Search results for: theory of critical distances
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 9659

Search results for: theory of critical distances

3569 Assessing the Empowerment of Muslim Women in Malawi: A Case Study of the Muslim Women Organisation

Authors: Ulemu Maseko

Abstract:

This research is a critical assessment of the empowerment of Muslim women in Malawi. The study assessed, evaluated, and analyzed how the Muslim Women Organization (MWO) has influenced gender equality and women empowerment in different Islamic communities. In analyzing the data collected for this research, the study has examined the following topics: The way MWO has interpreted Islamic women’s rights, the various stereotypes Muslim women face, and lastly, the factors contributing to the limitation of Muslim women’s rights in Malawi. Towards this analysis, the study revealed that women groups such as MWO are crucial in understanding Muslim women and the different dynamics related to their empowerment. Therefore, it is necessary to understand how Muslim women comprehend various Islamic sources and how they link religion to their position and participation in society. To achieve the scope of this study, relevant works of literature that best described Islam in Malawi, Muslim women groups, and women empowerment in Malawi were used, coupled with a qualitative research approach that involved interviews, focus group discussions, and participant observations. In addition, phenomenology and feminist theoretical frameworks were used to examine and analyze the findings. Based on the findings, it can be concluded that MWO is a significant body for gender equality and women empowerment initiatives in the Malawian Islamic community. Since its establishment in 1985 till the time of this study, MWO has been an imperative driving force towards an Islamic women’s discourse that uses Islamic teachings, faith, policies, and practices to justify the role of the Muslim woman in society. This has been enlightening for their platform and has given them more confidence to justify the empowerment of Muslim women and support different initiatives towards social change.

Keywords: Islam, women, empowerment, Malawi

Procedia PDF Downloads 31
3568 Hacking's 'Between Goffman and Foucault': A Theoretical Frame for Criminology

Authors: Tomás Speziale

Abstract:

This paper aims to analyse how Ian Hacking states the theoretical basis of his research on the classification of people. Although all his early philosophical education had been based in Foucault, it is also true that Erving Goffman’s perspective provided him with epistemological and methodological tools for understanding face-to-face relationships. Hence, all his works must be thought of as social science texts that combine the research on how the individuals are constituted ‘top-down’ (as in Foucault), with the inquiry into how people renegotiate ‘bottom-up’ the classifications about them. Thus, Hacking´s proposal constitutes a middle ground between the French Philosopher and the American Sociologist. Placing himself between both authors allows Hacking to build a frame that is expected to adjust to Social Sciences’ main particularity: the fact that they study interactive kinds. These are kinds of people, which imply that those who are classified can change in certain ways that prompt the need for changing previous classifications themselves. It is all about the interaction between the labelling of people and the people who are classified. Consequently, understanding the way in which Hacking uses Foucault’s and Goffman’s theories is essential to fully comprehend the social dynamic between individuals and concepts, what Bert Hansen had called dialectical realism. His theoretical proposal, therefore, is not only valuable because it combines diverse perspectives, but also because it constitutes an utterly original and relevant framework for Sociological theory and particularly for Criminology.

Keywords: classification of people, Foucault's archaeology, Goffman's interpersonal sociology, interactive kinds

Procedia PDF Downloads 326
3567 Investigating the Potential of Spectral Bands in the Detection of Heavy Metals in Soil

Authors: Golayeh Yousefi, Mehdi Homaee, Ali Akbar Norouzi

Abstract:

Ongoing monitoring of soil contamination by heavy metals is critical for ecosystem stability and environmental protection, and food security. The conventional methods of determining these soil contaminants are time-consuming and costly. Spectroscopy in the visible near-infrared (VNIR) - short wave infrared (SWIR) region is a rapid, non-destructive, noninvasive, and cost-effective method for assessment of soil heavy metals concentration by studying the spectral properties of soil constituents. The aim of this study is to derive spectral bands and important ranges that are sensitive to heavy metals and can be used to estimate the concentration of these soil contaminants. In other words, the change in the spectral properties of spectrally active constituents of soil can lead to the accurate identification and estimation of the concentration of these compounds in soil. For this purpose, 325 soil samples were collected, and their spectral reflectance curves were evaluated at a range of 350-2500 nm. After spectral preprocessing operations, the partial least-squares regression (PLSR) model was fitted on spectral data to predict the concentration of Cu and Ni. Based on the results, the spectral range of Cu- sensitive spectra were 480, 580-610, 1370, 1425, 1850, 1920, 2145, and 2200 nm, and Ni-sensitive ranges were 543, 655, 761, 1003, 1271, 1415, 1903, 2199 nm. Finally, the results of this study indicated that the spectral data contains a lot of information that can be applied to identify the soil properties, such as the concentration of heavy metals, with more detail.

Keywords: heavy metals, spectroscopy, spectral bands, PLS regression

Procedia PDF Downloads 72
3566 Beliefs on Reproduction of Women in Fish Port Community: An Explorative Study on the Beliefs on Conception, Childbirth, and Maternal Care of Women in Navotas Fish Port Community

Authors: Marie Kristel A. Gabawa

Abstract:

The accessibility of health programs, specifically family planning programs and maternal and child health care (FP/MCH), are generally low in urban poor communities. Moreover, most of FP/MCH programs are directed toward medical terms that are usually not included in ideation of the body of urban poor dwellers. This study aims to explore the beliefs on reproduction that will encompass, but not limited to, beliefs on conception, pregnancy, and maternal and child health care. The site of study will be the 2 barangays of North Bay Boulevard South 1 (NBBS1) and North Bay Boulevard South 2 (NBBS2). These 2 barangays are the nearest residential community within the Navotas Fish Port Complex (NFPC). Data gathered will be analyzed using grounded-theory method of analysis, with the theories of cultural materialism and equity feminism as foundation. Survey questionnaires, key informant interviews, and focus group discussions will be utilized in gathering data. Further, the presentation of data will be recommended to health program initiators and use the data gathered as a tool to customize FP/MCH programs to the perception and beliefs of women residing in NBBS1and NBBS2, and to aid any misinformation for FP/MCH techniques.

Keywords: beliefs on reproduction, fish port community, family planning, maternal and child health care, Navotas

Procedia PDF Downloads 247
3565 A Study on Learning Styles and Academic Performance in Relation with Kinesthetic, Verbal and Visual Intelligences

Authors: Salina Budin, Nor Liawati Abu Othman, Shaira Ismail

Abstract:

This study attempts to determine kinesthetic, verbal and visual intelligences among mechanical engineering undergraduate students and explores any probable relation with students’ learning styles and academic performance. The questionnaire used in this study is based on Howard Gardner’s multiple intelligences theory comprising of five elements of learning style; environmental, sociological, emotional, physiological and psychological. Questionnaires are distributed amongst undergraduates in the Faculty of Mechanical Engineering. Additional questions on students’ perception of learning styles and their academic performance are included in the questionnaire. The results show that one third of the students are strongly dominant in the kinesthetic intelligent (33%), followed by a combination of kinesthetic and visual intelligences (29%) and 21% are strongly dominant in all three types of intelligences. There is a statistically significant correlation between kinesthetic, verbal and visual intelligences and students learning styles and academic performances. The ANOVA analysis supports that there is a significant relationship between academic performances and level of kinesthetic, verbal and visual intelligences. In addition, it has also proven a remarkable relationship between academic performances and kinesthetic, verbal and visual learning styles amongst the male and female students. Thus, it can be concluded that, academic achievements can be enhanced by understanding as well as capitalizing the students’ types of intelligences and learning styles.

Keywords: kinesthetic intelligent, verbal intelligent, visual intelligent, learning style, academic performances

Procedia PDF Downloads 285
3564 An Attempt to Explore Occupational Stressors among West Bengal Police Officials

Authors: Malini Nandi Majumdar, Avijan Dutta

Abstract:

The West Police (WBP) is restructured under provisions of the Police Act 1861 during the period of British domination. It is one of the two police forces of the Indian state of west Bengal and is headed by an officer designated as Director General of Police (DG) who directly reports to the State Government. It covers a jurisdiction with eighteen revenue districts of the state and a District Superintendent of Police (SP) controls each district. The purpose of this empirical study is to explore the causes and factors of occupational stress in West Bengal Police officers so that the incumbents can perform their assigned tasks more diligently and the society could be free from evils and devils at a large. Using a self-developed close ended questionnaire that covers 20 critical job-related stressors, the study captures 310 respondents across the organizational hierarchy ranging from Sub Inspectors to the Superintendant of police and covers 5 districts and one commision rate under the jurisdiction of West Bengal Police. The present research has successfully indicated four major occupational stressors such as Organizational Stressors, Hierarchical Stressors, Situational Stressors and Environmental Stressors with 64% of the variance. Further we have employed CFA to determine the goodness of fit indices in terms of i) Absolute Fit Measures like CMIN, FMIN, RMSEA, ECVI ii) Incremental Fit Measures like TLI, NFI, AGFI, CFI(Byne, 2010) demonstrate that value of the measure has passed the requirement criteria and thus fit the model. The major stressors of West Bengal Police have been explored and the ways to deal with these inevitable stressors have been suggested.

Keywords: organizational stressors, hierarchical stressors, situational stressors, environmental stressors

Procedia PDF Downloads 379
3563 A Sociolinguistic Investigation of Code-Switching Practices of ESL Students Outside EFL Classrooms

Authors: Shehroz Mukhtar, Maqsood Ahmed, Abdullah Mukhtar, Choudhry Shahid, Waqar Javaid

Abstract:

Code switching is a common phenomenon, generally observed in multilingual communities across the globe. A critical look at code-switching literature reveals that mostly code-switching has been studied in the classrooms in learning and teaching contexts, while code-switching outside the classroom in settings such as café, hostels and so on has been the least explored areas. The current research investigated the reasons for code-switching in the interactive practices of students and their perceptions regarding the same outside the classroom settings. This paper is the study of the common practice that prevails in the Universities of Sialkot that bilinguals mix two languages when they speak in different classroom situations. In Pakistani classrooms where Multilingual is in abundance, i.e. they can speak two or more two languages at the same time, code-switching or language combination is very common. The teachers of Sialkot switch from one language to another consciously or unconsciously while teaching English in the classrooms. This phenomenon has not been explored in Sialkot’s teaching context. In Sialkot, private educational institutes do not encourage code-switching, whereas public or government institutes use it frequently. The crux of this research is to investigate and identify the importance of code-switching by taking its users into consideration. The survey research method and survey questionnaire will be used to get exact data from teachers and students. We will try to highlight the functions and importance of code switching in foreign language classrooms of Sialkot and will explore why this trend is emerging in Sialkot.

Keywords: code switching, foreign language classrooms, bilingual context, use of L1, importance of L2.

Procedia PDF Downloads 39
3562 The Effect of Contextual Factors on Degree of Trust in Kuwaiti Business Organization

Authors: Ali Muhammad

Abstract:

The study investigates the effect of a number of contextual on the degree of trust within Kuwaiti business organizations. The model used in this study suggests that degree of trust within the organization is determined by four contextual variables, namely, centralization, formalization, role ambiguity, and procedural justice. Organizational trust refers to employee’ positive assumptions in regard to the goal and behaviors of other members in the organization according to organizational duties, relationships, experiences, and interrelatedness. According to the norm of reciprocity, individuals with high perceived organizational justice will be compelled to react positively to the organization in the form of higher degree of trust. The duty to exchange kindness for kindness. Based on the exchange theory, this research proposes that procedural justice, role clarity, and voice in the organization will lead to the perception of an organization’s discretionary positive treatment of employees and, in return enhances their trust in the organization. Survey data were collected from a sample of 206 employees working in Kuwaiti business organizations. Results of multiple regression analysis revealed that both organizational justice and formalization have positive effects on organizational trust. Furthermore, results indicate that lower degree of role ambiguity leads to higher degree of organizational trust. On the other hand, centralization was not found to have a significant effect on organizational trust. Implications of the findings and directions for future research are discussed.

Keywords: centralization, formalization, organizational justice, organizational trust, role ambiguity

Procedia PDF Downloads 173
3561 3D Object Detection for Autonomous Driving: A Comprehensive Review

Authors: Ahmed Soliman Nagiub, Mahmoud Fayez, Heba Khaled, Said Ghoniemy

Abstract:

Accurate perception is a critical component in enabling autonomous vehicles to understand their driving environment. The acquisition of 3D information about objects, including their location and pose, is essential for achieving this understanding. This survey paper presents a comprehensive review of 3D object detection techniques specifically tailored for autonomous vehicles. The survey begins with an introduction to 3D object detection, elucidating the significance of the third dimension in perceiving the driving environment. It explores the types of sensors utilized in this context and the corresponding data extracted from these sensors. Additionally, the survey investigates the different types of datasets employed, including their formats, sizes, and provides a comparative analysis. Furthermore, the paper categorizes and thoroughly examines the perception methods employed for 3D object detection based on the diverse range of sensors utilized. Each method is evaluated based on its effectiveness in accurately detecting objects in a three-dimensional space. Additionally, the evaluation metrics used to assess the performance of these methods are discussed. By offering a comprehensive overview of 3D object detection techniques for autonomous vehicles, this survey aims to advance the field of perception systems. It serves as a valuable resource for researchers and practitioners, providing insights into the techniques, sensors, and evaluation metrics employed in 3D object detection for autonomous vehicles.

Keywords: computer vision, 3D object detection, autonomous vehicles, deep learning

Procedia PDF Downloads 47
3560 Smart Security Concept in the East Mediterranean: Anti Asymmetrical Area Denial (A3D)

Authors: Serkan Tezgel

Abstract:

The two qualities of the sea, as a medium of transportation and as a resource, necessitate maritime security for economic stability and good order at sea. The borderless nature of the sea makes it one of the best platforms to contribute to regional peace and international order. For this reason, the establishment of maritime security in East Mediterranean will enhance the security-peace-democracy triangle in the region. This paper proposes the application of the Smart Security Concept in the East Mediterranean. Smart Security aims to secure critical infrastructure, such as hydrocarbon platforms, against asymmetrical threats. The concept is based on Anti Asymmetrical Area Denial (A3D) which necessitates limiting freedom of action of maritime terrorists and piracy by founding safe and secure maritime areas through sea lines of communication using short range capabilities. Smart Security is a regional maritime cooperation concept for the narrow seas. Cooperation and interoperability are essential attributes of this regional security concept. Therefore, multinational excellence centers such as Multinational Maritime Security Center of Excellence-Aksaz in Turkey, which will determine necessary capabilities and plan/coordinate workshops, training and exercises, are bound to be the principal characteristic of Smart Security concept and similar regional concepts. Smart Security, a crucial enabler of energy and regional security, can provide an enduring approach for operating in the challenging environment of narrow seas and for countering asymmetrical threats.

Keywords: security, cooperation, asymmetrical, area denial

Procedia PDF Downloads 794
3559 Urban Networks as Model of Sustainable Design

Authors: Agryzkov Taras, Oliver Jose L., Tortosa Leandro, Vicent Jose

Abstract:

This paper aims to demonstrate how the consideration of cities as a special kind of complex network, called urban network, may lead to the use of design tools coming from network theories which, in fact, results in a quite sustainable approach. There is no doubt that the irruption in contemporary thought of Gaia as an essential political agent proposes a narrative that has been extended to the field of creative processes in which, of course, the activity of Urban Design is found. The rationalist paradigm is put in crisis, and from the so-called sciences of complexity, its way of describing reality and of intervening in it is questioned. Thus, a new way of understanding reality surges, which has to do with a redefinition of the human being's own place in what is now understood as a delicate and complex network. In this sense, we know that in these systems of connected and interdependent elements, the influences generated by them originate emergent properties and behaviors for the whole that, individually studied, would not make sense. We believe that the design of cities cannot remain oblivious to these principles, and therefore this research aims to demonstrate the potential that they have for decision-making in the urban environment. Thus, we will see an example of action in the field of public mobility, another example in the design of commercial areas, and a third example in the field of redensification of sprawl areas, in which different aspects of network theory have been applied to change the urban design. We think that even though these actions have been developed in European cities, and more specifically in the Mediterranean area in Spain, the reflections and tools could have a broader scope of action.

Keywords: graphs, complexity sciences, urban networks, urban design

Procedia PDF Downloads 139
3558 Educating Empathy: Combining Active Listening and Moral Discovery to Facilitate Prosocial Connection

Authors: Erika Price, Lisa Johnson

Abstract:

Cognitive and dispositional empathy is decreasing among students worldwide, particularly those at university. This paper looks at the effects of encouraging empathetic positioning in divisive topics by teaching listening skills and moral discovery to university students. Two groups of university students were given the assignment to interview individuals they disagreed with on social issues (e.g. abortion, gun control, legalization of drugs, involvement in Ukraine, etc.). One group completed the assignment with no other instruction. The second group completed the assignment after receiving instruction in active listening and Jonathan Haidt’s theory of moral foundations in politics. Results show that when students are given both active listening techniques and awareness of moral foundations, they are significantly more likely to have socially positive interactions with those they disagree with on issues as compared to those who listen passively to ideological opponents. As students interacted with those they disagreed with, they evidenced prosocial behaviors of acknowledgement, validation, and even commonalities with their opponents’ viewpoints, signifying a heartening trend of empathetic connection that is waning in students. The research suggests that empathy is a skill that can be nurtured by active listening but that it is more fully cultivated when paired with the concept of moral foundations underpinning political ideologies. These findings shed light on how to create more effective pedagogies for social and emotional learning, as well as inclusion.

Keywords: empathy, listening skills, moral discovery, pedagogy, prosocial behavior

Procedia PDF Downloads 54
3557 Nurse's Use of Power to Standardize Nursing Terminology in Electronic Health Record

Authors: Samira Ali

Abstract:

Aim: The purpose of this study was to describe nurses’ potential use of power levels to influence the standardization of nursing terminology (SNT) in electronic health records. Also, to examine the relationship between nurses’ use of power levels and variables such as position, communication and the potential goal of achieving SNT in electronic health records. Background: In an era of evidence-based nursing care, with an emphasis on nursing’s ability to measure the care rendered and improve outcomes of care, little is known about the nurse’s potential use of their power to SNT in electronic health records and lack of use of an SNT in electronic health records. Method: This descriptive, correlational, and cross-sectional study was conducted using survey methodology to assess the nurse’s use of power to influence the SNT in electronic health records. The Theory of Group Power within Organizations (TGPO) provided the conceptual framework for this study. A total of (n=232) nurses responded to the survey, posted on three nursing organizations’ websites. Results revealed the mean Cronbach’s alpha of the subscales was .94, suggesting high internal consistency. The mean power capability score was moderately high, at 134.22 (SD = 18.49). Power Capacity was significantly correlated with Power Capability (r = .96, p < .001). Power Capacity subscales were significantly correlated with Power Capacity and Power Capability. Conclusion: The mean Cronbach’s alpha of the subscales was .94 suggestive of reliability of the instrument. Nurses could potentially use power to achieve their goals, such as the implementation of SNT in electronic health records.

Keywords: nurses, power, actualized power, nursing terminology, electronic health records

Procedia PDF Downloads 232
3556 Dynamic Process of Single Water Droplet Impacting on a Hot Heptane Surface

Authors: Mingjun Xu, Shouxiang Lu

Abstract:

Understanding the interaction mechanism between the water droplet and pool fire has an important significance in engineering application of water sprinkle/spray/mist fire suppression. The micro impact process is unclear when the droplet impacts on the burning liquid surface at present. To deepen the understanding of the mechanisms of pool fire suppression with water spray/mist, dynamic processes of single water droplet impinging onto a hot heptane surface are visualized with the aid of a high-speed digital camera at 2000 fps. Each test is repeated 20 times. The water droplet diameter is around 1.98 mm, and the impact Weber number ranges from 30 to 695. The heptane is heated by a hot plate to mimic the burning condition, and the temperature varies from 30 to 90°C. The results show that three typical phenomena, including penetration, crater-jet and surface bubble, are observed, and the pool temperature has a significant influence on the critical condition for the appearance of each phenomenon. A global picture of different phenomena is built according to impact Weber number and pool temperature. In addition, the pool temperature and Weber number have important influences on the characteristic parameters including maximum crater depth, crown height and liquid column height. For a fixed Weber number, the liquid column height increases with pool temperature.

Keywords: droplet impact, fire suppression, hot surface, water spray

Procedia PDF Downloads 224
3555 Assessing EU-China Security Interests from Contradiction to Convergence

Authors: Julia Gurol

Abstract:

Why do we observe a shift towards convergence in EU-China security interests? While contradicting attitudes towards key principles of inter-state and region-to-state relations, including state sovereignty, territorial integrity, and intervention policies have ever since hindered EU-China inter-regional cooperation beyond the economic realm, collaboration in peace and security issues is now becoming a key pillar of European-Chinese relations. In addition, the Belt and Road Initiative as most ambitious Chinese foreign policy project explicitly touches upon several European foreign policy and security preferences. Based on these counterintuitive findings, this paper traces the process of convergence of Sino-European security interests. Drawing on qualitative text analysis of official Chinese and European policy papers and documents from the establishment of diplomatic relations in 1975 until today, it assesses the striking change over time. On this basis, the paper uses theories of neo-functionalism, inter-regionalism, and securitization and borrows from constructivist views in International Relations’ theory, to expound possible motives for the change in Chinese and respectively European preferences in the security realm. The results reveal interesting insights into the decisive factors and motives behind both countries’ foreign policies. The paper concludes with a discussion of further potential and difficulties of EU-China security cooperation.

Keywords: belt and road initiative, China, European Union, foreign policy, neo-functionalism, security

Procedia PDF Downloads 268
3554 Combating Money Laundering and Inroads into Banking Secrecy: Evidence from Malaysia

Authors: Aspalella A. Rahman

Abstract:

It is widely accepted that the investigation of money laundering and the tracing and confiscation of criminal proceeds have intruded into the principles of banking secrecy. The inroads into banking secrecy present serious threats to democracy, and more importantly, to the traditional banker-customer relationship. It is generally accepted that the fight against money laundering is in conflict with the secrecy rule. Banking secrecy is a customer privilege whereas combating crime is critical for public safety and security. Indeed, achieving a proper balance is a desirable goal. But how we go about achieving such a balance is a question encountered by many law enforcement authorities. Therefore, this paper examines the effect of disclosure under the Malaysian anti-money laundering laws on the traditional duty of banks to keep the customer’s information confidential. It also analyzes whether the Malaysian laws provide a right balance between a duty to keep customer’s information secret and a duty to disclose such information in the fight against money laundering. On closer inspection, it is submitted that the Malaysian laws provide sufficient safeguards to ensure that the disclosure of customer’s information is carried out in a manner that is not prejudicial to the interest of legitimate customers. This is a positive approach that could protect the innocent customers from being mistreated by the law. Ultimately, it can be said that the growing threat of global money laundering and terrorism makes the overriding of banking secrecy justified because without a flow of information from the banks, the effective prevention of the menace is not possible.

Keywords: anti-money laundering law, banker-customer relationship, banking secrecy, confidentiality, money laundering

Procedia PDF Downloads 408
3553 An Evaluation of Neural Network Efficacies for Image Recognition on Edge-AI Computer Vision Platform

Authors: Jie Zhao, Meng Su

Abstract:

Image recognition, as one of the most critical technologies in computer vision, works to help machine-like robotics understand a scene, that is, if deployed appropriately, will trigger the revolution in remote sensing and industry automation. With the developments of AI technologies, there are many prevailing and sophisticated neural networks as technologies developed for image recognition. However, computer vision platforms as hardware, supporting neural networks for image recognition, as crucial as the neural network technologies, need to be more congruently addressed as the research subjects. In contrast, different computer vision platforms are deterministic to leverage the performance of different neural networks for recognition. In this paper, three different computer vision platforms – Jetson Nano(with 4GB), a standalone laptop(with RTX 3000s, using CUDA), and Google Colab (web-based, using GPU) are explored and four prominent neural network architectures (including AlexNet, VGG(16/19), GoogleNet, and ResNet(18/34/50)), are investigated. In the context of pairwise usage between different computer vision platforms and distinctive neural networks, with the merits of recognition accuracy and time efficiency, the performances are evaluated. In the case study using public imageNets, our findings provide a nuanced perspective on optimizing image recognition tasks across Edge-AI platforms, offering guidance on selecting appropriate neural network structures to maximize performance under hardware constraints.

Keywords: alexNet, VGG, googleNet, resNet, Jetson nano, CUDA, COCO-NET, cifar10, imageNet large scale visual recognition challenge (ILSVRC), google colab

Procedia PDF Downloads 67
3552 Cultivating Individuality and Equality in Education: A Literature Review on Respecting Dimensions of Diversity within the Classroom

Authors: Melissa C. Ingram

Abstract:

This literature review sought to explore the dimensions of diversity that can affect classroom learning. This review is significant as it can aid educators in reaching more of their diverse student population and creating supportive classrooms for teachers and students. For this study, peer-reviewed articles were found and compiled using Google Scholar. Key terms used in the search include student individuality, classroom equality, student development, teacher development, and teacher individuality. Relevant educational standards such as Common Core and Partnership for the 21st Century were also included as part of this review. Student and teacher individuality and equality is discussed as well as methods to grow both within educational settings. Embracing student and teacher individuality was found to be key as it may affect how each person interacts with given information. One method to grow individuality and equality in educational settings included drafting and employing revised teaching standards which include various Common Core and U.S. State standards. Another was to use educational theories such as constructivism, cognitive learning, and Experiential Learning Theory. However, barriers to growing individuality, such as not acknowledging differences in a population’s dimensions of diversity, still exist. Studies found preserving the dimensions of diversity owned by both teachers and students yielded more positive and beneficial classroom experiences.

Keywords: classroom equality, student development, student individuality, teacher development, teacher individuality

Procedia PDF Downloads 166
3551 Entrepreneurial Support Ecosystem: Role of Research Institutes

Authors: Ayna Yusubova, Bart Clarysse

Abstract:

This paper explores role of research institutes in creation of support ecosystem for new technology-based ventures. Previous literature introduced research institutes as part of business and knowledge ecosystem, very few studies are available that consider a research institute as an ecosystem that support high-tech startups at every stage of development. Based on a resource-based view and a stage-based model of high-tech startups growth, this study aims to analyze how a research institute builds a startup support ecosystem by attracting different stakeholders in order to help startups to overcome resource. This paper is based on an in-depth case study of public research institute that focus on development of entrepreneurial ecosystem in a developed region. Analysis shows that the idea generation stage of high-tech startups that related to the invention and development of product or technology for commercialization is associated with a lack of critical knowledge resources. Second, at growth phase that related to market entrance, high-tech startups face challenges associated with the development of their business network. Accordingly, the study shows the support ecosystem that research institute creates helps high-tech startups overcome resource gaps in order to achieve a successful transition from one phase of growth to the next.

Keywords: new technology-based firms, ecosystems, resources, business incubators, research instutes

Procedia PDF Downloads 246
3550 Modeling and Experimental Verification of Crystal Growth Kinetics in Glass Forming Alloys

Authors: Peter K. Galenko, Stefanie Koch, Markus Rettenmayr, Robert Wonneberger, Evgeny V. Kharanzhevskiy, Maria Zamoryanskaya, Vladimir Ankudinov

Abstract:

We analyze the structure of undercooled melts, crystal growth kinetics and amorphous/crystalline microstructure of rapidly solidifying glass-forming Pd-based and CuZr-based alloys. A dendrite growth model is developed using a combination of the kinetic phase-field model and mesoscopic sharp interface model. The model predicts features of crystallization kinetics in alloys from thermodynamically controlled growth (governed by the Gibbs free energy change on solidification) to the kinetically limited regime (governed by atomic attachment-detachment processes at the solid/liquid interface). Comparing critical undercoolings observed in the crystallization kinetics with experimental data on melt viscosity, atomistic simulation's data on liquid microstructure and theoretically predicted dendrite growth velocity allows us to conclude that the dendrite growth kinetics strongly depends on the cluster structure changes of the melt. The obtained data of theoretical and experimental investigations are used for interpretation of microstructure of samples processed in electro-magnetic levitator on board International Space Station in the frame of the project "MULTIPHAS" (European Space Agency and German Aerospace Center, 50WM1941) and "KINETIKA" (ROSKOSMOS).

Keywords: dendrite, kinetics, model, solidification

Procedia PDF Downloads 102
3549 Investigating the Experiences of Higher Education Academics on the Blended Approach Used during the Induction Course

Authors: Ann-May Marais

Abstract:

South African higher education institutions are following the global adoption of a blended approach to teaching and learning. Blended learning is viewed as a transformative teaching-learning approach, as it provides students with the optimum experience by mixing the best of face-to-face and online learning. Although academics realise the benefits of blended learning, they find it challenging and time-consuming to implement blended strategies. Professional development is a critical component of the adoption of higher education teaching-learning approaches. The Institutional course for higher education academics offered at a South African University was designed in a blended model, implemented and evaluated. This paper reports on a study that investigated the experiences of academics on the blended approach used during the induction course. A qualitative design-based research methodology was employed, and data was collected using participant feedback and document analysis. The data gathered from each of the four ICNL offerings were used to inform the design of the next course. Findings indicated that lecturers realised that blended learning could cater to student diversity, different learning styles, engagement, and innovation. Furthermore, it emerged that the course has to cater for diversity in technology proficiency and readiness of participants. Participants also require ongoing support in technology usage and discipline-specific blended learning workshops. This paper contends that the modelling of a blended approach to professional development can be an effective way to motivate academics to apply blended learning in their teaching-learning experiences.

Keywords: blended learning, professional development, induction course, integration of technology

Procedia PDF Downloads 149
3548 Integration from Laboratory to Industrialization for Hybrid Printed Electronics

Authors: Ahmed Moulay, Mariia Zhuldybina, Mirko Torres, Mike Rozel, Ngoc Duc Trinh, Chloé Bois

Abstract:

Hybrid printed electronics technology (HPE) provides innovative opportunities to enhance conventional electronics applications, which are often based on printed circuit boards (PCB). By combining the best of both performance from conventional electronic components and the flexibility from printed circuits makes it possible to manufacture HPE at high volumes using roll-to-roll printing processes. However, several challenges must be overcome in order to accurately integrate an electronic component on a printed circuit. In this presentation, we will demonstrate the integration process of electronic components from the lab scale to the industrialization. Both the printing quality and the integration technique must be studied to define the optimal conditions. To cover the parameters that influence the print quality of the printed circuit, different printing processes, flexible substrates, and conductive inks will be used to determine the optimized printing process/ink/substrate system. After the systems is selected, an electronic component of 2.5 mm2 chip size will be integrated to validate the functionality of the printed, electronic circuit. Critical information such as the conductive adhesive, the curing conditions, and the chip encapsulation will be determined. Thanks to these preliminary results, we are able to demonstrate the chip integration on a printed circuit using industrial equipment, showing the potential of industrialization, compatible using roll-to-roll printing and integrating processes.

Keywords: flat bed screen-printing, hybrid printed electronics, integration, large-scale production, roll-to-roll printing, rotary screen printing

Procedia PDF Downloads 161
3547 An Evaluative Microbiological Risk Assessment of Drinking Water Supply in the Carpathian Region: Identification of Occurrent Hazardous Bacteria with Quantitative Microbial Risk Assessment Method

Authors: Anikó Kaluzsa

Abstract:

The article's author aims to introduce and analyze those microbiological safety hazards which indicate the presence of secondary contamination in the water supply system. Since drinking water belongs to primary foods and is the basic condition of life, special attention should be paid on its quality. There are such indicators among the microbiological features can be found in water, which are clear evidence of the presence of water contamination, and based on this there is no need to perform other diagnostics, because they prove properly the contamination of the given water supply section. Laboratory analysis can help - both technologically and temporally – to identify contamination, but it does matter how long takes the removal and if the disinfection process takes place in time. The identification of the factors that often occur in the same places or the chance of their occurrence is greater than the average, facilitates our work. The pathogen microbiological risk assessment by the help of several features determines the most likely occurring microbiological features in the Carpathian basin. From among all the microbiological indicators, that are recommended targets for routine inspection by the World Health Organization, there is a paramount importance of the appearance of Escherichia coli in the water network, as its presence indicates the potential ubietiy of enteric pathogens or other contaminants in the water network. In addition, the author presents the steps of microbiological risk assessment analyzing those pathogenic micro-organisms registered to be the most critical.

Keywords: drinking water, E. coli, microbiological indicators, risk assessment, water safety plan

Procedia PDF Downloads 319
3546 A Proposal for Developing a Post Occupancy Evaluation Sustainability Assessment Tool for Refurbished Historic Government Buildings

Authors: Hasnizan Aksah, Adi Irfan Che Ani

Abstract:

Refurbished historic government buildings should perform as intended to support the organization’s goals that enhance occupant satisfaction. However, these buildings may have issues associated with functional performance evaluation. The aim of this study is to develop a Post Occupancy Evaluation (POE) sustainability assessment tool for functional performance evaluation of refurbished historic government buildings. Developing an assessment tool requires a strategic methodology for a logical and cohesive tool that incorporating relevant theories and practical experiences. In this study, mixed method approaches use to collect all necessary data to achieve the objectives of this study. The design of sampling involves are interviews and survey questionnaires to relevant professionals in order to evaluate the criteria and problem encircled in functional performance evaluation. Then, the involvement of expert panels is required in establishing the assessment tool. During the process of investigation on the functional performance criteria, it was discovered that is seen to be critical in aspects of comfort, safety, and services. The proposed assessment tool has a significant role in providing opportunities for the improvement of building performance especially on functional performance for the future historic government building refurbishment project. It is hoped that the tool developed from this study will give benefits to related professionals, public agencies, local municipality, and relevant interested parties in historic building management.

Keywords: refurbished historic government buildings, functional performance, Post Occupancy Evaluation, sustainability

Procedia PDF Downloads 186
3545 A Discourse on the Rhythmic Pattern Employed in Yoruba Sakara Music of Nigeria

Authors: Oludare Olupemi Ezekiel

Abstract:

This research examines the rhythmic structure of Sakara music by tracing its roots and analyzing the various rhythmic patterns of this neo-traditional genre, as well as the contributions of the major exponents and contemporary practitioners, using these as a model for understanding and establishing African rhythms. Biography of the major exponents and contemporary practitioners, interviews and participant observational methods were used to elicit information. Samples of the genre which were chosen at random were transcribed, notated and analyzed for academic use and documentation. The research affirmed that rhythms such as the Hemiola, Cross-rhythm, Clave or Bell rhythm, Percussive, Speech and Melodic rhythm and other relevant rhythmic theories were prevalent and applicable to Sakara music, while making important contributions to musical scholarship through its analysis of the music. The analysis and discussions carried out in the research pointed towards a conclusion that the Yoruba musicians are guided by some preconceptions and sound musical considerations in making their rhythmic patterns, used as compositional techniques and not mere incidental occurrence. These rhythmic patterns, with its consequential socio-cultural connotations, enhance musical values and national identity in Nigeria. The study concludes by recommending that musicologists need to carry out more research into this and other neo-traditional genres in order to advance the globalisation of African music.

Keywords: compositional techniques, globalisation, identity, neo-traditional, rhythmic theory, Sakara music

Procedia PDF Downloads 423
3544 Time Delayed Susceptible-Vaccinated-Infected-Recovered-Susceptible Epidemic Model along with Nonlinear Incidence and Nonlinear Treatment

Authors: Kanica Goel, Nilam

Abstract:

Infectious diseases are a leading cause of death worldwide and hence a great challenge for every nation. Thus, it becomes utmost essential to prevent and reduce the spread of infectious disease among humans. Mathematical models help to better understand the transmission dynamics and spread of infections. For this purpose, in the present article, we have proposed a nonlinear time-delayed SVIRS (Susceptible-Vaccinated-Infected-Recovered-Susceptible) mathematical model with nonlinear type incidence rate and nonlinear type treatment rate. Analytical study of the model shows that model exhibits two types of equilibrium points, namely, disease-free equilibrium and endemic equilibrium. Further, for the long-term behavior of the model, stability of the model is discussed with the help of basic reproduction number R₀ and we showed that disease-free equilibrium is locally asymptotically stable if the basic reproduction number R₀ is less than one and unstable if the basic reproduction number R₀ is greater than one for the time lag τ≥0. Furthermore, when basic reproduction number R₀ is one, using center manifold theory and Casillo-Chavez and Song theorem, we showed that the model undergoes transcritical bifurcation. Moreover, numerical simulations are being carried out using MATLAB 2012b to illustrate the theoretical results.

Keywords: nonlinear incidence rate, nonlinear treatment rate, stability, time delayed SVIRS epidemic model

Procedia PDF Downloads 138
3543 A Novel Approach to Design and Implement Context Aware Mobile Phone

Authors: G. S. Thyagaraju, U. P. Kulkarni

Abstract:

Context-aware computing refers to a general class of computing systems that can sense their physical environment, and adapt their behaviour accordingly. Context aware computing makes systems aware of situations of interest, enhances services to users, automates systems and personalizes applications. Context-aware services have been introduced into mobile devices, such as PDA and mobile phones. In this paper we are presenting a novel approaches used to realize the context aware mobile. The context aware mobile phone (CAMP) proposed in this paper senses the users situation automatically and provides user context required services. The proposed system is developed by using artificial intelligence techniques like Bayesian Network, fuzzy logic and rough sets theory based decision table. Bayesian Network to classify the incoming call (high priority call, low priority call and unknown calls), fuzzy linguistic variables and membership degrees to define the context situations, the decision table based rules for service recommendation. To exemplify and demonstrate the effectiveness of the proposed methods, the context aware mobile phone is tested for college campus scenario including different locations like library, class room, meeting room, administrative building and college canteen.

Keywords: context aware mobile, fuzzy logic, decision table, Bayesian probability

Procedia PDF Downloads 351
3542 The Influence of Knowledge Spillovers on High-Impact Firm Growth: A Comparison of Indigenous and Foreign Firms

Authors: Yazid Abdullahi Abubakar, Jay Mitra

Abstract:

This paper is concerned with entrepreneurial high-impact firms, which are firms that generate ‘both’ disproportionate levels of employment and sales growth, and have high levels of innovative activity. It investigates differences in factors influencing high-impact growth between indigenous and foreign firms. The study is based on an analysis of data from United Kingdom (UK) Innovation Scoreboard on 865 firms, which were divided into high-impact firms (those achieving positive growth in both sales and employment) and low-impact firms (negative or no growth in sales or employment); in order to identifying the critical differences in regional, sectorial and size related factors that facilitate knowledge spillovers and high-impact growth between indigenous and foreign firms. The findings suggest that: 1) Firms’ access to regional knowledge spillovers (from businesses and higher education institutions) is more significantly associated with high-impact growth of UK firms in comparison to foreign firms, 2) Because high-tech sectors have greater use of knowledge spillovers (compared to low-tech sectors), high-tech sectors are more associated with high-impact growth, but the relationship is stronger for UK firms compared to foreign firms, 3) Because small firms have greater need for knowledge spillovers (relative to large firms), there is a negative relationship between firm size and high-impact growth, but the negative relationship is greater for UK firms in comparison to foreign firms.

Keywords: entrepreneurship, high-growth, indigenous firms, foreign firms, small firms, large firms

Procedia PDF Downloads 414
3541 The Effect of Body Positioning on Upper-Limb Arterial Occlusion Pressure and the Reliability of the Method during Blood Flow Restriction Training

Authors: Stefanos Karanasios, Charkleia Koutri, Maria Moutzouri, Sofia A. Xergia, Vasiliki Sakellari, George Gioftsos

Abstract:

The precise calculation of arterial occlusive pressure (AOP) is a critical step to accurately prescribe individualized pressures during blood flow restriction training (BFRT). AOP is usually measured in a supine position before training; however, previous reports suggested a significant influence in lower limb AOP across different body positions. The aim of the study was to investigate the effect of three different body positions on upper limb AOP and the reliability of the method for its standardization in clinical practice. Forty-two healthy participants (Mean age: 28.1, SD: ±7.7) underwent measurements of upper limb AOP in supine, seated, and standing positions by three blinded raters. A cuff with a manual pump and a pocket doppler ultrasound were used. A significantly higher upper limb AOP was found in seated compared with supine position (p < 0.031) and in supine compared with standing position (p < 0.031) by all raters. An excellent intraclass correlation coefficient (0.858- 0.984, p < 0.001) was found in all positions. Upper limb AOP is strongly dependent on body position changes. The appropriate measurement position should be selected to accurately calculate AOP before BFRT. The excellent inter-rater reliability and repeatability of the method suggest reliable and consistent results across repeated measurements.

Keywords: Kaatsu training, blood flow restriction training, arterial occlusion, reliability

Procedia PDF Downloads 191
3540 A Constitutional Theory of the American Presidency

Authors: Elvin Lim

Abstract:

This article integrates the debate about presidential powers with the debate about federalism, arguing that there are two ways of exercising presidential powers, one working in tandem with expanding federal powers, and the other working against it. Alexander Hamilton and Thomas Jefferson—the former a Federalist and the latter echoing the views of many Anti-Federalists—disagreed not only on the constitutional basis of prerogative, but also on the ends for which it should be deployed. This tension has always existed in American politics, and is reproduced today. Modern Democrats and Republicans both want a strong executive, but the Democrats who want a strong executive to pass legislation to expand the reach of the federal government; naturally, they must rely on an equally empowered Congress to do so. Republicans generally do not want an intrusive federal government, which is why their defense of a strong presidency does not come alongside a call for a strong Congress. This distinction cannot be explained without recourse to foundational yet opposing views about the appropriate role of federal power. When we bring federalism back in, we see that there are indeed two presidencies; one neo-Federalist, in favor of moderate presidential prerogative alongside a robust Congress directed collectively to a national state-building agenda and expanding the federal prerogative; another, neo-Anti-Federalist, in favor of expansive presidential prerogative and an ideologically sympathetic Congress equally suspicious of federal power to retard or roll back national state-building in favour of states rights.

Keywords: US presidency, federalism, prerogative, anti-federalism

Procedia PDF Downloads 102