Search results for: peer to peer networks
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 3206

Search results for: peer to peer networks

2756 A Neural Network Approach to Understanding Turbulent Jet Formations

Authors: Nurul Bin Ibrahim

Abstract:

Advancements in neural networks have offered valuable insights into Fluid Dynamics, notably in addressing turbulence-related challenges. In this research, we introduce multiple applications of models of neural networks, namely Feed-Forward and Recurrent Neural Networks, to explore the relationship between jet formations and stratified turbulence within stochastically excited Boussinesq systems. Using machine learning tools like TensorFlow and PyTorch, the study has created models that effectively mimic and show the underlying features of the complex patterns of jet formation and stratified turbulence. These models do more than just help us understand these patterns; they also offer a faster way to solve problems in stochastic systems, improving upon traditional numerical techniques to solve stochastic differential equations such as the Euler-Maruyama method. In addition, the research includes a thorough comparison with the Statistical State Dynamics (SSD) approach, which is a well-established method for studying chaotic systems. This comparison helps evaluate how well neural networks can help us understand the complex relationship between jet formations and stratified turbulence. The results of this study underscore the potential of neural networks in computational physics and fluid dynamics, opening up new possibilities for more efficient and accurate simulations in these fields.

Keywords: neural networks, machine learning, computational fluid dynamics, stochastic systems, simulation, stratified turbulence

Procedia PDF Downloads 47
2755 A CM-Based Model for 802.11 Networks Security Policies Enforcement

Authors: Karl Mabiala Dondia, Jing Ma

Abstract:

In recent years, networks based on the 802.11 standards have gained a prolific deployment. The reason for this massive acceptance of the technology by both home users and corporations is assuredly due to the "plug-and-play" nature of the technology and the mobility. The lack of physical containment due to inherent nature of the wireless medium makes maintenance very challenging from a security standpoint. This study examines via continuous monitoring various predictable threats that 802.11 networks can face, how they are executed, where each attack may be executed and how to effectively defend against them. The key goal is to identify the key components of an effective wireless security policy.

Keywords: wireless LAN, IEEE 802.11 standards, continuous monitoring, security policy

Procedia PDF Downloads 351
2754 The Changing Trend of Collaboration Patterns in the Social Sciences: Institutional Influences on Academic Research in Korea, 2013-2016

Authors: Ho-Dae Chong, Jong-Kil Kim

Abstract:

Collaborative research has become more prevalent and important across disciplines because it stimulates innovation and interaction between scholars. Seeing as existing studies relatively disregarded the institutional conditions triggering collaborative research, this work aims to analyze the changing trend in collaborative work patterns among Korean social scientists. The focus of this research is the performance of social scientists who received research grants through the government’s Social Science Korea (SSK) program. Using quantitative statistical methods, collaborative research patterns in a total of 2,354 papers published under the umbrella of the SSK program in peer-reviewed scholarly journals from 2013 to 2016 were examined to identify changing trends and triggering factors in collaborative research. A notable finding is that the share of collaborative research is overwhelmingly higher than that of individual research. In particular, levels of collaborative research surpassed 70%, increasing much quicker compared to other research done in the social sciences. Additionally, the most common composition of collaborative research was for two or three researchers to conduct joint research as coauthors, and this proportion has also increased steadily. Finally, a strong association between international journals and co-authorship patterns was found for the papers published by SSK program researchers from 2013 to 2016. The SSK program can be seen as the driving force behind collaboration between social scientists. Its emphasis on competition through a merit-based financial support system along with a rigorous evaluation process seems to have influenced researchers to cooperate with those who have similar research interests.

Keywords: coauthorship, collaboration, competition, cooperation, Social Science Korea, policy

Procedia PDF Downloads 202
2753 Emergence of Information Centric Networking and Web Content Mining: A Future Efficient Internet Architecture

Authors: Sajjad Akbar, Rabia Bashir

Abstract:

With the growth of the number of users, the Internet usage has evolved. Due to its key design principle, there is an incredible expansion in its size. This tremendous growth of the Internet has brought new applications (mobile video and cloud computing) as well as new user’s requirements i.e. content distribution environment, mobility, ubiquity, security and trust etc. The users are more interested in contents rather than their communicating peer nodes. The current Internet architecture is a host-centric networking approach, which is not suitable for the specific type of applications. With the growing use of multiple interactive applications, the host centric approach is considered to be less efficient as it depends on the physical location, for this, Information Centric Networking (ICN) is considered as the potential future Internet architecture. It is an approach that introduces uniquely named data as a core Internet principle. It uses the receiver oriented approach rather than sender oriented. It introduces the naming base information system at the network layer. Although ICN is considered as future Internet architecture but there are lot of criticism on it which mainly concerns that how ICN will manage the most relevant content. For this Web Content Mining(WCM) approaches can help in appropriate data management of ICN. To address this issue, this paper contributes by (i) discussing multiple ICN approaches (ii) analyzing different Web Content Mining approaches (iii) creating a new Internet architecture by merging ICN and WCM to solve the data management issues of ICN. From ICN, Content-Centric Networking (CCN) is selected for the new architecture, whereas, Agent-based approach from Web Content Mining is selected to find most appropriate data.

Keywords: agent based web content mining, content centric networking, information centric networking

Procedia PDF Downloads 446
2752 Key Concepts of 5th Generation Mobile Technology

Authors: Magri Hicham, Noreddine Abghour, Mohamed Ouzzif

Abstract:

The 5th generation of mobile networks is term used in various research papers and projects to identify the next major phase of mobile telecommunications standards. 5G wireless networks will support higher peak data rate, lower latency and provide best connections with QoS guarenty. In this article, we discuss various promising technologies for 5G wireless communication systems, such as IPv6 support, World Wide Wireless Web (WWWW), Dynamic Adhoc Wireless Networks (DAWN), BEAM DIVISION MULTIPLE ACCESS (BDMA), Cloud Computing and cognitive radio technology.

Keywords: WWWW, BDMA, DAWN, 5G, 4G, IPv6, Cloud Computing

Procedia PDF Downloads 485
2751 Function Approximation with Radial Basis Function Neural Networks via FIR Filter

Authors: Kyu Chul Lee, Sung Hyun Yoo, Choon Ki Ahn, Myo Taeg Lim

Abstract:

Recent experimental evidences have shown that because of a fast convergence and a nice accuracy, neural networks training via extended Kalman filter (EKF) method is widely applied. However, as to an uncertainty of the system dynamics or modeling error, the performance of the method is unreliable. In order to overcome this problem in this paper, a new finite impulse response (FIR) filter based learning algorithm is proposed to train radial basis function neural networks (RBFN) for nonlinear function approximation. Compared to the EKF training method, the proposed FIR filter training method is more robust to those environmental conditions. Furthermore, the number of centers will be considered since it affects the performance of approximation.

Keywords: extended Kalman filter, classification problem, radial basis function networks (RBFN), finite impulse response (FIR) filter

Procedia PDF Downloads 435
2750 Social Networks Global Impact on Protest Movements and Human Rights Activism

Authors: Marcya Burden, Savonna Greer

Abstract:

In the wake of social unrest around the world, protest movements have been captured like never before. As protest movements have evolved, so too have their visibility and sources of coverage. Long gone are the days of print media as our only glimpse into the action surrounding a protest. Now, with social networks such as Facebook, Instagram and Snapchat, we have access to real-time video footage of protest movements and human rights activism that can reach millions of people within seconds. This research paper investigated various social media network platforms’ statistical usage data in the areas of human rights activism and protest movements, paralleling with other past forms of media coverage. This research demonstrates that social networks are extremely important to protest movements and human rights activism. With over 2.9 billion users across social media networks globally, these platforms are the heart of most recent protests and human rights activism. This research shows the paradigm shift from the Selma March of 1965 to the more recent protests of Ferguson in 2014, Ni Una Menos in 2015, and End Sars in 2018. The research findings demonstrate that today, almost anyone may use their social networks to protest movement leaders and human rights activists. From a student to an 80-year-old professor, the possibility of reaching billions of people all over the world is limitless. Findings show that 82% of the world’s internet population is on social networks 1 in every 5 minutes. Over 65% of Americans believe social media highlights important issues. Thus, there is no need to have a formalized group of people or even be known online. A person simply needs to be engaged on their respective social media networks (Facebook, Twitter, Instagram, Snapchat) regarding any cause they are passionate about. Information may be exchanged in real time around the world and a successful protest can begin.

Keywords: activism, protests, human rights, networks

Procedia PDF Downloads 65
2749 Smart Trust Management for Vehicular Networks

Authors: Amel Ltifi, Ahmed Zouinkhi, Med Salim Bouhlel

Abstract:

Spontaneous networks such as VANET are in general deployed in an open and thus easily accessible environment. Therefore, they are vulnerable to attacks. Trust management is one of a set of security solutions dedicated to this type of networks. Moreover, the strong mobility of the nodes (in the case of VANET) makes the establishment of a trust management system complex. In this paper, we present a concept of ‘Active Vehicle’ which means an autonomous vehicle that is able to make decision about trustworthiness of alert messages transmitted about road accidents. The behavior of an “Active Vehicle” is modeled using Petri Nets.

Keywords: active vehicle, cooperation, petri nets, trust management, VANET

Procedia PDF Downloads 377
2748 The Effect of Family SES (Income) On Children’s Socio-Emotional Development

Authors: Xiao Hu

Abstract:

Children’s social and emotional development is critical for developing their future relationships and behaviors, and poor social skills may result in serious emotional externalizations such as anxiety, distress and aggression. Recent research has emphasized the role of family socio-economic status on children’s emotional development, and this study contributes to this academic discussion by reviewing how socio-economic status affects children at three critical development stages: infancy (0-3months), pre-school (4 months-5 years) and school aged (6-10 years). Results show a consensus in the research literature on a positive relationship between family socio-economic status and children’s emotional development. Socialization, a crucial development milestone, is highly affected by a family’s socio-economic status, as families with higher incomes have access to improved social environments, healthier parenting styles and greater access to social capital and peer support. In contrast, families with lower income and SES (socio-economic status) have lower access to these benefits and are frequently ignored within social environments. This review concludes with a critical discussion on how family income affects children’s social environment, highlighting the important role that “permanent” income plays in children’s development. Consequently, the review suggests that future governments should provide temporary economic support for lower-income families, allowing children to be raised in a healthy social environment with limited economic fluctuation.

Keywords: family socio-economic status, parenting style, children’s emotional development, family permanent income

Procedia PDF Downloads 119
2747 Performance Analysis of Wireless Sensor Networks in Areas for Sports Activities and Environmental Preservation

Authors: Teles de Sales Bezerra, Saulo Aislan da Silva Eleuterio, José Anderson Rodrigues de Souza, Ítalo de Pontes Oliveira

Abstract:

This paper presents a analysis of performance the Received Strength Signal Indicator (RSSI) to Wireless Sensor Networks, with a finality of investigate a behavior of ZigBee devices operating into real environments. The test of performance was realize using two Series 1 ZigBee Module and two modules of development Arduino Uno R3, evaluating in this form a measurements of RSSI into environments like places of sports, preservation forests and water reservoir.

Keywords: wireless sensor networks, RSSI, Arduino, environments

Procedia PDF Downloads 589
2746 Analyzing Perceptions of Leadership Capacities After a Year-Long Leadership Development Training: An Exploratory Study of School Leaders in South Africa

Authors: Norma Kok, Diemo Masuko, Thandokazi Dlongwana, Komala Pillay

Abstract:

CONTEXT: While many school principals have been outstanding teachers and have inherent leadership potential, many have not had access to the quality of leadership development or support that empowers them to produce high-quality education outcomes in extremely challenging circumstances. Further, school leaders in under-served communities face formidable challenges arising from insufficient infrastructure, overcrowded classrooms, socio-economic challenges within the community, and insufficient parental involvement, all of which put a strain on principals’ ability to lead their schools effectively. In addition few school leaders have access to other supportive networks, and many do not know how to build and leverage social capital to create opportunities for their schools and learners. Moreover, we know that fostering parental involvement in their children’s learning improves a child’s morale, attitude, and academic achievement across all subject areas, and promotes better behaviour and social adjustment. Citizen Leader Lab facilitates the Partners for Possibility (PfP) programme to provide leadership development and support to school leaders serving under-resourced communities in South Africa to create effective environments of learning. This is done by creating partnerships between school leaders and private-sector business leaders over a 12-month period. (185) OBJECTIVES: To explore school leaders’ perceptions of their leadership capacities and changes at their schools after being exposed to a year-long leadership development training programme. METHODS: School leaders gained new leadership capacities e.g. resilience, improved confidence, communication and conflict resolution skills - catalysing into improved cultures of collaborative decision-making and environments for enhanced teaching and learningprogramme based on the 70:20:10 model whereby: 10% of learning comes from workshops, 20% of learning takes place through peer learning and 70% of learning occurs through experiential learning as partnerships work together to identify and tackle challenges in targeted schools. Participants completed a post-programme questionnaire consisting of structured and unstructured questions and semi-structured interviews were conducted with them and their business leader. The interviews were audio-recorded, transcribed and thematic content analysis was undertaken. The analysis was inductive and emerging themes were identified. A code list was generated after coding was undertaken using computer software (Dedoose). Quantitative data gathered from surveys was aggregated and analysed. RESULTS: School leadership found the programme interesting and rewarding. They gained new leadership capacities such as resilience, improved confidence, communication and conflict resolution skills - catalyzing into improved cultures of collaborative decision-making and environments for enhanced teaching and learning. New networks resulted in tangible outcomes such as upgrades to school infrastructure, water and sanitation, vegetable gardens at schools resulting in nutrition for learners and/or intangible outcomes such as skills for members of school management teams (SMTs). Collaborative leadership led to SMTs being more aligned, efficient, and cohesive; and teachers being more engaged and motivated. Notable positive changes at the school inspired parents and community members to become more actively involved in the school and in their children’s education. CONCLUSION: The PfP programme leads to improved leadership capacities and improved school culture which leads to improved teaching and learning and new resources for schools.

Keywords: collaborative decision-making, collaborative leadership, community involvement, confidence

Procedia PDF Downloads 66
2745 Proposed Intervention to the Attention of Harassment at a Public University

Authors: R. Echeverría Echeverría, C. Carrillo Trujillo, N. Evia Alamilla

Abstract:

Today, bullying is an expression of violence. It is a present problem in different contexts. Bullying and harassment have become subject matter of professional psychology , anthropology and other social sciences and related areas. However, most research on bullying have focused on peer violence and basic education. There is little attention to harassment in higher education. It also has little generation of research and interventions in universities, undergraduate and postgraduate level. The aim of this paper is to present a proposal for intervention to the attention of college students who have had an experience of harassment and / or bullying in a Public University of Merida, Yucatan, Mexico. The methodology was qualitative phenomenological. Semiestructura interview techniques and focus groups were used. 6 students participated who have lived harassment or bullying. Also they are participating teachers and university leaders who play an important role in the presence of such cases. The purpose is to analyze the presence of policies for the prevention, treatment and punishment of those problems. The qualitative data analysis will be based on the general proposal of Rodriguez Gomez Gil Flores and García Jiménez (1999). The results show the need to create a body entrusted to provide timely attention to cases of bullying or harassment that are reported. It is important to take legal and psychological support of the University authorities. It is proposed to create a mechanism to ensure timely care and not victimized who has had the experience; in addition to the punishment of those who exercised to ensure that violence. In discussing the successes and failures of the proposal are highlighted. And the processes that have been facilitated or hampered progress for the project.

Keywords: bullying, harassment, intervention, public university

Procedia PDF Downloads 279
2744 Under the 'Umbrella' Project: A Volunteer-Mentoring Approach for Socially Disadvantaged University Students

Authors: Evridiki Zachopoulou, Vasilis Grammatikopoulos, Michail Vitoulis, Athanasios Gregoriadis

Abstract:

In the last ten years, the recent economic crisis in Greece has decreased the financial ability and strength of several families when it comes to supporting their children’s studies. As a result, the number of students who are significantly delaying or even dropping out of their university studies is constantly increasing. The students who are at greater risk for academic failure are those who are facing various problems and social disadvantages, like health problems, special needs, family poverty or unemployment, single-parent students, immigrant students, etc. The ‘Umbrella’ project is a volunteer-based initiative to tackle this problem at International Hellenic University. The main purpose of the project is to provide support to disadvantaged students at a socio-emotional, academic, and practical level in order to help them complete their undergraduate studies. More specifically, the ‘Umbrella’ project has the following goals: (a) to develop a consulting-supporting network based on volunteering senior students, called ‘i-mentors’. (b) to train the volunteering i-mentors and create a systematic and consistent support procedure for students at-risk, (c), to develop a service that, parallel to the i-mentor network will be ensuring opportunities for at-risk students to find a job, (d) to support students who are coping with accessibility difficulties, (e) to secure the sustainability of the ‘Umbrella’ project after the completion of the funding of the project. The innovation of the Umbrella project is in its holistic-person-centered approach that will be providing individualized support -via the i-mentors network- to any disadvantaged student that will come ‘under the Umbrella.’

Keywords: peer mentoring, student support, socially disadvantaged students, volunteerism in higher education

Procedia PDF Downloads 213
2743 Dissolved Gas Analysis Based Regression Rules from Trained ANN for Transformer Fault Diagnosis

Authors: Deepika Bhalla, Raj Kumar Bansal, Hari Om Gupta

Abstract:

Dissolved Gas Analysis (DGA) has been widely used for fault diagnosis in a transformer. Artificial neural networks (ANN) have high accuracy but are regarded as black boxes that are difficult to interpret. For many problems it is desired to extract knowledge from trained neural networks (NN) so that the user can gain a better understanding of the solution arrived by the NN. This paper applies a pedagogical approach for rule extraction from function approximating neural networks (REFANN) with application to incipient fault diagnosis using the concentrations of the dissolved gases within the transformer oil, as the input to the NN. The input space is split into subregions and for each subregion there is a linear equation that is used to predict the type of fault developing within a transformer. The experiments on real data indicate that the approach used can extract simple and useful rules and give fault predictions that match the actual fault and are at times also better than those predicted by the IEC method.

Keywords: artificial neural networks, dissolved gas analysis, rules extraction, transformer

Procedia PDF Downloads 503
2742 Blockchain Security in MANETs

Authors: Nada Mouchfiq, Ahmed Habbani, Chaimae Benjbara

Abstract:

The security aspect of the IoT occupies a place of great importance especially after the evolution that has known this field lastly because it must take into account the transformations and the new applications .Blockchain is a new technology dedicated to the data sharing. However, this does not work the same way in the different systems with different operating principles. This article will discuss network security using the Blockchain to facilitate the sending of messages and information, enabling the use of new processes and enabling autonomous coordination of devices. To do this, we will discuss proposed solutions to ensure a high level of security in these networks in the work of other researchers. Finally, our article will propose a method of security more adapted to our needs as a team working in the ad hoc networks, this method is based on the principle of the Blockchain and that we named ”MPR Blockchain”.

Keywords: Ad hocs networks, blockchain, MPR, security

Procedia PDF Downloads 151
2741 Use of Social Support for Fathers with Developmental Disabilities in Japan

Authors: Shiori Ishida, Hiromi Okuno, Hisato Igarashi, Akemi Yamazaki, Hiroko Takahashi

Abstract:

The purpose of this study was to clarify the differences and similarities regarding the social support of fathers and mothers towards considering increased assistance for the paternity of children with developmental disabilities. Written questionnaires were completed by fathers (n=85) and mothers (n=101) of children using rehabilitation facilities between infancy and 5 years of age. The survey contained multiple-choice questions on four categories: information support (6 items), emotional support (7 items), evaluation support (3 items), and daily living support (3 items). Regarding information support, fathers answered ‘spouse’ as the provider in over 50% of cases for all 6 items, which was significantly different compared with mothers (all p < 0.001). For emotional support, fathers were significantly more likely to get support from the workplace (p < 0.001) and from spouse (p < 0.001). The ‘evaluation support’ did not have significant differences for fathers in all the items, but the most frequent support providers were ‘spouses’. ‘Daily living support’ was significantly different from fathers in the workplace (p < 0.000) in terms of make allowances for work and duties. Thus, it appeared that fathers had fewer social support sources as compared with mothers and limited non-spouse support. The understanding of developmental disabilities, acquisition of methods of rehabilitation, and sources of support might have been inadequately addressed among fathers, which could be a hindrance to the involvement of fathers in the rearing of children with developmental disabilities. On the other hand, we also observed that some fathers were involved in the care of developmentally troubled children while providing mental support for their spouse, cooperating with housework, and adjusting their work life. However, the results on the external and social backgrounds of fathers indicated a necessity for greater empowerment and peer support to improve the paternal care of children with developmental disabilities in the family survey.

Keywords: children with developmental disabilities, family support, father, social support

Procedia PDF Downloads 111
2740 Selecting the Best RBF Neural Network Using PSO Algorithm for ECG Signal Prediction

Authors: Najmeh Mohsenifar, Narjes Mohsenifar, Abbas Kargar

Abstract:

In this paper, has been presented a stable method for predicting the ECG signals through the RBF neural networks, by the PSO algorithm. In spite of quasi-periodic ECG signal from a healthy person, there are distortions in electro cardiographic data for a patient. Therefore, there is no precise mathematical model for prediction. Here, we have exploited neural networks that are capable of complicated nonlinear mapping. Although the architecture and spread of RBF networks are usually selected through trial and error, the PSO algorithm has been used for choosing the best neural network. In this way, 2 second of a recorded ECG signal is employed to predict duration of 20 second in advance. Our simulations show that PSO algorithm can find the RBF neural network with minimum MSE and the accuracy of the predicted ECG signal is 97 %.

Keywords: electrocardiogram, RBF artificial neural network, PSO algorithm, predict, accuracy

Procedia PDF Downloads 602
2739 The Role of Social Networks in Promoting Ethics in Iranian Sports

Authors: Tayebeh Jameh-Bozorgi, M. Soleymani

Abstract:

In this research, the role of social networks in promoting ethics in Iranian sports was investigated. The research adopted a descriptive-analytic method, and the survey’s population consisted of all the athletes invited to the national football, volleyball, wrestling and taekwondo teams. Considering the limited population, the size of the society was considered as the sample size. After the distribution of the questionnaires, 167 respondents answered the questionnaires correctly. The data collection tool was chosen according to Hamid Ghasemi`s, standard questionnaire for social networking and mass media, which has 28 questions. Reliability of the questionnaire was calculated using Cronbach's alpha coefficient (94%). The content validity of the questionnaire was also approved by the professors. In this study, descriptive statistics and inferential statistical methods were used to analyze the data using statistical software. The benchmark tests used in this research included the following: Binomial test, Friedman test, Spearman correlation coefficient, Vermont Creamers, Good fit test and comparative prototypes. The results showed that athletes believed that social network has a significant role in promoting sport ethics in the community. Telegram has been known to play a big role than other social networks. Moreover, the respondents' view on the role of social networks in promoting sport ethics was significantly different in both men and women groups. In fact, women had a more positive attitude towards the role of social networks in promoting sport ethics than men. The respondents' view of the role of social networks in promoting the ethics of sports in the study groups also had a significant difference. Additionally, there was a significant and reverse relationship between the sports experience and the attitude of national athletes regarding the role of social networks in promoting ethics in sports.

Keywords: ethics, social networks, mass media, Iranian sports, internet

Procedia PDF Downloads 266
2738 The Neurofunctional Dissociation between Animal and Tool Concepts: A Network-Based Model

Authors: Skiker Kaoutar, Mounir Maouene

Abstract:

Neuroimaging studies have shown that animal and tool concepts rely on distinct networks of brain areas. Animal concepts depend predominantly on temporal areas while tool concepts rely on fronto-temporo-parietal areas. However, the origin of this neurofunctional distinction for processing animal and tool concepts remains still unclear. Here, we address this question from a network perspective suggesting that the neural distinction between animals and tools might reflect the differences in their structural semantic networks. We build semantic networks for animal and tool concepts derived from McRae and colleagues’s behavioral study conducted on a large number of participants. These two networks are thus analyzed through a large number of graph theoretical measures for small-worldness: centrality, clustering coefficient, average shortest path length, as well as resistance to random and targeted attacks. The results indicate that both animal and tool networks have small-world properties. More importantly, the animal network is more vulnerable to targeted attacks compared to the tool network a result that correlates with brain lesions studies.

Keywords: animals, tools, network, semantics, small-worls, resilience to damage

Procedia PDF Downloads 518
2737 Gender Equality in Brazil: Advances and Retreats in Times of Social Networks

Authors: Lara Góes Da Costa

Abstract:

This paper analyzes the social dimension of the empowerment of women in Brazil, following the principles of human development of the UN WOMEN, in particular the sixth principle, which establishes the promotion of gender equality through social policy initiatives and activism in general aimed at community. In Brazil, women's empowerment has taken social networks through the creation of avatars and pages of dissemination and promotion of gender equality, as well as denunciations and educational posts such as 'Observe Gender', 'Empower Two Women', 'Black Intellectual Women', among others. At the same time, women's social inclusion bills in various sectors are trailing in the legislative apparatus, with little or no relation to the current discussion of gender diversity and intersectionality. In this sense, this article establishes an analytical parallel between the media manifestations of social networks and the social distance of the representatives of the legislative power. This parallelly shows the political failing to meet the social demands of inclusion, as to multiply the creation of laws and the effectiveness of the principle of promoting gender equality.

Keywords: gender, rights, justice, social networks

Procedia PDF Downloads 370
2736 A Unified Approach for Naval Telecommunication Architectures

Authors: Y. Lacroix, J.-F. Malbranque

Abstract:

We present a chronological evolution for naval telecommunication networks. We distinguish periods: with or without multiplexers, with switch systems, with federative systems, with medium switching, and with medium switching with wireless networks. This highlights the introduction of new layers and technology in the architecture. These architectures are presented using layer models of transmission, in a unified way, which enables us to integrate pre-existing models. A ship of a naval fleet has internal communications (i.e. applications' networks of the edge) and external communications (i.e. the use of the means of transmission between edges). We propose architectures, deduced from the layer model, which are the point of convergence between the networks on board and the HF, UHF radio, and satellite resources. This modelling allows to consider end-to-end naval communications, and in a more global way, that is from the user on board towards the user on shore, including transmission and networks on the shore side. The new architectures need take care of quality of services for end-to-end communications, the more remote control develops a lot and will do so in the future. Naval telecommunications will be more and more complex and will use more and more advanced technologies, it will thus be necessary to establish clear global communication schemes to grant consistency of the architectures. Our latest model has been implemented in a military naval situation, and serves as the basic architecture for the RIFAN2 network.

Keywords: equilibrium beach profile, eastern tombolo of Giens, potential function, erosion

Procedia PDF Downloads 270
2735 Bekaadendang: A Principles-Focused Evaluation

Authors: Erin Brands-Saliba

Abstract:

In this evaluation study, we explore the efficacy and implementation of the five guiding principles of Bekaadendang “Being Peaceful,” a suite of services facilitated by our Anti-Human Trafficking Team, and a pivotal component of the Holistic Prevention Services department at NCFST. The guiding principles—trauma-informed care, cultural safety, 4-quadrant medicine wheel approach, harm reduction, and after-care peer support—are the foundation of Bekaadendang's mission to support at-risk individuals and survivors of human trafficking. This evaluation is of paramount importance given the profound impact of human trafficking on these communities and aims to ensure that Bekaadendang's principles are not only understood by staff but experienced by community members in a purposeful and meaningful manner. The issues at the heart of this evaluation are deeply entrenched in the historical and contemporary challenges faced by Indigenous communities, with a particular emphasis on Indigenous women and 2SLGBTQQIA+ individuals. Well-documented reports like the National Inquiry into Missing and Murdered Indigenous Women and Girls (MMIWG) have cast a glaring light on the disproportionately high rates of violence, exploitation, and trafficking experienced by these communities. The MMIWG report underlines the pressing need for holistic, culturally informed interventions like Bekaadendang. Furthermore, the research efforts of scholars, both Indigenous and non-Indigenous, shed light on the persistent systemic issues that make Indigenous individuals more vulnerable to trafficking and exploitation. Recognizing this broader context is crucial to truly grasp the importance of evaluating the guiding principles that underpin Bekaadendang's service model.

Keywords: human trafficking, indigenous healing, MMIWG, program evaluation

Procedia PDF Downloads 18
2734 Leveraging Positive Psychology Practices to Elevate the Impact of Check-In, Check-Out (CICO) in Schools

Authors: Kimberli Breen

Abstract:

Background Check-In, Check-Out is noted as the most widely implemented evidence-based intervention for youth at-promise within schools. Over twenty years of peer-reviewed research demonstrates the powerful effects of this Positive Behavioral Interventions and Supports (PBIS) practice when implemented with fidelity. However, literature to date has not explicitly connected this intervention with Positive Psychology. Aims This session will illustrate the powerful role Positive Psychology and core elements of PERMA play in the worldwide success of this intervention and how more explicitly aligning Positive Behavioral Interventions and Supports (PBIS) practices with Positive Psychology might remove common barriers to current implementation. Method Students receiving the Check-In, Check-Out intervention experience a warm, positive greeting from a caring adult (CICO Coach) before entering their first class of the day. Teachers then provide high frequency positive feedback to the students at the end of each time block, or segment, of the day. An “optimistic close” to the day is then provided by the same CICO Coach at the end of the school day via the “check-out” process, where students assess the day’s accomplishments and goal-set for the next day. Results CICO clearly aligns with the Positive Psychology core elements of PERMA (Positive Emotion, Engagement, Relationships, Meaning and Accomplishments) and could be further strengthened through explicit integration. Conclusion The already powerful impact and reach of the Check-In, Check-Out intervention can be further enhanced and expanded through greater alignment with Positive Psychology elements and practices. Initiating this important alignment with CICO also offers promise for further integration of Positive Psychology and Positive Behavioral Interventions and Supports.

Keywords: positive pscyhology, check-In check-out, schools, alignment

Procedia PDF Downloads 46
2733 Data Science in Military Decision-Making: A Semi-Systematic Literature Review

Authors: H. W. Meerveld, R. H. A. Lindelauf

Abstract:

In contemporary warfare, data science is crucial for the military in achieving information superiority. Yet, to the authors’ knowledge, no extensive literature survey on data science in military decision-making has been conducted so far. In this study, 156 peer-reviewed articles were analysed through an integrative, semi-systematic literature review to gain an overview of the topic. The study examined to what extent literature is focussed on the opportunities or risks of data science in military decision-making, differentiated per level of war (i.e. strategic, operational, and tactical level). A relatively large focus on the risks of data science was observed in social science literature, implying that political and military policymakers are disproportionally influenced by a pessimistic view on the application of data science in the military domain. The perceived risks of data science are, however, hardly addressed in formal science literature. This means that the concerns on the military application of data science are not addressed to the audience that can actually develop and enhance data science models and algorithms. Cross-disciplinary research on both the opportunities and risks of military data science can address the observed research gaps. Considering the levels of war, relatively low attention for the operational level compared to the other two levels was observed, suggesting a research gap with reference to military operational data science. Opportunities for military data science mostly arise at the tactical level. On the contrary, studies examining strategic issues mostly emphasise the risks of military data science. Consequently, domain-specific requirements for military strategic data science applications are hardly expressed. Lacking such applications may ultimately lead to a suboptimal strategic decision in today’s warfare.

Keywords: data science, decision-making, information superiority, literature review, military

Procedia PDF Downloads 138
2732 Investigating Chinese Students' Engagement with Teacher Feedback: Multiple Case Studies in a UK University

Authors: Fangfei Li

Abstract:

This research was conducted to explore how Chinese overseas students, who rarely received teacher feedback during their undergraduate studies in China, engaged in a different feedback provision context in the UK universities. In particular, this research provides some insights into Chinese students’ perspectives on how they made sense of the teacher feedback they obtained and how they took it on board in their assignments. Research questions in this study are 1) What are Chinese overseas students’ perceptions of teacher feedback on courses in UK higher education? 2) How do they respond to the teacher feedback they obtained? 3) What factors might influence their engagement with teacher feedback? Multiple case studies of five Chinese overseas students in a UK university have been carried out to address the research questions. The main data collection instruments are various types of semi-structured interviews, consisting of background interviews, scenario-based activities, stimulated recall sessions and retrospective interviews. Research findings indicate that student engagement with teacher feedback is a complex learning process incorporating several stages: from initial teacher input to ultimate transformational learning. Apart from students interpreting teachers’ comments/suggestions by themselves, students’ understandings of and responses to teacher feedback could also be influenced by pre-submission guidance, peer discussion, use of exemplars and post-submission discussion with teachers. These are key factors influencing students to make use of teacher feedback. Findings also reveal that the level of students’ reflections on tutor feedback influences the quality of their assignments and even their future learning. To sum up, this paper will discuss the current concepts of teacher feedback in existing studies and research findings of this study from which reconceptualization of teacher feedback has occurred.

Keywords: Chinese students, student engagement, teacher feedback, the UK higher education

Procedia PDF Downloads 317
2731 Success Factors for Innovations in SME Networks

Authors: J. Gochermann

Abstract:

Due to complex markets and products, and increasing need to innovate, cooperation between small and medium size enterprises arose during the last decades, which are not prior driven by process optimization or sales enhancement. Especially small and medium sized enterprises (SME) collaborate increasingly in innovation and knowledge networks to enhance their knowledge and innovation potential, and to find strategic partners for product and market development. These networks are characterized by dual objectives, the superordinate goal of the total network, and the specific objectives of the network members, which can cause target conflicts. Moreover, most SMEs do not have structured innovation processes and they are not accustomed to collaborate in complex innovation projects in an open network structure. On the other hand, SMEs have suitable characteristics for promising networking. They are flexible and spontaneous, they have flat hierarchies, and the acting people are not anonymous. These characteristics indeed distinguish them from bigger concerns. Investigation of German SME networks have been done to identify success factors for SME innovation networks. The fundamental network principles, donation-return and confidence, could be confirmed and identified as basic success factors. Further factors are voluntariness, adequate number of network members, quality of communication, neutrality and competence of the network management, as well as reliability and obligingness of the network services. Innovation and knowledge networks with an appreciable number of members from science and technology institutions need also active sense-making to bring different disciplines into successful collaboration. It has also been investigated, whether and how the involvement in an innovation network impacts the innovation structure and culture inside the member companies. The degree of reaction grows with time and intensity of commitment.

Keywords: innovation and knowledge networks, SME, success factors, innovation structure and culture

Procedia PDF Downloads 261
2730 A Case Study on the Seismic Performance Assessment of the High-Rise Setback Tower Under Multiple Support Excitations on the Basis of TBI Guidelines

Authors: Kamyar Kildashti, Rasoul Mirghaderi

Abstract:

This paper describes the three-dimensional seismic performance assessment of a high-rise steel moment-frame setback tower, designed and detailed per the 2010 ASCE7, under multiple support excitations. The vulnerability analyses are conducted based on nonlinear history analyses under a set of multi-directional strong ground motion records which are scaled to design-based site-specific spectrum in accordance with ASCE41-13. Spatial variation of input motions between far distant supports of each part of the tower is considered by defining time lag. Plastic hinge monotonic and cyclic behavior for prequalified steel connections, panel zones, as well as steel columns is obtained from predefined values presented in TBI Guidelines, PEER/ATC72 and FEMA P440A to include stiffness and strength degradation. Inter-story drift ratios, residual drift ratios, as well as plastic hinge rotation demands under multiple support excitations, are compared to those obtained from uniform support excitations. Performance objectives based on acceptance criteria declared by TBI Guidelines are compared between uniform and multiple support excitations. The results demonstrate that input motion discrepancy results in detrimental effects on the local and global response of the tower.

Keywords: high-rise building, nonlinear time history analysis, multiple support excitation, performance-based design

Procedia PDF Downloads 263
2729 Deliberate Learning and Practice: Enhancing Situated Learning Approach in Professional Communication Course

Authors: Susan Lee

Abstract:

Situated learning principles are adopted in the design of the module, professional communication, in its iteration of tasks and assignments to create a learning environment that simulates workplace reality. The success of situated learning is met when students are able to transfer and apply their skills beyond the classroom, in their personal life, and workplace. The learning process should help students recognize the relevance and opportunities for application. In the module’s learning component on negotiation, cases are created based on scenarios inspired by industry practices. The cases simulate scenarios that students on the course may encounter when they enter the workforce when they take on executive roles in the real estate sector. Engaging in the cases has enhanced students’ learning experience as they apply interpersonal communication skills in negotiation contexts of executives. Through the process of case analysis, role-playing, and peer feedback, students are placed in an experiential learning space to think and act in a deliberate manner not only as students but as professionals they will graduate to be. The immersive skills practices enable students to continuously apply a range of verbal and non-verbal communication skills purposefully as they stage their negotiations. The theme in students' feedback resonates with their awareness of the authentic and workplace experiences offered through visceral role-playing. Students also note relevant opportunities for the future transfer of the skills acquired. This indicates that students recognize the possibility of encountering similar negotiation episodes in the real world and realize they possess the negotiation tools and communication skills to deliberately apply them when these opportunities arise outside the classroom.

Keywords: deliberate practice, interpersonal communication skills, role-play, situated learning

Procedia PDF Downloads 188
2728 The Analysis of Split Graphs in Social Networks Based on the k-Cardinality Assignment Problem

Authors: Ivan Belik

Abstract:

In terms of social networks split graphs correspond to the variety of interpersonal and intergroup relations. In this paper we analyse the interaction between the cliques (socially strong and trusty groups) and the independent sets (fragmented and non-connected groups of people) as the basic components of any split graph. Based on the Semi-Lagrangean relaxation for the k-cardinality assignment problem we show the way of how to minimize the socially risky interactions between the cliques and the independent sets within the social network.

Keywords: cliques, independent sets, k-cardinality assignment, social networks, split graphs

Procedia PDF Downloads 292
2727 The Amorphousness of the Exposure Sphere

Authors: Nipun Ansal

Abstract:

People guard their beliefs and opinions with their lives. Beliefs that they’ve formed over a period of time, and can go to any lengths to defy, desist from, resist and negate any outward stimulus that has the potential to shake them. Cognitive dissonance is term used to describe it in theory. And every human being, in order to defend himself from cognitive dissonance applies 4 rings of defense viz. Selective Exposure, Selective Perception, Selective Attention, and Selective Retention. This paper is a discursive analysis on how the onslaught of social media, complete with its intrusive weaponry, has amorphized the external ring of defense: the selective exposure. The stimulus-response model of communication is one of the most inherent model that encompasses communication behaviours of children and elderly, individual and masses, humans and animals alike. The paper deliberates on how information bombardment through the uncontrollable channels of the social media, Facebook and Twitter in particular, have dismantled our outer sphere of exposure, leading users online to a state of constant dissonance, and thus feeding impulsive action-taking. It applies case study method citing an example to corroborate how knowledge generation has given in to the information overload and the effect it has on decision making. With stimulus increasing in number of encounters, opinion formation precedes knowledge because of the increased demand of participation and decrease in time for the information to permeate from the outer sphere of exposure to the sphere of retention, which of course, is through perception and attention. This paper discusses the challenge posed by this fleeting, stimulus rich, peer-dominated media on the traditional models of communication and meaning-generation.

Keywords: communication, discretion, exposure, social media, stimulus

Procedia PDF Downloads 384