Search results for: state identity
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 8788

Search results for: state identity

8218 Narrative Family Therapy and the Treatment of Perinatal Mood and Anxiety Disorders

Authors: Jamie E. Banker

Abstract:

For many families, pregnancy and the postpartum time are filled with both anticipation and change. For some pregnant or postpartum women, this time is marked by the onset of a mood or anxiety disorder. Experiencing a mood or anxiety disorders during this time of life differs from depression or anxiety at other times of life. Not only because of the physical changes occurring in the mother’s body but also the mental and physical preparation necessary to redefine family roles, responsibilities, and develop new identities in the life transition. The presence of a mood or anxiety disorder can influence the way in which a mother defines herself and can complicate her understanding of her abilities and competencies as a mother. The complexity of experiencing a mood or anxiety disorder in the midst of these changes necessitates specific treatment interventions to match both the symptomatology and psychological adjustments. This study explores the use of narrative family therapy techniques when treating a mother who is experiencing postpartum depression. Externalization is a common technique used in narrative family therapy and can help client’s separate their identity from the problems they are experiencing. This is crucial to a new mom who is in the middle of defining her identity during her transition to parenthood. The goal of this study is to examine how the use of externalization techniques help postpartum women separate their mood and anxiety symptoms from their identity as a mother. An exploratory case study design was conducted in a single setting, private practice therapy office, and explored how a narrative family therapy approach can be used to treat perinatal mood and anxiety disorders. The therapy sessions were audio recorded and transcribed. Constructivism and narrative theory are used as theoretical frameworks and data from the therapy sessions, and a follow-up survey was triangulated and analyzed. During the course of the treatment, the participant reports using the new externalizing labels for her symptoms. Within one month of treatment, the participant reports that she could stop herself from thinking the harmful thoughts faster, and within three months, the harmful thoughts went away. The main themes in this study were building courage and less self-blame. This case highlights the role narrative family therapy can play in the treatment of perinatal mood and anxiety disorders and the importance of separating a women’s mood from her identity as a mother. This conceptual framework was beneficial to the postpartum mother when treating perinatal mood and anxiety disorder symptoms.

Keywords: externalizing techniques, narrative family therapy, perinatal mood and anxiety disorders, postpartum depression

Procedia PDF Downloads 273
8217 Formal Development of Electronic Identity Card System Using Event-B

Authors: Tomokazu Nagata, Jawid Ahmad Baktash

Abstract:

The goal of this paper is to explore the use of formal methods for Electronic Identity Card System. Nowadays, one of the core research directions in a constantly growing distributed environment is the improvement of the communication process. The responsibility for proper verification becomes crucial. Formal methods can play an essential role in the development and testing of systems. The thesis presents two different methodologies for assessing correctness. Our first approach employs abstract interpretation techniques for creating a trace based model for Electronic Identity Card System. The model was used for building a semi decidable procedure for verifying the system model. We also developed the code for the eID System and can cover three parts login to system sending of Acknowledgment from user side, receiving of all information from server side and log out from system. The new concepts of impasse and spawned sessions that we introduced led our research to original statements about the intruder’s knowledge and eID system coding with respect to secrecy. Furthermore, we demonstrated that there is a bound on the number of sessions needed for the analysis of System.Electronic identity (eID) cards promise to supply a universal, nation-wide mechanism for user authentication. Most European countries have started to deploy eID for government and private sector applications. Are government-issued electronic ID cards the proper way to authenticate users of online services? We use the eID project as a showcase to discuss eID from an application perspective. The new eID card has interesting design features, it is contact-less, it aims to protect people’s privacy to the extent possible, and it supports cryptographically strong mutual authentication between users and services. Privacy features include support for pseudonymous authentication and per service controlled access to individual data items. The article discusses key concepts, the eID infrastructure, observed and expected problems, and open questions. The core technology seems ready for prime time and government projects deploy it to the masses. But application issues may hamper eID adoption for online applications.

Keywords: eID, event-B, Pro-B, formal method, message passing

Procedia PDF Downloads 233
8216 An Excellent Adventure: The Stories of National Tertiary Teaching Excellence Award Winners

Authors: Claire Goode

Abstract:

This paper reports on a doctoral research project using narrative inquiry to investigate the stories of twelve national Tertiary Teaching Excellence Award winners in New Zealand. Preliminary findings highlight awardees’ views on their identity, their professional practice, and on what they consider to be excellence in tertiary teaching. The research also reports on common themes in the personal qualities that awardees describe, and on what these nationally recognised educators would like to see in place around Tertiary Teacher Development. Educators, mentors, trainers, and curriculum designers can gain a deeper understanding of what teaching excellence looks like, and of how teachers perceive their own practice and their impact on others. This may enable different interventions to develop best practice from staff, and to raise standards. It is hoped too that, by reflecting on the stories of teachers who have been recognised for ‘excellence’, educators will relate to and recognise elements of their own practice, and will feel motivated and inspired to share these with their peers and the wider academic community.

Keywords: academic identity, narrative inquiry, teacher development, teaching excellence

Procedia PDF Downloads 120
8215 Using Printouts as Social Media Evidence and Its Authentication in the Courtroom

Authors: Chih-Ping Chang

Abstract:

Different from traditional objective evidence, social media evidence has its own characteristics with easily tampering, recoverability, and cannot be read without using other devices (such as a computer). Simply taking a screenshot from social network sites must be questioned its original identity. When the police search and seizure digital information, a common way they use is to directly print out digital data obtained and ask the signature of the parties at the presence, without taking original digital data back. In addition to the issue on its original identity, this conduct to obtain evidence may have another two results. First, it will easily allege that is tampering evidence because the police wanted to frame the suspect and falsified evidence. Second, it is not easy to discovery hidden information. The core evidence associated with crime may not appear in the contents of files. Through discovery the original file, data related to the file, such as the original producer, creation time, modification date, and even GPS location display can be revealed from hidden information. Therefore, how to show this kind of evidence in the courtroom will be arguably the most important task for ruling social media evidence. This article, first, will introduce forensic software, like EnCase, TCT, FTK, and analyze their function to prove the identity with another digital data. Then turning back to the court, the second part of this article will discuss legal standard for authentication of social media evidence and application of that forensic software in the courtroom. As the conclusion, this article will provide a rethinking, that is, what kind of authenticity is this rule of evidence chase for. Does legal system automatically operate the transcription of scientific knowledge? Or furthermore, it wants to better render justice, not only under scientific fact, but through multivariate debating.

Keywords: federal rule of evidence, internet forensic, printouts as evidence, social media evidence, United States v. Vayner

Procedia PDF Downloads 289
8214 The Effectiveness of Teaching Games for Understanding in Improving the Hockey Tactical Skills and State Self-Confidence among 16 Years Old Students

Authors: Wee Akina Sia Seng Lee, Shabeshan Rengasamy, Lim Boon Hooi, Chandrakalavaratharajoo, Mohd Ibrahim K. Azeez

Abstract:

This study was conducted to examine the effectiveness of Teaching Games For Understanding (TGFU) in improving the hockey tactical skills and state self-confidence among 16-year-old students. Two hundred fifty nine (259) school students were selected for the study based on the intact sampling method. One class was used as the control group (Boys=60, Girls=70), while another as the treatment group (Boys=60, Girls=69) underwent intervention with TGFU in physical education class conducted twice a week for four weeks. The Games Performance Assessment Instrument was used to observe the hockey tactical skills and The State Self-Confidence Inventory was used to determine the state of self-confidence among the students. After four weeks, ANCOVA analysis indicated the treatment groups had significant improvement in hockey tactical skills with F (1, 118) =313.37, p < .05 for school boys, and F (1, 136) =92.62, p < .05 for school girls. The Mann Whitney U test also showed the treatment groups had significant improvement in state self-confidence with U=428.50, z= -7.22, p < .05, r=.06 for school boys. ANCOVA analysis also showed the treatment group had significant improvement in state self-confidence with F (1, 136) =74.40, p < .05 for school girls. This indicates that TGFU in a 40 minute physical education class conducted twice a week for four weeks can significantly improve the hockey tactical skills and state self-confidence among 16-year-old students. The findings give new knowledge to PE teachers to implement the TGFU method as it enhances the hockey tactical skills and state self-confidence among 16-year-old students. Some recommendation was suggested for future research.

Keywords: Teaching Games For Understanding (TGFU), traditional teaching, hockey tactical skills, state self-confidence

Procedia PDF Downloads 352
8213 The School Threshold's Identity as a Place for Interaction: Research Project with the Participation of Elementary-School Children

Authors: Natalia Bazaiou

Abstract:

The school entrance is one of the most important places in the everyday lives of children. As an intersection between school and public realm of the city, it is characterized by gradations of porous and rigid boundaries. Depending on its function, it can serve as a threshold or as a boundary. Additionally, it is a spatial condition that facilitates a dialogue between the school and the city and draws content from both. School thresholds are important in supporting the role of the school as an important node in the city and a bridge between children's various everyday life dynamics by demonstrating prominent usage and meaning as a place that is open to the community as well as to possibilities and physical interaction. In this research, we examine the role of the "realm of the in-between" between school and city through the architecture workshops for children at Hill Memorial School in Athens, in which we explore children's perceptions, wishes, and ideas related to their familiar everyday places of transition from school to city and vice versa. Also discussed in the presentation are the writings of Herman Hertzberger, Aldo Van Eyck, Jaap Bakema and others.

Keywords: threshold, city, play, identity, cinematic tools, children, school architecture

Procedia PDF Downloads 78
8212 Social and Digital Transformation of the Saudi Education System: A Cyberconflict Analysis

Authors: Mai Alshareef

Abstract:

The Saudi government considers the modernisation of the education system as a critical component of the national development plan, Saudi Vision 2030; however, this sudden reform creates tension amongst Saudis. This study examines first the reflection of the social and digital education reform on stakeholders and the general Saudi public, and second, the influence of information and communication technologies (ICTs) on the ethnoreligious conflict in Saudi Arabia. This study employs Cyberconflict theory to examine conflicts in the real world and cyberspace. The findings are based on a qualitative case study methodology that uses netnography, an analysis of 3,750 Twitter posts and semi-structural interviews with 30 individuals, including key actors in the Saudi education sector and Twitter activists during 2019\2020. The methods utilised are guided by thematic analysis to map an understanding of factors that influence societal conflicts in Saudi Arabia, which in this case include religious, national, and gender identity. Elements of Cyberconflict theory are used to better understand how conflicting groups build their identities in connection to their ethnic/religious/cultural differences and competing national identities. The findings correspond to the ethnoreligious components of the Cyberconflict theory. Twitter became a battleground for liberals, conservatives, the Saudi public and elites, and it is used in a novel way to influence public opinion and to challenge the media monopoly. Opposing groups relied heavily on a discourse of exclusion and inclusion and showed ethnic and religious affiliations, national identity, and chauvinism. The findings add to existing knowledge in the cyberconflict field of study, and they also reveal outcomes that are critical to the Saudi Arabian national context.

Keywords: education, cyberconflict, Twitter, national identity

Procedia PDF Downloads 173
8211 An Analysis of Present Supplier Selection Criteria of State Pharmaceutical Corporation (SPC) Sri Lanka: A Case Study

Authors: Gamalath M. B. P. Abeysekara

Abstract:

Primary objective of any organization is to enhance the bottom line profit. Strategic procurement is one of the prominent aspects in view of receiving this ultimate objective. Strategic procurement is an activity used in each and every organization in their operations. Pharmaceutical procurement is an especially significant task for any organizations, particularly state sector concerned. The whole pharmaceutical procurement requirement of the country is procured through the State Pharmaceutical Corporation (SPC) of Sri Lanka. They follow Pharmaceutical Procurement Guideline of 2006 as the procurement principle. The main objective of this project is to identify the importance of State Pharmaceutical Corporation supplier selection criteria and critical analysis of pharmaceutical procurement procedure. State Pharmaceutical Corporations applied net price, product quality, past performance, and delivery of suppliers’ as main criteria for the selection suppliers. Data collection for this study was taken place through a questionnaire, given to fifty doctors within the Colombo district attached to five main state hospitals. Data analysis is carried out with mean and standard deviation functions. The ultimate outcomes indicated product quality, net price, and delivery of suppliers’ are the most important criteria behind the selection of suppliers. Critical analysis proved State Pharmaceutical Corporation should focus on net price reduction, improving laboratory testing facilities and effective communication between up and down stream of supply chain.

Keywords: government procurement procedure, pharmaceutical procurement supplier selection criteria, importance of SPC supplier selection criteria

Procedia PDF Downloads 450
8210 A Mixed Methods Research Design for the Development of the Xenia Higher Education Institutions' Inclusiveness Index

Authors: Achilles Kameas, Eleni Georgakakou, Anna Lisa Amodeo, Aideen Quilty, Aisling Malone, Roberta Albertazzi, Moises Carmona, Concetta Esposito, Ruben David Fernandez Carrasco, Carmela Ferrara, Francesco Garzillo, Mojca Pusnik, Maria Cristina Scarano

Abstract:

While researchers, especially in academia, study and research the phenomena of inclusion of sexual minority and gender marginalized groups, seldom the European Higher Education Institutions (HEI) act on lowering the cultural and educational barriers to their proactive inclusion. The challenge in European HEIs is that gender, and sexual orientation discrimination remains an issue not adequately addressed. Following a mixed methods research design of quantitative and qualitative research techniques and tools, which is applied in five (5) European countries (Italy, Greece, Ireland, Slovenia, and Spain) and that combines desk research, evaluation, and weighting processes for a Matrix-based on Objective indicators and Survey for students and staff of the HEI to gauge the perception of inclusiveness in the HEI context, XENIA HEI Inclusiveness Index is an instrument that will allow universities to gauge and assess their inclusiveness in the domain of discrimination and exclusion based on gender identity and sexual orientation. The index will allow capturing the depth and reach of policies, programmes, and initiatives of HEIs in tackling the phenomena and dynamics of exclusion of LGBT+ (lesbian, gay, bisexual, trans, and other marginalized groups on the basis of gender and sexual identity) and cisgender women exposed to the risk of discrimination.

Keywords: gender identity, higher education, LGBT+ rights, XENIA inclusiveness index

Procedia PDF Downloads 161
8209 Recognition and Protection of Indigenous Society in Indonesia

Authors: Triyanto, Rima Vien Permata Hartanto

Abstract:

Indonesia is a legal state. The consequence of this status is the recognition and protection of the existence of indigenous peoples. This paper aims to describe the dynamics of legal recognition and protection for indigenous peoples within the framework of Indonesian law. This paper is library research based on literature. The result states that although the constitution has normatively recognized the existence of indigenous peoples and their traditional rights, in reality, not all rights were recognized and protected. The protection and recognition for indigenous people need to be strengthened.

Keywords: indigenous peoples, customary law, state law, state of law

Procedia PDF Downloads 328
8208 The Precarious Chinese Ecology of Financial Expertise: Discontent in the Mix

Authors: Giulia Dal Maso

Abstract:

Within the contemporary financial capitalist configuration, the interplay of Chinese statecraft and financialization has shaped a new ‘ecology of financial expertise.’ This indicates the emergence of a new financial technocratic governance; that is increasingly changing the Chinese economy, reducing the state’s administrative and fiscal functions and increasing state assets in accordance with a new shareholder logic. In this shift, the creation of the stock market by the state was conceived not only as a new redistributor of wealth but as a ‘clearing house’ for social discontent resulting from work casualization, wage repression and a lack of social welfare. Since its inception in the wake of Deng Xiaoping’s reforms, the Chinese state has used the stock market as a means of securing social legitimation by providing a prearranged space where the disaggregated and vulnerable subjects left behind by the dismantlement of the collective work units of the Maoist period (danwei) can congregate. However, fieldwork which included both participant observation as well as interviews with investors in brokerage rooms in Shanghai (where one of only two mainland Chinese stock exchanges is situated) reveals that both new formal and informal financial experts—namely the haigui (Chinese returnees with a financial degree abroad) and sanhu (individual Chinese scattered players), are equally dissatisfied with their investing activities. They express discontent with the state, which they hold responsible for the summer 2015 financial crisis and for the financial turmoil that jeopardizes China’s financial and political project. What the investors want is a state that will guarantee the continuation of the current gupiaore ‘stock fever’. This paper holds that, by embracing financialization, the state is undermining the contract at the base of its legitimacy.

Keywords: Chinese state, Deng Xiaoping, financial capitalism, individual investors

Procedia PDF Downloads 455
8207 Differentiation of the Functional in an Optimization Problem for Coefficients of Elliptic Equations with Unbounded Nonlinearity

Authors: Aigul Manapova

Abstract:

We consider an optimal control problem in the higher coefficient of nonlinear equations with a divergent elliptic operator and unbounded nonlinearity, and the Dirichlet boundary condition. The conditions imposed on the coefficients of the state equation are assumed to hold only in a small neighborhood of the exact solution to the original problem. This assumption suggests that the state equation involves nonlinearities of unlimited growth and considerably expands the class of admissible functions as solutions of the state equation. We obtain formulas for the first partial derivatives of the objective functional with respect to the control functions. To calculate the gradients the numerical solutions of the state and adjoint problems are used. We also prove that the gradient of the cost function is Lipchitz continuous.

Keywords: cost functional, differentiability, divergent elliptic operator, optimal control, unbounded nonlinearity

Procedia PDF Downloads 170
8206 Social Impacts of Gentrification: Protest and Resistance: A Case Study in Monterrey’s City Center

Authors: Paulina Ramirez Leal

Abstract:

Current debates have examined the effects of market-oriented development on gentrification, as well as the role of urban renewal, interventions, and planning policy in exacerbating this phenomenon. Despite the growing body of research recognizing the social impacts of gentrification, to date, there has been very little research directly investigating how resisting gentrification increases social cohesion, a crucial dimension of urban resilience. This contribution set out to explore these social impacts while identifying the different forms of protest and expressions of resistance to gentrification in Monterrey’s city center. The methods employed include documentary analysis and qualitative methods such as surveys and photographic documentation. Monterrey’s city center's ongoing process of gentrification illustrates the impacts of planning policies, specifically TOD. Some of the unintended consequences of the policy have resulted in inhabitants facing forced inner migration and displacement caused by vandalism of their homes and neighborhoods, as well as losing part of their urban identity.

Keywords: gentrification, social impacts, neighborhood identity, urban resilience, Monterrey’s City Center

Procedia PDF Downloads 103
8205 Political Coercion from Within: Theoretical Convergence in the Strategies of Terrorist Groups, Insurgencies, and Social Movements

Authors: John Hardy

Abstract:

The early twenty-first century national security environment has been characterized by political coercion. Despite an abundance of political commentary on the various forms of non-state coercion leveraged against the state, there is a lack of literature which distinguishes between the mechanisms and the mediums of coercion. Frequently non-state movements seeking to coerce the state are labelled by their tactics, not their strategies. Terrorists, insurgencies and social movements are largely defined by the ways in which they seek to influence the state, rather than by their political aims. This study examines the strategies of coercion used by non-state actors against states. This approach includes terrorist groups, insurgencies, and social movements who seek to coerce state politics. Not all non-state actors seek political coercion, so not all examples of different group types are considered. This approach also excludes political coercion by states, focusing on the non-state actor as the primary unit of analysis. The study applies a general theory of political coercion, which is defined as attempts to change the policies or action of a polity against its will, to the strategies employed by terrorist groups, insurgencies, and social movements. This distinguishes non-state actors’ strategic objectives from their actions and motives, which are variables that are often used to differentiate between types of non-state actors and the labels commonly used to describe them. It also allows for a comparative analysis of theoretical perspectives from the disciplines of terrorism, insurgency and counterinsurgency, and social movements. The study finds that there is a significant degree of overlap in the way that different disciplines conceptualize the mechanism of political coercion by non-state actors. Studies of terrorism and counterterrorism focus more on the notions of cost tolerance and collective punishment, while studies of insurgency focus on a contest of legitimacy between actors, and social movement theory tend to link political objectives, social capital, and a mechanism of influence to leverage against the state. Each discipline has a particular vernacular for the mechanism of coercion, which is often linked to the means of coercion, but they converge on three core theoretical components of compelling a polity to change its policies or actions: exceeding resistance to change, using political or violent punishments, and withholding legitimacy or consent from a government.

Keywords: counter terrorism, homeland security, insurgency, political coercion, social movement theory, terrorism

Procedia PDF Downloads 173
8204 Being an English Language Teaching Assistant in China: Understanding the Identity Evolution of Early-Career English Teacher in Private Tutoring Schools

Authors: Zhou Congling

Abstract:

The integration of private tutoring has emerged as an indispensable facet in the acquisition of language proficiency beyond formal educational settings. Notably, there has been a discernible surge in the demand for private English tutoring, specifically geared towards the preparation for internationally recognized gatekeeping examinations, such as IELTS, TOEFL, GMAT, and GRE. This trajectory has engendered an escalating need for English Language Teaching Assistants (ELTAs) operating within the realm of Private Tutoring Schools (PTSs). The objective of this study is to unravel the intricate process by which these ELTAs formulate their professional identities in the nascent stages of their careers as English educators, as well as to delineate their perceptions regarding their professional trajectories. The construct of language teacher identity is inherently multifaceted, shaped by an amalgamation of individual, societal, and cultural determinants, exerting a profound influence on how language educators navigate their professional responsibilities. This investigation seeks to scrutinize the experiential and influential factors that mold the identities of ELTAs in PTSs, particularly post the culmination of their language-oriented academic programs. Employing a qualitative narrative inquiry approach, this study aims to delve into the nuanced understanding of how ELTAs conceptualize their professional identities and envision their future roles. The research methodology involves purposeful sampling and the conduct of in-depth, semi-structured interviews with ten participants. Data analysis will be conducted utilizing Barkhuizen’s Short Story Analysis, a method designed to explore a three-dimensional narrative space, elucidating the intricate interplay of personal experiences and societal contexts in shaping the identities of ELTAs. The anticipated outcomes of this study are poised to contribute substantively to a holistic comprehension of ELTA identity formation, holding practical implications for diverse stakeholders within the private tutoring sector. This research endeavors to furnish insights into strategies for the retention of ELTAs and the enhancement of overall service quality within PTSs.

Keywords: China, English language teacher, narrative inquiry, private tutoring school, teacher identity

Procedia PDF Downloads 54
8203 Implementing Zero-Trust Security with Passwordless Authentication Gateways for Privacy-Oriented Organizations Using Keycloak

Authors: Andrei Bogdan Stanescu, Laura Diaconescu

Abstract:

With the increasing concerns about data breaches and privacy violations, organizations seek robust security measures to protect sensitive information. This research paper highlights the importance of implementing the Zero-Trust Security methodology using Passwordless Authentication Gateways that leverage Keycloak, an open-source Identity and Access Management (IAM) software, as a solution to address the security challenges these organizations face. The paper presents the successful implementation and deployment of such a solution in a mid-size, privacy-oriented organization. The implementation resulted in significant security improvements, reducing the risk of unauthorized access and potential data breaches. Moreover, user feedback indicated enhanced convenience and streamlined authentication experiences. The results of this study bring solid contributions in the field of cybersecurity and provide practical insights for organizations aiming to strengthen their security practices.

Keywords: identity and access management, passwordless authentication, privacy, zero-trust security

Procedia PDF Downloads 90
8202 Disaggregating Communities and the Making of Factional States: Evidence from Joint Forest Management in Sundarban, India

Authors: Amrita Sen

Abstract:

In the face of a growing insurgent movement and the perceived failure of the state and the market towards sustainable resource management, a range of decentralized forest management policies was formulated in the last two decades, which recognized the need for community representations within the statutory methods of forest management. The recognition conceded on the virtues of ecological sustainability and traditional environmental knowledge, which were considered to be the principal repositories of the forest dependent communities. The present study, in the light of empirical insights, reflects on the contemporary disjunctions between the preconceived communitarian ethic in environmentalism and the lived reality of forest based life-worlds. Many of the popular as well as dominant ideologies, which have historically shaped the conceptual and theoretical understanding of sociology, needs further perusal in the context of the emerging contours of empirical knowledge, which lends opportunities for substantive reworking and analysis. The image of the community appears to be one of those concepts, an identity which has for long defined perspectives and processes associated with people living together harmoniously in small physical spaces. Through an ethnographic account of the implementation of Joint Forest Management (JFM) in a forest fringe village in Sundarban, the study explores the ways in which the idea of ‘community’ gets transformed through the process of state-making, rendering the necessity of its departure from the standard, conventional definition of homogeneity and internal equity. The study necessitates an attention towards the anthropology of micro-politics, disaggregating an essentially constructivist anthropology of ‘collective identities’, which can render the visibility of political mobilizations plausible within the seemingly culturalist production of communities. The two critical questions that the paper seeks to ask in this context are: how the ‘local’ is constituted within community based conservation practices? Within the efforts of collaborative forest management, how accurately does the depiction of ‘indigenous environmental knowledge’, subscribe to its role of sustainable conservation practices? Reflecting on the execution of JFM in Sundarban, the study critically explores the ways in which the state ceases to be ‘trans-national’ and interacts with the rural life-worlds through its local factions. Simultaneously, the study attempts to articulate the scope of constructing a competing representation of community, shaped by increasing political negotiations and bureaucratic alignments which strains against the usual preoccupations with tradition primordiality and non material culture as well as the amorous construction of indigeneity.

Keywords: community, environmentalism, JFM, state-making, identities, indigenous

Procedia PDF Downloads 197
8201 Beliefs, Practices and Identity about Bilingualism: Korean-australian Immigrant Parents and Family Language Policies

Authors: Eun Kyong Park

Abstract:

This study explores the relationships between immigrant parents’ beliefs about bilingualism, family literacy practices, and their children’s identity development in Sydney, Australia. This project examines how these parents’ ideological beliefs and knowledge are related to their provision of family literacy practices and management of the environment for their bilingual children based on family language policy (FLP). This is a follow-up study of the author’s prior thesis that presented Korean immigrant mothers’ beliefs and decision-making in support of their children’s bilingualism. It includes fathers’ perspectives within the participating families as a whole by foregrounding their perceptions of bilingual and identity development. It adopts a qualitative approach with twelve immigrant mothers and fathers living in a Korean-Australian community whose child attends one of the communities Korean language programs. This time, it includes introspective and self-evocative auto-ethnographic data. The initial data set collected from the first part of this study demonstrated the mothers provided rich, diverse, and specific family literacy activities for their children. These mothers selected specific practices to facilitate their child’s bilingual development at home. The second part of data has been collected over a three month period: 1) a focus group interview with mothers; 2) a brief self-report of fathers; 3) the researcher’s reflective diary. To analyze these multiple data, thematic analysis and coding were used to reveal the parents’ ideologies surrounding bilingualism and bilingual identities. It will highlight the complexity of language and literacy practices in the family domain interrelated with sociocultural factors. This project makes an original contribution to the field of bilingualism and FLP and a methodological contribution by introducing auto-ethnographic input of this community’s lived practices. This project will empower Korean-Australian immigrant families and other multilingual communities to reflect their beliefs and practices for their emerging bilingual children. It will also enable educators and policymakers to access authentic information about how bilingualism is practiced within these immigrant families in multiple ways and to help build the culturally appropriate partnership between home and school community.

Keywords: bilingualism, beliefs, identity, family language policy, Korean immigrant parents in Australia

Procedia PDF Downloads 135
8200 Emotional and Embodied Knowledge and Responses

Authors: Salman Khokhar

Abstract:

The geopolitical landscape in Pakistan has become shrouded with suspicion between the state and the Ahmadiyya Muslim Community. The study argues that the social mobility of the community has become severely compromised, especially after the inception of the blasphemy laws and their subsequent enhancements in later years. The securitization of the community has ensured that the daily lives of Ahmadi Muslims have become severely restricted as their integration and assimilation into society become defined through their religious identity and beliefs. Consequently, performing congregational prayers or engaging in any other community activity is carried out secretly as the repercussions of such actions may lead to incarceration or, in some cases, even more extreme apprehension measures. The securitization of Ahmadis, and their daily lives are severely curtailed in Pakistan; however, due to transnational approaches, the community must implement specific measures to ensure the safety of its members, even in the West. The eyes of suspicion are always on the activities of the Ahmadiyya Muslim Community, and the community’s headquarters in Rabwah is always being viewed with suspicious lenses. The study considers how secrecy has enveloped the everyday life of the Ahmadi Muslim community and how it embodies characteristics which we thought had come to an end many years ago.

Keywords: freedom, ideology, Islam, persecution

Procedia PDF Downloads 122
8199 Decolonialism: Addressing Colonial Legacies and Challenging Dominant Narratives

Authors: Patricia Amorim Da Silva

Abstract:

This paper explores the ongoing process of decolonialism, focusing on addressing the lasting consequences of colonialism. Centred on identity within marginalized communities, the study challenges Eurocentric frameworks and advocates for diverse perspectives. Emphasizing critical self-awareness among researchers regarding biases in their work, decolonialism influences feminist theory and global counter-publics. At its core is the concept of epistemicide, the intentional suppression of knowledge in unequal cultural interactions. Colonial imposition has devalued local knowledge, contributing to cultural loss and undermining autonomy. The paper underscores the importance of reclaiming indigenous knowledge to revitalize local cultures and languages, particularly pertinent to the Brazilian context. This contribution to the discourse on decolonialism underscores the imperative to challenge prevailing narratives and empower historically subordinated communities. The study aspires to advance feminist theory and decolonial studies, fostering a more equitable and inclusive global society.

Keywords: decolonialism, colonial legacies, identity, Eurocentrism, epistemicide

Procedia PDF Downloads 57
8198 Constructing the Cult of the Self: On White, Working-Class Males and the Neoliberalisation of Identities: An Autoethnographic Study

Authors: Dane B. Norris

Abstract:

This paper offers a reflective and reflexive examination of the lived reality of a group of young white, working-class males engaging in secondary education in England at a time when this population is widely recognised as the lowest attaining ethnic group within British schools. The focus of the paper is an exploration of the development of identities and aspirations alongside contemporary demographic shifts in the British population within the intersection of neoliberal education policies and the emerging ideological conflict between identity conservatism and liberalism. The construction and performance of intersecting social-class, gender, ethnic and national identities are considered, as well as the process through which socially constructed narratives inform identities and aspirations. Evocative autoethnography is then employed to offer reflections on working-class habitus and, in particular, classed and gendered codes that underpin expectations of manhood in post-industrial culture within an education system which seemingly requires the abandonment of aspects of a working-class background, affiliation, and identity. Findings from the study identify the emergence of a culture of hyper-individualisation amongst white, working-class males in schools and a belief in the meritocratic ideologies of the New Right. In particular, the breakdown of the social contract, including notions of political and civic responsibility, coupled with the symbolic violence perpetrated against working-class culture and solidarity in British schools, have all informed the construction of working-class masculinity which values the individual entrepreneur over the collective and depoliticizes students to an extent where a focus on the spectacle and performance of success has replaced individual and collective investment in community.

Keywords: education, identity, masculinity, neoliberalism, working-class

Procedia PDF Downloads 100
8197 Third Generation Greek Identities

Authors: Panayiota Romios

Abstract:

Greek diaspora communities with their specific cultural identity are found throughout the world and exist on a continuum of redefinition and renewal. This paper investigates Greek migration to Australia, followed by a discussion of findings from a qualitative study of sixteen third generation Greek Australians conducted by the author in Melbourne, Australia, in 2021. The Greek-born population in Australia increased from 15,000 in 1930 to well over 300,000 by 1970. Over the next decades, first-generation Greek migrants successfully sustain a Greek identity that promotes difference within Australia. Their Australian-born children, while constructing Greek Australian hybrid identities through an encounter with difference, integrate successfully into Australian society and maintain strong connections to Greece. This study explores the third generation Greek Australian identities, the children of the second generation, and their having horizontal and vertical orientations, where the former designates transgression of borders and space and the latter is connected to the movement across time. This approach is particularly interesting in the context of Greek Australian migrant and diasporic experience as hybridity understood as movement and translocation can offer new perspectives on migrant identities in multi-and transcultural worlds.

Keywords: diaspora, migration, hybridity, ethnicty

Procedia PDF Downloads 146
8196 Aesthetics of Colours, Symbols, and Spectacles in the 2021 National Festival of Arts and Culture, Ekiti State, Nigeria

Authors: Bade-Afuye Toyin Beatrice

Abstract:

Nigeria, as a multi-cultural nation, boasts of many festivals, many of which are found in the six geo-political zones of the country. One of the major festivals that bring together the Nigerian citizens as one entity is the National Festival of Arts and Culture (NAFEST), organized by the National Council for Arts and Culture (NCAC). The festival is celebrated yearly in ways that are unique to Nigerians and culture enthusiasts locally and abroad. The festival has equally boosted the Nigerian economy through tourism promotion and culture preservation. This study shall adopt the cultural identity theory. The theory will be used to examine the festival as a platform that showcases culture, which represents the totality of the ways and lives of the Nigerian people. To achieve this, the researcher shall gather data as a participant-observer during the festival, which featured elements such as costume, make-up, dance, drama, children's theatre, fashion parade, local cuisines, local games, music, props, acrobatic displays, trade fair among others. These elements are the cultural aesthetics of the festival, thereby creating spectacles and colours in unique styles by each of the 36 states of the federation and the FCT Abuja. The study particularly examines the 2021 edition of NAFEST hosted by the Ekiti State Government. The study reveals that the festival is a unique multi-ethnic event that brings together Nigerians and their kinsmen in the diaspora. NAFEST has equally provided a good opportunity to showcase the rich cultural heritage of the Ekiti people and the economic values of their products and materials. The paper, therefore, concludes that the National Festival of Arts and Culture has over the years promoted national unity and social integration among Nigerians.

Keywords: colours, culture, spectacle, NAFEST

Procedia PDF Downloads 105
8195 A Filtering Algorithm for a Nonlinear State-Space Model

Authors: Abdullah Eqal Al Mazrooei

Abstract:

Kalman filter is a famous algorithm that utilizes to estimate the state in the linear systems. It has numerous applications in technology and science. Since of the most of applications in real life can be described by nonlinear systems. So, Kalman filter does not work with the nonlinear systems because it is suitable to linear systems only. In this work, a nonlinear filtering algorithm is presented which is suitable to use with the special kinds of nonlinear systems. This filter generalizes the Kalman filter. This means that this filter also can be used for the linear systems. Our algorithm depends on a special linearization of the second degree. We introduced the nonlinear algorithm with a bilinear state-space model. A simulation example is presented to illustrate the efficiency of the algorithm.

Keywords: Kalman filter, filtering algorithm, nonlinear systems, state-space model

Procedia PDF Downloads 373
8194 On a Single Server Queue with Arrivals in Batches of Variable Size, Generalized Coxian-2 Service and Compulsory Server Vacations

Authors: Kailash C. Madan

Abstract:

We study the steady state behaviour of a batch arrival single server queue in which the first service with general service times is compulsory and the second service with general service times is optional. We term such a two phase service as generalized Coxian-2 service. Just after completion of a service the server must take a vacation of random length of time with general vacation times. We obtain steady state probability generating functions for the queue size as well as the steady state mean queue size at a random epoch of time in explicit and closed forms. Some particular cases of interest including some known results have been derived.

Keywords: batch arrivals, compound Poisson process, generalized Coxian-2 service, steady state

Procedia PDF Downloads 454
8193 Civic E-Participation in Central and Eastern Europe: A Comparative Analysis

Authors: Izabela Kapsa

Abstract:

Civic participation is an important aspect of democracy. The contemporary model of democracy is based on citizens' participation in political decision-making (deliberative democracy, participatory democracy). This participation takes many forms of activities like display of slogans and symbols, voting, social consultations, political demonstrations, membership in political parties or organizing civil disobedience. The countries of Central and Eastern Europe after 1989 are characterized by great social, economic and political diversity. Civil society is also part of the process of democratization. Civil society, funded by the rule of law, civil rights, such as freedom of speech and association and private ownership, was to play a central role in the development of liberal democracy. Among the many interpretations of concepts, defining the concept of contemporary democracy, one can assume that the terms civil society and democracy, although different in meaning, nowadays overlap. In the post-communist countries, the process of shaping and maturing societies took place in the context of a struggle with a state governed by undemocratic power. State fraud or repudiation of the institution is a representative state, which in the past was the only way to manifest and defend its identity, but after the breakthrough became one of the main obstacles to the development of civil society. In Central and Eastern Europe, there are many obstacles to the development of civil society, for example, the elimination of economic poverty, the implementation of educational campaigns, consciousness-related obstacles, the formation of social capital and the deficit of social activity. Obviously, civil society does not only entail an electoral turnout but a broader participation in the decision-making process, which is impossible without direct and participative democratic institutions. This article considers such broad forms of civic participation and their characteristics in Central and Eastern Europe. The paper is attempts to analyze the functioning of electronic forms of civic participation in Central and Eastern European states. This is not accompanied by a referendum or a referendum initiative, and other forms of political participation, such as public consultations, participative budgets, or e-Government. However, this paper will broadly present electronic administration tools, the application of which results from both legal regulations and increasingly common practice in state and city management. In the comparative analysis, the experiences of post-communist bloc countries will be summed up to indicate the challenges and possible goals for further development of this form of citizen participation in the political process. The author argues that for to function efficiently and effectively, states need to involve their citizens in the political decision-making process, especially with the use of electronic tools.

Keywords: Central and Eastern Europe, e-participation, e-government, post-communism

Procedia PDF Downloads 193
8192 Analyses of the Constitutional Identity in Hungary: A Case Study on the Concept of Constitutionalism and Legal Continuity in New Fundamental Law of Hungary

Authors: Zsuzsanna Fejes

Abstract:

The aim of this paper is to provide an overview of the legal history of constitutionalism in Hungary, in focus of the democratic transitions in 1989-1990, describing the historical and political background of the changes and presenting the main and most important features of the new democracy, and institutional and legal orders. In Hungary the evolved political, economic and moral crisis prior to the constitutional years 2010-11 had been such a constitutional moment, which led to an opportune and unavoidable change at the same time. The Hungarian constitutional power intended to adopt a new constitution, which was competent to create a common constitutional identity and to express a national unity. The Hungarian Parliament on 18th April 2011 passed the New Fundamental Law. The new Fundamental Law rich in national values meant a new challenge for the academics, lawyers, and political scientists. Not only the classical political science, but also the constitutional law and theory have to struggle with the interpretation of the new declarations about national constitutional values in the Fundamental Law. The main features and structure of the new Fundamental Law will be analysed, and given a detailed interpretation of the Preamble as a declaration of constitutional values. During the examination of the Preamble shall be cleared up the components of Hungarian statehood and national unity, individual and common human rights, the practical and theoretical demand on national sovereignty, and the content and possibilities for the interpretation of the achievements of the historical Constitution. These scopes of problems will be presented during the examination of the text of National Avowal, as a preamble of the Fundamental Law. It is examined whether the Fundamental Law itself could be suitable and sufficient means to citizens of Hungary to express the ideas therein as their own, it will be analysed how could the national and European common traditions, values and principles stated in the Fundamental Law mean maintenance in Hungary’s participation in the European integration.

Keywords: common constitutional values, constitutionalism, national identity, national sovereignty, national unity, statehood

Procedia PDF Downloads 293
8191 Switched System Diagnosis Based on Intelligent State Filtering with Unknown Models

Authors: Nada Slimane, Foued Theljani, Faouzi Bouani

Abstract:

The paper addresses the problem of fault diagnosis for systems operating in several modes (normal or faulty) based on states assessment. We use, for this purpose, a methodology consisting of three main processes: 1) sequential data clustering, 2) linear model regression and 3) state filtering. Typically, Kalman Filter (KF) is an algorithm that provides estimation of unknown states using a sequence of I/O measurements. Inevitably, although it is an efficient technique for state estimation, it presents two main weaknesses. First, it merely predicts states without being able to isolate/classify them according to their different operating modes, whether normal or faulty modes. To deal with this dilemma, the KF is endowed with an extra clustering step based fully on sequential version of the k-means algorithm. Second, to provide state estimation, KF requires state space models, which can be unknown. A linear regularized regression is used to identify the required models. To prove its effectiveness, the proposed approach is assessed on a simulated benchmark.

Keywords: clustering, diagnosis, Kalman Filtering, k-means, regularized regression

Procedia PDF Downloads 181
8190 Aflatoxin Contamination of Abattoir Wastes in Ogun State, Nigeria

Authors: A. F. Gbadebo, O. O. Atanda, M. C. Adetunji

Abstract:

The study investigated the level of aflatoxin contamination of abattoir wastes in Ogun State, Nigeria, due to continued complaints of poor hygiene of abattoir centers in the states as a result of improper disposal of abattoir wastes. Wastes from the three senatorial districts of the state were evaluated for their levels of aflatoxin contamination. The moisture content, total plate count, fungal counts, percentage frequency of fungal occurrence as well as the level of aflatoxin contamination of the abattoir wastes were determined by standard methods. The moisture content of the wastes ranged between 79.10-87.46 %, total plate count from 1.37-3.27×10³cfu/ml, and fungal counts from 2.73-3.30×10²cfu/ml. Four fungal species: Aspergillus niger, Aspergillus flavus, Aspergillus ochraceus, and Penicillium citrinum were isolated from the wastes, with Aspergillus flavus having the highest percentage frequency of occurrence of 29.76%. The aflatoxin content of the samples was found to range between 3.20-4.80 µg/kg. These findings showed that abattoir wastes from Ogun State are contaminated with aflatoxins and pose a health risk to humans and animals.

Keywords: abattoir wastes, aflatoxin, microbial load, Ogun state

Procedia PDF Downloads 134
8189 Non-State Actors and Their Liabilities in International Armed Conflicts

Authors: Shivam Dwivedi, Saumya Kapoor

Abstract:

The Israeli Supreme Court in Public Committee against Torture in Israel v. Government of Israel observed the presence of non-state actors in cross-border terrorist activities thereby making the role of non-state actors in terrorism the center of discussion under the scope of International Humanitarian Law. Non-state actors and their role in a conflict have also been traversed upon by the Tadic case decided by the International Criminal Tribunal for the former Yugoslavia. However, there still are lacunae in International Humanitarian Law when it comes to determining the nature of a conflict, especially when non-state groups act within the ambit of various states, for example, Taliban in Afghanistan or the groups operating in Ukraine and Georgia. Thus, the objective of writing this paper would be to observe the ways by which non-state actors particularly terrorist organizations could be brought under the ambit of Additional Protocol I. Additional Protocol I is a 1977 amendment protocol to the Geneva Conventions relating to the protection of victims of international conflicts which basically outlaws indiscriminate attacks on civilian populations, forbids conscription of children and preserves various other human rights during the war. In general, the Additional Protocol I reaffirms the provisions of the original four Geneva Conventions. Since provisions of Additional Protocol I apply only to cases pertaining to International Armed Conflicts, the answer to the problem should lie in including the scope for ‘transnational armed conflict’ in the already existing definition of ‘International Armed Conflict’ within Common Article 2 of the Geneva Conventions. This would broaden the applicability of the provisions in cases of non-state groups and render an international character to the conflict. Also, the non-state groups operating or appearing to operate should be determined by the test laid down in the Nicaragua case by the International Court of Justice and not under the Tadic case decided by the International Criminal Tribunal for Former Yugoslavia in order to provide a comprehensive system to deal with such groups. The result of the above proposal, therefore, would enhance the scope of the application of International Humanitarian Law to non-state groups and individuals.

Keywords: Geneva Conventions, International Armed Conflict, International Humanitarian Law, non-state actors

Procedia PDF Downloads 377