Search results for: innovative communication
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 5836

Search results for: innovative communication

1816 A Lifetime-Enhancing Monitoring Node Distribution Using Minimum Spanning Tree in Mobile Ad Hoc Networks

Authors: Sungchul Ha, Hyunwoo Kim

Abstract:

In mobile ad hoc networks, all nodes in a network only have limited resources and calculation ability. Therefore communication topology which have long lifetime is good for all nodes in mobile ad hoc networks. There are a variety of researches on security problems in wireless ad hoc networks. The existing many researches try to make efficient security schemes to reduce network power consumption and enhance network lifetime. Because a new node can join the network at any time, the wireless ad hoc networks are exposed to various threats and can be destroyed by attacks. Resource consumption is absolutely necessary to secure networks, but more resource consumption can be a critical problem to network lifetime. This paper focuses on efficient monitoring node distribution to enhance network lifetime in wireless ad hoc networks. Since the wireless ad hoc networks cannot use centralized infrastructure and security systems of wired networks, a new special IDS scheme is necessary. The scheme should not only cover all nodes in a network but also enhance the network lifetime. In this paper, we propose an efficient IDS node distribution scheme using minimum spanning tree (MST) method. The simulation results show that the proposed algorithm has superior performance in comparison with existing algorithms.

Keywords: MANETs, IDS, power control, minimum spanning tree

Procedia PDF Downloads 354
1815 Phage Therapy as a Potential Solution in the Fight against Antimicrobial Resistance

Authors: Sanjay Shukla

Abstract:

Excessive use of antibiotics is a main problem in the treatment of wounds and other chronic infections and antibiotic treatment is frequently non-curative, thus alternative treatment is necessary. Phage therapy is considered one of the most effective approaches to treat multi-drug resistant bacterial pathogens. Infections caused by Staphylococcus aureus are very efficiently controlled with phage cocktails, containing a different individual phages lysate infecting a majority of known pathogenic S. aureus strains. The aim of current study was to investigate the efficiency of a purified phage cocktail for prophylactic as well as therapeutic application in mouse model and in large animals with chronic septic infection of wounds. A total of 150 sewage samples were collected from various livestock farms. These samples were subjected for the isolation of bacteriophage by double agar layer method. A total of 27 sewage samples showed plaque formation by producing lytic activity against S. aureus in double agar overlay method out of 150 sewage samples. In TEM recovered isolates of bacteriophages showed hexagonal structure with tail fiber. In the bacteriophage (ØVS) had an icosahedral symmetry with the head size 52.20 nm in diameter and long tail of 109 nm. Head and tail were held together by connector and can be classified as a member of the Myoviridae family under the order of Caudovirale. Recovered bacteriophage had shown the antibacterial activity against the S. aureus in vitro. Cocktail (ØVS1, ØVS5, ØVS9 and ØVS 27) of phage lysate were tested to know in vivo antibacterial activity as well as the safety profile. Result of mice experiment indicated that the bacteriophage lysate was very safe, did not show any appearance of abscess formation which indicates its safety in living system. The mice were also prophylactically protected against S. aureus when administered with cocktail of bacteriophage lysate just before the administration of S. aureus which indicates that they are good prophylactic agent. The S. aureus inoculated mice were completely recovered by bacteriophage administration with 100% recovery which was very good as compere to conventional therapy. In present study ten chronic cases of wound were treated with phage lysate and follow up of these cases was done regularly up to ten days (at 0, 5 and 10 d). Result indicated that the six cases out of ten showed complete recovery of wounds within 10 d. The efficacy of bacteriophage therapy was found to be 60% which was very good as compared to the conventional antibiotic therapy in chronic septic wounds infections. Thus, the application of lytic phage in single dose proved to be innovative and effective therapy for treatment of septic chronic wounds.

Keywords: phage therapy, phage lysate, antimicrobial resistance, S. aureus

Procedia PDF Downloads 113
1814 Analysis and Detection of Facial Expressions in Autism Spectrum Disorder People Using Machine Learning

Authors: Muhammad Maisam Abbas, Salman Tariq, Usama Riaz, Muhammad Tanveer, Humaira Abdul Ghafoor

Abstract:

Autism Spectrum Disorder (ASD) refers to a developmental disorder that impairs an individual's communication and interaction ability. Individuals feel difficult to read facial expressions while communicating or interacting. Facial Expression Recognition (FER) is a unique method of classifying basic human expressions, i.e., happiness, fear, surprise, sadness, disgust, neutral, and anger through static and dynamic sources. This paper conducts a comprehensive comparison and proposed optimal method for a continued research project—a system that can assist people who have Autism Spectrum Disorder (ASD) in recognizing facial expressions. Comparison has been conducted on three supervised learning algorithms EigenFace, FisherFace, and LBPH. The JAFFE, CK+, and TFEID (I&II) datasets have been used to train and test the algorithms. The results were then evaluated based on variance, standard deviation, and accuracy. The experiments showed that FisherFace has the highest accuracy for all datasets and is considered the best algorithm to be implemented in our system.

Keywords: autism spectrum disorder, ASD, EigenFace, facial expression recognition, FisherFace, local binary pattern histogram, LBPH

Procedia PDF Downloads 163
1813 Written Grammatical Errors of Arabic as Second Language (ASL) Learners: An Evaluative Study

Authors: Sadeq Al Yaari, Fayza Al Hammadi, Ayman Al Yaari, Adham Al Yaari, Montaha Al Yaari, Aayah Al Yaari, Sajedah Al Yaari, Salah Al Yami

Abstract:

Background: In recent years, the number of non-native speakers of the Arabic language has exponentially increased. Aims: This analytical study aims to investigate written grammatical errors committed by Arabic as a Second Language (ASL) learners. More specifically, it explores the reasons behind committing these errors and their effects on the daily communication of ASL learners. Methods: Ten (10) ASL senior learners of the Arabic Language Institute (ALI), College of Arts, King Saud University (KSU), Riyadh, Kingdom of Saudi Arabia (KSA) were randomly selected in this study. The participants were asked to write paragraphs about themselves and then their written work was linguistically analyzed and evaluated by the researchers and some Arabic Language experts before it was statistically analyzed. Conclusions: Results outline that written grammatical errors of ASL learners are characterized by the misuse of many grammatical items. Mainly, these items are proper nouns (PN), common nouns (CN), main verbs (MV), adjectives (adj.), time adverbs (T. Adv.), manner adverbs (M. Adv.), objective pronouns (OP), and central determiners (C Det.) including demonstratives (Dem.) and articles (Artic.), pronouns (Pron.) and prepositions (Prep.).

Keywords: written, grammatical errors, Arabic, second language, non-native learners, analysis.

Procedia PDF Downloads 26
1812 Evaluation and Preservation of Post-War Concrete Architecture: The Case of Lithuania

Authors: Aušra Černauskienė

Abstract:

The heritage of modern architecture is closely related to the materiality and technology used to implement the buildings. Concrete is one of the most ubiquitous post-war building materials with enormous aesthetic and structural potential that architects have creatively used for everyday buildings and exceptional architectural objects that have survived. Concrete's material, structural, and architectural development over the post-war years has produced a remarkably rich and diverse typology of buildings, for implementation of which unique handicraft skills and industrialized novelties were used. Nonetheless, in the opinion of the public, concrete architecture is often treated as ugly and obsolete, and in Lithuania, it also has negative associations with the scarcity of the Soviet era. Moreover, aesthetic non-appreciation is not the only challenge that concrete architecture meets. It also no longer meets the needs of contemporary requirements: buildings are of poor energy class, have little potential for transformation, and have an obsolete surrounding environment. Thus, as a young heritage, concrete architecture is not yet sufficiently appreciated by society and heritage specialists, as it takes a short time to rethink what they mean from a historical perspective. However, concrete architecture is considered ambiguous but has its character and specificity that needs to be carefully studied in terms of cultural heritage to avoid the risk of poor renovation or even demolition, which has increasingly risen in recent decades in Lithuania. For example, several valuable pieces of post-war concrete architecture, such as the Banga restaurant and the Summer Stage in Palanga, were demolished without understanding their cultural value. Many unique concrete structures and raw concrete surfaces were painted or plastered, paying little attention to the appearance of authentic material. Furthermore, it raises a discussion on how to preserve buildings of different typologies: for example, innovative public buildings in their aesthetic, spatial solutions, and mass housing areas built using precast concrete panels. It is evident that the most traditional preservation strategy, conservation, is not the only option for preserving post-war concrete architecture, and more options should be considered. The first step in choosing the right strategy in each case is an appropriate assessment of the cultural significance. For this reason, an evaluation matrix for post-war concrete architecture is proposed. In one direction, an analysis of different typological groups of buildings is suggested, with the designation of ownership rights; in the other direction – the analysis of traditional value aspects such as aesthetic, technological, and relevant for modern architecture such as social, economic, and sustainability factors. By examining these parameters together, three relevant scenarios for preserving post-war concrete architecture were distinguished: conservation, renovation, and reuse, and they are revealed using examples of concrete architecture in Lithuania.

Keywords: modern heritage, value aspects, typology, conservation, upgrade, reuse

Procedia PDF Downloads 130
1811 Evaluation of Toxicity of Root-bark Powder of Securidaca Longepedunculata Enhanced with Diatomaceous Earth Fossilshield Against Callosobruchus Maculatus (F.) (Coleoptera-Bruchidea)

Authors: Mala Tankam Carine, Kekeunou Sévilor, Nukenine Elias

Abstract:

Storage and preservation of agricultural products remain the only conditions ensuring the almost permanent availability of foodstuffs. However, infestations due to insects and microorganisms often occur. Callosobruchus maculatus is a pest that causes a lot of damage to cowpea stocks in the tropics. Several methods are adopted to limit their damage, but the use of synthetic chemical insecticides is the most widespread. Biopesticides in sustainable agriculture respond to several environmental, economic and social concerns while offering innovative opportunities that are ecologically and economically viable for producers, workers, consumers and ecosystems. Our main objective is to evaluate the insecticidal efficacy of binary combinations of Fossilshield with root-bark powder of Securidaca longepedunculata against Callosobruchus maculatus in stored cowpea Vigna unguiculata. Laboratory bioassays were conducted in stored grains to evaluate the toxicity of root-bark powder of Securidaca longepedunculata alone or combined with diatomaceous earth Fossil-Shield ® against C. maculatus. Twenty-hour-old adults of C. maculatus were exposed to 50g of cowpea seeds treated with four doses (10, 20, 30, and 40g/kg) of root-bark powder of S. longepedunculata, on the one hand, and (0.5, 1, 1.5, and 2 g/kg) on DE and binary combinations on the other hand. 0g/kg corresponded to untreated control. Adult mortality was recorded up to 7 days (d) post-treatment, whereas the number of F1 progeny was assessed after 30 d. Weight loss and germinative ability were conducted after 120 d. All treatments were arranged according to a completely randomized block with four replicates. The combined mixture of S. longepedunculata and DE controlled the beetle faster compared to the root-bark powder of S. longepedunculata alone. According to the Co-toxicity coefficient, additive effect of binary combinations was recorded at 3-day post-exposure time with the mixture 25% FossilShield + 75% S. longepedunculata. A synergistic action was observed after 3-d post-exposure at mixture 50% FossilShield + 50% S. longepedunculata and at 1-d and 3-d post-exposure periods at mixture 75% FossilShield + 25% S. longepedunculata. The mixture 25% FossilShield + 75% S. longepedunculata induced a decreased progeny of 6 times fewer individuals for 4.5 times less weight loss and 2, 9 times more sprouted grains than with root-bark powder of S. longepedunculata. The combination of FossilShield + S. longepedunculata was more potent than root-bark powder of S. longepedunculata alone, although the root-bark powder of S. longepedunculata caused significant reduction of F1 adults compared to the control. Combined action of botanical insecticides with FossilShield as a grain protectant in an integrated pest management approach is discussed.

Keywords: diatomaceous earth, cowpea, callosobruchus maculatus, securidaca longepedunculata, combined action, co-toxicity coefficient

Procedia PDF Downloads 63
1810 Adopting Flocks of Birds Approach to Predator for Anomalies Detection on Industrial Control Systems

Authors: M. Okeke, A. Blyth

Abstract:

Industrial Control Systems (ICS) such as Supervisory Control And Data Acquisition (SCADA) can be seen in many different critical infrastructures, from nuclear management to utility, medical equipment, power, waste and engine management on ships and planes. The role SCADA plays in critical infrastructure has resulted in a call to secure them. Many lives depend on it for daily activities and the attack vectors are becoming more sophisticated. Hence, the security of ICS is vital as malfunction of it might result in huge risk. This paper describes how the application of Prey Predator (PP) approach in flocks of birds could enhance the detection of malicious activities on ICS. The PP approach explains how these animals in groups or flocks detect predators by following some simple rules. They are not necessarily very intelligent animals but their approach in solving complex issues such as detection through corporation, coordination and communication worth emulating. This paper will emulate flocking behavior seen in birds in detecting predators. The PP approach will adopt six nearest bird approach in detecting any predator. Their local and global bests are based on the individual detection as well as group detection. The PP algorithm was designed following MapReduce methodology that follows a Split Detection Convergence (SDC) approach.

Keywords: artificial life, industrial control system (ICS), IDS, prey predator (PP), SCADA, SDC

Procedia PDF Downloads 292
1809 Comparison of Cardiometabolic Risk Factors in Lean Versus Overweight/Obese Peri-Urban Female Adolescent School Learners in Mthatha, South Africa: A Pilot Case Control Study

Authors: Benedicta N. Nkeh-Chungag, Constance R. Sewani-Rusike, Isaac M. Malema, Daniel T. Goon, Oladele V. Adeniyi, Idowu A. Ajayi

Abstract:

Background: Childhood and adolescent obesity is an important predictor of adult cardiometabolic diseases. Current data on age- and gender-specific cardiometabolic risk factors are lacking in the peri-urban Eastern Cape Province, South Africa. However, such information is important in designing innovative strategies to promote healthy living among children and adolescents. The purpose of this pilot study was to compare and determine the extent of cardiometabolic risk factors between samples of lean and overweight/obese adolescent population in a peri-urban township of South Africa. Methods: In this case-control study, age-matched, non-pregnant and non-lactating female adolescents consisting of equal number of cases (50 overweight/obese) and control (50 lean) participated in the study. Fasting venous blood samples were obtained for total cholesterol (TC), low-density lipoprotein cholesterol (LDL-C), high-density lipoprotein cholesterol (HDL-C), triglyceride (Trig), highly sensitive C-reactive protein (hsCRP) and blood sugar. Anthropometric measurements included weight, height, waist and hip circumferences. Body mass index was calculated. Blood pressure was measured; and metabolic syndrome was assessed using appropriate diagnostic criteria for children and adolescents. Results: Of the 76 participants with complete data, 12/38 of the overweight/obese and 1/38 of the lean group met the criteria for adolescent metabolic syndrome. All cardiometabolic risk factors were elevated in the overweight/obese group compared with the lean group: low HDL-C (RR = 2.21), elevated TC (RR = 1.23), elevated LDL-C (RR = 1.42), elevated Trig (RR = 1.73), and elevated hsCRP (RR = 1.9). There were significant atherosclerotic indices among the overweight/obese group compared with the lean group: TC/HDL and LDL/HDL (2.99±0.91 vs 2.63±0.48; p=0.016 and 1.73±0.61 vs 1.41±0.46; p= 0.014, respectively). Conclusion: There are multiple cardiometabolic risk factors among the overweight/obese female adolescent group compared with lean adolescent group in the study. Female adolescent who are overweight and obese have higher relative risks of developing cardiometabolic diseases compared with their lean counterparts in the peri-urban Mthatha, South Africa. School health programme focusing on promoting physical exercise, healthy eating and keeping appropriate weight are needed in the country.

Keywords: adolescents, cardiometabolic risk factors, obesity, peri-urban South Africa

Procedia PDF Downloads 462
1808 Revival and Protection of Traditional Jewellery Motifs of Assam (India), over Eri Silk by Innovative Techniques

Authors: Ratna Sharma, Kaveri Dutta

Abstract:

Assam (India), the gate way to the Northeast India is mainly known for its exquisite silks, the art and craft. The state has a rich collection of traditional jewellery which is unique and exclusive to the state. These jewelleries hold a special place in the heart of the Assamese women. Similarly handloom industry of Assam is basically silk oriented. Among the wild silk, Eri silk fabric has remained as “the poor man’s silk” but it is closely attached to the assamese society, dress for it's warm quality. In view of the changing market trends, fashion and consumer demands, Silk is emerging as a fashion fabric both in India and abroad. In case of Eri silk fabric it has limited use in clothing and accessories. Hence the restructured and redesigned traditional jewellery motifs of Assam (India) over Eri silk products will have greater potential in reviving the decline of art, generate revenue, self employment towards craftsmen and also recognition of the art. The information incorporated in the paper is primary and the data have been collected by purposive sampling method. This work of art was expressed on Eri silk fabric in the form of traditional hand embroidery as it is closely connected with the era of the individual in history of mankind and reflects the personal expression of an entity. For this study selected traditional motifs of Assamese ornaments was used. Some of the popular traditional Assamese jewellery include earrings with exquisite Lokaparo, Keru, Thuriya, Jangphai, etc. An array of necklaces including Golpata, Satsori, Jon biri, Bena, Gejera, Dhol biri, Doog doogi, Biri Moni, Mukuta Moni, Poalmoni, Silikha Moni and Magardana and diversified rings including Senpata, Horinsakua, Jethinejia, bakharpata and others. Selected two motifs each from necklace, earring and finger ring designs. Selected motifs were further developed into 3 categories- the border, the main motif and all over butta followed by placement of developed patterns on products. Products developed were stoles, scarf’s, purses, brooch pins, skirts for women and ties, handkerchief, jackets for men. The developed products were surveyed by selected respondents. From the present study it can be observed that the embellished traditional jewellery motifs resulted in fresh and colourful pattern on developed Eri silk products. Moreover the motifs which were gradually fading among the community itself showed a very good recognition towards art. The embroidered Eri silk fabric also created a huge change in a positive way among craftsman.

Keywords: Art and craft of Assam, eri silk, hand embroidery, traditional Assamese jewellery motifs

Procedia PDF Downloads 640
1807 Internet Optimization by Negotiating Traffic Times

Authors: Carlos Gonzalez

Abstract:

This paper describes a system to optimize the use of the internet by clients requiring downloading of videos at peak hours. The system consists of a web server belonging to a provider of video contents, a provider of internet communications and a software application running on a client’s computer. The client using the application software will communicate to the video provider a list of the client’s future video demands. The video provider calculates which videos are going to be more in demand for download in the immediate future, and proceeds to request the internet provider the most optimal hours to do the downloading. The times of the downloading will be sent to the application software, which will use the information of pre-established hours negotiated between the video provider and the internet provider to download those videos. The videos will be saved in a special protected section of the user’s hard disk, which will only be accessed by the application software in the client’s computer. When the client is ready to see a video, the application will search the list of current existent videos in the area of the hard disk; if it does exist, it will use this video directly without the need for internet access. We found that the best way to optimize the download traffic of videos is by negotiation between the internet communication provider and the video content provider.

Keywords: internet optimization, video download, future demands, secure storage

Procedia PDF Downloads 132
1806 Cross-Cultural Competence Development through 'Learning by Reflection': A Case Study of Chinese International Students Learning through Taking Part-Time Jobs in the UK

Authors: Xin Zhao

Abstract:

The project aims to expand the notion of narrative learning and address the importance of learning by reflection in our learning and teaching context at a British university. Drawing on the key concepts such as development ZPD, transition and reflection-in and –on-action, this project analyses the learning experiences of a small sample of Chinese postgraduate students in a British University, who use part-time job experience to develop cross-cultural communication skills. The project adopts a mixed methods approach. Questionnaires and focus group interviews are used to examine the way in which students adapt (or not adapt) to the culture of learning in a British university and develop a renewed sense of self in transitions from one culture to the other. The project also looks at how the students appropriate opportunities for learning not just from classrooms but outside classrooms from everyday encounters. The project aims to address the implication of learning by reflection as development in transition. Time in and for learning, or duration, is taken for granted in theorising narrative learning. The project shall explore this very issue of time in relation to learning by reflection in considering time in/of/for learning as duration.

Keywords: cross-cultural competence, learning by refection, international student transition, part-time work experience

Procedia PDF Downloads 176
1805 A Soft System Approach to Explore Ill-Defined Issues in Distance Education System - A Case of Saudi Arabia

Authors: Sulafah Basahel

Abstract:

Nowadays, Higher Education Institutions (HEIs) around the world are attempting to utilize Information and Communication Technologies (ICTs) to enhance learning process and strategies of knowledge delivery for students through Distance Education (DE) system. Stakeholders in DE system face a complex situation of different ill-defined and related issues that influence decision making process. In this study system thinking as a body of knowledge is used to explore the emergent properties that produced from these connections between issues and could have either positive or negative outcomes for the DE development. Checkland Soft System Methodology (SSM) - Mode 2 is employed in a cultural context of Saudi Arabia for more knowledge acquisition purposes among multiple stakeholders in DE rather than solving problems to achieve an overall development of DE system. This paper will discuss some political, cultural issues and connections between them that impact on effectiveness of stakeholders’ activities and relations. This study will significantly contribute to both system thinking and education fields by leading decision makers in DE to reconsider future plans, strategies and right actions for more successful educational practices.

Keywords: distance education, higher education institutions, ill-defined issues, soft system methodology-Mode 2

Procedia PDF Downloads 263
1804 The Challenges Faced in Learning English as a Second Language in Sri Lanka: A Case Study of Ordinary Level Students in Kurunegala District

Authors: H. L. M. Fawzan

Abstract:

Undoubtedly, learning English as a second language (ESL) is considered a challenging task. It is more difficult for students in far-away districts when compared with the students in the capital cities, where learning resources are easily available and where the environment is conducive to learning. Thus, this study is an analysis of the challenges faced by learners in learning English as the second language within kurunegala district in Sri Lanka. Even though various efforts have been taken by the Sri Lankan Educationalists for improving the situation of English language teaching for the past few decades, a disappointing situation still exist in the achievements of English learning among Sri Lankan students. So, it is necessary to explore real reasons behind the poor achievements of the students in the English Language. It is also an attempt to highlight what can be done to improve the situation significantly. Kurunegala is far away from the capital city of Sri Lanka and is a densely populated district. In the year 2020, state university admission was 45.87% from the Kurunegala district (Department of Examinations). The researcher strived to examine some of the likely challenges faced when teaching English in secondary schools in Kurunegala. The data was collected using a questionnaire from 35 students from schools within the Kurunegala education division. The result of the study reveals that students were highly motivated to learn English for their prospects and expectations such as local and international communication, academic advancement, and employment prospects.

Keywords: english, teaching, Kurunegala, Sri Lanka, challenges

Procedia PDF Downloads 147
1803 Creativity in the Use of Sinhala and English in Advertisements in Sri Lanka: A Morphological Analysis

Authors: Chamindi Dilkushi Senaratne

Abstract:

Sri Lanka has lived with the English language for more than 200 years. Although officially considered a link language, the phenomenal usage of English by the Sinhala-English bilingual has given rise to a mixed code with identifiable structural characteristics. The extensive use of the mixed language by the average Sri Lankan bilingual has resulted in it being used as a medium of communication by creative writers of bilingual advertisements in Sri Lanka. This study analyses the way in which English is used in bilingual advertisements in both print and electronic media in Sri Lanka. The theoretical framework for the study is based on Kachru’s analysis of the use of English by the bilingual, Muysken’s typology on code mixing theories in colonial settings and Myers-Scotton’s theory on the Matrix Language Framework Model. The study will look at a selection of Sinhala-English advertisements published in newspapers from 2015 to 2016. Only advertisements using both Sinhala and English are used for the analysis. To substantiate data collected from the newspapers, the study will select bilingual advertisements from television advertisements. The objective of the study is to analyze the mixed patterns used for creative purposes by advertisers. The results of the study will reveal the creativity used by the Sinhala –English bilingual and the morphological processes used by the creators of Sinhala-English bilingual advertisements to attract the masses.

Keywords: bilingual, code mixing, morphological processes, mixed code

Procedia PDF Downloads 276
1802 A Follow–Up Study of Bachelor of Science Graduates in Applied Statistics from Suan Sunandha Rajabhat University during the 1999-2012 Academic Years

Authors: Somruedee Pongsena

Abstract:

The purpose of this study is to follow up on the graduated students of Bachelor of Science in Applied Statistics from Suan Sunandha Rajabhat University (SSRU) during the 1999 – 2012 academic years and to provide the fundamental guideline for developing the current curriculum according to Thai Qualifications Framework for Higher Education (TQF: HEd). The sample was collected from 75 graduates by interview and online questionnaire. The content covered 5 subjects: ethics and moral, knowledge, cognitive skills, interpersonal skills and responsibility, numerical analysis as well as communication and information technology skills. Data were analyzed by using statistical methods as percentiles, means, standard deviation, t-tests, and F-tests. The findings showed that samples were mostly females younger than 26 years old. The majority of graduates had income in the range of 10,001-20,000 Baht and their experience range was 2-5 years. In addition, overall opinions from receiving knowledge to apply to work were at agree; mean score was 3.97 and standard deviation was 0.40. In terms of opinion difference, the hypothesis' testing results indicate gender only had different opinion at a significant level of 0.05.

Keywords: follow-up, graduates, knowledge, opinion, work performance.

Procedia PDF Downloads 200
1801 Radar on Bike: Coarse Classification based on Multi-Level Clustering for Cyclist Safety Enhancement

Authors: Asma Omri, Noureddine Benothman, Sofiane Sayahi, Fethi Tlili, Hichem Besbes

Abstract:

Cycling, a popular mode of transportation, can also be perilous due to cyclists' vulnerability to collisions with vehicles and obstacles. This paper presents an innovative cyclist safety system based on radar technology designed to offer real-time collision risk warnings to cyclists. The system incorporates a low-power radar sensor affixed to the bicycle and connected to a microcontroller. It leverages radar point cloud detections, a clustering algorithm, and a supervised classifier. These algorithms are optimized for efficiency to run on the TI’s AWR 1843 BOOST radar, utilizing a coarse classification approach distinguishing between cars, trucks, two-wheeled vehicles, and other objects. To enhance the performance of clustering techniques, we propose a 2-Level clustering approach. This approach builds on the state-of-the-art Density-based spatial clustering of applications with noise (DBSCAN). The objective is to first cluster objects based on their velocity, then refine the analysis by clustering based on position. The initial level identifies groups of objects with similar velocities and movement patterns. The subsequent level refines the analysis by considering the spatial distribution of these objects. The clusters obtained from the first level serve as input for the second level of clustering. Our proposed technique surpasses the classical DBSCAN algorithm in terms of geometrical metrics, including homogeneity, completeness, and V-score. Relevant cluster features are extracted and utilized to classify objects using an SVM classifier. Potential obstacles are identified based on their velocity and proximity to the cyclist. To optimize the system, we used the View of Delft dataset for hyperparameter selection and SVM classifier training. The system's performance was assessed using our collected dataset of radar point clouds synchronized with a camera on an Nvidia Jetson Nano board. The radar-based cyclist safety system is a practical solution that can be easily installed on any bicycle and connected to smartphones or other devices, offering real-time feedback and navigation assistance to cyclists. We conducted experiments to validate the system's feasibility, achieving an impressive 85% accuracy in the classification task. This system has the potential to significantly reduce the number of accidents involving cyclists and enhance their safety on the road.

Keywords: 2-level clustering, coarse classification, cyclist safety, warning system based on radar technology

Procedia PDF Downloads 69
1800 Unlocking Intergenerational Abortion Stories in Gardiennes By Fanny Cabon

Authors: Lou Gargouri

Abstract:

This paper examines how Fanny Cabon's solo performance, Gardiennes (2018) strategically crafts empathetic witnessing through the artist's vocal and physical embodiment of her female ancestors' testimonies, dramatizing the cyclical inheritance of reproductive trauma across generations. Drawing on affect theory and the concept of ethical co-presence, we argue that Cabon's raw voicing of illegal abortions, miscarriages, and abuse through her shape-shifting presence generates an intimate energy loop with the audience. This affective resonance catalyzes recognition of historical injustices, consecrating each singular experience while building collective solidarity. Central to Cabon's political efficacy is her transparent self-revelation through intimate impersonation, which fosters identification with diverse characters as interconnected subjects rather than objectified others. Her solo form transforms the isolation often associated with women's marginalization into radical inclusion, repositioning them from victims to empowered survivors. Comparative analysis with other contemporary works addressing abortion rights illuminates how Gardiennes subverts the traditional medical and clerical gazes that have long governed women's bodies. Ultimately, we contend Gardiennes models the potential of solo performance to harness empathy as a subversive political force. Cabon's theatrical alchemy circulates the effects of injustice through the ethical co-presence of performer and spectator, forging intersubjective connections that reframe marginalized groups traditionally objectified within dominant structures of patriarchal power. In dramatizing how the act of witnessing another's trauma can generate solidarity and galvanize resistance, Cabon's work demonstrates the role of embodied performance in catalyzing social change through the recuperation of women's voices and lived experiences. This paper thus aims to contribute to the emerging field of feminist solo performance criticism by illuminating how Cabon's innovative dramaturgy bridges the personal and the political. Her strategic mobilization of intimacy, identification, and co-presence offers a model for how the affective dynamics of autobiographical performance can be harnessed to confront gendered oppression and imagine more equitable futures. Gardiennes invites us to consider how the circulation of empathy through ethical spectatorship can foster the collective alliances necessary for advancing the unfinished project of women's liberation.

Keywords: gender and sexuality studies, solo performance, trauma studies, affect theory

Procedia PDF Downloads 46
1799 Definite Article Errors and Effect of L1 Transfer

Authors: Bimrisha Mali

Abstract:

The present study investigates the type of errors English as a second language (ESL) learners produce using the definite article ‘the’. The participants were provided a questionnaire on the learner's ability test. The questionnaire consists of three cloze tests and two free composition tests. Each participant's response was received in the form of written data. A total of 78 participants from three government schools participated in the study. The participants are high-school students from Rural Assam. Assam is a north-eastern state of India. Their age ranged between 14-15. The medium of instruction and the communication among the students take place in the local language, i.e., Assamese. Pit Corder’s steps for conducting error analysis have been followed for the analysis procedure. Four types of errors were found (1) deletion of the definite article, (2) use of the definite article as modifiers as adjectives, (3) incorrect use of the definite article with singular proper nouns, (4) substitution of the definite article by the indefinite article ‘a’. Classifiers in Assamese that express definiteness is used with nouns, adjectives, and numerals. It is found that native language (L1) transfer plays a pivotal role in the learners’ errors. The analysis reveals the learners' inability to acquire the semantic connotation of definiteness in English due to native language (L1) interference.

Keywords: definite article error, l1 transfer, error analysis, ESL

Procedia PDF Downloads 117
1798 Migration, Violent Extremism and Gang Violence in Trinidad and Tobago

Authors: Raghunath Mahabir

Abstract:

This paper provides an analysis of the existing evidence on the relationships between the migration of Venezuelans into Trinidad and Tobago, violent extremism and gang violence. Arguing that there is a dearth of reliable data on the subject matter, the paper fills the gap by providing relevant definitions of terms used, discusses the sources of data and identifies the causes for this migration and the subsequent ramifications for Trinidad and Tobago and for the migrants themselves. A simple but clear classification pointing to the nexus between migration gang violence and violent extremism is developed, following the logic of migration of criminals(gang members), the need to link with local gangs and the view that certain elements within the TnT society has become radicalized to the point where violent extremism is being displayed in different ways. The paper highlights implications for further policy debate:the imperatives for more effective communication between government officials responsible for migration and those personnel who are tasked with countering violent extremism and gang violence: promoting and executing better integration and social inclusion policies which are necessary to minimize social exclusion, and the threat of violent extremist agendas emanating from both Venezuelans and Trinidadians and generally to establish strong analytical framework grounded in stronger definitions, more reliable data and other evidence which can guide further research and analysis and contribute to policy formation.

Keywords: migration, violent extremism, gangs, Venezuela

Procedia PDF Downloads 41
1797 Minimum Vertices Dominating Set Algorithm for Secret Sharing Scheme

Authors: N. M. G. Al-Saidi, K. A. Kadhim, N. A. Rajab

Abstract:

Over the past decades, computer networks and data communication system has been developing fast, so, the necessity to protect a transmitted data is a challenging issue, and data security becomes a serious problem nowadays. A secret sharing scheme is a method which allows a master key to be distributed among a finite set of participants, in such a way that only certain authorized subsets of participants to reconstruct the original master key. To create a secret sharing scheme, many mathematical structures have been used; the most widely used structure is the one that is based on graph theory (graph access structure). Subsequently, many researchers tried to find efficient schemes based on graph access structures. In this paper, we propose a novel efficient construction of a perfect secret sharing scheme for uniform access structure. The dominating set of vertices in a regular graph is used for this construction in the following way; each vertex represents a participant and each minimum independent dominating subset represents a minimal qualified subset. Some relations between dominating set, graph order and regularity are achieved, and can be used to demonstrate the possibility of using dominating set to construct a secret sharing scheme. The information rate that is used as a measure for the efficiency of such systems is calculated to show that the proposed method has some improved values.

Keywords: secret sharing scheme, dominating set, information rate, access structure, rank

Procedia PDF Downloads 385
1796 PEINS: A Generic Compression Scheme Using Probabilistic Encoding and Irrational Number Storage

Authors: P. Jayashree, S. Rajkumar

Abstract:

With social networks and smart devices generating a multitude of data, effective data management is the need of the hour for networks and cloud applications. Some applications need effective storage while some other applications need effective communication over networks and data reduction comes as a handy solution to meet out both requirements. Most of the data compression techniques are based on data statistics and may result in either lossy or lossless data reductions. Though lossy reductions produce better compression ratios compared to lossless methods, many applications require data accuracy and miniature details to be preserved. A variety of data compression algorithms does exist in the literature for different forms of data like text, image, and multimedia data. In the proposed work, a generic progressive compression algorithm, based on probabilistic encoding, called PEINS is projected as an enhancement over irrational number stored coding technique to cater to storage issues of increasing data volumes as a cost effective solution, which also offers data security as a secondary outcome to some extent. The proposed work reveals cost effectiveness in terms of better compression ratio with no deterioration in compression time.

Keywords: compression ratio, generic compression, irrational number storage, probabilistic encoding

Procedia PDF Downloads 280
1795 Performance Analysis of a Combined Ordered Successive and Interference Cancellation Using Zero-Forcing Detection over Rayleigh Fading Channels in Mimo Systems

Authors: Jamal R. Elbergali

Abstract:

Multiple Input Multiple Output (MIMO) systems are wireless systems with multiple antenna elements at both ends of the link. Wireless communication systems demand high data rate and spectral efficiency with increased reliability. MIMO systems have been popular techniques to achieve these goals because increased data rate is possible through spatial multiplexing scheme and diversity. Spatial Multiplexing (SM) is used to achieve higher possible throughput than diversity. In this paper, we propose a Zero-Forcing (ZF) detection using a combination of Ordered Successive Interference Cancellation (OSIC) and Zero Forcing using Interference Cancellation (ZF-IC). The proposed method used an OSIC based on Signal to Noise Ratio (SNR) ordering to get the estimation of last symbol (x ̃_(N_T )), then the estimated last symbol is considered to be an input to the ZF-IC. We analyze the Bit Error Rate (BER) performance of the proposed MIMO system over Rayleigh Fading Channel, using Binary Phase Shift Keying (BPSK) modulation scheme. The results show better performance than the previous methods.

Keywords: SNR, BER, BPSK, MIMO, modulation, zero forcing (ZF), OSIC, ZF-IC, spatial multiplexing (SM)

Procedia PDF Downloads 418
1794 Real Time Monitoring and Control of Proton Exchange Membrane Fuel Cell in Cognitive Radio Environment

Authors: Prakash Thapa, Gye Choon Park, Sung Gi Kwon, Jin Lee

Abstract:

The generation of electric power from a proton exchange membrane (PEM) fuel cell is influenced by temperature, pressure, humidity, flow rate of reactant gaseous and partial flooding of membrane electrode assembly (MEA). Among these factors, temperature and cathode flooding are the most affecting parameters on the performance of fuel cell. This paper describes the detail design and effect of these parameters on PEM fuel cell. Performance of all parameters was monitored, analyzed and controlled by using 5KWatt PEM fuel cell. In the real-time data communication for remote monitoring and control of PEM fuel cell, a normalized least mean square algorithm in cognitive radio environment is used. By the use of this method, probability of energy signal detection will be maximum which solved the frequency shortage problem. So the monitoring system hanging out and slow speed problem will be solved. Also from the control unit, all parameters are controlled as per the system requirement. As a result, PEM fuel cell generates maximum electricity with better performance.

Keywords: proton exchange membrane (PEM) fuel cell, pressure, temperature and humidity sensor (PTH), efficiency curve, cognitive radio network (CRN)

Procedia PDF Downloads 450
1793 The Development of Competency with a Training Curriculum via Electronic Media for Condominium Managers

Authors: Chisakan Papapankiad

Abstract:

The purposes of this research were 1) to study the competency of condominium managers, 2) to create the training curriculum via electronic media for condominium managers, and 3) to evaluate the training curriculum for condominium managers. The research methods included document analysis, interview, questionnaire, and a try-out. A total of 20 experts were selected to collect data by using Delphi technique. The designed curriculum was tried out with 30 condominium managers. The important steps of conducting this research included analyzing and synthesizing, creating interview questions, conducting factor analysis and developing the training curriculum, editing by experts, and trying out with sample groups. The findings revealed that there were five core competencies: leadership, human resources management, management, communication, and self-development. The training curriculum was designed and all the learning materials were put into a CD. The evaluation of the training curriculum was performed by five experts and the training curriculum was found to be cohesive and suitable for use in the real world. Moreover, the findings also revealed three important issues: 1) the competencies of the respondents after the experiment were higher than before the experiment and this had a level of significance of 0.01, 2) the competencies remained with the respondents at least 12 weeks and this also had a level of significance of 0.01, and 3) the overall level of satisfaction from the respondents were 'the highest level'.

Keywords: competency training curriculum, condominium managers, electronic media

Procedia PDF Downloads 277
1792 Barriers Facing the Implementation of Lean Manufacturing in Libyan Manufacturing Companies

Authors: Mohamed Abduelmula, Martin Birkett, Chris Connor

Abstract:

Lean Manufacturing has developed from being a set of tools and methods to becoming a management philosophy which can be used to remove or reduce waste in manufacturing processes and so enhance the operational productivity of an enterprise. Several enterprises around the world have applied the lean manufacturing system and gained great improvements. This paper investigates the barriers and obstacles that face Libyan manufacturing companies to implement lean manufacturing. A mixed-method approach is suggested, starting with conducting a questionnaire to get quantitative data then using this to develop semi-structured interviews to collect qualitative data. The findings of the questionnaire results and how these can be used further develop the semi-structured interviews are then discussed. The survey was distributed to 65 manufacturing companies in Libya, and a response rate of 64.6% was obtained. The results showed that these are five main barriers to implementing lean in Libya, namely organizational culture, skills and expertise, and training program, financial capability, top management, and communication. These barriers were also identified from the literature as being significant obstacles to implementing Lean in other countries industries. Having an understanding of the difficulties that face the implementation of lean manufacturing systems, as a new and modern system and using this to develop a suitable framework will help to improve the manufacturing sector in Libya.

Keywords: lean manufacturing, barriers, questionnaire, Libyan manufacturing companies

Procedia PDF Downloads 234
1791 Political Discourse and Linguistic Manipulation in Nigerian Politics

Authors: Kunle Oparinde, Ernestina Maleshoane Rapeane-Mathonsi, Gift Mheta

Abstract:

Using Critical Discourse Analysis (CDA) and Multimodal Discourse Analysis (MDA), the research seeks to deconstruct politically-motivated discourse as observed from Nigerian politics. This is intended to be achieved by analysing linguistic (mis)representation and manipulation in Nigerian political settings, drawing from instances of language use as observed from different political campaigns. Since language in itself is generally meaningless without context, it is therefore paramount to analyse the (mis)representation and manipulation in Nigerian political sceneries within their contextual basis. The study focuses on political language used by Nigerian politicians emanating from printed and social media forms such as posters, pamphlets, speeches, billboards, and internet sources purposely selected across Nigeria. The research further aims at investigating the discursive strategies used by politicians to gain more audience, and, as a result, shape opinions that result in votes. The study employs a qualitative approach. Two parties are intentionally selected because they have been essentially strong at the national level namely: All Progressive Congress (APC) and the People’s Democratic Party (PDP). The study finds out that politicians in Nigeria, as in many parts of the world, use language to manipulate the electorate. Comprehensive discussion of these instances of political manipulation remains the thrust of this paper.

Keywords: communication, discourse, manipulation, misrepresentation

Procedia PDF Downloads 233
1790 An Analysis of the Strategic Pathway to Building a Successful Mobile Advertising Business in Nigeria: From Strategic Intent to Competitive Advantage

Authors: Pius A. Onobhayedo, Eugene A. Ohu

Abstract:

Nigeria has one of the fastest growing mobile telecommunications industry in the world. In the absence of fixed connection access to the Internet, access to the Internet is primarily via mobile devices. It, therefore, provides a test case for how to penetrate the mobile market in an emerging economy. We also hope to contribute to a sparse literature on strategies employed in building successful data-driven mobile businesses in emerging economies. We, therefore, sought to identify and analyse the strategic approach taken in a successful locally born mobile data-driven business in Nigeria. The analysis was carried out through the framework of strategic intent and competitive advantages developed from the conception of the company to date. This study is based on an exploratory investigation of an innovative digital company based in Nigeria specializing in the mobile advertising business. The projected growth and high adoption of mobile in this African country, coinciding with the smartphone revolution triggered by the launch of iPhone in 2007 opened a new entrepreneurial horizon for the founder of the company, who reached the conclusion that ‘the future is mobile’. This dream led to the establishment of three digital businesses, designed for convergence and complementarity of medium and content. The mobile Ad subsidiary soon grew to become a truly African network with operations and campaigns across West, East and South Africa, successfully delivering campaigns in several African countries including Nigeria, Kenya, South Africa, Ghana, Uganda, Zimbabwe, and Zambia amongst others. The company recently declared a 40% year-end profit which was nine times that of the previous financial year. This study drew from an in-depth interview with the company’s founder, analysis of primary and secondary data from and about the business, as well as case studies of digital marketing campaigns. We hinge our analysis on the strategic intent concept which has been proposed to be an engine that drives the quest for sustainable strategic advantage in the global marketplace. Our goal was specifically to identify the strategic intents of the founder and how these were transformed creatively into processes that may have led to some distinct competitive advantages. Along with the strategic intents, we sought to identify the respective absorptive capacities that constituted favourable antecedents to the creation of such competitive advantages. Our recommendations and findings will be pivotal information for anybody wishing to invest in the world’s fastest technology business space - Africa.

Keywords: Africa, competitive advantage, competitive strategy, digital, mobile business, marketing, strategic intent

Procedia PDF Downloads 429
1789 Understanding the Dynamics of Human-Snake Negative Interactions: A Study of Indigenous Perceptions in Tamil Nadu, Southern India

Authors: Ramesh Chinnasamy, Srishti Semalty, Vishnu S. Nair, Thirumurugan Vedagiri, Mahesh Ganeshan, Gautam Talukdar, Karthy Sivapushanam, Abhijit Das

Abstract:

Snakes form an integral component of ecological systems. Human population explosion and associated acceleration of habitat destruction and degradation, has led to a rapid increase in human-snake encounters. The study aims at understanding the level of awareness, knowledge, and attitude of the people towards human-snake negative interaction and role of awareness programmes in the Moyar river valley, Tamil Nadu. The study area is part of the Mudumalai and the Sathyamangalam Tiger Reserves, which are significant wildlife corridors between the Western Ghats and the Eastern Ghats in the Nilgiri Biosphere Reserve. The data was collected using questionnaire covering 644 respondents spread across 18 villages between 2018 and 2019. The study revealed that 86.5% of respondents had strong negative perceptions towards snakes which were propelled by fear, superstitions, and threat of snakebite which was common and did not vary among different villages (F=4.48; p = <0.05) and age groups (X2 = 1.946; p = 0.962). Cobra 27.8% (n = 294) and rat snake 21.3% (n = 225) were the most sighted species and most snake encounter occurred during the monsoon season i.e., July 35.6 (n = 218), June 19.1% (n = 117) and August 18.4% (n = 113). At least 1 out of 5 respondents was reportedly bitten by snakes during their lifetime. The most common species of snakes that were the cause of snakebite were Saw scaled viper (32.6%, n = 42) followed by Cobra 17.1% (n = 22). About 21.3% (n = 137) people reported livestock loss due to pythons and other snakes 21.3% (n = 137). Most people, preferred medical treatment for snakebite (87.3%), whereas 12.7%, still believed in traditional methods. The majority (82.3%) used precautionary measure by keeping traditional items such as garlic, kerosene, and snake plant to avoid snakes. About 30% of the respondents expressed need for technical and monetary support from the forest department that could aid in reducing the human-snake conflict. It is concluded that the general perception in the study area is driven by fear and negative attitude towards snakes. Though snakes such as Cobra were widely worshiped in the region, there are still widespread myths and misconceptions that have led to the irrational killing of snakes. Awareness and innovative education programs rooted in the local context and language should be integrated at the village level, to minimize risk and the associated threat of snakebite among the people. Results from this study shall help policy makers to devise appropriate conservation measures to reduce human-snake conflicts in India.

Keywords: Envenomation, Health-Education, Human-Wildlife Conflict, Neglected Tropical Disease, Snakebite Mitigation, Traditional Practitioners

Procedia PDF Downloads 211
1788 Internet of Assets: A Blockchain-Inspired Academic Program

Authors: Benjamin Arazi

Abstract:

Blockchain is the technology behind cryptocurrencies like Bitcoin. It revolutionizes the meaning of trust in the sense of offering total reliability without relying on any central entity that controls or supervises the system. The Wall Street Journal states: “Blockchain Marks the Next Step in the Internet’s Evolution”. Blockchain was listed as #1 in Linkedin – The Learning Blog “most in-demand hard skills needed in 2020”. As stated there: “Blockchain’s novel way to store, validate, authorize, and move data across the internet has evolved to securely store and send any digital asset”. GSMA, a leading Telco organization of mobile communications operators, declared that “Blockchain has the potential to be for value what the Internet has been for information”. Motivated by these seminal observations, this paper presents the foundations of a Blockchain-based “Internet of Assets” academic program that joins under one roof leading application areas that are characterized by the transfer of assets over communication lines. Two such areas, which are pillars of our economy, are Fintech – Financial Technology and mobile communications services. The next application in line is Healthcare. These challenges are met based on available extensive professional literature. Blockchain-based assets communication is based on extending the principle of Bitcoin, starting with the basic question: If digital money that travels across the universe can ‘prove its own validity’, can this principle be applied to digital content. A groundbreaking positive answer here led to the concept of “smart contract” and consequently to DLT - Distributed Ledger Technology, where the word ‘distributed’ relates to the non-existence of reliable central entities or trusted third parties. The terms Blockchain and DLT are frequently used interchangeably in various application areas. The World Bank Group compiled comprehensive reports, analyzing the contribution of DLT/Blockchain to Fintech. The European Central Bank and Bank of Japan are engaged in Project Stella, “Balancing confidentiality and auditability in a distributed ledger environment”. 130 DLT/Blockchain focused Fintech startups are now operating in Switzerland. Blockchain impact on mobile communications services is treated in detail by leading organizations. The TM Forum is a global industry association in the telecom industry, with over 850 member companies, mainly mobile operators, that generate US$2 trillion in revenue and serve five billion customers across 180 countries. From their perspective: “Blockchain is considered one of the digital economy’s most disruptive technologies”. Samples of Blockchain contributions to Fintech (taken from a World Bank document): Decentralization and disintermediation; Greater transparency and easier auditability; Automation & programmability; Immutability & verifiability; Gains in speed and efficiency; Cost reductions; Enhanced cyber security resilience. Samples of Blockchain contributions to the Telco industry. Establishing identity verification; Record of transactions for easy cost settlement; Automatic triggering of roaming contract which enables near-instantaneous charging and reduction in roaming fraud; Decentralized roaming agreements; Settling accounts per costs incurred in accordance with agreement tariffs. This clearly demonstrates an academic education structure where fundamental technologies are studied in classes together with these two application areas. Advanced courses, treating specific implementations then follow separately. All are under the roof of “Internet of Assets”.

Keywords: blockchain, education, financial technology, mobile telecommunications services

Procedia PDF Downloads 169
1787 A Road Map of Success for Differently Abled Adolescent Girls Residing in Pune, Maharashtra, India

Authors: Varsha Tol, Laila Garda, Neelam Bhardwaj, Malata Usar

Abstract:

In India, differently- abled girls suffer from a “dual stigma” of being female and physically challenged. The general consensus is that they are incapable of standing on their own two feet. It was observed that these girls do not have access to educational programs as most hostels do not keep them after the tenth grade. They are forced to return to a life of poverty and are often considered a liability by their families. Higher education is completely ignored. Parents focus on finding a husband and passing on their ‘burden’ to someone else. An innovative, intervention for differently-abled adolescent girls with the express purpose of mainstreaming them into society was started by Helplife. The objective was to enrich the lives of these differently abled adolescent girls through precise research, focused intervention and professionalism. This programme addresses physical, mental and social rehabilitation of the girls who come from impoverished backgrounds. These adolescents are reached by word of mouth, snowball technique and through the network of the NGO. Applications are invited from potential candidates which are scrutinized by a panel of experts. Selection criteria include her disability, socio-economic status, and desire and drive to make a difference in her own life. The six main areas of intervention are accommodation, education, health, professional courses, counseling and recreational activities. Each girl on an average resides in Helplife for a period of 2-3 years. Analysis of qualitative data collected at various time points indicates holistic development of character. A quality of life questionnaire showed a significant improvement in scores at three different time points in 75% of the current population under intervention i.e. 19 girls. Till date, 25 girls have successfully passed out from the intervention program completing their graduation/post-graduation. Currently, we have 19 differently abled girls housed in three flats in Pune district of Maharashtra. Out of which 14 girls are pursuing their graduation or post-graduation. Six of the girls are working in jobs in various sectors. In conclusion it may be noted with adequate support and guidance the sky is the limit. This journey of 12 years has been a learning for us with ups and downs modifying the intervention at every step. Helplife has a belief of impacting positively, individual lives of differently abled girls in order to empower them in a holistic manner. The intervention has a positive impact on differently abled girls. They serve as role models to other differently abled girls indicating that this is a road map to success by getting empowered to live with full potential and get integrated in the society in a dignified way.

Keywords: differently-abled, dual-stigma, empowerment, youth

Procedia PDF Downloads 153