Search results for: social network theory
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 17023

Search results for: social network theory

16513 Thermal Network Model for a Large Scale AC Induction Motor

Authors: Sushil Kumar, M. Dakshina Murty

Abstract:

Thermal network modelling has proven to be important tool for thermal analysis of electrical machine. This article investigates numerical thermal network model and experimental performance of a large-scale AC motor. Experimental temperatures were measured using RTD in the stator which have been compared with the numerical data. Thermal network modelling fairly predicts the temperature of various components inside the large-scale AC motor. Results of stator winding temperature is compared with experimental results which are in close agreement with accuracy of 6-10%. This method of predicting hot spots within AC motors can be readily used by the motor designers for estimating the thermal hot spots of the machine.

Keywords: AC motor, thermal network, heat transfer, modelling

Procedia PDF Downloads 326
16512 A Two-Step Framework for Unsupervised Speaker Segmentation Using BIC and Artificial Neural Network

Authors: Ahmad Alwosheel, Ahmed Alqaraawi

Abstract:

This work proposes a new speaker segmentation approach for two speakers. It is an online approach that does not require a prior information about speaker models. It has two phases, a conventional approach such as unsupervised BIC-based is utilized in the first phase to detect speaker changes and train a Neural Network, while in the second phase, the output trained parameters from the Neural Network are used to predict next incoming audio stream. Using this approach, a comparable accuracy to similar BIC-based approaches is achieved with a significant improvement in terms of computation time.

Keywords: artificial neural network, diarization, speaker indexing, speaker segmentation

Procedia PDF Downloads 502
16511 Social Media Diffusion And Implications For Opinion Leadership In Northcentral Nigeria

Authors: Chuks Odiegwu-Enwerem

Abstract:

The classical notion of opinion leadership presupposes that the media is at the center of an effective and successful opinion leadership. Under this idea, an opinion leader is an active media user who consumes, understands, digests and interprets the messages for the understanding and acceptance/adoption by lower-end media users – whose access and understanding of media content are supposedly low. Because of their unique access to and presumed understanding of media functions and their content, opinion leaders are typically esteemed by those who look forward to and accept their opinions. Lazarsfeld and Katz’s two-step flow of communication theory is the basis of opinion leadership – propelled by limited access to the media. With the emergence and spread of social media and its unlimited access by all and sundry, however, the study interrogates the relevance and application of opinion leaders and, by implication, the two-step flow communication theory in Nigeria’s Northcentral region. It seeks to determine whether opinion leaders still exist in the picture and if they still exert considerable influence, especially in matters of political conversations and decision-making among the citizens of this area. It further explores whether the diffusion of social media is a reality and how the ‘low-end’ media users react to the new-found freedom of access to media, and how they are using it to inform their decisions on important matters as well as examines if they are still glued to their opinion leaders. This study explores the empirical dimensions of the two-step flow hypothesis in relation to the activities of social media to determine if a change has occurred and in what direction, using mixed methos of Survey and in-depth interviews. Our understanding and belief in some theoretical assumptions may be enhanced or challenged by the study outcome.

Keywords: Opinion Leadership, Active Media User, Two-Step-Flow, Social media, Northcentral Nigeria

Procedia PDF Downloads 70
16510 Transit Network Design Problem Issues and Challenges

Authors: Mahmoud Owais

Abstract:

Public Transit (P.T) is very important means to reduce traffic congestion, to improve urban environmental conditions and consequently affects people social lives. Planning, designing and management of P.T are the key issues for offering a competitive mode that can compete with the private transportation. These transportation planning, designing and management issues are addressed in the Transit Network Design Problem (TNDP). It deals with a complete hierarchy of decision making process. It includes strategic, tactical and operational decisions. The main body of TNDP is two stages, namely; route design stage and frequency setting. The TNDP is extensively studied in the last five decades; however the research gate is still widely open due to its many practical and modeling challenges. In this paper, a comprehensive background is given to illustrate the issues and challenges related to the TNDP to help in directing the incoming researches towards the untouched areas of the problem.

Keywords: frequency setting, network design, transit planning, urban planning

Procedia PDF Downloads 385
16509 A Business Model Design Process for Social Enterprises: The Critical Role of the Environment

Authors: Hadia Abdel Aziz, Raghda El Ebrashi

Abstract:

Business models are shaped by their design space or the environment they are designed to be implemented in. The rapidly changing economic, technological, political, regulatory and market external environment severely affects business logic. This is particularly true for social enterprises whose core mission is to transform their environments, and thus, their whole business logic revolves around the interchange between the enterprise and the environment. The context in which social business operates imposes different business design constraints while at the same time, open up new design opportunities. It is also affected to a great extent by the impact that successful enterprises generate; a continuous loop of interaction that needs to be managed through a dynamic capability in order to generate a lasting powerful impact. This conceptual research synthesizes and analyzes literature on social enterprise, social enterprise business models, business model innovation, business model design, and the open system view theory to propose a new business model design process for social enterprises that takes into account the critical role of environmental factors. This process would help the social enterprise develop a dynamic capability that ensures the alignment of its business model to its environmental context, thus, maximizing its probability of success.

Keywords: social enterprise, business model, business model design, business model environment

Procedia PDF Downloads 372
16508 A Theory of Aftercare for Human Trafficking Survivors: A Grounded Theory Analysis of Survivors and Aftercare Providers in South Africa

Authors: Robyn L. Curran, Joanne R. Naidoo, Gugu Mchunu

Abstract:

Along with the increasing awareness of human trafficking, is the acknowledgement that it is no longer just a social problem but also a significant public health problem that requires both increased knowledge and the specialist equipping of aftercare providers such as nurses who care for human trafficking survivors. Current discourse regarding aftercare of human trafficking survivors, is that approaches do not clearly explain the function or content of aftercare and what aftercare entails. Although psychological and medical aftercare are emphasized as important components, little practical attention is devoted to what these components actually involve and the effectiveness of current practice in aftercare. Review of the literature on the processes that take place from aftercare to empowerment, revealed the need for emphasis to be placed on the voices of survivors concerning their liberation from oppression. The aim of the study was to develop a theory for aftercare of human trafficking survivors, through analyzing the experiences of survivors and aftercare providers in shelters in three provinces in South Africa. Through using a Straussian grounded theory approach, the researcher developed a theory to inform care of human trafficking survivors in low resource settings using the voice of the survivors and those experienced in direct care of human trafficking survivors. Four human trafficking survivors and three aftercare providers from three shelters in three provinces in South Africa were individually interviewed in order for the theory to emerge. The findings of the study elicited a theoretical model of the renewed self, and the conditions that facilitate this process in care of human trafficking survivors. The process that human trafficking survivors navigate to empowerment require mutual collaboration of the aftercare provider and survivor as the survivor awakens vision, confronts reality, re-salvages autonomy and liberates self. Psychological resilience of the survivor facilitates the transition to renewed self. The recommendations of this study may improve the nursing care provided to human trafficking survivors and equip professionals with knowledge and skills to promote the process of renewing self for survivors.

Keywords: aftercare, aftercare providers, grounded theory, human trafficking survivors

Procedia PDF Downloads 276
16507 Identification of Soft Faults in Branched Wire Networks by Distributed Reflectometry and Multi-Objective Genetic Algorithm

Authors: Soumaya Sallem, Marc Olivas

Abstract:

This contribution presents a method for detecting, locating, and characterizing soft faults in a complex wired network. The proposed method is based on multi-carrier reflectometry MCTDR (Multi-Carrier Time Domain Reflectometry) combined with a multi-objective genetic algorithm. In order to ensure complete network coverage and eliminate diagnosis ambiguities, the MCTDR test signal is injected at several points on the network, and the data is merged between different reflectometers (sensors) distributed on the network. An adapted multi-objective genetic algorithm is used to merge data in order to obtain more accurate faults location and characterization. The proposed method performances are evaluated from numerical and experimental results.

Keywords: wired network, reflectometry, network distributed diagnosis, multi-objective genetic algorithm

Procedia PDF Downloads 195
16506 A Propose of Personnel Assessment Method Including a Two-Way Assessment for Evaluating Evaluators and Employees

Authors: Shunsuke Saito, Kazuho Yoshimoto, Shunichi Ohmori, Sirawadee Arunyanart

Abstract:

In this paper, we suggest a mechanism of assessment that rater and Ratee (or employees) to convince. There are many problems exist in the personnel assessment. In particular, we were focusing on the three. (1) Raters are not sufficiently recognized assessment point. (2) Ratee are not convinced by the mechanism of assessment. (3) Raters (or Evaluators) and ratees have empathy. We suggest 1: Setting of "understanding of the assessment points." 2: Setting of "relative assessment ability." 3: Proposal of two-way assessment mechanism to solve these problems. As a prerequisite, it is assumed that there are multiple raters. This is because has been a growing importance of multi-faceted assessment. In this model, it determines the weight of each assessment point evaluators by the degree of understanding and assessment ability of raters and ratee. We used the ANP (Analytic Network Process) is a theory that an extension of the decision-making technique AHP (Analytic Hierarchy Process). ANP can be to address the problem of forming a network and assessment of Two-Way is possible. We apply this technique personnel assessment, the weights of rater of each point can be reasonably determined. We suggest absolute assessment for Two-Way assessment by ANP. We have verified that the consent of the two approaches is higher than conventional mechanism. Also, human resources consultant we got a comment about the application of the practice.

Keywords: personnel evaluation, pairwise comparison, analytic network process (ANP), two-ways

Procedia PDF Downloads 382
16505 The Impact of Information and Communication Technology in Knowledge Fraternization

Authors: Muhammad Aliyu

Abstract:

Significant improvement in Information and Communication Technology (ICT) and the enforced global competition are revolutionizing the way knowledge is managed and the way organizations compete. The emergence of new organizations calls for a new way to fraternize knowledge, which is known as 'knowledge fraternization.' In this modern economy, it is the knowledge if properly managed that can harness the organization's competitive advantage. This competitive advantage is realized through the full utilization of information and data coupled with the harnessing of people’s skills and ideas as well as their commitment and motivations, which can be accomplished through socializing the knowledge management processes. A fraternize network for knowledge management is a web-based system designed using PHP that is Dreamweaver web development tool, with the help of CS4 Adobe Dreamweaver as the PHP code Editor that supports the use of Cascadian Style Sheet (CSS), MySQL with Xamp, Php My Admin (Version 3.4.7) localhost server via TCP/IP for containing the databases of the system to support this in a distributed way, spreading the workload over the whole organization. This paper reviews the technologies and the technology tools to be used in the development of social networks in an organization.

Keywords: Information and Communication Technology (ICT), knowledge, fraternization, social network

Procedia PDF Downloads 394
16504 Implementation and Demonstration of Software-Defined Traffic Grooming

Authors: Lei Guo, Xu Zhang, Weigang Hou

Abstract:

Since the traditional network is closed and it has no architecture to create applications, it has been unable to evolve with changing demands under the rapid innovation in services. Additionally, due to the lack of the whole network profile, the quality of service cannot be well guaranteed in the traditional network. The Software Defined Network (SDN) utilizes global resources to support on-demand applications/services via open, standardized and programmable interfaces. In this paper, we implement the traffic grooming application under a real SDN environment, and the corresponding analysis is made. In our SDN: 1) we use OpenFlow protocol to control the entire network by using software applications running on the network operating system; 2) several virtual switches are combined into the data forwarding plane through Open vSwitch; 3) An OpenFlow controller, NOX, is involved as a logically centralized control plane that dynamically configures the data forwarding plane; 4) The traffic grooming based on SDN is demonstrated through dynamically modifying the idle time of flow entries. The experimental results demonstrate that the SDN-based traffic grooming effectively reduces the end-to-end delay, and the improvement ratio arrives to 99%.

Keywords: NOX, OpenFlow, Software Defined Network (SDN), traffic grooming

Procedia PDF Downloads 251
16503 Impact of Network Workload between Virtualization Solutions on a Testbed Environment for Cybersecurity Learning

Authors: Kevin Fernagut, Olivier Flauzac, Erick M. G. Robledo, Florent Nolot

Abstract:

The adoption of modern lightweight virtualization often comes with new threats and network vulnerabilities. This paper seeks to assess this with a different approach studying the behavior of a testbed built with tools such as Kernel-Based Virtual Machine (KVM), Linux Containers (LXC) and Docker, by performing stress tests within a platform where students experiment simultaneously with cyber-attacks, and thus observe the impact on the campus network and also find the best solution for cyber-security learning. Interesting outcomes can be found in the literature comparing these technologies. It is, however, difficult to find results of the effects on the global network where experiments are carried out. Our work shows that other physical hosts and the faculty network were impacted while performing these trials. The problems found are discussed, as well as security solutions and the adoption of new network policies.

Keywords: containerization, containers, cybersecurity, cyberattacks, isolation, performance, virtualization, virtual machines

Procedia PDF Downloads 149
16502 Reliable Multicast Communication in Next Generation Networks

Authors: Muazzam Ali Khan Khattak

Abstract:

Next Generation Network is combination of different networks having different technologies. Due to mobile nature of nodes the movement of nodes occurs from one network to another network. Multicasting in such networks is still a hot issue of research because the user in today's world wants reliable communication wherever it lies. Due to heterogeneity of NGN it is very difficult to handle reliable multicast communication. In this paper we proposed an improved scheme for reliable multicast communication in next generation networks. Because multicast communication is very important to deliver same data packets to multiple receivers and minimize the network traffic. This new scheme will make the multicast communication in NGN more reliable and efficient.

Keywords: next generation networks, route request, IPT, NACK, ARQ, DTN

Procedia PDF Downloads 503
16501 Towards Security in Virtualization of SDN

Authors: Wanqing You, Kai Qian, Xi He, Ying Qian

Abstract:

In this paper, the potential security issues brought by the virtualization of a Software Defined Networks (SDN) would be analyzed. The virtualization of SDN is achieved by FlowVisor (FV). With FV, a physical network is divided into multiple isolated logical networks while the underlying resources are still shared by different slices (isolated logical networks). However, along with the benefits brought by network virtualization, it also presents some issues regarding security. By examining security issues existing in an OpenFlow network, which uses FlowVisor to slice it into multiple virtual networks, we hope we can get some significant results and also can get further discussions among the security of SDN virtualization.

Keywords: SDN, network, virtualization, security

Procedia PDF Downloads 428
16500 The Role of Social Isolation and Its Relevance Towards the Intersex Condition for Policy Management of Inclusive Education

Authors: Hamza Iftikhar

Abstract:

The intersex person’s social isolation condition is the leading concern in inclusive educational practices. It provides for the relevance of intersex communities with the influence of social isolation on their education and well-being. Given the underlying concern, this paper stresses the isolation-free condition of the intersex community by facilitating inclusive education. The Atkinson and Shiffrin Model and Behaviorism-Based Intersex Theory supports inclusive education by extending the desire for the significant management of stereotypes, quality teaching, parental beliefs, expressions, physique, and intersex attribution. The reducing role of social isolation for inclusive education is analyzed using the qualitative research method. The semi-structured interview research instrument is used for the data collection from the Ministry of Human Rights, Educational Institutions, and inter-sex Representatives. The results show that managing directors and heads of educational institutions frame policy management for the free social isolation of intersex persons, which is relevant through inclusive education. The implication of this paper is to provide a better social condition for intersex persons towards inclusive education through effective policy management.

Keywords: social isolation, inter-sex, relevance, inclusive education, policy management

Procedia PDF Downloads 101
16499 Uncertainty Reduction and Dyadic Interaction through Social Media

Authors: Masrur Alam Khan

Abstract:

The purpose of this study was to examine the dyadic interaction techniques that social media users utilize to reduce uncertainty in their day to day business engagements in the absence of their physical interaction. The study empirically tested assumptions of uncertainty reduction theory while addressing self-disclosure, seeking questions to develop consensus, and subsequently to achieve intimacy in very conducive environment. Moreover, this study examined the effect of dyadic interaction through social media among business community while identifying the strength of their reciprocity in relationships and compares it with those having no dyadic relations due to absence of social media. Using socio-metric survey, the study revealed a better understanding of their partners for upholding their professional relations more credible. A sample of unacquainted, both male and female, was randomly asked questions regarding their nature of dyadic interaction within their office while using social media (face-to-face, visual CMC (webcam) or text-only). Primary results explored that the social media users develop their better know-how about their professional obligations to reduce ambiguity and align with one to one interact.

Keywords: dyadic-interaction, social media, uncertainty reduction, socio-metric survey, self-disclosure, intimacy, reciprocity in relationship

Procedia PDF Downloads 137
16498 Inferring Cognitive Skill in Concept Space

Authors: Rania A. Aboalela, Javed I. Khan

Abstract:

This research presents a learning assessment theory of Cognitive Skill in Concept Space (CS2) to measure the assessed knowledge in terms of cognitive skill levels of the concepts. The cognitive skill levels refer to levels such as if a student has acquired the state at the level of understanding, or applying, or analyzing, etc. The theory is comprised of three constructions: Graph paradigm of a semantic/ ontological scheme, the concept states of the theory and the assessment analytics which is the process to estimate the sets of concept state at a certain skill level. Concept state means if a student has already learned, or is ready to learn, or is not ready to learn a certain skill level. The experiment is conducted to prove the validation of the theory CS2.

Keywords: cognitive skill levels, concept states, concept space, knowledge assessment theory

Procedia PDF Downloads 323
16497 Optimizing Network Latency with Fast Path Assignment for Incoming Flows

Authors: Qing Lyu, Hang Zhu

Abstract:

Various flows in the network require to go through different types of middlebox. The improper placement of network middlebox and path assignment for flows could greatly increase the network latency and also decrease the performance of network. Minimizing the total end to end latency of all the ows requires to assign path for the incoming flows. In this paper, the flow path assignment problem in regard to the placement of various kinds of middlebox is studied. The flow path assignment problem is formulated to a linear programming problem, which is very time consuming. On the other hand, a naive greedy algorithm is studied. Which is very fast but causes much more latency than the linear programming algorithm. At last, the paper presents a heuristic algorithm named FPA, which takes bottleneck link information and estimated bandwidth occupancy into consideration, and achieves near optimal latency in much less time. Evaluation results validate the effectiveness of the proposed algorithm.

Keywords: flow path, latency, middlebox, network

Procedia PDF Downloads 207
16496 The Social Justice of Movement: Undocumented Immigrant Coalitions in the United States

Authors: Libia Jiménez Chávez

Abstract:

This is a study of freedom riders and their courageous journey for civil rights, but the year was not 1961. It was 2003. This paper chronicles the emergence of a new civil rights movement for immigrant rights through an oral history of the 2003 U.S. Immigrant Workers Freedom Ride (IWFR). During the height of the post-9/11 immigrant repression, a bloc of organizations inspired by the Civil Rights Movement of the 1960s mobilized 900 multinational immigrants and their allies in the fight for legal status, labor protections, family reunification, and civil rights. The activists visited over 100 U.S. cities, met with Congressional leaders in the nation’s capital, and led a rally of over 50,000 people in New York City. This unified effort set the groundwork for the national May Day immigration protests of 2006. Movements can be characterized in two distinct ways: physical movement and social movements. In the past, historians have considered immigrants both as people and as participants in social movements. In contrast, studies of recent migrants tend to say little about their involvement in immigrant political mobilizations. The dominant literature on immigration portrays immigrants as objects of exclusion, border enforcement, detention, and deportation instead of strategic political actors. This paper aims to change this perception. It considers the Freedom Riders both as immigrants who were literally on the move and as participants in a social movement. Through interviews with participants and archival video footage housed at the University of California Los Angeles, it is possible to study this mobile protest as a movement. This contemporary immigrant struggle is an opportunity to explore the makeup and development of a heterogenous immigrant coalition and consider the relationship between population movements and social justice. In addition to oral histories and archival research, the study will utilize social movement literature, U.S. immigration and labor history, and Undocumented Critical Theory to expand the historiography of immigrant social movements in America.

Keywords: civil rights, immigrant social movements, undocumented communities, undocumented critical theory

Procedia PDF Downloads 171
16495 Design of Local Interconnect Network Controller for Automotive Applications

Authors: Jong-Bae Lee, Seongsoo Lee

Abstract:

Local interconnect network (LIN) is a communication protocol that combines sensors, actuators, and processors to a functional module in automotive applications. In this paper, a LIN ver. 2.2A controller was designed in Verilog hardware description language (Verilog HDL) and implemented in field-programmable gate array (FPGA). Its operation was verified by making full-scale LIN network with the presented FPGA-implemented LIN controller, commercial LIN transceivers, and commercial processors. When described in Verilog HDL and synthesized in 0.18 μm technology, its gate size was about 2,300 gates.

Keywords: local interconnect network, controller, transceiver, processor

Procedia PDF Downloads 289
16494 Ultimate Shear Resistance of Plate Girders Part 2- Höglund Theory

Authors: Ahmed S. Elamary

Abstract:

Ultimate shear resistance (USR) of slender plate girders can be predicted theoretically using Cardiff theory or Hӧglund theory. This paper will be concerned with predicting the USR using Hӧglund theory and EC3. Two main factors can affect the USR, the panel width “b” and the web depth “d”, consequently, the panel aspect ratio (b/d) has to be identified by limits. In most of the previous study, there is no limit for panel aspect ratio indicated. In this paper theoretical analysis has been conducted to study the effect of (b/d) on the USR. The analysis based on ninety-six test results of steel plate girders subjected to shear executed and collected by others. New formula proposed to predict the percentage of the distance between the plastic hinges form in the flanges “c” to panel width “b”. Conservative limits of (c/b) have been suggested to get a consistent value of USR.

Keywords: ultimate shear resistance, plate girder, Hӧglund’s theory, EC3

Procedia PDF Downloads 412
16493 The Predictive Implication of Executive Function and Language in Theory of Mind Development in Preschool Age Children

Authors: Michael Luc Andre, Célia Maintenant

Abstract:

Theory of mind is a milestone in child development which allows children to understand that others could have different mental states than theirs. Understanding the developmental stages of theory of mind in children leaded researchers on two Connected research problems. In one hand, the link between executive function and theory of mind, and on the other hand, the relationship of theory of mind and syntax processing. These two lines of research involved a great literature, full of important results, despite certain level of disagreement between researchers. For a long time, these two research perspectives continue to grow up separately despite research conclusion suggesting that the three variables should implicate same developmental period. Indeed, our goal was to study the relation between theory of mind, executive function, and language via a unique research question. It supposed that between executive function and language, one of the two variables could play a critical role in the relationship between theory of mind and the other variable. Thus, 112 children aged between three and six years old were recruited for completing a receptive and an expressive vocabulary task, a syntax understanding task, a theory of mind task, and three executive function tasks (inhibition, cognitive flexibility and working memory). The results showed significant correlations between performance on theory of mind task and performance on executive function domain tasks, except for cognitive flexibility task. We also found significant correlations between success on theory of mind task and performance in all language tasks. Multiple regression analysis justified only syntax and general abilities of language as possible predictors of theory of mind performance in our preschool age children sample. The results were discussed in the perspective of a great role of language abilities in theory of mind development. We also discussed possible reasons that could explain the non-significance of executive domains in predicting theory of mind performance, and the meaning of our results for the literature.

Keywords: child development, executive function, general language, syntax, theory of mind

Procedia PDF Downloads 64
16492 Modelling Mode Choice Behaviour Using Cloud Theory

Authors: Leah Wright, Trevor Townsend

Abstract:

Mode choice models are crucial instruments in the analysis of travel behaviour. These models show the relationship between an individual’s choice of transportation mode for a given O-D pair and the individual’s socioeconomic characteristics such as household size and income level, age and/or gender, and the features of the transportation system. The most popular functional forms of these models are based on Utility-Based Choice Theory, which addresses the uncertainty in the decision-making process with the use of an error term. However, with the development of artificial intelligence, many researchers have started to take a different approach to travel demand modelling. In recent times, researchers have looked at using neural networks, fuzzy logic and rough set theory to develop improved mode choice formulas. The concept of cloud theory has recently been introduced to model decision-making under uncertainty. Unlike the previously mentioned theories, cloud theory recognises a relationship between randomness and fuzziness, two of the most common types of uncertainty. This research aims to investigate the use of cloud theory in mode choice models. This paper highlights the conceptual framework of the mode choice model using cloud theory. Merging decision-making under uncertainty and mode choice models is state of the art. The cloud theory model is expected to address the issues and concerns with the nested logit and improve the design of mode choice models and their use in travel demand.

Keywords: Cloud theory, decision-making, mode choice models, travel behaviour, uncertainty

Procedia PDF Downloads 388
16491 Mechanism for Network Security via Routing Protocols Estimated with Network Simulator 2 (NS-2)

Authors: Rashid Mahmood, Muhammad Sufyan, Nasir Ahmed

Abstract:

The MANETs have lessened transportation and decentralized network. There are numerous basis of routing protocols. We derived the MANETs protocol into three major categories like Reactive, Proactive and hybrid. In these protocols, we discussed only some protocols like Distance Sequenced Distance Vector (DSDV), Ad hoc on Demand Distance Vector (AODV) and Dynamic Source Routing (DSR). The AODV and DSR are both reactive type of protocols. On the other hand, DSDV is proactive type protocol here. We compare these routing protocols for network security estimated by network simulator (NS-2). In this dissertation some parameters discussed such as simulation time, packet size, number of node, packet delivery fraction, push time and speed etc. We will construct all these parameters on routing protocols under suitable conditions for network security measures.

Keywords: DSDV, AODV, DSR NS-2, PDF, push time

Procedia PDF Downloads 433
16490 Chinese Early Childhood Parenting Style as a Moderator of the Development of Social Competence Based on Mindreading

Authors: Arkadiusz Gut, Joanna Afek

Abstract:

The first issue that we discuss in this paper is a battery of research demonstrating that culture influences children’s performance in tasks testing their theory of mind, also known as mindreading. We devote special attention to research done within Chinese culture; namely, studies with children speaking Cantonese and Mandarin natively and growing up in an environment dominated by the Chinese model of informal home education. Our attention focuses on the differences in development and functioning of social abilities and competences between children from China and the West. Another matter we turn to is the description of the nature of Chinese early childhood education. We suggest that the differences between the Chinese model and that of the West reveal a set of modifiers responsible for the variation observed in empirical research on children’s theory of mind (mindreading). The modifiers we identify are the following: (1) early socialization – that is, the transformation of the child into a member of the family and society that set special value by the social and physical environment; (2) the Confucian model of education – that is, the Chinese alphabet and tradition that determine a certain way of education in China; (3) the authoritarian style of upbringing – that is, reinforcing conformism, discouraging voicing of private opinions, and respect for elders; (4) the modesty of children and protectiveness of parents – that is, obedience as a desired characteristic in the child, overprotectiveness of parents, especially mothers; and (5) gender differences – that is, different educational styles for girls and boys. In our study, we conduct a thorough meta-analysis of empirical data on the development of mindreading and ToM (children’s theory of mind), as well as a cultural analysis of early childhood education in China. We support our analyses with questionnaire and narrative studies conducted in China that use the ‘Children’s Social Understanding Scale’ questionnaire, conversations based on the so-called ‘Scenarios Presented to Parents’, and questions designed to measure the ‘my child and I’ relation. With our research we aim to identify the factors in early childhood education that serve as moderators explaining the nature of the development and functioning of social cognition based on mind reading in China. Additionally, our study provides a valuable insight for comparative research of social cognition between China and the West.

Keywords: early childhood education, China, mindreading, parenting

Procedia PDF Downloads 386
16489 Application the Queuing Theory in the Warehouse Optimization

Authors: Jaroslav Masek, Juraj Camaj, Eva Nedeliakova

Abstract:

The aim of optimization of store management is not only designing the situation of store management itself including its equipment, technology and operation. In optimization of store management we need to consider also synchronizing of technological, transport, store and service operations throughout the whole process of logistic chain in such a way that a natural flow of material from provider to consumer will be achieved the shortest possible way, in the shortest possible time in requested quality and quantity and with minimum costs. The paper deals with the application of the queuing theory for optimization of warehouse processes. The first part refers to common information about the problematic of warehousing and using mathematical methods for logistics chains optimization. The second part refers to preparing a model of a warehouse within queuing theory. The conclusion of the paper includes two examples of using queuing theory in praxis.

Keywords: queuing theory, logistics system, mathematical methods, warehouse optimization

Procedia PDF Downloads 593
16488 Scientific Development as Diffusion on a Social Network: An Empirical Case Study

Authors: Anna Keuchenius

Abstract:

Broadly speaking, scientific development is studied in either a qualitative manner with a focus on the behavior and interpretations of academics, such as the sociology of science and science studies or in a quantitative manner with a focus on the analysis of publications, such as scientometrics and bibliometrics. Both come with a different set of methodologies and few cross-references. This paper contributes to the bridging of this divide, by on the on hand approaching the process of scientific progress from a qualitative sociological angle and using on the other hand quantitative and computational techniques. As a case study, we analyze the diffusion of Granovetter's hypothesis from his 1973 paper 'On The Strength of Weak Ties.' A network is constructed of all scientists that have referenced this particular paper, with directed edges to all other researchers that are concurrently referenced with Granovetter's 1973 paper. Studying the structure and growth of this network over time, it is found that Granovetter's hypothesis is used by distinct communities of scientists, each with their own key-narrative into which the hypothesis is fit. The diffusion within the communities shares similarities with the diffusion of an innovation in which innovators, early adopters, and an early-late majority can clearly be distinguished. Furthermore, the network structure shows that each community is clustered around one or few hub scientists that are disproportionately often referenced and seem largely responsible for carrying the hypothesis into their scientific subfield. The larger implication of this case study is that the diffusion of scientific hypotheses and ideas are not the spreading of well-defined objects over a network. Rather, the diffusion is a process in which the object itself dynamically changes in concurrence with its spread. Therefore it is argued that the methodology presented in this paper has potential beyond the scientific domain, in the study of diffusion of other not well-defined objects, such as opinions, behavior, and ideas.

Keywords: diffusion of innovations, network analysis, scientific development, sociology of science

Procedia PDF Downloads 307
16487 Cooperative Game Theory and Small Hold Farming: Towards A Conceptual Model

Authors: Abel Kahuni

Abstract:

Cooperative game theory (CGT) postulates that groups of players are crucial units of the decision-making and impose cooperative behaviour. Accordingly, cooperative games are regarded as competition between coalitions of players, rather than between individual players. However, the basic supposition in CGT is that the cooperative is formed by all players. One of the emerging questions in CGT is how to develop cooperatives and fairly allocate the payoff. Cooperative Game Theory (CGT) may provide a framework and insights into the ways small holder farmers in rural resettlements may develop competitive advantage through marketing cooperatives. This conceptual paper proposes a non-competition model for small holder farmers of homogenous agri-commodity under CGT conditions. This paper will also provide brief insights into to the theory of cooperative games in-order to generate an understanding of CGT, cooperative marketing gains and its application in small holder farming arrangements. Accordingly, the objective is to provide a basic introduction to this theory in connection with economic competitive theories in the context of small holder farmers. The key value proposition of CGT is the equitable and fair sharing of cooperative gains.

Keywords: game theory, cooperative game theory, cooperatives, competition

Procedia PDF Downloads 77
16486 Internet-Based Architecture for Machine-to-Machine Communication of a Public Security Network

Authors: Ogwueleka Francisca Nonyelum, Jiya Muhammad

Abstract:

Poor communication between the victims of the burglaries, road and fire accidents and the agencies, and lack of quick emergency response by the agencies is solved through Machine-to-Machine (M2M) communication. A distress caller is expected to make a call through a network to the respective agency for emergency response but due to some challenges, this often becomes arduous and futile. This research puts forth an Internet-based architecture for Machine-to-Machine (M2M) communication to enhance information dissemination in National Public Security Communication System (NPSCS) network. M2M enables the flow of data between machines and machines and ultimately machines and people with information flowing from a machine over a network, and then through a gateway to a system where it is reviewed and acted on. The research findings showed that Internet-based architecture for M2M communication is most suitable for deployment of a public security network which will allow machines to use Internet to talk to each other.

Keywords: machine-to-machine (M2M), internet-based architecture, network, gateway

Procedia PDF Downloads 484
16485 Reflecting and Teaching on the Dialectical Nature of Social Work

Authors: Eli Buchbinder

Abstract:

Dialectics theory perceives two or more forces or themes as mutually opposed and negating on the one hand and as interdependent for their definition, existence, and resolution on the other. Such opposites might never be fully reconciled but might, simultaneously, continue to produce a higher level of integration and synthesis as well as tension, contradictions, and paradoxes. The identity of social work is constructed by poles; an understanding that emerges through key concepts that shape the profession. The key concept of person-in-environment creates dialectical tensions between the psychological versus the social pole. Important examples that reflect this focus on the psychological versus the social nature of human beings. This meta-perspective influences and constructs the implementation of values, ways of intervention, and professional relationships, e.g., creating a conflict between personal/social empowerment and social control and correction as the aims of the profession. Social work is dynamic and changing, with a unique way of perceiving and conceptualizing human behavior. Social workers must be able to face and accept the contradicting elements inherent in practicing social work. The basic philosophy for social work education is a dialectic conceptualization. In light of the above, social work students require dialectics as a critical mode of perception, reflection, and intervention. In the presentation, the focus will be on reflection on teaching students to conceptualize dialectics as a frame when training to be social workers. It is believed that the focus should emphasis two points: 1) the need to assist students to identify poles and to analyze the interrelationships created between them while coping emotionally with the tension and difficulties involved in containing these poles; 2) teaching students to integrate poles as a basis for assessment, planning, and intervention.

Keywords: professional ontology, a generic social work education, skills and values of social work, reflecting on social work teaching methods

Procedia PDF Downloads 85
16484 Multi-Dimension Threat Situation Assessment Based on Network Security Attributes

Authors: Yang Yu, Jian Wang, Jiqiang Liu, Lei Han, Xudong He, Shaohua Lv

Abstract:

As the increasing network attacks become more and more complex, network situation assessment based on log analysis cannot meet the requirements to ensure network security because of the low quality of logs and alerts. This paper addresses the lack of consideration of security attributes of hosts and attacks in the network. Identity and effectiveness of Distributed Denial of Service (DDoS) are hard to be proved in risk assessment based on alerts and flow matching. This paper proposes a multi-dimension threat situation assessment method based on network security attributes. First, the paper offers an improved Common Vulnerability Scoring System (CVSS) calculation, which includes confident risk, integrity risk, availability risk and a weighted risk. Second, the paper introduces deterioration rate of properties collected by sensors in hosts and network, which aimed at assessing the time and level of DDoS attacks. Third, the paper introduces distribution of asset value in security attributes considering features of attacks and network, which aimed at assessing and show the whole situation. Experiments demonstrate that the approach reflects effectiveness and level of DDoS attacks, and the result can show the primary threat in network and security requirement of network. Through comparison and analysis, the method reflects more in security requirement and security risk situation than traditional methods based on alert and flow analyzing.

Keywords: DDoS evaluation, improved CVSS, network security attribute, threat situation assessment

Procedia PDF Downloads 209