Search results for: relational messages
305 Marketing Practices of the Urban and Recycled Wood Industry in the United States
Authors: Robert Smith, Omar Espinoza, Anna Pitta
Abstract:
In the United States, trees felled in urban areas and wood generated through construction and demolition are primarily disposed of as low-value resources, such as biomass for energy, landscaping mulch, composting, or landfilled. An emerging industry makes use of these underutilized resources to produce high value-added products, with associated benefits for the environment, the local economy, and consumers. For the circular economy to be successful, markets must be created for sustainable, reusable natural materials. Research was carried out to increase the understanding of the marketing practices of urban and reclaimed wood industries. This paper presents the results of a nationwide survey of these companies. The results indicate that a majority of companies in this industry are small firms, operating for less than 10 years, which produce mostly to order and sell their products at comparatively higher prices than competing products made from virgin natural resources. Promotional messages included quality, aesthetics, and customization, conveyed through company webpages, word of mouth, and social media. Distribution channels used include direct sales, online sales, and retail sales. Partnerships are critical for effective raw material procurement. Respondents indicated optimistic growth expectations, despite barriers associated with urban and reclaimed wood materials and production.Keywords: urban and reclaimed wood, circular economy, marketing, wood products
Procedia PDF Downloads 123304 A Resource-Based Perspective on Job Crafting Consequences: An Empirical Study from China
Authors: Eko Liao, Cheryl Zhang
Abstract:
Employee job crafting refers to employee’s proactive behaviors of making customized changes to their jobs on cognitive, relationship, and task levels. Previous studies have investigated different situations triggering employee’s job crafting. However, much less is known about what would be the consequences for both employee themselves and their work groups. Guided by conservation of resources theory (COR), this study investigates how employees job crafting increases their objective task performance and promotive voice behaviors at work. It is argued that employee would gain more resources when they actively craft their job tasks, which in turn increase their job performance and encourage them to have more constructive speak-up behaviors. Specifically, employee’s psychological resources (i.e., job engagement) and relational resources (i.e., leader-member relationships) would be enhanced from effective crafting behaviors, because employees are more likely to regard their job tasks as meaningful, and their leaders would be more likely to notice and recognize their dedication at work when employees craft their job frequently. To test this research model, around 400 employees from various Chinese organizations from mainland China joins the two-wave data collection stage. Employee’s job crafting behaviors in three aspects are measured at time 1. Perception of resource gain (job engagement and leader-member exchange), voice, and job performance are measured at time 2. The research model is generally supported. This study contributes to the job crafting literature by broadening the theoretical lens to a resource-based perspective. It also has practical implications that organizations should pay more attention to employee crafting behaviors because they are closely related to employees in-role performance and constructive voice behaviors.Keywords: job crafting, resource-based perspective, voice, job performance
Procedia PDF Downloads 167303 Tracking and Classifying Client Interactions with Personal Coaches
Authors: Kartik Thakore, Anna-Roza Tamas, Adam Cole
Abstract:
The world health organization (WHO) reports that by 2030 more than 23.7 million deaths annually will be caused by Cardiovascular Diseases (CVDs); with a 2008 economic impact of $3.76 T. Metabolic syndrome is a disorder of multiple metabolic risk factors strongly indicated in the development of cardiovascular diseases. Guided lifestyle intervention driven by live coaching has been shown to have a positive impact on metabolic risk factors. Individuals’ path to improved (decreased) metabolic risk factors are driven by personal motivation and personalized messages delivered by coaches and augmented by technology. Using interactions captured between 400 individuals and 3 coaches over a program period of 500 days, a preliminary model was designed. A novel real time event tracking system was created to track and classify clients based on their genetic profile, baseline questionnaires and usage of a mobile application with live coaching sessions. Classification of clients and coaches was done using a support vector machines application build on Apache Spark, Stanford Natural Language Processing Library (SNLPL) and decision-modeling.Keywords: guided lifestyle intervention, metabolic risk factors, personal coaching, support vector machines application, Apache Spark, natural language processing
Procedia PDF Downloads 431302 Theoretical Framework for Value Creation in Project Oriented Companies
Authors: Mariusz Hofman
Abstract:
The paper ‘Theoretical framework for value creation in Project-Oriented Companies’ is designed to determine, how organisations create value and whether this allows them to achieve market success. An assumption has been made that there are two routes to achieving this value. The first one is to create intangible assets (i.e. the resources of human, structural and relational capital), while the other one is to create added value (understood as the surplus of revenue over costs). It has also been assumed that the combination of the achieved added value and unique intangible assets translates to the success of a project-oriented company. The purpose of the paper is to present hypothetical and deductive model which describing the modus operandi of such companies and approach to model operationalisation. All the latent variables included in the model are theoretical constructs with observational indicators (measures). The existence of a latent variable (construct) and also submodels will be confirmed based on a covariance matrix which in turn is based on empirical data, being a set of observational indicators (measures). This will be achieved with a confirmatory factor analysis (CFA). Due to this statistical procedure, it will be verified whether the matrix arising from the adopted theoretical model differs statistically from the empirical matrix of covariance arising from the system of equations. The fit of the model with the empirical data will be evaluated using χ2, RMSEA and CFI (Comparative Fit Index). How well the theoretical model fits the empirical data is assessed through a number of indicators. If the theoretical conjectures are confirmed, an interesting development path can be defined for project-oriented companies. This will let such organisations perform efficiently in the face of the growing competition and pressure on innovation.Keywords: value creation, project-oriented company, structural equation modelling
Procedia PDF Downloads 294301 Charting Sentiments with Naive Bayes and Logistic Regression
Authors: Jummalla Aashrith, N. L. Shiva Sai, K. Bhavya Sri
Abstract:
The swift progress of web technology has not only amassed a vast reservoir of internet data but also triggered a substantial surge in data generation. The internet has metamorphosed into one of the dynamic hubs for online education, idea dissemination, as well as opinion-sharing. Notably, the widely utilized social networking platform Twitter is experiencing considerable expansion, providing users with the ability to share viewpoints, participate in discussions spanning diverse communities, and broadcast messages on a global scale. The upswing in online engagement has sparked a significant curiosity in subjective analysis, particularly when it comes to Twitter data. This research is committed to delving into sentiment analysis, focusing specifically on the realm of Twitter. It aims to offer valuable insights into deciphering information within tweets, where opinions manifest in a highly unstructured and diverse manner, spanning a spectrum from positivity to negativity, occasionally punctuated by neutrality expressions. Within this document, we offer a comprehensive exploration and comparative assessment of modern approaches to opinion mining. Employing a range of machine learning algorithms such as Naive Bayes and Logistic Regression, our investigation plunges into the domain of Twitter data streams. We delve into overarching challenges and applications inherent in the realm of subjectivity analysis over Twitter.Keywords: machine learning, sentiment analysis, visualisation, python
Procedia PDF Downloads 54300 Performance Analysis of 5G for Low Latency Transmission Based on Universal Filtered Multi-Carrier Technique and Interleave Division Multiple Access
Authors: A. Asgharzadeh, M. Maroufi
Abstract:
5G mobile communication system has drawn more and more attention. The 5G system needs to provide three different types of services, including enhanced Mobile BroadBand (eMBB), massive machine-type communication (mMTC), and ultra-reliable and low-latency communication (URLLC). Universal Filtered Multi-Carrier (UFMC), Filter Bank Multicarrier (FBMC), and Filtered Orthogonal Frequency Division Multiplexing (f-OFDM) are suggested as a well-known candidate waveform for the coming 5G system. Themachine-to-machine (M2M) communications are one of the essential applications in 5G, and it involves exchanging of concise messages with a very short latency. However, in UFMC systems, the subcarriers are grouped into subbands but f-OFDM only one subband covers the entire band. Furthermore, in FBMC, a subband includes only one subcarrier, and the number of subbands is the same as the number of subcarriers. This paper mainly discusses the performance of UFMC with different parameters for the UFMC system. Also, paper shows that UFMC is the best choice outperforming OFDM in any case and FBMC in case of very short packets while performing similarly for long sequences with channel estimation techniques for Interleave Division Multiple Access (IDMA) systems.Keywords: universal filtered multi-carrier technique, UFMC, interleave division multiple access, IDMA, fifth-generation, subband
Procedia PDF Downloads 132299 Integrating Student Engagement Activities into the Learning Process
Authors: Yingjin Cui, Xue Bai, Serena Reese
Abstract:
Student engagement and student interest during class instruction are important conditions for active learning. Engagement, which has an important relationship with learning motivation, influences students' levels of persistence in overcoming challenges. Lack of student engagement and absence from face-to-face lectures and tutorials, in turn, can lead to poor academic performance. However, keeping students motivated and engaged in the learning process in different instructional modes poses a significant challenge; students can easily become discouraged from attending lectures and tutorials across both online and face-to-face settings. Many factors impact students’ engagement in the learning process. If you want to keep students focused on learning, you have to invite them into the process of helping themselves by providing an active learning environment. Active learning is an excellent technique for enhancing student engagement and participation in the learning process because it provides means to motivate the student to engage themselves in the learning process through reflection, analyzing, applying, and synthesizing the material they learn during class. In this study, we discussed how to create an active learning class (both face-to-face and synchronous online) through engagement activities, including reflection, collaboration, screen messages, open poll, tournament, and transferring editing roles. These activities will provide an uncommon interactive learning environment that can result in improved learning outcomes. To evaluate the effectiveness of those engagement activities in the learning process, an experimental group and a control group will be explored in the study.Keywords: active learning, academic performance, engagement activities, learning motivation
Procedia PDF Downloads 148298 Not Three Gods but One: Why Reductionism Does Not Serve Our Theological Discourse
Authors: Finley Lawson
Abstract:
The triune nature of God is one of the most complex doctrines of Christianity, and its complexity is further compounded when one considers the incarnation. However, many of the difficulties and paradoxes associated with our idea of the divine arise from our adherence to reductionist ontology. In order to move our theological discourse forward, in respect to divine and human nature, a holistic interpretation of our profession of faith is necessary. The challenge of a holistic interpretation is that it questions our ability to make any statement about the genuine, ontological individuation of persons (both divine and human), and in doing so raises the issue of whether we are, ontologically, bound to descend in to a form of pan(en)theism. In order to address the ‘inevitable’ slide in to pan(en)theism. The impact of two forms of holistic interpretation, Boolean and Non-Boolean, on our concept of personhood will be examined. Whilst a Boolean interpretation allows for a greater understanding of the relational nature of the Trinity, it is the Non-Boolean interpretation which has greater ontological significance. A Non-Boolean ontology, grounded in our scientific understanding of the nature of the world, shows our quest for individuation rests not in ontological fact but in epistemic need, and that it is our limited epistemology that drives our need to divide that which is ontologically indivisible. This discussion takes place within a ‘methodological’, rather than ‘doctrinal’ approach to science and religion - examining assumptions and methods that have shaped our language and beliefs about key doctrines, rather than seeking to reconcile particular Christian doctrines with particular scientific theories. Concluding that Non-Boolean holism is the more significant for our doctrine is, in itself, not enough. A world without division appears much removed from the distinct place of man and divine as espoused in our creedal affirmation, to this end, several possible interpretations for understanding Non-Boolean human – divine relations are tentatively put forward for consideration.Keywords: holism, individuation, ontology, Trinitarian relations
Procedia PDF Downloads 251297 Application of Grey Theory in the Forecast of Facility Maintenance Hours for Office Building Tenants and Public Areas
Authors: Yen Chia-Ju, Cheng Ding-Ruei
Abstract:
This study took case office building as subject and explored the responsive work order repair request of facilities and equipment in offices and public areas by gray theory, with the purpose of providing for future related office building owners, executive managers, property management companies, mechanical and electrical companies as reference for deciding and assessing forecast model. Important conclusions of this study are summarized as follows according to the study findings: 1. Grey Relational Analysis discusses the importance of facilities repair number of six categories, namely, power systems, building systems, water systems, air conditioning systems, fire systems and manpower dispatch in order. In terms of facilities maintenance importance are power systems, building systems, water systems, air conditioning systems, manpower dispatch and fire systems in order. 2. GM (1,N) and regression method took maintenance hours as dependent variables and repair number, leased area and tenants number as independent variables and conducted single month forecast based on 12 data from January to December 2011. The mean absolute error and average accuracy of GM (1,N) from verification results were 6.41% and 93.59%; the mean absolute error and average accuracy of regression model were 4.66% and 95.34%, indicating that they have highly accurate forecast capability.Keywords: rey theory, forecast model, Taipei 101, office buildings, property management, facilities, equipment
Procedia PDF Downloads 443296 A Survey of Feature-Based Steganalysis for JPEG Images
Authors: Syeda Mainaaz Unnisa, Deepa Suresh
Abstract:
Due to the increase in usage of public domain channels, such as the internet, and communication technology, there is a concern about the protection of intellectual property and security threats. This interest has led to growth in researching and implementing techniques for information hiding. Steganography is the art and science of hiding information in a private manner such that its existence cannot be recognized. Communication using steganographic techniques makes not only the secret message but also the presence of hidden communication, invisible. Steganalysis is the art of detecting the presence of this hidden communication. Parallel to steganography, steganalysis is also gaining prominence, since the detection of hidden messages can prevent catastrophic security incidents from occurring. Steganalysis can also be incredibly helpful in identifying and revealing holes with the current steganographic techniques, which makes them vulnerable to attacks. Through the formulation of new effective steganalysis methods, further research to improve the resistance of tested steganography techniques can be developed. Feature-based steganalysis method for JPEG images calculates the features of an image using the L1 norm of the difference between a stego image and the calibrated version of the image. This calibration can help retrieve some of the parameters of the cover image, revealing the variations between the cover and stego image and enabling a more accurate detection. Applying this method to various steganographic schemes, experimental results were compared and evaluated to derive conclusions and principles for more protected JPEG steganography.Keywords: cover image, feature-based steganalysis, information hiding, steganalysis, steganography
Procedia PDF Downloads 216295 A Highly Efficient Broadcast Algorithm for Computer Networks
Authors: Ganesh Nandakumaran, Mehmet Karaata
Abstract:
A wave is a distributed execution, often made up of a broadcast phase followed by a feedback phase, requiring the participation of all the system processes before a particular event called decision is taken. Wave algorithms with one initiator such as the 1-wave algorithm have been shown to be very efficient for broadcasting messages in tree networks. Extensions of this algorithm broadcasting a sequence of waves using a single initiator have been implemented in algorithms such as the m-wave algorithm. However as the network size increases, having a single initiator adversely affects the message delivery times to nodes further away from the initiator. As a remedy, broadcast waves can be allowed to be initiated by multiple initiator nodes distributed across the network to reduce the completion time of broadcasts. These waves initiated by one or more initiator processes form a collection of waves covering the entire network. Solutions to global-snapshots, distributed broadcast and various synchronization problems can be solved efficiently using waves with multiple concurrent initiators. In this paper, we propose the first stabilizing multi-wave sequence algorithm implementing waves started by multiple initiator processes such that every process in the network receives at least one sequence of broadcasts. Due to being stabilizing, the proposed algorithm can withstand transient faults and do not require initialization. We view a fault as a transient fault if it perturbs the configuration of the system but not its program.Keywords: distributed computing, multi-node broadcast, propagation of information with feedback and cleaning (PFC), stabilization, wave algorithms
Procedia PDF Downloads 504294 Analyzing Emerging Scientific Domains in Biomedical Discourse: Case Study Comparing Microbiome, Metabolome, and Metagenome Research in Scientific Articles
Authors: Kenneth D. Aiello, M. Simeone, Manfred Laubichler
Abstract:
It is increasingly difficult to analyze emerging scientific fields as contemporary scientific fields are more dynamic, their boundaries are more porous, and the relational possibilities have increased due to Big Data and new information sources. In biomedicine, where funding, medical categories, and medical jurisdiction are determined by distinct boundaries on biomedical research fields and definitions of concepts, ambiguity persists between the microbiome, metabolome, and metagenome research fields. This ambiguity continues despite efforts by institutions and organizations to establish parameters on the core concepts and research discourses. Further, the explosive growth of microbiome, metabolome, and metagenomic research has led to unknown variation and covariation making application of findings across subfields or coming to a consensus difficult. This study explores the evolution and variation of knowledge within the microbiome, metabolome, and metagenome research fields related to ambiguous scholarly language and commensurable theoretical frameworks via a semantic analysis of key concepts and narratives. A computational historical framework of cultural evolution and large-scale publication data highlight the boundaries and overlaps between the competing scientific discourses surrounding the three research areas. The results of this study highlight how discourse and language distribute power within scholarly and scientific networks, specifically the power to set and define norms, central questions, methods, and knowledge.Keywords: biomedicine, conceptual change, history of science, philosophy of science, science of science, sociolinguistics, sociology of knowledge
Procedia PDF Downloads 129293 The Counselling Practice of School Social Workers in Swedish Elementary Schools - A Focus Group Study
Authors: Kjellgren Maria, Lilliehorn Sara, Markström Urban
Abstract:
This article describes the counselling practice of school social workers (SSWs) with individual children. SSWs work in the school system’s pupil health team, whose primary task is health promotion and prevention. The work of SSWs is about helping children and adolescents who, for various reasons, suffer from mental ill-health, school absenteeism, or stress that make them unable to achieve their intended goals. SSWs preferably meet these children in individual counselling sessions. The aim of this article is to describe and analyse SSWs’ experience of counselling with children and to examine the characteristics of counselling practice. The data collection was conducted through four semi-structured focus group interviews with a total of 22 SSWs in four different regions in Sweden. SSWs provide counselling to children in order to bring about improved feelings or behavioural changes. It can be noted that SSWs put emphasis on both the counselling process and the alliance with the child. The interviews showed a common practice among SSWs regarding the structure of the counselling sessions, with certain steps and approaches being employed. However, the specific interventions differed and were characterised by an eclectic standpoint in which SSWs utilise a broad repertoire of therapeutic schools and techniques. Furthermore, a relational perspective emerged as a most prominent focus for the SSWs by re-emerging throughout the material. We believe that SSWs could benefit from theoretical perspectives on ‘contextual model’ and ‘attachment theory’ as ‘models of the mind’. Being emotionally close to the child and being able to follow their development requires a lot from SSWs, as both professional caregivers and as “safe havens”.Keywords: school social conselling, school social workers, contextual model, attachment thory
Procedia PDF Downloads 134292 Real-Time Gesture Recognition System Using Microsoft Kinect
Authors: Ankita Wadhawan, Parteek Kumar, Umesh Kumar
Abstract:
Gesture is any body movement that expresses some attitude or any sentiment. Gestures as a sign language are used by deaf people for conveying messages which helps in eliminating the communication barrier between deaf people and normal persons. Nowadays, everybody is using mobile phone and computer as a very important gadget in their life. But there are some physically challenged people who are blind/deaf and the use of mobile phone or computer like device is very difficult for them. So, there is an immense need of a system which works on body gesture or sign language as input. In this research, Microsoft Kinect Sensor, SDK V2 and Hidden Markov Toolkit (HTK) are used to recognize the object, motion of object and human body joints through Touch less NUI (Natural User Interface) in real-time. The depth data collected from Microsoft Kinect has been used to recognize gestures of Indian Sign Language (ISL). The recorded clips are analyzed using depth, IR and skeletal data at different angles and positions. The proposed system has an average accuracy of 85%. The developed Touch less NUI provides an interface to recognize gestures and controls the cursor and click operation in computer just by waving hand gesture. This research will help deaf people to make use of mobile phones, computers and socialize among other persons in the society.Keywords: gesture recognition, Indian sign language, Microsoft Kinect, natural user interface, sign language
Procedia PDF Downloads 303291 A Barthesian Analysis of Semiotic Practices in an Indigenous School in Taiwan: A Case of a Bunun Primary School
Authors: Yi Yin Chen, Changsoo Hur
Abstract:
This study explores the role of totems and decorative texts on an indigenous primary school campus in Taiwan, as well as how they affect the building of the cultural identity of indigenous students. By employing Roland Barthes' semiotic theory, this research aims to uncover the cultural meanings and social functions contained in these visual symbols, as well as their significance for building a cultural identity among indigenous students. The study uses a qualitative method, combining observations, interviews, and document analysis to explore how these symbols perform as carriers of hidden meaning and contribute to educational and cultural settings. The findings show that totems on the indigenous school campus reflect the ethnic group's cultural background knowledge, allowing students to study their cultural heritage and providing a sense of belonging. However, certain textual decorations also reflect the historical influence of the hegemonic government attempting to establish moral norms in the ethnic group. This coexistence of traditional ethnic totems and hegemonic textual admonitions in the school environment creates a complex identity landscape for students, leading to a multiplicity of cultural identities. It underlines the importance of culturally relevant symbols in enhancing students' cultural heritage and identity and presents the challenges posed by conflicting cultural messages within the educational context.Keywords: Roland Barthes, semiotic, Indigenous, Bunun
Procedia PDF Downloads 47290 Preservice EFL Teachers in a Blended Professional Development Program: Learning to Teach Speech Acts
Authors: Mei-Hui Liu
Abstract:
This study examines the effectiveness of a blended professional development program on preservice EFL (English as a foreign language) teachers’ learning to teach speech acts with the advent of Information and Communication Technology, researchers and scholars underscore the significance of integrating online and face-to-face learning opportunities in the teacher education field. Yet, a paucity of evidence has been documented to investigate the extent to which such a blended professional learning model may impact real classroom practice and student learning outcome. This yearlong project involves various stakeholders, including 25 preservice teachers, 5 English professionals, and 45 secondary school students. Multiple data sources collected are surveys, interviews, reflection journals, online discussion messages, artifacts, and discourse completion tests. Relying on the theoretical lenses of Community of Inquiry, data analysis depicts the nature and process of preservice teachers’ professional development in this blended learning community, which triggers and fosters both face-to-face and synchronous/asynchronous online interactions among preservice teachers and English professionals (i.e., university faculty and in-service teachers). Also included is the student learning outcome after preservice teachers put what they learn from the support community into instructional practice. Pedagogical implications and research suggestions are further provided based on the research findings and limitations.Keywords: blended professional development, preservice EFL teachers, speech act instruction, student learning outcome
Procedia PDF Downloads 223289 The Quality of Business Relationships in the Tourism System: An Imaginary Organisation Approach
Authors: Armando Luis Vieira, Carlos Costa, Arthur Araújo
Abstract:
The tourism system is viewable as a network of relationships amongst business partners where the success of each actor will ultimately be determined by the success of the whole network. Especially since the publication of Gümmesson’s (1996) ‘theory of imaginary organisations’, which suggests that organisational effectiveness largely depends on managing relationships and sharing resources and activities, relationship quality (RQ) has been increasingly recognised as a main source of value creation and competitive advantage. However, there is still ambiguity around this topic, and managers and researchers have been recurrently reporting the need to better understand and capitalise on the quality of interactions with business partners. This research aims at testing an RQ model from a relational, imaginary organisation’s approach. Two mail surveys provide the perceptions of 725 hotel representatives about their business relationships with tour operators, and 1,224 corporate client representatives about their business relationships with hotels (21.9 % and 38.8 % response rate, respectively). The analysis contributes to enhance our understanding on the linkages between RQ and its determinants, and identifies the role of their dimensions. Structural equation modelling results highlight trust as the dominant dimension, the crucial role of commitment and satisfaction, and suggest customer orientation as complementary building block. Findings also emphasise problem solving behaviour and selling orientation as the most relevant dimensions of customer orientation. The comparison of the two ‘dyads’ deepens the discussion and enriches the suggested theoretical and managerial guidelines concerning the contribution of quality relationships to business performance.Keywords: corporate clients, destination competitiveness, hotels, relationship quality, structural equations modelling, tour operators
Procedia PDF Downloads 392288 Male Bodies and Philosophy of Sexual Difference: A Sketch for an Impossible 'Becoming-Man'
Authors: Ovidiu Anemtoaicei
Abstract:
This paper offers a possible answer to the question of what it means to think about men and masculinities through the philosophy of sexual difference as developed by Luce Irigaray, employing Gilles Deleuze’s concept of 'critique' and arguing, at the same time, for a concept of 'becoming-man' as an expression of this answer. First, while examining the nature of the role of male bodies underlying the theorizing of men and masculinities in the field of the Critical Studies of Men and Masculinities, the paper argues for a turn to sexual difference theory as an answer to the 'gap' between the representations on male bodies and their participation in thought and masculine subjective production. Secondly, sharing Luce Irigaray’s critique of Western thought, the paper explores alternative morphological bodily 'locations' for rethinking male imaginary in relation to male embodiments, on the one hand, and in relation to the maternal and the feminine, on the other hand. Thirdly, the paper develops the idea that a phenomenologically-influenced approach towards male bodies might be productive, especially when thought through Irigaray’s sexual difference as a relational and experiential ontology. Finally, while showing that Irigaray and Deleuze share a similar critique of Western philosophical thought and of the masculine historical subject, it proposes a rethinking of the concept of 'becoming-man' as an assemblage meeting between Irigaray’s theory of sexual difference and Deleuze and Guattari’s nomadologic project, as a possibility of thinking change in men’s masculine subjective constitution in relation to both women and other men. As far as the ethical implications of such rethinking are concerned, the paper urges for the cultivation of a masculine culture of stepping back and its constitutive political, social and cultural practices so as to make possible the construction of new spaces that would allow for the becoming of at least two subjects based on the respect for their differences.Keywords: feminist philosophy, male bodies, masculinities, phenomenology, sexual difference
Procedia PDF Downloads 199287 The Colombian Linguistic Landscape: A Study of Commercial Signs
Authors: Francia Martinez
Abstract:
This study documents and demonstrates the profound impact of the high status of American English and culture in Colombian commercial landscape due to the globalization and commodification of English. It also documents and describes how Colombian advertisers make use of various language and visual mechanisms in the commercial linguistic landscape to convey messages, create an image with which the target audience can identify, and build a relationship with that target audience. The data (in the form of pictures) were collected in different cities in Colombia and were classified and organized into different categories for the reliability and validity of the analysis. The research questions were: do the ubiquity and high status of American English and culture play a major role in the Colombian commercial linguistic landscape? If so, how?, what roles do national and local culture and language (Spanish) play in the commercial linguistic landscape?, and what different linguistic and visual strategies do Colombian advertisers employ to reach their target audience? Based on data analysis and results, American and local culture and icons play a major role when Colombian advertisers create and design their commercial logos and ads to get consumers’ attention and establish a rapport with them in a successful way. In order to achieve their objectives, Colombian advertisers rely on creative linguistic and visual techniques in their ads, such as puns, humor, irony, comparisons, metaphors, mocking, exaggeration, parody, personification, sarcasm, satire, allusion, onomatopoeias, and imitation (copycat or cloning).Keywords: Colombian ads, linguistic landscape, rhetorical devices, sociolinguistics
Procedia PDF Downloads 309286 Sexual Behaviors and Its Predictors among Iranian Women in Iran: A Cross-Sectional Study
Authors: Zahra Karimian, Effat Merghati Khoei, Raziyeh Maasoumi
Abstract:
Background: Women's sexual well-being is center of focus in the field of sexology. Study of sexual behavior and investigating its predictors is important in women's health promotion. Objectives: This study aimed to explore the components of sexual behaviors and their possible associations with the women's demographic. Methods: A National Sexual Behavior Assessment Questionnaire was administered to 500 women ages 15 to 45 who referred to the public health centers seeking for health care services. The associations with demographic were examined. Results: From all participant, 31.8% of women obtain high score in the sexual capacity 21.2% in sexual motivation and 0.2% in sexual function. In sexual script component, 86.2% of women were holding traditional beliefs toward sexual behaviors; the majority (91.5%) of women believed in mutual and relational sexuality, 83.4% believed in androcentricity (male-dominated sexuality). Pearson correlation test showed significant positive correlations between sexual capacity, motivation, function and sexual script (p < 0.05). Regression model showed that sexual capacity is associated with women's education, age of her spouse. Sexual function and sexual motivation were significantly associated with the age of subjects' spouses. Conclusion: In this study, lower score was found in sexual performance while women were scored higher in the sexual capacity and motivation. We argue that these lower score in sexual performance more likely is due to the level of participants' religiosity and formation of their sexuality through an androcentric culture. Women's level of education and the spouse age appear to be predicting factors in the scores the subjects gained. We suggest that gender-specific and culturally sensitive sexuality education should be focus of women's health programs in Iran.Keywords: sexual behaviors, women, health, Iran
Procedia PDF Downloads 238285 A Location-based Authentication and Key Management Scheme for Border Surveillance Wireless Sensor Networks
Authors: Walid Abdallah, Noureddine Boudriga
Abstract:
Wireless sensor networks have shown their effectiveness in the deployment of many critical applications especially in the military domain. Border surveillance is one of these applications where a set of wireless sensors are deployed along a country border line to detect illegal intrusion attempts to the national territory and report this to a control center to undergo the necessary measures. Regarding its nature, this wireless sensor network can be the target of many security attacks trying to compromise its normal operation. Particularly, in this application the deployment and location of sensor nodes are of great importance for detecting and tracking intruders. This paper proposes a location-based authentication and key distribution mechanism to secure wireless sensor networks intended for border surveillance where the key establishment is performed using elliptic curve cryptography and identity-based public key scheme. In this scheme, the public key of each sensor node will be authenticated by keys that depend on its position in the monitored area. Before establishing a pairwise key between two nodes, each one of them must verify the neighborhood location of the other node using a message authentication code (MAC) calculated on the corresponding public key and keys derived from encrypted beacon messages broadcast by anchor nodes. We show that our proposed public key authentication and key distribution scheme is more resilient to node capture and node replication attacks than currently available schemes. Also, the achievement of the key distribution between nodes in our scheme generates less communication overhead and hence increases network performances.Keywords: wireless sensor networks, border surveillance, security, key distribution, location-based
Procedia PDF Downloads 657284 The Effects of Smoking Prevention Intervention on Smoking Knowledge, Attitudes and Anti-Smoking Self-Efficiency among Adolescent Students
Authors: Yi-Ying Lin, Su-Guo, Chia-Hao, Ming-Szu Hong
Abstract:
Objectives: Smoking is a common addictive behavior in teenagers. Long-term smoking is hazardous to health, causes family and social expenditure, and is an important topic that should not be overlooked by academia or the government. The aims of this study are to examine the effectiveness of these courses in terms of teenagers’ knowledge and attitudes towards the hazards of smoking and the effectiveness of their self-efficacy in rejecting smoking. Methods: This study adopted a pre-test post-test design and selected 7th, 8th, 10th, and 11th graders from two junior high schools. Total of 1073 valid questionnaires were collected. The self-completed questionnaire included background information, smoking status of relatives staying with the subject, attitudes of parents towards child smoking, knowledge and attitudes towards smoking, and anti-smoking self-efficacy. Results and clinical applications: Subjects in the experimental group underwent course interventions, which are 'smoking prevention courses,' in the semester. After course intervention, it was found that the intervention showed significant efficacy in terms of knowledge and self-efficacy in rejecting smoking in senior high school students but no efficacy in junior high school. We recommend that this course can be used in normal senior high schools. With regards to junior high schools, smoking prevention courses should be designed to be gamified, or combined with activities with both anti-smoking messages and entertainment at the same time, so that knowledge, attitudes, and self-efficacy can be subconsciously cultivated.Keywords: adolescent students, smoking knowledge, attitudes, anti-smoking self-efficiency, smoking prevention intervention
Procedia PDF Downloads 122283 Emerging Cyber Threats and Cognitive Vulnerabilities: Cyberterrorism
Authors: Oludare Isaac Abiodun, Esther Omolara Abiodun
Abstract:
The purpose of this paper is to demonstrate that cyberterrorism is existing and poses a threat to computer security and national security. Nowadays, people have become excitedly dependent upon computers, phones, the Internet, and the Internet of things systems to share information, communicate, conduct a search, etc. However, these network systems are at risk from a different source that is known and unknown. These network systems risk being caused by some malicious individuals, groups, organizations, or governments, they take advantage of vulnerabilities in the computer system to hawk sensitive information from people, organizations, or governments. In doing so, they are engaging themselves in computer threats, crime, and terrorism, thereby making the use of computers insecure for others. The threat of cyberterrorism is of various forms and ranges from one country to another country. These threats include disrupting communications and information, stealing data, destroying data, leaking, and breaching data, interfering with messages and networks, and in some cases, demanding financial rewards for stolen data. Hence, this study identifies many ways that cyberterrorists utilize the Internet as a tool to advance their malicious mission, which negatively affects computer security and safety. One could identify causes for disparate anomaly behaviors and the theoretical, ideological, and current forms of the likelihood of cyberterrorism. Therefore, for a countermeasure, this paper proposes the use of previous and current computer security models as found in the literature to help in countering cyberterrorismKeywords: cyberterrorism, computer security, information, internet, terrorism, threat, digital forensic solution
Procedia PDF Downloads 96282 Divergences in Interpreters’ Oral Interpretation among Pentecostal Churches: Sermonic Reflections
Authors: Rufus Olufemi Adebayo, Sylvia Phiwani Zulu
Abstract:
Interpreting in the setting of diverse language and multicultural congregants, is often understood as integrating the content of the message. Preaching, similar to any communication, takes seriously people’s multiple contexts. The one who provides the best insight into understanding “the other”, traditionally speaking could be an interpreter in a multilingual context. Nonetheless, there are reflections in the loss of spiritual communication, translation and interpretive dialogue. No matter how eloquent the preacher is, an interpreter can make or mere the sermon (speech). The sermon that the preacher preaches is not always the one the congregation hears from the interpreter. In other occurrences, however, interpreting can lead not only to distort messages but also to dissatisfied audiences and preacher being overshadowed by the pranks of the interpreter. Using qualitative methodology, this paper explores the challenges and the conventional assumptions about preachers’ interpreter as influenced by spirituality, culture, and language in empirical and theoretical perspectives. An emphasis on the bias translation and the basis of reality that suppresses or devalues the spiritual communication is examined. The result indicates that interpretation of the declaration of guilt, history of congregation, spirituality, attitudes, morals, customs, specific practices of a preacher, education, and the environment form an entangled and misinterpretation. The article concludes by re-examining these qualities and rearticulating them into a preliminary theory for practice, as distinguished from theory, which could possibly enhance the development of more sustainable multilingual interpretation in the South African Pentecostal churches.Keywords: congregants, divergences, interpreting/translation, language & communication, sermon/preaching
Procedia PDF Downloads 164281 Mediating Health in Rural Ghana: An Exploratory Study of AI-Driven Health Communications Channels and Media Reportage in Accra
Authors: Amos Ekow Coffie
Abstract:
This exploratory study investigates the impact of AI-driven health communications and media reportage on health outcomes in rural Ghana, focusing on rural communities within Accra. Despite the potential of AI-driven health communications in improving health outcomes, its adoption in rural Ghana is hindered by infrastructure challenges, digital literacy, and cultural factors. Media reportage plays a crucial role in shaping health perceptions and behaviors, but its impact is limited by inadequate health reporting, lack of specialized health journalists, and limited access to health information. This study aims to explore the integration of AI-driven health communications into media practices in rural Ghana, addressing the following research questions: How do AI-driven health communications impact health outcomes in rural Ghana? What role does media reportage play in shaping health perceptions and behaviors in Accra? How can AI-driven health communications and media reportage be optimized to improve health outcomes in rural Ghana? Using a mixed-methods approach, this study will combine surveys, interviews, and content analysis to investigate the impact of AI-driven Health Communication and media reportage on health outcomes in rural areas in Ghana. AI-driven health communications is the use of artificial intelligence (AI) technologies to design, deliver, and evaluate health messages, interventions, and campaigns. The study's findings will contribute to the development of effective health communication strategies, addressing the significant health disparities in rural areas in Ghana.Keywords: AI Driven Health Communication, Media Reporting, Rural Areas, Communication Channels
Procedia PDF Downloads 23280 A Qualitative Evidence of the Markedness of Code Switching during Commercial Bank Service Encounters in Ìbàdàn Metropolis
Authors: A. Robbin
Abstract:
In a multilingual setting like Nigeria, the success of service encounters is enhanced by the use of a language that ensures the linguistic and persuasive demands of the interlocutors. This study examined motivations for code switching as a negotiation strategy in bank-hall desk service encounters in Ìbàdàn metropolis using Myers-Scotton’s exploration on markedness in language use. The data consisted of transcribed audio recording of bank-hall service encounters, and direct observation of bank interactions in two purposively sampled commercial banks in Ìbàdàn metropolis. The data was subjected to descriptive linguistic analysis using Myers Scotton’s Markedness Model. Findings reveal that code switching is frequently employed during different stages of service encounter: greeting, transaction and closing to fulfil relational, bargaining and referential functions. Bank staff and customers code switch to make unmarked, marked and explanatory choices. A strategy used to identify with customer’s cultural affiliation, close status gap, and appeal to begrudged customer; or as an explanatory choice with non-literate customers for ease of communication. Bankers select English to maintain customers’ perceptions of prestige which is retained or diverged from depending on their linguistic preference or ability. Yoruba is seen as an efficient negotiation strategy with both bankers and their customers, making choices within conversation to achieve desired conversational and functional aims.Keywords: banking, bilingualism, code-switching, markedness, service encounter
Procedia PDF Downloads 204279 Livonian Werewolves, 1500-1700s: A Sociological Assessment of Their Historical Significance and Origins through the Case of Old Thiess
Authors: Liu Jiaxin
Abstract:
This paper seeks to do an in-depth investigation on the phenomenon of Early Modern era (1500-1700s) Livonian werewolves. Noting their uniqueness in comparison to contemporaneous werewolves hailing from other geographic areas, the paper suggests that the Livonian werewolf is a metaphor for Livonian society at that time, one which was characterized by social turmoil and strict class hierarchy. This metaphor was utilized by different classes to establish their own interests in society, and thus the paper concludes that the werewolf is a mutable artifact whose value is contingent on its social context. This is demonstrated by the particular case of Old Thiess—a poor, elderly Livonian peasant who gave an unorthodox and anomalous testimony when accused of being a werewolf. In his court statement, it is shown how Thiess was, in fact, alluding to social tensions by lambasting the rich German elite and establishing the righteousness of the peasantry, of which he was a member. A close reading method was utilized on the trial transcript of Old Thiess with heavy reference to Carlo Ginzburg and Bruce Lincoln’s collaborative work Old Thiess, a Livonian werewolf: a classic case in comparative perspective. Through a contextual reading of Livonia’s social atmosphere, the paper draws connections between the content of the trial to wider societal disturbances happening at the time. The thesis—that the werewolf is a flexible metaphor for the social milieu—is further buttressed by numerous contemporaneous sources that had similar messages as Thiess’ transcript, which are discussed as well.Keywords: early-modern baltic, Livonia, Old Thiess, social history, werewolves
Procedia PDF Downloads 104278 Hand Gesture Interface for PC Control and SMS Notification Using MEMS Sensors
Authors: Keerthana E., Lohithya S., Harshavardhini K. S., Saranya G., Suganthi S.
Abstract:
In an epoch of expanding human-machine interaction, the development of innovative interfaces that bridge the gap between physical gestures and digital control has gained significant momentum. This study introduces a distinct solution that leverages a combination of MEMS (Micro-Electro-Mechanical Systems) sensors, an Arduino Mega microcontroller, and a PC to create a hand gesture interface for PC control and SMS notification. The core of the system is an ADXL335 MEMS accelerometer sensor integrated with an Arduino Mega, which communicates with a PC via a USB cable. The ADXL335 provides real-time acceleration data, which is processed by the Arduino to detect specific hand gestures. These gestures, such as left, right, up, down, or custom patterns, are interpreted by the Arduino, and corresponding actions are triggered. In the context of SMS notifications, when a gesture indicative of a new SMS is recognized, the Arduino relays this information to the PC through the serial connection. The PC application, designed to monitor the Arduino's serial port, displays these SMS notifications in the serial monitor. This study offers an engaging and interactive means of interfacing with a PC by translating hand gestures into meaningful actions, opening up opportunities for intuitive computer control. Furthermore, the integration of SMS notifications adds a practical dimension to the system, notifying users of incoming messages as they interact with their computers. The use of MEMS sensors, Arduino, and serial communication serves as a promising foundation for expanding the capabilities of gesture-based control systems.Keywords: hand gestures, multiple cables, serial communication, sms notification
Procedia PDF Downloads 66277 A Deep Learning Approach to Online Social Network Account Compromisation
Authors: Edward K. Boahen, Brunel E. Bouya-Moko, Changda Wang
Abstract:
The major threat to online social network (OSN) users is account compromisation. Spammers now spread malicious messages by exploiting the trust relationship established between account owners and their friends. The challenge in detecting a compromised account by service providers is validating the trusted relationship established between the account owners, their friends, and the spammers. Another challenge is the increase in required human interaction with the feature selection. Research available on supervised learning (machine learning) has limitations with the feature selection and accounts that cannot be profiled, like application programming interface (API). Therefore, this paper discusses the various behaviours of the OSN users and the current approaches in detecting a compromised OSN account, emphasizing its limitations and challenges. We propose a deep learning approach that addresses and resolve the constraints faced by the previous schemes. We detailed our proposed optimized nonsymmetric deep auto-encoder (OPT_NDAE) for unsupervised feature learning, which reduces the required human interaction levels in the selection and extraction of features. We evaluated our proposed classifier using the NSL-KDD and KDDCUP'99 datasets in a graphical user interface enabled Weka application. The results obtained indicate that our proposed approach outperformed most of the traditional schemes in OSN compromised account detection with an accuracy rate of 99.86%.Keywords: computer security, network security, online social network, account compromisation
Procedia PDF Downloads 115276 Development of Automatic Laser Scanning Measurement Instrument
Authors: Chien-Hung Liu, Yu-Fen Chen
Abstract:
This study used triangular laser probe and three-axial direction mobile platform for surface measurement, programmed it and applied it to real-time analytic statistics of different measured data. This structure was used to design a system integration program: using triangular laser probe for scattering or reflection non-contact measurement, transferring the captured signals to the computer through RS-232, and using RS-485 to control the three-axis platform for a wide range of measurement. The data captured by the laser probe are formed into a 3D surface. This study constructed an optical measurement application program in the concept of visual programming language. First, the signals are transmitted to the computer through RS-232/RS-485, and then the signals are stored and recorded in graphic interface timely. This programming concept analyzes various messages, and makes proper presentation graphs and data processing to provide the users with friendly graphic interfaces and data processing state monitoring, and identifies whether the present data are normal in graphic concept. The major functions of the measurement system developed by this study are thickness measurement, SPC, surface smoothness analysis, and analytical calculation of trend line. A result report can be made and printed promptly. This study measured different heights and surfaces successfully, performed on-line data analysis and processing effectively, and developed a man-machine interface for users to operate.Keywords: laser probe, non-contact measurement, triangulation measurement principle, statistical process control, labVIEW
Procedia PDF Downloads 359