Search results for: research article
26743 Resilience Perspective on Response Strategies for Super-Standard Rain and Flood Disasters: A Case Study of the “Zhengzhou 7.20 Heavy Rain” Event
Authors: Luojie Tang
Abstract:
The article takes the "7.20 Heavy Rainstorm in Zhengzhou" as a starting point, collects relevant disaster data, reproduces the entire process of the disaster, and identifies the main problems exposed by the city in responding to super-standard rain and flood disasters. Based on the review of resilience theory, the article proposes a shift in thinking about the response to super-standard rain and flood disasters from the perspective of resilience, clarifies the differences in the emphasis on resilience at different stages of disasters, and preliminarily constructs a response system for super-standard rain and flood disasters based on the guidance of resilience theory. Finally, combined with the highlighted problems in the 7.20 Heavy Rainstorm in Zhengzhou, the article proposes targeted response strategies from three perspectives: institutional management, technological support, and infrastructure, under the perspective of resilience.Keywords: resilient city, exceedance-based stormwater management, disaster risk reduction, megalopolis
Procedia PDF Downloads 11326742 Technical and Vocational Education and Training: A Second Chance for Female Returnee Migrants in Nigeria
Authors: Onyekachi Ohagwu
Abstract:
Human trafficking remains a pressing issue globally, with Nigeria serving as a source, transit, and destination country. In response to this crisis, the Edo State Task Force Against Human Trafficking (ETAHT), in collaboration with local partners and international organizations such as the International Organization for Migration, has implemented various initiatives, including technical and vocational education and training (TVET) programmes. This research article examines the effectiveness of the ETAHT TVET programme in providing a second chance for female returnee migrants in Nigeria. Through qualitative analysis, including in-depth interviews and case studies, the study evaluates the impact of the programme on participants' lives, socio-economic reintegration, and empowerment. Findings suggest that the ETAHT TVET programme plays a significant role in empowering female returnees, fostering self-reliance, and reducing the risk of re-trafficking. The article concludes with recommendations for enhancing the programme's effectiveness and scalability.Keywords: Edo State, human trafficking, TVET programme, female returnee migrants, empowerment, socio-economic reintegration
Procedia PDF Downloads 5426741 Analysis of Exploitation Damages of the Frame Scaffolding
Authors: A. Robak, M. Pieńko, E. Błazik-Borowa, J. Bęc, I. Szer
Abstract:
The analyzes and classifications presented in the article were based on the research carried out in year 2016 and 2017 on a group of nearly one hundred scaffoldings assembled and used on construction sites in different parts of Poland. During scaffolding selection process efforts were made to maintain diversification in terms of parameters such as scaffolding size, investment size, type of investment, location and nature of conducted works. This resulted in the research being carried out on scaffoldings used for church renovation in a small town or attached to the facades of classic apartment blocks, as well as on scaffoldings used during construction of skyscrapers or facilities of the largest power plants. This variety allows to formulate general conclusions about the technical condition of used frame scaffoldings. Exploitation damages of the frame scaffolding elements were divided into three groups. The first group includes damages to the main structural components, which reduce the strength of the scaffolding elements and hence the whole structure. The qualitative analysis of these damages was made on the basis of numerical models that take into account the geometry of the damage and on the basis of computational nonlinear static analyzes. The second group focuses on exploitation damages such as the lack of a pin on the guardrail bolt which may cause an imminent threat to people using scaffolding. These are local damages that do not affect the bearing capacity and stability of the whole structure but are very important for safe use. The last group consider damages that reduce only aesthetic values and do not have direct impact on bearing capacity and safety of use. Apart from qualitative analyzes the article will present quantitative analyzes showing how frequently given type of damage occurs.Keywords: scaffolding, damage, safety, numerical analysis
Procedia PDF Downloads 25926740 Metabolites of Polygonum L. Plants Having Antitumor Properties
Authors: Dmitriy Yu. Korulkin, Raissa A. Muzychkina
Abstract:
The article represents the results of research of antitumor activity of different structural types of plant flavonoids extracted by authors from Polygonum L. plants in commercial reserves at the territory of the Republic of Kazakhstan. For the first time ever the results comparative research of antitumor activity of plant flavonoids of different structural groups and their synthetic derivatives have been represented. The results of determination of toxicity of flavonoids in single parenteral infusion conditions have been represented. Experimental substantiation of possible mechanisms of antiproliferative and cytotoxic action of flavonoids has been suggested. The perspectives of usage of plant flavonoids as medications and creation of effective dosage forms of antitumor medicines on their basis have been substantiated.Keywords: antitumor activity, cytotoxicity, flavonoids, Polygonum L., secondary metabolites
Procedia PDF Downloads 26026739 Research and Development of Lightweight Repair Mortars with Focus on Their Resistance to High Temperatures
Authors: Tomáš Melichar, Jiří Bydžovský, Vít Černý
Abstract:
In this article our research focused on study of basic physical and mechanical parameters of polymer-cement repair materials is presented. Namely the influence of applied aggregates in combination with active admixture is specially considered. New formulas which were exposed in ambient with temperature even to 1000°C were suggested. Subsequently densities and strength characteristics including their changes were evaluated. Selected samples were analyzed using electron microscope. The positive influence of porous aggregates based on sintered ash was definitely demonstrated. Further it was found than in terms of thermal resistance the effective micro silica amount represents 5% to 7.5% of cement weight.Keywords: aggregate, ash, high, lightweight, microsilica, mortar, polymer-cement, repair, temperature
Procedia PDF Downloads 42726738 Institutional Determinants of Economic Growth in Georgia and in Other Post-Communist Economies
Authors: Nazira Kakulia, Tsotne Zhghenti
Abstract:
The institutional development is one of the actual topics in economics science. New trends and directions of institutional development mostly depend on its structure and framework. Transformation of institutions is an important problem for every economy, especially for developing countries. The first research goal is to determine the importance and interactions between different institutions in Georgia. Using World Governance Indicators and Economic Freedom indexes it can be calculated the size for each institutional group. The second aim of this research is to evaluate Georgian institutional backwardness in comparison to other post-communist economies. We use statistical and econometric methods to evaluate the difference between the levels of institutional development in Georgia and in leading post-communist economies. Within the scope of this research, major findings are coefficients which are an assessment of their deviation (i.e. lag) of institutional indicators between Georgia and leading post-communist country which should be compared. The last part of the article includes analysis around the selected coefficients.Keywords: post-communist transition, institutions, economic growth, institutional development
Procedia PDF Downloads 19026737 Public and Private Spaces Producing Social Connectedness in Traditional Environment: A Study on Old Medina District of Casablanca
Authors: Asmaa Sokrat, Aykut Karaman
Abstract:
Public and private spaces are major components of the morphology of the city. This research aims to study the interactions between public and private domains in terms of urban space in Casablanca. The research focuses on a general vision of a socio-spatial issue. It plans to identify the public, private, and transition (semi-public, semi-private) spaces as the constituent of the urban space. Moreover, the study investigates the link between public and private spaces with the social dimensions. Additionally, the research argues that the public space is a place of social interaction; as a reflection, this interaction is the intersection between urban space and social connectedness. Besides, social interaction can be the key to distinguishing between the public and private spheres. The methodological approach of the research is based on the literature review and field study. The article is targeting a case study on the old Medina of Casablanca, from daily use of the public and private spaces, the urban tissue, and the urban space types. In conclusion, the research exhibits that a public space could influence the privacy of the residents of a local urban area; thus, this privacy is inverted on the social interaction. This social interaction is the link between the urban space and social connectedness. Hence, this equation affects the typology of the private space.Keywords: public sphere, private sphere, social connectedness, old Medina of Casablanca
Procedia PDF Downloads 13826736 An Effective Route to Control of the Safety of Accessing and Storing Data in the Cloud-Based Data Base
Authors: Omid Khodabakhshi, Amir Rozdel
Abstract:
The subject of cloud computing security research has allocated a number of challenges and competitions because the data center is comprised of complex private information and are always faced various risks of information disclosure by hacker attacks or internal enemies. Accordingly, the security of virtual machines in the cloud computing infrastructure layer is very important. So far, there are many software solutions to develop security in virtual machines. But using software alone is not enough to solve security problems. The purpose of this article is to examine the challenges and security requirements for accessing and storing data in an insecure cloud environment. In other words, in this article, a structure is proposed for the implementation of highly isolated security-sensitive codes using secure computing hardware in virtual environments. It also allows remote code validation with inputs and outputs. We provide these security features even in situations where the BIOS, the operating system, and even the super-supervisor are infected. To achieve these goals, we will use the hardware support provided by the new Intel and AMD processors, as well as the TPM security chip. In conclusion, the use of these technologies ultimately creates a root of dynamic trust and reduces TCB to security-sensitive codes.Keywords: code, cloud computing, security, virtual machines
Procedia PDF Downloads 19126735 An Analytical Review of Tourism Management in India with Special Reference to Maharashtra State
Authors: Anilkumar L. Rathod
Abstract:
This paper examines event tourism as a field of study and area of professional practice updating the previous review article published in 2015. In this substantially extended review, a deeper analysis of the field's evolution and development is presented, charting the growth of the literature, focusing both chronologically and thematically. A framework for understanding and creating knowledge about events and tourism is presented, forming the basis which signposts established research themes and concepts and outlines future directions for research. In addition, the review article focuses on constraining and propelling forces, ontological advances, contributions from key journals, and emerging themes and issues. It also presents a roadmap for research activity in event tourism. Published scholarly studies within this period are examined through content analysis, using such keywords as knowledge management, organizational learning, hospitality, tourism, tourist destinations, travel industry, hotels, lodging, motels, hotel industry, gaming, casino hotel and convention to search scholarly research journals. All contributions found are then screened for a hospitality and tourism theme. Researchers mostly discuss knowledge management approach in improving information technology, marketing and strategic planning in order to gain competitive advantage. Overall, knowledge management research is still limited. Planned events in tourism are created for a purpose, and what was once the realm of individual and community initiatives has largely become the realm of professionals and entrepreneurs provides a typology of the four main categories of planned events within an event-tourism context, including the main venues associated with each. It also assesses whether differences exist between socio-demographic groupings. An analysis using primarily descriptive statistics indicated both sub-samples had similar viewpoints although Maharashtra residents tended to have higher scores pertaining to the consequences of gambling. It is suggested that the differences arise due to the greater exposure of Maharashtra residents to the influences of casino development.Keywords: organizational learning, hospitality, tourism, tourist destinations, travel industry, hotels, lodging, motels, hotel industry, gaming, casino hotel and convention to search scholarly research journals
Procedia PDF Downloads 23826734 The Application of Article 111 of the Constitution of Bangladesh in the Criminal Justice System as a Sentencing Guideline
Authors: Sadiya S. Silvee
Abstract:
Generally, the decision of the higher court is binding on its subordinate courts. As provided in Article 111 of the Constitution, 'the law declared by the Appellate Division (AD) shall be binding on the High Court Division (HCD) and the law declared by either division of the Supreme Court shall be binding on all courts subordinate to it.' This means the judicial discipline requires the HCD to follow the decision of the AD and that it is necessary for the lower tiers of courts to accept the decision of the higher tiers as a binding precedent. Analyzing the application of Article 111 of the Constitution in the criminal justice system as a sentencing guideline, the paper, by examining whether there is any consistency in decision between one HC Bench and another HC Bench, explores whether HCD can per incuriam its previous decision. In doing so, the Death Reference (DR) Cases are contemplated. Furthermore, the paper shall examine whether the Court of Session follows the decision of the HCD while using their discretion to make the choice between death and imprisonment for life under section 302 of PC. The paper argues due to the absence of any specific direction for sentencing and inconsistency in jurisprudence among the HCD; the subordinate courts are in a dilemma.Keywords: death reference, sentencing factor, sentencing guideline, criminal justice system and constitution
Procedia PDF Downloads 17626733 A Discussion on Electrically Small Antenna Property
Authors: Riki H. Patel, Arpan Desia, Trushit Upadhayay
Abstract:
The demand of compact antenna is ever increasing since the inception of wireless communication devices. In the age of wireless communication, requirement of miniaturized antennas is quite high. It is quite often that antenna dimensions are decided based on application based requirement compared to practical antenna constraints. The tradeoff in efficiency and other antenna parameters against to antenna size is always a debatable issue. The article presents detailed review of fundamentals of electrically small antennas and its potential applications. In addition, constraints and challenges of electrically small antennas are also presented in the article.Keywords: bandwidth, communication, electrically small antenna, communication engineering
Procedia PDF Downloads 52926732 An Application of Content Analysis, SWOT Analysis, and the TOPSIS Method: A Case Study of the 'Tourism Ambassador' Program in Indonesia
Authors: Gilang Maulana Majid
Abstract:
If a government program remains scientifically uncontested for a long time, it is likely that its effects will be far from expected as there is no concrete evaluation of the steps being taken. This article identifies how such a theory aptly describes the case of the 'tourism ambassador' program in Indonesia. Being set out as one of the tourism promotional means of many regional governments in Indonesia, this program is heavily criticized for being ineffective despite a large number of budgets being spent on an annual basis. Taking the program as a case study, this article applies content analysis, SWOT analysis, and TOPSIS as data analysis methods, with a total of 56 tourism ambassadors invited to become coders, respondents, and/or interviewees in this research. The study reveals the SWOT of the program, recognizes four strategies that can be taken to optimize the program's effects and prioritizes a strategy based on the preferences of the involved tourism ambassadors using TOPSIS. It is found that incorporation of technology such as the creation of an online platform is, among others, the most expected approach to be taken to solve the problems concerning tourism ambassador program. However, based on the costs and benefits of each strategy presented in the current study, each alternative appears to have trade-offs between one and another.Keywords: Indonesia, optimization strategies, 'Tourism Ambassador' program, SWOT-TOPSIS
Procedia PDF Downloads 16626731 China's Soft Power and Its Strategy in West Asia
Authors: Iman Shabanzadeh
Abstract:
The economic growth and the special model of development in China have caused sensitivity in the public opinion of the world regarding the nature of this growth and development. In this regard, the Chinese have tried to put an end to such alarming procedures by using all the tools at their disposal and seek to present a peaceful and cooperative image of themselves. In this way, one of the most important diplomatic tools that Beijing has used to reduce the concerns caused by the Threat Theory has been the use of soft power resources and its tools in its development policies. This article begins by analyzing the concept of soft power and examining its foundations in international relations, and continues to examine the components of soft power in its Chinese version. The main purpose of the article is to figure out about the position of West Asia in China's soft power strategy and resources China use to achieve its goals in this region. In response to the main question, the paper's hypothesis is that soft power in its Chinese version had significant differences from Joseph Nye's original idea. In fact, the Chinese have imported the American version of soft power and adjusted, strengthened and, in other words, internalized it with their abilities, capacities and political philosophy. Based on this, China's software presence in West Asia can be traced in three areas. The first source of China's soft power in this region of West Asia is cultural in nature and is realized through strategies such as "use of educational tools and methods", "media methods" and "tourism industry". The second source is related to political soft power, which is applied through the policy of "balance of influence" and the policy of "mediation" and relying on the "ideological foundations of Confucianism". The third source also refers to China's economic soft power and is realized through three tools: "energy exchanges", "foreign investments" and "Belt-Road initiative". The research method of this article is descriptive-analytical.Keywords: soft power, cooperative power, china, west asia
Procedia PDF Downloads 5826730 Frontier Dynamic Tracking in the Field of Urban Plant and Habitat Research: Data Visualization and Analysis Based on Journal Literature
Authors: Shao Qi
Abstract:
The article uses the CiteSpace knowledge graph analysis tool to sort and visualize the journal literature on urban plants and habitats in the Web of Science and China National Knowledge Infrastructure databases. Based on a comprehensive interpretation of the visualization results of various data sources and the description of the intrinsic relationship between high-frequency keywords using knowledge mapping, the research hotspots, processes and evolution trends in this field are analyzed. Relevant case studies are also conducted for the hotspot contents to explore the means of landscape intervention and synthesize the understanding of research theories. The results show that (1) from 1999 to 2022, the research direction of urban plants and habitats gradually changed from focusing on plant and animal extinction and biological invasion to the field of human urban habitat creation, ecological restoration, and ecosystem services. (2) The results of keyword emergence and keyword growth trend analysis show that habitat creation research has shown a rapid and stable growth trend since 2017, and ecological restoration has gained long-term sustained attention since 2004. The hotspots of future research on urban plants and habitats in China may focus on habitat creation and ecological restoration.Keywords: research trends, visual analysis, habitat creation, ecological restoration
Procedia PDF Downloads 6126729 Ethical Issues in AI: Analyzing the Gap Between Theory and Practice - A Case Study of AI and Robotics Researchers
Authors: Sylvie Michel, Emmanuelle Gagnou, Joanne Hamet
Abstract:
New major ethical dilemmas are posed by artificial intelligence. This article identifies an existing gap between the ethical questions that AI/robotics researchers grapple with in their research practice and those identified by literature review. The objective is to understand which ethical dilemmas are identified or concern AI researchers in order to compare them with the existing literature. This will enable to conduct training and awareness initiatives for AI researchers, encouraging them to consider these questions during the development of AI. Qualitative analyses were conducted based on direct observation of an AI/Robotics research team focused on collaborative robotics over several months. Subsequently, semi-structured interviews were conducted with 16 members of the team. The entire process took place during the first semester of 2023. The observations were analyzed using an analytical framework, and the interviews were thematically analyzed using Nvivo software. While the literature identifies three primary ethical concerns regarding AI—transparency, bias, and responsibility—the results firstly demonstrate that AI researchers are primarily concerned with the publication and valorization of their work, with the initial ethical concerns revolving around this matter. Questions arise regarding the extent to which to "market" publications and the usefulness of some publications. Research ethics are a central consideration for these teams. Secondly, another result shows that the researchers studied adopt a consequentialist ethics (though not explicitly formulated as such). They ponder the consequences of their development in terms of safety (for humans in relation to Robots/AI), worker autonomy in relation to the robot, and the role of work in society (can robots take over jobs?). Lastly, results indicate that the ethical dilemmas highlighted in the literature (responsibility, transparency, bias) do not explicitly appear in AI/Robotics research. AI/robotics researchers raise specific and pragmatic ethical questions, primarily concerning publications initially and consequentialist considerations afterward. Results demonstrate that these concerns are distant from the existing literature. However, the dilemmas highlighted in the literature also deserve to be explicitly contemplated by researchers. This article proposes that the journals these researchers target should mandate ethical reflection for all presented works. Furthermore, results suggest offering awareness programs in the form of short educational sessions for researchers.Keywords: ethics, artificial intelligence, research, robotics
Procedia PDF Downloads 8026728 Investigation of Online Child Sexual Abuse: An Account of Covert Police Operations Across the Globe
Authors: Shivalaxmi Arumugham
Abstract:
Child sexual abuse (CSA) has taken several forms, particularly with the advent of internet technologies that provide pedophiles access to their targets anonymously at an affordable rate. To combat CSA which has far-reaching consequences on the physical and psychological health of the victims, a special act, the Protection of Children from Sexual Offences (POCSO) Act, was formulated amongst the existing laws. With its latest amendment criminalizing various online activities about child pornography also known as child sexual abuse materials in 2019, tremendous pressure is speculated on law enforcement to identify offenders online. Effective investigations of CSA cases help in not only to detect perpetrators but also in preventing the re-victimization of children. Understanding the vulnerability of the child population and that the offenders continue to develop stealthier strategies to operate, it is high time that traditional investigation, where the focus is on apprehending and prosecuting the offender, must make a paradigm shift to proactively investigate to prevent victimization at the first place. One of the proactive policing techniques involves understanding the psychology of the offenders and children and operating undercover to catch the criminals before a real child is victimized. With the fundamental descriptive approach to research, the article attempts to identify the multitude of issues associated with the investigation of child sexual abuse cases currently in practice in India. Then, the article contextualizes the various covert operations carried out by numerous law enforcement agencies across the globe. To provide this comprehensive overview, the paper examines various reports, websites, guidelines, protocols, judicial pronouncements, and research articles. Finally, the paper presents the challenges and ethical issues that are to be considered before getting into undercover operations either in the guise of a pedophile or as a child. The research hopes to contribute to the making of standard operating protocols for investigation officers and other relevant policymakers in this regard.Keywords: child sexual abuse, cybercrime against children, covert police operations, investigation of CSA
Procedia PDF Downloads 9726727 Beyond ‘Mother India’ and ‘New Indian Woman’: Indian Educated Middle-Class Women in Partition Novels
Authors: Yan Ziwei
Abstract:
This article attempts to restore the subjectivity of Indian-educated middle-class women during the partition period through three partition novels: Anita Desai’s Clear Light of Day (1980), Amitav Ghosh’s The Shadow Lines (1988), and Vikram Seth’s A Suitable Boy (1993). Despite extensive research on women in partition, there is little focus on the group of educated middle-class women. In mainstream historical and political discourse, these women have consistently been constructed within the official discourse dominated by males. They are either ‘Mother India’, or the ‘new woman’ to meet the requirements of India’s changing political atmosphere. However, by delving into the particular historical context and personal experience of the educated middle-class women in the three novels, the article argues that they continuously subvert the essentialized identities imposed upon them by different versions of official discourse. As the embodiment of Shakti, they are distinct from the archetypes of ‘Mother India’ and the ‘new woman’. Instead, they create their ideal family spaces based on their personal cognition and transcend the homogeneous gender discourse to reflect the fluid and complex nature of female identity.Keywords: Indian educated middle-class women, subjectivity, partition novels, Mother India, new woman, Shakti
Procedia PDF Downloads 4326726 Socratic Style of Teaching: An Analysis of Dialectical Method
Authors: Muhammad Jawwad, Riffat Iqbal
Abstract:
The Socratic method, also known as the dialectical method and elenctic method, has significant relevance in the contemporary educational system. It can be incorporated into modern-day educational systems theoretically as well as practically. Being interactive and dialogue-based in nature, this teaching approach is followed by critical thinking and innovation. The pragmatic value of the Dialectical Method has been discussed in this article, and the limitations of the Socratic method have also been highlighted. The interactive Method of Socrates can be used in many subjects for students of different grades. The Limitations and delimitations of the Method have also been discussed for its proper implementation. This article has attempted to elaborate and analyze the teaching method of Socrates with all its pre-suppositions and Epistemological character.Keywords: Socratic method, dialectical method, knowledge, teaching, virtue
Procedia PDF Downloads 13326725 Imports of Intermediate Inputs: A Study of the Main Research Streams
Authors: Marta Fernández Olmos, Jorge Fleta, Talia Gómez
Abstract:
This article shares the results of a temporal analysis of the literature on imports of intermediate inputs based on review techniques. The aim of this paper is to identify the main lines of research, their trends, topics, and the research agenda. The internationalization field has attracted considerable scholars and practitioners’ attention in recent years and has grown, rapidly, resulting in a large body of knowledge scattered in different areas of specialization. However, there are no studies that are entirely restricted to imports, intermediate inputs and innovation performance. The performance analysis provided an updated overview of the evolution of the importing literature from 1970 to 2022 and quantitatively identified the most productive and influential journals, articles, authors, and countries. The results show that the current topics are mainly based on modes of importing, innovation performance of importing intermediate imports and collaborations. Future lines of research are identified from topics with lower co-occurrence, such as artificial intelligence, entrepreneurship, and alternative business models such as multinational enterprises (MNEs) versus non-MNEs.Keywords: imports, intermediate inputs, innovation performance, review
Procedia PDF Downloads 7326724 Multi-Scale Urban Spatial Evolution Analysis Based on Space Syntax: A Case Study in Modern Yangzhou, China
Authors: Dai Zhimei, Hua Chen
Abstract:
The exploration of urban spatial evolution is an important part of urban development research. Therefore, the evolutionary modern Yangzhou urban spatial texture was taken as the research object, and Spatial Syntax was used as the main research tool, this paper explored Yangzhou spatial evolution law and its driving factors from the urban street network scale, district scale and street scale. The study has concluded that at the urban scale, Yangzhou urban spatial evolution is the result of a variety of causes, including physical and geographical condition, policy and planning factors, and traffic conditions, and the evolution of space also has an impact on social, economic, environmental and cultural factors. At the district and street scales, changes in space will have a profound influence on the history of the city and the activities of people. At the end of the article, the matters needing attention during the evolution of urban space were summarized.Keywords: block, space syntax and methodology, street, urban space, Yangzhou
Procedia PDF Downloads 18026723 The Role of Critical Thinking in Disease Diagnosis: A Comprehensive Review
Authors: Mohammad Al-Mousawi
Abstract:
This academic article explores the indispensable role of critical thinking in the process of diagnosing diseases. Employing a multidisciplinary approach, we delve into the cognitive skills and analytical mindset that clinicians, researchers, and healthcare professionals must employ to navigate the complexities of disease identification. By examining the integration of critical thinking within the realms of medical education, diagnostic decision-making, and technological advancements, this article aims to underscore the significance of cultivating and applying critical thinking skills in the ever-evolving landscape of healthcare.Keywords: critical thinking, medical education, diagnostic decision-making, fostering critical thinking
Procedia PDF Downloads 7426722 Proposal to Increase the Efficiency, Reliability and Safety of the Centre of Data Collection Management and Their Evaluation Using Cluster Solutions
Authors: Martin Juhas, Bohuslava Juhasova, Igor Halenar, Andrej Elias
Abstract:
This article deals with the possibility of increasing efficiency, reliability and safety of the system for teledosimetric data collection management and their evaluation as a part of complex study for activity “Research of data collection, their measurement and evaluation with mobile and autonomous units” within project “Research of monitoring and evaluation of non-standard conditions in the area of nuclear power plants”. Possible weaknesses in existing system are identified. A study of available cluster solutions with possibility of their deploying to analysed system is presented.Keywords: teledosimetric data, efficiency, reliability, safety, cluster solution
Procedia PDF Downloads 51426721 Five Pitfalls in Defining a Health System and Implications for Research and Management
Authors: Macdonald Kanyangale, Sandram Naluso
Abstract:
Globally, researchers have struggled over time to adequately define the notion of health system to inform research. This study is significant because it proposes an integrative framework for a robust definition of the health system. The objective of this article is to examine major pitfalls in definitions of health system used in prior literature and implications of these for research and management. The study used methodological steps of a scoping review proposed by Arksey and O'Malley to identify and examine 24 definitions of a health system in articles selected from six databases and web search engines. Thematic analysis was used to delineate and categorise definitional pitfalls into broader themes. There are a plethora of five major pitfalls in the extant definitions of a health system which may easily scupper any unsuspecting researcher if not avoided or addressed in research. These definitional pitfalls are reductionist assumptions which ignore dynamic and complex connections, overly wide boundary and lack of specification of levels in a health system, and limited focus on process in a health system. In addition, there is the tendency of treating different components of the health system as equal and simplifying of the ontological complexity of the health system. Future scholars are advised to avoid or address the identified five major pitfalls if they are to develop robust definitions of an HS. The use of an integrative framework for a robust definition of a health system is recommended, while implications of the pitfalls are discussed as a basis and catalyst for complexity-informed research and managing interactively.Keywords: complexity management, health system, pitfalls, reductionism, research
Procedia PDF Downloads 13526720 Dynamics of Museum Visitors’ Experiences Studies: A Bibliometric Analysis
Authors: Tesfaye Fentaw Nigatu, Alexander Trupp, Teh Pek Yen
Abstract:
Research on museums and the experiences of visitors has flourished in recent years, especially after museums became centers of edutainment beyond preserving heritage resources. This paper aims to comprehensively understand the changes, continuities, and future research development directions of museum visitors’ experiences. To identify current research trends, the paper summarizes and analyses research article publications from 1986 to 2023 on museum visitors' experiences. Bibliometric analysis software VOSviewer and Harzing POP (Publish or Perish) were used to analyze 407 academic articles. The articles were generated from the Scopus database. The study attempted to map new insights for future scholars and academics to expand the scope of museum visitors’ experience studies by analyzing keywords, citation patterns, influential articles in the field, publication trends, collaborations between authors, institutions, and clusters of highly cited articles. Accessibility to museums, social media usage within museums, aesthetics in museum settings, mixed reality experiences, sustainability issues, and emotions have emerged as key research areas in the study of museum visitors' experiences. The results benefit stakeholders and researchers in advancing the collective progress of considering recent research trends to stay informed about the latest developments and breakthroughs in the global academic landscape and visitors’ experiences development in the museum.Keywords: bibliometric analysis, museum, network analysis, visitors’ experiences, visual analysis
Procedia PDF Downloads 6826719 Fake News Detection Based on Fusion of Domain Knowledge and Expert Knowledge
Authors: Yulan Wu
Abstract:
The spread of fake news on social media has posed significant societal harm to the public and the nation, with its threats spanning various domains, including politics, economics, health, and more. News on social media often covers multiple domains, and existing models studied by researchers and relevant organizations often perform well on datasets from a single domain. However, when these methods are applied to social platforms with news spanning multiple domains, their performance significantly deteriorates. Existing research has attempted to enhance the detection performance of multi-domain datasets by adding single-domain labels to the data. However, these methods overlook the fact that a news article typically belongs to multiple domains, leading to the loss of domain knowledge information contained within the news text. To address this issue, research has found that news records in different domains often use different vocabularies to describe their content. In this paper, we propose a fake news detection framework that combines domain knowledge and expert knowledge. Firstly, it utilizes an unsupervised domain discovery module to generate a low-dimensional vector for each news article, representing domain embeddings, which can retain multi-domain knowledge of the news content. Then, a feature extraction module uses the domain embeddings discovered through unsupervised domain knowledge to guide multiple experts in extracting news knowledge for the total feature representation. Finally, a classifier is used to determine whether the news is fake or not. Experiments show that this approach can improve multi-domain fake news detection performance while reducing the cost of manually labeling domain labels.Keywords: fake news, deep learning, natural language processing, multiple domains
Procedia PDF Downloads 7326718 Fake News During COVID-19 Pandemic: An Overview from A Legal Perspective
Authors: Ida Shafinaz Mohamed Kamil, Mohd Dahlan Abdul Malek
Abstract:
Today, the whole world is facing a catastrophe called the novel coronavirus disease known as COVID-19. As of October 2021, it has been reported that more than 248 million cases and 5 million deaths have been recorded worldwide. In Malaysia, 2,466,663 cases were reported, with 28,876 deaths recorded on 30 October 2021. Unfortunately, the world is not only facing the COVID-19 pandemic but the COVID-19 infodemic as well, where fake news about COVID-19 disease is spreading faster and more widely than from the virus itself. The spread of fake news is amplified through various social media platforms, which is causing concern among the community. The uncertainty in understanding what fake news really is has caused difficulties and challenges in providing a solution to the hazards that it creates. This article discusses what constitutes fake news and examines the current legal framework put in place to combat fake news in Malaysia. Employing a doctrinal research methodology, this article thoroughly analyzes the relevant legal provisions under the Communications and Multimedia Act 1998, the Penal Code and the Emergency (Essential Powers) Ordinance (No.2) 2021, which came into force on 12 March 2021 as well as related case laws, for offenses and punishments with regards to fake news. The findings from the analysis indicate that there is still room for improvement in regulating fake news, in particular concerning COVID-19.Keywords: fake news, legal pespective, covid 19, pendemic
Procedia PDF Downloads 8526717 Aging Among Older Immigrant Women
Authors: Michele Charpentier
Abstract:
This article examines the experiences of aging of older immigrant women. The data are based on qualitative research that was conducted in Quebec/Canada with 83 elderly women from different ethno-cultural backgrounds (Arab, African, Haitian, Japanese, Chinese, Portuguese, Romanian, etc.). The results on how such immigrant women deal with material conditions of existence such as deskilling, aging alone, being more economically independent and the combined effects of liberation from social and family norms associated with age and gender in the light of the migration route, will be presented. For the majority, migration opened up possibilities for personal development and self-affirmation. The findings demonstrated the relevance of the intersectional approach in understanding the complexity and social conditionings of women’s experiences of aging.Keywords: older immigrant women, qualitative research, experiences of aging, intersectional approach
Procedia PDF Downloads 5126716 A Longitudinal Case Study of Greek as a Second Language
Authors: M. Vassou, A. Karasimos
Abstract:
A primary concern in the field of Second Language Acquisition (SLA) research is to determine the innate mechanisms of second language learning and acquisition through the systematic study of a learner's interlanguage. Errors emerge while a learner attempts to communicate using the target-language and can be seen either as the observable linguistic product of the latent cognitive and language process of mental representations or as an indispensable learning mechanism. Therefore, the study of the learner’s erroneous forms may depict the various strategies and mechanisms that take place during the language acquisition process resulting in deviations from the target-language norms and difficulties in communication. Mapping the erroneous utterances of a late adult learner in the process of acquiring Greek as a second language constitutes one of the main aims of this study. For our research purposes, we created an error-tagged learner corpus composed of the participant’s written texts produced throughout a period of a 4- year instructed language acquisition. Error analysis and interlanguage theory constitute the methodological and theoretical framework, respectively. The research questions pertain to the learner's most frequent errors per linguistic category and per year as well as his choices concerning the Greek Article System. According to the quantitative analysis of the data, the most frequent errors are observed in the categories of the stress system and syntax, whereas a significant fluctuation and/or gradual reduction throughout the 4 years of instructed acquisition indicate the emergence of developmental stages. The findings with regard to the article usage bespeak fossilization of erroneous structures in certain contexts. In general, our results point towards the existence and further development of an established learner’s (inter-) language system governed not only by mother- tongue and target-language influences but also by the learner’s assumptions and set of rules as the result of a complex cognitive process. It is expected that this study will contribute not only to the knowledge in the field of Greek as a second language and SLA generally, but it will also provide an insight into the cognitive mechanisms and strategies developed by multilingual learners of late adulthood.Keywords: Greek as a second language, error analysis, interlanguage, late adult learner
Procedia PDF Downloads 12726715 The Communicative Nature of Linguistic Interference in Learning and Teaching of Slavic Languages
Authors: Kseniia Fedorova
Abstract:
The article is devoted to interlinguistic homonymy and enantiosemy analysis. These phenomena belong to the process of linguistic interference, which leads to violation of the communicative utterances integrity and causes misunderstanding between foreign interlocutors - native speakers of different Slavic languages. More attention is paid to investigation of non-typical speech situations, which occurred spontaneously or created by somebody intentionally being based on described phenomenon mechanism. The classification of typical students' mistakes connected with the paradox of interference is being represented in the article. The survey contributes to speech act theory, contemporary linguodidactics, translation science and comparative lexicology of Slavonic languages.Keywords: adherent enantiosemy, interference, interslavonic homonymy, speech act
Procedia PDF Downloads 24426714 Kazakh Language Assessment in a New Multilingual Kazakhstan
Authors: Karlygash Adamova
Abstract:
This article is focused on the KazTest as one of the most important high-stakes tests and the key tool in Kazakh language assessment. The research will also include the brief introduction to the language policy in Kazakhstan. Particularly, it is going to be changed significantly and turn from bilingualism (Kazakh, Russian) to multilingual policy (three languages - Kazakh, Russian, English). Therefore, the current status of the abovementioned languages will be described. Due to the various educational reforms in the country, the language evaluation system should also be improved and moderated. The research will present the most significant test of Kazakhstan – the KazTest, which is aimed to evaluate the Kazakh language proficiency. Assessment is an ongoing process that encompasses a wide area of knowledge upon the productive performance of the learners. Test is widely defined as a standardized or standard method of research, testing, diagnostics, verification, etc. The two most important characteristics of any test, as the main element of the assessment - validity and reliability - will also be described in this paper. Therefore, the preparation and design of the test, which is assumed to be an indicator of knowledge, and it is highly important to take into account all these properties.Keywords: multilingualism, language assessment, testing, language policy
Procedia PDF Downloads 136