Search results for: attitude as critical thinker
3425 Velma-ARC’s Rehabilitation of Repentant Cybercriminals in Nigeria
Authors: Umukoro Omonigho Simon, Ashaolu David ‘Diya, Aroyewun-Olaleye Temitope Folashade
Abstract:
The VELMA Action to Reduce Cybercrime (ARC) is an initiative, the first of its kind in Nigeria, designed to identify, rehabilitate and empower repentant cybercrime offenders popularly known as ‘yahoo boys’ in Nigerian parlance. Velma ARC provides social inclusion boot camps with the goal of rehabilitating cybercriminals via psychotherapeutic interventions, improving their IT skills, and empowering them to make constructive contributions to society. This report highlights the psychological interventions provided for participants of the maiden edition of the Velma ARC boot camp and presents the outcomes of these interventions. The boot camp was set up in a hotel premises which was booked solely for the 1 month event. The participants were selected and invited via the Velma online recruitment portal based on an objective double-blind selection process from a pool of potential participants who signified interest via the registration portal. The participants were first taken through psychological profiling (personality, symptomology and psychopathology) before the individual and group sessions began. They were profiled using the Minnesota Multiphasic Personality Inventory -2- Restructured Form (MMPI-2-RF), the latest version of its series. Individual psychotherapy sessions were conducted for all participants based on what was interpreted on their profiles. Focus group discussion was held later to discuss a movie titled ‘catch me if you can’ directed by Steven Spielberg, featuring Leonardo De Caprio and Tom Hanks. The movie was based on the true life story of Frank Abagnale, who was a notorious scammer and con artist in his youthful years. Emergent themes from the movie were discussed as psycho-educative parameters for the participants. The overall evaluation of outcomes from the VELMA ARC rehabilitation boot camp stemmed from a disaggregated assessment of observed changes which are summarized in the final report of the clinical psychologist and was detailed enough to infer genuine repentance and positive change in attitude towards cybercrime among the participants. Follow up services were incorporated to validate initial observations. This gives credence to the potency of the psycho-educative intervention provided during the Velma ARC boot camp. It was recommended that support and collaborations from the government and other agencies/individuals would assist the VELMA foundation in expanding the scope and quality of the Velma ARC initiative as an additional requirement for cybercrime offenders following incarceration.Keywords: Velma-ARC, cybercrime offenders, rehabilitation, Nigeria
Procedia PDF Downloads 1533424 Virtual Routing Function Allocation Method for Minimizing Total Network Power Consumption
Authors: Kenichiro Hida, Shin-Ichi Kuribayashi
Abstract:
In a conventional network, most network devices, such as routers, are dedicated devices that do not have much variation in capacity. In recent years, a new concept of network functions virtualisation (NFV) has come into use. The intention is to implement a variety of network functions with software on general-purpose servers and this allows the network operator to select their capacities and locations without any constraints. This paper focuses on the allocation of NFV-based routing functions which are one of critical network functions, and presents the virtual routing function allocation algorithm that minimizes the total power consumption. In addition, this study presents the useful allocation policy of virtual routing functions, based on an evaluation with a ladder-shaped network model. This policy takes the ratio of the power consumption of a routing function to that of a circuit and traffic distribution between areas into consideration. Furthermore, the present paper shows that there are cases where the use of NFV-based routing functions makes it possible to reduce the total power consumption dramatically, in comparison to a conventional network, in which it is not economically viable to distribute small-capacity routing functions.Keywords: NFV, resource allocation, virtual routing function, minimum power consumption
Procedia PDF Downloads 3413423 Structural Barriers to Voting among Young Voters: an Intersectional Approach
Authors: Ryo Sato
Abstract:
The United States and many other countries witness alarmingly low voting rates among youths, skewing democratic representation. Many scholars and pundits have ascribed to this trend young voters' laziness, indifference, and self-centeredness and placed blame on them. However, a growing body of research is focusing on structural barriers to voting, which are defined as built-in obstacles lying in electoral laws and procedures. Drawing on national survey data from 891 young adults in 2020 and extant literature on structural barriers to voting, the project aims to develop a framework for analyzing systematic obstacles to voting experienced by young people and offer tangible policy recommendations. The preliminary findings presented at this conference include an intersectional analysis of the survey data, focusing on how different social categories — race, gender, socioeconomic status, immigration status, and others — in combination create unique voting experiences and barriers. This project offers a critical framework to combat the individualized understanding of low voting rates among youths and inform pathways to functional democracy.Keywords: youth voting behavior, structural barriers, intersectionality, democratic participation, S
Procedia PDF Downloads 583422 Assessment of Sustainable Sanitation Systems: Urban Slums
Authors: Ali Hamza, Bertug Akintug
Abstract:
Having an appropriate plan of sanitation systems is one of the critical issues for global urban slums. Poor sanitation systems in urban slums outcomes an enhanced vulnerability of severe diseases, low hygiene and environmental risks within our environment. Mentioning human excreta being one of the most highly risked pollutants among all the other major contributors of sanitation pollutants is increasing public health risks and amounts of pollution loads within the slum environment. Higher population growth, urge of urbanization and illegal status of urban slums makes it impossible to increase the level of performance of sanitation systems in urban slums. According to Sustainable Sanitation Alliance, design parameters for sanitation systems were set up to ensure sustainable environment. This paper reviews the characteristics of human excreta at present, treatment technologies, and procedures of processes that can be adopted feasibly in the urban slums. Keeping these factors as our significant concern of study, assessment of sustainable sanitation systems is done using sanitation chain concept in accordance to the pre-determined sustainability indicators and criteria which reflect the potential and feasible application of waterless sanitation systems bringing sustainable sanitation systems in urban slums.Keywords: human excreta, sanitation chain, sustainable sanitation systems, urban slums
Procedia PDF Downloads 3143421 (In)Visibility of Afghan Migrants in Turkey's Informal Labour Market
Authors: Rezzan Alagoz, Seda Gonul
Abstract:
This study examines the migration, work, and social life experiences of undocumented Afghan migrants employed as shepherds in Igdır. Despite their high visibility in informal labor markets, their undocumented status renders them invisible in everyday life. Their invisibility in both official status and social life, coupled with their vulnerability to exploitation in the labor market, renders them particularly susceptible to marginalization. This research employs the concept of the subaltern to examine the characteristics of Afghan migrants as unrepresented, unheard, and invisible. It also analyzes their experiences in the labor market based on the concept of biopolitics. Undocumented Afghan migrants are engaged in labor-intensive occupations such as shepherding, thereby addressing an essential gap in the workforce that local workers are reluctant to undertake. The reliance of employers on the labor of these employees is significant; however, the undocumented status of these workers leaves them vulnerable to exploitation. In addition to serving as a critical source of low-cost labor, these individuals are susceptible to exploitation in the form of non-payment for their work, extended and intensive work schedules, and, on some occasions, physical violence. In the event of a conflict between shepherds and their employers, undocumented workers are unable to seek legal recourse, which serves to reinforce their marginalized status further. The predominant practice among Afghan shepherds is to utilize the workplace as a place of residence. In the context of shepherding work, the prevailing conditions at the workplace frequently pose a significant threat to the health and well-being of the individuals engaged in such activities. As a result of their lack of official status, these individuals lack access to basic services such as healthcare, which has the consequence of rendering them invisible in public and institutional spaces. Attempts to engage with public systems carry the risk of deportation, reinforcing the already fragile and precarious nature of their existence. This study examines the socio-political implications of undocumented status and addresses these experiences in the context of national and international migration policies. In line with Agamben's concept of the "state of exception" undocumented migrants exist in a state where fundamental rights are effectively nullified, and they are rendered outside the protection of the law. This exclusion is further exacerbated by the intersection of economic exploitation, political and physical invisibility, and limited access to basic services, which collectively contribute to a cycle of vulnerability. This research is based on in-depth interviews with 18 Afghan shepherds in Igdir province in August 2024. The research contributes to the ongoing critical debates on migration, labor exploitation, and biopolitics by focusing on the experiences of Afghan shepherds. The article examines how undocumented migrants maneuver between visibility and invisibility within the context of a system that relies on exploitation in the labor market and migration policies. The research findings demonstrate the necessity for policy intervention to address the structural exclusion of undocumented Afghan migrants from national and international protection systems, as well as their indispensable role in local economies.Keywords: Afghan migrants, biopolitics, border economy, informal labour market, migration policy, sheepherding, Subaltern
Procedia PDF Downloads 153420 The Value of Audit in Managing Supplier’s Process Improvement
Authors: Mohammad E. Nikoofal, Mehmet Gumus
Abstract:
Besides the many benefits of outsourcing, firms are still concerned about the lack of critical information regarding both the risk levels and actions of their suppliers that are just a few links away. In this paper, we study the effectiveness of audit for the manufacturer in managing her supplier’s process improvement effort when the supplier is privately informed about his disruption risk and actions. By comparing the agency costs associated with the optimal menu of contracts with and without audit, we completely characterize the value of audit for all the cases from the perspectives of both manufacturer, and supplier as well as total supply chain. First, the analysis of value of audit from the manufacturer’s perspective shows that she can strictly benefit from auditing her supplier’s actions. To the best of our knowledge, this result has not been documented before in the principal-agent literature under a standard setting where the agent is assumed to be risk-neutral and not protected by limited liability constraints. Second, we find that not only the manufacturer but also the supplier can strictly benefit from audit. Third, the audit enables the manufacturer to customize her contract offerings based on the reliability of the supplier. Finally, by analyzing the impact of problem parameters on the value of audit, we identify the conditions under which an audit would be beneficial for individual supply chain parties as well as total supply chain.Keywords: supply disruption, adverse selection, moral hazard incentives, audit
Procedia PDF Downloads 4623419 The Change of Urban Land Use/Cover Using Object Based Approach for Southern Bali
Authors: I. Gusti A. A. Rai Asmiwyati, Robert J. Corner, Ashraf M. Dewan
Abstract:
Change on land use/cover (LULC) dominantly affects spatial structure and function. It can have such impacts by disrupting social culture practice and disturbing physical elements. Thus, it has become essential to understand of the dynamics in time and space of LULC as it can be used as a critical input for developing sustainable LULC. This study was an attempt to map and monitor the LULC change in Bali Indonesia from 2003 to 2013. Using object based classification to improve the accuracy, and change detection, multi temporal land use/cover data were extracted from a set of ASTER satellite image. The overall accuracies of the classification maps of 2003 and 2013 were 86.99% and 80.36%, respectively. Built up area and paddy field were the dominant type of land use/cover in both years. Patch increase dominantly in 2003 illustrated the rapid paddy field fragmentation and the huge occurring transformation. This approach is new for the case of diverse urban features of Bali that has been growing fast and increased the classification accuracy than the manual pixel based classification.Keywords: land use/cover, urban, Bali, ASTER
Procedia PDF Downloads 5413418 Virtual Reality Based 3D Video Games and Speech-Lip Synchronization Superseding Algebraic Code Excited Linear Prediction
Authors: P. S. Jagadeesh Kumar, S. Meenakshi Sundaram, Wenli Hu, Yang Yung
Abstract:
In 3D video games, the dominance of production is unceasingly growing with a protruding level of affordability in terms of budget. Afterward, the automation of speech-lip synchronization technique is customarily onerous and has advanced a critical research subject in virtual reality based 3D video games. This paper presents one of these automatic tools, precisely riveted on the synchronization of the speech and the lip movement of the game characters. A robust and precise speech recognition segment that systematized with Algebraic Code Excited Linear Prediction method is developed which unconventionally delivers lip sync results. The Algebraic Code Excited Linear Prediction algorithm is constructed on that used in code-excited linear prediction, but Algebraic Code Excited Linear Prediction codebooks have an explicit algebraic structure levied upon them. This affords a quicker substitute to the software enactments of lip sync algorithms and thus advances the superiority of service factors abridged production cost.Keywords: algebraic code excited linear prediction, speech-lip synchronization, video games, virtual reality
Procedia PDF Downloads 4743417 Using the World Cafe Discussion Method to Practice Professional Ethics Courses: Taking Life Education as an Example
Authors: Li-Jia Chiu
Abstract:
The purpose of this study is to integrate the content of professional ethics curriculum into life education. This course is a required course for the third-year students of the university. The curriculum is based on professional ethics, which can help students gain insights into a conceptual understanding of professional theory, learning the meaning and the value of life. This study enhances students' attitude toward learning through multi-teaching methods. It takes ‘professionalism’ as the subject of discussion. Additionally, the course combines the connotation and issues of the student's career development. Using the world cafe discussion method, students can think about the role of the future career, and inspire students to integrate their career development and life value reflection and connection. This study recruited the third-year undergraduate students as samples to collect data. This study was conducted in the course of the fall semester in 2016 for thematic discussions, classroom observations, course study forms, coursework, and results in publication reports, etc. The researcher conducted induction data analysis to reflect the practice and reflection of the course. The subjects included 117 students from two classes, including 54 male and 63 female students. The findings of this study comprised the following two parts: the student’s learning and teacher’s teaching reflection. The students’ gains were that: 1) The curriculum design is different from that of other subjects; 2) The curriculum is highly interactive with teachers and classmates; 3) These students are willing to actively participate and share ideas in group discussions; 4 ) They thought the possibility of further discussions with other groups of students through table-to-table discussions; 5) They experienced the respect from other students in the learning process and their appreciation of other students in the same group. The instruction reflections were as follows: 1) Students learned to get link to the value of life and future development through topical discussions; 2) After the main course design guided through gradual guidance, the students’ psychology reached a certain degree of cognition, and further themes then added would cause more sensuous learning effects; 3) Combining students’ expertise in drawing in this department (digital media design department) into curriculum design is effective in stimulating learning motivation and sense of accomplishment; 4) In order to compare and explore learning benefits, future researches are recommended to conduct the similar studies with different departments. Finally, the researcher looks forward to providing research results and findings to the related curriculum teachers as a reference for practical curriculum planning and teaching methods.Keywords: life education, World Cafe, professional ethics, professionalism
Procedia PDF Downloads 1383416 Enhancing Strategic Counter-Terrorism: Understanding How Familial Leadership Influences the Resilience of Terrorist and Insurgent Organizations in Asia
Authors: Andrew D. Henshaw
Abstract:
The research examines the influence of familial and kinship based leadership on the resilience of politically violent organizations. Organizations of this type frequently fight in the same conflicts though are called 'terrorist' or 'insurgent' depending on political foci of the time, and thus different approaches are used to combat them. The research considers them correlated phenomena with significant overlap and identifies strengths and vulnerabilities in resilience processes. The research employs paired case studies to examine resilience in organizations under significant external pressure, and achieves this by measuring three variables. 1: Organizational robustness in terms of leadership and governance. 2. Bounce-back response efficiency to external pressures and adaptation to endogenous and exogenous shock. 3. Perpetuity of operational and attack capability, and political legitimacy. The research makes three hypotheses. First, familial/kinship leadership groups have a significant effect on organizational resilience in terms of informal operations. Second, non-familial/kinship organizations suffer in terms of heightened security transaction costs and social economics surrounding recruitment, retention, and replacement. Third, resilience in non-familial organizations likely stems from critical external supports like state sponsorship or powerful patrons, rather than organic resilience dynamics. The case studies pair familial organizations with non-familial organizations. Set 1: The Haqqani Network (HQN) - Pair: Lashkar-e-Toiba (LeT). Set 2: Jemaah Islamiyah (JI) - Pair: The Abu Sayyaf Group (ASG). Case studies were selected based on three requirements, being: contrasting governance types, exposure to significant external pressures and, geographical similarity. The case study sets were examined over 24 months following periods of significantly heightened operational activities. This enabled empirical measurement of the variables as substantial external pressures came into force. The rationale for the research is obvious. Nearly all organizations have some nexus of familial interconnectedness. Examining familial leadership networks does not provide further understanding of how terrorism and insurgency originate, however, the central focus of the research does address how they persist. The sparse attention to this in existing literature presents an unexplored yet important area of security studies. Furthermore, social capital in familial systems is largely automatic and organic, given at birth or through kinship. It reduces security vetting cost for recruits, fighters and supporters which lowers liabilities and entry costs, while raising organizational efficiency and exit costs. Better understanding of these process is needed to exploit strengths into weaknesses. Outcomes and implications of the research have critical relevance to future operational policy development. Increased clarity of internal trust dynamics, social capital and power flows are essential to fracturing and manipulating kinship nexus. This is highly valuable to external pressure mechanisms such as counter-terrorism, counterinsurgency, and strategic intelligence methods to penetrate, manipulate, degrade or destroy the resilience of politically violent organizations.Keywords: Counterinsurgency (COIN), counter-terrorism, familial influence, insurgency, intelligence, kinship, resilience, terrorism
Procedia PDF Downloads 3133415 The Quality of Management: A Leadership Maturity Model to Leverage Complexity
Authors: Marlene Kuhn, Franziska Schäfer, Heiner Otten
Abstract:
Today´s production processes experience a constant increase in complexity paving new ways for progressive forms of leadership. In the customized production, individual customer requirements drive companies to adapt their manufacturing processes constantly while the pressure for smaller lot sizes, lower costs and faster lead times grows simultaneously. When production processes are becoming more dynamic and complex, the conventional quality management approaches show certain limitations. This paper gives an introduction to complexity science from a quality management perspective. By analyzing and evaluating different characteristics of complexity, the critical complexity parameters are identified and assessed. We found that the quality of leadership plays a crucial role when dealing with increasing complexity. Therefore, we developed a concept for qualitative leadership customized for the management within complex processes based on a maturity model. The maturity model was then applied in the industry to assess the leadership quality of several shop floor managers with a positive evaluation feedback. In result, the maturity model proved to be a sustainable approach to leverage the rising complexity in production processes more effectively.Keywords: maturity model, process complexity, quality of leadership, quality management
Procedia PDF Downloads 3703414 An Initial Assessment of the Potential Contibution of 'Community Empowerment' to Mitigating the Drivers of Deforestation and Forest Degradation, in Giam Siak Kecil-Bukit Batu Biosphere Reserve
Authors: Arzyana Sunkar, Yanto Santosa, Siti Badriyah Rushayati
Abstract:
Indonesia has experienced annual forest fires that have rapidly destroyed and degraded its forests. Fires in the peat swamp forests of Riau Province, have set the stage for problems to worsen, this being the ecosystem most prone to fires (which are also the most difficult, to extinguish). Despite various efforts to curb deforestation, and forest degradation processes, severe forest fires are still occurring. To find an effective solution, the basic causes of the problems must be identified. It is therefore critical to have an in-depth understanding of the underlying causal factors that have contributed to deforestation and forest degradation as a whole, in order to attain reductions in their rates. An assessment of the drivers of deforestation and forest degradation was carried out, in order to design and implement measures that could slow these destructive processes. Research was conducted in Giam Siak Kecil–Bukit Batu Biosphere Reserve (GSKBB BR), in the Riau Province of Sumatera, Indonesia. A biosphere reserve was selected as the study site because such reserves aim to reconcile conservation with sustainable development. A biosphere reserve should promote a range of local human activities, together with development values that are in line spatially and economically with the area conservation values, through use of a zoning system. Moreover, GSKBB BR is an area with vast peatlands, and is experiencing forest fires annually. Various factors were analysed to assess the drivers of deforestation and forest degradation in GSKBB BR; data were collected from focus group discussions with stakeholders, key informant interviews with key stakeholders, field observation and a literature review. Landsat satellite imagery was used to map forest-cover changes for various periods. Analysis of landsat images, taken during the period 2010-2014, revealed that within the non-protected area of core zone, there was a trend towards decreasing peat swamp forest areas, increasing land clearance, and increasing areas of community oil-palm and rubber plantations. Fire was used for land clearing and most of the forest fires occurred in the most populous area (the transition area). The study found a relationship between the deforested/ degraded areas, and certain distance variables, i.e. distance from roads, villages and the borders between the core area and the buffer zone. The further the distance from the core area of the reserve, the higher was the degree of deforestation and forest degradation. Research findings suggested that agricultural expansion may be the direct cause of deforestation and forest degradation in the reserve, whereas socio-economic factors were the underlying driver of forest cover changes; such factors consisting of a combination of socio-cultural, infrastructural, technological, institutional (policy and governance), demographic (population pressure) and economic (market demand) considerations. These findings indicated that local factors/problems were the critical causes of deforestation and degradation in GSKBB BR. This research therefore concluded that reductions in deforestation and forest degradation in GSKBB BR could be achieved through ‘local actor’-tailored approaches such as community empowermentKeywords: Actor-led solution, community empowerment, drivers of deforestation and forest degradation, Giam Siak Kecil – Bukit Batu Biosphere Reserve
Procedia PDF Downloads 3483413 Study of Seismic Damage Reinforced Concrete Frames in Variable Height with Logistic Statistic Function Distribution
Authors: P. Zarfam, M. Mansouri Baghbaderani
Abstract:
In seismic design, the proper reaction to the earthquake and the correct and accurate prediction of its subsequent effects on the structure are critical. Choose a proper probability distribution, which gives a more realistic probability of the structure's damage rate, is essential in damage discussions. With the development of design based on performance, analytical method of modal push over as an inexpensive, efficacious, and quick one in the estimation of the structures' seismic response is broadly used in engineering contexts. In this research three concrete frames of 3, 6, and 13 stories are analyzed in non-linear modal push over by 30 different earthquake records by OpenSEES software, then the detriment indexes of roof's displacement and relative displacement ratio of the stories are calculated by two parameters: peak ground acceleration and spectra acceleration. These indexes are used to establish the value of damage relations with log-normal distribution and logistics distribution. Finally the value of these relations is compared and the effect of height on the mentioned damage relations is studied, too.Keywords: modal pushover analysis, concrete structure, seismic damage, log-normal distribution, logistic distribution
Procedia PDF Downloads 2463412 Character Strengths and Military Leadership
Authors: Lobna Cherif, Valerie Wood
Abstract:
The importance of both character and resilience for military members has been emphasized at the highest levels of military leadership. Initial research suggests that the presence of character strengths might be relevant in predicting success and well-being for some military populations (e.g., recruits). In this presentation, we will first review our research investigating the perceived importance of character strengths for Canadian military cadet (N = 134) success, the top strengths endorsed by cadets, and, in a subset of cadets (n = 94), the relationships among core strengths and resilience. Participants first completed a survey comprised of a resilience measure and demographic items, then one month later completed a Values in Action (VIA) character strengths profile, questions related to character strengths (their personal top-five character strengths, and strengths they believed were important for military-related stressors and leadership, academic success, resilience, and completion of the military challenge). Findings indicated that military cadets consider (among others), perseverance, judgment, and teamwork to be most critical for bouncing back from stressors. However, the most frequently endorsed strengths that characterized cadets were bravery, honesty, and perseverance. Finally, perseverance, bravery, and humor were positively correlated with cadet resilience, while endorsement of love was negatively correlated with resilience.Keywords: character strengths, leadership, positive psychology, resilience
Procedia PDF Downloads 1893411 Peer Corrective Feedback on Written Errors in Computer-Mediated Communication
Authors: S. H. J. Liu
Abstract:
This paper aims to explore the role of peer Corrective Feedback (CF) in improving written productions by English-as-a- foreign-language (EFL) learners who work together via Wikispaces. It attempted to determine the effect of peer CF on form accuracy in English, such as grammar and lexis. Thirty-four EFL learners at the tertiary level were randomly assigned into the experimental (with peer feedback) or the control (without peer feedback) group; each group was subdivided into small groups of two or three. This resulted in six and seven small groups in the experimental and control groups, respectively. In the experimental group, each learner played a role as an assessor (providing feedback to others), as well as an assessee (receiving feedback from others). Each participant was asked to compose his/her written work and revise it based on the feedback. In the control group, on the other hand, learners neither provided nor received feedback but composed and revised their written work on their own. Data collected from learners’ compositions and post-task interviews were analyzed and reported in this study. Following the completeness of three writing tasks, 10 participants were selected and interviewed individually regarding their perception of collaborative learning in the Computer-Mediated Communication (CMC) environment. Language aspects to be analyzed included lexis (e.g., appropriate use of words), verb tenses (e.g., present and past simple), prepositions (e.g., in, on, and between), nouns, and articles (e.g., a/an). Feedback types consisted of CF, affective, suggestive, and didactic. Frequencies of feedback types and the accuracy of the language aspects were calculated. The results first suggested that accurate items were found more in the experimental group than in the control group. Such results entail that those who worked collaboratively outperformed those who worked non-collaboratively on the accuracy of linguistic aspects. Furthermore, the first type of CF (e.g., corrections directly related to linguistic errors) was found to be the most frequently employed type, whereas affective and didactic were the least used by the experimental group. The results further indicated that most participants perceived that peer CF was helpful in improving the language accuracy, and they demonstrated a favorable attitude toward working with others in the CMC environment. Moreover, some participants stated that when they provided feedback to their peers, they tended to pay attention to linguistic errors in their peers’ work but overlook their own errors (e.g., past simple tense) when writing. Finally, L2 or FL teachers or practitioners are encouraged to employ CMC technologies to train their students to give each other feedback in writing to improve the accuracy of the language and to motivate them to attend to the language system.Keywords: peer corrective feedback, computer-mediated communication (CMC), second or foreign language (L2 or FL) learning, Wikispaces
Procedia PDF Downloads 2453410 Performance Analysis of Elliptic Curve Cryptography Using Onion Routing to Enhance the Privacy and Anonymity in Grid Computing
Authors: H. Parveen Begam, M. A. Maluk Mohamed
Abstract:
Grid computing is an environment that allows sharing and coordinated use of diverse resources in dynamic, heterogeneous and distributed environment using Virtual Organization (VO). Security is a critical issue due to the open nature of the wireless channels in the grid computing which requires three fundamental services: authentication, authorization, and encryption. The privacy and anonymity are considered as an important factor while communicating over publicly spanned network like web. To ensure a high level of security we explored an extension of onion routing, which has been used with dynamic token exchange along with protection of privacy and anonymity of individual identity. To improve the performance of encrypting the layers, the elliptic curve cryptography is used. Compared to traditional cryptosystems like RSA (Rivest-Shamir-Adelman), ECC (Elliptic Curve Cryptosystem) offers equivalent security with smaller key sizes which result in faster computations, lower power consumption, as well as memory and bandwidth savings. This paper presents the estimation of the performance improvements of onion routing using ECC as well as the comparison graph between performance level of RSA and ECC.Keywords: grid computing, privacy, anonymity, onion routing, ECC, RSA
Procedia PDF Downloads 3983409 Case for Simulating Consumer Response to Feed in Tariff Based on Socio-Economic Parameters
Authors: Fahad Javed, Tasneem Akhter, Maria Zafar, Adnan Shafique
Abstract:
Evaluation and quantification of techniques is critical element of research and development of technology. Simulations and models play an important role in providing the tools for such assessments. When we look at technologies which impact or is dependent on an average Joe consumer then modeling the socio-economic and psychological aspects of the consumer also gain an importance. For feed in tariff for home consumers which is being deployed for average consumer may force many consumers to be adapters of the technology. Understanding how consumers will adapt this technologies thus hold as much significance as evaluating how the techniques would work in consumer agnostic scenarios. In this paper we first build the case for simulators which accommodate socio-economic realities of the consumers to evaluate smart grid technologies, provide a glossary of data that can aid in this effort and present an abstract model to capture and simulate consumers' adaptation and behavioral response to smart grid technologies. We provide a case study to express the power of such simulators.Keywords: smart grids, simulation, socio-economic parameters, feed in tariff (FiT), forecasting
Procedia PDF Downloads 3583408 EarlyWarning for Financial Stress Events:A Credit-Regime Switching Approach
Abstract:
We propose a new early warning model for predicting financial stress events for a given future time. In this model, we examine whether credit conditions play an important role as a nonlinear propagator of shocks when predicting the likelihood of occurrence of financial stress events for a given future time. This propagation takes the form of a threshold regression in which a regime change occurs if credit conditions cross a critical threshold. Given the new early warning model for financial stress events, we evaluate the performance of this model and currently available alternatives, such as the model from signal extraction approach, and linear regression model. In-sample forecasting results indicate that the three types of models are useful tools for predicting financial stress events while none of them outperforms others across all criteria considered. The out-of-sample forecasting results suggest that the credit-regime switching model performs better than the two others across all criteria and all forecasting horizons considered.Keywords: cut-off probability, early warning model, financial crisis, financial stress, regime-switching model, forecasting horizons
Procedia PDF Downloads 4353407 Usage of Military Continuity Management System for Supporting of Emergency Management
Authors: Radmila Hajkova, Jiri Palecek, Hana Malachova, Alena Oulehlova
Abstract:
Ensuring of continuity of business is the basic strategy of every company. Continuity of organization activities includes comprehensive procedures that help in solving unexpected situations of natural and anthropogenic character (for example flood, blaze, economic situations). Planning of continuity operations is a process that helps identify critical processes and implement plans for the security and recovery of key processes. The aim of this article demonstrates application of system approach to managing business continuity called business continuity management systems in military issues. This article describes the life cycle of business continuity management which is based on the established cycle PDCA (plan-do-check-act). After this is carried out by activities which are making by the University of Defence during activation of forces and means of the Integrated rescue system in case of emergencies - accidents at a nuclear power plant in Czech republic. Activities of various stages of deployment earmarked forces and resources are managed and evaluated by using MCMS application (military continuity management system).Keywords: business continuity management system, emergency management, military, nuclear safety
Procedia PDF Downloads 4553406 Economics in Primary Schools – Positive Education and Well-being
Authors: Judit Nagy
Abstract:
Many scientific studies claim that financial education should start as early as possible. Children are much more capable of and willing to absorb new concepts than adults. If we introduce children to financial knowledge early, their behaviour and attitudes to this subject will change, increasing later success in this area of life. However, poor financial decisions may entail severe consequences, not only to individuals but even to the wider society. Good financial decisions and economic attitudes may contribute to economic growth and well-being. Whilst in several countries, education about financial awareness and fundamentals is available, the understanding and acquisition of complex economic knowledge and the development of children’s independent problem-solving skills are still lacking. The results suggest that teaching economic and financial knowledge through accounting and making lectures interactive by using special tools of positive education is critical to stimulating children’s interest. Eighty percent of the students in the study liked the combined and interactive lecture. Introducing this kind of knowledge to individuals is a relevant objective, even at the societal level.Keywords: positive psychology, education innovation, primary school, gender, economics, accounting, finance, personal finance, mathematics, economic growth, well-being, sustainability
Procedia PDF Downloads 1043405 Spillover Effect of Husbands' Lifestyle on Their Wives' Marital Satisfaction in China
Authors: Xitong Liu, Yutong Huang, Shu-Ching Yang
Abstract:
The phenomena of hypergamous and hypogamous marriages have become popular due to the imbalanced sex ratio caused by Chinese social preference for sons. Our research explores the spillover effect of husbands' lifestyles on their wives' marital satisfaction in China. Both personal and spouse lifestyle elements are utilized to develop regression models to study husbands' spillover effects on women's marital satisfaction. With data from China Family Panel Study and Stata for analysis, we tested our hypothesis that both smoking and substance use by a spouse will negatively impact women's marital satisfaction. Our empirical findings suggest that substance use has negative implications on marriage satisfaction. In particular, husbands' substance use is more critical to wives' marriage satisfaction than wives' behaviours. Conversely, another behavior indicating bad habits, the number of times the spouse drank alcohol, had no significant effect on the wife's marital satisfaction. We concluded our investigation and provided future implications for scholars in the family economics field.Keywords: Asian/Pacific Islander families, family economics, housework/division of labor, spillover
Procedia PDF Downloads 1253404 21st Century Computer Technology for the Training of Early Childhood Teachers: A Study of Second-Year Education Students Challenged with Building a Kindergarten Website
Authors: Yonit Nissim, Eyal Weissblueth
Abstract:
This research is the continuation of a process that began in 2010 with the goal of redesigning the training program for future early childhood teachers at the Ohalo College, to integrate technology and provide 21st-century skills. The article focuses on a study of the processes involved in developing a special educational unit which challenged students with the task of designing, planning and building an internet site for kindergartens. This project was part of their second-year studies in the early childhood track of an interdisciplinary course entitled 'Educating for the Future.' The goal: enabling students to gain experience in developing an internet site specifically for kindergartens, and gain familiarity with Google platforms, the acquisition and use of innovative skills and the integration of technology in pedagogy. Research questions examined how students handled the task of building an internet site. The study explored whether the guided process of building a site helped them develop proficiency in creativity, teamwork, evaluation and learning appropriate to the 21st century. The research tool was a questionnaire constructed by the researchers and distributed online to the students. Answers were collected from 50-course participants. Analysis of the participants’ responses showed that, along with the significant experience and benefits that students gained from building a website for kindergarten, ambivalence was shown toward the use of new, unfamiliar and complex technology. This attitude was characterized by unease and initial emotional distress triggered by the departure from routine training to an island of uncertainty. A gradual change took place toward the adoption of innovation with the help of empathy, training, and guidance from the instructors, leading to the students’ success in carrying out the task. Initial success led to further successes, resulting in a quality product and a feeling of personal competency among the students. A clear and extreme emotional shift was observed on the spectrum from a sense of difficulty and dissatisfaction to feelings of satisfaction, joy, competency and cognitive understanding of the importance of facing a challenge and succeeding. The findings of this study can contribute to increased understanding of the complex training process of future kindergarten teachers, coping with a changing world, and pedagogy that is supported by technology.Keywords: early childhood teachers, educating for the future, emotions, kindergarten website
Procedia PDF Downloads 1563403 Delayed Disclosure: Factors Influencing Coming Out Decisions Among Transgender Adolescents
Authors: Wallace Wong, Julia Toews, Kirsten Graham, Teija Yli-Renko, Dorcas Chau, Judith Lai, Momoka Nabatame
Abstract:
Many transgender individuals report recognizing their non-cisgender identity in early childhood. However, numerous transgender adolescents choose to delay coming out to their family or friends until after puberty. This study explored factors influencing this decision by analyzing data from over 100 cases of transgender adolescents who disclosed their identity post-puberty. Using a qualitative thematic analysis approach, we identified key factors affecting this choice, including fear of rejection, lack of affirming resources, internalized transphobia, and safety concerns. The study also revealed the positive impact of increased transgender visibility and online support communities in facilitating later coming-out experiences. Our findings highlight the intersection of personal, social, and environmental factors contributing to disclosure timing for transgender adolescents. These insights can inform supportive interventions and policies to assist transgender youth throughout their coming out process, regardless of when it occurs. This research contributes to a deeper understanding of the challenges faced by transgender adolescents and the support they need during this critical period.Keywords: transgender, gender identity, coming out, adolescents
Procedia PDF Downloads 203402 Comparative Study of Arch Bridges with Varying Rise to Span Ratio
Authors: Tauhidur Rahman, Arnab Kumar Sinha
Abstract:
This paper presents a comparative study of Arch bridges based on their varying rise to span ratio. The comparison is done between different steel Arch bridges which have variable span length and rise to span ratio keeping the same support condition. The aim of our present study is to select the optimum value of rise to span ratio of Arch bridge as the cost of the Arch bridge increases with the increasing of the rise. In order to fulfill the objective, several rise to span ratio have been considered for same span of Arch bridge and various structural parameters such as Bending moment, shear force etc have been calculated for different model. A comparative study has been done for several Arch bridges finally to select the optimum rise to span ratio of the Arch bridges. In the present study, Finite Element model for medium to long span, with different rise to span ratio have been modeled and are analyzed with the help of a Computational Software named MIDAS Civil to evaluate the results such as Bending moments, Shear force, displacements, Stresses, influence line diagrams, critical loads. In the present study, 60 models of Arch bridges for 80 to 120 m span with different rise to span ratio has been thoroughly investigated.Keywords: arch bridge, analysis, comparative study, rise to span ratio
Procedia PDF Downloads 5313401 Static Priority Approach to Under-Frequency Based Load Shedding Scheme in Islanded Industrial Networks: Using the Case Study of Fatima Fertilizer Company Ltd - FFL
Authors: S. H. Kazmi, T. Ahmed, K. Javed, A. Ghani
Abstract:
In this paper static scheme of under-frequency based load shedding is considered for chemical and petrochemical industries with islanded distribution networks relying heavily on the primary commodity to ensure minimum production loss, plant downtime or critical equipment shutdown. A simplistic methodology is proposed for in-house implementation of this scheme using underfrequency relays and a step by step guide is provided including the techniques to calculate maximum percentage overloads, frequency decay rates, time based frequency response and frequency based time response of the system. Case study of FFL electrical system is utilized, presenting the actual system parameters and employed load shedding settings following the similar series of steps. The arbitrary settings are then verified for worst overload conditions (loss of a generation source in this case) and comprehensive system response is then investigated.Keywords: islanding, under-frequency load shedding, frequency rate of change, static UFLS
Procedia PDF Downloads 4863400 Micro-sovereignty Dynamics: Property Management and Biopolitics
Authors: Sibo Lu, Zhongkai Qian, Haotian Zhang
Abstract:
This article examines the phenomenon of micro-sovereignty in the context of property management and its implications for biopolitics and urban governance in mainland China. It explores the transformation of urban spaces into privatized communities managed by property companies, leading to the reterritorialization of urban areas and the segmentation of urban populations. Drawing on legal frameworks, we analyze how commercial real estate development and property management have reshaped the urban landscape, placing nearly all urban residents within service areas of property management firms, thus establishing micro-sovereign entities that exercise control over residential spaces. Through a critique of property management's sovereign effects on social organization and the exploration of autonomous, democratic alternatives in community governance, this article contributes to the broader discourse on sovereignty, governance, and resistance within the urban milieu of contemporary China. It underscores the urgent need for more democratic forms of community management that can transcend the capitalist logic of property management companies and foster genuine participatory governance at the grassroots level.Keywords: biopolitic, critical theory, political sociology, political philosophy
Procedia PDF Downloads 473399 Secure Text Steganography for Microsoft Word Document
Authors: Khan Farhan Rafat, M. Junaid Hussain
Abstract:
Seamless modification of an entity for the purpose of hiding a message of significance inside its substance in a manner that the embedding remains oblivious to an observer is known as steganography. Together with today's pervasive registering frameworks, steganography has developed into a science that offers an assortment of strategies for stealth correspondence over the globe that must, however, need a critical appraisal from security breach standpoint. Microsoft Word is amongst the preferably used word processing software, which comes as a part of the Microsoft Office suite. With a user-friendly graphical interface, the richness of text editing, and formatting topographies, the documents produced through this software are also most suitable for stealth communication. This research aimed not only to epitomize the fundamental concepts of steganography but also to expound on the utilization of Microsoft Word document as a carrier for furtive message exchange. The exertion is to examine contemporary message hiding schemes from security aspect so as to present the explorative discoveries and suggest enhancements which may serve a wellspring of information to encourage such futuristic research endeavors.Keywords: hiding information in plain sight, stealth communication, oblivious information exchange, conceal, steganography
Procedia PDF Downloads 2413398 In situ Modelling of Lateral-Torsional Vibration of a Rotor-Stator with Multiple Parametric Excitations
Authors: B. X. Tchomeni, A. A. Alugongo, L. M. Masu
Abstract:
This paper presents a 4-DOF nonlinear model of a cracked of Laval rotor established based on Energy Principles. The model has been used to simulate coupled torsional-lateral response of the cracked rotor stator-system with multiple parametric excitations, namely, rotor-stator-rub, a breathing transverse crack, unbalanced mass, and an axial force. Nonlinearity due to a “breathing” crack is incorporated by considering a simple hinge model which is suitable for small breathing crack. The vibration response of a cracked rotor passing through its critical speed with rotor-stator interaction is analyzed, and an attempt for crack detection and monitoring explored. Effects of unbalanced eccentricity with phase and acceleration are investigated. By solving the motion equations, steady-state vibration response is obtained in presence of several rotor faults. The presence of a crack is observable in the power spectrum despite the excitation by the axial force and rotor-stator rub impact. Presented results are consistent with existing literature and could be adopted into rotor condition monitoring strategiesKeywords: rotor, crack, rubbing, axial force, non linear
Procedia PDF Downloads 4013397 Reliability Analysis for Cyclic Fatigue Life Prediction in Railroad Bolt Hole
Authors: Hasan Keshavarzian, Tayebeh Nesari
Abstract:
Bolted rail joint is one of the most vulnerable areas in railway track. A comprehensive approach was developed for studying the reliability of fatigue crack initiation of railroad bolt hole under random axle loads and random material properties. The operation condition was also considered as stochastic variables. In order to obtain the comprehensive probability model of fatigue crack initiation life prediction in railroad bolt hole, we used FEM, response surface method (RSM), and reliability analysis. Combined energy-density based and critical plane based fatigue concept is used for the fatigue crack prediction. The dynamic loads were calculated according to the axle load, speed, and track properties. The results show that axle load is most sensitive parameter compared to Poisson’s ratio in fatigue crack initiation life. Also, the reliability index decreases slowly due to high cycle fatigue regime in this area.Keywords: rail-wheel tribology, rolling contact mechanic, finite element modeling, reliability analysis
Procedia PDF Downloads 3813396 Official Game Account Analysis: Factors Influence Users' Judgments in Limited-Word Posts
Authors: Shanhua Hu
Abstract:
Social media as a critical propagandizing form of film, video games, and digital products has received substantial research attention, but there exists several critical barriers such as: (1) few studies exploring the internal and external connections of a product as part of the multimodal context that gives rise to readability and commercial return; (2) the lack of study of multimodal analysis in product’s official account of game publishers and its impact on users’ behaviors including purchase intention, social media engagement, and playing time; (3) no standardized ecologically-valid, game type-varying data can be used to study the complexity of official account’s postings within a time period. This proposed research helps to tackle these limitations in order to develop a model of readability study that is more ecologically valid, robust, and thorough. To accomplish this objective, this paper provides a more diverse dataset comprising different visual elements and messages collected from the official Twitter accounts of the Top 20 best-selling games of 2021. Video game companies target potential users through social media, a popular approach is to set up an official account to maintain exposure. Typically, major game publishers would create an official account on Twitter months before the game's release date to update on the game's development, announce collaborations, and reveal spoilers. Analyses of tweets from those official Twitter accounts would assist publishers and marketers in identifying how to efficiently and precisely deploy advertising to increase game sales. The purpose of this research is to determine how official game accounts use Twitter to attract new customers, specifically which types of messages are most effective at increasing sales. The dataset includes the number of days until the actual release date on Twitter posts, the readability of the post (Flesch Reading Ease Score, FRES), the number of emojis used, the number of hashtags, the number of followers of the mentioned users, the categorization of the posts (i.e., spoilers, collaborations, promotions), and the number of video views. The timeline of Twitter postings from official accounts will be compared to the history of pre-orders and sales figures to determine the potential impact of social media posts. This study aims to determine how the above-mentioned characteristics of official accounts' Twitter postings influence the sales of the game and to examine the possible causes of this influence. The outcome will provide researchers with a list of potential aspects that could influence people's judgments in limited-word posts. With the increased average online time, users would adapt more quickly than before in online information exchange and readings, such as the word to use sentence length, and the use of emojis or hashtags. The study on the promotion of official game accounts will not only enable publishers to create more effective promotion techniques in the future but also provide ideas for future research on the influence of social media posts with a limited number of words on consumers' purchasing decisions. Future research can focus on more specific linguistic aspects, such as precise word choice in advertising.Keywords: engagement, official account, promotion, twitter, video game
Procedia PDF Downloads 76