Search results for: message framing
183 Decreasing Non-Compliance with the Garbage Collection Fee Payment: A Case Study from the Intervention in a Municipality in the Slovak Republic
Authors: Anetta Caplanova, Eva Sirakovova, Estera Szakadatova
Abstract:
Non-payment of taxes and fees represents a problem, which occurs at national and local government levels in many countries. An effective tax collection is key for generating government and local government budget revenues to finance public services and infrastructure; thus, there is the need to address this problem. The standard approach considers as a solution raising taxes/fees to boost public revenues, which may be politically challenging and time-consuming to implement. An alternative approach is related to using behavioral interventions. These can be usually implemented relatively quickly, and in most cases, they are associated with low cost. In the paper, we present the results of the behavioral experiment focused on raising the level of compliance with the payment of garbage collection fees in a selected municipality in the Slovak Republic. The experiment was implemented using the leaflets sent to residential households together with the invoice for the garbage collection in the municipality Hlohovec, Western Slovakia, in Spring 2021. The sample of about 10000 households was divided into three random groups, a control group and two intervention groups. Households in intervention group 1 were sent a leaflet using the social norm nudge, while households in intervention group 2 were sent a leaflet using the deterrence nudge. The social norm framing leaflet pointed out that in the municipality, the prevailing majority of people paid the garbage collection fee and encouraged recipients to join this majority. The deterrent leaflet reminded the recipients that if they did not pay the fee on time, enforcement proceedings would follow. This was aimed to increase the subjective perception of citizens of the enforcement proceedings in case of noncompliance. In the paper, we present and discuss the results from the experiment and formulate relevant generalizations for other municipalities.Keywords: municipal governments, garbage fee collection, behavioural intervention, social norm, deterrence nudge
Procedia PDF Downloads 192182 The Impact of Political Satire on the Balance of Political Powers in Egypt: The Case of El-Bernameg in Egypt
Authors: Sally Barsoum
Abstract:
This paper is providing a significant insight into the role of satire in Egyptian politics and how it has been received from the government and viewer’s point of view. It mainly sets out to test whether Bassem Youssef’s satirical program has played a significant role in Egypt recent politics and to investigate what is the nature and extent of this role. In order to test this hypothesis, the researcher chose to critically analyze one episode of Bassem Youssef’s satirical show, El Bernameg. This paper goes further to highlight that the aims of satire is to invite citizens to analyze, criticize and question people in power and the realm of politics rather than remain as untouched subjects by combining humor with critique in order to enhance citizens’ political awareness and perhaps even political engagement. Moreover it identifies that Bassem Youssef’s satire is to use laughter as a medium to communicate his political message. By first informing the public and secondly engaging them through laughter, satire plays a very constructive political role, which have been argued finally that Bassem Youssef has indeed played an important part in the Egyptian political scene of today and this can be measured by the degree of censorship that he has been subject to and the level of international and domestic reaction towards his satirical show. At the end, this paper is suggesting that the measure of a strong government is its ability not only to accommodate satire but also to learn from it.Keywords: political satirist, Bassem Youssef, capital broadcasting center, TV channel, muslims brotherhood regime, ONTV Egyptian TV channel
Procedia PDF Downloads 323181 A Survey of Feature-Based Steganalysis for JPEG Images
Authors: Syeda Mainaaz Unnisa, Deepa Suresh
Abstract:
Due to the increase in usage of public domain channels, such as the internet, and communication technology, there is a concern about the protection of intellectual property and security threats. This interest has led to growth in researching and implementing techniques for information hiding. Steganography is the art and science of hiding information in a private manner such that its existence cannot be recognized. Communication using steganographic techniques makes not only the secret message but also the presence of hidden communication, invisible. Steganalysis is the art of detecting the presence of this hidden communication. Parallel to steganography, steganalysis is also gaining prominence, since the detection of hidden messages can prevent catastrophic security incidents from occurring. Steganalysis can also be incredibly helpful in identifying and revealing holes with the current steganographic techniques, which makes them vulnerable to attacks. Through the formulation of new effective steganalysis methods, further research to improve the resistance of tested steganography techniques can be developed. Feature-based steganalysis method for JPEG images calculates the features of an image using the L1 norm of the difference between a stego image and the calibrated version of the image. This calibration can help retrieve some of the parameters of the cover image, revealing the variations between the cover and stego image and enabling a more accurate detection. Applying this method to various steganographic schemes, experimental results were compared and evaluated to derive conclusions and principles for more protected JPEG steganography.Keywords: cover image, feature-based steganalysis, information hiding, steganalysis, steganography
Procedia PDF Downloads 217180 A Highly Efficient Broadcast Algorithm for Computer Networks
Authors: Ganesh Nandakumaran, Mehmet Karaata
Abstract:
A wave is a distributed execution, often made up of a broadcast phase followed by a feedback phase, requiring the participation of all the system processes before a particular event called decision is taken. Wave algorithms with one initiator such as the 1-wave algorithm have been shown to be very efficient for broadcasting messages in tree networks. Extensions of this algorithm broadcasting a sequence of waves using a single initiator have been implemented in algorithms such as the m-wave algorithm. However as the network size increases, having a single initiator adversely affects the message delivery times to nodes further away from the initiator. As a remedy, broadcast waves can be allowed to be initiated by multiple initiator nodes distributed across the network to reduce the completion time of broadcasts. These waves initiated by one or more initiator processes form a collection of waves covering the entire network. Solutions to global-snapshots, distributed broadcast and various synchronization problems can be solved efficiently using waves with multiple concurrent initiators. In this paper, we propose the first stabilizing multi-wave sequence algorithm implementing waves started by multiple initiator processes such that every process in the network receives at least one sequence of broadcasts. Due to being stabilizing, the proposed algorithm can withstand transient faults and do not require initialization. We view a fault as a transient fault if it perturbs the configuration of the system but not its program.Keywords: distributed computing, multi-node broadcast, propagation of information with feedback and cleaning (PFC), stabilization, wave algorithms
Procedia PDF Downloads 505179 Chilean Business Orientalism: The Role of Non-State Actors in the Frame of Asymmetric Bilateral Relations
Authors: Pablo Ampuero, Claudia Labarca
Abstract:
The current research paper assesses how the narrative of Chilean businesspeople about China shapes a new Orientalism Analyses on the role of non-state actors in foreign policy that have hitherto theorized about Orientalism as a narrative of hegemonic power. Hence, it has been instrumental to the efforts of imperialist powers to justify their mission civilisatrice. However, such conceptualization can seldom explain new complexities of international interactions at the height of globalization. Hence, we assessed the case of Chile, a small Latin American country, and its relationship with China, its largest trading partner. Through a discourse analysis of interviews with Chilean businesspeople engaged in the Chinese market, we could determine that Chile is building an Orientalist image of China. This new business Orientalism reinforces a relation of alterity based on commercial opportunities, traditional values, and natural dispositions. Hence, the perception of the Chinese Other amongst Chilean business people frames a new set of representations as part of the essentially commercial nature of current bilateral relations. It differs from previous frames, such as the racial bias frame of the early 20th century, or the anti-communist frame in reaction to Mao’s leadership. As in every narrative of alterity, there is not only a construction of the Other but also a definition of the Self. Consequently, this analysis constitutes a relevant case of the role of non-state actors in asymmetrical bilateral relations, where the non-state actors of the minor power build and act upon an Orientalist frame, which is not representative of its national status in the relation. This study emerges as a contribution on the relation amongst non-state actors in asymmetrical relations, where the smaller power’s business class acts on a negative prejudice of its interactions with its counterpart. The research builds upon the constructivist approach to international relations, linking the idea of Nation Branding with Orientalism in the case of Chile-China relations.Keywords: new business Orientalism, small power, framing, Chile-China relations
Procedia PDF Downloads 329178 Impact of Social Media in Shaping Perceptions on Filipino Muslim Identity
Authors: Anna Rhodora A. Solar, Jan Emil N. Langomez
Abstract:
Social Media plays a crucial role in influencing Philippine public opinion with regard to a variety of socio-political issues. This became evident in the massacre of 44 members of the Special Action Force (SAF 44) tasked by the Philippine government to capture one of the US Federal Bureau of Investigation’s most wanted terrorists. The incident was said to be perpetrated by members of the Moro Islamic Liberation Front and the Bangsamoro Islamic Freedom Fighters. Part of the online discourse within Philippine cyberspace sparked intense debates on Filipino Muslim identity, with several Facebook viral posts linking Islam as a factor to the tragic event. Facebook is considered to be the most popular social media platform in the Philippines. As such, this begs the question of the extent to which social media, specifically Facebook, shape the perceptions of Filipinos on Filipino Muslims. This study utilizes Habermas’ theory of communicative action as it offers an explanation on how public sphere such as social media could be a network for communicating information and points of view through free and open dialogue among equal citizens to come to an understanding or common perception. However, the paper argues that communicative action which is aimed at reaching understanding free from force, and strategic action which is aimed at convincing someone through argumentation may not necessarily be mutually exclusive since reaching an understanding can also be considered as a result of convincing someone through argumentation. Moreover, actors may clash one another in their ideas before reaching common understanding, hence the presence of force. Utilizing content analysis on the Facebook posts with Islamic component that went viral after the massacre of the SAF 44, this paper argues that framing the image of Filipino Muslims through Facebook reflects both communicative and strategic actions. Moreover, comment threads on viral posts manifest force albeit implicit.Keywords: communication, Muslim, Philippines, social media
Procedia PDF Downloads 404177 Cultural-Creative Design with Language Figures of Speech
Authors: Wei Chen Chang, Ming Yu Hsiao
Abstract:
The commodity takes one kind of mark, the designer how to construction and interpretation the user how to use the process and effectively convey message in design education has always been an important issue. Cultural-creative design refers to signifying cultural heritage for product design. In terms of Peirce’s Semiotic Triangle: signifying elements-object-interpretant, signifying elements are the outcomes of design, the object is cultural heritage, and the interpretant is the positioning and description of product design. How to elaborate the positioning, design, and development of a product is a narrative issue of the interpretant, and how to shape the signifying elements of a product by modifying and adapting styles is a rhetoric matter. This study investigated the rhetoric of elements signifying products to develop a rhetoric model with cultural style. Figures of speech are a rhetoric method in narrative. By adapting figures of speech to the interpretant, this study developed the rhetoric context of cultural context by narrative means. In this two-phase study, phase I defines figures of speech and phase II analyzes existing cultural-creative products in terms of figures of speech to develop a rhetoric of style model. We expect it can reference for the future development of Cultural-creative design.Keywords: cultural-creative design, cultural-creative products, figures of speech, Peirce’s semiotic triangle, rhetoric of style model
Procedia PDF Downloads 373176 A Hygrothermal Analysis and Structural Performance of Wood-Frame Wall Systems with Low-Permeance Exterior Insulation
Authors: Marko Spasojevic, Ying Hei Chui, Yuxiang Chen
Abstract:
Increasing the level of exterior insulation in residential buildings is a popular way for improving the thermal characteristic of building enclosure and reducing heat loss. However, the layout and properties of materials composing the wall have a great effect on moisture accumulation within the wall cavity, long-term durability of a wall as well as the structural performance. A one-dimensional hygrothermal modeling has been performed to investigate moisture condensation risks and the drying capacity of standard 2×4 and 2×6 light wood-frame wall assemblies including exterior low-permeance extruded polystyrene (XPS) insulation. The analysis considered two different wall configurations whereby the rigid insulation board was placed either between Oriented Strand Board (OSB) sheathing and the stud or outboard to the structural sheathing. The thickness of the insulation varied between 0 mm and 50 mm and the analysis has been conducted for eight different locations in Canada, covering climate zone 4 through zone 8. Results show that the wall configuration with low-permeance insulation inserted between the stud and OSB sheathing accumulates more moisture within the stud cavity, compared to the assembly with the same insulation placed exterior to the sheathing. On the other hand, OSB moisture contents of the latter configuration were markedly higher. Consequently, the analysis of hygrothermal performance investigated and compared moisture accumulation in both the OSB and stud cavity. To investigate the structural performance of the wall and the effect of soft insulation layer inserted between the sheathing and framing, forty nail connection specimens were tested. Results have shown that both the connection strength and stiffness experience a significant reduction as the insulation thickness increases. These results will be compared with results from a full-scale shear wall tests in order to investigate if the capacity of shear walls with insulated sheathing would experience a similar reduction in structural capacities.Keywords: hygrothermal analysis, insulated sheathing, moisture performance, nail joints, wood shear wall
Procedia PDF Downloads 128175 Beer Brand Commercials and Gender Representation in Nigeria: Contextualization's of Selected Television and YouTube Visuals of the 2010s and 2020s
Authors: Theresa Belema Chris-Biriowu
Abstract:
The change in trends in relation to gender representation in beer brand commercials was the thrust of the study. The study investigated how beer brand commercials reflect societal realities in their portrayals of gender roles within the span of a decade. The major objective of the study was to find out how gender was contextualized in selected beer brand commercials that both air on Nigerian television and stream on YouTube. The study was anchored on the muted group theory. The population of the study was in two streams: the total number of beer beverages that are produced by the eleven breweries in Nigeria and the registered advertising agencies in Lagos, Nigeria. The sample size was also two-pronged: the purposive selection of beer brands that have their commercials on television and YouTube and the purposive selection of an ad agency that has produced running commercials for beer brands within the period between 2010s and 2020s. They adopted visual framing analysis and narrative analysis research techniques. The study qualitatively analyzed the contents of beer brand commercials and conducted an interview with the management of the ad agency for data collection. The data was presented in images and words. The findings showed that females are underrepresented and misrepresented in the beer brand commercials and that the beer brands are not producing commercials that adequately reflect the realities of present times. It was also found that very little has changed in the ad industry between the periods studied, and commercial screenplays are not written with a specific aim to either target the female demographics or give them equal opportunities to thrive in the beer economy. The study concluded that the gender gap in beer commercials subsists and translates to gender discrimination, especially since it is established that females are also stakeholders in the beer economy. The study recommends that beer brands should produce commercials that appeal to their audience irrespective of gender, reflect contemporary realities, and give all genders equal opportunities to thrive in the increasingly competitive industry.Keywords: beer brands, commercials, gender representation, visuals, television, YouTube
Procedia PDF Downloads 39174 A Location-based Authentication and Key Management Scheme for Border Surveillance Wireless Sensor Networks
Authors: Walid Abdallah, Noureddine Boudriga
Abstract:
Wireless sensor networks have shown their effectiveness in the deployment of many critical applications especially in the military domain. Border surveillance is one of these applications where a set of wireless sensors are deployed along a country border line to detect illegal intrusion attempts to the national territory and report this to a control center to undergo the necessary measures. Regarding its nature, this wireless sensor network can be the target of many security attacks trying to compromise its normal operation. Particularly, in this application the deployment and location of sensor nodes are of great importance for detecting and tracking intruders. This paper proposes a location-based authentication and key distribution mechanism to secure wireless sensor networks intended for border surveillance where the key establishment is performed using elliptic curve cryptography and identity-based public key scheme. In this scheme, the public key of each sensor node will be authenticated by keys that depend on its position in the monitored area. Before establishing a pairwise key between two nodes, each one of them must verify the neighborhood location of the other node using a message authentication code (MAC) calculated on the corresponding public key and keys derived from encrypted beacon messages broadcast by anchor nodes. We show that our proposed public key authentication and key distribution scheme is more resilient to node capture and node replication attacks than currently available schemes. Also, the achievement of the key distribution between nodes in our scheme generates less communication overhead and hence increases network performances.Keywords: wireless sensor networks, border surveillance, security, key distribution, location-based
Procedia PDF Downloads 661173 Language on Skin Whitening Products in Pakistan Promotes Unfair Beauty Standards: A Critical Discourse Analysis
Authors: Azeem Alphonce
Abstract:
In Pakistan, there is a variety of skin tones and colors across all provinces. However, a fair complexion is one of the standards of beauty among females in Pakistan, which creates insecurities in dark-complexioned females. This research is a critical discourse analysis of the language used on beauty products for females in Pakistan. The purpose was to analyze the language used on female beauty products using Van Dijk's three-stage socio-cognitive model to understand what message is received from the few words written and repeated across the packaging of various facial products, why such language is used and what are its wider socio-cognitive effects? The criterion for the selection of beauty products was skin whitening terminologies and the language used on these products. The results showed that over 57 per cent of products utilized skin-whitening terms. The adjectives written on the package indicate that fairer skin is the ultimate beauty goal of females. The analysis explored how the language reinforces unfair beauty standards and perpetuates colorism. It was concluded that female beauty products utilize discriminatory discourse by marginalizing individuals of darker skin tones. Fairer skin is promoted, whereas darker skin is referred to as a problem, flaw or imperfection. Socially shared mental models seem to have caused beauty companies to exploit and promote perceptions of colorism in society. Therefore, such discourse should be prevented, and beauty companies should utilize their discourse to promote acceptance of various skin tones.Keywords: language, skin whitening products, beauty standards, social mental models
Procedia PDF Downloads 73172 Aspects of the Promotional Language of Tourism in Social Media. A Case Study of Romanian Accommodation Industry
Authors: Sanda-Maria Ardeleanu, Ana Crăciunescu
Abstract:
This paper is sustained by our previous research on discursive strategies, whichdemonstrated that tourismhas developed and employed apromotional languageper se. We have studied this concept within the framework of audio-visual advertising by analyzing its discursive structures at the level of three main strategies (textual, visual, and both textual and visual) and confirmed the applicability of the promotional language per se within the field. Tourism, at large, represents a largely potential interdisplinary field, which allowed us to use qualitative methods of research such as Discourse Analysis (DA). Due to further research which showed that in the third phase of qualitative research methodologies, scholars in tourism recognized semiotics and DA as potential paths to follow, but which were insufficiently explored at the time, we soon realized that the natural next step to take is to bring together common qualitative methodologies for both fields, such as the method of observation, the triangulation, Discourse Analysis, etc. Therefore and in the light of fast transformations of the medium that intermediates the message, in this paper, we are going to focus on the manifestations of the promotional language in social media texts, which advertise for the urban industry of accommodation in Romania. We shall constitute a corpus of study as the basis for our research methodology and, through the empirical method of observation and DA, we propose to recognize or discover new patterns developed at textual (mainly) and visual level or the mix of the two, known as strategies of the promotional language of tourism.Keywords: discourse analysis, promotional language of tourism, social media, urban accommodation industry, tourism
Procedia PDF Downloads 167171 Quantum Inspired Security on a Mobile Phone
Authors: Yu Qin, Wanjiaman Li
Abstract:
The widespread use of mobile electronic devices increases the complexities of mobile security. This thesis aims to provide a secure communication environment for smartphone users. Some research proves that the one-time pad is one of the securest encryption methods, and that the key distribution problem can be solved by using the QKD (quantum key distribution). The objective of this project is to design an Android APP (application) to exchange several random keys between mobile phones. Inspired by QKD, the developed APP uses the quick response (QR) code as a carrier to dispatch large amounts of one-time keys. After evaluating the performance of APP, it allows the mobile phone to capture and decode 1800 bytes of random data in 600ms. The continuous scanning mode of APP is designed to improve the overall transmission performance and user experience, and the maximum transmission rate of this mode is around 2200 bytes/s. The omnidirectional readability and error correction capability of QR code gives it a better real-life application, and the features of adequate storage capacity and quick response optimize overall transmission efficiency. The security of this APP is guaranteed since QR code is exchanged face-to-face, eliminating the risk of being eavesdropped. Also, the id of QR code is the only message that would be transmitted through the whole communication. The experimental results show this project can achieve superior transmission performance, and the correlation between the transmission rate of the system and several parameters, such as the QR code size, has been analyzed. In addition, some existing technologies and the main findings in the context of the project are summarized and critically compared in detail.Keywords: one-time pad, QKD (quantum key distribution), QR code, application
Procedia PDF Downloads 146170 'Value-Based Re-Framing' in Identity-Based Conflicts: A Skill for Mediators in Multi-Cultural Societies
Authors: Hami-Ziniman Revital, Ashwall Rachelly
Abstract:
The conflict resolution realm has developed tremendously during the last half-decade. Three main approaches should be mentioned: an Alternative Dispute Resolution (ADR) suggesting processes such as Arbitration or Interests-based Negotiation was developed as an answer to obligations and rights-based conflicts. The Pragmatic mediation approach focuses on the gap between interests and needs of disputants. The Transformative mediation approach focusses on relations and suits identity-based conflicts. In the current study, we examine the conflictual relations between religious and non-religious Jews in Israel and the impact of three transformative mechanisms: Inter-group recognition, In-group empowerment and Value-based reframing on the relations between the participants. The research was conducted during four facilitated joint mediation classes. A unique finding was found. Using both transformative mechanisms and the Contact Hypothesis criteria, we identify transformation in participants’ relations and a considerable change from anger, alienation, and suspiciousness to an increased understanding, affection and interpersonal concern towards the out-group members. Intergroup Recognition, In-group empowerment, and Values-based reframing were the skills discovered as the main enablers of the change in the relations and the research participants’ fostered mutual recognition of the out-group values and identity-based issues. We conclude this transformation was possible due to a constant intergroup contact, based on the Contact Hypothesis criteria. In addition, as Interests-based mediation uses “Reframing” as a skill to acknowledge both mutual and opposite needs of the disputants, we suggest the use of “Value-based Reframing” in intergroup identity-based conflicts, as a skill contributes to the empowerment and the recognition of both mutual and different out-group values. We offer to implement those insights and skills to assist conflict resolution facilitators in various intergroup identity-based conflicts resolution efforts and to establish further research and knowledge.Keywords: empowerment, identity-based conflict, intergroup recognition, intergroup relations, mediation skills, multi-cultural society, reframing, value-based recognition
Procedia PDF Downloads 343169 The Effects of Negative Electronic Word-of-Mouth and Webcare on Thai Online Consumer Behavior
Authors: Pongsatorn Tantrabundit, Lersak Phothong, Ong-art Chanprasitchai
Abstract:
Due to the emergence of the Internet, it has extended the traditional Word-of-Mouth (WOM) to a new form called “Electronic Word-of-Mouth (eWOM).” Unlike traditional WOM, eWOM is able to present information in various ways by applying different components. Each eWOM component generates different effects on online consumer behavior. This research investigates the effects of Webcare (responding message) from product/ service providers on negative eWOM by applying two types of products (search and experience). The proposed conceptual model was developed based on the combination of the stages in consumer decision-making process, theory of reasoned action (TRA), theory of planned behavior (TPB), the technology acceptance model (TAM), the information integration theory and the elaboration likelihood model. The methodology techniques used in this study included multivariate analysis of variance (MANOVA) and multiple regression analysis. The results suggest that Webcare does slightly increase Thai online consumer’s perceptions on perceived eWOM trustworthiness, information diagnosticity and quality. For negative eWOM, we also found that perceived eWOM Trustworthiness, perceived eWOM diagnosticity and quality have a positive relationship with eWOM influence whereas perceived valence has a negative relationship with eWOM influence in Thai online consumers.Keywords: consumer behavior, electronic word-of-mouth, online review, online word-of-mouth, Thai online consumer, webcare
Procedia PDF Downloads 206168 Healthcare-SignNet: Advanced Video Classification for Medical Sign Language Recognition Using CNN and RNN Models
Authors: Chithra A. V., Somoshree Datta, Sandeep Nithyanandan
Abstract:
Sign Language Recognition (SLR) is the process of interpreting and translating sign language into spoken or written language using technological systems. It involves recognizing hand gestures, facial expressions, and body movements that makeup sign language communication. The primary goal of SLR is to facilitate communication between hearing- and speech-impaired communities and those who do not understand sign language. Due to the increased awareness and greater recognition of the rights and needs of the hearing- and speech-impaired community, sign language recognition has gained significant importance over the past 10 years. Technological advancements in the fields of Artificial Intelligence and Machine Learning have made it more practical and feasible to create accurate SLR systems. This paper presents a distinct approach to SLR by framing it as a video classification problem using Deep Learning (DL), whereby a combination of Convolutional Neural Networks (CNNs) and Recurrent Neural Networks (RNNs) has been used. This research targets the integration of sign language recognition into healthcare settings, aiming to improve communication between medical professionals and patients with hearing impairments. The spatial features from each video frame are extracted using a CNN, which captures essential elements such as hand shapes, movements, and facial expressions. These features are then fed into an RNN network that learns the temporal dependencies and patterns inherent in sign language sequences. The INCLUDE dataset has been enhanced with more videos from the healthcare domain and the model is evaluated on the same. Our model achieves 91% accuracy, representing state-of-the-art performance in this domain. The results highlight the effectiveness of treating SLR as a video classification task with the CNN-RNN architecture. This approach not only improves recognition accuracy but also offers a scalable solution for real-time SLR applications, significantly advancing the field of accessible communication technologies.Keywords: sign language recognition, deep learning, convolution neural network, recurrent neural network
Procedia PDF Downloads 30167 Transforming Data Science Curriculum Through Design Thinking
Authors: Samar Swaid
Abstract:
Today, corporates are moving toward the adoption of Design-Thinking techniques to develop products and services, putting their consumer as the heart of the development process. One of the leading companies in Design-Thinking, IDEO (Innovation, Design, Engineering Organization), defines Design-Thinking as an approach to problem-solving that relies on a set of multi-layered skills, processes, and mindsets that help people generate novel solutions to problems. Design thinking may result in new ideas, narratives, objects or systems. It is about redesigning systems, organizations, infrastructures, processes, and solutions in an innovative fashion based on the users' feedback. Tim Brown, president and CEO of IDEO, sees design thinking as a human-centered approach that draws from the designer's toolkit to integrate people's needs, innovative technologies, and business requirements. The application of design thinking has been witnessed to be the road to developing innovative applications, interactive systems, scientific software, healthcare application, and even to utilizing Design-Thinking to re-think business operations, as in the case of Airbnb. Recently, there has been a movement to apply design thinking to machine learning and artificial intelligence to ensure creating the "wow" effect on consumers. The Association of Computing Machinery task force on Data Science program states that" Data scientists should be able to implement and understand algorithms for data collection and analysis. They should understand the time and space considerations of algorithms. They should follow good design principles developing software, understanding the importance of those principles for testability and maintainability" However, this definition hides the user behind the machine who works on data preparation, algorithm selection and model interpretation. Thus, the Data Science program includes design thinking to ensure meeting the user demands, generating more usable machine learning tools, and developing ways of framing computational thinking. Here, describe the fundamentals of Design-Thinking and teaching modules for data science programs.Keywords: data science, design thinking, AI, currculum, transformation
Procedia PDF Downloads 82166 Divergences in Interpreters’ Oral Interpretation among Pentecostal Churches: Sermonic Reflections
Authors: Rufus Olufemi Adebayo, Sylvia Phiwani Zulu
Abstract:
Interpreting in the setting of diverse language and multicultural congregants, is often understood as integrating the content of the message. Preaching, similar to any communication, takes seriously people’s multiple contexts. The one who provides the best insight into understanding “the other”, traditionally speaking could be an interpreter in a multilingual context. Nonetheless, there are reflections in the loss of spiritual communication, translation and interpretive dialogue. No matter how eloquent the preacher is, an interpreter can make or mere the sermon (speech). The sermon that the preacher preaches is not always the one the congregation hears from the interpreter. In other occurrences, however, interpreting can lead not only to distort messages but also to dissatisfied audiences and preacher being overshadowed by the pranks of the interpreter. Using qualitative methodology, this paper explores the challenges and the conventional assumptions about preachers’ interpreter as influenced by spirituality, culture, and language in empirical and theoretical perspectives. An emphasis on the bias translation and the basis of reality that suppresses or devalues the spiritual communication is examined. The result indicates that interpretation of the declaration of guilt, history of congregation, spirituality, attitudes, morals, customs, specific practices of a preacher, education, and the environment form an entangled and misinterpretation. The article concludes by re-examining these qualities and rearticulating them into a preliminary theory for practice, as distinguished from theory, which could possibly enhance the development of more sustainable multilingual interpretation in the South African Pentecostal churches.Keywords: congregants, divergences, interpreting/translation, language & communication, sermon/preaching
Procedia PDF Downloads 166165 Mitigation of Interference in Satellite Communications Systems via a Cross-Layer Coding Technique
Authors: Mario A. Blanco, Nicholas Burkhardt
Abstract:
An important problem in satellite communication systems which operate in the Ka and EHF frequency bands consists of the overall degradation in link performance of mobile terminals due to various types of degradations in the link/channel, such as fading, blockage of the link to the satellite (especially in urban environments), intentional as well as other types of interference, etc. In this paper, we focus primarily on the interference problem, and we develop a very efficient and cost-effective solution based on the use of fountain codes. We first introduce a satellite communications (SATCOM) terminal uplink interference channel model that is classically used against communication systems that use spread-spectrum waveforms. We then consider the use of fountain codes, with focus on Raptor codes, as our main mitigation technique to combat the degradation in link/receiver performance due to the interference signal. The performance of the receiver is obtained in terms of average probability of bit and message error rate as a function of bit energy-to-noise density ratio, Eb/N0, and other parameters of interest, via a combination of analysis and computer simulations, and we show that the use of fountain codes is extremely effective in overcoming the effects of intentional interference on the performance of the receiver and associated communication links. We then show this technique can be extended to mitigate other types of SATCOM channel degradations, such as those caused by channel fading, shadowing, and hard-blockage of the uplink signal.Keywords: SATCOM, interference mitigation, fountain codes, turbo codes, cross-layer
Procedia PDF Downloads 362164 Thomas Kuhn, the Accidental Theologian: An Argument for the Similarity of Science and Religion
Authors: Dominic McGann
Abstract:
Applying Kuhn’s model of paradigm shifts in science to cases of doctrinal change in religion has been a common area of study in recent years. Few authors, however, have sought an explanation for the ease with which this model of theory change in science can be applied to cases of religious change. In order to provide such an explanation of this analytic phenomenon, this paper aims to answer one central question: Why is it that a theory that was intended to be used in an analysis of the history of science can be applied to something as disparate as the doctrinal history of religion with little to no modification? By way of answering this question, this paper begins with an explanation of Kuhn’s model and its applications in the field of religious studies. Following this, Massa’s recently proposed explanation for this phenomenon, and its notable flaws will be explained by way of framing the central proposal of this article, that the operative parts of scientific and religious changes function on the same fundamental concept of changes in understanding. Focusing its argument on this key concept, this paper seeks to illustrate its operation in cases of religious conversion and in Kuhn’s notion of the incommensurability of different scientific paradigms. The conjecture of this paper is that just as a Pagan-turned-Christian ceases to hear Thor’s hammer when they hear a clap of thunder, so too does a Ptolemaic-turned-Copernican-astronomer cease to see the Sun orbiting the Earth when they view a sunrise. In both cases, the agent in question has undergone a similar change in universal understanding, which provides us with a fundamental connection between changes in religion and changes in science. Following an exploration of this connection, this paper will consider the implications that such a connection has for the concept of the division between religion and science. This will, in turn, lead to the conclusion that religion and science are more alike than they are opposed with regards to the fundamental notion of understanding, thereby providing an answer to our central question. The major finding of this paper is that Kuhn’s model can be applied to religious cases so easily because changes in science and changes in religion operate on the same type of change in understanding. Therefore, in summary, science and religion share a crucial similarity and are not as disparate as they first appear.Keywords: Thomas Kuhn, science and religion, paradigm shifts, incommensurability, insight and understanding, philosophy of science, philosophy of religion
Procedia PDF Downloads 172163 An Approach to Secure Mobile Agent Communication in Multi-Agent Systems
Authors: Olumide Simeon Ogunnusi, Shukor Abd Razak, Michael Kolade Adu
Abstract:
Inter-agent communication manager facilitates communication among mobile agents via message passing mechanism. Until now, all Foundation for Intelligent Physical Agents (FIPA) compliant agent systems are capable of exchanging messages following the standard format of sending and receiving messages. Previous works tend to secure messages to be exchanged among a community of collaborative agents commissioned to perform specific tasks using cryptosystems. However, the approach is characterized by computational complexity due to the encryption and decryption processes required at the two ends. The proposed approach to secure agent communication allows only agents that are created by the host agent server to communicate via the agent communication channel provided by the host agent platform. These agents are assumed to be harmless. Therefore, to secure communication of legitimate agents from intrusion by external agents, a 2-phase policy enforcement system was developed. The first phase constrains the external agent to run only on the network server while the second phase confines the activities of the external agent to its execution environment. To implement the proposed policy, a controller agent was charged with the task of screening any external agent entering the local area network and preventing it from migrating to the agent execution host where the legitimate agents are running. On arrival of the external agent at the host network server, an introspector agent was charged to monitor and restrain its activities. This approach secures legitimate agent communication from Man-in-the Middle and Replay attacks.Keywords: agent communication, introspective agent, isolation of agent, policy enforcement system
Procedia PDF Downloads 298162 Examining Experiences of QTBIPOC Disabled Students in Canadian Post-Secondary Institutions
Authors: Manchari Paranthahan
Abstract:
Higher education has often presented barriers to many communities as a result of its colonial roots. While higher education was initially created for white cis-males, student populations have become more diverse in the past few decades. Despite this increase in diversity, barriers like rising costs and hostile education settings continue to make higher education hard to access for certain demographics. These barriers and limitations are compounded for students who are intersectionality marginalized, such as Queer and Trans Black, Indigenous and People of Colour (QTBIPOC) Disabled students. As of 2021-2022, only 57.5% of the Canadian population between the ages of 25 - 64 held a college or university credential, with only 32.9% holding a bachelor’s degree or higher. In that same time frame, only 0.64% of the students who successfully completed a higher education program identified as transgender or nonbinary. QTBIPOC Disabled students experience diverse forms of oppression while navigating education systems, often preventing them from completing their education successfully. This research project will investigate the complex experiences of intersectional marginalization of QTBIPOC Disabled students in Canadian post-secondary education systems. Through this investigation, this research seeks to reimagine more inclusive and accessible education systems in Canada and beyond. The social and academic experiences of QTBIPOC Disabled students in education systems are largely absent from scholarly literature, speaking to their continued marginalization and erasure from academic discourses. The lack of representation for this community in academia reinforces the idea that there is no space for marginalized bodies in further education, a discriminatory belief that this research project aims to investigate and reframe with this project. This research study will be informed by Critical Race theory, Queer Theory and Critical Disability Theories. Through a blend of critical narrative ethnography and ethnodrama for my methodological framing. Using these methodologies will speak to the intersecting factors that impact the experiences that QTBIPOC Disabled students have in education systems while offering space to analyze and create new systems of learning that benefits all students.Keywords: QTBIPOC, queer, disability, pedagogy
Procedia PDF Downloads 27161 Design of Demand Pacemaker Using an Embedded Controller
Authors: C. Bala Prashanth Reddy, B. Abhinay, C. Sreekar, D. V. Shobhana Priscilla
Abstract:
The project aims in designing an emergency pacemaker which is capable of giving shocks to a human heart which has stopped working suddenly. A pacemaker is a machine commonly used by cardiologists. This machine is used in order to shock a human’s heart back into usage. The way the heart works is that there are small cells called pacemakers sending electrical pulses to cardiac muscles that tell the heart when to pump blood. When these electrical pulses stop, the heart stops beating. When this happens, a pacemaker is used to shock the heart muscles and the pacemakers back into action. The way this is achieved is by rubbing the two panels of the pacemaker together to create an adequate electrical current, and then the heart gets back to the normal state. The project aims in designing a system which is capable of continuously displaying the heart beat and blood pressure of a person on LCD. The concerned doctor gets the heart beat and also the blood pressure details continuously through the GSM Modem in the form of SMS alerts. In case of abnormal condition, the doctor sends message format regarding the amount of electric shock needed. Automatically the microcontroller gives the input to the pacemaker which in turn gives the shock to the patient. Heart beat monitor and display system is a portable and a best replacement for the old model stethoscope which is less efficient. The heart beat rate is calculated manually using stethoscope where the probability of error is high because the heart beat rate lies in the range of 70 to 90 per minute whose occurrence is less than 1 sec, so this device can be considered as a very good alternative instead of a stethoscope.Keywords: missing R wave, PWM, demand pacemaker, heart
Procedia PDF Downloads 482160 Mindfulness in a Secular Age: Framing and Contextualising the Conversation in the Irish Context
Authors: Thomas P. Carroll
Abstract:
The phenomenon of mindfulness has become ever more popular in an increasingly pluralist Western society. Mindfulness practice has penetrated secular contexts that would otherwise be closed to religious influence, including state schools, hospitals, and commerce. The contemporary understanding of mindfulness has its origins in Buddhist meditation. However, since Jon Kabat-Zinn’s pioneering work in Mindfulness-Based Interventions, the concept has developed and sometimes mutated into various forms of practice which are disembedded from their original spiritual philosophy. This project will explore the spiritual climate within which mindfulness is currently flourishing through dialogue with three interlocutors. The first interlocutor is the Canadian philosopher Charles Taylor whose seminal work, ‘A Secular Age’, outlines three distinct modes of secularity. Taylor examines how the conditions of belief have changed and how the self seeks meaning in an age where belief in the divine is no longer axiomatic. The next interlocutor is Czech theologian and psychotherapist Tomáš Halík who offers a unique perspective of a Catholic who belongs to a section of society outnumbered by secular counterparts, with a theological hermeneutic best described as 'Den Fremden verstehen- understanding the stranger'. Finally, Irish theologian Michael Paul Gallagher offers a theological perspective on how the Christian faith can be translated into dialogue with Irish secular culture, as well as addressing the crisis of imagination and culture rather than the crisis of faith in Ireland. These interlocutors will illustrate that there are sometimes striking differences in how to interpret the religious signs of the times. However, these approaches also reveal significant similarities in how they address and explore the meaning of religious belief and experience today. In this way, themes will emerge that will help to frame the conversation about mindfulness in the West. These themes will include; the failure of the secularization thesis to pass, the growth of a diverse marketplace of religions and beliefs and the growth of a demographic who identify as spiritual but not religious. Such research is paramount in enabling a richer dialogue between Christian faith and mindfulness in a fragmented, postmodern Western context.Keywords: culture, mindfulness, secularism, spirituality
Procedia PDF Downloads 115159 Security Analysis of Mod. S Transponder Technology and Attack Examples
Authors: M. Rutkowski, J. Cwiklak, M. Grzegorzewski, M. Adamski
Abstract:
All class A Airplanes have to be equipped with Mod. S transponder for ATC surveillance purposes. This technology was designed to provide a robust and dependable solution to localize, identify and exchange data with the airplane. The purpose of this paper is to analyze potential hazards that are a result of lack of any security or encryption on a design level. Secondary Surveillance Radars rely on an active response from an airplane. SSR radar installation is broadcasting a directional interrogation signal to the planes in range on 1030MHz frequency with DPSK modulation. If the interrogation is correctly received by the transponder located on the plane, a proper answer is sent on 1090MHz with PPM modulation containing plane’s SQUAWK, barometric altitude, GPS coordinates and 24bit unique address code. This technology does not use any kind of encryption. All of the specifications from the previous chapter can be found easily on the internet. Since there is no encryption or security measure to ensure the credibility of the sender and message, it is highly hazardous to use such technology to ensure the safety of the air traffic. The only thing that identifies the airplane is the 24-bit unique address. Most of the planes have been sniffed by aviation enthusiasts and cataloged in web databases. In the moment of writing this article, The PoFung Technologies has announced that they are planning to release all band SDR transceiver – this device would be more than enough to build your own Mod. S Transponder. With fake transponder, a potential terrorist can identify as a different airplane. By replacing the transponder in a poorly controlled airspace, hijackers can enter another airspace identifying themselves as another plane and land in the desired area.Keywords: flight safety, hijack, mod S transponder, security analysis
Procedia PDF Downloads 295158 Towards Kurdish Internet Linguistics: A Case Study on the Impact of Social Media on Kurdish Language
Authors: Karwan K. Abdalrahman
Abstract:
Due to the impacts of the internet and social media, new words and expressions enter the Kurdish language, and a number of familiarized words get new meanings. The case is especially true when the technique of transliteration is taken into consideration. Through transliteration, a number of selected words widely used on social media are entering the Kurdish media discourse. In addition, a selected number of Kurdish words get new cultural and psychological meanings. The significance of this study is to delve into the process of word formation in the Kurdish language and explore how new words and expressions are formed by social media users and got public recognition. First, the study investigates the English words that enter the Kurdish language through different social media platforms. All of these words are transliterated and are used in spoken and written discourses. Second, there are a specific number of Kurdish words that got new meanings in social media. As for these words, there are psychological and cultural factors that make people use these expressions for specific political reasons. It can be argued that they have an indirect political message along with their new linguistic usages. This is a qualitative study analyzing video content that was published in the last two years on social media platforms, including Facebook and YouTube. The collected data was analyzed based on the themes discussed above. The findings of the research can be summarized as follows: the widely used transliterated words have entered both the spoken and written discourses. Authors in online and offline newspapers, TV presenters, literary writers, columnists are using these new expressions in their writings. As for the Kurdish words with new meanings, they are also widely used for psychological, cultural, and political reasons.Keywords: Kurdish language, social media, new meanings, transliteration, vocabulary
Procedia PDF Downloads 182157 Normalized Enterprises Architectures: Portugal's Public Procurement System Application
Authors: Tiago Sampaio, André Vasconcelos, Bruno Fragoso
Abstract:
The Normalized Systems Theory, which is designed to be applied to software architectures, provides a set of theorems, elements and rules, with the purpose of enabling evolution in Information Systems, as well as ensuring that they are ready for change. In order to make that possible, this work’s solution is to apply the Normalized Systems Theory to the domain of enterprise architectures, using Archimate. This application is achieved through the adaptation of the elements of this theory, making them artifacts of the modeling language. The theorems are applied through the identification of the viewpoints to be used in the architectures, as well as the transformation of the theory’s encapsulation rules into architectural rules. This way, it is possible to create normalized enterprise architectures, thus fulfilling the needs and requirements of the business. This solution was demonstrated using the Portuguese Public Procurement System. The Portuguese government aims to make this system as fair as possible, allowing every organization to have the same business opportunities. The aim is for every economic operator to have access to all public tenders, which are published in any of the 6 existing platforms, independently of where they are registered. In order to make this possible, we applied our solution to the construction of two different architectures, which are able of fulfilling the requirements of the Portuguese government. One of those architectures, TO-BE A, has a Message Broker that performs the communication between the platforms. The other, TO-BE B, represents the scenario in which the platforms communicate with each other directly. Apart from these 2 architectures, we also represent the AS-IS architecture that demonstrates the current behavior of the Public Procurement Systems. Our evaluation is based on a comparison between the AS-IS and the TO-BE architectures, regarding the fulfillment of the rules and theorems of the Normalized Systems Theory and some quality metrics.Keywords: archimate, architecture, broker, enterprise, evolvable systems, interoperability, normalized architectures, normalized systems, normalized systems theory, platforms
Procedia PDF Downloads 359156 Ideation, Plans, and Attempts for Suicide among Adolescents with Disability
Authors: Nyla Anjum, Humaira Bano
Abstract:
Disability, regardless of its type and nature limits one or two significant life activities. These limitations constitute risk factors for suicide. Rate and intensity of problem upsurges in critical age of adolescence. Researches in the field of mental health over look problem of suicide among persons with disability. Aim of the study was to investigate prevalence and risk factors for suicide among adolescents with disability. The study constitutes purposive sample of 106 elements of both gender with four major categories of disability: hearing impairment, physical impairment, visual impairment and intellectual disabilities. Face to face interview technique was opted for data collection. Other variable are: socio-economic status, social and family support, provision of services for persons with disability, education and employment opportunities. For data analysis independent sample t-test was applied to find out significant differences in gender and One Way Analysis of variance was run to find out differences among four types of disability. Major predictors of suicide were identified with multiple regression analysis. It is concluded that ideation, plans and attempts of suicide among adolescents with disability is a multifaceted and imperative concern in the area of mental health. Urgent research recommendations contains valid measurement of suicide rate and identification of more risk factors for suicide among persons with disability. Study will also guide towards prevention of this pressing problem and will bring message of happy and healthy life not only for persons with disability but also for their families. It will also help to reduce suicide rate in society.Keywords: suicide, risk factors, adolescent, disability, mental health
Procedia PDF Downloads 382155 Enhanced Tensor Tomographic Reconstruction: Integrating Absorption, Refraction and Temporal Effects
Authors: Lukas Vierus, Thomas Schuster
Abstract:
A general framework is examined for dynamic tensor field tomography within an inhomogeneous medium characterized by refraction and absorption, treated as an inverse source problem concerning the associated transport equation. Guided by Fermat’s principle, the Riemannian metric within the specified domain is determined by the medium's refractive index. While considerable literature exists on the inverse problem of reconstructing a tensor field from its longitudinal ray transform within a static Euclidean environment, limited inversion formulas and algorithms are available for general Riemannian metrics and time-varying tensor fields. It is established that tensor field tomography, akin to an inverse source problem for a transport equation, persists in dynamic scenarios. Framing dynamic tensor tomography as an inverse source problem embodies a comprehensive perspective within this domain. Ensuring well-defined forward mappings necessitates establishing existence and uniqueness for the underlying transport equations. However, the bilinear forms of the associated weak formulations fail to meet the coercivity condition. Consequently, recourse to viscosity solutions is taken, demonstrating their unique existence within suitable Sobolev spaces (in the static case) and Sobolev-Bochner spaces (in the dynamic case), under a specific assumption restricting variations in the refractive index. Notably, the adjoint problem can also be reformulated as a transport equation, with analogous results regarding uniqueness. Analytical solutions are expressed as integrals over geodesics, facilitating more efficient evaluation of forward and adjoint operators compared to solving partial differential equations. Certainly, here's the revised sentence in English: Numerical experiments are conducted using a Nesterov-accelerated Landweber method, encompassing various fields, absorption coefficients, and refractive indices, thereby illustrating the enhanced reconstruction achieved through this holistic modeling approach.Keywords: attenuated refractive dynamic ray transform of tensor fields, geodesics, transport equation, viscosity solutions
Procedia PDF Downloads 51154 Repetitive Compulsions of Trauma: Critically Analyzing Damages Done When Perpetuating Heroic White Masculinity at Federally Managed United States Civil War Battlefields
Authors: Cait M. Henry, Sarah Jackson
Abstract:
Abstract-This study is built from the culmination of four years of research into the cultural interpretation of Civil War heritage at a National Park Service (NPS) site, namely the Manassas National Battlefield Park, within an increasingly contentious political landscape surrounding the U.S. Civil War. Originating as questions regarding the relevancy of historic battlefields to the current culture within the United States soon evolved into more philosophical questions about what it means to feel welcome at a battlefield site, and what are considered appropriate actions and behaviors at what was once a mass gravesite. In trying to answer these questions, this work aims to critically analyze the confluence between the cultural authority of the NPS and collective memories of the U.S. Civil War. Operationalizing trauma as repeated violent acts within public spaces, the authors posit that the normalization of violence from white or white-passing men partially stems from the glorification of heroic white masculinity at National Park Service Civil War battlefield sites—especially those which also commemorate Confederate military strategy and prowess. From here the study moves outward to focus on the prevalence of heroic white masculinity within the nation’s current social zeitgeist, and particularly the notion that to take back masculinity one must utilize violence as a means of symbolic restoration from perceptions of white victimhood. The study ends with case studies of dark tourism framing at international battlefields as models for expanding heritage interpretation at the NPS site to foster narratives of empathy and responsibility within an increasingly contentious political landscape within the United States of America. Visitors do not leave Manassas National Battlefield Park with answers about the social and moral implications of the U.S. Civil War, but the tools for championing their own (predominantly white) heroic masculinity. As such, it is only logical that one common reaction when masculinity is symbolically threatened is to enact violence against Others as a restorative force within the United States.Keywords: confederate heritage, military history, national park service, trauma, United States civil war
Procedia PDF Downloads 16