Search results for: pseudo voter identity scheme PVID
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 3360

Search results for: pseudo voter identity scheme PVID

2910 Enigmatic Identity and Alienated Self: Existential Analysis of Paul Auster's the Brooklyn Follies

Authors: Sapna Bhargav

Abstract:

Contemporary fiction is an intricate exercise where novelist acquires the role of a philosopher, a sociologist and a psychologist. The dilemma of fragmented self that a man experiences, is a crucial subject of contemporary fiction. Paul Auster's fiction is exemplary of the merger of Existentialism and Postmodernism, and while both of these movements insist on isolation of the self from all aspects of social affiliation, Auster's unique blend of these concepts presents man in a state which is not just alienated, but stranded in a desolate abyss, rendering even the release of death as questionable. The conundrums of the self is a compulsory consequence of the existentialist alienation that postmodern man is subjected to, and is further accentuated by the fact that existentialist freedom dictates that not only are one's actions not dictated by any form of external entity, but also the onus of one's destiny lies on an individual's own deeds. This paper will analyse Auster's The Brooklyn Follies from an Existentialist perspective, and will attempt to trace the alienation and identity conflicts of the Auster’s characters along with some of the common Austerian themes. An emphasis will be laid on the characters’ endeavour to reconstruct their lost self.

Keywords: alienation, existentialism, identity, postmodernism, self

Procedia PDF Downloads 554
2909 Post-Yugoslav Identity Negotiations in Diaspora Settings: Biographical Narration among Academics of Serbian Origin in Baden-Württemberg

Authors: Dragana Bubulj

Abstract:

The Former Republic of Yugoslavia was a sort of protective umbrella, a unique concept of gathering different ethnical, cultural, and religious identities, as well as diverse intersections of those. After 43-months long civil war and states disintegration in 1995, which resulted in 5 post-Yugoslav countries, Yugoslav Diaspora experienced radical changes. In Germany, one of the countries with the highest percentage of Yugoslav emigration, segregation on ethno-national grounds was empowered by the outbreak of the conflict: firstly on a socio-cultural level, and followed by changes on the level of institutional organizing. Psycho-emotional and financial involvement of Diaspora into the war is also not to be neglected. People of Serbian origin have been additionally overstrained with the designation of Serbs as war criminals in German media and the public sphere. In this way, the path from 'being a Yugoslav' toward 'becoming a Serb', outside nowadays Serbia, has been qualitatively different in comparison to potential identity shiftings experienced by other members of Former Yugoslav population. This paper is part of an ongoing PhD research and tackles biographical narratives of academics of Serbian origin in one German region. Paper addresses processes of post-Yugoslav identity negotiations in Diaspora settings, nationalistic tendentious among second generation youth, and discusses - based on NS-references founded in collected data - question of historicity of biographies.

Keywords: biography, diaspora, ethnography, former republic of Yugoslavia, identity

Procedia PDF Downloads 278
2908 Parallelizing the Hybrid Pseudo-Spectral Time Domain/Finite Difference Time Domain Algorithms for the Large-Scale Electromagnetic Simulations Using Massage Passing Interface Library

Authors: Donggun Lee, Q-Han Park

Abstract:

Due to its coarse grid, the Pseudo-Spectral Time Domain (PSTD) method has advantages against the Finite Difference Time Domain (FDTD) method in terms of memory requirement and operation time. However, since the efficiency of parallelization is much lower than that of FDTD, PSTD is not a useful method for a large-scale electromagnetic simulation in a parallel platform. In this paper, we propose the parallelization technique of the hybrid PSTD-FDTD (HPF) method which simultaneously possesses the efficient parallelizability of FDTD and the quick speed and low memory requirement of PSTD. Parallelization cost of the HPF method is exactly the same as the parallel FDTD, but still, it occupies much less memory space and has faster operation speed than the parallel FDTD. Experiments in distributed memory systems have shown that the parallel HPF method saves up to 96% of the operation time and reduces 84% of the memory requirement. Also, by combining the OpenMP library to the MPI library, we further reduced the operation time of the parallel HPF method by 50%.

Keywords: FDTD, hybrid, MPI, OpenMP, PSTD, parallelization

Procedia PDF Downloads 124
2907 Intellectual Women: The Continuing Struggle between Marriage and Personal Dreams in Margaret Drabble's a Summer Bird-Cage and The Millstone

Authors: Ashwag Abdul-Hakeem Al-Thubaiti

Abstract:

This study aims at analysing women's hesitant attitudes towards marriage in Margaret Drabble's novels, A Summer-Bird-Cage (1964) and The Millstone (1965), to prove that these ambivalent feelings are due to their search for autonomy. The heroines' radical outlook on independence is only meant to hide their conflict regarding sex-experience and fear of intimacy, a fear that has been enhanced by their rejection of the expression of faith that considers marriage a sacred bond and instead focus on their own identity and dissolve any bond that may affect their independence. To achieve their autonomy, they have to depend on themselves financially and focus on their aspirational goals. This sharp division between the two worlds, the family life and the personal success attributes negatively to their lives and leads to a self-identity crisis. Drabble tends to solve this struggle by awakening their maternal instinct. Once they respect their physical needs and appreciate their role as it is assigned to them by nature and society, they reach a balanced identity.

Keywords: autonomy, marriage, maternity, women

Procedia PDF Downloads 551
2906 Dislocation and Writing: A Process of Remaking Identity

Authors: Hasti Abbasi

Abstract:

Creative writers have long followed the tradition of romantic exile, looking inward in an attempt to construct new viewpoints through the power of imagination. The writer, who attempts to resist uncertainty and locate her place in the new country through writing, resists creativity itself. For a writer, certain satisfaction can be achieved through producing a creative art away from the anxiety of the sense of dislocation. Dislocation, whether enforced or self-inflicted, could in many ways be a disaster but it could also cultivate a greater creative capacity and be a source of creative expression. This paper will investigate the idea of the creative writer as exiled self through reflections on the relationship between dislocation and writing.

Keywords: dislocation, creative writing, remaking identity, exile literature

Procedia PDF Downloads 272
2905 A Cooperative Signaling Scheme for Global Navigation Satellite Systems

Authors: Keunhong Chae, Seokho Yoon

Abstract:

Recently, the global navigation satellite system (GNSS) such as Galileo and GPS is employing more satellites to provide a higher degree of accuracy for the location service, thus calling for a more efficient signaling scheme among the satellites used in the overall GNSS network. In that the network throughput is improved, the spatial diversity can be one of the efficient signaling schemes; however, it requires multiple antenna that could cause a significant increase in the complexity of the GNSS. Thus, a diversity scheme called the cooperative signaling was proposed, where the virtual multiple-input multiple-output (MIMO) signaling is realized with using only a single antenna in the transmit satellite of interest and with modeling the neighboring satellites as relay nodes. The main drawback of the cooperative signaling is that the relay nodes receive the transmitted signal at different time instants, i.e., they operate in an asynchronous way, and thus, the overall performance of the GNSS network could degrade severely. To tackle the problem, several modified cooperative signaling schemes were proposed; however, all of them are difficult to implement due to a signal decoding at the relay nodes. Although the implementation at the relay nodes could be simpler to some degree by employing the time-reversal and conjugation operations instead of the signal decoding, it would be more efficient if we could implement the operations of the relay nodes at the source node having more resources than the relay nodes. So, in this paper, we propose a novel cooperative signaling scheme, where the data signals are combined in a unique way at the source node, thus obviating the need of the complex operations such as signal decoding, time-reversal and conjugation at the relay nodes. The numerical results confirm that the proposed scheme provides the same performance in the cooperative diversity and the bit error rate (BER) as the conventional scheme, while reducing the complexity at the relay nodes significantly. Acknowledgment: This work was supported by the National GNSS Research Center program of Defense Acquisition Program Administration and Agency for Defense Development.

Keywords: global navigation satellite network, cooperative signaling, data combining, nodes

Procedia PDF Downloads 269
2904 Big Data Analytics and Data Security in the Cloud via Fully Homomorphic Encyption Scheme

Authors: Victor Onomza Waziri, John K. Alhassan, Idris Ismaila, Noel Dogonyara

Abstract:

This paper describes the problem of building secure computational services for encrypted information in the Cloud. Computing without decrypting the encrypted data; therefore, it meets the yearning of computational encryption algorithmic aspiration model that could enhance the security of big data for privacy or confidentiality, availability and integrity of the data and user’s security. The cryptographic model applied for the computational process of the encrypted data is the Fully Homomorphic Encryption Scheme. We contribute a theoretical presentations in a high-level computational processes that are based on number theory that is derivable from abstract algebra which can easily be integrated and leveraged in the Cloud computing interface with detail theoretic mathematical concepts to the fully homomorphic encryption models. This contribution enhances the full implementation of big data analytics based on cryptographic security algorithm.

Keywords: big data analytics, security, privacy, bootstrapping, Fully Homomorphic Encryption Scheme

Procedia PDF Downloads 462
2903 The Design of English Materials to Communicate the Identity of Mueang Distict, Samut Songkram for Ecotourism

Authors: Kitda Praraththajariya

Abstract:

The main purpose of this research was to study how to communicate the identity of the Mueang district, Samut Songkram province for ecotourism. The qualitative data was collected through studying related materials, exploring the area, in-depth interviews with three groups of people: three directly responsible officers who were key informants of the district, twenty foreign tourists and five Thai tourist guides. A content analysis was used to analyze the qualitative data. The two main findings of the study were as follows: 1. The identity of Amphur (District) Mueang, Samut Songkram province. This establishment was near the Mouth of Maekong River for normal people and tourists, consisting of rest accommodations. There are restaurants where food and drinks are served, rich mangrove forests, Hoy Lod (Razor Clam) and mangrove trees. Don Hoy Lod, is characterized by muddy beaches, is a coastal wetland for Ramsar Site. It is at 1099th ranging where the greatest number of Hoy Lod (Razor Clam) can be seen from March to May each year. 2. The communication of the identity of Amphur Mueang, Samut Songkram province which the researcher could find and design to present in English materials can be summed up in 4 items: 1) The history of Amphur Mueang, Samut Songkram province 2) Wat Phet Samut Worrawihan 3) The Learning source of Ecotourism: Don Hoy Lod and Mangrove forest 4) How to keep Amphur Mueang, Samut Songkram province for ecotourism.

Keywords: foreigner tourists, signified, semiotics, ecotourism

Procedia PDF Downloads 225
2902 A Fundamental Functional Equation for Lie Algebras

Authors: Ih-Ching Hsu

Abstract:

Inspired by the so called Jacobi Identity (x y) z + (y z) x + (z x) y = 0, the following class of functional equations EQ I: F [F (x, y), z] + F [F (y, z), x] + F [F (z, x), y] = 0 is proposed, researched and generalized. Research methodologies begin with classical methods for functional equations, then evolve into discovering of any implicit algebraic structures. One of this paper’s major findings is that EQ I, under two additional conditions F (x, x) = 0 and F (x, y) + F (y, x) = 0, proves to be a fundamental functional equation for Lie Algebras. Existence of non-trivial solutions for EQ I can be proven by defining F (p, q) = [p q] = pq –qp, where p and q are quaternions, and pq is the quaternion product of p and q. EQ I can be generalized to the following class of functional equations EQ II: F [G (x, y), z] + F [G (y, z), x] + F [G (z, x), y] = 0. Concluding Statement: With a major finding proven, and non-trivial solutions derived, this research paper illustrates and provides a new functional equation scheme for studies in two major areas: (1) What underlying algebraic structures can be defined and/or derived from EQ I or EQ II? (2) What conditions can be imposed so that conditional general solutions to EQ I and EQ II can be found, investigated and applied?

Keywords: fundamental functional equation, generalized functional equations, Lie algebras, quaternions

Procedia PDF Downloads 210
2901 Layers of Identities in Nahdliyyin Mosque Architecture and Some Related Socio-Political Context Within

Authors: Yulia Eka Putrie, Widjaja Martokusumo

Abstract:

The development of architecture today indicates that an architectural object often does not represent one single identity only. One architectural object could represents layers of multiple identities of an increasingly complex society. Mosque architecture for example, is mainly associated with one religious identity; that mosque architecture serves as the representation of Islamic identity. However, on many occasions, mosque architecture also serves as the representation of other motives, such as political, social, even individual identity. In normal circumstances, these layers of identities are not always seen or realized by common people outside the community. They are only represented implicitly in some symbolic forms, activities, and events. On the other hand, in specific circumstances, these kinds of identities were represented explicitly in mosque architecture. This paper is a part of an initial research on the representation of socio-political identities in Nahdliyyin mosques in East Java, Indonesia. Nahdliyyin mosques were chosen as the object of research because of its significance in Indonesian socio-political context, because majority of Indonesian muslims are culturally associated with Nahdlatul Ulama (NU) with its aswaja doctrine. Some frictions in mosque ownership and management between Nahdliyyin and other islamic school of thoughts, has resulted in preventive efforts, where some of the efforts are related to the representation of their identity in their mosque architecture. The research is a field research that took place in Malang, East Java. Malang is one of main cities in East Java; a cultural and regional basis of NU and Nahdliyyin people. Formal analysis were conducted in ten large Nahdliyyin mosques in Malang. Some structured and in-depth interviews were also held to explore the motives of identity representation in some architectural aspects of the mosques. The result of this initial study indicates that there are layers of identities which were manifested in the studied mosques. These layers of identities in Nahdliyyin mosques were based on the same main values, but represented through various formal expressions. Furthermore, the study also brings the deeper understanding on socio-political context of mosques in Nahdliyyin culture.

Keywords: Nahdliyyin mosque architecture, layers of identities, representation, Nahdlatul Ulama

Procedia PDF Downloads 502
2900 Encounters with the Other Sisters of the Past: the Role of Colonial History and Memory in the Adjustment of the Postcolonial Female Identity

Authors: Fatiha Kaïd Berrahal, Nassima Kaïd, Djihad Affaf Selt

Abstract:

The present paper is a comparative analysis of the Algerian writer Assia Djebar’s women of Algiers in Their Apartment (1982) and the Anglo-Egyptian Ahdaf Soueif’s The Map of Love (1999) foregrounded on the female protagonists’ painfully common colonial and patriarchal experiences, though in different geographical regions of North Africa. This study raises questions pertaining, first, to the emerging contemporary genre “Historiographic meta-fiction” in which the novels examined could be inscribed, then, the interplay of colonial history and personal memory that impinges on the development of the identity of the post-colonial female subject. As the novels alternate between the historical and the autobiographical, we currently seek to understand how it is pertinent and pressing for women to excavate the lost and occluded stories of the past for the adjustment of their present personal identities, which are undoubtedly an important part of the identity of a nation.

Keywords: postcolonial feminism, islamic feminism, memory, histoirographic metafiction

Procedia PDF Downloads 630
2899 Removal of Cr (VI) from Water through Adsorption Process Using GO/PVA as Nanosorbent

Authors: Syed Hadi Hasan, Devendra Kumar Singh, Viyaj Kumar

Abstract:

Cr (VI) is a known toxic heavy metal and has been considered as a priority pollutant in water. The effluent of various industries including electroplating, anodizing baths, leather tanning, steel industries and chromium based catalyst are the major source of Cr (VI) contamination in the aquatic environment. Cr (VI) show high mobility in the environment and can easily penetrate cell membrane of the living tissues to exert noxious effects. The Cr (VI) contamination in drinking water causes various hazardous health effects to the human health such as cancer, skin and stomach irritation or ulceration, dermatitis, damage to liver, kidney circulation and nerve tissue damage. Herein, an attempt has been done to develop an efficient adsorbent for the removal of Cr (VI) from water. For this purpose nanosorbent composed of polyvinyl alcohol functionalized graphene oxide (GO/PVA) was prepared. Thus, obtained GO/PVA was characterized through FTIR, XRD, SEM, and Raman Spectroscopy. As prepared nanosorbent of GO/PVA was utilized for the removal Cr (VI) in batch mode experiment. The process variables such as contact time, initial Cr (VI) concentration, pH, and temperature were optimized. The maximum 99.8 % removal of Cr (VI) was achieved at initial Cr (VI) concentration 60 mg/L, pH 2, temperature 35 °C and equilibrium was achieved within 50 min. The two widely used isotherm models viz. Langmuir and Freundlich were analyzed using linear correlation coefficient (R2) and it was found that Langmuir model gives best fit with high value of R2 for the data of present adsorption system which indicate the monolayer adsorption of Cr (VI) on the GO/PVA. Kinetic studies were also conducted using pseudo-first order and pseudo-second order models and it was observed that chemosorptive pseudo-second order model described the kinetics of current adsorption system in better way with high value of correlation coefficient. Thermodynamic studies were also conducted and results showed that the adsorption was spontaneous and endothermic in nature.

Keywords: adsorption, GO/PVA, isotherm, kinetics, nanosorbent, thermodynamics

Procedia PDF Downloads 381
2898 A Narrative Inquiry of Identity Formation of Chinese Fashion Designers

Authors: Lily Ye

Abstract:

The contemporary fashion industry has witnessed the global rise of Chinese fashion designers. China plays more and more important role in this sector globally. One of the key debates in contemporary time is the conception of Chinese fashion. A close look at previous discussions on Chinese fashion reveals that most of them are explored through the lens of cultural knowledge and assumptions, using the dichotomous models of East and West. The results of these studies generate an essentialist and orientalist notion of Chinoiserie and Chinese fashion, which sees individual designers from China as undifferential collective members marked by a unique and fixed set of cultural scripts. This study challenges this essentialist conceptualization and brings fresh insights to the discussion of Chinese fashion identity against the backdrop of globalisation. Different from a culturalist approach to researching Chinese fashion, this paper presents an alternative position to address the research agenda through the mobilisation of Giddens’ (1991) theory of reflexive identity formation, privileging individuals’ agency and reflexivity. This approach to the discussion of identity formation not only challenges the traditional view seeing identity as the distinctive and essential characteristics belonging to any given individual or shared by all members of a particular social category or group but highlights fashion designers’ strategic agency and their role as fashion activist. This study draws evidence from a textual analysis of published stories of a group of established Chinese designers such as Guo Pei, Huishan Zhang, Masha Ma, Uma Wang, and Ma Ke. In line with Giddens’ concept of 'reflexive project of the self', this study uses a narrative methodology. Narratives are verbal accounts or stories relating to experiences of Chinese fashion designers. This approach offers the fashion designers a chance to 'speak' for themselves and show the depths and complexities of their experiences. It also emphasises the nuances of identity formation in fashion designers, whose experiences cannot be captured in neat typologies. Thematic analysis (Braun and Clarke, 2006) is adopted to identify and investigate common themes across the whole dataset. At the centre of the analysis is individuals’ self-articulation of their perceptions, experiences and themselves in relation to culture, fashion and identity. The finding indicates that identity is constructed around anchors such as agency, cultural hybridity, reflexivity and sustainability rather than traditional collective categories such as culture and ethnicity. Thus, the old East-West dichotomy is broken down, and essentialised social categories are challenged by the multiplicity and fragmentation of self and cultural hybridity created within designers’ 'small narratives'.

Keywords: Chinoiserie, fashion identity, fashion activism, narrative inquiry

Procedia PDF Downloads 279
2897 An Indoor Positioning System in Wireless Sensor Networks with Measurement Delay

Authors: Pyung Soo Kim, Eung Hyuk Lee, Mun Suck Jang

Abstract:

In the current paper, an indoor positioning system is proposed with consideration of measurement delay. Firstly, an estimation filter with a measurement delay is designed for the indoor positioning mechanism under a weighted least square criterion, which utilizes only finite measurements on the most recent window. The proposed estimation filtering based scheme gives the filtered estimates for position, velocity and acceleration of moving target in real-time, while removing undesired noisy effects and preserving desired moving positions. Secondly, the proposed scheme is shown to have good inherent properties such as unbiasedness, efficiency, time-invariance, deadbeat, and robustness due to the finite memory structure. Finally, computer simulations shows that the performance of the proposed estimation filtering based scheme can outperform to the existing infinite memory filtering based mechanism.

Keywords: indoor positioning system, wireless sensor networks, measurement delay

Procedia PDF Downloads 466
2896 Cyber Security Enhancement via Software Defined Pseudo-Random Private IP Address Hopping

Authors: Andre Slonopas, Zona Kostic, Warren Thompson

Abstract:

Obfuscation is one of the most useful tools to prevent network compromise. Previous research focused on the obfuscation of the network communications between external-facing edge devices. This work proposes the use of two edge devices, external and internal facing, which communicate via private IPv4 addresses in a software-defined pseudo-random IP hopping. This methodology does not require additional IP addresses and/or resources to implement. Statistical analyses demonstrate that the hopping surface must be at least 1e3 IP addresses in size with a broad standard deviation to minimize the possibility of coincidence of monitored and communication IPs. The probability of breaking the hopping algorithm requires a collection of at least 1e6 samples, which for large hopping surfaces will take years to collect. The probability of dropped packets is controlled via memory buffers and the frequency of hops and can be reduced to levels acceptable for video streaming. This methodology provides an impenetrable layer of security ideal for information and supervisory control and data acquisition systems.

Keywords: moving target defense, cybersecurity, network security, hopping randomization, software defined network, network security theory

Procedia PDF Downloads 169
2895 Secret Sharing in Visual Cryptography Using NVSS and Data Hiding Techniques

Authors: Misha Alexander, S. B. Waykar

Abstract:

Visual Cryptography is a special unbreakable encryption technique that transforms the secret image into random noisy pixels. These shares are transmitted over the network and because of its noisy texture it attracts the hackers. To address this issue a Natural Visual Secret Sharing Scheme (NVSS) was introduced that uses natural shares either in digital or printed form to generate the noisy secret share. This scheme greatly reduces the transmission risk but causes distortion in the retrieved secret image through variation in settings and properties of digital devices used to capture the natural image during encryption / decryption phase. This paper proposes a new NVSS scheme that extracts the secret key from randomly selected unaltered multiple natural images. To further improve the security of the shares data hiding techniques such as Steganography and Alpha channel watermarking are proposed.

Keywords: decryption, encryption, natural visual secret sharing, natural images, noisy share, pixel swapping

Procedia PDF Downloads 389
2894 Breastfeeding Experiences of Nutritionist who are Mothers in Quito- Ecuador

Authors: Maria Jose Mendoza Gordillo

Abstract:

Introduction: Research regarding breastfeeding is devoted to how essential breastfeeding is to guarantee wellbeing for the mother and the baby from a medical standpoint relegating the cultural, material and social barriers for breastfeeding. Consequently, worldwide breastfeeding rates are low, and Ecuador is not the exception, especially among working mothers. Worldwide, health care providers have low rates of breastfeeding due to several barriers to lactation, such as the work schedule, a lack of private places for pumping while at work, and negative emotions. Goals and Methods: This study aimed to explore how do Ecuadorian women embrace their identities as nutritionists and mothers within their breastfeeding experience. The primary data come from 20 synchronous semi-structured interviews, which follow a topic guide. The interviews were recorded and transcribed verbatim. The data analysis followed the Phronetic Iterative Approach. Results: Women shifted the preconceived idea of the ideal breastfeeding that came from the medicalized discourse of breastfeeding, and that was constructed in their training as nutritionists. Although these women believe that breast milk and breastfeeding is the best way to feed a baby, the internalized ideal of breastfeeding shifted through the experience of motherhood. When these women developed their identity as mothers, they understood that the ideal breastfeeding is different from the medicalized discourse. Although they have that clash between the ideal and the external reality, they continued breastfeeding their babies and those experiences made them improve their professional practice. Conclusions: The narratives that women shared illustrate how complex it was to manage the different roles and identities that they wanted to fulfill to keep their identity of a good mother who breastfeeds her baby and, at the same time, a good healthcare provider identity. The process of breastfeeding for this group of women who are mothers and healthcare professionals appears to be a unique relational and identity negotiation process.

Keywords: breastfeeding, identity, nutritionist, qualitative

Procedia PDF Downloads 159
2893 Identity Construction of English Language Teachers from Nepal: A Narrative Inquiry

Authors: Bharat Prasad Neupane

Abstract:

Given the widespread concentration on beliefs, values, emotions, critical incidents, and practices in exploring teachers’ professional identities, this study presents the trajectories of identity construction of three English language teachers from Nepal, analyzing their storied lives from schoolteachers to university professors. For this purpose, the article considered the three-dimensional professional development model to explore the effective mediation by the state agencies, culture and the policies, appropriate support from the organizations, and the bottom-up initiatives taken by the teachers in their professional development. Besides, the professional development journey derived from the in-depth interview of the participants is analyzed by employing communities of practice theory, particularly engagement, alignment, and imagination, as theoretical categories to discover their professional identities. The analysis revealed that passion for language, creativity, and motivation to learn English during childhood initially encouraged them to study English. In addition, inspiration from their teachers during their schooling and later a competitive working environment motivated them to experiment with innovative teaching approaches and establish themselves in the profession. Furthermore, diversification in university teaching according to university requirements and resultant divergence from the professional root ultimately transformed their identity beyond English teachers. Finally, university policy, customization of teachers as per the university requirement, and their survival strategy as English teachers in a university where technical subjects are given more priority has impacted their professional identities.

Keywords: teachers’ professional development, English language teaching, professional identity, communities of practice

Procedia PDF Downloads 59
2892 A New Bound on the Average Information Ratio of Perfect Secret-Sharing Schemes for Access Structures Based on Bipartite Graphs of Larger Girth

Authors: Hui-Chuan Lu

Abstract:

In a perfect secret-sharing scheme, a dealer distributes a secret among a set of participants in such a way that only qualified subsets of participants can recover the secret and the joint share of the participants in any unqualified subset is statistically independent of the secret. The access structure of the scheme refers to the collection of all qualified subsets. In a graph-based access structures, each vertex of a graph G represents a participant and each edge of G represents a minimal qualified subset. The average information ratio of a perfect secret-sharing scheme realizing a given access structure is the ratio of the average length of the shares given to the participants to the length of the secret. The infimum of the average information ratio of all possible perfect secret-sharing schemes realizing an access structure is called the optimal average information ratio of that access structure. We study the optimal average information ratio of the access structures based on bipartite graphs. Based on some previous results, we give a bound on the optimal average information ratio for all bipartite graphs of girth at least six. This bound is the best possible for some classes of bipartite graphs using our approach.

Keywords: secret-sharing scheme, average information ratio, star covering, deduction, core cluster

Procedia PDF Downloads 348
2891 I Don’t Know How I Got Here and I Don’t Know How to Get out of It: Understanding Male Pre-service Early Child Education Teachers’ Construction of Professional Identity

Authors: Sabika Khalid, Endale Fantahun Tadesse

Abstract:

Unlike other professional sectors, a great deal of studies has addressed the overwhelming gender disparity phenomena in the early childhood education (ECE) workforce, which is acknowledged for the dominance of women over men teachers. The irony of ECE being a gendered working environment is not only observed in societies that are ruled by gender roles but also in Western countries that claim to margin the gender gap in several professions. The participation of male teachers in ECE across most countries ranged from 1% to 3% of the total preschool or kindergarten teachers. When it comes to a dynamic Chinese society tempered with a deep-rooted tradition and cultural ideology, the ECE has no less place for males, and males have a low place for ECE. According to the Ministry of Education of China (2020), there are over 5 million kindergarten teachers and staff members, while only 2.3% are accounted for male teachers. The traditional gender-based discourse asserts that giving care and guidance for young children related to nurturing ‘mothering’ labels the profession in ECE as women’s work derived from originated from their ‘naturality.’ Although a large volume of evidence sheds light on the cause for low male teachers, the perception of parents, female teachers working with male teachers, and the experience of male teachers working in ECE, less is known and understood before being a teacher. Hence, this study argues that the promotion of the involvement of male teachers in light of their masculinity identity asset in the children's learning environment is comprehended to understand the construction of male student teachers' (preservice) professional identity during early childhood teacher training that allows obtaining substantial evidence that provides a feasible and robust implication in the preparation of competent and professional male preschool teachers that understand, cherish, and bring harmony in Chinese ECE through professionalism socialization with the stakeholders. This study intended to reveal male ECE preservice teachers’ knowledge of their professional identity, i.e., how they perceive themselves as a teacher and what factors agents these perceptions towards their professional identity.

Keywords: male teachers, Early Childhood Education (ECE), self-identity, perception of stakeholders

Procedia PDF Downloads 25
2890 The Prospect of Income Contingent Loan in Malaysia Higher Education Financing Using Deterministic and Stochastic Methods in Modelling Income

Authors: Syaza Isma, Timothy Higgins

Abstract:

In Malaysia, increased take-up rates of tertiary student borrowing, and reliance on retirement savings to fund children's education show the importance of public higher education financing schemes (PTPTN). PTPTN has been operating for 2 decades now; however, there are some critical issues and challenges that include low loan recovery and loan default that suggest a detailed consideration of student loan/financing scheme alternatives is crucial. In addition, the decline in funding level per student following introduction of the new PTPTN full and partial loan scheme has raised ongoing concerns over the sustainability of the scheme to provide continuous financial assistance to students in tertiary education. This research seeks to assess these issues that put greater efficiency in an effort to ensure equitable access to student funding for current and future generations. We explore the extent of repayment hardship under the current loan arrangements that presumably led to low recovery from the borrowers, particularly low-income graduates. The concept of manageable debt exists in the design of income-contingent repayment schemes, as practiced in Australia, New Zealand, UK, Hungary, USA (in limited form), the Netherlands, and South Korea. Can Income Contingent Loans (ICL) offer the best practice for an education financing scheme, and address the issue of repayment hardship and concurrently, can a properly designed ICL scheme provide a solution to the current issues and challenges facing Malaysia student financing? We examine the different potential ICL models using deterministic and stochastic approach to simulate income of graduates.

Keywords: deterministic, income contingent loan, repayment burden, simulation, stochastic

Procedia PDF Downloads 212
2889 Identity of Cultural Food: A Case Study of Traditional Mon Cuisine in Bangkok, Thailand

Authors: Saruda Nitiworakarn

Abstract:

This research aims to identify traditional Mon cuisines as well as gather and classify traditional cuisines of Mon communities in Bangkok. The studying of this research is used by methodology of the quantitative research. Using the questionnaire as the method in collecting information from sampling totally amount of 450 persons analyzed via frequency, percentage and mean value. The results showed that a variety of traditional Mon cuisines of Bangkok could split into 6 categories of meat diet with 54 items and 6 categories of desserts with 19 items.

Keywords: cultural identity, traditional food, Mon cuisine, Thailand

Procedia PDF Downloads 295
2888 Dynamic Fault Diagnosis for Semi-Batch Reactor Under Closed-Loop Control via Independent RBFNN

Authors: Abdelkarim M. Ertiame, D. W. Yu, D. L. Yu, J. B. Gomm

Abstract:

In this paper, a new robust fault detection and isolation (FDI) scheme is developed to monitor a multivariable nonlinear chemical process called the Chylla-Haase polymerization reactor when it is under the cascade PI control. The scheme employs a radial basis function neural network (RBFNN) in an independent mode to model the process dynamics and using the weighted sum-squared prediction error as the residual. The recursive orthogonal Least Squares algorithm (ROLS) is employed to train the model to overcome the training difficulty of the independent mode of the network. Then, another RBFNN is used as a fault classifier to isolate faults from different features involved in the residual vector. The several actuator and sensor faults are simulated in a nonlinear simulation of the reactor in Simulink. The scheme is used to detect and isolate the faults on-line. The simulation results show the effectiveness of the scheme even the process is subjected to disturbances and uncertainties including significant changes in the monomer feed rate, fouling factor, impurity factor, ambient temperature and measurement noise. The simulation results are presented to illustrate the effectiveness and robustness of the proposed method.

Keywords: Robust fault detection, cascade control, independent RBF model, RBF neural networks, Chylla-Haase reactor, FDI under closed-loop control

Procedia PDF Downloads 485
2887 Mourning Motivations for Celebrities in Instagram: A Case Study of Mohammadreza Shajarian's Death

Authors: Zahra Afshordi

Abstract:

Instagram, as an everyday life social network, hosts from the ultrasound image of an unborn fetus to the pictures of newly placed gravestones and funerals. It is a platform that allows its users to create a second identity independently from and at the same time in relation to the real space identity. The motives behind this identification are what this article is about. This article studies the motivations of Instagram users mourning for celebrities with a focus on the death of MohammadReza Shajarian. The Shajarian’s death had a wide reflection on Instagram Persian-speaking users. The purpose of this qualitative survey is to comprehend and study the user’s motivations in posting mourning and memorializing content. The methodology of the essay is a hybrid methodology consisting of content analysis and open-ended interviews. The results highlight that users' motives are more than just simple sympathy and include political protest, gaining cultural capital, reaching social status, and escaping from solitude.

Keywords: case study, celebrity, identity, Instagram, mourning, qualitative survey

Procedia PDF Downloads 138
2886 Acceptance of Health Information Application in Smart National Identity Card (SNIC) Using a New I-P Framework

Authors: Ismail Bile Hassan, Masrah Azrifah Azmi Murad

Abstract:

This study discovers a novel framework of individual level technology adoption known as I-P (Individual- Privacy) towards Smart National Identity Card health information application. Many countries introduced smart national identity card (SNIC) with various applications such as health information application embedded inside it. However, the degree to which citizens accept and use some of the embedded applications in smart national identity remains unknown to many governments and application providers as well. Moreover, the previous studies revealed that the factors of trust, perceived risk, privacy concern and perceived credibility need to be incorporated into more comprehensive models such as extended Unified Theory of Acceptance and Use of Technology known as UTAUT2. UTAUT2 is a mainly widespread and leading theory existing in the information system literature up to now. This research identifies factors affecting the citizens’ behavioural intention to use health information application embedded in SNIC and extends better understanding on the relevant factors that the government and the application providers would need to consider in predicting citizens’ new technology acceptance in the future. We propose a conceptual framework by combining the UTAUT2 and Privacy Calculus Model constructs and also adding perceived credibility as a new variable. The proposed framework may provide assistance to any government planning, decision, and policy makers involving e-government projects. The empirical study may be conducted in the future to provide proof and empirically validate this I-P framework.

Keywords: unified theory of acceptance and use of technology (UTAUT) model, UTAUT2 model, smart national identity card (SNIC), health information application, privacy calculus model (PCM)

Procedia PDF Downloads 450
2885 Batch Kinetic, Isotherm and Thermodynamic Studies of Copper (II) Removal from Wastewater Using HDL as Adsorbent

Authors: Nadjet Taoualit, Zoubida Chemat, Djamel-Eddine Hadj-Boussaad

Abstract:

This study aims the removal of copper Cu (II) contained in wastewater by adsorption on a perfect synthesized mud. It is the materials Hydroxides Double Lamellar, HDL, prepared and synthesized by co-precipitation method at constant pH, which requires a simple titration assembly, with an inexpensive and available material in the laboratory, and also allows us better control of the composition of the reaction medium, and gives well crystallized products. A characterization of the adsorbent proved essential. Thus a range of physic-chemical analysis was performed including: FTIR spectroscopy, X-ray diffraction… The adsorption of copper ions was investigated in dispersed medium (batch). A systematic study of various parameters (amount of support, contact time, initial copper concentration, temperature, pH…) was performed. Adsorption kinetic data were tested using pseudo-first order, pseudo-second order, Bangham's equation and intra-particle diffusion models. The equilibrium data were analyzed using Langmuir, Freundlich, Tempkin and other isotherm models at different doses of HDL. The thermodynamics parameters were evaluated at different temperatures. The results have established good potentiality for the HDL to be used as a sorbent for the removal of Copper from wastewater.

Keywords: adsoption, copper, HDL, isotherm

Procedia PDF Downloads 260
2884 Thorium Extraction with Cyanex272 Coated Magnetic Nanoparticles

Authors: Afshin Shahbazi, Hadi Shadi Naghadeh, Ahmad Khodadadi Darban

Abstract:

In the Magnetically Assisted Chemical Separation (MACS) process, tiny ferromagnetic particles coated with solvent extractant are used to selectively separate radionuclides and hazardous metals from aqueous waste streams. The contaminant-loaded particles are then recovered from the waste solutions using a magnetic field. In the present study, Cyanex272 or C272 (bis (2,4,4-trimethylpentyl) phosphinic acid) coated magnetic particles are being evaluated for the possible application in the extraction of Thorium (IV) from nuclear waste streams. The uptake behaviour of Th(IV) from nitric acid solutions was investigated by batch studies. Adsorption of Thorium (IV) from aqueous solution onto adsorbent was investigated in a batch system. Adsorption isotherm and adsorption kinetic studies of Thorium (IV) onto nanoparticles coated Cyanex272 were carried out in a batch system. The factors influencing Thorium (IV) adsorption were investigated and described in detail, as a function of the parameters such as initial pH value, contact time, adsorbent mass, and initial Thorium (IV) concentration. Magnetically Assisted Chemical Separation (MACS) process adsorbent showed best results for the fast adsorption of Th (IV) from aqueous solution at aqueous phase acidity value of 0.5 molar. In addition, more than 80% of Th (IV) was removed within the first 2 hours, and the time required to achieve the adsorption equilibrium was only 140 minutes. Langmuir and Frendlich adsorption models were used for the mathematical description of the adsorption equilibrium. Equilibrium data agreed very well with the Langmuir model, with a maximum adsorption capacity of 48 mg.g-1. Adsorption kinetics data were tested using pseudo-first-order, pseudo-second-order and intra-particle diffusion models. Kinetic studies showed that the adsorption followed a pseudo-second-order kinetic model, indicating that the chemical adsorption was the rate-limiting step.

Keywords: Thorium (IV) adsorption, MACS process, magnetic nanoparticles, Cyanex272

Procedia PDF Downloads 315
2883 Automatic Detection of Proliferative Cells in Immunohistochemically Images of Meningioma Using Fuzzy C-Means Clustering and HSV Color Space

Authors: Vahid Anari, Mina Bakhshi

Abstract:

Visual search and identification of immunohistochemically stained tissue of meningioma was performed manually in pathologic laboratories to detect and diagnose the cancers type of meningioma. This task is very tedious and time-consuming. Moreover, because of cell's complex nature, it still remains a challenging task to segment cells from its background and analyze them automatically. In this paper, we develop and test a computerized scheme that can automatically identify cells in microscopic images of meningioma and classify them into positive (proliferative) and negative (normal) cells. Dataset including 150 images are used to test the scheme. The scheme uses Fuzzy C-means algorithm as a color clustering method based on perceptually uniform hue, saturation, value (HSV) color space. Since the cells are distinguishable by the human eye, the accuracy and stability of the algorithm are quantitatively compared through application to a wide variety of real images.

Keywords: positive cell, color segmentation, HSV color space, immunohistochemistry, meningioma, thresholding, fuzzy c-means

Procedia PDF Downloads 192
2882 Communication through Offline and Online Social Network of Thai Football Premier League Supporters

Authors: Krisana Chueachainat

Abstract:

The study is about the identity, typology and symbol using in communication through offline and online social network of each Thai football Premier League supporters. Also, study is about the factors that affected the sport to become the growing business and the communication factors that play the important role in the growth of the sport business. The Thai Premier League communicated with supporters in order to show the identity of each supporter and club in different ways. The expression of the identity was shown through online social network and offline told other people who they were. The study also about the factor that impacted the roles and communication factors that make football become the growing business. The factor that impact to the growth of football to the business, if clubs can action, the sport business would be to higher level and also push Thailand’s football to be effective and equal to other countries.

Keywords: online social network, offline social network, Thai football, supporters

Procedia PDF Downloads 287
2881 'Value-Based Re-Framing' in Identity-Based Conflicts: A Skill for Mediators in Multi-Cultural Societies

Authors: Hami-Ziniman Revital, Ashwall Rachelly

Abstract:

The conflict resolution realm has developed tremendously during the last half-decade. Three main approaches should be mentioned: an Alternative Dispute Resolution (ADR) suggesting processes such as Arbitration or Interests-based Negotiation was developed as an answer to obligations and rights-based conflicts. The Pragmatic mediation approach focuses on the gap between interests and needs of disputants. The Transformative mediation approach focusses on relations and suits identity-based conflicts. In the current study, we examine the conflictual relations between religious and non-religious Jews in Israel and the impact of three transformative mechanisms: Inter-group recognition, In-group empowerment and Value-based reframing on the relations between the participants. The research was conducted during four facilitated joint mediation classes. A unique finding was found. Using both transformative mechanisms and the Contact Hypothesis criteria, we identify transformation in participants’ relations and a considerable change from anger, alienation, and suspiciousness to an increased understanding, affection and interpersonal concern towards the out-group members. Intergroup Recognition, In-group empowerment, and Values-based reframing were the skills discovered as the main enablers of the change in the relations and the research participants’ fostered mutual recognition of the out-group values and identity-based issues. We conclude this transformation was possible due to a constant intergroup contact, based on the Contact Hypothesis criteria. In addition, as Interests-based mediation uses “Reframing” as a skill to acknowledge both mutual and opposite needs of the disputants, we suggest the use of “Value-based Reframing” in intergroup identity-based conflicts, as a skill contributes to the empowerment and the recognition of both mutual and different out-group values. We offer to implement those insights and skills to assist conflict resolution facilitators in various intergroup identity-based conflicts resolution efforts and to establish further research and knowledge.

Keywords: empowerment, identity-based conflict, intergroup recognition, intergroup relations, mediation skills, multi-cultural society, reframing, value-based recognition

Procedia PDF Downloads 329