Search results for: personal authentication
2071 Nature of the Prohibition of Discrimination on Grounds of Sexual Orientation in EU Law
Authors: Anna Pudlo
Abstract:
The EU law encompasses many supranational legal systems (EU law, ECHR, international public law and constitutional traditions common to the Member States) which guarantee the protection of fundamental rights, with partly overlapping scopes of applicability, various principles of interpretation of legal norms and a different hierarchy. In EU law, the prohibition of discrimination on grounds of sexual orientation originates from both the primary and secondary EU legislation. At present, the prohibition is considered to be a fundamental right in pursuance of Article 21 of the Charter, but the Court has not yet determined whether it is a right or a principle within the meaning of the Charter. Similarly, the Court has not deemed this criterion to be a general principle of EU law. The personal and materials scope of the prohibition of discrimination on grounds of sexual orientation based on Article 21 of the Charter requires each time to be specified in another legal act of the EU in accordance with Article 51 of the Charter. The effect of the prohibition of discrimination on grounds of sexual orientation understood as above will be two-fold, for the States and for the Union. On the one hand, one may refer to the legal instruments of review of EU law enforcement by a Member State laid down in the Treaties. On the other hand, EU law does not provide for the right to individual petition. Therefore, it is the duty of the domestic courts to protect the right of a person not to be discriminated on grounds of sexual orientation in line with the national procedural rules, within the limits and in accordance with the principles set out in EU law, in particular in Directive 2000/78. The development of the principle of non-discrimination in the Court’s case-law gives rise to certain doubts as to its applicability, namely whether the principle as the general principle of EU law may be granted an autonomous character, with respect to the applicability to matters not included in the personal or material scope of the Directives, although within the EU’s competence. Moreover, both the doctrine and the opinions of the Advocates-General have called for the general competence of CJEU with regard to fundamental rights which, however, might lead to a violation of the principle of separation of competence. The aim of this paper is to answer the question what is the nature of the prohibition of discrimination on grounds of sexual orientation in EU law (a general principle in EU law, or a principle or right under the Charter’s terminology). Therefore, the paper focuses on the nature of Article 21 of the Charter (a right or a principle) and the scope (personal and material) of the prohibition of discrimination based on sexual orientation in EU law as well as its effect (vertical or horizontal). The study has included the provisions of EU law together with the relevant CJEU case-law.Keywords: EU law, EU principles, non-discrimination in EU law, Charter of the Fundamental Rights
Procedia PDF Downloads 2452070 Integrated Model for Enhancing Data Security Performance in Cloud Computing
Authors: Amani A. Saad, Ahmed A. El-Farag, El-Sayed A. Helali
Abstract:
Cloud computing is an important and promising field in the recent decade. Cloud computing allows sharing resources, services and information among the people of the whole world. Although the advantages of using clouds are great, but there are many risks in a cloud. The data security is the most important and critical problem of cloud computing. In this research a new security model for cloud computing is proposed for ensuring secure communication system, hiding information from other users and saving the user's times. In this proposed model Blowfish encryption algorithm is used for exchanging information or data, and SHA-2 cryptographic hash algorithm is used for data integrity. For user authentication process a user-name and password is used, the password uses SHA-2 for one way encryption. The proposed system shows an improvement of the processing time of uploading and downloading files on the cloud in secure form.Keywords: cloud Ccomputing, data security, SAAS, PAAS, IAAS, Blowfish
Procedia PDF Downloads 4772069 Legal Issues of Collecting and Processing Big Health Data in the Light of European Regulation 679/2016
Authors: Ioannis Iglezakis, Theodoros D. Trokanas, Panagiota Kiortsi
Abstract:
This paper aims to explore major legal issues arising from the collection and processing of Health Big Data in the light of the new European secondary legislation for the protection of personal data of natural persons, placing emphasis on the General Data Protection Regulation 679/2016. Whether Big Health Data can be characterised as ‘personal data’ or not is really the crux of the matter. The legal ambiguity is compounded by the fact that, even though the processing of Big Health Data is premised on the de-identification of the data subject, the possibility of a combination of Big Health Data with other data circulating freely on the web or from other data files cannot be excluded. Another key point is that the application of some provisions of GPDR to Big Health Data may both absolve the data controller of his legal obligations and deprive the data subject of his rights (e.g., the right to be informed), ultimately undermining the fundamental right to the protection of personal data of natural persons. Moreover, data subject’s rights (e.g., the right not to be subject to a decision based solely on automated processing) are heavily impacted by the use of AI, algorithms, and technologies that reclaim health data for further use, resulting in sometimes ambiguous results that have a substantial impact on individuals. On the other hand, as the COVID-19 pandemic has revealed, Big Data analytics can offer crucial sources of information. In this respect, this paper identifies and systematises the legal provisions concerned, offering interpretative solutions that tackle dangers concerning data subject’s rights while embracing the opportunities that Big Health Data has to offer. In addition, particular attention is attached to the scope of ‘consent’ as a legal basis in the collection and processing of Big Health Data, as the application of data analytics in Big Health Data signals the construction of new data and subject’s profiles. Finally, the paper addresses the knotty problem of role assignment (i.e., distinguishing between controller and processor/joint controllers and joint processors) in an era of extensive Big Health data sharing. The findings are the fruit of a current research project conducted by a three-member research team at the Faculty of Law of the Aristotle University of Thessaloniki and funded by the Greek Ministry of Education and Religious Affairs.Keywords: big health data, data subject rights, GDPR, pandemic
Procedia PDF Downloads 1292068 Forensic Study on Personal Identification of Pakistani Population by Individualizing Characteristics of Footprints
Authors: Muneeba Butt
Abstract:
One of the most important physical evidence which leaves suspects at the crime scene is footprints. Analysis of footprints, which can provide useful information for personal identification, is helpful in crime scene investigation. For the current study, 200 samples collected (144 male and 56 female) from Pakistani population with a consent form. The footprints were collected by using black ink with an ink pad. The entire samples were photographed, and then the magnifying glass was used for visualization of individual characteristics including detail of toes, humps, phalange mark, and flat foot cracks in footprint patterns. The descriptive results of individualizing characteristics features were presented in tabular form with respective frequency and percentage. In the result in the male population, the prevalence of tibialis type (T-type) is highest. In the female population, the prevalence of midularis type (M-type) is highest. Humps on the first toe are more found in the male population rather than other humps. In the female population, humps on the third toe are more found rather than other humps. In the male population, the prevalence of phalange mark by toe 1 is highest followed by toe 3, toe 5, toe 2, toe 4 and in female population the prevalence of phalange mark by toe 1 is highest followed by toe 5, 4, 3 and 2. Creases marks are found highest in male population as compared to the female population.Keywords: foot prints, toes, humps, cracks
Procedia PDF Downloads 1632067 Identity Conflict between Social and Business Entrepreneurs: The Challenge of Constructing a Novel Social Identity
Authors: Rui G. Serôdio, Carina Martins, Alexandra Serra, José A. Lima, Luísa Catita, Paula Lopes
Abstract:
Building on social identity approach, we tested the impact of social categorization and comparison in the psychosocial process by which social entrepreneurs define their group identity. Specifically, we address how both differentiation and assimilation processes are set of in the context of constructing a novel, distinctive and socially salient – social entrepreneurs. As part of a larger research line, a quasi-experimental study with Social and Business Entrepreneurs, as well as “Lay People” provided evidence consistent with our predictions: (1) Social Entrepreneurs, in contrast with Lay People and Business Entrepreneurs, value more strongly social identity than personal identity, and the later is the only group that values Personal Differentiation; (2) unlike Entrepreneurs, Social Entrepreneurs display an ingroup bias across group evaluations; (3) Lay People, display a self-serving bias, although, overall, they allocate a more positive image to the target groups; (4) combining own vs. others evaluations across all groups, Social Entrepreneurs receive the more positive value. From the standpoint of social identity and self-categorization theories and their approach to group process, we discuss the processes of intergroup comparison and differentiation as core processes in the construction of a positive social identity. We illustrate it within the context of social entrepreneurship, a political and social “wave” that flows across Europe at this time.Keywords: group processes, social entrepreneurship, social identity, business entrepreneurs
Procedia PDF Downloads 6952066 Personalized Climate Change Advertising: The Role of Augmented Reality (A.R.) Technology in Encouraging Users for Climate Change Action
Authors: Mokhlisur Rahman
Abstract:
The growing consensus among scientists and world leaders indicates that immediate action should be considered regarding the climate change phenomenon. However, climate change is no more a global issue but a personal one. Thus, individual participation is necessary to address such a significant issue. Studies show that individuals who perceive climate change as a personal issue are more likely to act toward it. This abstract presents augmented reality (A.R.) technology in the social media platform Facebook video advertising. The idea involves creating a video advertisement that enables users to interact with the video by navigating its features and experiencing the result uniquely and engagingly. This advertisement uses A.R. to bring changes, such as people making changes in real-life scenarios by simple clicks on the video and hearing an instant rewarding fact about their choices. The video shows three options: room, lawn, and driveway. Users select one option and engage in interaction based on while holding the camera in their personal spaces: Suppose users select the first option, room, and hold their camera toward spots such as by the windows, balcony, corners, and even walls. In that case, the A.R. offers users different plants appropriate for those unoccupied spaces in the room. Users can change the options of the plants and see which space at their house deserves a plant that makes it more natural. When a user adds a natural element to the video, the video content explains a piece of beneficiary information about how the user contributes to the world more to be livable and why it is necessary. With the help of A.R., if users select the second option, lawn, and hold their camera toward their lawn, the options are various small trees for their lawn to make it more environmentally friendly and decorative. The video plays a beneficiary explanation here too. Suppose users select the third option, driveway, and hold their camera toward their driveway. In that case, the A.R. video option offers unique recycle bin designs using A.I. measurement of spaces. The video plays audio information on anthropogenic contribution to greenhouse gas emission. IoT embeds tracking code in the video ad on Facebook, which stores the exact number of views in the cloud for data analysis. An online survey at the end collects short qualitative answers. This study helps understand the number of users involved and willing to change their behavior; It makes personalized advertising in social media. Considering the current state of climate change, the urgency for action is increasing. This ad increases the chance to make direct connections with individuals and gives a sense of personal responsibility for climate change to actKeywords: motivations, climate, iot, personalized-advertising, action
Procedia PDF Downloads 732065 Transcending the Boundary of Traumas: Spatial Trauma in Richard Powers' 'The Echo Maker'
Authors: Nodi Islam
Abstract:
This paper critically reads Richard Powers’ novel The Echo Maker to read and understand the personal traumas of the characters in the novel depending on the various situations they face throughout the story. Also, the paper attempts to read different traumas and disorders due to their different situations. With a focus on the individual experiences, this paper addresses the core issues of trauma, which triggers their reactions and reads the novel through theories of Freud, Caruth, and other critics in this field. While transcending the boundary of personal and collective trauma, this paper suggests that traumas not only arise from the core mental issues, from both past or present memories; it also depends on places too which can be called, according to Yi-Fu Tuan, topophobia. Intimate places such as home provoke not only attachment and expectation but also produce fear in a person. Failure in identifying with such places means losing a central piece of identity of the individual. In order to analyse the traumas in the novel, the characters’ association with homes and places has been provided. This paper attempts to suggest that people are not traumatised because of what Freud explained as unpleasant memories of the past but also intimacy and lost identities related to a place can trigger trauma.Keywords: spatial trauma, traumatic stress disorder, identity and place, core mental issues
Procedia PDF Downloads 1492064 The Social Structuring of Mate Selection: Assortative Marriage Patterns in the Israeli Jewish Population
Authors: Naava Dihi, Jon Anson
Abstract:
Love, so it appears, is not socially blind. We show that partner selection is socially constrained, and the freedom to choose is limited by at least two major factors or capitals: on the one hand, material resources and education, locating the partners on a scale of personal achievement and economic independence. On the other, the partners' ascriptive belonging to particular ethnic, or origin, groups, differentiated by the groups' social prestige, as well as by their culture, history and even physical characteristics. However, the relative importance of achievement and ascriptive factors, as well as the overlap between them, varies from society to society, depending on the society's structure and the factors shaping it. Israeli social structure has been shaped by the waves of new immigrants who arrived over the years. The timing of their arrival, their patterns of physical settlement and their occupational inclusion or exclusion have together created a mosaic of social groups whose principal common feature has been the country of origin from which they arrived. The analysis of marriage patterns helps illuminate the social meanings of the groups and their borders. To the extent that ethnic group membership has meaning for individuals and influences their life choices, the ascriptive factor will gain in importance relative to the achievement factor in their choice of marriage partner. In this research, we examine Jewish Israeli marriage patterns by looking at the marriage choices of 5,041 women aged 15 to 49 who were single at the census in 1983, and who were married at the time of the 1995 census, 12 years later. The database for this study was a file linking respondents from the 1983 and the 1995 censuses. In both cases, 5 percent of household were randomly chosen, so that our sample includes about 4 percent of women in Israel in 1983. We present three basic analyses: (1) Who was still single in 1983, using personal and household data from the 1983 census (binomial model), (2) Who married between 1983 and a1995, using personal and household data from the 1983 census (binomial model), (3) What were the personal characteristics of the womens’ partners in 1995, using data from the 1995 census (loglinear model). We show (i) that material and cultural capital both operate to delay marriage and to increase the probability of remaining single; and (ii) while there is a clear association between ethnic group membership and education, endogamy and homogamy both operate as separate forces which constraint (but do not determine) the choice of marriage partner, and thus both serve to reproduce the current pattern of relationships, as well as identifying patterns of proximity and distance between the different groups.Keywords: Israel, nuptiality, ascription, achievement
Procedia PDF Downloads 1152063 Interpersonal Emotion Regulation in Adolescence: An Enhanced Critical Incident Study
Authors: Setareh Shayanfar
Abstract:
Given the increasing importance of peer relationships during adolescence, the present study aimed to examine peer interactions that facilitate or hinder adolescents’ regulation of negative emotions. Using the Enhanced Critical Incident Technique, 1-hour semi-structured interviews were conducted with 16 junior high school adolescents. Participants were asked to recall situations when they experienced strong negative emotions during the past school year, indicate the peer interactions that helped or hindered their emotion regulation, and identify prospective interactions with the potential to help regulate their emotions. Data analysis extracted 182 critical incidents, including 109 helping incidents, 45 hindering incidents, and 28 wish list items, which generated 10 categories nested within four overarching themes: Positive Personal Support included (a) supportive presence, (b) expressing concern, (c) empathizing, and (d) encouraging and cheering up; while Strategy Transmission included (e) sharing perspective, and (f) giving advice; Activated Support included (g) taking action, and (h) distracting; while Negative Personal Interactions included (i) withdrawing and (j) punishing. Implications for mental health and service providers, as well as recommendations for future research, are presented.Keywords: adolescence, emotion regulation, enhanced critical incident technique, peers
Procedia PDF Downloads 1442062 Human Digital Twin for Personal Conversation Automation Using Supervised Machine Learning Approaches
Authors: Aya Salama
Abstract:
Digital Twin is an emerging research topic that attracted researchers in the last decade. It is used in many fields, such as smart manufacturing and smart healthcare because it saves time and money. It is usually related to other technologies such as Data Mining, Artificial Intelligence, and Machine Learning. However, Human digital twin (HDT), in specific, is still a novel idea that still needs to prove its feasibility. HDT expands the idea of Digital Twin to human beings, which are living beings and different from the inanimate physical entities. The goal of this research was to create a Human digital twin that is responsible for real-time human replies automation by simulating human behavior. For this reason, clustering, supervised classification, topic extraction, and sentiment analysis were studied in this paper. The feasibility of the HDT for personal replies generation on social messaging applications was proved in this work. The overall accuracy of the proposed approach in this paper was 63% which is a very promising result that can open the way for researchers to expand the idea of HDT. This was achieved by using Random Forest for clustering the question data base and matching new questions. K-nearest neighbor was also applied for sentiment analysis.Keywords: human digital twin, sentiment analysis, topic extraction, supervised machine learning, unsupervised machine learning, classification, clustering
Procedia PDF Downloads 872061 Halal Authentication for Some Product Collected from Jordanian Market Using Real-Time PCR
Authors: Omar S. Sharaf
Abstract:
The mitochondrial 12s rRNA (mt-12s rDNA) gene for pig-specific was developed to detect material from pork species in different products collected from Jordanian market. The amplification PCR products of 359 bp and 531 bp were successfully amplified from the cyt b gene of pig the amplification product using mt-12S rDNA gene were successfully produced a single band with a molecular size of 456 bp. In the present work, the PCR amplification of mtDNA of cytochrome b has been shown as a suitable tool for rapid detection of pig DNA. 100 samples from different dairy, gelatin and chocolate based products and 50 samples from baby food formula were collected and tested to a presence of any pig derivatives. It was found that 10% of chocolate based products, 12% of gelatin and 56% from dairy products and 5.2% from baby food formula showed single band from mt-12S rDNA gene.Keywords: halal food, baby infant formula, chocolate based products, PCR, Jordan
Procedia PDF Downloads 5332060 A Comparative Study of Burnout and Coping Strategies between HIV Counselors: Face to Face and Online Counseling Services in Addis Ababa
Authors: Yemisrach Mihertu Amsale
Abstract:
The purpose of this study was to compare burnout and coping strategies between HIV counselors in face to face and online counseling settings in Addis Ababa. The study was mixed approach design that was quantitative and qualitative. For the quantitative data the participants involved in this study included 64 face to face and 47 online HIV counselors in both counseling settings. In addition, 23 participants were involved to offer qualitative data from both counseling settings. For the purpose of gathering the quantitative data, the instruments, namely, demographic questionnaire, Maslach Burnout Inventory and the COPE questionnaire, were used to gather quantitative data. Qualitative data was also gathered in the FGD Guide and Interview Guide. Thus, this study revealed that HIV counselors in online counseling settings scored high on emotional exhaustion, depersonalization and low in personal accomplishment dimensions of burnout as compared to HIV counselors in face to face setting and the difference was statistically significant in emotional exhaustion and personal accomplishment, but there was no a significant difference on depersonalization dimension of burnout between the two groups. In addition, the present study revealed a statistically significant difference on problem focused coping strategy between the two groups and yet for on the emotion focused coping strategy the difference was not statistically significant. Statistically negative correlation was observed between some demographic variables such as age with emotional exhaustion and depersonalization dimensions of burnout; years of experiences and personal accomplishment dimension of burnout. A statistically positive correlation was also observed between average number of clients served per day and emotional exhaustion. Sex was having a statistically positive correlation with coping strategy. Lastly, a significant positive correlation was also observed in the emotional exhaustion dimension of the burnout and the emotional focused coping strategy. Generally, this study has shown that HIV counselors suffer from moderate to high level of burnout. Based on the findings, conclusions were made and recommendations were forwarded.Keywords: counseling, burnout management, psychological, behavioral sciences
Procedia PDF Downloads 3042059 An Ethnographic Study on Peer Support Work-Ers in a Peer Driven Non Governmental Organization: The Colorado Mental Wellness Network
Authors: Shawna M. Margesson
Abstract:
This research study seeks to explore the lived experience of peer support workers (PSWs) in a peer-led non-governmental organization in Denver, Colorado, USA. The Colorado Mental Wellness Network offers supportive wellness recovery services such as wellness recovery action plans (WRAP), advocacy trainings for anti-stigma campaigns, and PSWs to work with and for consumers in the community. This study suggests that a peer-run environment is a unique community setting for PSWs to work given all employees are living in mental wellness recovery. Little has been documented about PSWs' personal accounts of working within a recovery-oriented organization and their first-person accounts to working with consumers. The importance of this study is to provide an ethnographic account of both subjects; the lived experiences of PSWs of both organizational and consumer-driven recovery. This study seeks to add to the literature and the social work profession the personal accounts of PSWs as they provide services to others like themselves. It also will provide an additional lens to view the peer-driven movement in mental health and wellness recovery.Keywords: peer to peer movement, mental health, ethnography, peer support workers
Procedia PDF Downloads 1642058 Level of Roles Performed in Tourism Development: The Case Study of Local Municipality, Chiang Khan District, Loei
Authors: Sukanya Sripho
Abstract:
This paper aims to examine the level of roles performed in tourism development by local people residing in Chiang Khan Sub-District Municipality, Loei Province in Northeast of Thailand. In addition, this study also tested whether personal factors had a relationship with the level of roles performed in tourism development. These personal factors included gender, age, educational level, career, position and duty in the community, average income per month, length of residence and involvement in the tourism industry. The findings revealed a high level in each role performed. These roles were ranked from the highest mean score to the lowest mean score as follows: (1) improving and rejuvenating tourist attractions; (2) improving tourist facilities; (3) promoting people participation; (4) publicizing tourist attractions; (5) protecting for safety and security; and (6) surveying and managing the information of tourist attractions. Furthermore, it was found that position and duty in the community, length of residence and involvement in tourism industry had a relationship with the level of roles performed in tourism development at a significance level of 0.05.Keywords: Role, local municipality administration, tourism development, Thailand
Procedia PDF Downloads 4402057 Genetic Counseling for Severe Mental Disorders. Integrating Innovative Services and Prophylactic Interventions in an Online Platform - MENTALICA
Authors: Ramona Moldovan, Doina Cosman, Sebastian Moldovan, Radu Popp, Victor Pop
Abstract:
MENTALICA is a project aimed at developing and evaluating a platform that can assist individuals diagnosed with severe mental disorders and their families in managing the consequences associated with severe mental disorders, recurrence risks, prevention strategies and treatment options. MENTALICA is a platform based on guidance issued by some of the most prominent scientific organizations in the world. In order to personalize the information provided, the program explores details about the personal and family history of mental disorders. MENTALICA summarizes the answers and gives respondents a personal assessment. This includes personalized information and support about schizophrenia, bipolar disorder and schizoaffective disorder. MENTALICA includes several modules: Family history tools, Risk assessment tools and Risk factor sheets, Practical guides for patients, Practical guides for families, Guidelines for clinicians. Currently, there are no available guidelines for genetic counselling for mental disorders. Respondents can print out their reports and discuss them with family members or their doctors. We will briefly present the current status of MENTALICA and its implications for patients, professionals and the community.Keywords: genetic counseling, mental disorders, platform
Procedia PDF Downloads 4882056 Experiencing the Shattered: Managing Countertransference Experiences with Anorexia Patients in Psychotherapy
Authors: M. Card
Abstract:
Working with anorexia patients can be a challenging experience for mental and health care professionals. The reasons for not wanting to work with this patient population stems from the numerous concerns surrounding the patient’s health – physically and mentally. Many health care professionals reported having strong negative feelings, such as; anger, hopelessness and helplessness when working with anorexia patients. These feelings often impaired their judgement to treatment and affected how they related to the patient. This research focused on psychotherapists who preferred to work with anorexia patients; what countertransference feelings were evoked in them during sessions with patients and most importantly, how they managed the feelings. The research used interpretative phenomenological analysis (IPA) as the theoretical framework and data analysis method. Semi-structured interviews were used with ten experienced psychotherapists to obtain their countertransference experiences with anorexia patients and how they manage it. There were three main themes discovered; (1) the use of supervision, (2) their own personal therapy and finally (3) experience and evolution. The research unearthed that experienced psychotherapists also experienced strong countertransference feelings towards their patients; some positive and some negative. However, these feelings could actually be interpreted as co-transference with their anorexia patients. The psychotherapists were able to own their part in the evocative unconscious nature of a relational therapeutic space, where their personal issues may be entangled in their anorexia patient’s symptomatology.Keywords: anorexia nervosa, countertransference, co-transference, psychotherapy, relational psychotherapy
Procedia PDF Downloads 1652055 Understanding the Experience of the Visually Impaired towards a Multi-Sensorial Architectural Design
Authors: Sarah M. Oteifa, Lobna A. Sherif, Yasser M. Mostafa
Abstract:
Visually impaired people, in their daily lives, face struggles and spatial barriers because the built environment is often designed with an extreme focus on the visual element, causing what is called architectural visual bias or ocularcentrism. The aim of the study is to holistically understand the world of the visually impaired as an attempt to extract the qualities of space that accommodate their needs, and to show the importance of multi-sensory, holistic designs for the blind. Within the framework of existential phenomenology, common themes are reached through "intersubjectivity": experience descriptions by blind people and blind architects, observation of how blind children learn to perceive their surrounding environment, and a personal lived blind-folded experience are analyzed. The extracted themes show how visually impaired people filter out and prioritize tactile (active, passive and dynamic touch), acoustic and olfactory spatial qualities respectively, and how this happened during the personal lived blind folded experience. The themes clarify that haptic and aural inclusive designs are essential to create environments suitable for the visually impaired to empower them towards an independent, safe and efficient life.Keywords: architecture, architectural ocularcentrism, multi-sensory design, visually impaired
Procedia PDF Downloads 2022054 The Relationship between Basic Human Needs and Opportunity Based on Social Progress Index
Authors: Ebru Ozgur Guler, Huseyin Guler, Sera Sanli
Abstract:
Social Progress Index (SPI) whose fundamentals have been thrown in the World Economy Forum is an index which aims to form a systematic basis for guiding strategy for inclusive growth which requires achieving both economic and social progress. In this research, it has been aimed to determine the relations among “Basic Human Needs” (BHN) (including four variables of ‘Nutrition and Basic Medical Care’, ‘Water and Sanitation’, ‘Shelter’ and ‘Personal Safety’) and “Opportunity” (OPT) (that is composed of ‘Personal Rights’, ‘Personal Freedom and Choice’, ‘Tolerance and Inclusion’, and ‘Access to Advanced Education’ components) dimensions of 2016 SPI for 138 countries which take place in the website of Social Progress Imperative by carrying out canonical correlation analysis (CCA) which is a data reduction technique that operates in a way to maximize the correlation between two variable sets. In the interpretation of results, the first pair of canonical variates pointing to the highest canonical correlation has been taken into account. The first canonical correlation coefficient has been found as 0.880 indicating to the high relationship between BHN and OPT variable sets. Wilk’s Lambda statistic has revealed that an overall effect of 0.809 is highly large for the full model in order to be counted as statistically significant (with a p-value of 0.000). According to the standardized canonical coefficients, the largest contribution to BHN set of variables has come from ‘shelter’ variable. The most effective variable in OPT set has been detected to be ‘access to advanced education’. Findings based on canonical loadings have also confirmed these results with respect to the contributions to the first canonical variates. When canonical cross loadings (structure coefficients) are examined, for the first pair of canonical variates, the largest contributions have been provided by ‘shelter’ and ‘access to advanced education’ variables. Since the signs for structure coefficients have been found to be negative for all variables; all OPT set of variables are positively related to all of the BHN set of variables. In case canonical communality coefficients which are the sum of the squares of structure coefficients across all interpretable functions are taken as the basis; amongst all variables, ‘personal rights’ and ‘tolerance and inclusion’ variables can be said not to be useful in the model with 0.318721 and 0.341722 coefficients respectively. On the other hand, while redundancy index for BHN set has been found to be 0.615; OPT set has a lower redundancy index with 0.475. High redundancy implies high ability for predictability. The proportion of the total variation in BHN set of variables that is explained by all of the opposite canonical variates has been calculated as 63% and finally, the proportion of the total variation in OPT set that is explained by all of the canonical variables in BHN set has been determined as 50.4% and a large part of this proportion belongs to the first pair. The results suggest that there is a high and statistically significant relationship between BHN and OPT. This relationship is generally accounted by ‘shelter’ and ‘access to advanced education’.Keywords: canonical communality coefficient, canonical correlation analysis, redundancy index, social progress index
Procedia PDF Downloads 2182053 Selecting Special Education as a Career: A Qualitative Study of Motivating Factors for Special Education Teachers
Authors: Jennifer Duffy, Liz Fleming
Abstract:
Teacher shortage in special education is an American educational problem. Due to the implementation of The No Child Left Behind Act (2001) and The Individuals with Disabilities Education Improvement Act (2004), there has been an increase in the number of students requiring special education services. Consequently, there has been an influx to hire more special education teachers. However, the historic challenge of hiring certified special education teachers has been intensified with this the profession’s increasing demand of positions to fill. Efforts to improve recruitment and entry into the field must be informed by an understanding of the factors that initially inspire special education teachers to choose this career pathway. Hence, an understanding of reasons why teachers select special education as a profession is needed. The purpose of this study was to explore personal, academic, and professional motivations that lead to the selection of special education as a career choice. Using the grounded theory approach, this research investigation examined the factors that were most instrumental in influencing applicants to select special education as a career choice. Over one hundred de-identified graduate school applications to Bay Path University’s Graduate Special Education Programs from 2014- 2017 were qualitatively analyzed. Grounded coding was used to discover themes that emerged in applicants’ admissions essays explaining why he/she was pursuing a career in special education. The central themes that were most influential in applicants’ selection of special education as a career trajectory were (a) personal/familial connections to disability, (b) meaningful paraprofessional experiences working with disabled children, (c) aptitudes for teaching, and (d) finding personal rewards and professional fulfillment by advocating for vulnerable children. Implications from these findings include educating family members of children with disabilities about possible career tracks in special education, designing programs for paraprofessionals to become certified teachers, exposing prospective teacher candidates to the field of special education, and recruiting professionals from the human services field who seek to improve the quality of life and educational opportunities for children with special needs.Keywords: career choice, professional pathways to teaching children with disabilities, special education, teacher recruitment
Procedia PDF Downloads 2952052 Luxury in Fashion: Visual Analysis on Bag Advertising
Authors: Lama Ajinah
Abstract:
Luxury brands witnessed continuous growth which followed women’s desire towards individual distinctiveness and social glare. Bags are a woman’s best friend either for aesthetic or functional purposes when she leaves her home for leisure or work. One way of women constant aspiration for being distinguished while reflecting their wealth is through handbags. Subsequently, the demand and attraction by consumers towards the dazzle of luxurious brands for personal pleasure and social status have flourished. According to the literature review, a visual analysis on luxury brands has been explored yet a focus on bags was not discussed in details. Hence, a deep analysis will be dedicated on the two segments by showcasing examples of high-end bag advertising. The research is conducted to understand advertising strategies used in promoting for luxurious products. Furthermore, the paper explores the definition of the term luxury, the condition in which it is used in, and the visual language used along with the term. As luxury is an indicator of superior satisfaction, it is obtained on two levels: a personal and a social level. The examples of luxury brand ads are selected from the last five years to uncover the latest, most common strategies used to promote for luxurious brands. The methods employed in this paper consist of literature review, semiotic analysis, and content analysis. The researcher concludes with revealing the methods used in advertising while categorizing them into various themes.Keywords: advertising, brands, fashion, graphic design, luxury, semiotic analysis, semiology, visual analysis, visual communication
Procedia PDF Downloads 2442051 Work-Life Balance and Job Satisfaction among Female Professionals: A Study at a Government Hospital
Authors: Mohd Sarfaraz
Abstract:
The objective of this study is to investigate the work-life balance and job satisfaction among women employees in a hospital in India. It is believed that balancing a successful career with a family life or personal life can be challenging. WLB impacts on persons' satisfaction in their work and personal life roles. For this purpose, a questionnaire is developed with 22 items. The data collected from women employees who are working in a hospital in Aligarh, India. The constructs considered in this study include WLB and job satisfaction. The demographic and organisational variables considered in the study are genders, age and tenure of the job. Factors of WLB are flexible working conditions, work-life balance programs, and employee intention to change/leave a job, work pressure/stress and long working hours. This paper examines the relationship between work-family conflict, policies, and job and life satisfaction. Appropriate statistical tool using SPSS will be applied to achieve the objective. The anxiety over work-life balance is progressively becoming a common talk, especially for female employees.Increasing demands from the work and family domains represent a high strain for employees which even lead to the health problems among employees. Although it is believed that work-family role strain is more common among women employees. Therefore, the study will focus on these issues of WLB and job satisfaction among female professionals.Keywords: work-life balance, job satisfaction, work- family conflict, health
Procedia PDF Downloads 2912050 Integrated Model for Enhancing Data Security Processing Time in Cloud Computing
Authors: Amani A. Saad, Ahmed A. El-Farag, El-Sayed A. Helali
Abstract:
Cloud computing is an important and promising field in the recent decade. Cloud computing allows sharing resources, services and information among the people of the whole world. Although the advantages of using clouds are great, but there are many risks in a cloud. The data security is the most important and critical problem of cloud computing. In this research a new security model for cloud computing is proposed for ensuring secure communication system, hiding information from other users and saving the user's times. In this proposed model Blowfish encryption algorithm is used for exchanging information or data, and SHA-2 cryptographic hash algorithm is used for data integrity. For user authentication process a simple user-name and password is used, the password uses SHA-2 for one way encryption. The proposed system shows an improvement of the processing time of uploading and downloading files on the cloud in secure form.Keywords: cloud computing, data security, SAAS, PAAS, IAAS, Blowfish
Procedia PDF Downloads 3582049 An Unexpected Helping Hand: Consequences of Redistribution on Personal Ideology
Authors: Simon B.A. Egli, Katja Rost
Abstract:
Literature on redistributive preferences has proliferated in past decades. A core assumption behind it is that variation in redistributive preferences can explain different levels of redistribution. In contrast, this paper considers the reverse. What if it is redistribution that changes redistributive preferences? The core assumption behind the argument is that if self-interest - which we label concrete preferences - and ideology - which we label abstract preferences - come into conflict, the former will prevail and lead to an adjustment of the latter. To test the hypothesis, data from a survey conducted in Switzerland during the first wave of the COVID-19 crisis is used. A significant portion of the workforce at the time unexpectedly received state money through the short-time working program. Short-time work was used as a proxy for self-interest and was tested (1) on the support given to hypothetical, ailing firms during the crisis and (2) on the prioritization of justice principles guiding state action. In a first step, several models using OLS-regressions on political orientation were estimated to test our hypothesis as well as to check for non-linear effects. We expected support for ailing firms to be the same regardless of ideology but only for people on short-time work. The results both confirm our hypothesis and suggest a non-linear effect. Far-right individuals on short-time work were disproportionally supportive compared to moderate ones. In a second step, ordered logit models were estimated to test the impact of short-time work and political orientation on the rankings of the distributive justice principles need, performance, entitlement, and equality. The results show that being on short-time work significantly alters the prioritization of justice principles. Right-wing individuals are much more likely to prioritize need and equality over performance and entitlement when they receive government assistance. No such effect is found among left-wing individuals. In conclusion, we provide moderate to strong evidence that unexpectedly finding oneself at the receiving end changes redistributive preferences if personal ideology is antithetical to redistribution. The implications of our findings on the study of populism, personal ideologies, and political change are discussed.Keywords: COVID-19, ideology, redistribution, redistributive preferences, self-interest
Procedia PDF Downloads 1402048 3D-Mesh Robust Watermarking Technique for Ownership Protection and Authentication
Authors: Farhan A. Alenizi
Abstract:
Digital watermarking has evolved in the past years as an important means for data authentication and ownership protection. The images and video watermarking was well known in the field of multimedia processing; however, 3D objects' watermarking techniques have emerged as an important means for the same purposes, as 3D mesh models are in increasing use in different areas of scientific, industrial, and medical applications. Like the image watermarking techniques, 3D watermarking can take place in either space or transform domains. Unlike images and video watermarking, where the frames have regular structures in both space and temporal domains, 3D objects are represented in different ways as meshes that are basically irregular samplings of surfaces; moreover, meshes can undergo a large variety of alterations which may be hard to tackle. This makes the watermarking process more challenging. While the transform domain watermarking is preferable in images and videos, they are still difficult to implement in 3d meshes due to the huge number of vertices involved and the complicated topology and geometry, and hence the difficulty to perform the spectral decomposition, even though significant work was done in the field. Spatial domain watermarking has attracted significant attention in the past years; they can either act on the topology or on the geometry of the model. Exploiting the statistical characteristics in the 3D mesh models from both geometrical and topological aspects was useful in hiding data. However, doing that with minimal surface distortions to the mesh attracted significant research in the field. A 3D mesh blind watermarking technique is proposed in this research. The watermarking method depends on modifying the vertices' positions with respect to the center of the object. An optimal method will be developed to reduce the errors, minimizing the distortions that the 3d object may experience due to the watermarking process, and reducing the computational complexity due to the iterations and other factors. The technique relies on the displacement process of the vertices' locations depending on the modification of the variances of the vertices’ norms. Statistical analyses were performed to establish the proper distributions that best fit each mesh, and hence establishing the bins sizes. Several optimizing approaches were introduced in the realms of mesh local roughness, the statistical distributions of the norms, and the displacements in the mesh centers. To evaluate the algorithm's robustness against other common geometry and connectivity attacks, the watermarked objects were subjected to uniform noise, Laplacian smoothing, vertices quantization, simplification, and cropping. Experimental results showed that the approach is robust in terms of both perceptual and quantitative qualities. It was also robust against both geometry and connectivity attacks. Moreover, the probability of true positive detection versus the probability of false-positive detection was evaluated. To validate the accuracy of the test cases, the receiver operating characteristics (ROC) curves were drawn, and they’ve shown robustness from this aspect. 3D watermarking is still a new field but still a promising one.Keywords: watermarking, mesh objects, local roughness, Laplacian Smoothing
Procedia PDF Downloads 1602047 A Weighted Approach to Unconstrained Iris Recognition
Authors: Yao-Hong Tsai
Abstract:
This paper presents a weighted approach to unconstrained iris recognition. Nowadays, commercial systems are usually characterized by strong acquisition constraints based on the subject’s cooperation. However, it is not always achievable for real scenarios in our daily life. Researchers have been focused on reducing these constraints and maintaining the performance of the system by new techniques at the same time. With large variation in the environment, there are two main improvements to develop the proposed iris recognition system. For solving extremely uneven lighting condition, statistic based illumination normalization is first used on eye region to increase the accuracy of iris feature. The detection of the iris image is based on Adaboost algorithm. Secondly, the weighted approach is designed by Gaussian functions according to the distance to the center of the iris. Furthermore, local binary pattern (LBP) histogram is then applied to texture classification with the weight. Experiment showed that the proposed system provided users a more flexible and feasible way to interact with the verification system through iris recognition.Keywords: authentication, iris recognition, adaboost, local binary pattern
Procedia PDF Downloads 2242046 Easily Memorable Strong Password Generation and Retrieval
Authors: Shatadru Das, Natarajan Vijayarangan
Abstract:
In this paper, a system and method for generating and recovering an authorization code has been designed and analyzed. The system creates an authorization code by accepting a base-sentence from a user. Based on the characters present in this base-sentence, the system computes a base-sentence matrix. The system also generates a plurality of patterns. The user can either select the pattern from the multiple patterns suggested by the system or can create his/her own pattern. The system then performs multiplications between the base-sentence matrix and the selected pattern matrix at different stages in the path forward, for obtaining a strong authorization code. In case the user forgets the base sentence, the system has a provision to manage and retrieve 'forgotten authorization code'. This is done by fragmenting the base sentence into different matrices and storing the fragmented matrices into a repository after computing matrix multiplication with a security question-answer approach and with a secret key provided by the user.Keywords: easy authentication, key retrieval, memorable passwords, strong password generation
Procedia PDF Downloads 4002045 Auditory Function in MP3 Users and Association with Hidden Hearing Loss
Authors: Nana Saralidze, Nino Sharashenidze, Zurab Kevanishvili
Abstract:
Hidden hearing loss may occur in humans exposed to prolonged high-level sound. It is the loss of ability to hear high-level background noise while having normal hearing in quiet. We compared the hearing of people who regularly listen 3 hours and more to personal music players and those who do not. Forty participants aged 18-30 years were divided into two groups: regular users of music players and people who had never used them. And the third group – elders aged 50-55 years, had 15 participants. Pure-tone audiometry (125-16000 Hz), auditory brainstem response (ABR) (70dB SPL), and ability to identify speech in noise (4-talker babble with a 65-dB signal-to-noise ratio at 80 dB) were measured in all participants. All participants had normal pure-tone audiometry (all thresholds < 25 dB HL). A significant difference between groups was observed in that regular users of personal audio systems correctly identified 53% of words, whereas the non-users identified 74% and the elder group – 63%. This contributes evidence supporting the presence of a hidden hearing loss in humans and demonstrates that speech-in-noise audiometry is an effective method and can be considered as the GOLD standard for detecting hidden hearing loss.Keywords: mp3 player, hidden hearing loss, speech audiometry, pure tone audiometry
Procedia PDF Downloads 742044 A Systematic Review Emotion Regulation through Music in Children, Adults, and Elderly
Authors: Fabiana Ribeiro, Ana Moreno, Antonio Oliveira, Patricia Oliveira-Silva
Abstract:
Music is present in our daily lives, and to our knowledge music is often used to change the emotions in the listeners. For this reason, the objective of this study was to explore and synthesize results examining the use and effects of music on emotion regulation in children, adults, and elderly, and clarify if the music is effective across ages to promote emotion regulation. A literature search was conducted using ISI Web of Knowledge, Pubmed, PsycINFO, and Scopus, inclusion criteria comprised children, adolescents, young, and old adults, including health population. Articles applying musical intervention, specifically musical listening, and assessing the emotion regulation directly through reports or neurophysiological measures were included in this review. Results showed age differences in the function of musical listening; initially, adolescents revealed age increments in emotional listening compared to children, and young adults in comparison to older adults, in which the first use music aiming to emotion regulation and social connection, while older adults also utilize music as emotion regulation searching for personal growth. Moreover, some of the studies showed that personal characteristics also would determine the efficiency of the emotion regulation strategy. In conclusion, it was observed that music could beneficiate all ages investigated, however, this review detected a necessity to develop adequate paradigms to explore the use of music for emotion regulation.Keywords: music, emotion, regulation, musical listening
Procedia PDF Downloads 1712043 HPTLC Metabolite Fingerprinting of Artocarpus champeden Stembark from Several Different Locations in Indonesia and Correlation with Antimalarial Activity
Authors: Imam Taufik, Hilkatul Ilmi, Puryani, Mochammad Yuwono, Aty Widyawaruyanti
Abstract:
Artocarpus champeden Spreng stembark (Moraceae) in Indonesia well known as ‘cempedak’ had been traditionally used for malarial remedies. The difference of growth locations could cause the difference of metabolite profiling. As a consequence, there were difference antimalarial activities in spite of the same plants. The aim of this research was to obtain the profile of metabolites that contained in A. champeden stembark from different locations in Indonesia for authentication and quality control purpose of this extract. The profiling had been performed by HPTLC-Densitometry technique and antimalarial activity had been also determined by HRP2-ELISA technique. The correlation between metabolite fingerprinting and antimalarial activity had been analyzed by Principle Component Analysis, Hierarchical Clustering Analysis and Partial Least Square. As a result, there is correlation between the difference metabolite fingerprinting and antimalarial activity from several different growth locations.Keywords: antimalarial, artocarpus champeden spreng, metabolite fingerprinting, multivariate analysis
Procedia PDF Downloads 3112042 An Intrusion Detection Systems Based on K-Means, K-Medoids and Support Vector Clustering Using Ensemble
Authors: A. Mohammadpour, Ebrahim Najafi Kajabad, Ghazale Ipakchi
Abstract:
Presently, computer networks’ security rise in importance and many studies have also been conducted in this field. By the penetration of the internet networks in different fields, many things need to be done to provide a secure industrial and non-industrial network. Fire walls, appropriate Intrusion Detection Systems (IDS), encryption protocols for information sending and receiving, and use of authentication certificated are among things, which should be considered for system security. The aim of the present study is to use the outcome of several algorithms, which cause decline in IDS errors, in the way that improves system security and prevents additional overload to the system. Finally, regarding the obtained result we can also detect the amount and percentage of more sub attacks. By running the proposed system, which is based on the use of multi-algorithmic outcome and comparing that by the proposed single algorithmic methods, we observed a 78.64% result in attack detection that is improved by 3.14% than the proposed algorithms.Keywords: intrusion detection systems, clustering, k-means, k-medoids, SV clustering, ensemble
Procedia PDF Downloads 221