ba

Informing in the Flat, Rough World: Balancing Globalization Gone Awry




ba

Backbone or Helping Hand? On the Role of Information Systems and Non-systematic Information in Managers’ Work




ba

Informing Science and Andragogy: A Conceptual Scheme of Client-Side Barriers to Informing University Students




ba

Are We Really Having an Impact? A Comprehensive Approach to Assessing Improvements in Critical Thinking in an MBA Program




ba

Global Agile Team Design: An Informing Science Perspective




ba

User Perceptions of Aesthetic Visual Design Variables within the Informing Environment: A Web-Based Experiment




ba

Genetic-linked Inattentiveness Protects Individuals from Internet Overuse: A Genetic Study of Internet Overuse Evaluating Hypotheses Based on Addiction, Inattention, Novelty-seeking and Harm-avoidance

The all-pervasive Internet has created serious problems, such as Internet overuse, which has triggered considerable debate over its relationship with addiction. To further explore its genetic susceptibilities and alternative explanations for Internet overuse, we proposed and evaluated four hypotheses, each based on existing knowledge of the biological bases of addiction, inattention, novelty-seeking, and harm-avoidance. Four genetic loci including DRD4 VNTR, DRD2 Taq1A, COMT Val158Met and 5-HTTLPR length polymorphisms were screened from seventy-three individuals. Our results showed that the DRD4 4R/4R individuals scored significantly higher than the 2R or 7R carriers in Internet Addiction Test (IAT). The 5-HTTLPR short/short males scored significantly higher in IAT than the long variant carriers. Bayesian analysis showed the most compatible hypothesis with the observed genetic results was based on attention (69.8%), whereas hypotheses based harm-avoidance (21.6%), novelty-seeking (7.8%) and addiction (0.9%) received little support. Our study suggests that carriers of alleles (DRD4 2R and 7R, 5-HTTLPR long) associated with inattentiveness are more likely to experience disrupted patterns and reduced durations of Internet use, protecting them from Internet overuse. Furthermore, our study suggests that Internet overuse should be categorized differently from addiction due to the lack of shared genetic contributions.




ba

KnoWare: A System for Citizen-based Environmental Monitoring

Non-expert scientists are frequently involved in research requiring data acquisition over large geographic areas. Despite mutual benefits for such “citizen science”, barriers also exist, including 1) difficulty maintaining user engagement with timely feedback, and 2) the challenge of providing non-experts with the means to generate reliable data. We have developed a system that addresses these barriers. Our technologies, KnoWare and InSpector, allow users to: collect reliable scientific measurements, map geo-tagged data, and intuitively visualize the results in real-time. KnoWare comprises a web portal and an iOS app with two core functions. First, users can generate scientific ‘queries’ that entail a call for information posed to a crowd with customized options for participant responses and viewing data. Second, users can respond to queries with their GPS-enabled mobile device, which results in their geo- and time-stamped responses populating a web-accessible map in real time. KnoWare can also interface with additional applications to diversify the types of data that can be reported. We demonstrate this capability with a second iOS app called InSpector that performs quantitative water quality measurements. When used in combina-tion, these technologies create a workflow to facilitate the collection, sharing and interpretation of scientific data by non-expert scientists.




ba

Organizational Creativity and IT-based Support

The main aim of this paper is to provide a theoretically and empirically grounded discussion on IT-based organizational creativity support. This study attempts to answer the following questions: (1) what is the issue of organizational creativity and its IT-based support, (2) what is the demand for IT –based organizational creativity support; (3) what are the main determinants and barriers to IT-based organizational creativity support; and (4) what success factors are crucial for IT-based organizational creativity support. This paper presents the analysis results of a survey conducted in 25 selected organizations. The paper provides valuable information on the possibilities of IT applications in organizational creativity support as well as the associated success factors. It makes useful contribution to our better understanding of IT-based organizational creativity support issues.




ba

Flow-Based Provenance

Aim/Purpose: With information almost effortlessly created and spontaneously available, current progress in Information and Communication Technology (ICT) has led to the complication that information must be scrutinized for trustworthiness and provenance. Information systems must become provenance-aware to be satisfactory in accountability, reproducibility, and trustworthiness of data. Background: Multiple models for abstract representation of provenance have been proposed to describe entities, people, and activities involved in producing a piece of data, including the Open Provenance Model (OPM) and the World Wide Web Consortium. These models lack certain concepts necessary for specifying workflows and encoding the provenance of data products used and generated. Methodology: Without loss of generality, the focus of this paper is on OPM depiction of provenance in terms of a directed graph. We have redrawn several case studies in the framework of our proposed model in order to compare and evaluate it against OPM for representing these cases. Contribution: This paper offers an alternative flow-based diagrammatic language that can form a foundation for modeling of provenance. The model described here provides an (abstract) machine-like representation of provenance. Findings: The results suggest a viable alternative in the area of diagrammatic representation for provenance applications. Future Research: Future work will seek to achieve more accurate comparisons with current models in the field.




ba

Communicating Transdisciplinary Characteristics In Global Regulatory Affairs: An Example From Health Professions Education

Aim/Purpose: This paper describes the regulatory affairs discipline as a useful case in the study of both inter- and transdisciplinary science and dynamics related to communication across multiple boundaries. We will 1) outline the process that led to the development of transnational competencies for regulatory affairs graduate education, 2) discuss how the process highlights the transdisciplinary character of regulatory affairs, 3) provide implications for how to communicate the influence of this characterization to future healthcare professionals, and 4) draw conclusions regarding how our lessons-learned might inform other programs of study. Background: In the past few decades, the regulatory affairs profession has become more internationalized. This prompted the need for new competencies grounded in the transnational and cross-disciplinary contexts in which these professionals are required to operate. Methodology: A convenience sample of experienced regulatory affairs professionals from multiple disciplines contributed to the development of transnational competencies for a master’s program in regulatory affairs using a transdisciplinary framework. Contribution: An applied exemplar in which to understand how transdisciplinary characteristics can be communicated and applied in higher education. Recommendations for Practitioners: This paper recommends how competencies developed from a regulatory affairs program can serve as exemplars for other applied transdisciplinary higher education programs. Impact on Society: This framework provides a seldom-used reflective approach to regulatory affairs education that utilizes cross-disciplinary theory to inform competence-based formation of professionals.




ba

Training Generalists in Higher Education: Its Theoretical Basis and Prospects

Aim/Purpose: Absence of new scientific approaches and specialists (generalists), who professionally obtain such approaches, is one of the main reasons for an ineffective solution of complex multifactor problems of the modern society. Background: The article briefly describes the concept of systems transdisciplinary integration of knowledge of different scientific disciplines. Also, it shows an opportunity to use this concept education of generalists in higher education. Methodology: The article highlights the idea of gestalt of knowledge, which is based on systems transdisciplinary model of spatial unit of order. It describes the basis of gestalt-of-the-one and gestalt-of-the-whole. Also, it explains the differences and practical capabilities of holist generalists and unicentrist generalists. Contribution: Loss of identificational attributes can take place during the process of integration of knowledge of different scientific disciplines. The article shows how to avoid this complication within a systems transdisciplinary approach. Findings: Each type of fundamental knowledge has its own carriers, such as scientists and specialists. Therefore, direct interaction of people-carriers of fundamental knowledge has limited potential. Presently, a more practical importance is the interaction between scientists and specialists within the zones of hybridization of fundamental knowledge. Hybridization is the process of systematization of knowledge within specialized systems transdisciplinary models of unit of order. A specialist generalist’s professional work is to organize scientific research, systemise knowledge of different scientific disciplines, make necessary conclusions, and suggest optimal solution for complex multifactor problems. Therefore, generalists should be considered as an important move towards the solution of complex multifactor problems of modern society. Recommendation for Researchers: A new scientific approach is a way of widening scientific worldview. A new approach in inorganic chemistry made it possible to create the Mendeleev periodic table of elements. Owing to this table, researchers were able to learn the characteristics and attributes of chemical elements, which can be found in nature. Also, models of systems transdisciplinary approach allow the discovery of new elements and relations of complex multifactor problems. Its absence would, however, hinder the research and the problem description. Future Research: The article justifies that preparation of generalists in higher education is one of the main peculiarities of universities of the third generation. Therefore, it might be desirable for organizers of higher education and university leaders to begin speculations regarding this quest, develop educational programs for generalists, and search for optimal forms and methods of solution.




ba

Ensemble Learning Approach for Clickbait Detection Using Article Headline Features

Aim/Purpose: The aim of this paper is to propose an ensemble learners based classification model for classification clickbaits from genuine article headlines. Background: Clickbaits are online articles with deliberately designed misleading titles for luring more and more readers to open the intended web page. Clickbaits are used to tempted visitors to click on a particular link either to monetize the landing page or to spread the false news for sensationalization. The presence of clickbaits on any news aggregator portal may lead to an unpleasant experience for readers. Therefore, it is essential to distinguish clickbaits from authentic headlines to mitigate their impact on readers’ perception. Methodology: A total of one hundred thousand article headlines are collected from news aggregator sites consists of clickbaits and authentic news headlines. The collected data samples are divided into five training sets of balanced and unbalanced data. The natural language processing techniques are used to extract 19 manually selected features from article headlines. Contribution: Three ensemble learning techniques including bagging, boosting, and random forests are used to design a classifier model for classifying a given headline into the clickbait or non-clickbait. The performances of learners are evaluated using accuracy, precision, recall, and F-measures. Findings: It is observed that the random forest classifier detects clickbaits better than the other classifiers with an accuracy of 91.16 %, a total precision, recall, and f-measure of 91 %.




ba

Transdisciplinarity: Marginal Direction or Global Approach of Contemporary Science?

Aim/Purpose: The article is designed to contradict the existing opinion that “transdisciplinarity is a marginal direction of contemporary science.” Background: The difficulties of implementing transdisciplinarity into science and education are connected with the fact that its generally accepted definition, identification characteristics, and methodological features are still missing. In order to eliminate these disadvantages of transdisciplinarity, its prime cause and initial idea had to be detected. Then an attempt was made to analyze correspondence of the existing opinions about transdisciplinarity with the content of its prime cause and initial ideas. Methodology: The bibliometric content analysis of the literature reviews on the subject of transdisciplinary was used in order to determine correspondence of the opinions about transdisciplinarity with the meaning of its prime cause and initial ideas, as well as to generalize these opinions. This method allowed detecting and classifying opinions into 11 groups including 39 stereotypes of transdisciplinarity. For substantiation of transdisciplinary approaches consistency with the approaches of the contemporary science C.F. Gauss random variables normal distribution was used. The “Gauss curve” helped to show the place of transdisciplinary and systems transdisciplinary approaches in the structure of academic and systems approaches. The “Gauss curve” demonstrated the step-by-step broadening of the scientific worldview horizon due to sequential intensification of synthesis, integration, unification, and generalization of the disciplinary knowledge. Contribution: Based on rethinking the results from bibliometric content analysis of the literature reviews, the generalized definition of transdisciplinarity could be formulated, as well as the definition for the transdisciplinary and systems transdisciplinary approaches could be given. It was shown that transdisciplinarity is a natural stage for development of contemporary science and education, and the transdisciplinary approaches were capable to suggest the methods and tools to solve the complex and poorly structured problems of science and society. Findings: Many existing stereotypes of transdisciplinarity do not meet its prime cause and initial ideas. Such stereotypes do not have deep philosophic and theoretical substantiation, as well as not suggesting the transdisciplinary methods and tools. Thus, the authors of such stereotypes often claim them to be transdisciplinary or suggest perceiving them as transdisciplinarity. This circumstance contributed to the fact that many disciplinary scientists, practitioners, and initiators of higher education view transdisciplinarity as a marginal direction of contemporary science. Based on the generalized definition of transdisciplinarity, as well as its prime cause and initial ideas, we managed to show that transdisciplinarity is presented in contemporary science in the form of two different approaches: the transdisciplinary approach and the systems transdisciplinary approaches. The objective of the transdisciplinary approach is ensuring science development at the stage of synthesis and integration of disciplinary knowledge. The objective of the systems transdisciplinary approach is ensuring solving of modern society problems using unification and generalization of disciplinary knowledge. Recommendation for Researchers: The researchers should consider that within the limits of the transdisciplinary approach the disciplinary specialists are managed. Within the limits of the systems transdisciplinary approach the disciplinary knowledge is managed. Thus, the transdisciplinary approach is efficient for organization and research with participation of the scientists of complementary disciplines. An example for such research can be a team of researchers of medical disciplines and complimentary disciplines from chemistry, physics, and engineering. The systems transdisciplinary approach is efficient for organization and performance of research with participation of scientists of non-complementary disciplines, for example, economics, physics, meteorology, chemistry, ecology, geology, and sociology. Future Research: In terms of the main initial idea, transdisciplinarity is formed as a global approach. The global approach should have a traditional institutional form: it should be a science discipline (meta-discipline) and have carriers with the transdisciplinary worldview. Training for such carriers can be organized by the universities within the limits of the systems transdisciplinarity departments and Centers of Systems Transdisciplinary Retraining for Disciplinary Specialists. Thus, it is reasonable to initiate discussion for the idea to reform the disciplinary structure of the universities considering creation of such departments and centers.




ba

The Good, the Bad, and the Neutral: Twitter Users’ Opinion on the ASUU Strike

Aim/Purpose: Nigeria’s university education goes through incessant strikes by the Academic Staff Union of Universities (ASUU). This strike has led to shared emotion on micro-blogging sites like Twitter. This study analyzed selected historical tweets from the “ASUU” to understand citizens’ opinions. Background: The researchers conducted sentiment analysis and topic modelling to understand Twitter users’ opinions on the strike. Methodology: The researchers used the Valence Aware Dictionary for Sentiment Reasoning (VADER) technique for sentiment analysis, and the Latent Dirichlet allocation (LDA) was used for topic modelling. A total of 10,000 tweets were first extracted for the study. After data cleaning, 1323 tweets were left. Contribution: To the researcher’s best knowledge, no published study has presented a sentiment analysis on the topic of the ASUU strike using the Twitter dataset. This research will fill this gap by providing a sentiment analysis and drawing out subjects by exploring the tweets on the phrase “ASUU.” Findings: The sentiment analysis result using VADER returned 567 tweets as ‘Negative,’ with the remaining 544 and 212 categorized as Positive and Neutral. The result of the LDA returned six topics, all comprising seven keywords. The topics were the solution to the strike, ASUU strike effect, strike Call-off, appeal to ASUU, student protest and student appeal. Recommendation for Researchers: Researchers can use this study’s findings to compare with other contexts of opinion mining. Practitioners may also use the research to understand better the attitudes of their staff and students about the strikes to create actionable solutions before the suspension of the strike. Future Research: Future studies can collect information from other social networking and blogging sites.




ba

Analysis of Machine-Based Learning Algorithm Used in Named Entity Recognition

Aim/Purpose: The amount of information published has increased dramatically due to the information explosion. The issue of managing information as it expands at this rate lies in the development of information extraction technology that can turn unstructured data into organized data that is understandable and controllable by computers Background: The primary goal of named entity recognition (NER) is to extract named entities from amorphous materials and place them in pre-defined semantic classes. Methodology: In our work, we analyze various machine learning algorithms and implement K-NN which has been widely used in machine learning and remains one of the most popular methods to classify data. Contribution: To the researchers’ best knowledge, no published study has presented Named entity recognition for the Kikuyu language using a machine learning algorithm. This research will fill this gap by recognizing entities in the Kikuyu language. Findings: An evaluation was done by testing precision, recall, and F-measure. The experiment results demonstrate that using K-NN is effective in classification performance. Recommendation for Researchers: With enough training data, researchers could perform an experiment and check the learning curve with accuracy that compares to state of art NER. Future Research: Future studies may be done using unsupervised and semi-supervised learning algorithms for other resource-scarce languages.




ba

Critical Review of Stack Ensemble Classifier for the Prediction of Young Adults’ Voting Patterns Based on Parents’ Political Affiliations

Aim/Purpose: This review paper aims to unveil some underlying machine-learning classification algorithms used for political election predictions and how stack ensembles have been explored. Additionally, it examines the types of datasets available to researchers and presents the results they have achieved. Background: Predicting the outcomes of presidential elections has always been a significant aspect of political systems in numerous countries. Analysts and researchers examining political elections rely on existing datasets from various sources, including tweets, Facebook posts, and so forth to forecast future elections. However, these data sources often struggle to establish a direct correlation between voters and their voting patterns, primarily due to the manual nature of the voting process. Numerous factors influence election outcomes, including ethnicity, voter incentives, and campaign messages. The voting patterns of successors in regions of countries remain uncertain, and the reasons behind such patterns remain ambiguous. Methodology: The study examined a collection of articles obtained from Google Scholar, through search, focusing on the use of ensemble classifiers and machine learning classifiers and their application in predicting political elections through machine learning algorithms. Some specific keywords for the search include “ensemble classifier,” “political election prediction,” and “machine learning”, “stack ensemble”. Contribution: The study provides a broad and deep review of political election predictions through the use of machine learning algorithms and summarizes the major source of the dataset in the said analysis. Findings: Single classifiers have featured greatly in political election predictions, though ensemble classifiers have been used and have proven potent use in the said field is rather low. Recommendation for Researchers: The efficacy of stack classification algorithms can play a significant role in machine learning classification when modelled tactfully and is efficient in handling labelled datasets. however, runtime becomes a hindrance when the dataset grows larger with the increased number of base classifiers forming the stack. Future Research: There is the need to ensure a more comprehensive analysis, alternative data sources rather than depending largely on tweets, and explore ensemble machine learning classifiers in predicting political elections. Also, ensemble classification algorithms have indeed demonstrated superior performance when carefully chosen and combined.




ba

Tribal Self-Determination and the Protection of Cultural Property

This article is part of the 2024 BCLT-BTLJ-CMTL Symposium.  Angela R. Riley When my tribe, the Citizen Potawatomi Nation of Oklahoma (CPN), established an Eagle Aviary to protect and care for injured eagles that could no longer survive in the wild, it did so with a few goals in mind. ...

The post Tribal Self-Determination and the Protection of Cultural Property appeared first on Berkeley Technology Law Journal.




ba

Deep learning-based lung cancer detection using CT images

This work demonstrates a hybrid deep learning (DL) model for lung cancer (LC) detection using CT images. Firstly, the input image is passed to the pre-processing stage, where the input image is filtered using a BF and the obtained filtered image is subjected to lung lobe segmentation, where segmentation is done using squeeze U-SegNet. Feature extraction is performed, where features including entropy with fuzzy local binary patterns (EFLBP), local optimal oriented pattern (LOOP), and grey level co-occurrence matrix (GLCM) features are mined. After completing the extracting of features, LC is detected utilising the hybrid efficient-ShuffleNet (HES-Net) method, wherein the HES-Net is established by the incorporation of EfficientNet and ShuffleNet. The presented HES-Net for LC detection is investigated for its performance concerning TNR, and TPR, and accuracy is established to have acquired values of 92.1%, 93.1%, and 91.3%.




ba

A fuzzy-probabilistic bi-objective mathematical model for integrated order allocation, production planning, and inventory management

An optimisation-based decision-making support is proposed in this study in the form of fuzzy-probabilistic programming, which can be used to solve integrated order allocation, production planning, and inventory management problems in fuzzy and probabilistic uncertain environments. The problem was modelled in an uncertain mathematical optimisation model with two objectives: maximising the expectation of production volume and minimising the expectation of total operational cost subject to demand and other constraints. The model belongs to fuzzy-probabilistic bi-objective integer linear programming, and the generalised reduced gradient method combined with the branch-and-bound algorithm was utilised to solve the derived model. Numerical simulations were performed to illustrate how the optimal decision was formulated. The results showed that the proposed decision-making support was successful in providing the optimal decision with the maximum expectation of the production volume and minimum expectation of the total operational cost. Therefore, the approach can be implemented by decision-makers in manufacturing companies.




ba

Multimodal Speech Emotion Recognition Based on Large Language Model

Congcong FANG,Yun JIN,Guanlin CHEN,Yunfan ZHANG,Shidang LI,Yong MA,Yue XIE, Vol.E107-D, No.11, pp.1463-1467
Currently, an increasing number of tasks in speech emotion recognition rely on the analysis of both speech and text features. However, there remains a paucity of research exploring the potential of leveraging large language models like GPT-3 to enhance emotion recognition. In this investigation, we harness the power of the GPT-3 model to extract semantic information from transcribed texts, generating text modal features with a dimensionality of 1536. Subsequently, we perform feature fusion, combining the 1536-dimensional text features with 1188-dimensional acoustic features to yield comprehensive multi-modal recognition outcomes. Our findings reveal that the proposed method achieves a weighted accuracy of 79.62% across the four emotion categories in IEMOCAP, underscoring the considerable enhancement in emotion recognition accuracy facilitated by integrating large language models.
Publication Date: 2024/11/01




ba

Measuring Mental Workload of Software Developers Based on Nasal Skin Temperature

Keitaro NAKASAI,Shin KOMEDA,Masateru TSUNODA,Masayuki KASHIMA, Vol.E107-D, No.11, pp.1444-1448
To automatically measure the mental workload of developers, existing studies have used biometric measures such as brain waves and the heart rate. However, developers are often required to equip certain devices when measuring them, and can therefore be physically burdened. In this study, we evaluated the feasibility of non-contact biometric measures based on the nasal skin temperature (NST). In the experiment, the proposed biometric measures were more accurate than non-biometric measures.
Publication Date: 2024/11/01




ba

Ontology Matching and Repair Based on Semantic Association and Probabilistic Logic

Nan WU,Xiaocong LAI,Mei CHEN,Ying PAN, Vol.E107-D, No.11, pp.1433-1443
With the development of the Semantic Web, an increasing number of researchers are utilizing ontology technology to construct domain ontology. Since there is no unified construction standard, ontology heterogeneity occurs. The ontology matching method can fuse heterogeneous ontologies, which realizes the interoperability between knowledge and associates to more relevant semantic information. In the case of differences between ontologies, how to reduce false matching and unsuccessful matching is a critical problem to be solved. Moreover, as the number of ontologies increases, the semantic relationship between ontologies becomes increasingly complex. Nevertheless, the current methods that solely find the similarity of names between concepts are no longer sufficient. Consequently, this paper proposes an ontology matching method based on semantic association. Accurate matching pairs are discovered by existing semantic knowledge, and then the potential semantic associations between concepts are mined according to the characteristics of the contextual structure. The matching method can better carry out matching work based on reliable knowledge. In addition, this paper introduces a probabilistic logic repair method, which can detect and repair the conflict of matching results, to enhance the availability and reliability of matching results. The experimental results show that the proposed method effectively improves the quality of matching between ontologies and saves time on repairing incorrect matching pairs. Besides, compared with the existing ontology matching systems, the proposed method has better stability.
Publication Date: 2024/11/01




ba

Multi-Focus Image Fusion Algorithm Based on Multi-Task Learning and PS-ViT

Qinghua WU,Weitong LI, Vol.E107-D, No.11, pp.1422-1432
Multi-focus image fusion involves combining partially focused images of the same scene to create an all-in-focus image. Aiming at the problems of existing multi-focus image fusion algorithms that the benchmark image is difficult to obtain and the convolutional neural network focuses too much on the local region, a fusion algorithm that combines local and global feature encoding is proposed. Initially, we devise two self-supervised image reconstruction tasks and train an encoder-decoder network through multi-task learning. Subsequently, within the encoder, we merge the dense connection module with the PS-ViT module, enabling the network to utilize local and global information during feature extraction. Finally, to enhance the overall efficiency of the model, distinct loss functions are applied to each task. To preserve the more robust features from the original images, spatial frequency is employed during the fusion stage to obtain the feature map of the fused image. Experimental results demonstrate that, in comparison to twelve other prominent algorithms, our method exhibits good fusion performance in objective evaluation. Ten of the selected twelve evaluation metrics show an improvement of more than 0.28%. Additionally, it presents superior visual effects subjectively.
Publication Date: 2024/11/01




ba

Aggregated to Pipelined Structure Based Streaming SSN for 1-ms Superpixel Segmentation System in Factory Automation

Yuan LI,Tingting HU,Ryuji FUCHIKAMI,Takeshi IKENAGA, Vol.E107-D, No.11, pp.1396-1407
1 millisecond (1-ms) vision systems are gaining increasing attention in diverse fields like factory automation and robotics, as the ultra-low delay ensures seamless and timely responses. Superpixel segmentation is a pivotal preprocessing to reduce the number of image primitives for subsequent processing. Recently, there has been a growing emphasis on leveraging deep network-based algorithms to pursue superior performance and better integration into other deep network tasks. Superpixel Sampling Network (SSN) employs a deep network for feature generation and employs differentiable SLIC for superpixel generation. SSN achieves high performance with a small number of parameters. However, implementing SSN on FPGAs for ultra-low delay faces challenges due to the final layer’s aggregation of intermediate results. To address this limitation, this paper proposes an aggregated to pipelined structure for FPGA implementation. The final layer is decomposed into individual final layers for each intermediate result. This architectural adjustment eliminates the need for memory to store intermediate results. Concurrently, the proposed structure leverages decomposed layers to facilitate a pipelined structure with pixel streaming input to achieve ultra-low latency. To cooperate with the pipelined structure, layer-partitioned memory architecture is proposed. Each final layer has dedicated memory for storing superpixel center information, allowing values to be read and calculated from memory without conflicts. Calculation results of each final layer are accumulated, and the result of each pixel is obtained as the stream reaches the last layer. Evaluation results demonstrate that boundary recall and under-segmentation error remain comparable to SSN, with an average label consistency improvement of 0.035 over SSN. From a hardware performance perspective, the proposed system processes 1000 FPS images with a delay of 0.947 ms/frame.
Publication Date: 2024/11/01




ba

Hybrid of machine learning-based multiple criteria decision making and mass balance analysis in the new coconut agro-industry product development

Product innovation has become a crucial part of the sustainability of the coconut agro-industry in Indonesia, covering upstream and downstream sides. To overcome this challenge, it is necessary to create several model stages using a hybrid method that combines machine learning based on multiple criteria decision making and mass balance analysis. The research case study was conducted in Tembilahan district, Riau province, Indonesia, one of the primary coconut producers in Indonesia. The analysis results showed that potential products for domestic customers included coconut milk, coconut cooking oil, coconut chips, coconut jelly, coconut sugar, and virgin coconut oil. Furthermore, considering the experts, the most potential product to be developed was coconut sugar with a weight of 0.26. Prediction of coconut sugar demand reached 13,996,607 tons/year, requiring coconut sap as a raw material up to 97,976,249.




ba

Basics of the Adtech Ecosystem

Basics of the Adtech Ecosystem This guide delves into the intricacies of the adtech ecosystem, an elaborate mesh of platforms and technologies designed to facilitate and enhance the purchase and sale of digital advertising. Within this system, crucial elements such as ad servers, DSPs (Demand Side Platforms), SSPs (Supply Side Platforms), and ad [...]




ba

Unearned Status Gain: Evidence From a Global Language Mandate

Theories of status rarely address unearned status gain—an unexpected and unsolicited increase in relative standing, prestige or worth, attained not through individual effort or achievement, but from a shift in organizationally valued characteristics. We build theory about unearned status gain drawing from a qualitative study of 90 U.S.-based employees of a Japanese organization following a company-wide English language mandate. These native English-speaking employees believed that the mandate elevated their worth in the organization, a status gain they attributed to chance, hence deeming it unearned. They also reported a heightened sense of belonging, optimism about career advancement, and access to expanded networks. Yet among those who interacted regularly with Japanese counterparts, narratives also revealed discomfort, which manifested in at least two ways. These informants engaged in "status rationalization," emphasizing the benefits Japanese employees might obtain by learning English, and prevaricated on whether the change was temporary or durable, a process we call "status stability appraisal." The fact that these narratives were present only among those working closely with Japanese employees highlights intergroup contact as a factor in shaping the unearned status gain experience. Supplemental analysis of data gathered from 66 Japanese employees provided the broader organizational context and the nonnative speakers' perspective of the language shift. These findings expand our overall understanding of status dynamics in organizations, and show how status gains can yield both positive and negative outcomes.




ba

AGAINST EVIDENCE-BASED MANAGEMENT, FOR MANAGEMENT LEARNING

Evidence-based management has been widely advocated in management studies. It has great ambition: all manner of organizational problems are held to be amenable to an evidence-based approach. With such ambition, however, has come a certain narrowness which risks restricting our ability to understand the diversity of problems in management studies. Indeed, in the longer term, such narrowness may limit our capacity to engage with many real-life issues in organizations. Having repeatedly heard the case for evidence-based management, we invite readers to weigh up the case against. We also set out an alternative direction - one that promotes intellectual pluralism and flexibility, the value of multiple perspectives, openness, dialogue, and the questioning of basic assumptions. These considerations are the antithesis of an evidence-based approach, but central to a fully rounded management education.




ba

Moving Opportunism to the Back Seat: Bounded Rationality, Costly Conflict, and Hierarchical Forms

We augment transaction cost economics' (TCE) bounded rationality assumption with heuristics (framing) and cognitive biases to expand the understanding of hierarchical governance in the theory. TCE traditionally puts opportunism in the frontseat, while primarily relegating bounded rationality to the support role of invoking incomplete contracts. The theory also suggests that hierarchical governance effectively mitigates opportunism-based transaction costs, making it difficult to explain why hierarchies are not always used. However, when an augmented bounded rationality assumption is incorporated into TCE, we argue, first, that bounded rationality is a separate source of transaction costs, and, second, that these costs are not equally mitigated by all forms of hierarchy. Instead, different hierarchical forms are associated with particular frames and social referents that naturally enhance specific bounded rationality-based conflicts, allowing certain hierarchical forms to mitigate bounded rationality-based transaction costs better than others. As a result, bounded rationality takes a frontseat in the theory, addressing prior critiques of TCE, expanding the governance questions addressed by the theory and creating a new moderating role for asset specificity in internal exchanges.




ba

Review: Global Leadership Practices: A Cross-Cultural Management Perspective

Do you teach anyone whom you would consider a member of the next generation of global leaders? If you answered "yes" to this question, you likely teach an audience within which many of its members already possess intercultural experience, have traveled widely, and perhaps speak several languages. These globally minded students demand in-depth learning approaches which help them prepare for complex global leadership settings. Global Leadership Practices is an excellent source of teaching materials and tools targeted to these learners.




ba

Review: Strategic Corporate Social Responsibility: Stakeholders, Globalization, and Sustainable Value Creation

In Strategic Corporate Social Responsibility (3rd edition) (SCSR), David Chandler and William B. Werther Jr. advance the view that the ability of firms to create value for a range of stakeholders over the medium- and long-term requires that they embed CSR into their strategies and operations. Its focus on the integration of CSR into strategic planning and implementation distinguishes SCSR from competing business and society textbooks, which tend to survey the field or focus on the management of the firm's relationships with stakeholders and society.




ba

An Identity Based Approach to Social Enterprise

Social enterprise has gained widespread acclaim as a tool for addressing social and environmental problems. Yet, because these organizations integrate the social welfare and commercial logics, they face the challenge of pursuing goals that frequently conflict with each other. Studies have begun to address how established social enterprises can manage these tensions, but we know little about how, why, and with what consequences social entrepreneurs mix competing logics as they create new organizations. To address this gap, we develop a theoretical model based in identity theory that helps to explain: (1) how the commercial and social welfare logics become relevant to entrepreneurship, (2) how different types of entrepreneurs perceive the tension between these logics, and (3) the implications this has for how entrepreneurs go about recognizing and developing social enterprise opportunities. Our approach responds to calls from organizational and entrepreneurship scholars to extend existing frameworks of opportunity recognition and development to better account for social enterprise creation.




ba

A Practice-Based Wisdom Perspective for Social Entrepreneurship Learning and Education

In this paper, we use a practice-based wisdom perspective to address the challenges of managing competing logics in social enterprises. From previous work it is clear that a major task for social entrepreneurs is to manage the tension between social welfare and commercial logics. Although the social welfare logic and its related values and practices form the foundations of social enterprises, social entrepreneurs have also to ensure that their businesses are commercially sustainable making it necessary to engage with the commercial logic. To this end, we develop a curriculum matrix based on social practice wisdom to assist students to learn appropriate knowledge and skills, enact social entrepreneurship goals, and integrate competing logics in innovative and sustainable ways.




ba

Iperius Backup 6.2.2 Complete Backup Utility for PC Windows

Iperius is a complete backup utility for Windows that can be used by both home users and Company servers (without any time/license limitation). Iperius also has different paid editions available, which allow for making advanced backup types, su...




ba

Programming-based formal languages and automata theory: design, implement, validate, and prove

This rather difficult read introduces the programming language FSM and the programming platform DrRacket. The author asserts that it is a convenient platform to design and prove an automata-based software




ba

An analysis of the math requirements of 199 CS BS/BA degrees at 158 U.S. universities from Communications of the ACM

The mathematics requirements for computer science (CS) students have been debated for decades. I began teaching in a CS program in 1983, and I recall similar discussions at that time. The debate has continued in one form or another




ba

NI teachers unions ballot members on strike

The pay dispute could also spread to include the Northern Ireland Civil Service.




ba

Man who ran illegal football streaming service jailed

Jonathan Edge was caught selling reprogrammed Firestick devices after advertising on Facebook.




ba

Woman Jailed for Murder After Estranged Husband Threatens to Hurt Her Family and Burn Down House

LaToya claimed self-defense, but Manassas, Virginia Prosecutor D. Burke Walker had other ideas and charged the woman with second-degree murder.




ba

Federal Judge Strikes Down Illinois ‘Assault Weapon’ Ban: Major Win for Gun Owners’ Rights!

As if gun rights activists have not had enough winning for one week, with the landslide Trump election win.  Now, a major victory for gun rights advocates has unfolded in Illinois...




ba

RTAC Large Lasercut MOLLE Backpack w/ Pistol Retention System $20.99 75%+ OFF! CODE

RTAC Large Lasercut MOLLE Backpack with a Pistol Retention System is not just $20.99 after a sale and coupon code at check out. That is 75%+ off...




ba

Illinois Assault Weapon Ban and Registration Ruled Unconstitutional

Federal District Judge Stephen P. McGlynn has ordered a permanent injunction against enforcement of the Illinois "assault weapon" and magazine ban on November 8, 2024. The order will probably be appealed to the Seventh Circuit.




ba

Finding a balance

HEINEKEN MALAYSIA BERHAD (Heineken Malaysia) recently announced that it had achieved a significant sustainability milestone in its mission to balance more than 100% of water used in its products.

Thanks to strides made under its Every Drop water strategy, the company was able to achieve this goal last year, 10 years ahead of schedule.

Speaking at the virtual launch of the Company’s Water Balancing Report 2020, Heineken Malaysia managing director Roland Bala said: “Water is central to Heineken and indeed a precious resource that is essential to all life. Our efforts in protecting our water resources over the years have enabled us to fully balance water used to brew our beers and ciders.

“We have an ambitious target to balance 1.5 litres for every 1 litre of water used in making our products.”

He added that last year, through initiatives like river and peatland conservation, rainwater harvesting, reforestation, and other community initiatives, Heineken Malaysia exceeded its water balancing target by 267%.

Heineken Malaysia’s water balancing achievements are quantified in line with international industry-standard methodologies consistent with the Volumetric Water Benefit Accounting framework published by the World Resources Institute. The results are independently validated and verified by LimnoTech, a leading international environmental science and engineering firm based in the USA.

Also at the launch were Heineken Malaysia corporate affairs and legal director Renuka Indrarajah and mananger for the RIVER Care Programme of GEC Dr. Kalithasan Kailasam, who spoke at length about the company’s various other initiatives under the W.A.T.E.R Project, a partnership between SPARK Foundation and GEC, which started in 2007.

Among the success stories were:

● The rehabilitation of Sungai Way, an urban river in an urban industrial zone, resulting in the improvement of the river’s water quality from Class IV – V (extremely polluted, not suitable for living organisms) to Class III (suitable for living organisms);

● Construction of a 305m clay dyke at the Raja Musa Forest Reserve that stores up to 136.1 million litres of water annually, contributing to the long-term sustainability of Sungai Selangor;

● Installation of over 1,000 water thimbles for more than 500 households in the Klang Valley, which resulted in water savings of 19 litres per capita per day on average;

● Installation of 16 rainwater harvesting systems for communities in Selangor, thus providing them with an alternative water source and reduce reliance on treated water for non-potable usage as well as relieving pressure on our water resources;

● Reforestation of one hectare of degraded peatland at the Raja Musa Forest Reserve, which reduces the risk of peat fires and increases the peatland’s water table, contributing to the health of Sungai Air Hitam within the Sungai Selangor watershed.

Roland added that he was optimistic that the company, buoyed by this recent achievement, would achieve the rest of its planned sustainability targets going forward.

“It is challenging,” he said, “but we believe in Heineken’s [mission]. We can do it as an organisation, and we are committed to do what we need to get there.”

Heineken Malaysia’s Water Balancing Report 2020 is available to the public via this link.




ba

Engaging in constructive debates

WE have all experienced it – engaging in a discussion where new information or an opposing viewpoint makes us feel like doubling down on our beliefs rather than reconsidering them. This phenomenon, known as the backfire effect, occurs when people react
to contradictory information by holding more firmly to their existing beliefs.

The backfire effect can create a barrier to constructive dialogue, fostering defensiveness and preventing us from learning, evolving and understanding each other. With complex social issues on the rise, understanding the backfire effect and learning how to counteract it is essential to creating productive and respectful conversations.

The backfire effect is most common in debates involving personal values or issues closely tied to identity, such as opinions on social, environmental or political matters.

For example, in Malaysia, discussions on humane stray management or environmental policy can often spark passionate debates where each side becomes more rooted in their stance.

Recognising when the backfire effect is influencing a conversation can help us redirect it, moving from argument to dialogue and creating spaces for understanding and potential solutions.

At its core, the backfire effect is rooted in psychological defensiveness. When people’s beliefs are challenged, particularly on issues they are deeply invested in, it can feel like a threat to their sense of self.

Psychologists suggest that this is because we tend to intertwine certain beliefs with our identity, making it difficult to separate disagreement with an idea from a personal attack. This effect is more pronounced when discussing issues tied to social identity, politics or moral values.

Additionally, the fear of admitting error can make us cling to our views. If we have championed a particular idea or belief, admitting that we may have been mistaken can be uncomfortable. The backfire effect is a subconscious way of defending against this discomfort by rejecting new information and doubling down on previous beliefs.

Techniques for engaging in constructive debates

Understanding the backfire effect is the first step towards overcoming it, but real progress requires adopting strategies that can help us and others engage in more open, constructive discussions.

Here are several techniques to help foster productive dialogue,
reduce defensiveness and encourage open-mindedness:

Lead with curiosity, not conviction

Entering a conversation with a desire to understand rather than persuade is essential. Leading with curiosity helps set a collaborative tone, showing others that you are genuinely interested in their perspective.

For example, if someone disagrees with humane stray management practices like trap-neuter-release (TNR), you may start by saying, “I’m interested in your view – what experiences shape your opinion on this?”

This approach can disarm defensiveness and invite the person to share their experiences, making them more likely to reciprocate by considering your perspective.

Share stories, not just statistics

Facts and figures are essential but they often fail to connect emotionally. To counter the backfire effect, try sharing personal stories or experiences instead of relying solely on statistics.

For instance, in conversations about environmental policy, instead of only quoting data about pollution or deforestation, share a personal story about how environmental changes have affected your community or family. Stories humanise issues, making it easier for others to empathise and consider different viewpoints.

Emphasise shared goals and values

Even when opinions differ, finding common ground can help make the conversation more collaborative. For instance, both sides of a debate on environmental policies may share the same goal – a cleaner environment and a better quality of life – but disagree on how to achieve it.

By highlighting these shared values, you shift the conversation from an “us vs them” dynamics to a joint problem-solving approach. Statements like “we both want what is best for future generations; we just have different ideas about how to get there” can help bridge divides and reduce defensiveness.

Introduce new information gradually

Presenting too much information at once can make people feel overwhelmed, triggering a defensive response. Instead, offer new ideas or evidence in small, manageable pieces.

For example, if discussing environmental laws, introduce one or two key points rather than a long list of statistics. Gradual information- sharing allows individuals to process new perspectives without feeling pressured to accept them immediately, which can reduce the likelihood of the backfire effect.

Reframe disagreements as learning opportunities

Changing the way you frame a discussion can help mitigate defensiveness. Rather than seeing a debate as a “battle” to be won, approach it as a chance to learn.

This mindset shift encourages openness and reduces the need for defensiveness. When someone feels that a discussion is about sharing knowledge rather than proving a point, they are more likely to listen and engage constructively.

Know when to step back

Not every debate will lead to agreement, and that is okay. If a discussion becomes heated or begins to feel unproductive, it may be time to disengage respectfully.

Try phrases like, “I appreciate hearing your perspective, and I think we may have to agree to disagree for now. Thanks for sharing your thoughts.”

This approach allows both parties to leave
the conversation without feeling pressured, preserving the relationship for future discussions.

In Malaysia, topics like stray animal management and environmental policies are prime examples of where the backfire effect
often arises.

On one side, many advocate for humane and sustainable stray management practices, such as TNR, which can reduce stray populations over time. Others, however, may believe in stricter measures, fearing that strays could pose health or safety risks.

In such debates, the backfire effect can quickly escalate, with both sides becoming more entrenched as they try to defend their views.

To move forward constructively, a focus on shared goals – like safer communities and reduced stray populations – can shift the conversation from debate to dialogue.

In Malaysia, environmental policies are at a crossroads, often sparking strong opinions due to their impact across different economic levels.

Stricter policies aimed at protecting natural resources are crucial, yet they also raise concerns about their potential economic burden on lower-income communities, who may rely heavily on resource-based jobs.

Balancing the urgent need for environmental protection with the livelihoods of these communities is complex but essential.

A sustainable path forward lies in building
a common ground around shared values – a commitment to a clean, healthy environment alongside economic stability for all. This inclusive approach can help foster productive dialogue and more resilient, equitable policies.

Ultimately, overcoming the backfire effect requires us to approach conversations with empathy, open-mindedness and a willingness to understand where others are coming from.

Constructive debates are less about changing someone’s mind on the spot and more about creating a space where learning and growth are possible.

By leading with curiosity, sharing personal stories and finding common ground, we
can transform difficult conversations into opportunities for connection and progress.

Dr Praveena is a certified
mental health and awareness practitioner specialising in narcissistic abuse recovery.
Comments: letters@thesundaily.com



  • Dr Praveena Rajendra

ba

Ban colonial-era ragging, bullying

IT is sickening to read about students and cadets in educational institutions or military academies being subjected to ragging and bullying, often resulting in grievous injuries and even deaths.

The archaic and pernicious practice of ragging, often referred to as fagging in elite boarding schools, or simply as ritualistic hazing in military academies, persists today as a toxic relic of colonial-era power structures.

This practice can be traced to the cloistered halls of upper-class English boarding schools. It is a ritual of bullying and humiliation that has long been wielded as a tool for enforcing hierarchical dominance and conformist obedience.

The prevalence of such practices, even in post-colonial, democratic societies like Malaysia, is not merely an anachronism but a stark contradiction to the principles of egalitarianism and care that should underpin modern educational systems.

I remember how it was so prevalent in the sixties when we were in sixth form as well as in the universities.

Origins of ragging/bullying: An elite tradition of oppression

Ragging finds its roots in the so-called prestigious institutions of Victorian England – Eton, Harrow and Winchester – where the upper classes refined a system of abuse disguised as character-building.

The concept of fagging emerged in these schools to establish a rigid social hierarchy among boys, where younger students were essentially forced into servitude by older ones.

The practice was framed as a means of instilling discipline and preparing young men for leadership roles.

In reality, it was a mechanism to perpetuate elitism, dominance and subservience – indoctrinating children into a culture of abuse under the guise of tradition.

When these elite practices were exported to colonial territories, they were often adopted by local institutions eager to emulate the supposed prestige of their British overlords.

In this way, ragging became an insidious form of cultural imperialism, embedding colonial power structures within the social fabric of post-colonial nations.

The toxic legacy in post-colonial societies

In countries like Malaysia and other former British colonies, ragging has been adopted and adapted, often becoming even more extreme and violent than its original form.

In military academies and universities, what began as a series of petty humiliations has escalated into physical, sexual and psychological abuse.

There is a perverse justification offered for this brutality: that it fosters camaraderie, resilience and esprit de corps. Yet the reality is far more disturbing.

The sheer brutality of these practices has led to multiple instances of severe injury, trauma and even death.

In Malaysia, there have been numerous cases of young cadets and students suffering injuries that have left them physically and emotionally scarred for life.

The veneer of tradition masks the fact that ragging is simply systematic bullying, an exercise in power and control that normalises the abuse of the vulnerable.

We have just seen yet another bullying case at the National Defence University where a 19-year-old cadet was allegedly stomped on by a senior, fracturing his spine and ribs.

Last month, a hot iron was pressed on the chest of a student at a military university, just months after courts handed the death penalty to six former students over the killing of a fellow cadet at the institution.

There have been other cases such as J. Soosaimanicckam, a 27-year-old navy cadet officer, who died of homicide at the KD Sultan Idris Lumut naval base on May 19, 2018.

Beyond universities, bullying is also on the rise in public schools.

Nearly 5,000 cases of bullying were reported over the first 10 months of 2023, according to the latest data from the Education Ministry, a sharp rise from 3,887 cases for the whole of 2022.

Failure of institutional accountability

The persistence of ragging is compounded by the complicity of educational institutions, which often turn a blind eye to the abuse, framing it as a rite of passage.

Administrators and faculty, many of whom are former students of the same institutions, perpetuate a culture of silence.

This lack of accountability only emboldens the perpetrators, creating an environment where victims feel powerless to speak out.

Military academies are notorious for their strict hierarchical structure, which leaves little room for dissent.

The emphasis on blind obedience and unquestioning discipline suppresses the voices of those who are most affected.

The rhetoric of “toughening up” young recruits masks the reality that many leave these academies with lifelong trauma, not strengthened resolve.

In this way, the very institutions tasked with building national character are guilty of undermining the values of respect, empathy and human dignity.

Call for cultural, institutional reform

It is both ironic and tragic that post-colonial nations like Malaysia, which fought for independence and the promise of a fair and just society, continue to perpetuate a colonial legacy that embodies the worst aspects of imperial rule.

Ragging and its equivalents are antithetical to the values that should define modern, democratic societies.

Instead of reinforcing outdated and oppressive traditions, Malaysia should be leading the way in promoting caring, compassionate and egalitarian values in its educational and military institutions.

A modern educational system should focus on mentorship, mutual respect and leadership through empathy rather than through intimidation and violence.

The true strength of a society lies not in its ability to produce individuals hardened by abuse but in its capacity to cultivate individuals who are resilient, confident and empathetic because they have been nurtured, not beaten down.

By fostering a culture of inclusivity and care, Malaysia can become a beacon of progress in a world where too many institutions are still mired in the shadows of a brutal, colonial past.

Conclusion

It is time to consign ragging to the dustbin of history where it belongs.

This practice, born of elitist arrogance and colonial condescension, has no place in the educational institutions of a modern, independent nation.

Instead of clinging to the trappings of colonial tradition, Malaysia should embrace its role as a leader in creating an educational environment that promotes equality, dignity and mutual respect.

By doing so, it can offer its youth something far more valuable than the scars of ritualistic abuse: the chance to learn and grow in an environment free from fear and filled with the promise of genuine support and solidarity.

It is time we banned this hideous practice in our institutions once and for all.

Kua Kia Soong is a former MP and director of Suaram. Comments: letters@thesundaily.com



  • Kua Kia Soong

ba

Airlines around Asia ground Bali flights after volcano erupts

JAKARTA: Airlines in Australia, Hong Kong, India, Malaysia and Singapore cancelled flights to and from the Indonesian resort island of Bali on Wednesday, after a nearby volcano catapulted an ash tower miles into the sky.

Australia’s Jetstar, Qantas and Virgin Australia all grounded flights after Mount Lewotobi Laki-Laki on Flores island spewed a nine-kilometre (5.6-mile) tower a day earlier.

Malaysia Airlines, AirAsia, India’s IndiGo and Singapore’s Scoot also listed flights as cancelled on Wednesday, according to an AFP journalist at Bali’s international airport.

“Volcanic ash poses a significant threat to safe operations of the aircraft in the vicinity of volcanic clouds,“ said AirAsia as it announced several cancellations.

Multiple eruptions from the 1,703-metre (5,587-foot) twin-peaked volcano in recent weeks have killed nine people, with 31 injured and more than 11,000 evacuated, Indonesia’s disaster mitigation agency said Tuesday.

Eruptions can pose serious risks to flights, disgorging fine ash that can damage jet engines and scour a plane’s windscreen to the point of invisibility.

Hong Kong’s Cathay Pacific also listed its flights as cancelled, rescheduling routes to and from Bali until Thursday.

“Virgin Australia has made some changes to its current flight schedule, due to the impacts of the volcano in Indonesia,“ the airline said, listing scrapped flights to Sydney and Melbourne.

Jetstar said all flights to and from Bali would be halted until noon on Thursday.

“Due to volcanic ash caused by the Mount Lewotobi eruption in Indonesia, it is currently not safe to operate flights to and from Bali,“ the company said in an advisory.

Qantas said “a number of flights to and from Denpasar Airport in Bali have been disrupted” due to volcanic ash from Lewotobi.

Malaysia Airlines said it had cancelled six flights Wednesday in a statement on its website.

The airlines said they would monitor the volcano’s status and provide updates.

Singapore’s Scoot and Malaysia’s AirAsia did not immediately respond to an AFP request for comment. Singapore Airlines was still listing its flights as running on Wednesday.

refunds, rescheduling, re-routing

Ahmad Syaugi Shahab, general manager of Bali’s international airport, said 12 domestic and 22 international flights had been affected on Tuesday, without identifying the routes.

He did not provide details about affected flights on Wednesday’s schedule.

“Due to this natural event impacting flight operations, airlines are offering affected passengers the options of refunds, rescheduling, or re-routing,“ he added in a statement.

Bali’s international airport operator PT Angkasa Pura Indonesia said Wednesday it had conducted tests in its airspace and no volcanic ash was detected, saying the airport was “operating as normal”.

Lewotobi erupted again from midnight Wednesday until early morning, and a large ash column could be seen pouring from its crater, an AFP journalist nearby said.

Laki-Laki, which means “man” in Indonesian, is twinned with a calmer volcano named after the Indonesian word for “woman”.

The island’s economy is heavily reliant on tourism but Indonesia is one of the most disaster-prone nations on Earth, straddling the Pacific Ring of Fire where tectonic plates collide.

Lombok, an island neighbouring Bali, was rocked by earthquakes in 2018 that killed more than 500 and sparked a mass exodus of foreigners from the tropical paradise.




ba

Russia launches drone, missile barrage on Kyiv

KYIV: Russia escalated its attacks on Kyiv early Wednesday, launching waves of drones and missiles in its first combined aerial assault on the capital in more than 70 days, authorities said.

The broadside came as Washington and Seoul echoed warnings from Ukraine that North Korean troops had begun “engaging in combat operations” alongside Russian forces on the border between the warring countries.

A security source in Kyiv meanwhile told AFP that Ukraine was behind the assassination of a high-ranking Russian naval officer in a car bombing on the annexed Crimean peninsula.

Ukraine’s air force said its units had downed four missiles and 37 drones launched by Russia over eight regions of Ukraine overnight and into Wednesday morning.

“It is important that our forces have the means to defend the country from Russian terror,“ President Volodymyr Zelensky said in response to the attack.

Ukraine has for months been appealing to its Western allies to provide more air-defence systems to fend off Russian attacks on cities and critical infrastructure.

The large-scale bombardment comes at a critical moment on the battlefield. Russian forces are advancing in the east and concerns are growing over future aid for Ukraine after US Donald Trump’s victory in presidential elections.

Explosions in Kyiv, residents shelter

AFP journalists heard explosions ring out over Kyiv and saw dozens of residents seeking shelter in an underground metro station in the centre of the capital.

Kyiv officials said one man was wounded by falling debris from a downed drone in the suburb of Brovary, while emergency services distributed images of firefighters battling flames at one impact site.

A separate drone attack in the Ukrainian-controlled southern region of Kherson, which the Kremlin claims is part of Russia, killed a 52-year-old woman, the regional head said.

Multiple air raid sirens rang out early Wednesday as authorities said missiles were closing in on Kyiv, which was home to nearly three million people before Russia invaded in February 2022.

“As missiles were approaching Kyiv, the enemy simultaneously launched a ballistic missile attack on the capital. The enemy attack ended with another drone strike,“ city authorities said.

The attack is the latest in an uptick in escalating strikes on Ukrainian cities, mainly in the south of the war-battered country.

A Russian strike this week on Kryvyi Rig, Zelensky’s hometown, killed a 32-year-old mother and her three children.

The Kremlin has repeatedly denied its forces target civilians in Ukraine, a claim its spokesman repeated Wednesday in response to a question over whether Russian forces were working to minimise civilian casualties.

Crimea assassination

“Russian forces treat the civilian population with great care,“ Kremlin spokesman Dmitry Peskov told reporters, adding that Russia would continue its attacks.

Last week, Moscow and Kyiv launched record overnight drone attacks on each other.

Russian ground forces have been making rapid advances in Ukraine’s eastern Donetsk region, which the Kremlin claims is part of Russia.

On Wednesday, the Russian defence ministry said its troops had wrested control of the village of Rivnopil, where an estimated 98 people lived before the invasion.

As the Kremlin’s forces advance westwards, Kyiv has warned that Russia has amassed a force of 50,000 troops -- including North Korean soldiers -- to push out Ukrainian forces from the Russian border region of Kursk.

In Brussels, US Secretary of State Antony Blinken on Wednesday warned about the deployment of North Korean troops alongside Russian forces fighting on the Ukrainian border.

Blinken said he discussed with NATO chief Mark Rutte the fact that North Korean forces had been “injected into the battle, and now, quite literally, in combat which demands and will get a firm response.”

South Korea’s spy agency said North Korean soldiers were “engaging in combat” in Kursk, hours after US officials confirmed Pyongyang’s troops were actively fighting for Moscow against Ukraine.

Separately,a source in the Security Service of Ukraine said the agency had orchestrated a car bomb attack in the city of Sevastopol that killed a senior naval officer in the Black Sea Fleet.

The killing of Valery Trankovsky, which was confirmed by Moscow, is the latest in a string of targeted attacks on Russian military officers and pro-Kremlin public figures in occupied Ukrainian territory and within Russia.

Crimea was seized by Russia in 2014 in the wake of pro-democracy protests in Kyiv that sparked fighting in the east with Kremlin-backed separatists.




ba

Sabah Immigration deports 227 Indonesian illegals

TAWAU: A total of 227 illegal Indonesian immigrants who were held at the Immigration Detention Centres in Kota Kinabalu and Papar were deported via Tawau Port to Nunukan Port, Tunon Taka Terminal, Indonesia yesterday.

Sabah Immigration Department director, Datuk Sh Sitti Saleha Habib Yussof said that the deportation process involved detainees aged between two and 82, comprising 107 men, 71 women, and 49 children, who travelled on the Purnama Express and Labuan Express ferries.

“This is the 19th series of deportation programmes for unauthorised immigrants by sea for the year 2024. They were detained for various offences under the Immigration Act 1959/1963 and Immigration Regulations 1963,” she said in a statement today.

She added that the deportation programme was carried out in collaboration with the Consulate General of Indonesia in Kota Kinabalu and the Indonesian Consulate in Tawau.




ba

IGP confirms probe into death threat against informant in Sabah scandal case

KOTA BHARU: Police have confirmed that the whistleblower who sent an open letter to the Yang di-Pertuan Agong regarding allegations of corruption in Sabah has received death threats.

Inspector-General of Police Tan Sri Razarudin Husain said the case is being investigated by the Bukit Aman Classified Crime Investigation Unit under Section 507 of the Penal Code, which addresses criminal intimidation through anonymous communication.

The 36-year-old male informant received a threatening call via WhatsApp from an unknown number.

“During the call, the suspect, believed to be a local man, threatened the informant in Mandarin, claiming to be from a hitman group and demanding the informant stay silent.

“The suspect warned that if the informant did not comply, he would be killed within 24 hours and called it a final warning,” Razarudin told Bernama today.

Razarudin said the suspect also sent two images, one of a pistol with ammunition and another showing a person shot in the street.

The informant expressed deep fear for his own safety and that of his family, he said.

“After receiving the WhatsApp message, the informant reported the incident and blocked the number. Since then, no further threats have been made,” Razarudin said, adding that the informant initially suspected that the phone number might belong to a scammer or was dialed incorrectly.

He said further checks revealed that the phone number was no longer in service and had no registered owner.

Razarudin added no other reports had been filed regarding this number, and the investigation returned no relevant records.