Search results for: idea and belief
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 1898

Search results for: idea and belief

1178 Jalal-Ale-Ahmad and ‘Critical Consciousness’: A Comparative Study

Authors: Zohreh Ramin

Abstract:

One of the most important contributions that Edward Said has had in the realm of critical theory is his insistence on the worldliness of the text and the critic. By this, Said meant that the critic and the text must be considered in their ‘material’ contexts. Foregrounding the substantial role of a critic as embodying what he refers to as ‘critical consciousness’, a true critic, Said maintains, is one who can stand between the ‘dominant culture’ and ‘the totalizing forms of critical systems.’ Considered as one of Iran’s major contemporary intellectuals, Jalal Ale Ahmad is responsible for introducing the idea of ‘Westoxication’ in Iran, constructing a social paradigm of the necessity to return to tradition in contemporary Iran. The present paper intends to study Al-Ahmad’s definition of the orient versus the occident, his criticism of the ‘machination’ of contemporary Iranian society, and his solution to the problem of ‘Westoxication’. The objective of this study is to see whether Ale Ahmad can be considered as embodying the spirit of ‘critical consciousness’ as described by Said as the necessary tool in the hands of an intellectual who is simultaneously attached filitavely to his culture but can detach himself affilitavely through employing critical consciousness.

Keywords: Westoxication, filiative, affiliative, machination

Procedia PDF Downloads 168
1177 Public-Public Partnership and Tourism Development Strategy: The Case of Municipality of Gazi Baba in Macedonia

Authors: Dejan Metodijeski, Elizabeta Mitreva, Nako Taskov, Oliver Filiposki

Abstract:

Tourism development strategies are an important link in the tourism policy that is used to make its management better and easier. A public-public partnership (PUP) is a partnership between two or more public authorities or between a public authority and any non-profit organization with the goal of providing services and facilities or transferring technical skills. The paper presents this kind of partnership between two public authorities in Macedonia, the Municipality of Gazi Baba on one hand, and the University of Goce Delcev on the other. The main idea of this partnership is the development of a tourism strategy for the Municipality of Gazi Baba by the University on one side, and on the other, the construction of a mini park in the court of the University by the Municipality. This paper presents the causes and analyzes the procedures relating to this partnership and the methodology of the tourism development strategy. It contains a relevant literature review related to PUPs and tourism development strategy. The results and benefits of this partnership are presented with figures.

Keywords: public-public partnership, tourism development strategy, municipality of Gazi Baba, Macedonia

Procedia PDF Downloads 345
1176 Making Use of Content and Language Integrated Learning for Teaching Entrepreneurship and Neuromarketing to Master Students: Case Study

Authors: Svetlana Polskaya

Abstract:

The study deals with the issue of using the Content and Language Integrated Learning (CLIL) concept when teaching Master Program students majoring in neuromarketing and entrepreneurship. Present-day employers expect young graduates to conduct professional communication with their English-speaking peers and demonstrate proper knowledge of the industry’s terminology and jargon. The idea of applying CLIL was the result of the above-mentioned students possessing high proficiency in English, thus, not requiring any further knowledge of the English language in terms of traditional grammar or lexis. Due to this situation, a CLIL-type program was devised, allowing learners to acquire new knowledge of entrepreneurship and neuromarketing spheres combined with simultaneous honing their English language practical usage. The case study analyzes CLIL application within this particular program as well as the experience accumulated in the process.

Keywords: CLIL, entrepreneurship, neuromarketing, foreign language acquisition, proficiency level

Procedia PDF Downloads 78
1175 Strategies and Approaches for Curriculum Development and Training of Faculty in Cybersecurity Education

Authors: Lucy Tsado

Abstract:

As cybercrime and cyberattacks continue to increase, the need to respond will follow suit. When cybercrimes occur, the duty to respond sometimes falls on law enforcement. However, criminal justice students are not taught concepts in cybersecurity and digital forensics. There is, therefore, an urgent need for many more institutions to begin teaching cybersecurity and related courses to social science students especially criminal justice students. However, many faculty in universities, colleges, and high schools are not equipped to teach these courses or do not have the knowledge and resources to teach important concepts in cybersecurity or digital forensics to criminal justice students. This research intends to develop curricula and training programs to equip faculty with the skills to meet this need. There is a current call to involve non-technical fields to fill the cybersecurity skills gap, according to experts. There is a general belief among non-technical fields that cybersecurity education is only attainable within computer science and technologically oriented fields. As seen from current calls, this is not entirely the case. Transitioning into the field is possible through curriculum development, training, certifications, internships and apprenticeships, and competitions. There is a need to identify how a cybersecurity eco-system can be created at a university to encourage/start programs that will lead to an interest in cybersecurity education as well as attract potential students. A short-term strategy can address this problem through curricula development, while a long-term strategy will address developing training faculty to teach cybersecurity and digital forensics. Therefore this research project addresses this overall problem in two parts, through curricula development for the criminal justice discipline; and training of faculty in criminal justice to teaching the important concepts of cybersecurity and digital forensics.

Keywords: cybersecurity education, criminal justice, curricula development, nontechnical cybersecurity, cybersecurity, digital forensics

Procedia PDF Downloads 93
1174 A Semi-Implicit Phase Field Model for Droplet Evolution

Authors: M. H. Kazemi, D. Salac

Abstract:

A semi-implicit phase field method for droplet evolution is proposed. Using the phase field Cahn-Hilliard equation, we are able to track the interface in multiphase flow. The idea of a semi-implicit finite difference scheme is reviewed and employed to solve two nonlinear equations, including the Navier-Stokes and the Cahn-Hilliard equations. The use of a semi-implicit method allows us to have larger time steps compared to explicit schemes. The governing equations are coupled and then solved by a GMRES solver (generalized minimal residual method) using modified Gram-Schmidt orthogonalization. To show the validity of the method, we apply the method to the simulation of a rising droplet, a leaky dielectric drop and the coalescence of drops. The numerical solutions to the phase field model match well with existing solutions over a defined range of variables.

Keywords: coalescence, leaky dielectric, numerical method, phase field, rising droplet, semi-implicit method

Procedia PDF Downloads 462
1173 Agegraphic Dark Energy with GUP

Authors: H. R. Fazlollahi

Abstract:

Dark Energy origin is unknown and so describing this mysterious component in large scale structure needs to manipulate our theories in general relativity. Although in most models, dark energy arises from extra terms through modifying Einstein-Hilbert action, maybe its origin traces back to fundamental aspects of ground energy of space-time given in quantum mechanics. Hence, diluting space-time in general relativity with quantum mechanics properties leads to the Karolyhazy relation corresponding energy density of quantum fluctuations of space-time. Through generalized uncertainty principle and an eye to Karolyhazy approach in this study we extend energy density of quantum fluctuations of space-time. Also, the application of this idea is considered in late time evolution and we have shown how extra term in generalized uncertainty principle plays as a plausible interaction term role in suggested model.

Keywords: generalized uncertainty principle, karolyhazy approach, agegraphic dark energy, cosmology

Procedia PDF Downloads 65
1172 Proactive WPA/WPA2 Security Using DD-WRT Firmware

Authors: Mustafa Kamoona, Mohamed El-Sharkawy

Abstract:

Although the latest Wireless Local Area Network technology Wi-Fi 802.11i standard addresses many of the security weaknesses of the antecedent Wired Equivalent Privacy (WEP) protocol, there are still scenarios where the network security are still vulnerable. The first security model that 802.11i offers is the Personal model which is very cheap and simple to install and maintain, yet it uses a Pre Shared Key (PSK) and thus has a low to medium security level. The second model that 802.11i provide is the Enterprise model which is highly secured but much more expensive and difficult to install/maintain and requires the installation and maintenance of an authentication server that will handle the authentication and key management for the wireless network. A central issue with the personal model is that the PSK needs to be shared with all the devices that are connected to the specific Wi-Fi network. This pre-shared key, unless changed regularly, can be cracked using offline dictionary attacks within a matter of hours. The key is burdensome to change in all the connected devices manually unless there is some kind of algorithm that coordinate this PSK update. The key idea of this paper is to propose a new algorithm that proactively and effectively coordinates the pre-shared key generation, management, and distribution in the cheap WPA/WPA2 personal security model using only a DD-WRT router.

Keywords: Wi-Fi, WPS, TLS, DD-WRT

Procedia PDF Downloads 221
1171 Analysis of Resource Consumption Accounting as a New Approach to Management Accounting

Authors: Yousef Rostami Gharainy

Abstract:

This paper presents resource consumption accounting as an imaginative way to deal with management accounting which concentrates on administrators as the essential clients of the data and gives the best information of conventional management accounting. This system underscores that association's asset reasons costs, accordingly in costing frameworks the emphasis ought to be on assets and utilization of them. Resource consumption accounting consolidates two costing methodologies, action based and German cost accounting method known as GPK. This methodology notwithstanding giving a chance to managers to decide, makes task management accounting as operational. The reason for this article is to clarify the idea of resource consumption accounting, its parts and highlights and use of this strategy in associations. In the first place we deliver to presentation of resource consumption accounting, foundation, reasons for its development and the issues that past costing frameworks confronted it. At that point we give standards and presumptions of this technique; at last we depict the execution of this strategy in associations and its preferences over other costing strategies.

Keywords: resource consumption accounting, management accounting, action based method, German cost accounting method

Procedia PDF Downloads 297
1170 Comparing the Effects of Systemic Family Intervention on End Stage Renal Disease: Families of Different Modalities

Authors: Fenni Sim

Abstract:

Background: The application of systemic family therapy approaches to community health cases have not gathered traction. In National Kidney Foundation, Singapore, the belief is that community support has great potential in helping End Stage Renal Failure (ESRF) patients manage the demands of their treatment regime, whether Hemodialysis (HD) or Peritoneal Dialysis(PD) and sustain them on the treatment. However, the current community support does not include family interventions and is largely nursing based. Although nursing support is well provided to patients, and their family members in issues related to treatment and compliance, complex family issues and dynamics arising from caregiver strain or pre-dialysis relationship strain might deter efforts in managing the challenges of the treatment. Objective: The objective of the study is to understand the potential scope of work provided by a social worker who is trained in systemic family therapy and the effects of these interventions. Methodology: 3 families on HD and 3 families on PD who have been receiving family intervention for the past 6 months would be chosen for the study. A qualitative interview would be conducted to review the effectiveness for the family. Scales such as SCORE-15, PHQ-9, and Zarit Burden were used to measure family functioning, depression, and caregiver’s burden for the families. Results: The research is still in preliminary phase. Conclusion: The study highlights the importance of family intervention for families with multiple stressors on different treatment modalities who might have different needs and challenges. Nursing support needs to be complemented with family-based support to manage complex family issues in order to achieve better health outcomes and improved family coping.

Keywords: complementing nursing support, end stage renal failure, healthcare, systemic approaches

Procedia PDF Downloads 192
1169 India’s Foreign Policy toward its South Asian Neighbors: Retrospect and Prospect

Authors: Debasish Nandy

Abstract:

India’s foreign policy towards all of her neighbor countries is determinate on the basis of multi-dimensional factors. India’s relations with its South Asian neighbor can be classified into three categories. In the first category, there are four countries -Sri Lanka, Bangladesh, Nepal, and Afghanistan- whose bilateral relationships have encompassed cooperation, irritants, problems and crisis at different points in time. With Pakistan, the relationship has been perpetually adversarial. The third category includes Bhutan and Maldives whose relations are marked by friendship and cooperation, free of any bilateral problems. It is needless to say that Jawaharlal Nehru emphasized on friendly relations with the neighboring countries. The subsequent Prime Ministers of India especially I.K. Gujral had advocated in making of peaceful and friendly relations with the subcontinental countries. He had given a unique idea to foster bilateral relations with the neighbors. His idea is known as ‘Gujral Doctrine’. A dramatical change has been witnessed in Indian foreign policy since 1991.In the post-Cold War period, India’s national security has been vehemently threatened by terrorism, which originated from Pakistan-Afghanistan and partly Bangladesh. India has required a cooperative security, which can be made by mutual understanding among the South Asian countries. Additionally, the countries of South Asia need to evolve the concept of ‘Cooperative Security’ to explain the underlying logic of regional cooperation. According to C. Rajamohan, ‘cooperative security could be understood, as policies of governments, which see themselves as former adversaries or potential adversaries to shift from or avoid confrontationist policies.’ A cooperative security essentially reflects a policy of dealing peacefully with conflicts, not merely by abstention from violence or threats but by active engagement in negotiation, a search for practical solutions and with a commitment to preventive measures. Cooperative assumes the existence of a condition in which the two sides possess the military capabilities to harm each other. Establishing cooperative security runs into a complex process building confidence. South Asian nations often engaged with hostility to each other. Extra-regional powers have been influencing their powers in this region since a long time. South Asian nations are busy to purchase military equipment. In spite of weakened economic systems, these states are spending a huge amount of money for their security. India is the big power in this region in every aspect. The big states- small states syndrome is a negative factor in this respect. However, India will have to an initiative to extended ‘track II diplomacy’ or soft diplomacy for its security as well as the security of this region.Confidence building measures could help rejuvenate not only SAARC but also build trust and mutual confidence between India and its neighbors in South Asia. In this paper, I will focus on different aspects of India’s policy towards it, South-Asian neighbors. It will also be searched that how India is dealing with these countries by using a mixed type of diplomacy – both idealistic and realistic points of view. Security and cooperation are two major determinants of India’s foreign policy towards its South Asian neighbors.

Keywords: bilateral, diplomacy, infiltration, terrorism

Procedia PDF Downloads 528
1168 Jointly Learning Python Programming and Analytic Geometry

Authors: Cristina-Maria Păcurar

Abstract:

The paper presents an original Python-based application that outlines the advantages of combining some elementary notions of mathematics with the study of a programming language. The application support refers to some of the first lessons of analytic geometry, meaning conics and quadrics and their reduction to a standard form, as well as some related notions. The chosen programming language is Python, not only for its closer to an everyday language syntax – and therefore, enhanced readability – but also for its highly reusable code, which is of utmost importance for a mathematician that is accustomed to exploit already known and used problems to solve new ones. The purpose of this paper is, on one hand, to support the idea that one of the most appropriate means to initiate one into programming is throughout mathematics, and reciprocal, one of the most facile and handy ways to assimilate some basic knowledge in the study of mathematics is to apply them in a personal project. On the other hand, besides being a mean of learning both programming and analytic geometry, the application subject to this paper is itself a useful tool for it can be seen as an independent original Python package for analytic geometry.

Keywords: analytic geometry, conics, python, quadrics

Procedia PDF Downloads 284
1167 Testing Method of Soil Failure Pattern of Sand Type as an Effort to Minimize the Impact of the Earthquake

Authors: Luthfi Assholam Solamat

Abstract:

Nowadays many people do not know the soil failure pattern as an important part in planning the under structure caused by the loading occurs. This is because the soil is located under the foundation, so it cannot be seen directly. Based on this study, the idea occurs to do a study for testing the soil failure pattern, especially the type of sand soil under the foundation. The necessity of doing this to the design of building structures on the land which is the initial part of the foundation structure that met with waves/vibrations during an earthquake. If the underground structure is not strong it is feared the building thereon more vulnerable to the risk of building damage. This research focuses on the search of soil failure pattern, which the most applicable in the field with the loading periodic re-testing of a particular time with the help of the integrated video visual observations performed. The results could be useful for planning under the structure in an effort to try the upper structure is minimal risk of the earthquake.

Keywords: soil failure pattern, earthquake, under structure, sand soil testing method

Procedia PDF Downloads 344
1166 Using Happening Performance in Vocabulary Teaching

Authors: Mustafa Gultekin

Abstract:

It is believed that drama can be used in language classes to create a positive atmosphere for students to use the target language in an interactive way. Thus, drama has been extensively used in many settings in language classes. Although happening has been generally used as a performance art of theatre, this new kind of performance has not been widely known in language teaching area. Therefore, it can be an innovative idea to use happening in language classes, and thus a positive environment can be created for students to use the language in an interactive way. Happening can be defined as an art performance that puts emphasis on interaction in an audience. Because of its interactive feature, happening can also be used in language classes to motivate students to use the language in an interactive environment. The present study aims to explain how a happening performance can be applied to a learning environment to teach vocabulary in English. In line with this purpose, a learning environment was designed for a vocabulary presentation lesson. At the end of the performance, students were asked to compare the traditional way of teaching and happening performance in terms of effectiveness. It was found that happening performance provided the students with a more creative and interactive environment to use the language. Therefore, happening can be used in language classrooms as an innovative tool for education.

Keywords: English, happening, language learning, vocabulary teaching

Procedia PDF Downloads 357
1165 Rising Individual Responsibility in Healthcare: A Case Study of China

Authors: Ziyu Liu, Martin Buijsen

Abstract:

Although great achievements have been made since the beginning of the Chinese healthcare system reform in 1978, there still remain unresolved problems. Currently, the two leading social issues are accessibility and affordability of healthcare. Facing those challenges, Chinese government initiated the third round of healthcare system reform, accompanied by an array of measures. The newly launched strategies show a tendency to deliver healthcare as welfare goods, achieving equality through an ex-post perspective instead of an ex-ante view. However, if the reform efforts rely solely on the notion of “welfare”, the wrong idea of the government as the only duty-bearer in healthcare will arise. Several major threats, such as high costs as a result of inefficiencies and free riding then become imminent. Therefore, on the basis of Dworkin’s theory, this paper argues that individual responsibility should be introduced when constructing a sustainable healthcare system. And it should be equally highlighted as the duties of government. Furthermore, the notion of individual responsibility is believed to be necessary for promoting the justice of a healthcare system.

Keywords: Chinese healthcare system reform, individual responsibility, right to healthcare, social justice

Procedia PDF Downloads 493
1164 Formulating a Flexible-Spread Fuzzy Regression Model Based on Dissemblance Index

Authors: Shih-Pin Chen, Shih-Syuan You

Abstract:

This study proposes a regression model with flexible spreads for fuzzy input-output data to cope with the situation that the existing measures cannot reflect the actual estimation error. The main idea is that a dissemblance index (DI) is carefully identified and defined for precisely measuring the actual estimation error. Moreover, the graded mean integration (GMI) representation is adopted for determining more representative numeric regression coefficients. Notably, to comprehensively compare the performance of the proposed model with other ones, three different criteria are adopted. The results from commonly used test numerical examples and an application to Taiwan's business monitoring indicator illustrate that the proposed dissemblance index method not only produces valid fuzzy regression models for fuzzy input-output data, but also has satisfactory and stable performance in terms of the total estimation error based on these three criteria.

Keywords: dissemblance index, forecasting, fuzzy sets, linear regression

Procedia PDF Downloads 345
1163 Face Tracking and Recognition Using Deep Learning Approach

Authors: Degale Desta, Cheng Jian

Abstract:

The most important factor in identifying a person is their face. Even identical twins have their own distinct faces. As a result, identification and face recognition are needed to tell one person from another. A face recognition system is a verification tool used to establish a person's identity using biometrics. Nowadays, face recognition is a common technique used in a variety of applications, including home security systems, criminal identification, and phone unlock systems. This system is more secure because it only requires a facial image instead of other dependencies like a key or card. Face detection and face identification are the two phases that typically make up a human recognition system.The idea behind designing and creating a face recognition system using deep learning with Azure ML Python's OpenCV is explained in this paper. Face recognition is a task that can be accomplished using deep learning, and given the accuracy of this method, it appears to be a suitable approach. To show how accurate the suggested face recognition system is, experimental results are given in 98.46% accuracy using Fast-RCNN Performance of algorithms under different training conditions.

Keywords: deep learning, face recognition, identification, fast-RCNN

Procedia PDF Downloads 129
1162 A Two Arm Double Parallel Randomized Controlled Trail of the Effects of Health Education Intervention on Insecticide Treated Nets Use and Its Practices among Pregnant Women Attending Antenatal Clinic: Study Protocol

Authors: Opara Monica, Suriani Ismail, Ahmad Iqmer Nashriq Mohd Nazan

Abstract:

The true magnitude of the mortality and morbidity attributable to malaria worldwide is, at best, a scientific guess, although it is not disputable that the greatest burden is in sub-Saharan Africa. Those at highest risk are children younger than 5 years and pregnant women, particularly primigravidae. Nationally, malaria remains the third leading cause of death and is still considered a major public health problem. Therefore, this study is aimed to assess the effectiveness of health education intervention on insecticide-treated net use and its practices among pregnant women attending antenatal clinics. Materials and Methods: This study will be an intervention study with two arms double parallel randomized controlled trial (blinded) to be conducted in 3 stages. The first stage will develop health belief model (HBM) program, while in the second stage, pregnant women will be recruited, assessed (baseline data), randomized into two arms of the study, and follow-up for six months. The third stage will evaluate the impact of the intervention on HBM and disseminate the findings. Data will be collected with the use of a structured questionnaire which will contain validated tools. The main outcome measurement will be the treatment effect using HBM, while data will be analysed using SPSS, version 22. Discussion: The study will contribute to the existing knowledge on hospital-based care programs for pregnant women in developing countries where the literature is scanty. It will generally give insight into the importance of HBM measurement in interventional studies on malaria and other related infectious diseases in this setting.

Keywords: malaria, health education, insecticide-treated nets, sub-Saharan Africa

Procedia PDF Downloads 108
1161 In-door Localization Algorithm and Appropriate Implementation Using Wireless Sensor Networks

Authors: Adeniran K. Ademuwagun, Alastair Allen

Abstract:

The relationship dependence between RSS and distance in an enclosed environment is an important consideration because it is a factor that can influence the reliability of any localization algorithm founded on RSS. Several algorithms effectively reduce the variance of RSS to improve localization or accuracy performance. Our proposed algorithm essentially avoids this pitfall and consequently, its high adaptability in the face of erratic radio signal. Using 3 anchors in close proximity of each other, we are able to establish that RSS can be used as reliable indicator for localization with an acceptable degree of accuracy. Inherent in this concept, is the ability for each prospective anchor to validate (guarantee) the position or the proximity of the other 2 anchors involved in the localization and vice versa. This procedure ensures that the uncertainties of radio signals due to multipath effects in enclosed environments are minimized. A major driver of this idea is the implicit topological relationship among sensors due to raw radio signal strength. The algorithm is an area based algorithm; however, it does not trade accuracy for precision (i.e the size of the returned area).

Keywords: anchor nodes, centroid algorithm, communication graph, radio signal strength

Procedia PDF Downloads 494
1160 Evaluating Learning Outcomes in the Implementation of Flipped Teaching Using Data Envelopment Analysis

Authors: Huie-Wen Lin

Abstract:

This study integrated various teaching factors -based on the idea of a flipped classroom- in a financial management course. The study’s aim was to establish an effective teaching implementation strategy and evaluation mechanism with respect to learning outcomes, which can serve as a reference for the future modification of teaching methods. This study implemented a teaching method in five stages and estimated the learning efficiencies of 22 students (in the teaching scenario and over two semesters). Subsequently, data envelopment analysis (DEA) was used to compare, for each student, between the learning efficiencies before and after participation in the flipped classroom -in the first and second semesters, respectively- to identify the crucial external factors influencing learning efficiency. According to the results, the average overall student learning efficiency increased from 0.901 in the first semester to 0.967 in the second semester, which demonstrate that the flipped classroom approach can improve teaching effectiveness and learning outcomes. The results also revealed a difference in learning efficiency between male and female students.

Keywords: data envelopment analysis, flipped classroom, learning outcome, teaching and learning

Procedia PDF Downloads 143
1159 Constructing the Cult of the Self: On White, Working-Class Males and the Neoliberalisation of Identities: An Autoethnographic Study

Authors: Dane B. Norris

Abstract:

This paper offers a reflective and reflexive examination of the lived reality of a group of young white, working-class males engaging in secondary education in England at a time when this population is widely recognised as the lowest attaining ethnic group within British schools. The focus of the paper is an exploration of the development of identities and aspirations alongside contemporary demographic shifts in the British population within the intersection of neoliberal education policies and the emerging ideological conflict between identity conservatism and liberalism. The construction and performance of intersecting social-class, gender, ethnic and national identities are considered, as well as the process through which socially constructed narratives inform identities and aspirations. Evocative autoethnography is then employed to offer reflections on working-class habitus and, in particular, classed and gendered codes that underpin expectations of manhood in post-industrial culture within an education system which seemingly requires the abandonment of aspects of a working-class background, affiliation, and identity. Findings from the study identify the emergence of a culture of hyper-individualisation amongst white, working-class males in schools and a belief in the meritocratic ideologies of the New Right. In particular, the breakdown of the social contract, including notions of political and civic responsibility, coupled with the symbolic violence perpetrated against working-class culture and solidarity in British schools, have all informed the construction of working-class masculinity which values the individual entrepreneur over the collective and depoliticizes students to an extent where a focus on the spectacle and performance of success has replaced individual and collective investment in community.

Keywords: education, identity, masculinity, neoliberalism, working-class

Procedia PDF Downloads 98
1158 From Within a Domestic Violence Shelter Identifying the Sociological and Psychological Impact of Refugee Muslim Women and Children in America

Authors: Asma Inge-Hanif, Ayyub Ansari Hanif

Abstract:

The impact of conflicts, the subsequent refugee migration to America and their attempted use of societal resources implicate the lack of further humanitarian aid as a consequence of the abrupt decrease in services and policy changes stemming from new governmental mandates and Executive Orders. Statistical research data indicates a substantial decline in access to standardized health services by refugee women creating a significant alteration in the management of their maternal health care in America, previously shown to result in decreased mortality and morbidity. Studying nursing at Howard University in Washington, D.C., observed doctors were not always sensitive to the needs and modesty concerns of immigrant Muslim women - often unintentionally. Among health care professionals, the prevailing belief should be that every man, woman and child has the right to quality care in a dignified manner and the achievement of optimal health and well-being, regardless of race, creed, socio-economic level or status. In 1987 Muslimat Al Nisaa Health and Social Services Center was established to care for underserved and uninsured women and children. This Center, plus the subsequent shelter, provided direct access to those homeless, refugees, human trafficking and women victims of domestic violence was established and provides the data for this study. Understanding specific culture, social, economic and religious nuances respects their diversity and addressing their basic human needs that they achieve optimal success. The ultimate goal being to facilitate the rescue and housing of those whom escaped from a country/communities where girls are devalued, brought, sold and abused.

Keywords: women, refugee, domestic violence, health care

Procedia PDF Downloads 76
1157 Concrete Cracking Simulation Using Vector Form Intrinsic Finite Element Method

Authors: R. Z. Wang, B. C. Lin, C. H. Huang

Abstract:

This study proposes a new method to simulate the crack propagation under mode-I loading using Vector Form Intrinsic Finite Element (VFIFE) method. A new idea which is expected to combine both VFIFE and J-integral is proposed to calculate the stress density factor as the crack critical in elastic crack. The procedure of implement the cohesive crack propagation in VFIFE based on the fictitious crack model is also proposed. In VFIFIE, the structure deformation is described by numbers of particles instead of elements. The strain energy density and the derivatives of the displacement vector of every particle is introduced to calculate the J-integral as the integral path is discrete by particles. The particle on the crack tip separated into two particles once the stress on the crack tip satisfied with the crack critical and then the crack tip propagates to the next particle. The internal force and the cohesive force is applied to the particles.

Keywords: VFIFE, crack propagation, fictitious crack model, crack critical

Procedia PDF Downloads 327
1156 When Your Change The Business Model ~ You Change The World

Authors: H. E. Amb. Terry Earthwind Nichols

Abstract:

Over the years Ambassador Nichols observed that successful companies all have one thing in common - belief in people. His observations of people in many companies, industries, and countries have also concluded one thing - groups of achievers far exceed the expectations and timelines of their superiors. His experience with achieving this has brought forth a model for the 21st century that will not only exceed expectations of companies, but it will also set visions for the future of business globally. It is time for real discussion around the future of work and the business model that will set the example for the world. Methodologies: In-person observations over 40 years – Ambassador Nichols present during the observations. Audio-visual observations – TV, Cinema, social media (YouTube, etc.), various news outlet Reading the autobiography of some of successful leaders over the last 75 years that lead their companies from a distinct perspective your people are your commodity. Major findings: People who believe in the leader’s vision for the company so much so that they remain excited about the future of the company and want to do anything in their power to ethically achieve that vision. People who are achieving regularly in groups, division, companies, etcetera: Live more healthfully lowering both sick time off and on-the-job accidents. Cannot wait to physically get to work as much as they can to feed off the high energy present in these companies. They are fully respected and supported resulting in near zero attrition. Simply put – they do not “Burn Out”. Conclusion: To the author’s best knowledge, 20th century practices in business are no longer valid and people are not going to work in those environments any longer. The average worker in the post-covid world is better educated than 50 years ago and most importantly, they have real-time information about any subject and can stream injustices as they happen. The Consortium Model is just the model for the evolution of both humankind and business in the 21st century.

Keywords: business model, future of work, people, paradigm shift, business management

Procedia PDF Downloads 65
1155 Cognitive Methods for Detecting Deception During the Criminal Investigation Process

Authors: Laid Fekih

Abstract:

Background: It is difficult to detect lying, deception, and misrepresentation just by looking at verbal or non-verbal expression during the criminal investigation process, as there is a common belief that it is possible to tell whether a person is lying or telling the truth just by looking at the way they act or behave. The process of detecting lies and deception during the criminal investigation process needs more studies and research to overcome the difficulties facing the investigators. Method: The present study aimed to identify the effectiveness of cognitive methods and techniques in detecting deception during the criminal investigation. It adopted the quasi-experimental method and covered a sample of (20) defendants distributed randomly into two homogeneous groups, an experimental group of (10) defendants be subject to criminal investigation by applying cognitive techniques to detect deception and a second experimental group of (10) defendants be subject to the direct investigation method. The tool that used is a guided interview based on models of investigative questions according to the cognitive deception detection approach, which consists of three techniques of Vrij: imposing the cognitive burden, encouragement to provide more information, and ask unexpected questions, and the Direct Investigation Method. Results: Results revealed a significant difference between the two groups in term of lie detection accuracy in favour of defendants be subject to criminal investigation by applying cognitive techniques, the cognitive deception detection approach produced superior total accuracy rates both with human observers and through an analysis of objective criteria. The cognitive deception detection approach produced superior accuracy results in truth detection: 71%, deception detection: 70% compared to a direct investigation method truth detection: 52%; deception detection: 49%. Conclusion: The study recommended if practitioners use a cognitive deception detection technique, they will correctly classify more individuals than when they use a direct investigation method.

Keywords: the cognitive lie detection approach, deception, criminal investigation, mental health

Procedia PDF Downloads 59
1154 Numerical Simulation of Magnetohydrodynamic (MHD) Blood Flow in a Stenosed Artery

Authors: Sreeparna Majee, G. C. Shit

Abstract:

Unsteady blood flow has been numerically investigated through stenosed arteries to achieve an idea about the physiological blood flow pattern in diseased arteries. The blood is treated as Newtonian fluid and the arterial wall is considered to be rigid having deposition of plaque in its lumen. For direct numerical simulation, vorticity-stream function formulation has been adopted to solve the problem using implicit finite difference method by developing well known Peaceman-Rachford Alternating Direction Implicit (ADI) scheme. The effects of magnetic parameter and Reynolds number on velocity and wall shear stress are being studied and presented quantitatively over the entire arterial segment. The streamlines have been plotted to understand the flow pattern in the stenosed artery, which has significant alterations in the downstream of the stenosis in the presence of magnetic field. The results show that there are nominal changes in the flow pattern when magnetic field strength is enhanced upto 8T which can have remarkable usage to MRI machines.

Keywords: magnetohydrodynamics, blood flow, stenosis, energy dissipation

Procedia PDF Downloads 262
1153 Social Media: The Major Trigger of Online and Offline Political Activism

Authors: Chan Eang Teng, Tang Mui Joo

Abstract:

With the viral factor on social media, the sense of persuasion is generated by repetition and popularity. When users’ interest is captured, political awareness increases to spark political enthusiasm, but, the level of user’s political participation and political attitude of those active users is still questionable. An online survey on 250 youth and in-depth interview on two politicians are conducted to answer the main question in this paper. The result shows that Facebook significantly increases political awareness among youths. Social media may not be the major trigger to political activism among youths as most respondents opined that they would still vote without Facebook. Other factors could be political campaigning, political climate, age, peer pressure or others. Finding also shows that majority of respondents did not participate in online political debates or political groups. Many also wondered if the social media was the main power switch that triggers the political influx among young voters. The research finding is significant to understand how the new media, Facebook, has reshaped the political landscape in Malaysia, creating the Social Media Election that changed the rules of the political game. However, research finding does not support the ideal notion that the social media is the major trigger to youth’s political activism. This research outcome has exposed the flaws of the Social Media Election. It has revealed the less optimistic side of youth political activism. Unfortunately, results fall short of the idealistic belief that the social media have given rise to political activism among youths in the 13th General Election in Malaysia. The research outcome also highlights an important lesson for the democratic discourse of Malaysia which is making informed and educated decisions takes more commitment, proactive and objective attitude.

Keywords: social media, political participation, political activism, democracy, political communication

Procedia PDF Downloads 307
1152 Factors Influencing the General Public Intention to Be Vaccinated: A Case of Botswana

Authors: Meng Qing Feng, Otsile Morake

Abstract:

Background: Successful implementation of the COVID-19 vaccination ensures the prevention of virus infection. Postponement and refusal of the vaccination will threaten public health, which is now common among the general public across the world. In addition, an acceptance of the COVID-19 vaccine appears as a decisive factor in controlling the COVID-19 pandemic. Purpose: This study's objective is to explore the factors influencing the public intention to be vaccinated (ITBV). Design/methodology/approach: The web-based survey included socio-demographics and questions related to the theory of planned behavior (TPB) and the health belief model (HBM). An online survey was administered using Google Form to collect data from participants of Botswana. The sample included 339 participants, half-half of the participants were female. Data analysis was run using the Statistical Package for the Social Sciences (SPSS). Findings: The study results highlight that perceived severity, perceived barriers, health motivation, and attitude have a positive and significant effect on ITBV, while perceived susceptibility, benefits, subjective norms, and perceived behavior control do not affect ITBV. Among all of the predictors, perceived barriers have the most significant influence on ITBV. Conclusion: Theoretically, this research stated that both HBM and TPB are effective in predicting and explaining the general public ITBV. Practically, this study offers insights to the government and health departments to arrange and launch health awareness programs and provide a better guide to vaccination so that doubts about vaccine confidence and the level of uncertainty can be decreased.

Keywords: COVID-19, Omicron, intention to be COVID-19 vaccine, health behavior model, theory of planned behavior, Botswana

Procedia PDF Downloads 84
1151 Research on Eco-Sustainable Recycling of Industrial Wastes

Authors: Liliana Crăc, Nicolae Giorgi, Gheorghe Fometescu

Abstract:

In Romania, billions of tonnes of wastes are generated yearly, an important amount being stored within industrial dumps that covers high soil areas and affects the environment quality, especially of ground and surface waters. Landfill represents in Romania the most important way for wastes removal, over 75% being generated every year, the costs with the dumps construction being considerable. In most of the cases, the wastes generated mainly by the energy industry, oil exploitation and metallurgy, are still considered wastes with NO-use, and their removal and neutralization represent for transport, handling and storing, high non-productive expenses which raise the cost of the useful products obtained. The paper presents a recycling idea of three types of wastes in order to use them for building materials manufacturing, by promoting ECOWASTES LIFE+ project, whose aim is to demonstrate that the recycling of waste from energy industry (coal combustion waste), petroleum extraction (drilling mud) and metallurgy (steelmaking slag) is technically feasible.

Keywords: fly ash, drilled solid wastes, metallurgical slag, recycling, building materials

Procedia PDF Downloads 303
1150 Ready Student One! Exploring How to Build a Successful Game-Based Higher Education Course in Virtual Reality

Authors: Robert Jesiolowski, Monique Jesiolowski

Abstract:

Today more than ever before, we have access to new technologies which provide unforeseen opportunities for educators to pursue in online education. It starts with an idea, but that needs to be coupled with the right team of experts willing to take big risks and put in the hard work to build something different. An instructional design team was empowered to reimagine an Introduction to Sociology university course as a Game-Based Learning (GBL) experience utilizing cutting edge Virtual Reality (VR) technology. The result was a collaborative process that resulted in a type of learning based in Game theory, Method of Loci, and VR Immersion Simulations to promote deeper retention of core concepts. The team deconstructed the way that university courses operated, in order to rebuild the educational process in a whole learner-centric manner. In addition to a review of the build process, this paper will explore the results of in-course surveys completed by student participants.

Keywords: higher education, innovation, virtual reality, game-based learning, loci method

Procedia PDF Downloads 77
1149 Finite State Markov Chain Model of Pollutants from Service Stations

Authors: Amina Boukelkoul, Rahil Boukelkoul, Leila Maachia

Abstract:

The cumulative vapors emitted from the service stations may represent a hazard to the environment and the population. Besides fuel spill and their penetration into deep soil layers are the main contributors to soil and ground-water contamination in the vicinity of the petrol stations. The amount of the effluents from the service stations depends on strategy of maintenance and the policy adopted by the management to reduce the pollution. One key of the proposed approach is the idea of managing the effluents from the service stations which can be captured via use of a finite state Markov chain. Such a model can be embedded within a probabilistic operation and maintenance simulation reflecting the action to be done. In this paper, an approach of estimating a probabilistic percentage of the amount of emitted pollutants is presented. The finite state Markov model is used for decision problems with number of determined periods (life cycle) to predict the amount according to various options of operation.

Keywords: environment, markov modeling, pollution, service station

Procedia PDF Downloads 460