Search results for: logic forms
2743 An Understanding of Child Sexual Abuse in South Africa: Case Study of Eastern Cape Province
Authors: Mandlenkosi Richard Mphatheni
Abstract:
The Constitution of the Republic of South Africa (Act 108 of 1996 section 28(1) (d)) states, ‘Every child has the right to be protected from maltreatment, neglect, abuse, and degradation’. Qualitative research studied perceptions of the selected sample. Objectives of the research were to determine factors that influence perpetrators of sexual violence to target children, the risk factors of child sexual abuse, the effects of child sexual abuse on the development of the child, and the community prevention measures to minimize the risks of child sexual abuse. The research aimed to understand perspective and experiences of the Ngangelizwe community members on the problem of sexual violence against children and the perpetrator’s perceived motive for sexually abusing children. Convenience non-probability sampling technique was adopted to select 20 participants within the Ngangelizwe Township at Mthatha. Thematic analyses were used to analyse data. It was found that sexual abuse of children affects severely child and parents, while the community reported to be trivially affected by the sexual abuse of a child. The research revealed ignorance of some forms of sexual violence, as the commonly known form of sexual violence was rape. Therefore, ignorance of community members regarding various forms of sexual abuse means that such acts are either ignored, tolerated, or even regarded as acceptable. It thus means that community members cannot reject any actions or behaviour if they themselves are ignorant of what constitutes sexual violence. This study recommends that communities should be educated about different sexual offenses.Keywords: child sexual abuse, community, childhood attachment, adult attachment
Procedia PDF Downloads 1382742 Fuzzy Expert Approach for Risk Mitigation on Functional Urban Areas Affected by Anthropogenic Ground Movements
Authors: Agnieszka A. Malinowska, R. Hejmanowski
Abstract:
A number of European cities are strongly affected by ground movements caused by anthropogenic activities or post-anthropogenic metamorphosis. Those are mainly water pumping, current mining operation, the collapse of post-mining underground voids or mining-induced earthquakes. These activities lead to large and small-scale ground displacements and a ground ruptures. The ground movements occurring in urban areas could considerably affect stability and safety of structures and infrastructures. The complexity of the ground deformation phenomenon in relation to the structures and infrastructures vulnerability leads to considerable constraints in assessing the threat of those objects. However, the increase of access to the free software and satellite data could pave the way for developing new methods and strategies for environmental risk mitigation and management. Open source geographical information systems (OS GIS), may support data integration, management, and risk analysis. Lately, developed methods based on fuzzy logic and experts methods for buildings and infrastructure damage risk assessment could be integrated into OS GIS. Those methods were verified base on back analysis proving their accuracy. Moreover, those methods could be supported by ground displacement observation. Based on freely available data from European Space Agency and free software, ground deformation could be estimated. The main innovation presented in the paper is the application of open source software (OS GIS) for integration developed models and assessment of the threat of urban areas. Those approaches will be reinforced by analysis of ground movement based on free satellite data. Those data would support the verification of ground movement prediction models. Moreover, satellite data will enable our mapping of ground deformation in urbanized areas. Developed models and methods have been implemented in one of the urban areas hazarded by underground mining activity. Vulnerability maps supported by satellite ground movement observation would mitigate the hazards of land displacements in urban areas close to mines.Keywords: fuzzy logic, open source geographic information science (OS GIS), risk assessment on urbanized areas, satellite interferometry (InSAR)
Procedia PDF Downloads 1602741 Role of the Marshes in the Natural Decontamination of Surface Water: A Case of the Redjla Marsh, North-Eastern Algerian
Authors: S. Benessam, T. H. Debieche, A. Drouiche, S. Mahdid, F. Zahi
Abstract:
The marsh is the impermeable depression. It is not very deep and presents the stagnant water. Their water level varies according to the contributions of water (rain, groundwater, stream etc.), when this last reaches the maximum level of the marsh, it flows towards the downstream through the discharge system. The marsh accumulates all the liquid and solid contributions of upstream part. In the North-East Algerian, the Redjla marsh is located on the course of the Tassift river. Its contributions of water come from the upstream part of the river, often characterized by the presence of several pollutants in water related to the urban effluents, and its discharge system supply the downstream part of the river. In order to determine the effect of the marsh on the water quality of the river this study was conducted. A two-monthly monitoring of the physicochemical parameters and water chemistry of the river were carried out, before and after the marsh, during the period from November 2013 to January 2015. The results show that the marsh plays the role of a natural purifier of water of Tassift river, present by drops of conductivity and concentration of the pollutants (ammonium, phosphate, iron, chlorides and bicarbonates) between the upstream part and downstream of the marsh. That indicates that these pollutants are transformed with other chemical forms (case of ammonium towards nitrate), precipitated in complex forms or/and adsorbed by the sediments of the marsh. This storage of the pollutants in the ground of the marsh will be later on a source of pollution for the plants and river water.Keywords: marsh, natural purification, urban pollution, nitrogen
Procedia PDF Downloads 2632740 The Audiovisual Media as a Metacritical Ludicity Gesture in the Musical-Performatic and Scenic Works of Caetano Veloso and David Bowie
Authors: Paulo Da Silva Quadros
Abstract:
This work aims to point out comparative parameters between the artistic production of two exponents of the contemporary popular culture scene: Caetano Veloso (Brazil) and David Bowie (England). Both Caetano Veloso and David Bowie were pioneers in establishing an aesthetic game between various artistic expressions at the service of the music-visual scene, that is, the conceptual interconnections between several forms of aesthetic processes, such as fine arts, theatre, cinema, poetry, and literature. There are also correlations in their expressive attitudes of art, especially regarding the dialogue between the fields of art and politics (concern with respect to human rights, human dignity, racial issues, tolerance, gender issues, and sexuality, among others); the constant tension and cunning game between market, free expression and critical sense; the sophisticated, playful mechanisms of metalanguage and aesthetic metacritique. Fact is that both of them almost came to cooperate with each other in the 1970s when Caetano was in exile in England, and when both had at the same time the same music producer, who tried to bring them closer, noticing similar aesthetic qualities in both artistic works, which was later glimpsed by some music critics. Among many of the most influential issues in Caetano's and Bowie's game of artistic-aesthetic expression are, for example, the ideas advocated by the sensation of strangeness (Albert Camus), art as transcendence (Friedrich Nietzsche), the deconstruction and reconstruction of auratic reconfiguration of artistic signs (Walter Benjamin and Andy Warhol). For deepen more theoretical issues, the following authors will be used as supportive interpretative references: Hans-Georg Gadamer, Immanuel Kant, Friedrich Schiller, Johan Huizinga. In addition to the aesthetic meanings of Ars Ludens characteristics of the two artists, the following supporting references will be also added: the question of technique (Martin Heidegger), the logic of sense (Gilles Deleuze), art as an event and the sense of the gesture of art ( Maria Teresa Cruz), the society of spectacle (Guy Debord), Verarbeitung and Durcharbeitung (Sigmund Freud), the poetics of interpretation and the sign of relation (Cremilda Medina). The purpose of such interpretative references is to seek to understand, from a cultural reading perspective (cultural semiology), some significant elements in the dynamics of aesthetic and media interconnections of both artists, which made them as some of the most influential interlocutors in contemporary music aesthetic thought, as a playful vivid experience of life and art.Keywords: Caetano Veloso, David Bowie, music aesthetics, symbolic playfulness, cultural reading
Procedia PDF Downloads 1692739 Arsenic Speciation in Cicer arietinum: A Terrestrial Legume That Contains Organoarsenic Species
Authors: Anjana Sagar
Abstract:
Arsenic poisoned ground water is a major concern in South Asia. The arsenic enters the food chain not only through drinking but also by using arsenic polluted water for irrigation. Arsenic is highly toxic in its inorganic forms; however, organic forms of arsenic are comparatively less toxic. In terrestrial plants, inorganic form of arsenic is predominantly found; however, we found that significant proportion of organic arsenic was present in root and shoot of a staple legume, chickpea (Cicer arientinum L) plants. Chickpea plants were raised in pot culture on soils spiked with arsenic ranging from 0-70 mg arsenate per Kg soil. Total arsenic concentrations of chickpea shoots and roots were determined by inductively coupled plasma-mass-spectrometry (ICP-MS) ranging from 0.76 to 20.26, and 2.09 to 16.43 µg g⁻¹ dry weight, respectively. Information on arsenic species was acquired by methanol/water extraction method, with arsenic species being analyzed by high-performance liquid chromatography (HPLC) coupled with ICP-MS. Dimethylarsinic acid (DMA) was the only organic arsenic species found in amount from 0.02 to 3.16 % of total arsenic shoot concentration and 0 to 6.93 % of total arsenic root concentration, respectively. To investigate the source of the organic arsenic in chickpea plants, arsenic species in the rhizosphere of soils of plants were also examined. The absence of organic arsenic in soils would suggest the possibility of formation of DMA in plants. The present investigation provides useful information for better understanding of distribution of arsenic species in terrestrial legume plants.Keywords: arsenic, arsenic speciation, dimethylarsinic acid, organoarsenic
Procedia PDF Downloads 1402738 Photoswitchable and Polar-Dependent Fluorescence of Diarylethenes
Authors: Sofia Lazareva, Artem Smolentsev
Abstract:
Fluorescent photochromic materials collect strong interest due to their possible application in organic photonics such as optical logic systems, optical memory, visualizing sensors, as well as characterization of polymers and biological systems. In photochromic fluorescence switching systems the emission of fluorophore is modulated between ‘on’ and ‘off’ via the photoisomerization of photochromic moieties resulting in effective resonance energy transfer (FRET). In current work, we have studied both photochromic and fluorescent properties of several diarylethenes. It was found that coloured forms of these compounds are not fluorescent because of the efficient intramolecular energy transfer. Spectral and photochromic parameters of investigated substances have been measured in five solvents having different polarity. Quantum yields of photochromic transformation A↔B ΦA→B and ΦB→A as well as B isomer extinction coefficients were determined by kinetic method. It was found that the photocyclization reaction quantum yield of all compounds decreases with the increase of solvent polarity. In addition, the solvent polarity is revealed to affect fluorescence significantly. Increasing of the solvent dielectric constant was found to result in a strong shift of emission band position from 450 nm (nhexane) to 550 nm (DMSO and ethanol) for all three compounds. Moreover, the emission intensive in polar solvents becomes weak and hardly detectable in n-hexane. The only one exception in the described dependence is abnormally low fluorescence quantum yield in ethanol presumably caused by the loss of electron-donating properties of nitrogen atom due to the protonation. An effect of the protonation was also confirmed by the addition of concentrated HCl in solution resulting in a complete disappearance of the fluorescent band. Excited state dynamics were investigated by ultrafast optical spectroscopy methods. Kinetic curves of excited states absorption and fluorescence decays were measured. Lifetimes of transient states were calculated from the data measured. The mechanism of ring opening reaction was found to be polarity dependent. Comparative analysis of kinetics measured in acetonitrile and hexane reveals differences in relaxation dynamics after the laser pulse. The most important fact is the presence of two decay processes in acetonitrile, whereas only one is present in hexane. This fact supports an assumption made on the basis of steady-state preliminary experiments that in polar solvents occur stabilization of TICT state. Thus, results achieved prove the hypothesis of two channel mechanism of energy relaxation of compounds studied.Keywords: diarylethenes, fluorescence switching, FRET, photochromism, TICT state
Procedia PDF Downloads 6802737 The Negative Effects of Controlled Motivation on Mathematics Achievement
Authors: John E. Boberg, Steven J. Bourgeois
Abstract:
The decline in student engagement and motivation through the middle years is well documented and clearly associated with a decline in mathematics achievement that persists through high school. To combat this trend and, very often, to meet high-stakes accountability standards, a growing number of parents, teachers, and schools have implemented various methods to incentivize learning. However, according to Self-Determination Theory, forms of incentivized learning such as public praise, tangible rewards, or threats of punishment tend to undermine intrinsic motivation and learning. By focusing on external forms of motivation that thwart autonomy in children, adults also potentially threaten relatedness measures such as trust and emotional engagement. Furthermore, these controlling motivational techniques tend to promote shallow forms of cognitive engagement at the expense of more effective deep processing strategies. Therefore, any short-term gains in apparent engagement or test scores are overshadowed by long-term diminished motivation, resulting in inauthentic approaches to learning and lower achievement. The current study focuses on the relationships between student trust, engagement, and motivation during these crucial years as students transition from elementary to middle school. In order to test the effects of controlled motivational techniques on achievement in mathematics, this quantitative study was conducted on a convenience sample of 22 elementary and middle schools from a single public charter school district in the south-central United States. The study employed multi-source data from students (N = 1,054), parents (N = 7,166), and teachers (N = 356), along with student achievement data and contextual campus variables. Cross-sectional questionnaires were used to measure the students’ self-regulated learning, emotional and cognitive engagement, and trust in teachers. Parents responded to a single item on incentivizing the academic performance of their child, and teachers responded to a series of questions about their acceptance of various incentive strategies. Structural equation modeling (SEM) was used to evaluate model fit and analyze the direct and indirect effects of the predictor variables on achievement. Although a student’s trust in teacher positively predicted both emotional and cognitive engagement, none of these three predictors accounted for any variance in achievement in mathematics. The parents’ use of incentives, on the other hand, predicted a student’s perception of his or her controlled motivation, and these two variables had significant negative effects on achievement. While controlled motivation had the greatest effects on achievement, parental incentives demonstrated both direct and indirect effects on achievement through the students’ self-reported controlled motivation. Comparing upper elementary student data with middle-school student data revealed that controlling forms of motivation may be taking their toll on student trust and engagement over time. While parental incentives positively predicted both cognitive and emotional engagement in the younger sub-group, such forms of controlling motivation negatively predicted both trust in teachers and emotional engagement in the middle-school sub-group. These findings support the claims, posited by Self-Determination Theory, about the dangers of incentivizing learning. Short-term gains belie the underlying damage to motivational processes that lead to decreased intrinsic motivation and achievement. Such practices also appear to thwart basic human needs such as relatedness.Keywords: controlled motivation, student engagement, incentivized learning, mathematics achievement, self-determination theory, student trust
Procedia PDF Downloads 2212736 Symbolic Partial Differential Equations Analysis Using Mathematica
Authors: Davit Shahnazaryan, Diogo Gomes, Mher Safaryan
Abstract:
Many symbolic computations and manipulations required in the analysis of partial differential equations (PDE) or systems of PDEs are tedious and error-prone. These computations arise when determining conservation laws, entropies or integral identities, which are essential tools for the study of PDEs. Here, we discuss a new Mathematica package for the symbolic analysis of PDEs that automate multiple tasks, saving time and effort. Methodologies: During the research, we have used concepts of linear algebra and partial differential equations. We have been working on creating algorithms based on theoretical mathematics to find results mentioned below. Major Findings: Our package provides the following functionalities; finding symmetry group of different PDE systems, generation of polynomials invariant with respect to different symmetry groups; simplification of integral quantities by integration by parts and null Lagrangian cleaning, computing general forms of expressions by integration by parts; finding equivalent forms of an integral expression that are simpler or more symmetric form; determining necessary and sufficient conditions on the coefficients for the positivity of a given symbolic expression. Conclusion: Using this package, we can simplify integral identities, find conserved and dissipated quantities of time-dependent PDE or system of PDEs. Some examples in the theory of mean-field games and semiconductor equations are discussed.Keywords: partial differential equations, symbolic computation, conserved and dissipated quantities, mathematica
Procedia PDF Downloads 1642735 Shame and Pride in Moral Self-Improvement
Authors: Matt Stichter
Abstract:
Moral development requires learning from one’s failures, but that turnsout to be especially challenging when dealing with moral failures. The distress prompted by moral failure can cause responses ofdefensiveness or disengagement rather than attempts to make amends and work on self-change. The most potentially distressing response to moral failure is a shame. However, there appears to be two different senses of “shame” that are conflated in the literature, depending on whether the failure is appraised as the result of a global and unalterable self-defect, or a local and alterable self-defect. One of these forms of shame does prompt self-improvement in response to moral failure. This occurs if one views the failure as indicating only a specific (local) defect in one’s identity, where that’s something repairable, rather than asanoverall(orglobal)defectinyouridentity that can’t be fixed. So, if the whole of one’s identity as a morally good person isn’t being called into question, but only a part, then that is something one could work on to improve. Shame, in this sense, provides motivation for self-improvement to fix this part oftheselfinthe long run, and this would be important for moral development. One factor that looks to affect these different self-attributions in the wake of moral failure can be found in mindset theory, as reactions to moral failure in these two forms of shame are similar to how those with a fixed or growth mindset of their own abilities, such as intelligence, react to failure. People fall along a continuum with respect to how they view abilities – it is more of a fixed entity that you cannot do much to change, or it is malleable such that you can train to improve it. These two mindsets, ‘fixed’ versus ‘growth’, have different consequences for how we react to failure – a fixed mindset leads to maladaptive responses because of feelings of helplessness to do better; whereas a growth mindset leads to adaptive responses where a person puts forth effort to learn how to act better the next time. Here we can see the parallels between a fixed mindset of one’s own (im)morality, as the way people respond to shame when viewed as indicating a global and unalterable self-defect parallels the reactions people have to failure when they have a fixed mindset. In addition, it looks like there may be a similar structure to pride. Pride is, like shame, a self-conscious emotion that arises from internal attributions about the self as being the cause of some event. There are also paradoxical results from research on pride, where pride was found to motivate pro-social behavior in some cases but aggression in other cases. Research suggests that there may be two forms of pride, authentic and hubristic, that are also connected to different self-attributions, depending on whether one is feeling proud about a particular (local) aspect of the self versus feeling proud about the whole of oneself (global).Keywords: emotion, mindset, moral development, moral psychology, pride, shame, self-regulation
Procedia PDF Downloads 1082734 Analysis of Security Vulnerabilities for Mobile Health Applications
Authors: Yuli Paola Cifuentes Sanabria, Lina Paola Beltrán Beltrán, Leonardo Juan Ramírez López
Abstract:
The availability to deploy mobile applications for healthcare is increasing daily thru different mobile app stores. But within these capabilities the number of hacking attacks has also increased, in particular into medical mobile applications. The security vulnerabilities in medical mobile apps can be triggered by errors in code, incorrect logic, poor design, among other parameters. This is usually used by malicious attackers to steal or modify the users’ information. The aim of this research is to analyze the vulnerabilities detected in mobile medical apps according to risk factor standards defined by OWASP in 2014.Keywords: mHealth apps, OWASP, protocols, security vulnerabilities, risk factors
Procedia PDF Downloads 5192733 Vegetation Assessment Under the Influence of Environmental Variables; A Case Study from the Yakhtangay Hill of Himalayan Range, Pakistan
Authors: Hameed Ullah, Shujaul Mulk Khan, Zahid Ullah, Zeeshan Ahmad Sadia Jahangir, Abdullah, Amin Ur Rahman, Muhammad Suliman, Dost Muhammad
Abstract:
The interrelationship between vegetation and abiotic variables inside an ecosystem is one of the main jobs of plant scientists. This study was designed to investigate the vegetation structure and species diversity along with the environmental variables in the Yakhtangay hill district Shangla of the Himalayan Mountain series Pakistan by using multivariate statistical analysis. Quadrat’s method was used and a total of 171 Quadrats were laid down 57 for Tree, Shrubs and Herbs, respectively, to analyze the phytosociological attributes of the vegetation. The vegetation of the selected area was classified into different Life and leaf-forms according to Raunkiaer classification, while PCORD software version 5 was used to classify the vegetation into different plants communities by Two-way indicator species Analysis (TWINSPAN). The CANOCCO version 4.5 was used for DCA and CCA analysis to find out variation directories of vegetation with different environmental variables. A total of 114 plants species belonging to 45 different families was investigated inside the area. The Rosaceae (12 species) was the dominant family followed by Poaceae (10 species) and then Asteraceae (7 species). Monocots were more dominant than Dicots and Angiosperms were more dominant than Gymnosperms. Among the life forms the Hemicryptophytes and Nanophanerophytes were dominant, followed by Therophytes, while among the leaf forms Microphylls were dominant, followed by Leptophylls. It is concluded that among the edaphic factors such as soil pH, the concentration of soil organic matter, Calcium Carbonates concentration in soil, soil EC, soil TDS, and physiographic factors such as Altitude and slope are affecting the structure of vegetation, species composition and species diversity at the significant level with p-value ≤0.05. The Vegetation of the selected area was classified into four major plants communities and the indicator species for each community was recorded. Classification of plants into 4 different communities based upon edaphic gradients favors the individualistic hypothesis. Indicator Species Analysis (ISA) shows the indicators of the study area are mostly indicators to the Himalayan or moist temperate ecosystem, furthermore, these indicators could be considered for micro-habitat conservation and respective ecosystem management plans.Keywords: species richness, edaphic gradients, canonical correspondence analysis (CCA), TWCA
Procedia PDF Downloads 1552732 Uvulars Alternation in Hasawi Arabic: A Harmonic Serialism Approach
Authors: Huda Ahmed Al Taisan
Abstract:
This paper investigates a phonological phenomenon, which exhibits variation ‘alternation’ in terms of the uvular consonants [q] and [ʁ] in Hasawi Arabic. This dialect is spoken in Alahsa city, which is located in the Eastern province of Saudi Arabia. To the best of our knowledge, no such research has systematically studied this phenomenon in Hasawi Arabic dialect. This paper is significant because it fills the gap in the literature about this alternation phenomenon in this understudied dialect. A large amount of the data is extracted from several interviews the author has conducted with 10 participants, native speakers of the dialect, and complemented by additional forms from social media. The latter method of collecting the data adds to the significance of the research. The analysis of the data is carried out in Harmonic Serialism Optimality Theory (HS-OT), a version of the Optimality Theoretic (OT) framework, which holds that linguistic forms are the outcome of the interaction among violable universal constraints, and in the recent development of OT into a model that accounts for linguistic variation in harmonic derivational steps. This alternation process is assumed to be phonologically unconditioned and in free variation in other varieties of Arabic dialects in the area. The goal of this paper is to investigate whether this phenomenon is in free variation or governed, what governs this alternation between [q] and [ʁ] and whether the alternation is phonological or other linguistic constraints are in action. The results show that the [q] and [ʁ] alternation is not free and it occurs due to different assimilation processes. Positional, segmental sequence and vowel adjacency factors are in action in Hasawi Arabic.Keywords: harmonic serialism, Hasawi, uvular, variation
Procedia PDF Downloads 5022731 Design and Implementation of Wave-Pipelined Circuit Using Reconfigurable Technique
Authors: Adhinarayanan Venkatasubramanian
Abstract:
For design of high speed digital circuit wave pipeline is the best approach this can be operated at higher operating frequencies by adjusting clock periods and skews so as latch the o/p of combinational logic circuit at the stable period. In this paper, there are two methods are proposed in automation task one is BIST (Built in self test) and second method is Reconfigurable technique. For the above two approaches dedicated AND gate (multiplier) by applying wave pipeline technique. BIST approach is implemented by Xilinx Spartan-II device. In reconfigurable technique done by ASIC. From the results, wave pipeline circuits are faster than nonpipeline circuit and area, power dissipation are reduced by reconfigurable technique.Keywords: SOC, wave-pipelining, FPGA, self-testing, reconfigurable, ASIC
Procedia PDF Downloads 4292730 Green Architecture from the Thawing Arctic: Reconstructing Traditions for Future Resilience
Authors: Nancy Mackin
Abstract:
Historically, architects from Aalto to Gaudi to Wright have looked to the architectural knowledge of long-resident peoples for forms and structural principles specifically adapted to the regional climate, geology, materials availability, and culture. In this research, structures traditionally built by Inuit peoples in a remote region of the Canadian high Arctic provides a folio of architectural ideas that are increasingly relevant during these times of escalating carbon emissions and climate change. ‘Green architecture from the Thawing Arctic’ researches, draws, models, and reconstructs traditional buildings of Inuit (Eskimo) peoples in three remote, often inaccessible Arctic communities. Structures verified in pre-contact oral history and early written history are first recorded in architectural drawings, then modeled and, with the participation of Inuit young people, local scientists, and Elders, reconstructed as emergency shelters. Three full-sized building types are constructed: a driftwood and turf-clad A-frame (spring/summer); a stone/bone/turf house with inwardly spiraling walls and a fan-shaped floor plan (autumn); and a parabolic/catenary arch-shaped dome from willow, turf, and skins (autumn/winter). Each reconstruction is filmed and featured in a short video. Communities found that the reconstructed buildings and the method of involving young people and Elders in the reconstructions have on-going usefulness, as follows: 1) The reconstructions provide emergency shelters, particularly needed as climate change worsens storms, floods, and freeze-thaw cycles and scientists and food harvesters who must work out of the land become stranded more frequently; 2) People from the communities re-learned from their Elders how to use materials from close at hand to construct impromptu shelters; 3) Forms from tradition, such as windbreaks at entrances and using levels to trap warmth within winter buildings, can be adapted and used in modern community buildings and housing; and 4) The project initiates much-needed educational and employment opportunities in the applied sciences (engineering and architecture), construction, and climate change monitoring, all offered in a culturally-responsive way. Elders, architects, scientists, and young people added innovations to the traditions as they worked, thereby suggesting new sustainable, culturally-meaningful building forms and materials combinations that can be used for modern buildings. Adding to the growing interest in bio-mimicry, participants looked at properties of Arctic and subarctic materials such as moss (insulation), shrub bark (waterproofing), and willow withes (parabolic and catenary arched forms). ‘Green Architecture from the Thawing Arctic’ demonstrates the effective, useful architectural oeuvre of a resilient northern people. The research parallels efforts elsewhere in the world to revitalize long-resident peoples’ architectural knowledge, in the interests of designing sustainable buildings that reflect culture, heritage, and identity.Keywords: architectural culture and identity, climate change, forms from nature, Inuit architecture, locally sourced biodegradable materials, traditional architectural knowledge, traditional Inuit knowledge
Procedia PDF Downloads 5262729 Save Balance of Power: Can We?
Authors: Swati Arun
Abstract:
The present paper argues that Balance of Power (BOP) needs to conjugate with certain contingencies like geography. It is evident that sea powers (‘insular’ for better clarity) are not balanced (if at all) in the same way as land powers. Its apparent that artificial insularity that the US has achieved reduces the chances of balancing (constant) and helps it maintain preponderance (variable). But how precise is this approach in assessing the dynamics between China’s rise and reaction of other powers and US. The ‘evolved’ theory can be validated by putting China and US in the equation. Systemic Relation between the nations was explained through the Balance of Power theory much before the systems theory was propounded. The BOP is the crux of functionality of ‘power relation’ dynamics which has played its role in the most astounding ways leading to situations of war and peace. Whimsical; but true that, the BOP has remained a complicated and indefinable concepts since Hans. Morganthau to Kenneth Waltz. A challenge of the BOP, however remains; “ that it has too many meanings”. In the recent times it has become evident that the myriad of expectations generated by BOP has not met the practicality of the current world politics. It is for this reason; the BoP has been replaced by Preponderance Theory (PT) to explain prevailing power situation. PT does provide an empirical reasoning for the success of this theory but fails in a abstract logical reasoning required for making a theory universal. Unipolarity clarifies the current system as one where balance of power has become redundant. It seems to reach beyond the contours of BoP, where a superpower does what it must to remain one. The centrality of this arguments pivots around - an exception, every time BOP fails to operate, preponderance of power emerges. PT does not sit well with the primary logic of a theory because it works on an exception. The evolution of such a pattern and system where BOP fails and preponderance emerges is absent. The puzzle here is- if BOP really has become redundant or it needs polishing. The international power structure changed from multipolar to bipolar to unipolar. BOP was looked at to provide inevitable logic behind such changes and answer the dilemma we see today- why US is unchecked, unbalanced? But why was Britain unchecked in 19th century and why China was unbalanced in 13th century? It is the insularity of the state that makes BOP reproduce “imbalance of power”, going a level up from off-shore balancer. This luxury of a state to maintain imbalance in the region of competition or threat is the causal relation between BOP’s and geography. America has applied imbalancing- meaning disequilibrium (in its favor) to maintain the regional balance so that over time the weaker does not get stronger and pose a competition. It could do that due to the significant parity present between the US and the rest.Keywords: balance of power, china, preponderance of power, US
Procedia PDF Downloads 2792728 Cyber Violence Behaviors Among Social Media Users in Ghana: An Application of Self-Control Theory and Social Learning Theory
Authors: Aisha Iddrisu
Abstract:
The proliferation of cyberviolence in the wave of increased social media consumption calls for immediate attention both at the local and global levels. With over 4.70 billion social media users worldwide and 8.8 social media users in Ghana, various forms of violence have become the order of the day in most countries and communities. Cyber violence is defined as producing, retrieving, and sharing of hurtful or dangerous online content to cause emotional, psychological, or physical harm. The urgency and severity of cyber violence have led to the enactment of laws in various countries though lots still need to be done, especially in Ghana. In Ghana, studies on cyber violence have not been extensively dealt with. Existing studies concentrate only on one form or the other form of cyber violence, thus cybercrime and cyber bullying. Also, most studies in Africa have not explored cyber violence forms using empirical theories and the few that existed were qualitatively researched, whereas others examine the effect of cyber violence rather than examining why those who involve in it behave the way they behave. It is against this backdrop that this study aims to examine various cyber violence behaviour among social media users in Ghana by applying the theory of Self-control and Social control theory. This study is important for the following reasons. The outcome of this research will help at both national and international level of policymaking by adding to the knowledge of understanding cyberviolence and why people engage in various forms of cyberviolence. It will also help expose other ways by which such behaviours are enforced thereby serving as a guide in the enactment of the rightful rules and laws to curb such behaviours. It will add to literature on consequences of new media. This study seeks to confirm or reject to the following research hypotheses. H1 Social media usage has direct significant effect of cyberviolence behaviours. H2 Ineffective parental management has direct significant positive relation to Low self-control. H3 Low self-control has direct significant positive effect on cyber violence behaviours among social, H4 Differential association has significant positive effect on cyberviolence behaviour among social media users in Ghana. H5 Definitions have a significant positive effect on cyberviolence behaviour among social media users in Ghana. H6 Imitation has a significant positive effect on cyberviolence behaviour among social media users in Ghana. H7 Differential reinforcement has a significant positive effect on cyberviolence behaviour among social media users in Ghana. H8 Differential association has a significant positive effect on definitions. H9 Differential association has a significant positive effect on imitation. H10 Differential association has a significant positive effect on differential reinforcement. H11 Differential association has significant indirect positive effects on cyberviolence through the learning process.Keywords: cyberviolence, social media users, self-control theory, social learning theory
Procedia PDF Downloads 862727 Application of Sub-health Diagnosis and Reasoning Method for Avionics
Authors: Weiran An, Junyou Shi
Abstract:
Health management has become one of the design goals in the research and development of new generation avionics systems, and is an important complement and development for the testability and fault diagnosis technology. Currently, the research and application for avionics system health dividing and diagnosis technology is still at the starting stage, lack of related technologies and methods reserve. In this paper, based on the health three-state dividing of avionics products, state lateral transfer coupling modeling and diagnosis reasoning method considering sub-health are researched. With the study of typical case application, the feasibility and correctness of the method and the software are verified.Keywords: sub-health, diagnosis reasoning, three-valued coupled logic, extended dependency model, avionics
Procedia PDF Downloads 3342726 Experimental Investigation on the Anchor Behavior of Planar Clamping Anchor for Carbon Fiber-Reinforced Polymer Plate
Authors: Yongyu Duo, Xiaogang Liu, Qingrui Yue
Abstract:
The anchor plays a critical role in the utilization of the tensile strength of carbon fiber-reinforced polymer (CFRP) plate when it is applied for the prestressed retrofitted and cable structures. In this paper, the anchor behavior of planar clamping anchor (PCA) under different interface treatment forms and normal pressures was investigated by the uniaxial static tensile test. Two interface treatment forms were adopted, including pure friction and the coupling action of friction and bonding. The results indicated that the load-bearing capacity of PCA could be obviously improved by the coupling action of friction and bonding compared with the action of pure friction. Under the normal pressure of 11 MPa, 22 MPa, and 33 MPa, the load-bearing capacity of PCA was enhanced by 164.61%, 68.40%, and 52.78%, respectively, and the tensile strength of the CFRP plate was fully exploited when the normal pressure reached 44 MPa. In addition, the experimental coefficient of static friction between the galling CFRP plate and a sandblasted steel plate was in the range of 0.28-0.30, corresponding to various normal pressure. Moreover, the failure mode was determined by the interface treatment form and normal pressure. The research in this paper has important guiding significance to optimize the design of the mechanical clamping anchor, contributing to promoting the application of CFRP plate in reinforcement and cable structure.Keywords: PCA, CFRP plate, interface treatment form, normal pressure, friction, coupling action
Procedia PDF Downloads 832725 Renewable Energy Micro-Grid Control Using Microcontroller in LabVIEW
Authors: Meena Agrawal, Chaitanya P. Agrawal
Abstract:
The power systems are transforming and becoming smarter with innovations in technologies to enable embark simultaneously upon the sustainable energy needs, rising environmental concerns, economic benefits and quality requirements. The advantages provided by inter-connection of renewable energy resources are becoming more viable and dependable with the smart controlling technologies. The limitation of most renewable resources have their diversity and intermittency causing problems in power quality, grid stability, reliability, security etc. is being cured by these efforts. A necessitate of optimal energy management by intelligent Micro-Grids at the distribution end of the power system has been accredited to accommodate sustainable renewable Distributed Energy Resources on large scale across the power grid. All over the world Smart Grids are emerging now as foremost concern infrastructure upgrade programs. The hardware setup includes NI cRIO 9022, Compact Reconfigurable Input Output microcontroller board connected to the PC on a LAN router with three hardware modules. The Real-Time Embedded Controller is reconfigurable controller device consisting of an embedded real-time processor controller for communication and processing, a reconfigurable chassis housing the user-programmable FPGA, Eight hot-swappable I/O modules, and graphical LabVIEW system design software. It has been employed for signal analysis, controls and acquisition and logging of the renewable sources with the LabVIEW Real-Time applications. The employed cRIO chassis controls the timing for the module and handles communication with the PC over the USB, Ethernet, or 802.11 Wi-Fi buses. It combines modular I/O, real-time processing, and NI LabVIEW programmable. In the presented setup, the Analog Input Module NI 9205 five channels have been used for input analog voltage signals from renewable energy sources and NI 9227 four channels have been used for input analog current signals of the renewable sources. For switching actions based on the programming logic developed in software, a module having Electromechanical Relays (single-pole single throw) with 4-Channels, electrically isolated and LED indicating the state of that channel have been used for isolating the renewable Sources on fault occurrence, which is decided by the logic in the program. The module for Ethernet based Data Acquisition Interface ENET 9163 Ethernet Carrier, which is connected on the LAN Router for data acquisition from a remote source over Ethernet also has the module NI 9229 installed. The LabVIEW platform has been employed for efficient data acquisition, monitoring and control. Control logic utilized in program for operation of the hardware switching Related to Fault Relays has been portrayed as a flowchart. A communication system has been successfully developed amongst the sources and loads connected on different computers using Hypertext transfer protocol, HTTP or Ethernet Local Stacked area Network TCP/IP protocol. There are two main I/O interfacing clients controlling the operation of the switching control of the renewable energy sources over internet or intranet. The paper presents experimental results of the briefed setup for intelligent control of the micro-grid for renewable energy sources, besides the control of Micro-Grid with data acquisition and control hardware based on a microcontroller with visual program developed in LabVIEW.Keywords: data acquisition and control, LabVIEW, microcontroller cRIO, Smart Micro-Grid
Procedia PDF Downloads 3342724 Neural Network in Fixed Time for Collision Detection between Two Convex Polyhedra
Authors: M. Khouil, N. Saber, M. Mestari
Abstract:
In this paper, a different architecture of a collision detection neural network (DCNN) is developed. This network, which has been particularly reviewed, has enabled us to solve with a new approach the problem of collision detection between two convex polyhedra in a fixed time (O (1) time). We used two types of neurons, linear and threshold logic, which simplified the actual implementation of all the networks proposed. The study of the collision detection is divided into two sections, the collision between a point and a polyhedron and then the collision between two convex polyhedra. The aim of this research is to determine through the AMAXNET network a mini maximum point in a fixed time, which allows us to detect the presence of a potential collision.Keywords: collision identification, fixed time, convex polyhedra, neural network, AMAXNET
Procedia PDF Downloads 4252723 Emerging Cyber Threats and Cognitive Vulnerabilities: Cyberterrorism
Authors: Oludare Isaac Abiodun, Esther Omolara Abiodun
Abstract:
The purpose of this paper is to demonstrate that cyberterrorism is existing and poses a threat to computer security and national security. Nowadays, people have become excitedly dependent upon computers, phones, the Internet, and the Internet of things systems to share information, communicate, conduct a search, etc. However, these network systems are at risk from a different source that is known and unknown. These network systems risk being caused by some malicious individuals, groups, organizations, or governments, they take advantage of vulnerabilities in the computer system to hawk sensitive information from people, organizations, or governments. In doing so, they are engaging themselves in computer threats, crime, and terrorism, thereby making the use of computers insecure for others. The threat of cyberterrorism is of various forms and ranges from one country to another country. These threats include disrupting communications and information, stealing data, destroying data, leaking, and breaching data, interfering with messages and networks, and in some cases, demanding financial rewards for stolen data. Hence, this study identifies many ways that cyberterrorists utilize the Internet as a tool to advance their malicious mission, which negatively affects computer security and safety. One could identify causes for disparate anomaly behaviors and the theoretical, ideological, and current forms of the likelihood of cyberterrorism. Therefore, for a countermeasure, this paper proposes the use of previous and current computer security models as found in the literature to help in countering cyberterrorismKeywords: cyberterrorism, computer security, information, internet, terrorism, threat, digital forensic solution
Procedia PDF Downloads 972722 Gravity and Geometric String Mechanics
Authors: Joe Price LeClair
Abstract:
The study aims to comprehend the universe and its geometric representation by exploring the relationship between gravity, hydrogen, and neutrons. The purpose is to understand the neutrons' relationship to hydrogen to add geometric stability to the universe. Through the use of logic, deductive reasoning, and data collection from the free net, the study brings clarity to the understanding of the geometry of the universe. The study provides insight into the fundamental mechanics and forces to display the relationship between hydrogen and the neutron and how it translates to gravity. In conclusion, the study offers a unique perspective on the fundamental forces that contribute to the understanding of the geometry of our universe.Keywords: geometric string mechanics, gravity, hydrogen, neutron
Procedia PDF Downloads 122721 Traditional Women's Clothes at Tekirdağ Region
Authors: E. Elhan Özus, Melek Tufan, Filiz Erden
Abstract:
Cloth is a special wearing style of a society for a period or of a profession. Clothes reflect the social status difference than the fashion. Within this context, society forms a wearing style in the direction of its customs, usage, traditions and social structure. One of the properties of a society indicating the social levels and cultural differences differing the societies from each other is clothing style. Clothing is one of the most important needs in life depending on the individual and social attributes. The clothing which first emerged as protection means is a social fact complementing the physical and psychological existence of human being, changing forms depending on technological developments and phases, and continuously changing under the affect of fashion today. Clothing is an aesthetic value fed by the feelings of individuals. So, clothing has an indispensable place in the structure and communication of cultural and social identity within this direction. The traditional Turkish clothing has a rich ethnography. It is also possible to see the winds coming from our predecessors in these cultural assets reflecting the feelings and thoughts of Anatolian women. When the long history of our nation and the cultures interacted by our nation are taken into account, it is seen that the magnificence of our nation has also reflected into the clothing culture.For this reason, we tried to keep the traditional women’s clothing of Tekirdağ region alive by investigating and documenting them. In this study, it is purposed to contribute a little bit to protect our culture and form a source for the future generations, to carry our national cultural values from the past up to now and to the future and deliver to the young people.Keywords: Turkish, traditional, culture, clothing
Procedia PDF Downloads 3412720 'Sex, Work and Sex-Work': The Clandestine Tale of a Tabooed Industry in Bangladesh
Authors: Parvez Sattar
Abstract:
There are around 150,000 female sex workers in Bangladesh, and the country hosts one of the largest brothels in the world. There are 20 brothel-villages in the country, of which 14 are recognized to be ‘official’, and at least 11 are currently operational. Although the national Constitution adopts a preventive policy against prostitution, law does not, as such, prohibit commercial sex work by an adult woman working in a brothel having made an affidavit in this regard. But, at the same time, the law renders at least some forms of floating and hotel based sex work illegal, while sex between males has been termed as sodomy and made culpable offence even on its own. All forms of sex works by MSM and Hijra are thus branded as criminal acts. Observations and findings drawn in this article are based on both primary and secondary sources collecting data from a series of field-based empirical studies conducted by the author through questionnaire survey, FGDs, key informant consultations and other PRA/PLA tools. General and specific conclusions have been based on analysis guided by international standards of human and labour rights approaches. It has been noted that neither the community attitudes nor the cultural mind-sets, or the State's institutional set up is supportive of the causes of sex workers engaged in the most exploitative forms of labour. Lack of respect for fundamental rights continues to diminish any chances of sex workers' reintegration to the mainstream of the society, perpetuates poverty, and increases their vulnerability to HIV/AIDS. To aggravate the scenario, the endemic practice of a complex debt-bondage masked by the so-called 'entry-cost' and ‘legal license’ to the industry is considered to be a somewhat accepted 'open secret' and that the police and administration keep their eyes off from such practices treating these as 'their internal affairs'. Often these practices are used by the Sardarni/Khala (landlady) and other 'managing' actors as the tool for further exploitation of the sex workers as well as a 'control strategy'. The paper concludes with the observation that the tabooed truths of commercial sex and sex workers are inherently embedded in the very factors that compel them into this endemically ostracised profession itself. While denial of both recognition and enjoyment of the fundamental human rights of sex workers is widespread, it is the same cycle of social vulnerability and economic exclusion that often confines these people within a continuous process of servitude and modern day slavery.Keywords: commercial sex work and human rights, Labor protection in sex industry, Prostitution Law in Bangladesh, Sex work as modern day slavery
Procedia PDF Downloads 1092719 Effects of Sole and Integrated Application of Cocoa Pod Ash and Poultry Manure on Soil Properties and Leaf Nutrient Composition and Performance of White Yam
Authors: T. M. Agbede, A. O. Adekiya
Abstract:
Field experiments were conducted during 2013, 2014 and 2015 cropping seasons at Rufus Giwa Polytechnic, Owo, Ondo State, southwest Nigeria. The objective of the investigation was to determine the effect of Cocoa Pod Ash (CPA) and Poultry Manure (PM) applied solely and their combined form, as sources of fertilizers on soil properties, leaf nutrient composition, growth and yield of yam. Three soil amendments: CPA, PM (sole forms), CPA and PM (mixture), were applied at 20 t ha-1 with an inorganic fertilizer (NPK 15-15-15) at 400 kg ha-1 as a reference and a natural soil fertility, NSF (control). The five treatments were arranged in a randomized complete block design with three replications. The test soil was slightly acidic, low in organic carbon (OC), N, P, K, Ca and Mg. Results showed that soil amendments significantly increased (p = 0.05) tuber weights and growth of yam, soil and leaf N, P, K, Ca and Mg, soil pH and OC concentrations compared with the NSF (control). The mixture of CPA+PM treatment increased tuber weights of yam by 36%, compared with inorganic fertilizer (NPK) and 19%, compared with PM alone. Sole PM increased tuber weight of yam by 15%, compared with NPK. Sole or mixed forms of soil amendments showed remarkable improvement in soil physical properties, nutrient availability, compared with NPK and the NSF (control). Integrated application of CPA at 10 t ha-1 + PM at 10 t ha-1 was the most effective treatment in improving soil physical properties, increasing nutrient availability and yam performance than sole application of any of the fertilizer materials.Keywords: cocoa pod ash, leaf nutrient composition, poultry manure, soil properties, yam
Procedia PDF Downloads 3262718 Manipulative Figurative Linguistic Violence of Contemporary National Anthems: A Socio-Cognitive Critical Discourse Analysis
Authors: Samson Olasunkanmi Oluga, Teh Chee Send, Gerard Sagaya Raj Rajo
Abstract:
It is ironical that the national anthems of many nations that are in the forefront of the global condemnation of violence of all forms have portions or expressions that propagate various forms of linguistic violence which advocate attacking opponents, going to war, shedding blood and sacrificing lives. These diametrically contradict contemporary yearnings for global tranquility and the ideals of the United Nations established for the maintenance of international peace and harmony aimed at making the world a safe haven for all and sundry. The linguistic violence of many national anthems is manipulatively constructed /presented via the instrumentality of the figurative or rhetorical language. This helps to linguistically embellish the violent ideas communicated and makes them sound somehow better or logical to the target audience with the intention of cognitively manipulating them to accept or rationalize such violent ideas. This paper, therefore, presents the outcome of a linguistic exploration/examination of national anthems which reveals elements or cases manipulative figurative linguistic violence in the anthems of twenty-one (21) nations. The paper details a Socio-Cognitive Critical Discourse Analysis of the manipulative figures of comparison, contrast, indirectness, association and sound used to convey the linguistic violence of the identified national anthems. Finally, the paper advocates the need for linguistic overhaul of affected anthems so that the language of anthems which epitomize nations can be pacific and in tandem with contemporary global trends.Keywords: national anthems, linguistic violence, figurative language, cognitive, manipulation, CDA
Procedia PDF Downloads 3322717 Metaphorical Devices in Political Cartoons with Reference to Political Confrontation in Pakistan after Panama Leaks
Authors: Ayesha Ashfaq, Muhammad Ajmal Ashfaq
Abstract:
It has been assumed that metaphorical and symbolic contests are waged with metaphors, captions, and signs in political cartoons that play a significant role in image construction of political actors, situations or events in the political arena. This paper is an effort to explore the metaphorical devices in political cartoons related to the political confrontation in Pakistan between the ruling party Pakistan Muslim League Nawaz (PMLN) and opposition parties especially after Panama leaks. For this purpose, political cartoons sketched by five renowned political cartoonists on the basis of their belongings to the most highly circulated mainstream English newspapers of Pakistan and their professional experiences in their genre, were selected. The cartoons were analyzed through the Barthes’s model of Semiotics under the umbrella of the first level of agenda setting theory ‘framing’. It was observed that metaphorical devices in political cartoons are one of the key weapons of cartoonists’ armory. These devices are used to attack the candidates and contribute to the image and character building. It was found that all the selected political cartoonists used different forms of metaphors including situational metaphors and embodying metaphors. Not only the physical stature but also the debates and their activities were depicted metaphorically in the cartoons that create the scenario of comparison between the cartoons and their real political confrontation. It was examined that both forms of metaphors shed light on cartoonist’s perception and newspaper’s policy about political candidates, political parties and particular events. In addition, it was found that zoomorphic metaphors and metaphors of diminishments were also predominantly used to depict the conflict between two said political actors.Keywords: metaphor, Panama leaks, political cartoons, political communication
Procedia PDF Downloads 3092716 A Comparative Study of Virus Detection Techniques
Authors: Sulaiman Al amro, Ali Alkhalifah
Abstract:
The growing number of computer viruses and the detection of zero day malware have been the concern for security researchers for a large period of time. Existing antivirus products (AVs) rely on detecting virus signatures which do not provide a full solution to the problems associated with these viruses. The use of logic formulae to model the behaviour of viruses is one of the most encouraging recent developments in virus research, which provides alternatives to classic virus detection methods. In this paper, we proposed a comparative study about different virus detection techniques. This paper provides the advantages and drawbacks of different detection techniques. Different techniques will be used in this paper to provide a discussion about what technique is more effective to detect computer viruses.Keywords: computer viruses, virus detection, signature-based, behaviour-based, heuristic-based
Procedia PDF Downloads 4862715 A Review on Applications of Experts Systems in Medical Sciences
Authors: D. K. Sreekantha, T. M. Girish, R. H. Fattepur
Abstract:
In this article, we have given an overview of medical expert systems, which can be used for the developed of physicians in making decisions such as appropriate, prognostic, and therapeutic decisions which help to organize, store, and gives appropriate medical knowledge needed by physicians and practitioners during medical operations or further treatment. If they support the studies by using these systems, advanced tools in medicine will be developed in the future. New trends in the methodology of development of medical expert systems have also been discussed in this paper. So Authors would like to develop an innovative IT based solution to help doctors in rural areas to gain expertise in Medical Science for treating patients. This paper aims to survey the Soft Computing techniques in treating patient’s problems used throughout the world.Keywords: expert system, fuzzy logic, knowledge base, soft computing, epilepsy
Procedia PDF Downloads 2552714 Importance of Women Education: Mother To Be Education in Order to Brighten Future Generation’s Foredoom
Authors: Ummi Sholihah Pertiwi Abidin, Eva Fadhilah
Abstract:
Social changes are more and more growing and having many different forms as the time passed and thought methods in the society. One of many forms of that social changes is the emancipation of women that is flourishing by the inception of gender equality perception between men and women in all aspects including education. It’s not anymore found the distinction between genders in learning and the education achieving right at this globalized era. But, it is still many perceptions which are against that equality of education achieving right, either come from the women’s selves or many external factors. They assumed that they are going to be a mother in the future, and a wife, someone with responsible for taking care of the household and everything inside, while the husband is the one who has the responsible for looking for the living. So comes from this kind of assumption, the perception against the education equality between genders, which means there is no need for them –women- to achieve the high education because they will still end up as housewives. Except those working or career women that need high education to support their works. These women are not aware that even a mother needs the high and capable education. Because, as the 'mother to be,' they surely need broad knowledge from the education to educate their children in the future. It is such a big fault to say the kind of thing, 'It is no matter that I am not educated, in case I’m just a housewife. The important thing is my children get a great education'. Unfortunately, it is still often found, saying 'A housewife job is not a big deal to do with high education.' This qualitative method paper raises a theme about the importance of education for women, no matter what will they be in the future. Because however, and whatever is the woman’s career outside the house, or even not working outside, she’s still a mother for her children, and 'educational provision' is a great need. And so forth, this educational provision is a big deal to do with future generation’s foredoom, regarding the first source of children’s knowledge and the first school for them is their mother.Keywords: women education, mother to be, educational provision, first school, future generation’s foredoom
Procedia PDF Downloads 268