Search results for: social unconscious modes of communication
10333 Social Entrepreneurship against Depopulation: Network Analysis within the Theoretical Framework of the Quadruple Helix
Authors: Esperanza Garcia-Uceda, Josefina L. Murillo-Luna, M. Pilar Latorre-Martinez, Marta Ferrer-Serrano
Abstract:
Social entrepreneurship represents an innovation of traditional business models. During the last decade, its important role in contributing to rural and regional development has been widely recognized, due to its capacity to combat the problem of depopulation through the creation of employment. However, the success of this type of innovative business initiatives depends to a large extent on the existence of an adequate ecosystem of support resources. Based on the theoretical framework of the quadruple helix (QH), which highlights the need for collaboration between different interest groups -university, industry, government and civil society- for the development of regional innovations, in this work the network analysis is applied to study the ecosystem of resources to support social entrepreneurship in the rural area of the province of Zaragoza (Spain). It is a quantitative analysis that can be used to measure the interactions between the different actors that make up the quadruple helix, as well as the networks created between the different institutions and support organizations, through the study of the complex networks they form. The results show the importance of the involvement of local governments and the university, as key elements in the development process, but also allow identifying other issues that are susceptible to improvement.Keywords: ecosystem of support resources, network analysis, quadruple helix, social entrepreneurship
Procedia PDF Downloads 25210332 Oxytocin and Sensorimotor Synchronization in Pairs of Strangers
Authors: Yana Gorina, Olga Lopatina, Elina Tsigeman, Larisa Mararitsa
Abstract:
The ability to act in concert with others, the so-called sensorimotor synchronisation, is a fundamental human ability that underlies successful interpersonal coordination. The manifestation of accuracy and plasticity in synchronisation is an adaptive aspect of interaction with the environment, as well as the ability to predict upcoming actions and behaviour of others. The ability to temporarily coordinate one’s actions with a predictable external event is manifested in such types of social behaviour as a synchronised group dance to music played live by an orchestra, group sports (rowing, swimming, etc.), synchronised actions of surgeons during an operation, applause from an admiring audience, walking rhythms, etc. Both our body and mind are involved in achieving the synchronisation during social interactions. However, it has not yet been well described how the brain determine the external rhythm and what neuropeptides coordinate and synchronise actions. Over the past few decades, there has been an increased interest among neuroscientists and neurophysiologists regarding the neuropeptide oxytocin in the context of its complex, diverse and sometimes polar effects manifested in the emotional and social aspects of behaviour (attachment, trust, empathy, emotion recognition, stress response, anxiety and depression, etc.). Presumable, oxytocin might also be involved in social synchronisation processes. The aim of our study is to test the hypothesis that oxytocin is linked to interpersonal synchronisation in a pair of strangers.Keywords: behavior, movement, oxytocin, synchronization
Procedia PDF Downloads 6210331 Informing, Enabling and Inspiring Social Innovation by Geographic Systems Mapping: A Case Study in Workforce Development
Authors: Cassandra A. Skinner, Linda R. Chamberlain
Abstract:
The nonprofit and public sectors are increasingly turning to Geographic Information Systems for data visualizations which can better inform programmatic and policy decisions. Additionally, the private and nonprofit sectors are turning to systems mapping to better understand the ecosystems within which they operate. This study explores the potential which combining these data visualization methods—a method which is called geographic systems mapping—to create an exhaustive and comprehensive understanding of a social problem’s ecosystem may have in social innovation efforts. Researchers with Grand Valley State University collaborated with Talent 2025 of West Michigan to conduct a mixed-methods research study to paint a comprehensive picture of the workforce development ecosystem in West Michigan. Using semi-structured interviewing, observation, secondary research, and quantitative analysis, data were compiled on workforce development organizations’ locations, programming, metrics for success, partnerships, funding sources, and service language. To best visualize and disseminate the data, a geographic system map was created which identifies programmatic, operational, and geographic gaps in workforce development services of West Michigan. By combining geographic and systems mapping methods, the geographic system map provides insight into the cross-sector relationships, collaboration, and competition which exists among and between workforce development organizations. These insights identify opportunities for and constraints around cross-sectoral social innovation in the West Michigan workforce development ecosystem. This paper will discuss the process utilized to prepare the geographic systems map, explain the results and outcomes, and demonstrate how geographic systems mapping illuminated the needs of the community and opportunities for social innovation. As complicated social problems like unemployment often require cross-sectoral and multi-stakeholder solutions, there is potential for geographic systems mapping to be a tool which informs, enables, and inspires these solutions.Keywords: cross-sector collaboration, data visualization, geographic systems mapping, social innovation, workforce development
Procedia PDF Downloads 29510330 The Role of Zakah and Waqf in Poverty Alleviation: A Strategy for West Africa
Authors: Maryam Idris Bakori
Abstract:
The level of poverty in our region (West Africa) is a severe problem. The statistics about it are scary and alarming. For example, Report on Economic and Social Conditions in West Africa by United Nations Economic Commission for Africa gives the following gloomy picture of social conditions in the region: In West Africa, approximately one person in three in the towns, and one in two in the rural areas, cannot afford the expenditure needed to cover their basic needs. The situation has reached emergency proportions and calls for urgent social action (Recent Economic and Social Developments in West Africa and Prospects for 2010). Many different policies and programs to combat the poverty in the region have been embarked upon by the government of various countries in West Africa, but yet the ugly face of poverty persists. However, to explore opportunities and avenues for making positive contributions to national and regional development, this paper sets out to examine the role of two Islamic institutions; Zakah and Waqf, in poverty alleviation and how Islam uses these two institutions among others to eradicate poverty. The paper suggests that the governments of various countries of West Africa should endeavor to integrate Zakah and Waqf into their poverty alleviation programs by borrowing a leaf from some countries in Africa and Asia that have integrated these Islamic institutions into their poverty reduction programs, and they have started to reap the positive result from the policy.Keywords: waqf, poverty, zakah, Islamic economy, education
Procedia PDF Downloads 40210329 A Proposal for an Excessivist Social Welfare Ordering
Authors: V. De Sandi
Abstract:
In this paper, we characterize a class of rank-weighted social welfare orderings that we call ”Excessivist.” The Excessivist Social Welfare Ordering (eSWO) judges incomes above a fixed threshold θ as detrimental to society. To accomplish this, the identification of a richness or affluence line is necessary. We employ a fixed, exogenous line of excess. We define an eSWF in the form of a weighted sum of individual’s income. This requires introducing n+1 vectors of weights, one for all possible numbers of individuals below the threshold. To do this, the paper introduces a slight modification of the class of rank weighted class of social welfare function. Indeed, in our excessivist social welfare ordering, we allow the weights to be both positive (for individuals below the line) and negative (for individuals above). Then, we introduce ethical concerns through an axiomatic approach. The following axioms are required: continuity above and below the threshold (Ca, Cb), anonymity (A), absolute aversion to excessive richness (AER), pigou dalton positive weights preserving transfer (PDwpT), sign rank preserving full comparability (SwpFC) and strong pareto below the threshold (SPb). Ca, Cb requires that small changes in two income distributions above and below θ do not lead to changes in their ordering. AER suggests that if two distributions are identical in any respect but for one individual above the threshold, who is richer in the first, then the second should be preferred by society. This means that we do not care about the waste of resources above the threshold; the priority is the reduction of excessive income. According to PDwpT, a transfer from a better-off individual to a worse-off individual despite their relative position to the threshold, without reversing their ranks, leads to an improved distribution if the number of individuals below the threshold is the same after the transfer or the number of individuals below the threshold has increased. SPb holds only for individuals below the threshold. The weakening of strong pareto and our ethics need to be justified; we support them through the notion of comparative egalitarianism and income as a source of power. SwpFC is necessary to ensure that, following a positive affine transformation, an individual does not become excessively rich in only one distribution, thereby reversing the ordering of the distributions. Given the axioms above, we can characterize the class of the eSWO, getting the following result through a proof by contradiction and exhaustion: Theorem 1. A social welfare ordering satisfies the axioms of continuity above and below the threshold, anonymity, sign rank preserving full comparability, aversion to excessive richness, Pigou Dalton positive weight preserving transfer, and strong pareto below the threshold, if and only if it is an Excessivist-social welfare ordering. A discussion about the implementation of different threshold lines reviewing the primary contributions in this field follows. What the commonly implemented social welfare functions have been overlooking is the concern for extreme richness at the top. The characterization of Excessivist Social Welfare Ordering, given the axioms above, aims to fill this gap.Keywords: comparative egalitarianism, excess income, inequality aversion, social welfare ordering
Procedia PDF Downloads 6410328 Evaluation of Massive Open Online Course in a Rural Marginalized Area: Case Study of Alice Community, Eastern Cape, South Africa
Authors: Dare Ebenezer Fatumo, Olusesan Emmanuel Adelabu
Abstract:
Online learning has taken another dimension through the introduction of Massive Open Online Courses (MOOCs), it has also become an important resource base for teaching and learning. This research aimed at investigating the use of Massive Open Online Course in a rural marginalized area. The survey research design of descriptive nature was adopted to evaluate the awareness and usage of Massive Open Online Course (MOOCs) in Alice community, Eastern Cape, South Africa. This study also employed quantitative approach by using self-structured questionnaire to evoke information from the respondents. The data collected were analyzed by Statistical Package for Social Sciences (SPSS). The findings revealed amongst others the efficacy of Massive Open Online Course (MOOCs) in fostering teaching and learning in rural marginalized areas. This study concludes that MOOCs is a veritable medium for busy or less privileged individual to acquire a degree or certification. Therefore, the study recommends MOOCs platform to be fully embraced by people in rural marginalized areas, awareness programs about its usefulness should be propagated across the municipalities nationwide.Keywords: distance learning, information and communication technology, massive open online course, online learning, teaching and learning
Procedia PDF Downloads 17910327 Deictic Expressions in Selected Football Commentaries
Authors: Vera Ofori Akomah
Abstract:
There is no society without language. In football, language serves as a tool for communication. The football language and meaning of activities are largely revealed through the utterances of football commentators. The linguistic subfield of pragmatics is related to the study of meaning. Pragmatics shows that the interpretation of utterances not only depends on linguistic knowledge but also depends on knowledge about the context of the utterance, knowledge about the status of those involved such as the intent of the speaker, the place, and time of the utterance. Pragmatics analysis comes in several forms and one of such is Deixis. In football commentating, commentators often use deitic expressions in building utterances. The researcher intends to analyse deixis contained in three selected football commentaries through the use of Levinson’s deixis theory. This research is a qualitative study with content analysis as its method. This is because this study focuses on deitic expressions in football commentaries. The data of this study are utterances from English commentaries from 2016 El Classico match between Barcelona and Real Madrid, 2018 FIFA World Cup: Portugal vs Spain and 2022 FIFA World Cup Qualifier: Ghana v Nigeria. The result of the study reveals that there are five kinds of deixis which are person deixis (divided into three: the first person, the second person and the third person), place deixis, time deixis, discourse deixis and social deixis.Keywords: pragmatics analysis, football commentary, deixis, types of deixis
Procedia PDF Downloads 2710326 A Study on Social and Economic Conditions of Street Vendors Using Field Survey Data
Authors: Ruchika Yadav
Abstract:
Street vendors are the integral component of urban economies of the world. They are the distributors of affordable goods and services and provide convenient and accessible retail options to the customers and form a vital part of the social and economic life of a city. A street vendor as an occupation existed for hundreds of years and considered to be as a cornerstone of many cities. In this paper, our objective is to analyze the socio-economic profile of street vendors, identification of their problems and to suggest remedial measures for the betterment based on the observation and suggestions of the street vendors. To conduct this study, primary data has been collected with the help of field survey and direct questionnaire to the respondents in Aligarh City which contains all the information relevant to social and economic conditions. The overall analysis of this study reveals street vendors are the backward sections of the society possess medium to the low-level standard of living due to illiteracy; their working environment and social security issues are not addressed properly. They are unaware of many of the governmental schemes launched for poverty alleviation and their poor accessibility in basic amenities leads to the backward socio-economic status in the society. The results found in this study can be very useful and helping tool for the policymakers to know the socio-economic conditions of the street vendors in detail.Keywords: abject poverty, socio-economic conditions, street vendors, vulnerability
Procedia PDF Downloads 14010325 Integrating the Modbus SCADA Communication Protocol with Elliptic Curve Cryptography
Authors: Despoina Chochtoula, Aristidis Ilias, Yannis Stamatiou
Abstract:
Modbus is a protocol that enables the communication among devices which are connected to the same network. This protocol is, often, deployed in connecting sensor and monitoring units to central supervisory servers in Supervisory Control and Data Acquisition, or SCADA, systems. These systems monitor critical infrastructures, such as factories, power generation stations, nuclear power reactors etc. in order to detect malfunctions and ignite alerts and corrective actions. However, due to their criticality, SCADA systems are vulnerable to attacks that range from simple eavesdropping on operation parameters, exchanged messages, and valuable infrastructure information to malicious modification of vital infrastructure data towards infliction of damage. Thus, the SCADA research community has been active over strengthening SCADA systems with suitable data protection mechanisms based, to a large extend, on cryptographic methods for data encryption, device authentication, and message integrity protection. However, due to the limited computation power of many SCADA sensor and embedded devices, the usual public key cryptographic methods are not appropriate due to their high computational requirements. As an alternative, Elliptic Curve Cryptography has been proposed, which requires smaller key sizes and, thus, less demanding cryptographic operations. Until now, however, no such implementation has been proposed in the SCADA literature, to the best of our knowledge. In order to fill this gap, our methodology was focused on integrating Modbus, a frequently used SCADA communication protocol, with Elliptic Curve based cryptography and develop a server/client application to demonstrate the proof of concept. For the implementation we deployed two C language libraries, which were suitably modify in order to be successfully integrated: libmodbus (https://github.com/stephane/libmodbus) and ecc-lib https://www.ceid.upatras.gr/webpages/faculty/zaro/software/ecc-lib/). The first library provides a C implementation of the Modbus/TCP protocol while the second one offers the functionality to develop cryptographic protocols based on Elliptic Curve Cryptography. These two libraries were combined, after suitable modifications and enhancements, in order to give a modified version of the Modbus/TCP protocol focusing on the security of the data exchanged among the devices and the supervisory servers. The mechanisms we implemented include key generation, key exchange/sharing, message authentication, data integrity check, and encryption/decryption of data. The key generation and key exchange protocols were implemented with the use of Elliptic Curve Cryptography primitives. The keys established by each device are saved in their local memory and are retained during the whole communication session and are used in encrypting and decrypting exchanged messages as well as certifying entities and the integrity of the messages. Finally, the modified library was compiled for the Android environment in order to run the server application as an Android app. The client program runs on a regular computer. The communication between these two entities is an example of the successful establishment of an Elliptic Curve Cryptography based, secure Modbus wireless communication session between a portable device acting as a supervisor station and a monitoring computer. Our first performance measurements are, also, very promising and demonstrate the feasibility of embedding Elliptic Curve Cryptography into SCADA systems, filling in a gap in the relevant scientific literature.Keywords: elliptic curve cryptography, ICT security, modbus protocol, SCADA, TCP/IP protocol
Procedia PDF Downloads 27110324 Second Order Journalism: A Study of Selected Niche Authorities on Facebook and Twitter
Authors: Yvonne Dedzo
Abstract:
Social media has become a powerful tool in bridging the distance between individuals regardless of their location. It has become a convenient platform for public discussion and, consequently, generated the phenomenon of citizen journalists who have become both proactive and reactive participants in the dissemination of news, information and other epochal and historical events. This phenomenon has fueled the growth of niche authorities who deliver exceptional democratically consequential information online. This study, therefore, investigates how some selected niche authorities maintain their status on social media. Using the selective processes theory, the study further interrogates the information shared by niche authorities and further analyses the extent to which a public interest-altruistic motive or personal interest-self-serving motive drives their agenda of new sharing and usage. Through cyber-ethnography and, qualitative content analysis and semi-structured interviews, data was gathered and analysed from the posts of two purposely selected niche authorities on Facebook and Twitter. The findings indicate that niche authorities maintain their status by being consistent, prompt, informative, resourceful and interactive in their postings on the social media platform. The study also discovered that even though niche authorities are motivated by both public interest-altruism and interest-self-serving, the latter had a higher of motivation than the former.Keywords: social medida, citizen journalist, niche authorities, selective processes theory
Procedia PDF Downloads 6810323 Social Inequality and Inclusion Policies in India: Lessons Learned and the Way Forward
Authors: Usharani Rathinam
Abstract:
Although policies directing inclusion of marginalized were in effect, majority of chronically impoverished in India belonged to schedule caste and schedule tribes. Also, taking into account that poverty is gendered; destitute women belonged to lower social order whose need is not largely highlighted at policy level. This paper discusses on social relations poverty which highlights on how social order that existed structurally in the society can perpetuate chronic poverty, followed by a critical review on social inclusion policies of India, its merits and demerits in addressing chronic poverty. Multiple case study design is utilized to address this concern in four districts of India; Jhansi, Tikamgarh, Cuddalore and Anantapur. These four districts were selected by purposive sampling based on the criteria; the district should either be categorized as a backward district or should have a history of high poverty rate. Qualitative methods including eighty in-depth interviews, six focus group discussions, six social mapping procedures and three key informant interviews were conducted in 2011, at each of the locations. Analysis of the data revealed that irrespective of gender, schedule castes and schedule tribe participants were found to be chronically poor in all districts. Caste based discrimination is exhibited at both micro and macro levels; village and institutional levels. At village level, lower caste respondents had lesser access to public resources. Also, within institutional settings, due to confiscation, unequal access to resources is noticed, especially in fund distribution. This study found that half of the budget intended for schedule caste and schedule tribes were confiscated by upper caste administrative staffs. This implies that power based on social hierarchy marginalize lower caste participants from accessing better economic, social, and political benefits, that had led them to suffer long term poverty. This study also explored the traditional ties between caste, social structure and bonded labour as a cause of long-term poverty. Though equal access is being emphasized in constitutional rights, issues at micro level have not been reflected in formulation of these rights. Therefore, it is significant for a policy to consider the structural complexity and then focus on issues such as equal distribution of assets and infrastructural facilities that will reduce exclusion and foster long-term security in areas such as employment, markets and public distribution.Keywords: caste, inclusion policies, India, social order
Procedia PDF Downloads 20610322 Investigating Nurses’ Burnout Experiences on TikTok
Authors: Claire Song
Abstract:
Background: TikTok is an emerging social media platform creating an outlet for nurses to express and communicate their nursing experiences and stress related to nursing. Purpose: This study investigates the lived experiences of nursing burnout shared on TikTok. Method: The cross-sectional content analysis examines the video content, format, type, and quantitative indicators, including the number of likes and comments. Results: A total of 35 videos and 18616 comments were examined, published between November 2020 and May 2023. Combined, these 35 videos received 24859 comments and 1159669 of likes. Most of the videos included nurses, and 12 included nurses in professional attire. Three videos included interviewers in the video, but the rest of the videos were self-recorded. Four themes of nurses’ burnout experiences were identified: 1) high-intensity work environment, 2) negative internal perception, 3) culture of nursing work, and 4) poor teamwork experience. Conclusion: This study explored the description of nurses’ burnout experiences via a creative platform. Social media, such as TikTok, is a valuable outlet for healthcare providers to express and share their experiences. Future research might consider using the social media platform to explore coping strategies and resilience in nurses who experienced burnout.Keywords: burnout, emotional wellbeing, nursing, social media
Procedia PDF Downloads 8610321 Exploring Social Emotional Learning in Diverse Academic Settings
Authors: Regina Rahimi, Delores Liston
Abstract:
The advent of COVID-19 has heightened awareness of the need for social emotional learning (SEL) throughout all educational contexts. Given this, schools (most often p12 settings) have begun to embrace practices for addressing social-emotional learning. While there is a growing body of research and literature on common practices of SEL, there is no ‘standard’ for its implementation. Our work proposed here recognizes there is no universal approach for addressing SEL and rather, seeks to explore how SEL can be approached in and through diverse contexts. We assert that left unrecognized and unaddressed by teachers, issues with social and emotional well-being profoundly negatively affect students’ academic performance and exacerbate teacher stress. They contribute to negative student-teacher relationships, poor classroom management outcomes, and compromised academic outcomes. Therefore, teachers and administrators have increasingly turned to developing pedagogical and classroom practices that support the social and emotional dimensions of students. Substantive quantitative evidence indicates professional development training to improve awareness and foster positive teacher-student relationships can provide a protective function for psycho-social outcomes and a promotive factor for improved learning outcomes for students. Our work aims to add to the growing body of literature on improving student well-being by providing a unique examination of SEL through a lens of diverse contexts. Methodology: This presentation hopes to present findings from an edited volume that will seek to highlight works that examine SEL practices in a variety of academic settings. The studies contained within the work represent varied forms of qualitative research. Conclusion: This work provides examples of SEL in higher education/postsecondary settings, a variety of P12 academic settings (public; private; rural, urban; charter, etc.), and international contexts. This work demonstrates the variety of ways educational institutions and educators have used SEL to address the needs of students, providing examples for others to adapt to their own diverse contexts. This presentation will bring together exemplar models of SEL in diverse practice settings.Keywords: social emotional learning, teachers, classrooms, diversity
Procedia PDF Downloads 6310320 Implementing Pro-Poor Policies for Poverty Alleviation: The Case of the White Paper on Families in South Africa
Authors: P. Mbecke
Abstract:
The role of the government to tangibly alleviate poverty, improve and sustain the quality of people’s lives remains a “work in progress” twenty-two years after the dawn of democracy in South Africa despite a host of socio-economic programs and pro-poor policies and legislations. This paper assesses the development process and the implementation of the White Paper on Families in South Africa as one of the pro-poor policies intended to curb poverty and redress the imbalances of the apartheid regime. The paper is the result of a qualitative implementation research theory facilitated through in-depth interviews with social work managers complemented by literature and policy review techniques. It investigates the level of basic knowledge and understanding as well as the implementation challenges of the White Paper on Families as causes of its failure. The paper emphasizes the importance of the family-centered approach in the implementation of pro-poor policies. To facilitate the understanding of the White Paper on Families by its users, the Department of Social Development needs take stock of the identified challenges of its implementation so as to facilitate its success in fostering positive family well-being that will directly contributes to the overall socio-economic development of South Africa.Keywords: poverty alleviation, pro-poor policy, social development, social welfare, South Africa
Procedia PDF Downloads 35110319 Academic Influence of Social Network Sites on the Collegiate Performance of Technical College Students
Authors: Jameson McFarlane, Thorne J. McFarlane, Leon Bernard
Abstract:
Social network sites (SNS) is an emerging phenomenon that is here to stay. The popularity and the ubiquity of the SNS technology are undeniable. Because most SNS are free and easy to use people from all walks of life and from almost any age are attracted to that technology. College age students are by far the largest segment of the population using SNS. Since most SNS have been adapted for mobile devices, not only do you find students using this technology in their study, while working on labs or on projects, a substantial number of students have been found to use SNS even while listening to lectures. This study found that SNS use has a significant negative impact on the grade point average of college students particularly in the first semester. However, this negative impact is greatly diminished by the end of the third semester partly because the students have adjusted satisfactorily to the challenges of college or because they have learned how to adequately manage their time. It was established that the kinds of activities the students are engaged in during the SNS use are the leading factor affecting academic performance. Of those activities, using SNS during a lecture or while studying is the foremost contributing factor to lower academic performance. This is due to “cognitive” or “information” bottleneck, a condition in which the students find it very difficult to multitask or to switch between resources leading to inefficiency in information retention and thus, educational performance.Keywords: social network sites, social network analysis, regression coefficient, psychological engagement
Procedia PDF Downloads 17910318 Content Analysis of Depictions of Terrorism in U.S. Major Motion Pictures: A Social Constructionist Perspective
Authors: Raleigh Blasdell, Amanda M. Sharp Parker, Lauren Waldrop, Brigid Toney
Abstract:
It has been demonstrated that fictional media sources have persuasive effects on public beliefs; this study contributes to the social constructionist literature by conducting a content analysis of U.S. major motion pictures involving terrorism. Using the Unified Film Population Sampling Methodology, the top-grossing films were identified to examine the frequency and context of several constructs of terrorism, including terrorist demographics, type of terrorism, country of origin, organizational affiliation, crime typology, and victim demographics. Comparisons of these constructs, as depicted in the films, were then made with the extant academic literature on terrorism. The data provide notable information regarding the representation of terrorism by the film industry, as well the discrepancies between the scholarly literature and depictions in popular films. The results indicate vast differences between fiction and reality, emphasizing a 'Middle Eastern Islamic male' terrorist stereotype. Using the theoretical foundation of social constructionism, the findings provide insight into how inaccurate depictions in film can influence society’s beliefs about terrorism and terrorists, which subsequently can translate into public support for legislation and policies that are often fueled by misinformation.Keywords: film, media, social constructionism, terrorism
Procedia PDF Downloads 16910317 A Model Based Metaheuristic for Hybrid Hierarchical Community Structure in Social Networks
Authors: Radhia Toujani, Jalel Akaichi
Abstract:
In recent years, the study of community detection in social networks has received great attention. The hierarchical structure of the network leads to the emergence of the convergence to a locally optimal community structure. In this paper, we aim to avoid this local optimum in the introduced hybrid hierarchical method. To achieve this purpose, we present an objective function where we incorporate the value of structural and semantic similarity based modularity and a metaheuristic namely bees colonies algorithm to optimize our objective function on both hierarchical level divisive and agglomerative. In order to assess the efficiency and the accuracy of the introduced hybrid bee colony model, we perform an extensive experimental evaluation on both synthetic and real networks.Keywords: social network, community detection, agglomerative hierarchical clustering, divisive hierarchical clustering, similarity, modularity, metaheuristic, bee colony
Procedia PDF Downloads 37910316 Progress of Research on Community Canteens and Reflections on Planning in China
Authors: Xi Zuo
Abstract:
Against the background of the aging population and changing family structure in China, community canteens have become an important vehicle for community-based home care services and a new space for social interaction. In this paper, we review past studies and the actual construction situation in China, firstly sort out the social interaction of the elderly and the types of places, and on this basis, we find that there is an obvious disconnection between the current construction and the academic research, and the contradiction between social benefit and cost-effectiveness, and therefore we put forward the relevant construction planning and thinking, in order to provide a disciplinary basis and academic support for the construction of community canteens and the construction of elderly-friendly cities. In order to provide disciplinary basis and academic support for the construction of community canteens and the construction of senior-friendly cities.Keywords: urban and rural planning, community canteens, elderly people, senior-friendly
Procedia PDF Downloads 6210315 Maritime English Communication Training for Japanese VTS Operators in the Congested Area Including the Narrow Channel of Akashi Strait
Authors: Kenji Tanaka, Kazumi Sugita, Yuto Mizushima
Abstract:
This paper introduces a noteworthy form of English communication training for the officers and operators of the Osaka-Bay Marine Traffic Information Service (Osaka MARTIS) of the Japan Coast Guard working in the congested area at the Akashi Strait in Hyogo Prefecture, Japan. The authors of this paper, Marine Technical College’s (MTC) English language instructors, have been holding about forty lectures and exercises in basic and normal Maritime English (ME) for several groups of MARTIS personnel at Osaka MARTIS annually since they started the training in 2005. Trainees are expected to be qualified Maritime Third-Class Radio Operators who are responsible for providing safety information to a daily average of seven to eight hundred vessels that pass through the Akashi Strait, one of Japan’s narrowest channels. As of 2022, the instructors are conducting 55 remote lessons at MARTIS. One lesson is 90 minutes long. All 26 trainees are given oral and written assessments. The trainees need to pass the examination to become qualified operators every year, requiring them to train and maintain their linguistic levels even during the pandemic of Corona Virus Disease-19 (COVID-19). The vessel traffic information provided by Osaka MARTIS in Maritime English language is essential to the work involving the use of very high frequency (VHF) communication between MARTIS and vessels in the area. ME is the common language mainly used on board merchant, fishing, and recreational vessels, normally at sea. ME was edited and recommended by the International Maritime Organization in the 1970s, was revised in 2002, and has undergone continual revision. The vessel’s circumstances are much more serious at the strait than those at the open sea, so these vessels need ME to receive guidance from the center when passing through the narrow strait. The imminent and challenging situations at the strait necessitate that textbooks’ contents include the basics of the phrase book for seafarers as well as specific and additional navigational information, pronunciation exercises, notes on keywords and phrases, explanations about collocations, sample sentences, and explanations about the differences between synonyms especially those focusing on terminologies necessary for passing through the strait. Additionally, short Japanese-English translation quizzes about these topics, as well as prescribed readings about the maritime sector, are include in the textbook. All of these exercises have been trained in the remote education system since the outbreak of COVID-19. According to the guidelines of ME edited in 2009, the lowest level necessary for seafarers is B1 (lower individual users) of The Common European Framework of Reference for Languages: Learning, Teaching, Assessment (CEFR). Therefore, this vocational ME language training at Osaka MARTIS aims for its trainees to communicate at levels higher than B1. A noteworthy proof of improvement from this training is that most of the trainees have become qualified marine radio communication officers.Keywords: akashi strait, B1 of CEFR, maritime english communication training, osaka martis
Procedia PDF Downloads 12410314 The Effect of Entertainment, Interactivity, and Authenticity Features of Tourism E-Commerce Live Streaming on Tourism Consumer’s Purchase Intention: The Mediating Role of Social Presence
Authors: Muhammad Munir, Moazzam, Attia Saddique, Muhammad Waheed
Abstract:
This study examines the complex interactions between entertainment, interaction, and authenticity aspects in the context of live streaming tourism e-commerce and how they affect tourists' intent to purchase. In the context of e-commerce live streaming, the goal of this study is to offer a thorough understanding of how these factors work together to influence consumers' intents to make purchases related to tourism. A sample of 250 respondents' information was gathered, and it was analyzed through Smart PLS 4. To ensure reliable measurement constructs, convergent and discriminant validity were evaluated. Discriminant validity was evaluated using the HTMT ratio approach, and the structural model was evaluated using structural equation modeling (SEM) with bootstrapping. Results showed that entertainment had a strong beneficial impact on social presence, highlighting the value of compelling content in raising users' sense of presence on live streaming platforms for tourism-related e-commerce. The lack of a direct relationship between Interactivity and Authenticity and Social Presence emphasizes the need for more research into certain characteristics of these dimensions that appeal to consumers in this situation.Keywords: entertainment, interactivity, authenticity, tourism consumer’s purchase intention, social presence
Procedia PDF Downloads 6410313 The Impact of Social Support on Anxiety and Depression under the Context of COVID-19 Pandemic: A Scoping Review and Meta-Analysis
Authors: Meng Wu, Atif Rahman, Eng Gee, Lim, Jeong Jin Yu, Rong Yan
Abstract:
Context: The COVID-19 pandemic has had a profound impact on mental health, with increased rates of anxiety and depression observed. Social support, a critical factor in mental well-being, has also undergone significant changes during the pandemic. This study aims to explore the relationship between social support, anxiety, and depression during COVID-19, taking into account various demographic and contextual factors. Research Aim: The main objective of this study is to conduct a comprehensive systematic review and meta-analysis to examine the impact of social support on anxiety and depression during the COVID-19 pandemic. The study aims to determine the consistency of these relationships across different age groups, occupations, regions, and research paradigms. Methodology: A scoping review and meta-analytic approach were employed in this study. A search was conducted across six databases from 2020 to 2022 to identify relevant studies. The selected studies were then subjected to random effects models, with pooled correlations (r and ρ) estimated. Homogeneity was assessed using Q and I² tests. Subgroup analyses were conducted to explore variations across different demographic and contextual factors. Findings: The meta-analysis of both cross-sectional and longitudinal studies revealed significant correlations between social support, anxiety, and depression during COVID-19. The pooled correlations (ρ) indicated a negative relationship between social support and anxiety (ρ = -0.30, 95% CI = [-0.333, -0.255]) as well as depression (ρ = -0.27, 95% CI = [-0.370, -0.281]). However, further investigation is required to validate these results across different age groups, occupations, and regions. Theoretical Importance: This study emphasizes the multifaceted role of social support in mental health during the COVID-19 pandemic. It highlights the need to reevaluate and expand our understanding of social support's impact on anxiety and depression. The findings contribute to the existing literature by shedding light on the associations and complexities involved in these relationships. Data Collection and Analysis Procedures: The data collection involved an extensive search across six databases to identify relevant studies. The selected studies were then subjected to rigorous analysis using random effects models and subgroup analyses. Pooled correlations were estimated, and homogeneity was assessed using Q and I² tests. Question Addressed: This study aimed to address the question of the impact of social support on anxiety and depression during the COVID-19 pandemic. It sought to determine the consistency of these relationships across different demographic and contextual factors. Conclusion: The findings of this study highlight the significant association between social support, anxiety, and depression during the COVID-19 pandemic. However, further research is needed to validate these findings across different age groups, occupations, and regions. The study emphasizes the need for a comprehensive understanding of social support's multifaceted role in mental health and the importance of considering various contextual and demographic factors in future investigations.Keywords: social support, anxiety, depression, COVID-19, meta-analysis
Procedia PDF Downloads 6210312 Using Social Network Analysis for Cyber Threat Intelligence
Authors: Vasileios Anastopoulos
Abstract:
Cyber threat intelligence assists organizations in understanding the threats they face and helps them make educated decisions on preparing their defenses. Sharing of threat intelligence and threat information is increasingly leveraged by organizations and enterprises, and various software solutions are already available, with the open-source malware information sharing platform (MISP) being a popular one. In this work, a methodology for the production of cyber threat intelligence using the threat information stored in MISP is proposed. The methodology leverages the discipline of social network analysis and the diamond model, a model used for intrusion analysis, to produce cyber threat intelligence. The workings are demonstrated with a case study on a production MISP instance of a real organization. The paper concluded with a discussion on the proposed methodology and possible directions for further research.Keywords: cyber threat intelligence, diamond model, malware information sharing platform, social network analysis
Procedia PDF Downloads 17810311 Effects of Position and Cut-Out Lengths on the Axial Crushing Behavior of Aluminum Tubes: Experimental and Simulation
Authors: B. Käfer, V. K. Bheemineni, H. Lammer, M. Kotnik, F. O. Riemelmoser
Abstract:
Axial compression tests are performed on circular tubes made of Aluminum EN AW 6060 (AlMgSi0.5 alloy) in T66 state. All the received tubes have the uniform outer diameter of 40mm and thickness of 1.5mm. Two different lengths 100mm and 200mm are used in the analysis. After performing compression tests on the uniform tube, important crashworthy parameters like peak force, average force, crush efficiency and energy absorption are measured. The present paper has given importance to increase the percentage of crush efficiency without decreasing the value energy absorption of a tube, so a circumferential notch was introduced on the top section of the tube. The effects of position and cut-out lengths of a circumferential notch on the crush efficiency are well explained with relative deformation modes and force-displacement curves. The numerical simulations were carried on the software tool ANSYS/LS-DYNA. It is seen that the numerical results are reasonably good in agreement with the experimental results.Keywords: crash box, Notch triggering, energy absorption, FEM simulation
Procedia PDF Downloads 46010310 Applying Different Stenography Techniques in Cloud Computing Technology to Improve Cloud Data Privacy and Security Issues
Authors: Muhammad Muhammad Suleiman
Abstract:
Cloud Computing is a versatile concept that refers to a service that allows users to outsource their data without having to worry about local storage issues. However, the most pressing issues to be addressed are maintaining a secure and reliable data repository rather than relying on untrustworthy service providers. In this study, we look at how stenography approaches and collaboration with Digital Watermarking can greatly improve the system's effectiveness and data security when used for Cloud Computing. The main requirement of such frameworks, where data is transferred or exchanged between servers and users, is safe data management in cloud environments. Steganography is the cloud is among the most effective methods for safe communication. Steganography is a method of writing coded messages in such a way that only the sender and recipient can safely interpret and display the information hidden in the communication channel. This study presents a new text steganography method for hiding a loaded hidden English text file in a cover English text file to ensure data protection in cloud computing. Data protection, data hiding capability, and time were all improved using the proposed technique.Keywords: cloud computing, steganography, information hiding, cloud storage, security
Procedia PDF Downloads 19210309 Enhancing Sustainability Awareness through Social Learning Experiences on Campuses
Authors: Rashika Sharma
Abstract:
The campuses at tertiary institutes can act as a social environment for peer to peer connections. However, socialization is not the only aspect that campuses provide. The campus can act as a learning environment that has often been termed as the campus curriculum. Many tertiary institutes have taken steps to make their campus a ‘green campus’ whereby initiatives have been taken to reduce their impact on the environment. However, as visible as these initiatives are, it is debatable whether these have any effect on students’ and their understanding of sustainable campus operations. Therefore, research was conducted to evaluate the effectiveness of sustainable campus operations in raising students’ awareness of sustainability. Students at two vocational institutes participated in this interpretive research with data collected through surveys and focus groups. The findings indicated that majority of vocational education students remained oblivious of sustainability initiatives on campuses.Keywords: campus learning, education for sustainability, social learning, vocational education
Procedia PDF Downloads 28310308 Investigating Flutter Energy Harvesting through Piezoelectric Materials in Both Experimental and Theoretical Modes
Authors: Hassan Mohammad Karimi, Ali Salehzade Nobari, Hosein Shahverdi
Abstract:
With the advancement of technology and the decreasing weight of aerial structures, there is a growing demand for alternative energy sources. Structural vibrations can now be utilized to power low-power sensors for monitoring structural health and charging small batteries in drones. Research on extracting energy from flutter using piezoelectric has been extensive in recent years. This article specifically examines the use of a single-jointed beam with a free surface attached to its free end and a bimorph piezoelectric patch connected to the joint, providing two degrees of torsional and bending freedom. The study investigates the voltage harvested at various wind speeds and bending and twisting stiffness in a wind tunnel. The results indicate that as flutter speed increases, the output voltage also increases to some extent. However, at high wind speeds, the limited cycle created becomes unstable, negatively impacting the harvester's performance. These findings align with other research published in reputable scientific journals.Keywords: energy harvesting, piezoelectric, flutter, wind tunnel
Procedia PDF Downloads 6510307 Identification of Failures Occurring on a System on Chip Exposed to a Neutron Beam for Safety Applications
Authors: S. Thomet, S. De-Paoli, F. Ghaffari, J. M. Daveau, P. Roche, O. Romain
Abstract:
In this paper, we present a hardware module dedicated to understanding the fail reason of a System on Chip (SoC) exposed to a particle beam. Impact of Single-Event Effects (SEE) on processor-based SoCs is a concern that has increased in the past decade, particularly for terrestrial applications with automotive safety increasing requirements, as well as consumer and industrial domains. The SEE created by the impact of a particle on an SoC may have consequences that can end to instability or crashes. Specific hardening techniques for hardware and software have been developed to make such systems more reliable. SoC is then qualified using cosmic ray Accelerated Soft-Error Rate (ASER) to ensure the Soft-Error Rate (SER) remains in mission profiles. Understanding where errors are occurring is another challenge because of the complexity of operations performed in an SoC. Common techniques to monitor an SoC running under a beam are based on non-intrusive debug, consisting of recording the program counter and doing some consistency checking on the fly. To detect and understand SEE, we have developed a module embedded within the SoC that provide support for recording probes, hardware watchpoints, and a memory mapped register bank dedicated to software usage. To identify CPU failure modes and the most important resources to probe, we have carried out a fault injection campaign on the RTL model of the SoC. Probes are placed on generic CPU registers and bus accesses. They highlight the propagation of errors and allow identifying the failure modes. Typical resulting errors are bit-flips in resources creating bad addresses, illegal instructions, longer than expected loops, or incorrect bus accesses. Although our module is processor agnostic, it has been interfaced to a RISC-V by probing some of the processor registers. Probes are then recorded in a ring buffer. Associated hardware watchpoints are allowing to do some control, such as start or stop event recording or halt the processor. Finally, the module is also providing a bank of registers where the firmware running on the SoC can log information. Typical usage is for operating system context switch recording. The module is connected to a dedicated debug bus and is interfaced to a remote controller via a debugger link. Thus, a remote controller can interact with the monitoring module without any intrusiveness on the SoC. Moreover, in case of CPU unresponsiveness, or system-bus stall, the recorded information can still be recovered, providing the fail reason. A preliminary version of the module has been integrated into a test chip currently being manufactured at ST in 28-nm FDSOI technology. The module has been triplicated to provide reliable information on the SoC behavior. As the primary application domain is automotive and safety, the efficiency of the module will be evaluated by exposing the test chip under a fast-neutron beam by the end of the year. In the meantime, it will be tested with alpha particles and electromagnetic fault injection (EMFI). We will report in the paper on fault-injection results as well as irradiation results.Keywords: fault injection, SoC fail reason, SoC soft error rate, terrestrial application
Procedia PDF Downloads 22910306 Health Satisfaction and Family Impact of Parents of Children with Cancer
Authors: Ekhlas Al Gamal, Tony Long
Abstract:
The impact on the parents of caring for a child with cancer was intense and wide-ranging. A high level of distress and low level or resilience remains during treatment. Even completion of treatment can be a time of increased anxiety and stress for parents particularly with worries about recurrence or relapse. The purpose of this study to examine the associations between parental satisfactions with healthcare provided for their child and the impact of being a caregiver for a child with cancer. Methodology: A descriptive, correlational and cross-sectional design was employed using data from Arabic versions of self-report questionnaires which were administered to 113 parents with children with cancer in Jordan during 2015. Findings: the result indicated that Family relationship functioning was ranked as the highest (better functioning) domain while daily activities were ranked as the lowest (poorer functioning) domain. Parents were generally satisfied with the health care provided, but their emotional needs were not met adequately. Parents with better social functioning were more satisfied in all areas of healthcare satisfaction other than emotional needs and communication. Parents who had a child with more emotional and behavioural problems were more likely to experience a negative impact on the family and a poor level of family functioning. Conclusion and Significance: Nurses and other health care providers should emphasis on family centred approach rather than child centred approach.Keywords: parents, children, cancer, Jordan
Procedia PDF Downloads 34010305 Schooling Competent Citizens: A Normative Analysis of Citizenship Education Policy in Europe
Authors: M. Joris, O. Agirdag
Abstract:
For over two decades, calls for citizenship education (CE) have been rising to the top of educational policy agendas in Europe. The main motive for the current treatment of CE as a key topic is a sense of crisis: social and political threats that go beyond the reach of nations and require action at the international and European level. On the one hand, this context has triggered abundant attention to the promotion of citizenship through education. On the other hand, the ubiquity of citizenship and education in policy language is paired with a self-evident manner of using the concepts: the more we call for citizenship in and through education, the less the concepts seem to be made explicit or be defined. Research and reflection on the normativity of the concepts of citizenship and CE in Europe are scarce. Departing from the idea that policies are always normative, this study, therefore, investigates the normativity of the current concepts of citizenship and education, in ’key’ European CE policy texts. The study consists of a content analysis of these texts, based on a normative framework developed around the different dimensions of citizenship as status, identity, virtues and agency. The framework also describes the purposes of education and its learning processes, content and practices, based on the assumption that good education always includes, next to qualification and socialisation, a purpose of emancipation: of helping young people become autonomous and independent subjects. The analysis shows how contemporary European citizenship is conceptualised around the dimension of competences. This focus on competences is also visible in the normative framing of education and its relationship to citizenship in the texts: CE should help young people learn how to become good citizens by acquiring a toolkit of competences, consisting of knowledge, skills, values and attitudes that can be predetermined, measured and evaluated. This ideal of citizenship-as-competence entails a focus on the educational purposes of socialisation and qualification. Current policy texts thus seem to leave out the educational purpose of emancipating young people, allowing them to take on citizenship as something to which they can determine their own relation and position. It is, however, this purpose of CE that seems increasingly important in our current context. Young people are stepping out of school and onto the streets by the thousands in Belgium and throughout Europe, protesting for more and better environmental policies. They are making use of existing modes of citizenship, exactly to indicate to policymakers how these are falling short and are claiming their right and entitlement to a future that established practices of politics are putting at risk. The importance of citizenship education might then lie, now more than ever, not in the fact that it would prepare young people for competent citizenship, but in offering them a possibility, an emancipatory experience of being able to do something new. It seems that this is what we might want to expect from the school if we want it to educate our truly future citizens.Keywords: citizenship education, normativity, policy, purposes of education
Procedia PDF Downloads 13410304 Reclaiming Corporate Social Responsibility: A Research Agenda for Socio-Industrial Interdependence
Authors: Leah Ritchie
Abstract:
By many accounts, the most recent economic recession and subsequent lack-luster recovery has demonstrated that corporate social responsibility is in a state of crisis. This crisis represents an opportunity for CSR scholars to play a role in restoring long-term economic growth and consumer confidence. In its current state however, CSR may not be in a position to facilitate positive change. In an attempt to remain relevant, the field has shifted toward a performance-based agenda that demonstrates in practical terms, how CSR can positively affect the financial and strategic performance of the firm. This paper argues that if CSR is to play a central role in helping to create a more equitable balance of power between industry and society, it must demonstrate the symbiotic nature of the relationship between these two entities, not just in terms of compartmentalized strategic and financial gain for the firm, but also toward maintaining a 'do no harm' imperative. Given the evidence that harm done to society is ultimately turned back on the firm, this is not simply a moralistic imperative. In order to affect change, CSR must also create an activist agenda to raise consciousness among the general citizenry toward mobilizing, uncovering, and repairing breeches in the implicit social contract between business and society.Keywords: corporate social responsibility, multiple stakeholder view, economic recession, housing crisis
Procedia PDF Downloads 214