamic extremism. This milieu has a more traditional view of the role of women than views among even violent far-right extremists. Women in violent Islamic extremism are less involved in crime and, in particular, violent crime.
Published: 28 April 2021
Proceedings, Volume 77; doi:10.3390/proceedings2021077020

Abstract:
In recent years, there has been a proliferation of programs aimed at preventing radicalization and disengaging known violent extremists. Some programs have targeted individuals through the use of case management approaches and the development of individual intervention plans (e.g., the Desistance and Disengagement Program and the Channel program in the UK; the Australian New South Wales Corrections Proactive Integrated Support Model—PRISM—and state-based division initiatives in Australia). There is a broad consensus in the literature that the evaluation of such initiatives has been neglected. However, the evaluation of case-managed interventions to counter violent extremism (CVE) is challenging. They can have small caseloads which makes it difficult to have any comparison or control group. Client participation can vary over time, with no single intervention plan being alike. This can make it hard to untangle the relative influence of different components of the intervention on indicators of radicalization and disengagement. In this presentation, results from primary research that set out to evaluate case-managed CVE interventions in Australia and develop evaluation metrics are presented. This research involves the examination of interventions implemented by New South Wales corrections and state police. The effectiveness of these interventions was assessed against a five-point metric of client change. Client change overtime was analyzed using case note information collected by the various interventions on client participation. Results show that client change is not a linear process and that the longer an individual is engaged in a case-managed intervention, the more likely they are to demonstrate change relating to disengagement. Specific case studies are used to illustrate trajectories and turning points related to radicalization and to highlight the role of case-managed interventions in facilitating disengagement. Key elements of effective interventions include the provision of ongoing informal support. Investment in capturing case note information should be a priority of intervention providers. Different challenges confronted by case-managed CVE interventions are highlighted.
Published: 28 April 2021
Proceedings, Volume 77; doi:10.3390/proceedings2021077016

Abstract:
In this presentation, we draw a parallel between public health screening processes of asymptomatic individuals to detect a disease (i.e., cancer) and the attempt of identifying individuals who may be classified as being “at risk” of conducting a violent act. We discuss concepts related to the early detection of a condition through screening. In particular, we focus on the underlying history of the disease over time, as it moves through different stages: onset, start of asymptomatic detectability, start of symptomatic detectability, and death. Notably, such description refers to the latent (possible) insurgence of the disease and to its would-be progression if left undetected and untreated. As part of this framework, we discuss the relevant quantities that are involved when one performs a screening test. These include the probabilities of true and false positive and negative test results and the area under the curve (AUC) index. A positive test result is typically defined through the crossing of a threshold by some measured index. The behavior of the probabilities that describe the features of the test procedure as one changes the threshold that defines a positive result can be illustrated through an online application that was developed for this presentation, available at https://marcobonetti.shinyapps.io/shinyapp/. Other quantities that are discussed are the negative predictive value (NPV) and the positive predictive value (PPV). The latter quantity represents the probability that a subject is truly a case when the test result is positive. The PPV may be surprisingly low, especially if the disease has a low prevalence in the population. We then discuss some modern methods for screening through the analysis of online data streams, either through active or passive data collection, the difference being that in the first kind, the subject is active in the data collection process; in the second kind, secondary data streams are used, such as Twitter tweets, Facebook posts, or Google searches. Machine learning algorithms allow the study of phenomena at the population level (e.g., trends in a phenomenon of interest), but also the prediction of features for individual subjects. Two specific examples are discussed, both based on the use of Facebook data. The first example deals with the prediction of a depression diagnosis from Facebook language, with a comparison of the results of the automatic classification algorithm and the true (known) depression diagnoses of a set of consenting subjects. The second example is a Facebook’s suicide prevention program, which has been in place for over 10 years. The program identifies individuals that, based on their posts, comments and live videos, may be at risk of committing suicide.
Published: 28 April 2021
Proceedings, Volume 77; doi:10.3390/proceedings2021077021

Abstract:
While much time and effort in terrorism studies has gone into finding an answer to the question of why people radicalise, the question of how to rehabilitate individuals has received renewed attention with the return of many citizens who had joined the Islamic State. This has led to an increase in both programs and interventions aimed at ‘deradicalising’ or ‘disengaging’ individuals as well as studies that aim to assess the effectiveness of such efforts. This article/presentation provides an overview of the main elements of rehabilitation and reintegration programs for violent extremist offenders based on international research assessing 34 rehabilitation and reintegration programs. In the second half of the article, an evaluation of the Dutch approach to reintegrating violent extremist offenders in and after prison is presented. Finally, the main lessons learned from these programs as well as the academic literature are discussed.
Published: 28 April 2021
Proceedings, Volume 77; doi:10.3390/proceedings2021077008

Abstract:
Many existing programs for countering violent extremism focus on either end of the radicalization spectrum. On one hand are prevention programs aimed at deterring individuals from starting down the path to violent extremism. On the other hand are disengagement/de-radicalization programs designed for assisting individuals who have been fully radicalized. Conspicuously absent are programs for those who fall in-between, into what might be referred to as the pre-criminal space: individuals who have begun to exhibit signs of radicalization, but for whom radicalization is not yet complete. The British Columbia Shift (BC Shift) initiative was created to assist individuals determined to be in this pre-criminal space; that is, those deemed to be in danger of radicalizing. The goal of BC Shift is to stop individuals from traveling further down the path of radicalization, and, ideally, to turn individuals away from the path. BC Shift operates as a navigational model, connecting at-risk individuals with services and supports in the community. BC Shift is a government initiative supported by the Canada Centre for Community Engagement and Prevention of Violence. It is a civilian organization that partners very closely with, but is separate from, law enforcement. In addition to its primary CRVE mandate, BC Shift has rapidly evolved and expanded into several other responsibilities, including coordination on national CVE standards; liaising with other CVE programs across Canada; maintaining stakeholder relationships; and helping create capacity through dialog and training. Although the program only began accepting referrals in 2019, its operation has already revealed many important lessons for CRVE programs. First, it is critically important to have the right people in the room. There has to be buy-in from the highest levels of partner agencies and stakeholders, particularly early on. Second, programs of this sort should leverage existing resources wherever possible. BC Shift has been lucky enough to coordinate with situation tables, such as the CHART program in Surrey. There are already many organizations doing excellent work in their respective communities; it is very helpful to plug into those resources. Third, even though BC Shift operates as a navigational hub, it has benefitted greatly from having a social worker as part of the team. This skill set is important in helping referred individuals feel comfortable with the process of accessing services and supports. Finally, marketing matters! CRVE programs such as BC Shift have to navigate a complex reality. The very concept of violent extremism is disconcerting to a lot of people in the community; these fears have to be addressed, and difficulties related to differences in perspective and language have to be overcome. BC Shift’s first year-and-a-half of operation has also highlighted several issues that have not yet been satisfactorily resolved. There is, for example, the “low hanging fruit” problem; agencies are typically referring less severe cases. Trying to get agencies to refer more serious cases has proved challenging. We hope that, by outlining these lessons and issues, this presentation proves to be useful to other CRVE initiatives.
Published: 28 April 2021
Proceedings, Volume 72; doi:10.3390/proceedings2021072002

Abstract:
On 27 March 2021, the 2021 IEEE 2nd International Conference on Big Data, Artificial Intelligence and Internet of Things Engineering (ICBAIE 2021) was officially held in Nanchang, China. The Conference invited the IEEE Fellow Professor Guo Yong-xin from the National University of Singapore and the IET Fellow Professor Gao Liang from Huazhong University of Science and Technology of China, as well as other experts, to make the special speeches. The conference focused on the practical application of big data, the development of artificial intelligence and the innovation of Internet of things technology, and the conference provided a platform for academic exchanges among experts and, the experts present reported their own research progress and made prospects for the future development of big data such as application of big data in enterprise decision making, artificial intelligence such as intelligent endoscope in medicine, Internet of Things such as the Internet of Vehicles in urban transport.
Published: 27 April 2021
Proceedings, Volume 77; doi:10.3390/proceedings2021077017

Abstract:
In the last decade, advances in statistical modeling and computer science have boosted the production of machine-produced contents in different fields: from language to image generation, the quality of the generated outputs is remarkably high, sometimes better than those produced by a human being. Modern technological advances such as OpenAI’s GPT-2 (and recently GPT-3) permit automated systems to dramatically alter reality with synthetic outputs so that humans are not able to distinguish the real copy from its counteracts. An example is given by an article entirely written by GPT-2, but many other examples exist. In the field of computer vision, Nvidia’s Generative Adversarial Network, commonly known as StyleGAN (Karras et al. 2018), has become the de facto reference point for the production of a huge amount of fake human face portraits; additionally, recent algorithms were developed to create both musical scores and mathematical formulas. This presentation aims to stimulate participants on the state-of-the-art results in this field: we will cover both GANs and language modeling with recent applications. The novelty here is that we apply a transformer-based machine learning technique, namely RoBerta (Liu et al. 2019), to the detection of human-produced versus machine-produced text concerning fake news detection. RoBerta is a recent algorithm that is based on the well-known Bidirectional Encoder Representations from Transformers algorithm, known as BERT (Devlin et al. 2018); this is a bi-directional transformer used for natural language processing developed by Google and pre-trained over a huge amount of unlabeled textual data to learn embeddings. We will then use these representations as an input of our classifier to detect real vs. machine-produced text. The application is demonstrated in the presentation.
Published: 27 April 2021
Proceedings, Volume 77; doi:10.3390/proceedings2021077013

Abstract:
In the Nordic countries, prevention of radicalization and violent extremism is based on an existing crime prevention collaboration. The core tenet of crime prevention approaches is that early radicalization prevention is best organized as a joint effort, where individual cases are assessed holistically and relevant information shared. This presentation is based on Nordic comparative research that provides a critical analysis of policies, perceptions, and practices regarding multiagency approaches. At the city level, we systematically explore how core components of a Nordic governance model contribute to and might be preconditions for effective multiagency collaboration and secure societies. Variations in these city-level approaches lead to an important question: do these various multiagency approaches to countering violent extremisms and radicalization constitute a unified model? The project provides an informed platform for spreading Nordic experiences and models of governance to other countries in the area of radicalization prevention and countering violent extremism. The multiagency collaboration in Nordic cities tends to be composed of a smaller number of professionals, e.g., three to eight, representing social and health services, a coordinator, and the police. Their positions vary; some represent leadership in the municipality, others are positioned at more mid-level management, and others are frontline professionals handling clients on a daily basis. The origin of these collaborative efforts is based on the School, Social and health services, and Police framework (SSP) in Denmark, Norway, and the Ankkuri group in Finland. We assert that future efforts can also be more need-based, comprising municipal/local initiatives with an element of the guiding national policies, and include the legal frameworks to guide professionals on ethical issues like confidentiality. This presentation is part of a larger project entitled “Nordic Multiagency Approaches to Handling Extremism: Policies, Perceptions, and Practices”, led by professor and center director Tore Bjørgo (University of Oslo) and is funded by NordForsk (Nordic Council of Minister), 2018–2021.
Published: 27 April 2021
Proceedings, Volume 77; doi:10.3390/proceedings2021077014

Abstract:
This presentation outlines the results of the primary programmatic evaluation efforts the Emergency Preparedness Research Evaluation and Practice (EPREP) Program has conducted since 2016. The presentation begins with an overview of the methodology of selecting outcome measures to evaluate program efficacy, as well as a description of the evaluation framework. Results of the longitudinal and quasi-experimental 2017 evaluation of the Online4Good Academy—on of the training events at the focus of the Boston CVE Pilot Program—are presented and discussed. In 2018, the EPREP Program utilized a longitudinal and quasi-experimental design to evaluate the efficacy of the Peer2Peer antihatred campaign Kombat with Kindness. Results and implications from this study are discussed. The final portion of the presentation describes the more recent activities of the EPREP Program—an evaluation of the online safety program Operation 250 (OP250). This portion of the lecture describes the psychological framework and theory of change under which OP250 implements their initiative. During the final segment we also present the preliminary results of a randomized controlled trial conducted at two different study sites in Massachusetts designed to evaluate the programs’ efficacy.
Published: 27 April 2021
Proceedings, Volume 77; doi:10.3390/proceedings2021077018

Abstract:
Academics and policymakers recognize the absence of empirically grounded research to support the suppositions on which terrorist focused policies are based. (Sageman, Marc. 2014. “The Stagnation in Terrorism Research”. Terrorism and Political Violence 26 (4): 565–80) We developed our project, Mapping Networks and Narratives of Online Right-Wing Extremists in New South Wales, (Department of Security Studies and Criminology. 2020. Mapping Networks and Narratives of Online Right-Wing Extremists in New South Wales. https://doi.org/10.5281/zenodo.4071472) to illuminate this space. Using the analysis of large-scale online data to generate evidence-based insights into online Right-Wing Extremism (RWE) across the state, our research focused on four key questions: (1) What is the nature of the online RWE environment in New South Wales, Australia (NSW)? (2) How is this movement distributed across NSW? (3) How are themes and narratives framed in different online contexts to mobilize support? (4) What level of risk does the online right-wing environment pose? These questions were left purposely broad to facilitate an exploratory project into what was, in 2018–2019, still a relatively little studied milieu. We combined expertise from computational science, security studies, and behavioral science. We were funded by the Department of Communities and Justice, NSW. We identified two distinct—yet connected—levels of risk. The first was a creeping threat to democracy fueled by networks and content that challenged the fundamental principles of pluralistic liberal democracy. The second was a risk of violence perpetrated by individuals and/or groups that advocate and/or support the use of violence as a tactic to achieve an ideological end. The communities we examined were primarily characterized by networks of individuals as opposed to formal groups. The role played by individual influencers has important ramifications for policy communities: attention should be paid to issues of proscription and moderation. While this milieu engaged with Australian issues and events, it was notably far more obsessed with American issues: particularly those focused on populist narratives and Trumpism. Despite being hateful and extreme, online RWE communities are, firstly, spaces of sociability for users, where social networks are maintained by shared values and norms. For those involved, these spaces engender positive experiences: individuals might share an image of their dinner cooking in their kitchen interspersed with “shitposting” and virulent hate speech. While we identified a variety of narratives that focused on the delegitimization of government and dehumanization of others, the central theme was that of “white identity under threat”. We observed five distinct stages of moderation approach and echo chamber strength. A series of issues for future consideration were identified from the analysis: (1) Awareness raising for key stakeholders across different levels of government and civil society about the revolutionary and anti-social agenda of RWE communities. (2) Building awareness about the civic underpinnings of representative liberal democracy and the threat that RWE poses. (3) Expanding current Countering Violent Extremism infrastructure provided by the NSW government to individuals and communities vulnerable to right wing extremism. (4) The local government is well positioned to deliver programs in rural communities impacted by RWE. (5) Upskilling front-line workers to recognize the risks associated with RWE, and providing pathways into CVE intervention programs for individuals identified as being at-risk.
Published: 26 April 2021
Proceedings, Volume 77; doi:10.3390/proceedings2021077012

Abstract:
In recent years, the fight against terrorism and political violence has focused more on anticipating the threats that they pose.
Published: 26 April 2021
Proceedings, Volume 77; doi:10.3390/proceedings2021077009

Abstract:
Since the 1970s, the Dutch anti-radicalization strategy has been characterized by a close collaboration between police, welfare providers, community groups, and national and local governments. This comprehensive approach aims to identify individuals at risk of radicalization at an early stage, offering them alternative life paths and robustly responding to imminent threats. The comprehensive approach generally enjoys considerable support among professionals, politicians, and the populace at large. However, a swelling tide is asking for more evidence that this combination of “soft” and “hard” interventions is working. Parliament is asking the government to take more measures against emerging extremist threats, but also demands more proof that these measures are effective. Liberal parties in parliament are critical of the financial and societal costs of counter-terrorism and anti-radicalization measures, while right-wing parties worry the government is not tough enough. Over the past five years, the Dutch government has commissioned multiple evaluations. Specific incidents, such as the shooting in Utrecht on 18 March 2019, have been extensively evaluated. A more general review in 2015 examined the counter-terrorism policy as a whole, finding that the ideas for the comprehensive approach were sound; yet, that the investment of ministries in this approach fell apart in the perceived low-threat period, making the intended “comprehensive” strategy become a pick-and-choice approach. Currently, the national and local governments involved in anti-radicalization efforts keep asking for more evaluations. The Ministry of Social Affairs created an evaluation toolkit, which local governments can use to evaluate interventions. The City of Arnhem commissioned a review of its anti-radicalization efforts, which is mainly able to assess the plans and processes, but not yet the outputs of the interventions. Moving forward, more collaboration may be needed within or even between European countries to amass sufficient data to enable full effect evaluations.
Published: 26 April 2021
Proceedings, Volume 77; doi:10.3390/proceedings2021077010

Abstract:
Research on mental health and violence among marginalized communities has identified the importance of engaging communities, diminishing stigma, addressing multiple outcomes including strengths, and building social connections. Within the United States, Countering Violent Extremism (CVE) policies and programs have been criticized for failing in these areas. Recent efforts have sought to build multidisciplinary teams for the prevention of targeted violence and terrorism that explicitly seek to address these critiques and work to build the capacity of multidisciplinary providers to work with youth at risk for targeted violence and terrorism. Community Connect was a Boston, US-based community-based program that worked with youth at risk of violence, including ideologically-based violence. This program achieved broad community buy-in and successfully linked referred youth to a broad range of services in their communities. To bring the program to scale, an adaptation of Community Connect was developed that accepted referrals from a regional federally-convened threat assessment team, the Massachusetts Bay Threat Assessment Team (MassBayTAT). This multidisciplinary services team (MDST) maintains several essential functions from Community Connect, such as providing a thorough psychosocial assessment and maintaining regular contact and coordination between diverse providers, as well as making key changes to accommodate a regional scope. Given the nascent state of the field, both formative as well as summative evaluations play important roles in shaping and evaluating multidisciplinary violence prevention teams, as is evident in the iterative adaptation of the above-described multidisciplinary approaches. Evaluation of a multidisciplinary team for VE should assess both team development as well as case outcomes. Building trust within a community of diverse providers and disciplines and achieving a ‘whole of society’ approach to violence prevention is in and of itself an outcome that should be sought, as well as a reduction in violence at the individual level. Mixed-methods evaluations are needed to capture both the process and outcomes that are central to an effective multidisciplinary team for the prevention of terrorism and targeted violence.
Published: 26 April 2021
Proceedings, Volume 77; doi:10.3390/proceedings2021077011

Abstract:
The place of clinical, medical, or health professional interventions in addressing violent radicalization is a topic of ongoing debate. Although violent radicalization is primarily a social phenomenon with significant psychological dimensions, the high prevalence of mental health “issues” and past psychiatric diagnosis in lone actors suggests that it may be useful to distinguish socialized actors who have strong ties to structured extremist organizations from relatively socially isolated actors who claim, and even boast about, virtual affiliation to extremist groups. For the latter, the potential efficacy of mental health interventions should be considered. However, because of the risk of profiling, stigmatization of minorities, pathologizing social dissent, and resistance, clinical intervention may cause harm and should be carefully evaluated. Until the effectiveness of clinical interventions in reducing radical violence is improved through evaluative research, exchanges about existing clinical models can be useful to support practitioners in the field and provide initial insights about good and potentially harmful practices. The Quebec model of clinical services to mitigate violent radicalization (secondary and tertiary prevention) is structured around three pillars: multiple access points to facilitate outreach and decrease stigma; specialized teams to assess and formulate treatment plans based on existing best evidence in forensic, social, and cultural psychiatry; and collaborative involvement with primary care services, such as community mental health, education, and youth protection institutions, which are in charge of social integration and long-term management. Beyond the initial assessment, the program offers psychotherapy and/or psychiatric interventions services, including mentorship to foster clients’ social integration and life-skill development. Artistic programs offering a semi-structured, nonjudgmental environment, thus fostering self-expression and creativity, are very well received by youth. A multimedia pilot program involving young artists has been shown to provide them with alternative means of expressing their dissent. Three years on from its inception, the preliminary evaluation of the Quebec clinical model by its partners and clinicians suggests that it could be considered a promising approach to address the specific challenges of individuals who present as potential lone actors at high risk of violent radicalization. The model does not, however, appear to reach many members of extremist groups who do not present individual vulnerabilities. While initial signs are positive, a rigorous evaluation is warranted to establish the short, medium, and long-term efficacy of the model, and to eventually identify the key elements which may be transferable to other clinical settings. In 2020, a five-year evaluative research project began to examine these questions. It is important to consider that any intervention can be harmful if due attention is not paid to structural discrimination and violence stemming from associated marginalization and exclusion. Clinical care can in no way replace social justice, equity, and human rights—all key pillars in primary prevention against violent radicalization. In the meantime, however, providing empathy and care in the face of despair and rage may prove most beneficial in decreasing the risk of violent acts.
Published: 25 April 2021
Proceedings, Volume 77; doi:10.3390/proceedings2021077006

Abstract:
In the field of counter-terrorism (CT) and countering violent extremism (CVE), policymakers are in constant need of accurate data to make informed decisions to support existing programs and develop new approaches to prevent radicalization to violence. The goal of the comparative analysis in this presentation is to identify the types of data needed to assess the impact of CT and CVE programs based on each country’s policy goals. A comparative analysis of the five countries’ specific CT/CVE policies was conducted to identify common themes and data needs. The first most widely discussed theme is the need to maintain and expand collaborations and information sharing across countries—all five policies strongly emphasize the importance of such collaborative efforts. All policies address the need for strengthening collaborations at the local level, considering the important role civil society plays in the frontline response to violent extremism. In particular, the North Macedonian policy recognizes the need to fully engage in multidisciplinary interagency efforts that include civil society in the process for reconciliation of ethnic and cultural divides, educate and promote democratic values in schools and faith based communities. According to the policy documents, it can be found that there is a need for a better understanding of what types of collaborative efforts and partnerships are needed to establish effective CT and CVE programs. All policies stress the need to address a range of extremist ideologies including Jihadist, Far Left, and Far Right groups to address radicalization in the online space as well as through in-person interventions. In terms of interventions, there is a need to understand what type of training is most effective to equip frontline professionals with the knowledge and skills to intervene when individuals engaged in VE come to their attention. The United States policy is innovative with respect to the others because it introduces the concept of targeted violence. By doing so, it recognizes the importance of including situations where ideology is not a motivating factor or the motivations are unknown behind the acts of violence. The Swedish policy is distinguished by its detailed legislation supporting the prevention of terrorist acts. The UK policy emphasizes the need to contrast ideologies and views that are not aligned with UK values. All policies recognize the need for evidence on strategic efficacy and recognize the fact that programs and policies have been widely implemented without scientific proof of their effectiveness. In particular, the Canadian policy points to the need for identifying best practices that can be transferred from case to case or country to country. As an area of policy improvement across countries, there is certainly a lack of clarity on the roles and responsibilities of the many agencies that may be potentially involved in prevention efforts, still leaving a nebulous space in terms of when and how security intercepts social work and public health.
Published: 25 April 2021
Proceedings, Volume 77; doi:10.3390/proceedings2021077007

Abstract:
This presentation introduces workshop participants to the role of developmental evaluation in multi-sector collaborative efforts to detect and displace vulnerabilities to the risk of violent extremism. Our discussion shares the journey that the Ottawa Police Service took to mobilize a wide variety of human service partners under a shared commitment to work upstream—where there is an opportunity to support individuals and families during early signs of vulnerability to radicalization. The result of this collaboration is the Ottawa Vulnerability Reduction Protocol: a multi-sector prevention tool aimed at identifying opportunities to support individuals before vulnerability for risk of radicalization to violence occurs. The protocol helps human service professionals, who may not have expertise in violent extremism, to develop the capacity, opportunity, and confidence to contribute towards upstream solutions. Participants of test simulations describe the protocol as allowing for support to be mobilized without labeling and stigmatizing an individual (i.e., radical, extremist), while also requiring the types of support that most human service professionals are comfortable providing. Construction of the protocol and accompanying resources (e.g., Vulnerability Detection Tool, Shared Needs Assessment, Integrated Support Plan) was supported through a developmental evaluation framework. By incorporating the continuous collection of data, ongoing stakeholder feedback, and insight from the preventing and countering violent extremism field, the evaluator assisted community partners in determining a structure and approach to building the protocol. This developmental evaluative approach helped diverse human sectors to navigate multiple perspectives and identify a shared pathway forward.
Published: 25 April 2021
Proceedings, Volume 77; doi:10.3390/proceedings2021077019

Abstract:
Recent interest in terrorist risk assessment and rehabilitation reveals that the likelihood and risk factors for terrorist disengagement, re-engagement, and recidivism are poorly understood. In this presentation, I review related literature on criminal desistance, disaffiliation from new religious movements, commitment, and turnover in traditional work organizations, role exit, and the investment model to develop a series of theoretical starting points for gauging the likelihood and predictors of risk, which can help inform evaluation efforts. I then highlight key findings from the existing literature on terrorist disengagement and re-engagement/recidivism as well as key differences across samples and the methodological challenges associated with such research—mainly the absence of control groups, relatively small sample sizes, the need for a lengthy time horizon, and inconsistencies in what constitutes re-engagement and recidivism. Then, using data collected on 185 terrorist engagement events for 85 individuals representing over 70 unique terrorist groups, I present my and my colleagues’ findings on the drivers of terrorist disengagement and re-engagement. We find that terrorist disengagement is a lengthy process more commonly driven by “push” rather than “pull” factors, specifically disillusionment with the strategy or actions of the terrorist group, disillusionment with leaders or other members, disillusionment with one’s day-to-day tasks, burnout, difficulty living a clandestine lifestyle, difficulty coping with attacks, and psychological distress. Importantly, “de-radicalization” is only cited as playing a “large role” in just 16% of disengagement events in our sample. I then discuss how one’s role within a terrorist group offers insight into the disengagement process. Our research shows that leaders and violent operatives have a harder time disengaging than those in logistical or support roles because of the sunk costs associated with their involvement and/or the fewer opportunities available to them. We also find that individuals in certain roles are more/less likely to experience certain push/pull factors for disengagement. I conclude by discussing our research on terrorist re-engagement, which shows that in the short term, a deep commitment to the ideology, maintaining ties to individuals still involved in terrorism, and being young increase the likelihood one will return to terrorism.
Published: 25 April 2021
Proceedings, Volume 77; doi:10.3390/proceedings2021077005

Abstract:
The nominal group technique (NGT) was developed in the 1970s as a structured brainstorming and multi-stage consensus-building process to solicit feedback from a group of stakeholders on a given topic. The approach was intended as an evaluation method to provide semi-quantitative rank-ordered feedback from group participants. This lecture presents a variation of this technique created by the Harvard team, namely “scenario-based NGT”. The format proposed includes elements of tabletop exercises (scenario with a timeline and discussion phase) as well as elements of traditional NGTs (silent brainstorming and ranking). The technique we developed was based on a case-study approach (“scenario”) which we then tested in two countries (USA and Sweden) with existing P/CVE initiatives at different stages of development. We conducted scenario-based NGT sessions in both locations and then systematically analyzed the results using iterative qualitative coding based on a common framework. Results were analyzed to achieve consensus on the most common system-level challenges and system-level functions, necessary to overcome those challenges, in each location.
Published: 23 April 2021
Proceedings, Volume 77; doi:10.3390/proceedings2021077004

Abstract:
When evaluating the effectiveness of public health, and behavioral and medical interventions, various methods can be used to systematically judge the merit, worth, value, and significance of the program’s outcomes. This presentation will describe what is meant by “evaluation approaches” by providing examples of the characteristics of several different types of approaches, such as, the appreciative inquiry, beneficiary assessment and case study approaches. The presentation will then focus on introducing the developmental evaluation approach by comparing it to the traditional evaluation approach in terms of its purpose, the evaluator’s role, accountability, measurement, and results. Examples of the causal inference pathways underlying the developmental and traditional approaches will illustrate how developmental approaches can accommodate multivariable and multivariate models, this can be used to evaluate the intricacies of complex real-world problems and programs.
Published: 23 April 2021
Proceedings, Volume 77; doi:10.3390/proceedings2021077002

Abstract:
Countering violent extremism (CVE) implies many pressing ethical issues. For policymakers and professionals, it is essential to identify concrete ethical dilemmas and to understand the underlying more abstract ethical issues. The proposed typology of ethical issues consists of four different levels: the structural, the political, the professional, and the personal levels. Ethical issues on the structural level are rooted in the conditions of the world risk society, such as the morality of CVE and counterterrorism in general or its fundamental inconsistencies. On the political level, the phenomenon of the state of emergency, the politicization of CVE and counterterrorism, the legitimacy of state interventions, and the tension between secrecy and transparency all play a role. Professional values can conflict with organizational interests on the professional level. Finally, on the personal level, integrity can come under pressure due to conflicting values. An exploration of the benefits for counterterrorism practitioners of the consequentialist, deontological, and virtue-ethical approaches concludes that none of them offers a sound approach to the practice of counterterrorism in a liquid world risk society. This provides an opportunity to highlight the potential of the philosophical concept of “compromise” (Benjamin) in reconciling opposing principles and underlying values of the key ethical approaches. A major source of guidance and inspiration for compromise is phronesis, or practical wisdom. Another powerful concept is the ethics triangle (Svara). This ethics triangle implies that public administrators should strive towards a balance of virtue, principle, and good consequences, all seen from the perspective of the duty of the public interest. There are several ethics tools available that can inform the design of CVE programs and support dealing with the various types of ethical issues once a CVE program is started. First, it is useful to engage in a closer analysis and value clarification of the ethical issues at stake. Second, the already established tool of privacy impact assessment represents an inspirational point of departure for a broader ethics impact assessment. Third, the institutionalization of ethics support in the field of CVE can be realized by the establishment of ethics committees, the appointment of ethics advisors or ethics rapporteurs, or the installation of reflection groups. Fourth, the implementation of tools of ethics support like moral case deliberation can empower CVE professionals to deal with ethical issues. It can also improve their decision making, support collective learning, and contribute to the development of policies and guidelines in the field of CVE and counterterrorism. Last, but not least, evaluating CVE programs can benefit from taking ethical issues into account. Moving beyond mandatory rituals of ethics checks can lead to an in-depth engagement with professionals and stakeholders within CVE programs and a re-adjustment and fine-tuning of programs if necessary. In the long run, the integration of ethics into the design, implementation, and evaluation of CVE programs can strengthen the legitimacy of these programs among targeted communities, professionals, and societies at large.
Published: 23 April 2021
Proceedings, Volume 77; doi:10.3390/proceedings2021077003

Abstract:
P/CVE is a field of research and practice that focuses on complex social programs that, similarly to the field of public health, are most often multidisciplinary in nature. In the proposed program evaluation framework, adapted from the field of public health, we adopt a definition of “program” to include any type of organized activity (i.e., direct service interventions, community mobilization efforts, research initiatives, policy development activities, communication campaigns, etc.). The proposed framework includes three levels of evaluation, six implementation steps, and ten criteria for determining the quality of the evaluation. The three evaluation levels are based on the unit of analysis: system, population, or individual. System-level evaluations are studies conducted at the system level, where data are gathered to understand how an organizational model is developed or implemented (i.e., What type of inter-agency functions need to be developed to enhance the effectiveness of CVE programs?). In population-level evaluations, data are gathered from a segment of the population to understand the impact of the intervention on a group of individuals (i.e., Do school campaigns increase awareness about violent extremism? Do educational interventions directed to law enforcement enhance their ability to respond to cases of violent extremism?). Finally, there are programs executed at the individual level; evaluations of this type may be focused on what worked to reintegrate a specific individual—as such, the unit of analysis is at the individual level (i.e., What type of cognitive therapy interventions work in supporting reintegration efforts? What type of relationships with family and friends are necessary to support the individual in reintegrating into society?). The six implementation steps proposed in the framework are designed to guide the evaluator through the process of evidence gathering: (i) stakeholders’ engagement; (ii) description of the program and the context in which it is implemented; (iii) selection of the study design and framing of how activities are expected to be related to desired outcomes; (iv) collection of data; (v) interpretation of results; and (vi) delivering of results to stakeholders. Finally, the proposed 10 standards are based on questions we should ask to determine the quality of the evaluation. We determined that it is important to understand whether the evaluation is useful, context-specific, ethical, accurate, feasible, independent, culturally sensitive, systemic oriented, and transferable, and to include a counterfactual situation (what-if scenario).
Published: 21 April 2021
Proceedings, Volume 52; doi:10.3390/proceedings2020052005

Abstract:
There is an evolution and progress that has been taking place in recent years in science and technology and in the evolution of polymers that have created new plastic materials with excellent physical properties and durability. However, the plastic products that are made, generally have several applications, but for a single use, especially if it is in the part of food packaging, or for the pharmaceutical industry, in medical applications. Since these materials are not biodegradable, they remain on the surface of the earth for hundreds of years without considerable changes in their structure, causing pollution and damage to wildlife and the environment. With this research we intend to eliminate these plastics from petroleum derivatives, by biodegradable plastics. At the same time, the use of the generated by-products is sought, giving them an energy, thermal or fertilizer value.
Published: 15 April 2021
Proceedings, Volume 74; doi:10.3390/proceedings2021074024

Abstract:
Nowadays society is profoundly changed by technology, velocity and productivity. While individuals are not yet prepared for holographic connection with banks or financial institutions, other innovative technologies have been adopted. Lately, a new world has been launched, personalized and adapted to reality. It has emerged and started to govern almost all daily activities due to the five key elements that are foundations of the technology: machine to machine (M2M), internet of things (IoT), big data, machine learning and artificial intelligence (AI). Competitive innovations are now on the market, helping with the connection between investors and borrowers—notably crowdfunding and peer-to-peer lending. Blockchain technology is now enjoying great popularity. Thus, a great part of the focus of this research paper is on Elrond. The outcomes highlight the relevance of technology in digital finance.
Published: 7 April 2021
Proceedings, Volume 77; doi:10.3390/proceedings2021077001

Abstract:
In submitting conference proceedings to Proceedings, the volume editors of the proceedings certify to the publisher that all papers published in this volume have been subjected to peer review administered by the volume editors.
Published: 6 April 2021
Proceedings, Volume 74; doi:10.3390/proceedings2021074023

Abstract:
In submitting conference proceedings to Proceedings, the volume editors of the proceedings certify to the publisher that all papers published in this volume have been subjected to peer review, administered by the volume editors.
Published: 6 April 2021
Proceedings, Volume 52; doi:10.3390/proceedings2020052003

Abstract:
The technical-economic analysis was carried out for the production of sludge-derived fuel from a municipal wastewater treatment plant (WWTP). The baseline for the analysis consists of a sludge drying plant, processing 6 m3 of sludge per day and producing a total of about 1 m3 of combustible material with 8% of moisture and a higher calorific power of 18.702 MJ/kg. The transformation of biofuel into energy translates into an electricity production of about 108 kW per 100 kg of sludge. The project in the baseline scenario demonstrated feasibility with a payback time of about six years.
Published: 6 April 2021
Proceedings, Volume 52; doi:10.3390/proceedings2020052004

Abstract:
The behavior of chars from the carbonization process were studied when the lignocellulosic biomass was incorporated into the waste of electrical and electronic equipment for chlorine removal. Tests were performed at 300°C with a heating rate of 15°C/min and residence time of 60 min. Compositions studied had 100, 75, 50, 25 and 0% of waste electrical and electronic equipment (WEEE) in the mixtures. The composition of 50% WEEE with 50% lignocellulosic biomass presented the best char properties, having an increment of the calorific value in 5.5% relative to the initial value, and chlorine removal of 23.4% when compared to the forestry biomass.
Published: 23 March 2021
Proceedings, Volume 74; doi:10.3390/proceedings2021074022

Abstract:
Cancer is one of the leading causes of death in many countries, and this continues to be the case because of the lack of sufficient treatment. One of the most common types is non-small-cell lung cancer (NSCLC). The increasingly large and diverse public datasets about NSCLC constitute a rich source of data on which several analyses can be performed so as to find candidate oncogenic drivers or therapeutic targets. The aim of this study is to reanalyze an existing NSCLC NCBI GEO Dataset (accession = GSE19804) in order to see if novel involved genes can be found. For this, we used microarray technology for preprocessing and, based on random forest, support vector machine and C5.0 decision tree models, made a comparison of the 10 most important genes recorded. This study was realized with R-Studio 4.0.2 and Bioconductor 3.11. In conclusion, the EFNA4 gene and other genes, namely KANK3, GRK5, CLIC5, SH3GL3, ACACB, LIN7A, JCAD, and NEDD1, are thought to be potential genes that may play a role in NSCLC and it is recommended that researchers working in the wet laboratory should focus on these genes.
Published: 19 March 2021
Proceedings, Volume 52; doi:10.3390/proceedings2020052002

Abstract:
In recent years, developments made to reduce the consequences generated using petroleum products have been strengthening; therefore, biofuels have become a requirement in different countries worldwide with the objective of reducing not only the high levels of current pollution, but also mitigating the effects generated by global warming. Despite the advances that have been made in the field of research on Jatropha, it is still necessary to carry out more detailed studies aimed at achieving a better use of it, identifying the influence of its physical–chemical properties in terms of quality levels, as well as determining its behavior when mixed with palm oil to achieve a biodiesel with better yields, whose impact will be reflected mainly in the environmental field, helping to mitigate the production of greenhouse gases that are produced by petroleum products. Although currently the biofuels sector has made important advances in research, it is necessary to deepen the physical–chemical analyses both in the production and storage processes of biodiesel, so that in the future it can be fully fulfilled with the energy requirements that are currently only achieved with fossil fuels, so it is necessary to direct this research toward the development of new products with improved characteristics, especially when exposed to prolonged storage times and low temperatures.
Published: 16 March 2021
Proceedings, Volume 74; doi:10.3390/proceedings2021074019

Abstract:
The COVID-19 (SARS-CoV-2) pandemic required changes to be made, especially in formal education processes. In order for the students to stay safe and healthy, many educational institutions switched to the distance learning method for the rest of the semester and continued their education without any intermission. Due to this switch, there has been a rise in the usage of learning management systems, and as a result, students started to encounter technical problems, especially during the exam periods, or they simply wanted to obtain more information about academic or administrative issues. This study used frequency and percentage analysis methods and examined the support request tickets opened up by students during distance education. Resolving the encountered problems quickly and effectively is very important in order to protect the motivation of the learners and ensure their successes. It was seen in the study that the majority of the problems reported by the students were related to internet connection or to the problems occurred during exams. This study aimed to share experiences with the researchers and technical and administrative staff working in this field and to contribute to the current distance learning literature.
Published: 16 March 2021
Proceedings, Volume 74; doi:10.3390/proceedings2021074020

Abstract:
Accurate identification of COVID-19 is now a critical task since it has seriously damaged daily life, public health, and the economy. It is essential to identify the infected people to prevent the further spread of the pandemic and to treat infected patients quickly. Machine learning techniques have a significant role in predicting of COVID-19. In this study, we performed binary classification (COVID-19 vs. other types of coronavirus) by extracting features from genome sequences. Support vector machines, naive Bayes, K-nearest neighbor, and random forest methods were used for classification. We used viral gene sequences from the 2019 Novel Coronavirus Resource Database. Experimental results presented show that a decision tree method achieved 93% accuracy.
, , Çiğdem Erol
Published: 16 March 2021
Proceedings, Volume 74; doi:10.3390/proceedings2021074021

Abstract:
Recently, gene selection has played an important role in cancer diagnosis and classification. In this study, it was studied to select high descriptive genes for use in cancer diagnosis in order to develop a classification analysis for cancer diagnosis using microarray data. For this purpose, comparative analysis and intersections of six different methods obtained by using two feature selection algorithms and three search algorithms are presented. As a result of the six different feature subset selection methods applied, it was seen that instead of 15,155 genes, 24 genes should be focused. In this case, cancer diagnosis may be possible using 24 candidate genes that have been reduced, rather than similar studies involving larger features. However, in order to see the diagnostic success of diagnoses made using these candidate genes, they should be examined in a wet laboratory.
Published: 16 March 2021
Proceedings, Volume 74; doi:10.3390/proceedings2021074018

Abstract:
Earlier in 2020 a knowledge management project was initiated with the aim of organizational performance improvement at a service company. A maturity model was applied for the gap analysis and a systematic literature review was conducted to shape the project. As the COVID-19 grew to a global scale, the aim of the project has shifted into ensuring the business continuity of the case company. Without major changes the project was carried out. At the end it was observed the company not only operated without being affected from the pandemic situation but also improved their organizational performance as aimed initially.
Published: 12 March 2021
Proceedings, Volume 74; doi:10.3390/proceedings2021074017

Abstract:
In recent years, the concept of digital transformation has emerged as an area where businesses have been working intensively. Digital transformation refers to the holistic transformation of businesses in human and business processes and technology elements in order to provide more effective and efficient services. Therefore, blockchain, which is called a disruptive technology, has great importance in ensuring the digital transformation of businesses. In this study, some determinations have been made about the adoption of blockchain technology and situation analysis while performing digital transformation in businesses. In this context, semi-structured interviews were held with experts in the blockchain field.
Published: 12 March 2021
Proceedings, Volume 74; doi:10.3390/proceedings2021074014

Abstract:
Digitalization has transformed all aspects of life, from social interactions to the working environment and education, something that accelerated with the emergence of COVID-19. The same stands for education and training activities, where the use of digital tools has been gradually advancing and become merely online because of the virus. This brought forth the need to discuss further the applications, benefits, and challenges of digital tools within the framework of the education and training process, and the need to study examples of successful applications. This study aims to support both these requirements by presenting the case study of REFUGEEClassAssistance4Teachers project and its outcomes.
Published: 11 March 2021
Proceedings, Volume 74; doi:10.3390/proceedings2021074015

Abstract:
The industry–university collaboration has been emphasized for innovation and economic development in the Triple Helix Model. To facilitate this collaboration often necessitates implementing interfaces between stakeholders. EGEVASYON, an industry-driven platform coined from the combination of innovation and Ege for the Aegean Region of Turkey, has been proposed to foster collaboration by involving researchers in industry projects. Moreover, the platform has a portal project under development, where researchers can receive recommendations among ongoing projects. Our study presents the use of Jaccard similarity measure in this recommendation model. Moreover, recommendation selection is demonstrated using a sample dataset of EU projects.
Published: 11 March 2021
Proceedings, Volume 74; doi:10.3390/proceedings2021074016

Abstract:
In parallel with the rise of Industry 4.0 and the developments experienced with digital transformation, there are striking differences in the concept of innovation in terms of process and effect. It is a fact that engineers have a strategic importance in transforming the changes and developments in the fields of informatics and technology, where great leaps have been experienced, into innovations in a way that creates value. Engineers examine the terms of perceptions and perspectives in this adaptation process and 120 engineers with different educational backgrounds in Turkey were surveyed in this study to assess the diversity of the innovative vision under examination. Statistical Package for the Social Sciences (SPSS)software was used for the stages of analysis.
Published: 10 March 2021
Proceedings, Volume 74; doi:10.3390/proceedings2021074013

Abstract:
Software engineering is a discipline utilizing Unified Modelling Language (UML) diagrams, which are accepted as a standard to depict object-oriented design models. UML diagrams make it easier to identify the requirements and scopes of systems and applications by providing visual models. In this manner, this study aims to systematically review the literature on UML diagram utilization in software engineering research. A comprehensive review was conducted over the last two decades, spanning from 2000 to 2019. Among several papers, 128 were selected and examined. The main findings showed that UML diagrams were mostly used for the purpose of design and modeling, and class diagrams were the most commonly used ones.
Published: 9 March 2021
Proceedings, Volume 74; doi:10.3390/proceedings2021074012

Abstract:
The aim of this study is to develop a web application that supports decision-making processes on subjects—such as customer relations management, marketing, and stock management—with data such as posts, comments, and likes from Instagram to four e-commerce companies. In this context, the data obtained from the Instagram accounts of e-commerce companies were recorded in a database after the pre-processing and classification stages. A web application has been developed that can support managers in their decision-making processes at operational, tactical, and strategic decision-making levels by visualizing the data recorded in the database.
Published: 8 March 2021
Proceedings, Volume 62; doi:10.3390/proceedings2020062014

Abstract:
The design and synthesis of pharmaceutical cocrystals have received great interest in the recent years. Cocrystallization of drug substances offers a tremendous opportunity for the development of new drug products with superior physical and pharmacological properties such as solubility, stability, hydroscopicity, dissolution rates and bioavailability. This short review summarizes this highly topical field, covering why the topic is of interest in pharmaceutical formulation, the definitions and practical scope of cocrystals, cocrystal preparation and characterization, a comparison of different (traditional and novel) methods for cocrystal formation and the implications for regulatory control and intellectual property protection. Traditionally, cocrystals can be prepared by solvent evaporation method, grinding, and slurry method, but every method has its limitations for certain conditions. The current trend for cocrystal formation uses sophisticated methods such as the hot melt extrusion method, spray-drying method, supercritical fluid technology and the newest method: laser irradiation. The purpose of the development of a new method is not only to overcome the limitation of traditional cocrystallization methods, but also to generate simpler steps and a continuous process for the production of the cocrystal product. This article provides a brief explanation of each method that can be used to generate pharmaceutical cocrystals as well as evaluation of cocrystals. This article also covers how the developing field of cocrystallization may impact the pharmaceutical intellectual property landscape.
Published: 5 March 2021
Proceedings, Volume 68; doi:10.3390/proceedings2021068020

Abstract:
Goat production in Chile is carried by small-scale farmers obtaining milk and cheese as the main products. The welfare of goats under these types of production systems is currently unknown and no appropriate validated operational welfare indicators are currently available. We took the tasks of identifying operational welfare indicators and validating them with all stakeholders. A total of 37 operational welfare indicators were obtained. The use of these validated indicators and the welfare score is appropriate to Chilean goat production systems and may successfully increase the sustainability of production and farmers in Chile.
Published: 5 March 2021
Proceedings, Volume 68; doi:10.3390/proceedings2021068019

Abstract:
: Terminalia ferdinandiana (Kakadu plum), belonging to the family Combretaceae, is endemic to Australia and has a long history of traditional medicinal applications and food cuisine by the Australian Indigenous people. This study investigated the effects of maturity stages on the morphology, physicochemical parameters (total soluble solids (TSS), total acid content (TAC), and pH), soluble sugar profile and antioxidant capacity of Kakadu plum (KP) fruits that were wild harvested from different trees and classified into four different maturity stages (immature to mature). TSS and TAC were determined by standard assays/procedures, main sugars by UHPLC–MS/MS and antioxidant capacity (total phenolic content (TPC) and DPPH free radical scavenging capacity) by spectrophotometry. The results showed that soluble sugars (glucose, sucrose and fructose) ranging from 1.3 to 17.7% dry weight (DW), TSS (17.0–52.7% DW) and TAC (1.3–6.7% DW) increased with maturity. However, antioxidant capacity (TPC in the range of 7.4–21.9% DW and DPPH free radical scavenging capacity from 22 to 76% inhibition at the extract concentration of 20 g·L−1) did not follow the same trend as the one observed for soluble sugars, TSS and TAC. These differences were associated with the tree-to-tree variability as a consequence of the wild harvest condition. This study provides important information to both the KP industry and Indigenous enterprises regarding the selection of the appropriate maturity stage to harvest KP fruit to target for different markets (e.g., low-sugar vs. high-sugar fruit).
Published: 4 March 2021
Proceedings, Volume 74; doi:10.3390/proceedings2021074008

Abstract:
The outbreak of COVID-19 has caught humanity off guard. Peak-times differ in countries based on their characteristics and precautions taken by governments. In this study, we aimed to determine relative importance of indicators on the spread and to assist non-peaked countries to estimate their peak-times. Gradient Boosting Method was employed on 82 countries which reached peak-times. The findings indicate that hospital beds per thousand is the main predictor of peak-time estimation. Restrictions on gatherings and closing public transportation have the highest relative importance among governmental precautions. This model can be utilized and employed with various indices and alternative machine-learning algorithms.
Published: 4 March 2021
Proceedings, Volume 74; doi:10.3390/proceedings2021074010

Abstract:
As a result of the changes in higher education, universities are utilizing business intelligence and analytics applications, which are private-sector practices. This study aimed to determine the extent of the use of business intelligence and analytics applications at Turkish universities. For this purpose, case studies were conducted at 12 Turkish universities that have different characteristics. Case studies were conducted face to face as semi-structured interviews. It was revealed that universities use information systems for their business processes; however, they lack the utilization of business analytics applications, especially predictive and prescriptive analytics.
Published: 4 March 2021
Proceedings, Volume 74; doi:10.3390/proceedings2021074007

Abstract:
Nowadays, banks are working on finding a suitable campaign for every customer profile. With this study, we aimed to develop a recommendation system that will direct the customer to the appropriate campaign. With the data received from a private bank, credit card transactions of the users were analyzed, and spending habits were modeled. We aimed to recommend the most suitable campaign to the users through the created models. Within the scope of the study, 662.088 credit card transactions performed by 4997 customers within three months were analyzed, and three campaigns were proposed for each customer as a result of the study. The ALS (Alternating Least Square) algorithm was used on Spark to establish the recommendation system. The primary purpose of the study is to increase customer satisfaction by finding unique users based on spending habits instead of campaigns that are applied collectively to customers by making a personalized campaign offer.
Published: 4 March 2021
Proceedings, Volume 74; doi:10.3390/proceedings2021074006

Abstract:
Diabetes is a serious condition that leads to high blood sugar and the prediction of this disease at an early stage is of great importance for reducing the risk of some significant diabetes complications. In this study, bagging and boosting approaches using six different decision tree-based (DTB) classifiers were implemented on experimental data for diabetes prediction. This paper also compares applied individual implementation, bagging, and boosting of DTB classifiers in terms of accuracy rates. The results indicate that the bagging and boosting approaches outperform the individual DTB classifiers, and real Adaptive Boosting (AdaBoost) and bagging using Naive Bayes Tree (NBTree) present the best accuracy score of 98.65%.
Published: 4 March 2021
Proceedings, Volume 68; doi:10.3390/proceedings2021068018

Abstract:
Reduced graphene oxide (rGO) fibre electrodes and their ability to sense paracetamol (as model drug) were studied. rGO was electrodeposited onto carbon fibre by two different approaches: potentiostatic deposition and cyclic voltammetry (CV) in the presence of graphene oxide solution. Carbon fibre electrodes coated with rGO (after five CV cycles) could sense paracetamol with an oxidation peak at 0.62 V (vs. Ag/AgCl). The limit of detection of this fibre sensor was found to be 36.3 µM with a linear range of 50–500 µM of paracetamol (R2 = 0.9901).
Published: 4 March 2021
Proceedings, Volume 74; doi:10.3390/proceedings2021074009

Abstract:
This meta-analysis examines the studies on groupware published between the years 2010 and 2020. Descriptive analysis was conducted to determine the distribution of studies in terms of publication year, time–space matrix category, targeted sectors, research methods, and the academic field of the journals that published these studies. Although groupware played a significant role in communication, collaboration, and coordination of users in various collaborative work conditions and sectors, the majority of studies focused on asynchronous and distributed collaborative work environments in the software engineering field, and the research method preferred was design science.
Published: 4 March 2021
Proceedings, Volume 74; doi:10.3390/proceedings2021074011

Abstract:
Small and mid-size enterprises (SME) are considered the backbone of developing economies in terms of reducing poverty and unemployment. Although most SMEs are still reluctant in new technology adoption, such as cloud computing, some benefited from the services provided by cloud technology. This study aims to assess the performance evaluation of small and mid-sized enterprises (SMEs) regarding the usage of cloud computing in their activities. The quantitative study was conducted on a sample of 112 respondents employed in Turkish SMEs. A research model is utilized based on performance specific scales. Results signified cloud technology’s positive impact on business performance.
Page of 119
Articles per Page
by
Show export options
  Select all
Back to Top Top