Search results for: applying principles of usage-centred
3586 Implications of Humanizing Pedagogy on Learning Design in a Technology-Enhanced Language Learning Environment: Critical Reflections on Student Identity and Agency
Authors: Mukhtar Raban
Abstract:
Nelson Mandela University subscribes to a humanizing pedagogy (HP), as housed under broader critical pedagogy, that underpins and informs learning and teaching activities at the institution. The investigation sought to explore the implications of humanizing and critical pedagogical considerations for a technology-enhanced language learning (TELL) environment in a university course. The paper inquires into the design of a learning resource in an online learning environment of an English communication module, that applied HP principles. With an objective of creating agentive spaces for foregrounding identity, student voice, critical self-reflection, and recognition of others’ humanity; a flexible and open 'My Presence' feature was added to the TELL environment that allowed students and lecturers to share elements of their backgrounds in a ‘mutually vulnerable’ manner as a way of establishing digital identity and a more ‘human’ presence in the online language learning encounter, serving as a catalyst for the recognition of the ‘other’. Following a qualitative research design, the study adopted an auto-ethnographic approach, complementing the critical inquiry nature embedded into the activity’s practices. The study’s findings provide critical reflections and deductions on the possibilities of leveraging digital human expression within a humanizing pedagogical framework to advance the realization of HP-adoption in language learning and teaching encounters. It was found that the consideration of humanizing pedagogical principles in the design of online learning was more effective when the critical outcomes were explicated to students and lecturers prior to the completion of the activities. The integration of humanizing pedagogy also led to a contextual advancement of ‘affective’ language learning. Upon critical reflection and analysis, student identity and agency can flourish in a technology-enhanced learning environment when humanizing, and critical pedagogy influences the learning design.Keywords: critical reflection, humanizing pedagogy, student identity, technology-enhanced language learning
Procedia PDF Downloads 1353585 Cognitive Methods for Detecting Deception During the Criminal Investigation Process
Authors: Laid Fekih
Abstract:
Background: It is difficult to detect lying, deception, and misrepresentation just by looking at verbal or non-verbal expression during the criminal investigation process, as there is a common belief that it is possible to tell whether a person is lying or telling the truth just by looking at the way they act or behave. The process of detecting lies and deception during the criminal investigation process needs more studies and research to overcome the difficulties facing the investigators. Method: The present study aimed to identify the effectiveness of cognitive methods and techniques in detecting deception during the criminal investigation. It adopted the quasi-experimental method and covered a sample of (20) defendants distributed randomly into two homogeneous groups, an experimental group of (10) defendants be subject to criminal investigation by applying cognitive techniques to detect deception and a second experimental group of (10) defendants be subject to the direct investigation method. The tool that used is a guided interview based on models of investigative questions according to the cognitive deception detection approach, which consists of three techniques of Vrij: imposing the cognitive burden, encouragement to provide more information, and ask unexpected questions, and the Direct Investigation Method. Results: Results revealed a significant difference between the two groups in term of lie detection accuracy in favour of defendants be subject to criminal investigation by applying cognitive techniques, the cognitive deception detection approach produced superior total accuracy rates both with human observers and through an analysis of objective criteria. The cognitive deception detection approach produced superior accuracy results in truth detection: 71%, deception detection: 70% compared to a direct investigation method truth detection: 52%; deception detection: 49%. Conclusion: The study recommended if practitioners use a cognitive deception detection technique, they will correctly classify more individuals than when they use a direct investigation method.Keywords: the cognitive lie detection approach, deception, criminal investigation, mental health
Procedia PDF Downloads 663584 Applying Wavelet Transform to Ferroresonance Detection and Protection
Authors: Chun-Wei Huang, Jyh-Cherng Gu, Ming-Ta Yang
Abstract:
Non-synchronous breakage or line failure in power systems with light or no loads can lead to core saturation in transformers or potential transformers. This can cause component and capacitance matching resulting in the formation of resonant circuits, which trigger ferroresonance. This study employed a wavelet transform for the detection of ferroresonance. Simulation results demonstrate the efficacy of the proposed method.Keywords: ferroresonance, wavelet transform, intelligent electronic device, transformer
Procedia PDF Downloads 4963583 The Digitalization of Occupational Health and Safety Training: A Fourth Industrial Revolution Perspective
Authors: Deonie Botha
Abstract:
Digital transformation and the digitization of occupational health and safety training have grown exponentially due to a variety of contributing factors. The literature suggests that digitalization has numerous benefits but also has associated challenges. The aim of the paper is to develop an understanding of both the perceived benefits and challenges of digitalization in an occupational health and safety context in an effort to design and develop e-learning interventions that will optimize the benefits of digitalization and address the associated challenges. The paper proposes, deliberate and tests the design principles of an e-learning intervention to ensure alignment with the requirements of a digitally transformed environment. The results of the research are based on a literature review regarding the requirements and effect of the Fourth Industrial Revolution on learning and e-learning in particular. The findings of the literature review are enhanced with empirical research in the form of a case study conducted in an organization that designs and develops e-learning content in the occupational health and safety industry. The primary findings of the research indicated that: (i) The requirements of learners and organizations in respect of e-learning are different than previously (i.e., a pre-Fourth Industrial Revolution related work setting). (ii) The design principles of an e-learning intervention need to be aligned with the entire value chain of the organization. (iii) Digital twins support and enhance the design and development of e-learning. (iv)Learning should incorporate a multitude of sensory experiences and should not only be based on visual stimulation. (v) Data that are generated as a result of e-learning interventions should be incorporated into big data streams to be analyzed and to become actionable. It is therefore concluded that there is general consensus on the requirements that e-learning interventions need to adhere to in a digitally transformed occupational health and safety work environment. The challenge remains for organizations to incorporate data generated as a result of e-learning interventions into the digital ecosystem of the organization.Keywords: digitalization, training, fourth industrial revolution, big data
Procedia PDF Downloads 1563582 Effects of Duct Geometry, Thickness and Types of Liners on Transmission Loss for Absorptive Silencers
Abstract:
Sound attenuation in absorptive silencers has been analyzed in this paper. The structure of such devices is as follows. When the rigid duct of an expansion chamber has been lined by a packed absorptive material under a perforated membrane, incident sound waves will be dissipated by the absorptive liners. This kind of silencer, usually are applicable for medium to high frequency ranges. Several conditions for different absorptive materials, variety in their thicknesses, and different shapes of the expansion chambers have been studied in this paper. Also, graphs of sound attenuation have been compared between empty expansion chamber and duct of silencer with applying liner. Plane waves have been assumed in inlet and outlet regions of the silencer. Presented results that have been achieved by applying finite element method (FEM), have shown the dependence of the sound attenuation spectrum to flow resistivity and the thicknesses of the absorptive materials, and geometries of the cross section (configuration of the silencer). As flow resistivity and thickness of absorptive materials increase, sound attenuation improves. In this paper, diagrams of the transmission loss (TL) for absorptive silencers in five different cross sections (rectangle, circle, ellipse, square, and rounded rectangle as the main geometry) have been presented. Also, TL graphs for silencers using different absorptive material (glass wool, wood fiber, and kind of spongy materials) as liner with three different thicknesses of 5 mm, 15 mm, and 30 mm for glass wool liner have been exhibited. At first, the effect of substances of the absorptive materials with the specific flow resistivity and densities on the TL spectrum, then the effect of the thicknesses of the glass wool, and at last the efficacy of the shape of the cross section of the silencer have been investigated.Keywords: transmission loss, absorptive material, flow resistivity, thickness, frequency
Procedia PDF Downloads 2503581 A Theory-Based Analysis on Implications of Democracy in Cambodia
Authors: Puthsodary Tat
Abstract:
Democracy has been categorially accepted and used as foreign and domestic policy agendas for the hope of peace, economic growth and prosperity for more than 25 years in Cambodia. However, the country is now in the grip of dictatorship, human rights violations, and prospective economic sanctions. This paper examines different perceptions and experiences of democratic assistance. In this study, the author employs discourse theory, idealism and realism as a theory-based methodology for debating and assessing the implications of democratization. Discourse theory is used to establish a platform for understanding discursive formations, body of knowledge and the games of truth of democracy. Idealist approaches give rational arguments for adopting key tenets that work well on the ground. In contrast, realism allows for some sweeping critiques of utopian ideal and offers particular views on why Western hegemonic missions do not work well. From idealist views, the research finds that Cambodian people still believe that democracy is a prima facie universality for peace, growth and prosperity. From realism, democratization is on the brink of death in three reasons. Firstly, there are tensions between Western and local discourses about democratic values and norms. Secondly, democratic tenets have been undermined by the ruling party-controlled courts, corruption, structural oppression and political patronage-based institutions. The third pitfall is partly associated with foreign aid dependency and geopolitical power struggles in the region. Finally, the study offers a precise mosaic of democratic principles that may be used to avoid a future geopolitical and economic crisis.Keywords: corruption, democracy, democratic principles, discourse theory, discursive formations, foreign aid dependency, games of truth, geopolitical and economic crisis, geopolitical power struggle, hegemonic mission, idealism, realism, utopian ideal
Procedia PDF Downloads 2003580 Investigating the Morphological Patterns of Lip Prints and Their Effectiveness in Individualization and Gender Determination in Pakistani Population
Authors: Makhdoom Saad Wasim Ghouri, Muneeba Butt, Mohammad Ashraf Tahir, Rashid Bhatti, Akbar Ali, Abdul Rehman, Abdul Basit, Muzzamel Rehman, Shahbaz Aslam, Farakh Mansoor, Ahmad Fayyaz, Hadia Siddiqui
Abstract:
Lip print analysis (Cheiloscopy) is the new emerging technique that might be the guardian angel in establishing the personal identity. Cheiloscopy is basically the study of elevations and depressions present on the external surface of the lips. In our study, 600 lip prints samples were taken (300 males and 300 females). Lip prints of each individual were divided into four quadrants and the upper middle portion. For general classification, middle part of the lower lip almost 10 mm wide would be taken into consideration. After analysis of lip-prints, our results show that lip prints are the unique and permanent character of every individual. No two lip print was matched with each other even of the identical twins. Our study reveals that there is equal distribution of lip print patterns among all the four quadrants of lips and the upper middle portion; these distributions were statistically analyzed by applying chi-square test which shows the significant results. In general classification, 5 lip print types/patterns were studied, Type 1 (Vertical lines), Type 2 (Branched pattern), Type 3 (Intersected pattern), Type 4 (Reticular pattern) and Type 5 (Undetermined). Type 1 and Type 2 were found to be the most frequent patterns in female population, while Type 3 and Type 4 most commonly found in male population. These results were also analyzed by applying Chi-square test, and the results show significance statistically. Thus, establishing sex determination on the basis of lip print types among the gender. Type 5 was the least common pattern among genders.Keywords: cheiloscopy, distribution, quadrants, sex determination
Procedia PDF Downloads 2973579 Death Penalty and Life in Prison Penalty as Violations of the Principles of Human Dignity and Rehabilitation
Authors: Maria Elisabete da Costa Ferreira
Abstract:
Violent crimes, such as terrorism, organized crime and homicides, are increasing all around the World. This fact calls for the necessity to reflect upon the effectiveness of the deterrence offered by the criminal sanctions set today. The severity of the penalties depends on the social, cultural and even religious background of the State in question. In some States, such as Portugal, the common citizen finds the sentences too soft on the perpetrator and too long to be obtained. On the other hand, in 2023, several States still apply the death penalty, among which the USA, China, and most Middle Eastern countries. As for life in prison without the possibility of parole, the number of countries accepting this possibility in their criminal law is much higher, including England and Wales, the Netherlands, Moldova, Bulgaria, Italy, Ukraine, Poland, Turkey, Russia, and Serbia. This research aims to demonstrate that both the death penalty and life in prison penalty violate the principles of human dignity and social rehabilitation of the perpetrator and propose alternative penalties that can effectively protect society from crime. The research utilizes three main methodologies: the historical method, the comparative method, and the critical method. The historical method is employed to investigate the evolution of criminal penalties over time. The comparative method is used to compare the practices of different states regarding the death penalty and life in prison penalty. Finally, the critical method is applied to analyze and evaluate the shortcomings of these penalties. From a theoretical point of view, there have been drawn several theories throughout the years to support the idea that perpetrators of crimes should be punished. Today, one of the most commonly accepted theories sustains that the penalty will only be legitimate when necessary to protect society from the perpetrator and to rehabilitate him into society. Foremost, the choice of the penalty and the form of its execution should be guided by the principle of human dignity. The death penalty and life in prison penalty fail to achieve the goal of rehabilitation and disregard the human dignity principle. The right to life is a fundamental right declared in the Universal Declaration of Human Rights and stated in most Constitutions in the World. In conclusion, the research demonstrates that the death penalty and life in prison penalty are in violation of the principles of human dignity and social rehabilitation. These penalties fail to achieve their intended goals and disregard fundamental human rights. Although it may sound tempting to some States to rethink the current system of instated penalties to the admission of these penalties, it is imperative to take the inverse road because the protection of society must be achieved with respect to the perpetrator's fundamental rights, so, alternative penalties must be enforced. Society's belief in its citizen's ability to change must be reinforced, and, ultimately, the belief in Humankind. The findings of this research contribute to the discussion on the use of these penalties and aim to contribute to their decreasing usage in society.Keywords: death penalty, life in prison penalty, human dignity, rehabilitation
Procedia PDF Downloads 663578 Visualization of Taiwan's Religious Social Networking Sites
Authors: Jia-Jane Shuai
Abstract:
Purpose of this research aims to improve understanding of the nature of online religion by examining the religious social websites. What motivates individual users to use the online religious social websites, and which factors affect those motivations. We survey various online religious social websites provided by different religions, especially the Taiwanese folk religion. Based on the theory of the Content Analysis and Social Network Analysis, religious social websites and religious web activities are examined. This research examined the folk religion websites’ presentation and contents that promote the religious use of the Internet in Taiwan. The difference among different religions and religious websites also be compared. First, this study used keywords to examine what types of messages gained the most clicks of “Like”, “Share” and comments on Facebook. Dividing the messages into four media types, namely, text, link, video, and photo, reveal which category receive more likes and comments than the others. Meanwhile, this study analyzed the five dialogic principles of religious websites accessed from mobile phones and also assessed their mobile readiness. Using the five principles of dialogic theory as a basis, do a general survey on the websites with elements of online religion. Second, the project analyzed the characteristics of Taiwanese participants for online religious activities. Grounded by social network analysis and text mining, this study comparatively explores the network structure, interaction pattern, and geographic distribution of users involved in communication networks of the folk religion in social websites and mobile sites. We studied the linkage preference of different religious groups. The difference among different religions and religious websites also be compared. We examined the reasons for the success of these websites, as well as reasons why young users accept new religious media. The outcome of the research will be useful for online religious service providers and non-profit organizations to manage social websites and internet marketing.Keywords: content analysis, online religion, social network analysis, social websites
Procedia PDF Downloads 1673577 New Stratigraphy Profile of Classic Nihewan Basin Beds, Hebei, Northern China
Authors: Arya Farjand
Abstract:
The Nihewan Basin is a critical region in order to understand the Plio-Pleistocene paleoenvironment and its fauna in Northern China. The rich fossiliferous, fluvial-lacustrine sediments around the Nihewan Village hosted the specimens known as the Classic Nihewan Fauna. The primary excavations in the early 1920-30s produced more than 2000 specimens housed in Tianjin and Paris Museum. Nevertheless, the exact locality of excavations, fossil beds, and the reliable ages remained ambiguous until recent paleomagnetic studies and extensive work in conjunction sites. In this study, for the first time, we successfully relocated some of the original excavation sites. We reexamined more than 1500 specimens held in Tianjin Museum and cited their locality numbers and properties. During the field-season of 2017-2019, we visited the Xiashagou Valley. By reading the descriptions of the original site, utilization of satellite pictures, and comparing them with the current geomorphology of the area, we ensured the exact location of 26 of these sites and 17 fossil layers. Furthermore, by applying the latest technologies, such as GPS, Compass, digital barometers, laser measurer, and Abney level, we ensured the accuracy of the measurement. We surveyed 133-meter thickness of the deposits. Ultimately by applying the available Paleomagnetic data for this section, we estimated the ages of different horizons. The combination of our new data and previously published researches present a unique age control for the Classic Nihewan Fauna. These findings prove the hypothesis in which the Classic Nihewan Fauna belongs to different horizons, ranging from before Reunion up to after Olduvai earth geomagnetic field excursion (2.2-1.7 Mya).Keywords: classic Nihewan basin fauna, Olduvai excursion, Pleistocene, stratigraphy
Procedia PDF Downloads 1413576 A Rule Adumbrated: Bailment on Terms
Authors: David Gibbs-Kneller
Abstract:
Only parties to a contract can enforce it. This is the privity of the contract. Carriage contracts frequently involve intermediated relationships. While the carrier and cargo-owner will agree on a contract for carriage, there is no privity or consideration between the cargo-owner and third parties. To overcome this, the contract utilizes ‘bailment on terms’ or the rule in Morris. Morris v C W Martin & Sons Ltd is authority for the following: A sub-bailee and bailor may rely on terms of a bailment where the bailor has consented to sub-bailment “on terms”. Bailment on terms can play a significant part in making litigation decisions and determining liability. It is used in standard form contracts and courts have also strived to find consent to bailment on terms in agreements so as to avoid the consequences of privity of contract. However, what this paper exposes is the false legal basis for this model. Lord Denning gave an account adumbrated of the law of bailments to justify the rule in Morris. What Lord Denning was really doing was objecting to the doctrine of privity. To do so, he wrongly asserted there was a lacuna in law that meant third parties could not avail themselves upon terms of a contract. Next, he provided a false analogy between purely contractual rights and possessory liens. Finally, he gave accounts of authorities to say they supported the rule in Morris when they did not. Surprisingly, subsequent case law on the point has not properly engaged with this reasoning. The Pioneer Container held that since the rule in Morris lay in bailments, the decision is not dependent on the doctrine of privity. Yet the basis for this statement was Morris. Once these reasons have been discounted, all bailment on terms rests on is the claim that the law of bailments is an independent source of law. Bailment on terms should not be retained, for it is contrary to established principles in the law of property, tort, and contract. That undermines the certainty of those principles by risking their collapse because there is nothing that keeps bailment on terms within the confines of bailments only. As such, bailment on terms is not good law and should not be used in standard form contracts or by the courts as a means of determining liability. If bailment on terms is a pragmatic rule to retain, it is recommended that rules governing carriage contracts should be amended.Keywords: bailment, carriage of goods, contract law, privity
Procedia PDF Downloads 2053575 Decomposition of the Discount Function Into Impatience and Uncertainty Aversion. How Neurofinance Can Help to Understand Behavioral Anomalies
Authors: Roberta Martino, Viviana Ventre
Abstract:
Intertemporal choices are choices under conditions of uncertainty in which the consequences are distributed over time. The Discounted Utility Model is the essential reference for describing the individual in the context of intertemporal choice. The model is based on the idea that the individual selects the alternative with the highest utility, which is calculated by multiplying the cardinal utility of the outcome, as if the reception were instantaneous, by the discount function that determines a decrease in the utility value according to how the actual reception of the outcome is far away from the moment the choice is made. Initially, the discount function was assumed to have an exponential trend, whose decrease over time is constant, in line with a profile of a rational investor described by classical economics. Instead, empirical evidence called for the formulation of alternative, hyperbolic models that better represented the actual actions of the investor. Attitudes that do not comply with the principles of classical rationality are termed anomalous, i.e., difficult to rationalize and describe through normative models. The development of behavioral finance, which describes investor behavior through cognitive psychology, has shown that deviations from rationality are due to the limited rationality condition of human beings. What this means is that when a choice is made in a very difficult and information-rich environment, the brain does a compromise job between the cognitive effort required and the selection of an alternative. Moreover, the evaluation and selection phase of the alternative, the collection and processing of information, are dynamics conditioned by systematic distortions of the decision-making process that are the behavioral biases involving the individual's emotional and cognitive system. In this paper we present an original decomposition of the discount function to investigate the psychological principles of hyperbolic discounting. It is possible to decompose the curve into two components: the first component is responsible for the smaller decrease in the outcome as time increases and is related to the individual's impatience; the second component relates to the change in the direction of the tangent vector to the curve and indicates how much the individual perceives the indeterminacy of the future indicating his or her aversion to uncertainty. This decomposition allows interesting conclusions to be drawn with respect to the concept of impatience and the emotional drives involved in decision-making. The contribution that neuroscience can make to decision theory and inter-temporal choice theory is vast as it would allow the description of the decision-making process as the relationship between the individual's emotional and cognitive factors. Neurofinance is a discipline that uses a multidisciplinary approach to investigate how the brain influences decision-making. Indeed, considering that the decision-making process is linked to the activity of the prefrontal cortex and amygdala, neurofinance can help determine the extent to which abnormal attitudes respect the principles of rationality.Keywords: impatience, intertemporal choice, neurofinance, rationality, uncertainty
Procedia PDF Downloads 1293574 Contact Phenomena in Medieval Business Texts
Authors: Carmela Perta
Abstract:
Among the studies flourished in the field of historical sociolinguistics, mainly in the strand devoted to English history, during its Medieval and early modern phases, multilingual texts had been analysed using theories and models coming from contact linguistics, thus applying synchronic models and approaches to the past. This is true also in the case of contact phenomena which would transcend the writing level involving the language systems implicated in contact processes to the point of perceiving a new variety. This is the case for medieval administrative-commercial texts in which, according to some Scholars, the degree of fusion of Anglo-Norman, Latin and middle English is so high a mixed code emerges, and there are recurrent patterns of mixed forms. Interesting is a collection of multilingual business writings by John Balmayn, an Englishman overseeing a large shipment in Tuscany, namely the Cantelowe accounts. These documents display various analogies with multilingual texts written in England in the same period; in fact, the writer seems to make use of the above-mentioned patterns, with Middle English, Latin, Anglo-Norman, and the newly added Italian. Applying an atomistic yet dynamic approach to the study of contact phenomena, we will investigate these documents, trying to explore the nature of the switching forms they contain from an intra-writer variation perspective. After analysing the accounts and the type of multilingualism in them, we will take stock of the assumed mixed code nature, comparing the characteristics found in this genre with modern assumptions. The aim is to evaluate the possibility to consider the switching forms as core elements of a mixed code, used as professional variety among merchant communities, or whether such texts should be analysed from a switching perspective.Keywords: historical sociolinguistics, historical code switching, letters, medieval england
Procedia PDF Downloads 753573 Credit Cooperatives: A Factor for Improving the Sustainable Management of Private Forests
Authors: Todor Nickolov Stoyanov
Abstract:
Cooperatives are present in all countries and in almost all sectors, including agriculture, forestry, food, finance, health, marketing, insurance and credit. Strong cooperatives are able to overcome many of the difficulties faced by private owners. Cooperatives use seven principles, including the 'Community Concern" principle, which enables cooperatives to work for the sustainable development of the community. The members of cooperatives may use different systems for generating year-round employment and for receiving sustainable income through performing different forestry activities. Various methods are used during the preparation of the report. These include literature reviews, statistics, secondary data and expert interviews. The members of the cooperatives are benefits exclusively from increasing the efficiency of the various products and from the overall yield of the harvest, and ultimately from achieving better profit through cooperative efforts. Cooperatives also use other types of activities that are an additional opportunity for cooperative income. There are many heterogeneous activities in the production and service sectors of the forest cooperatives under consideration. Some cooperatives serve dairies, distilleries, woodworking enterprises, tourist homes, hotels and motels, shops, ski slopes, sheep breeding, etc. Through the revenue generated by the activity, cooperatives have the opportunity to carry out various environmental and protective activities - recreation, water protection, protection of endangered and endemic species, etc., which in the case of small-scale forests cannot be achieved and the management is not sustainable. The conclusions indicate the results received in the analysis. Cooperative management of forests and forest lands gives higher incomes to individual owners. The management of forests and forest lands through cooperatives helps to carry out different environmental and protective activities. Cooperative forest management provides additional means of subsistence to the owners of poor forest lands. Cooperative management of forests and forest lands support owners to implement the forest management plans and to apply sustainable management of these territories.Keywords: cooperative, forestry, forest owners, principles of cooperation
Procedia PDF Downloads 2423572 Legal Theories Underpinning Access to Justice for Victims of Sexual Violence in Refugee Camps in Africa
Authors: O. E. Eberechi, G. P. Stevens
Abstract:
Legal theory has been referred to as the explanation of why things do or do not happen. It also describes situations and why they ensue. It provides a normative framework by which things are regulated and a foundation for the establishment of legal mechanisms/institutions that can bring about a desired change in a society. Furthermore, it offers recommendations in resolving practical problems and describes what the law is, what the law ought to be and defines the legal landscape generally. Some legal theories provide a universal standard, e.g. human rights, while others are capable of organizing and streamlining the collective use, and, by extension, bring order to society. Legal theory is used to explain how the world works and how it does not work. This paper will argue for the application of the principles of legal theory in the achievement of access to justice for female victims of sexual violence in refugee camps in Africa through the analysis of legal theories underpinning the access to justice for these women. It is a known fact that female refugees in camps in Africa often experience some form of sexual violation. The perpetrators of these incidents may never be apprehended, prosecuted, convicted or sentenced. Where prosecution does occur, the perpetrators are either acquitted as a result of poor investigation, inept prosecution, a lack of evidence, or the case may be dismissed owing to tardiness on the part of the prosecutor, which accounts for the culture of impunity in refugee camps. In other words, victims do not have access to the justice that could ameliorate the plight of the victims. There is, thus, a need for a legal framework that will facilitate access to justice for these victims. This paper will start with an introduction, and be followed by the definition of legal theory, its functions and its application in law. Secondly, it will provide a brief explanation of the problems faced by female refugees who are victims of sexual violence in refugee camps in Africa. Thirdly, it will embark on an analysis of theories which will be a help to an understanding of the precarious situation of female refugees, why they are violated, the need for access to justice for these victims, and the principles of legal theory in its usefulness in resolving access to justice for these victims.Keywords: access to justice, underpinning legal theory, refugee, sexual violence
Procedia PDF Downloads 4293571 Procedure to Optimize the Performance of Chemical Laser Using the Genetic Algorithm Optimizations
Authors: Mohammedi Ferhate
Abstract:
This work presents details of the study of the entire flow inside the facility where the exothermic chemical reaction process in the chemical laser cavity is analyzed. In our paper we will describe the principles of chemical lasers where flow reversal is produced by chemical reactions. We explain the device for converting chemical potential energy laser energy. We see that the phenomenon thus has an explosive trend. Finally, the feasibility and effectiveness of the proposed method is demonstrated by computer simulationKeywords: genetic, lasers, nozzle, programming
Procedia PDF Downloads 943570 Mobile Application Interventions in Positive Psychology: Current Status and Recommendations for Effective App Design
Authors: Gus Salazar, Jeremy Bekker, Lauren Linford, Jared Warren
Abstract:
Positive psychology practices allow for its principles to be applied to all people, regardless of their current level of functioning. To increase the dissemination of these practices, interventions are being adapted for use with digital technology, such as mobile apps. However, the research regarding positive psychology mobile app interventions is still in its infancy. In an effort to facilitate progress in this important area, we 1) conducted a qualitative review to summarize the current state of the positive psychology mobile app literature and 2) developed research-supported recommendations for positive psychology app development to maximize behavior change. In our literature review, we found that while positive psychology apps varied widely in content and purpose, there was a near-complete lack of research supporting their effectiveness. Most apps provided no rationale for the behavioral change techniques (BCTs) they employed in their app, and most did not develop their app with specific theoretical frameworks or design models in mind. Given this problem, we recommended four steps for effective positive psychology app design. First, developers must establish their app in a research-supported theory of change. Second, researchers must select appropriate behavioral change techniques which are consistent with their app’s goals. Third, researchers must leverage effective design principles. These steps will help mobile applications use data-driven methods for encouraging behavior change in their users. Lastly, we discuss directions for future research. In particular, researchers must investigate the effectiveness of various BCTs in positive psychology interventions. Although there is some research on this point, we do not yet clearly understand the mechanisms within the apps that lead to behavior change. Additionally, app developers must also provide data on the effectiveness of their mobile apps. As developers follow these steps for effective app development and as researchers continue to investigate what makes these apps most effective, we will provide millions of people in need with access to research-based mental health resources.Keywords: behavioral change techniques, mobile app, mobile intervention, positive psychology
Procedia PDF Downloads 2243569 Experimental Studies of Sigma Thin-Walled Beams Strengthen by CFRP Tapes
Authors: Katarzyna Rzeszut, Ilona Szewczak
Abstract:
The review of selected methods of strengthening of steel structures with carbon fiber reinforced polymer (CFRP) tapes and the analysis of influence of composite materials on the steel thin-walled elements are performed in this paper. The study is also focused to the problem of applying fast and effective strengthening methods of the steel structures made of thin-walled profiles. It is worth noting that the issue of strengthening the thin-walled structures is a very complex, due to inability to perform welded joints in this type of elements and the limited ability to applying mechanical fasteners. Moreover, structures made of thin-walled cross-section demonstrate a high sensitivity to imperfections and tendency to interactive buckling, which may substantially contribute to the reduction of critical load capacity. Due to the lack of commonly used and recognized modern methods of strengthening of thin-walled steel structures, authors performed the experimental studies of thin-walled sigma profiles strengthened with CFRP tapes. The paper presents the experimental stand and the preliminary results of laboratory test concerning the analysis of the effectiveness of the strengthening steel beams made of thin-walled sigma profiles with CFRP tapes. The study includes six beams made of the cold-rolled sigma profiles with height of 140 mm, wall thickness of 2.5 mm, and a length of 3 m, subjected to the uniformly distributed load. Four beams have been strengthened with carbon fiber tape Sika CarboDur S, while the other two were tested without strengthening to obtain reference results. Based on the obtained results, the evaluation of the accuracy of applied composite materials for strengthening of thin-walled structures was performed.Keywords: CFRP tapes, sigma profiles, steel thin-walled structures, strengthening
Procedia PDF Downloads 3023568 Neural Reshaping: The Plasticity of Human Brain and Artificial Intelligence in the Learning Process
Authors: Seyed-Ali Sadegh-Zadeh, Mahboobe Bahrami, Sahar Ahmadi, Seyed-Yaser Mousavi, Hamed Atashbar, Amir M. Hajiyavand
Abstract:
This paper presents an investigation into the concept of neural reshaping, which is crucial for achieving strong artificial intelligence through the development of AI algorithms with very high plasticity. By examining the plasticity of both human and artificial neural networks, the study uncovers groundbreaking insights into how these systems adapt to new experiences and situations, ultimately highlighting the potential for creating advanced AI systems that closely mimic human intelligence. The uniqueness of this paper lies in its comprehensive analysis of the neural reshaping process in both human and artificial intelligence systems. This comparative approach enables a deeper understanding of the fundamental principles of neural plasticity, thus shedding light on the limitations and untapped potential of both human and AI learning capabilities. By emphasizing the importance of neural reshaping in the quest for strong AI, the study underscores the need for developing AI algorithms with exceptional adaptability and plasticity. The paper's findings have significant implications for the future of AI research and development. By identifying the core principles of neural reshaping, this research can guide the design of next-generation AI technologies that can enhance human and artificial intelligence alike. These advancements will be instrumental in creating a new era of AI systems with unparalleled capabilities, paving the way for improved decision-making, problem-solving, and overall cognitive performance. In conclusion, this paper makes a substantial contribution by investigating the concept of neural reshaping and its importance for achieving strong AI. Through its in-depth exploration of neural plasticity in both human and artificial neural networks, the study unveils vital insights that can inform the development of innovative AI technologies with high adaptability and potential for enhancing human and AI capabilities alike.Keywords: neural plasticity, brain adaptation, artificial intelligence, learning, cognitive reshaping
Procedia PDF Downloads 523567 Impact of Work Cycles on Autonomous Digital Learning
Authors: Bi̇rsen Tutunis, Zuhal Aydin
Abstract:
Guided digital learning has attracted many researchers as it leads to autonomous learning.The developments in Guided digital learning have led to changes in teaching and learning in English Language Teaching classes (Jeong-Bae, 2014). This study reports on tasks designed under the principles of learner autonomy in an online learning platform ‘’Webquest’’ with the purpose of teaching English to Turkish tertiary level students at a foundation university in Istanbul. Guided digital learning blog project contents were organized according to work-cycles phases (planning and negotiation phase, decision-making phase, project phase and evaluation phase) which are compatible with the principles of autonomous learning (Legenhausen,2003). The aim of the study was to implement the class blog project to find out its impact on students’ behaviours and beliefs towards autonomous learning. The mixed method research approach was taken. 24 tertiary level students participated in the study on voluntary basis. Data analysis was performed with Statistical Package for the Social Sciences. According to the results, students' attitudes towards digital learning did not differ before and after the training application. The learning styles of the students and their knowledge on digital learning scores differed. It has been observed that the students' learning styles and their digital learning scores increased after the training application. Autonomous beliefs, autonomous behaviors, group cohesion and group norms differed before and after the training application. Students' motivation level, strategies for learning English, perceptions of responsibility and out-of-class activity scores differed before and after the training application. It was seen that work-cycles in online classes create student centered learning that fosters autonomy. This paper will display the work cycles in detail and the researchers will give examples of in and beyond class activities and blog projects.Keywords: guided digital learning, work cycles, english language teaching, autonomous learning
Procedia PDF Downloads 783566 Linguistic Analysis of Holy Scriptures: A Comparative Study of Islamic Jurisprudence and the Western Hermeneutical Tradition
Authors: Sana Ammad
Abstract:
The tradition of linguistic analysis in Islam and Christianity has developed independently of each other in lieu of the social developments specific to their historical context. However, recently increasing number of Muslim academics educated in the West have tried to apply the Western tradition of linguistic interpretation to the Qur’anic text while completely disregarding the Islamic linguistic tradition used and developed by the traditional scholars over the centuries. The aim of the paper is to outline the linguistic tools and methods used by the traditional Islamic scholars for the purpose of interpretating the Holy Qur’an and shed light on how they contribute towards a better understanding of the text compared to their Western counterparts. This paper carries out a descriptive-comparative study of the linguistic tools developed and perfected by the traditional scholars in Islam for the purpose of textual analysis of the Qur’an as they have been described in the authentic works of Usul Al Fiqh (Jurisprudence) and the principles of textual analysis employed by the Western hermeneutical tradition for the study of the Bible. First, it briefly outlines the independent historical development of the two traditions emphasizing the final normative shape that they have taken. Then it draws a comparison of the two traditions highlighting the similarities and the differences existing between them. In the end, the paper demonstrates the level of academic excellence achieved by the traditional linguistic scholars in their efforts to develop appropriate tools of textual interpretation and how these tools are more suitable for interpreting the Qur’an compared to the Western principles. Since the aim of interpreters of both the traditions is to try and attain an objective understanding of the Scriptures, the emphasis of the paper shall be to highlight how well the Islamic method of linguistic interpretation contributes to an objective understanding of the Qur’anic text. The paper concludes with the following findings: The Western hermeneutical tradition of linguistic analysis developed within the Western historical context. However, the Islamic method of linguistic analysis is much more highly developed and complex and serves better the purpose of objective understanding of the Holy text.Keywords: Islamic jurisprudence, linguistic analysis, textual interpretation, western hermeneutics
Procedia PDF Downloads 3293565 Software Engineering Revolution Driven by Complexity Science
Abstract:
This paper introduces a new software engineering paradigm based on complexity science, called NSE (Nonlinear Software Engineering paradigm). The purpose of establishing NSE is to help software development organizations double their productivity, half their cost, and increase the quality of their products in several orders of magnitude simultaneously. NSE complies with the essential principles of complexity science. NSE brings revolutionary changes to almost all aspects in software engineering. NSE has been fully implemented with its support platform Panorama++.Keywords: complexity science, software development, software engineering, software maintenance
Procedia PDF Downloads 2653564 Data Mining Spatial: Unsupervised Classification of Geographic Data
Authors: Chahrazed Zouaoui
Abstract:
In recent years, the volume of geospatial information is increasing due to the evolution of communication technologies and information, this information is presented often by geographic information systems (GIS) and stored on of spatial databases (BDS). The classical data mining revealed a weakness in knowledge extraction at these enormous amounts of data due to the particularity of these spatial entities, which are characterized by the interdependence between them (1st law of geography). This gave rise to spatial data mining. Spatial data mining is a process of analyzing geographic data, which allows the extraction of knowledge and spatial relationships from geospatial data, including methods of this process we distinguish the monothematic and thematic, geo- Clustering is one of the main tasks of spatial data mining, which is registered in the part of the monothematic method. It includes geo-spatial entities similar in the same class and it affects more dissimilar to the different classes. In other words, maximize intra-class similarity and minimize inter similarity classes. Taking account of the particularity of geo-spatial data. Two approaches to geo-clustering exist, the dynamic processing of data involves applying algorithms designed for the direct treatment of spatial data, and the approach based on the spatial data pre-processing, which consists of applying clustering algorithms classic pre-processed data (by integration of spatial relationships). This approach (based on pre-treatment) is quite complex in different cases, so the search for approximate solutions involves the use of approximation algorithms, including the algorithms we are interested in dedicated approaches (clustering methods for partitioning and methods for density) and approaching bees (biomimetic approach), our study is proposed to design very significant to this problem, using different algorithms for automatically detecting geo-spatial neighborhood in order to implement the method of geo- clustering by pre-treatment, and the application of the bees algorithm to this problem for the first time in the field of geo-spatial.Keywords: mining, GIS, geo-clustering, neighborhood
Procedia PDF Downloads 3753563 On Constructing a Cubically Convergent Numerical Method for Multiple Roots
Authors: Young Hee Geum
Abstract:
We propose the numerical method defined by xn+1 = xn − λ[f(xn − μh(xn))/]f'(xn) , n ∈ N, and determine the control parameter λ and μ to converge cubically. In addition, we derive the asymptotic error constant. Applying this proposed scheme to various test functions, numerical results show a good agreement with the theory analyzed in this paper and are proven using Mathematica with its high-precision computability.Keywords: asymptotic error constant, iterative method, multiple root, root-finding
Procedia PDF Downloads 2203562 Investigation of Different Machine Learning Algorithms in Large-Scale Land Cover Mapping within the Google Earth Engine
Authors: Amin Naboureh, Ainong Li, Jinhu Bian, Guangbin Lei, Hamid Ebrahimy
Abstract:
Large-scale land cover mapping has become a new challenge in land change and remote sensing field because of involving a big volume of data. Moreover, selecting the right classification method, especially when there are different types of landscapes in the study area is quite difficult. This paper is an attempt to compare the performance of different machine learning (ML) algorithms for generating a land cover map of the China-Central Asia–West Asia Corridor that is considered as one of the main parts of the Belt and Road Initiative project (BRI). The cloud-based Google Earth Engine (GEE) platform was used for generating a land cover map for the study area from Landsat-8 images (2017) by applying three frequently used ML algorithms including random forest (RF), support vector machine (SVM), and artificial neural network (ANN). The selected ML algorithms (RF, SVM, and ANN) were trained and tested using reference data obtained from MODIS yearly land cover product and very high-resolution satellite images. The finding of the study illustrated that among three frequently used ML algorithms, RF with 91% overall accuracy had the best result in producing a land cover map for the China-Central Asia–West Asia Corridor whereas ANN showed the worst result with 85% overall accuracy. The great performance of the GEE in applying different ML algorithms and handling huge volume of remotely sensed data in the present study showed that it could also help the researchers to generate reliable long-term land cover change maps. The finding of this research has great importance for decision-makers and BRI’s authorities in strategic land use planning.Keywords: land cover, google earth engine, machine learning, remote sensing
Procedia PDF Downloads 1133561 Optimization of Titanium Leaching Process Using Experimental Design
Authors: Arash Rafiei, Carroll Moore
Abstract:
Leaching process as the first stage of hydrometallurgy is a multidisciplinary system including material properties, chemistry, reactor design, mechanics and fluid dynamics. Therefore, doing leaching system optimization by pure scientific methods need lots of times and expenses. In this work, a mixture of two titanium ores and one titanium slag are used for extracting titanium for leaching stage of TiO2 pigment production procedure. Optimum titanium extraction can be obtained from following strategies: i) Maximizing titanium extraction without selective digestion; and ii) Optimizing selective titanium extraction by balancing between maximum titanium extraction and minimum impurity digestion. The main difference between two strategies is due to process optimization framework. For the first strategy, the most important stage of production process is concerned as the main stage and rest of stages would be adopted with respect to the main stage. The second strategy optimizes performance of more than one stage at once. The second strategy has more technical complexity compared to the first one but it brings more economical and technical advantages for the leaching system. Obviously, each strategy has its own optimum operational zone that is not as same as the other one and the best operational zone is chosen due to complexity, economical and practical aspects of the leaching system. Experimental design has been carried out by using Taguchi method. The most important advantages of this methodology are involving different technical aspects of leaching process; minimizing the number of needed experiments as well as time and expense; and concerning the role of parameter interactions due to principles of multifactor-at-time optimization. Leaching tests have been done at batch scale on lab with appropriate control on temperature. The leaching tank geometry has been concerned as an important factor to provide comparable agitation conditions. Data analysis has been done by using reactor design and mass balancing principles. Finally, optimum zone for operational parameters are determined for each leaching strategy and discussed due to their economical and practical aspects.Keywords: titanium leaching, optimization, experimental design, performance analysis
Procedia PDF Downloads 3713560 Algae Growth and Biofilm Control by Ultrasonic Technology
Authors: Vojtech Stejskal, Hana Skalova, Petr Kvapil, George Hutchinson
Abstract:
Algae growth has been an important issue in water management of water plants, ponds and lakes, swimming pools, aquaculture & fish farms, gardens or golf courses for last decades. There are solutions based on chemical or biological principles. Apart of these traditional principles for inhibition of algae growth and biofilm production there are also physical methods which are very competitive compared to the traditional ones. Ultrasonic technology is one of these alternatives. Ultrasonic emitter is able to eliminate the biofilm which behaves as a host and attachment point for algae and is original reason for the algae growth. The ultrasound waves prevent majority of the bacteria in planktonic form becoming strongly attached sessile bacteria that creates welcoming layer for the biofilm production. Biofilm creation is very fast – in the serene water it takes between 30 minutes to 4 hours, depending on temperature and other parameters. Ultrasound device is not killing bacteria. Ultrasound waves are passing through bacteria, which retract as if they were in very turbulent water even though the water is visually completely serene. In these conditions, bacteria does not excrete the polysaccharide glue they use to attach to the surface of the pool or pond, where ultrasonic technology is used. Ultrasonic waves decrease the production of biofilm on the surfaces in the selected area. In case there are already at the start of the application of ultrasonic technology in a pond or basin clean inner surfaces, the biofilm production is almost absolutely inhibited. This paper talks about two different pilot applications – one in Czech Republic and second in United States of America, where the used ultrasonic technology (AlgaeControl) is coming from. On both sites, there was used Mezzo Ultrasonic Algae Control System with very positive results not only on biofilm production, but also algae growth in the surrounding area. Technology has been successfully tested in two different environments. The poster describes the differences and their influence on the efficiency of ultrasonic technology application. Conclusions and lessons learned can be possibly applied also on other sites within Europe or even further.Keywords: algae growth, biofilm production, ultrasonic solution, ultrasound
Procedia PDF Downloads 2673559 Increasing Sexual Safety Awareness and Capacity for Mental Health Professionals
Authors: Tara Hunter, Kristine Concepcion, Wendy Cheng, Brianna Pike, Jane Estoesta, Anne Stuart
Abstract:
In 2015, Family Planning NSW was contracted by the NSW Ministry of Health to design and deliver Sexual Safety Policy training (SSPT) to mental health professionals across NSW. The training was based on their current guidelines and developed in consultation with an expert reference group. From October 2015 to April 2017 it was delivered to over 2,400 mental health professionals with a view to supporting implementation of consistent prevention and intervention related to sexual safety in the mental health setting. An evaluation was undertaken to determine the knowledge and confidence of participants related to sexual safety before and after the training, and whether any improvements were translated into changes in practice. Participants were invited to complete a survey prior to the training, upon completion and three to six months thereafter. Telephone interviews were conducted among service managers and mental health champions six months post-training. Prior to training, the majority of mental health professionals reported being slightly to moderately confident in identifying a sexual safety incident. When asked on their understanding of sexual safety, gender sensitive practice and trauma informed care, they reported no confidence, slight confidence and moderate confidence. Immediately after the training, 54.5% reported being very confident and 10.9% extremely confident in identifying a sexual safety incident. More than half felt very confident or extremely confident in their understanding of sexual safety principles. The impact survey (six months later) found that the majority of participants (91%) were highly confident in identifying a sexual safety incident. Telephone interviewees reported a change in workplace culture and increased awareness after the training. Mental health professionals experienced increased knowledge and confidence about sexual safety principles following the training and were able to implement positive changes and concrete actions to better address sexual safety issues in their workplace.Keywords: sexual safety, mental health professionals, trauma informed care, policy training
Procedia PDF Downloads 3023558 International Peace and Security: a Study in the Light of the Provisions of the Charter of the United Nations
Authors: Djehich Mohamed Yousri
Abstract:
As a result of the destruction and devastation left by the two world wars, the international community worked to establish a global organization based on a contractual basis, in which the Security Council was entrusted with the task of working to maintain international peace and security, and to achieve this, the United Nations Charter assigned the latter a wide authority to adapt everything It would threaten international peace and security, although the examiner of the Charter of the United Nations does not find the slightest definition of the concept of international peace and security, although these two principles are among the basic principles that the Charter stipulated the necessity of achieving, and perhaps this was also what was in the opposite case for them. And by that, we mean cases of a threat to peace, a breach of it, or an act of aggression. These terms were not dealt with in the Charter in explanation and detail, leaving ample room for the Security Council to assess each of these cases separately, and perhaps this is due to the fact that the framers of the Charter intended to set a flexible standard. It does not restrict the authority of the Security Council to carry out the adjustment process on the one hand and, on the other hand, to allow and enable the Security Council to keep pace with new developments and threats to which international peace and security are exposed. There is no doubt that the concept of international peace and security has undergone significant changes during the 70-year period that followed the establishment of the international organization. After the threat to peace and security focused - in the first stage - on cases of war or the threat of war, what distinguishes the post- The new world order is the emergence of other challenges and threats that find their source in economic, social, humanitarian, and environmental instability. Perhaps this is what the member states of the Security Council indicated during the preparation of the Peace Agenda. The expansion of the concept of peace and security is what paved the way for some permanent states to use the Security Council to legitimize and implement their decisions and take the council as a tool to implement their foreign policy and punish states instead of maintaining international peace and security, which prompted some states and jurisprudence to call for the establishment of oversight of the decisions of the Council Security on the one hand, and amending the UN Charter to make it more expressive of the aspirations of the international community, referring to the obstacles that prevent this amendment.Keywords: peace, security, united nations charter, security council, united nations organization
Procedia PDF Downloads 753557 Ground Source Ventilation and Solar PV Towards a Zero-Carbon House in Riyadh
Authors: Osamah S. Alanazi, Mohammad G. Kotbi, Mohammed O. AlFadil
Abstract:
While renewable energy technology is developing in Saudi Arabia, and the ambitious 2030 vision encourages the shift towards more efficient and clean energy usage. The research on the application of geothermal resources in residential use for the Saudi Arabian context will contribute towards a more sustainable environment. This paper is a part of an ongoing master's thesis, which its main goal is to investigate the possibility of achieving a zero-carbon house in Riyadh by applying a ground-coupled system into a current sustainable house that uses a grid-tied solar system. The current house was built and designed by King Saud University for the 2018 middle east solar decathlon competition. However, it failed to reach zero-carbon operation due to the high cooling demand. This study will redesign and validate the house using Revit and Carriers Hourly Analysis 'HAP' software with the use of ordinary least square 'OLS' regression. After that, a ground source ventilation system will be designed using the 'GCV Tool' to reduce cooling loads. After the application of the ground source system, the new electrical loads will be compared with the current house. Finally, a simple economic analysis that includes the cost of applying a ground source system will be reported. The findings of this study will indicate the possibility and feasibility of reaching a zero-carbon house in Riyadh, Saudi Arabia, using a ground-coupled ventilation system. While cooling in the residential sector is the dominant energy consumer in the Gulf region, this work will certainly help in moving towards using renewable sources to meet those demands. This paper will be limited to highlight the literature review, the methodology of the research, and the expected outcome.Keywords: renewable energy, zero-carbon houses, sustainable buildings, geothermal energy, solar PV, GCV Tool
Procedia PDF Downloads 182