Search results for: smart national identity card (SNIC)
6486 Emile Meyerson's Philosophy of Science in Lacan's Early Theories
Authors: Hugo T. Jorge, Richard T. Simanke
Abstract:
Lacan’s work addresses overarching issues concerning the scientific intelligibility of the subject in its philosophical sense. Even though his reflection is not, strictly speaking, philosophy of science, it contains many traits that are typical of this branch of philosophy. However, the relation between Lacan’s early thought and the philosophy of science of the time is often disregarded or only incompletely accounted for in Lacanian scholarship. French philosopher of science Emile Meyerson was often implicitly or explicitly referred to in Lacan’s works, yet few publications can be found on their relationship. The objective of this paper is to contribute to the analysis of this relationship, indicating some of its possible implications. For this, the convergence between Meyerson’s doctrine of science and Lacan’s works between 1936 and 1953 is discussed, as well as the conditions under which Lacan’s reception of Meyerson’s ideas take place. In conclusion, it is argued that this convergence allows for the clarification of important issues in Lacan’s early work, such as the concept of imago, his views on the nature of truth, and his thesis of the anthropomorphism of natural sciences. Meyerson’s argument for the permanence of common sense within science makes Lacan’s claims on the anthropomorphism of natural sciences more understandable. Similarly, Meyerson’s views on the epistemological shortfall of the Principle of Identity sheds some light on Lacan’s 1936 critique of associationistic concepts of engram and truth and may be at the origins of his antirealist and anti-idealist stances. Meyerson’s Principle of Identity is also related to some aspects of Lacan’s concept of imago. The imago understood as the unconscious condition for the identity in time of family figures in childhood, would be an excellent expression of the Principle of Identity. In this sense, the Principle of Identity may be linked to the concept of imaginary as developed by Lacan in the 1950s. However, Lacan considerably distorts Meyerson’s views in his 1936 critique of Freud’s concept of libido. Finally, a possible relationship between Lacan’s late concept of the real and Meyerson’s concept of the irrational is suggested.Keywords: imaginary, Lacan, Meyerson, philosophy of science, real
Procedia PDF Downloads 1726485 Accurate Position Electromagnetic Sensor Using Data Acquisition System
Authors: Z. Ezzouine, A. Nakheli
Abstract:
This paper presents a high position electromagnetic sensor system (HPESS) that is applicable for moving object detection. The authors have developed a high-performance position sensor prototype dedicated to students’ laboratory. The challenge was to obtain a highly accurate and real-time sensor that is able to calculate position, length or displacement. An electromagnetic solution based on a two coil induction principal was adopted. The HPESS converts mechanical motion to electric energy with direct contact. The output signal can then be fed to an electronic circuit. The voltage output change from the sensor is captured by data acquisition system using LabVIEW software. The displacement of the moving object is determined. The measured data are transmitted to a PC in real-time via a DAQ (NI USB -6281). This paper also describes the data acquisition analysis and the conditioning card developed specially for sensor signal monitoring. The data is then recorded and viewed using a user interface written using National Instrument LabVIEW software. On-line displays of time and voltage of the sensor signal provide a user-friendly data acquisition interface. The sensor provides an uncomplicated, accurate, reliable, inexpensive transducer for highly sophisticated control systems.Keywords: electromagnetic sensor, accurately, data acquisition, position measurement
Procedia PDF Downloads 2856484 The Military and Motherhood: Identity and Role Expectation within Two Greedy Institutions
Authors: Maureen Montalban
Abstract:
The military is a predominantly male-dominated organisation that has entrenched hierarchical and patriarchal norms. Since 1975, women have been allowed to continue active service in the Australian Defence Force during pregnancy and after the birth of a child; prior to this time, pregnancy was grounds for automatic termination. The military and family, as institutions, make great demands on individuals with respect to their commitment, loyalty, time and energy. This research explores what it means to serve in the Australian Army as a woman through a gender lens, overlaid during a specific time period of their service; that is, during pregnancy, birth, and being a mother. It investigates the external demands faced by servicewomen who are mothers, whether it be from society, the Army, their teammates, their partners, or their children; and how they internally make sense of that with respect to their own identity and role as a mother, servicewoman, partner and as an individual. It also seeks to uncover how Australian Army servicewomen who are also mothers attempt to manage the dilemma of serving two greedy institutions when both expect and demand so much and whether this is, in fact, an impossible dilemma.Keywords: women's health, gender studies, military culture, identity
Procedia PDF Downloads 1016483 Proposing Smart Clothing for Addressing Criminal Acts Against Women in South Africa
Authors: Anne Mastamet-Mason
Abstract:
Crimes against women is a global concern, and South Africa, in particular, is in a dilemma of dealing with constant criminal acts that face the country. Debates on violence against women in South Africa cannot be overemphasised any longer as crimes continue to rise year by year. The recent death of a university student at the University of Cape Town, as well as many other cases, continues to strengthen the need to find solutions from all the spheres of South African society. The advanced textiles market contains a high number and variety of technologies, many of which have protected status and constitute a relatively small portion of the textiles used for the consumer market. Examples of advanced textiles include nanomaterials, such as silver, titanium dioxide and zinc oxide, designed to create an anti-microbial and self-cleaning layer on top of the fibers, thereby reducing body smell and soiling. Smart textiles propose materials and fabrics versatile and adaptive to different situations and functions. Integrating textiles and computing technologies offer an opportunity to come up with differentiated characteristics and functionality. This paper presents a proposal to design a smart camisole/Yoga sports brazier and a smart Yoga sports pant garment to be worn by women while alone and while in purported danger zones. The smart garments are to be worn under normal clothing and cannot be detected or seen, or suspected by perpetrators. The garments are imbued with devices to sense any physical aggression and any abnormal or accelerated heartbeat that may be exhibited by the victim of violence. The signals created during the attack can be transmitted to the police and family members who own a mobile application system that accepts signals emitted. The signals direct the receiver to the exact location of the offence, and the victim can be rescued before major violations are committed. The design of the Yoga sports garments will be done by Professor Mason, who is a fashion designer by profession, while the mobile phone application system will be developed by Mr. Amos Yegon, who is an independent software developer.Keywords: smart clothing, wearable technology, south africa, 4th industrial revolution
Procedia PDF Downloads 2076482 Implications of Humanizing Pedagogy on Learning Design in a Technology-Enhanced Language Learning Environment: Critical Reflections on Student Identity and Agency
Authors: Mukhtar Raban
Abstract:
Nelson Mandela University subscribes to a humanizing pedagogy (HP), as housed under broader critical pedagogy, that underpins and informs learning and teaching activities at the institution. The investigation sought to explore the implications of humanizing and critical pedagogical considerations for a technology-enhanced language learning (TELL) environment in a university course. The paper inquires into the design of a learning resource in an online learning environment of an English communication module, that applied HP principles. With an objective of creating agentive spaces for foregrounding identity, student voice, critical self-reflection, and recognition of others’ humanity; a flexible and open 'My Presence' feature was added to the TELL environment that allowed students and lecturers to share elements of their backgrounds in a ‘mutually vulnerable’ manner as a way of establishing digital identity and a more ‘human’ presence in the online language learning encounter, serving as a catalyst for the recognition of the ‘other’. Following a qualitative research design, the study adopted an auto-ethnographic approach, complementing the critical inquiry nature embedded into the activity’s practices. The study’s findings provide critical reflections and deductions on the possibilities of leveraging digital human expression within a humanizing pedagogical framework to advance the realization of HP-adoption in language learning and teaching encounters. It was found that the consideration of humanizing pedagogical principles in the design of online learning was more effective when the critical outcomes were explicated to students and lecturers prior to the completion of the activities. The integration of humanizing pedagogy also led to a contextual advancement of ‘affective’ language learning. Upon critical reflection and analysis, student identity and agency can flourish in a technology-enhanced learning environment when humanizing, and critical pedagogy influences the learning design.Keywords: critical reflection, humanizing pedagogy, student identity, technology-enhanced language learning
Procedia PDF Downloads 1356481 AgriInnoConnect Pro System Using Iot and Firebase Console
Authors: Amit Barde, Dipali Khatave, Vaishali Savale, Atharva Chavan, Sapna Wagaj, Aditya Jilla
Abstract:
AgriInnoConnect Pro is an advanced agricultural automation system designed to enhance irrigation efficiency and overall farm management through IoT technology. Using MIT App Inventor, Telegram, Arduino IDE, and Firebase Console, it provides a user-friendly interface for farmers. Key hardware includes soil moisture sensors, DHT11 sensors, a 12V motor, a solenoid valve, a stepdown transformer, Smart Fencing, and AC switches. The system operates in automatic and manual modes. In automatic mode, the ESP32 microcontroller monitors soil moisture and autonomously controls irrigation to optimize water usage. In manual mode, users can control the irrigation motor via a mobile app. Telegram bots enable remote operation of the solenoid valve and electric fencing, enhancing farm security. Additionally, the system upgrades conventional devices to smart ones using AC switches, broadening automation capabilities. AgriInnoConnect Pro aims to improve farm productivity and resource management, addressing the critical need for sustainable water conservation and providing a comprehensive solution for modern farm management. The integration of smart technologies in AgriInnoConnect Pro ensures precision farming practices, promoting efficient resource allocation and sustainable agricultural development.Keywords: agricultural automation, IoT, soil moisture sensor, ESP32, MIT app inventor, telegram bot, smart farming, remote control, firebase console
Procedia PDF Downloads 436480 Delayed Disclosure: Factors Influencing Coming Out Decisions Among Transgender Adolescents
Authors: Wallace Wong, Julia Toews, Kirsten Graham, Teija Yli-Renko, Dorcas Chau, Judith Lai, Momoka Nabatame
Abstract:
Many transgender individuals report recognizing their non-cisgender identity in early childhood. However, numerous transgender adolescents choose to delay coming out to their family or friends until after puberty. This study explored factors influencing this decision by analyzing data from over 100 cases of transgender adolescents who disclosed their identity post-puberty. Using a qualitative thematic analysis approach, we identified key factors affecting this choice, including fear of rejection, lack of affirming resources, internalized transphobia, and safety concerns. The study also revealed the positive impact of increased transgender visibility and online support communities in facilitating later coming-out experiences. Our findings highlight the intersection of personal, social, and environmental factors contributing to disclosure timing for transgender adolescents. These insights can inform supportive interventions and policies to assist transgender youth throughout their coming out process, regardless of when it occurs. This research contributes to a deeper understanding of the challenges faced by transgender adolescents and the support they need during this critical period.Keywords: transgender, gender identity, coming out, adolescents
Procedia PDF Downloads 206479 Investigating the Relationship between Job Satisfaction, Role Identity, and Turnover Intention for Nurses in Outpatient Department
Authors: Su Hui Tsai, Weir Sen Lin, Rhay Hung Weng
Abstract:
There are numerous outpatient departments at hospitals with enormous amounts of outpatients. Although the work of outpatient nursing staff does not include the ward, emergency and critical care units that involve patient life-threatening conditions, the work is cumbersome and requires facing and dealing with a large number of outpatients in a short period of time. Therefore, nursing staff often do not feel satisfied with their work and cannot identify with their professional role, leading to intentions to leave their job. Thus, the main purpose of this study is to explore the correlation between the job satisfaction and role identity of nursing staff with turnover intention. This research was conducted using a questionnaire, and the subjects were outpatient nursing staff in three regional hospitals in Southern Taiwan. A total of 175 questionnaires were distributed, and 166 valid questionnaires were returned. After collecting the data, the reliability and validity of the study variables were confirmed by confirmatory factor analysis. The influence of role identity and job satisfaction on nursing staff’s turnover intention was analyzed by descriptive analysis, one-way ANOVA, Pearson correlation analysis and multiple regression analysis. Results showed that 'role identity' had significant differences in different types of marriages. Job satisfaction of 'grasp of environment' had significant differences in different levels of education. Job satisfaction of 'professional growth' and 'shifts and days off' showed significant differences in different types of marriages. 'Role identity' and 'job satisfaction' were negatively correlated with turnover intention respectively. Job satisfaction of 'salary and benefits' and 'grasp of environment' were significant predictors of role identity. The higher the job satisfaction of 'salary and benefits' and 'grasp of environment', the higher the role identity. Job satisfaction of 'patient and family interaction' were significant predictors of turnover intention. The lower the job satisfaction of 'patient and family interaction', the higher the turnover intention. This study found that outpatient nursing staff had the lowest satisfaction towards salary structure. It is recommended that bonuses, promotion opportunities and other incentives be established to increase the role identity of outpatient nursing staff. The results showed that the higher the job satisfaction of 'salary and benefits' and 'grasp of environment', the higher the role identity. It is recommended that regular evaluations be conducted to reward nursing staff with excellent service and invite nursing staff to share their work experiences and thoughts, to enhance nursing staff’s expectation and identification of their occupational role, as well as instilling the concept of organizational service and organizational expectations of emotional display. The results showed that the lower the job satisfaction of 'patient and family interaction', the higher the turnover intention. It is recommended that interpersonal communication and workplace violence prevention educational training courses be organized to enhance the communication and interaction of nursing staff with patients and their families.Keywords: outpatient, job satisfaction, turnover, intention
Procedia PDF Downloads 1466478 Investigating Potential Pest Management Strategies for Citrus Gall Wasp in Australia
Authors: M. Yazdani, J. F. Carragher
Abstract:
Citrus gall wasp (CGW), Bruchophagus fellis (Hym: Eurytomidae), is an Australian native insect pest. CGW has now become a problem of national concern, threatening the viability of the entire Australian citrus industry. However, CGW appears to exhibit a preference for certain citrus species; growers report that grapefruit and lemons are most severely infested, with oranges and mandarins affected to a lesser extent. Given the specificity of the host plant-insect interactions, it is speculated that plant volatiles may play a significant role in host recognition. To address whether plant volatiles is involved in host plant preference by CGW we tested the behavioral response of CGW to plants in a wind tunnel. The result showed that CGW had significantly higher preference to grapefruit and lemon than other cultivars and the least preference was recorded to mandarin (Chi-square test, P<0.001). Because CGW exhibited a detectable choice further studies were undertaken to identify the components of the volatiles from each species. We trapped the volatile chemicals emitted by a 30 cm tip of each plant onto a solid Porapak matrix. Eluted extracts were then analysed by Gas Chromatography-Mass Spectrometry (GCMS) and the presumptive identity of the major compounds from each species inferred from the MS library. Although the same major compounds existed in all of the cultivars, the relative ratios of them differed between species. Next, we will validate the identity of the key volatiles using authentic standards and establish their ability to elicit olfactory responses in CGW in wind tunnel and field experiments. Identification of semiochemicals involved in host location by CGW is of interest not only from an ecological perspective but also for the development of novel pest control strategies.Keywords: Citrus gall wasp, Bruchophagus fellis, volatiles, semiochemicals, IPM
Procedia PDF Downloads 2326477 Development of the Web-Based Multimedia N-Screen Service System for Cross Platform
Authors: S. Bae, J. Shin, S. Lee
Abstract:
As the development of smart devices such as Smart TV, Smartphone, Tablet PC, Laptop, the interest in N-Screen Services that can be cross-linked with heterogeneous devices is increasing. N-Screen means User-centric services that can share and constantly watch multimedia contents anytime and anywhere. However, the existing N-Screen system has the limitation that N-Screen system has to implement the application for each platform and device to provide multimedia service. To overcome this limitation, Multimedia N-Screen Service System is proposed through the web, and it is independent of different environments. The combination of Web and cloud computing technologies from this study results in increasing efficiency and reduction in costs.Keywords: N-screen, web, cloud, multimedia
Procedia PDF Downloads 3016476 Interpreting Form Based Code in Historic Residential Corridor
Authors: Diljan C. K.
Abstract:
Every location on the planet has a history and culture that give it its own identity and character, making it distinct from others. urbanised world, it is fashionable to remould its original character and impression in a contemporary style. The new character and impression of places show a complete detachment from their roots. The heritage and cultural values of the place are replaced by new impressions, and as a result, they eventually lose their identity and character and never have sustenance. In this situation, form-based coding acts as a tool in the urban design process, helping to come up with solutions that strongly bind individuals to their neighbourhood and are closely related to culture through the physical spaces they are associated with. Form-based code was made by pioneers of new urbanism in 1987 in the United States of America. Since then, it has been used in various projects inside and outside the USA with varied scales, from the design of a single building to the design of a whole community. This research makes an effort to interpret the form-based code in historic corridors to establish the association of physical form and space with the public realm to uphold the context and culture. Many of the historic corridors are undergoing a tremendous transformation in their physical form, avoiding their culture and context. This will lead to it losing its identity in form and function. If the case of Valiyashala in Trivandrum is taken as the case, which is transforming its form and will lead to the loss of its identity, the form-based code will be a suitable tool to strengthen its historical value. The study concludes by analysing the existing code (KMBR) of Valiyashala and form-based code to find the requirements in form-based code for Valiyashala.Keywords: form based code, urban conservation, heritage, historic corridor
Procedia PDF Downloads 1096475 Optimization of Smart Beta Allocation by Momentum Exposure
Authors: J. B. Frisch, D. Evandiloff, P. Martin, N. Ouizille, F. Pires
Abstract:
Smart Beta strategies intend to be an asset management revolution with reference to classical cap-weighted indices. Indeed, these strategies allow a better control on portfolios risk factors and an optimized asset allocation by taking into account specific risks or wishes to generate alpha by outperforming indices called 'Beta'. Among many strategies independently used, this paper focuses on four of them: Minimum Variance Portfolio, Equal Risk Contribution Portfolio, Maximum Diversification Portfolio, and Equal-Weighted Portfolio. Their efficiency has been proven under constraints like momentum or market phenomenon, suggesting a reconsideration of cap-weighting. To further increase strategy return efficiency, it is proposed here to compare their strengths and weaknesses inside time intervals corresponding to specific identifiable market phases, in order to define adapted strategies depending on pre-specified situations. Results are presented as performance curves from different combinations compared to a benchmark. If a combination outperforms the applicable benchmark in well-defined actual market conditions, it will be preferred. It is mainly shown that such investment 'rules', based on both historical data and evolution of Smart Beta strategies, and implemented according to available specific market data, are providing very interesting optimal results with higher return performance and lower risk. Such combinations have not been fully exploited yet and justify present approach aimed at identifying relevant elements characterizing them.Keywords: smart beta, minimum variance portfolio, equal risk contribution portfolio, maximum diversification portfolio, equal weighted portfolio, combinations
Procedia PDF Downloads 3406474 Disidentification of Historical City Centers: A Comparative Study of the Old and New Settlements of Mardin, Turkey
Authors: Fatma Kürüm Varolgüneş, Fatih Canan
Abstract:
Mardin is one of the unique cities in Turkey with its rich cultural and historical heritage. Mardin’s traditional dwellings have been affected both by natural data such as climate and topography and by cultural data like lifestyle and belief. However, in the new settlements, housing is formed with modern approaches and unsuitable forms clashing with Mardin’s culture and environment. While the city is expanding, traditional textures are ignored. Thus, traditional settlements are losing their identity and are vanishing because of the rapid change and transformation. The main aim of this paper is to determine the physical and social data needed to define the characteristic features of Mardin’s old and new settlements. In this context, based on social and cultural data, old and new settlement formations of Mardin have been investigated from various aspects. During this research, the following methods have been utilized: observations, interviews, public surveys, literature review, as well as site examination via maps, photographs and questionnaire methodology. In conclusion, this paper focuses on how changes in the physical forms of cities affect the typology and the identity of cities, as in the case of Mardin.Keywords: urban and local identity, historical city center, traditional settlements, Mardin
Procedia PDF Downloads 3286473 Temperature-Responsive Shape Memory Polymer Filament Integrated Smart Polyester Knitted Fabric Featuring Memory Behavior
Authors: Priyanka Gupta, Bipin Kumar
Abstract:
Recent developments in smart materials motivate researchers to create novel textile products for innovative and functional applications, which have several potential uses beyond the conventional. This study investigates the memory behavior of shape memory filaments integrated into a knitted textile structure. The research advances the knowledge of how these intelligent materials respond within textile structures. This integration may also open new avenues for developing smart fabrics with unique sensing and actuation capabilities. A shape memory filament and polyester yarn were knitted to produce a shape memory knitted fabric (SMF). Thermo-mechanical tensile test was carried out to quantify the memory behavior of SMF under different conditions. The experimental findings demonstrate excellent shape recovery (100%) and shape fixity up to 88% at different strains (20% and 60%) and temperatures (30 ℃ and 50 ℃). Experimental results reveal that memory filament behaves differently in a fabric structure than in its pristine condition at various temperatures and strains. The cycle test of SMF under different thermo-mechanical conditions indicated complete shape recovery with an increase in shape fixity. So, the utterly recoverable textile structure was achieved after a few initial cycles. These intelligent textiles are beneficial for the development of novel, innovative, and functional fabrics like elegant curtains, pressure garments, compression stockings, etc. In addition to fashion and medical uses, this unique feature may also be leveraged to build textile-based sensors and actuators.Keywords: knitting, memory filament, shape memory, smart textiles, thermo-mechanical cycle
Procedia PDF Downloads 896472 A Study on the Use Intention of Smart Phone
Authors: Zhi-Zhong Chen, Jun-Hao Lu, Jr., Shih-Ying Chueh
Abstract:
Based on Unified Theory of Acceptance and Use of Technology (UTAUT), the study investigates people’s intention on using smart phones. The study additionally incorporates two new variables: 'self-efficacy' and 'attitude toward using'. Samples are collected by questionnaire survey, in which 240 are valid. After Correlation Analysis, Reliability Test, ANOVA, t-test and Multiple Regression Analysis, the study finds that social impact and self-efficacy have positive effect on use intentions, and the use intentions also have positive effect on use behavior.Keywords: [1] Ajzen & Fishbein (1975), “Belief, attitude, intention and behavior: An introduction to theory and research”, Reading MA: Addison-Wesley. [2] Bandura (1977) Self-efficacy: toward a unifying theory of behavioural change. Psychological Review , 84, 191–215. [3] Bandura( 1986) A. Bandura, Social foundations of though and action, Prentice-Hall. Englewood Cliffs. [4] Ching-Hui Huang (2005). The effect of Regular Exercise on Elderly Optimism: The Self-efficacy and Theory of Reasoned Action Perspectives.(Master's dissertation, National Taiwan Sport University, 2005).National Digital Library of Theses and Dissertations in Taiwan。 [5] Chun-Mo Wu (2007).The Effects of Perceived Risk and Service Quality on Purchase Intention - an Example of Taipei City Long-Term Care Facilities. (Master's dissertation, Ming Chuan University, 2007).National Digital Library of Theses and Dissertations in Taiwan. [6] Compeau, D.R., and Higgins, C.A., (1995) “Application of social cognitive theory to training for computer skills.”, Information Systems Research, 6(2), pp.118-143. [7] computer-self-efficacy and mediators of the efficacy-performance relationship. International Journal of Human-Computer Studies, 62, 737-758. [8] Davis et al(1989), “User acceptance of computer technology: A comparison of two theoretical models ”, Management Science, 35(8), p.982-1003. [9] Davis et al(1989), “User acceptance of computer technology:A comparison of two theoretical models ”, Management Science, 35(8), p.982-1003. [10] Davis, F.D. (1989). Perceived Usefulness, Perceived Ease of Use and User Acceptance of Information Technology. MIS Quarterly, 13(3), 319-340。 [11] Davis. (1989). Perceived Usefulness, Perceived Ease of Use, and User Acceptance of Information Technology. MIS Quarterly, 13(3), 319–340. doi:10.2307/249008 [12] Johnson, R. D. (2005). An empirical investigation of sources of application-specific [13] Mei-yin Hsu (2010).The Study on Attitude and Satisfaction of Electronic Documents System for Administrators of Elementary Schools in Changhua County.(Master's dissertation , Feng Chia University, 2010).National Digital Library of Theses and Dissertations in Taiwan. [14] Ming-Chun Hsieh (2010). Research on Parents’ Attitudes Toward Electronic Toys: The case of Taichung City.(Master's dissertation, Chaoyang University of Technology,2010).National Digital Library of Theses and Dissertations in Taiwan. [15] Moon and Kim(2001). Extending the TAM for a World-Wide-Web context, Information and Management, v.38 n.4, p.217-230. [16] Shang-Yi Hu (2010).The Impacts of Knowledge Management on Customer Relationship Management – Enterprise Characteristicsand Corporate Governance as a Moderator.(Master's dissertation, Leader University, 2010)。National Digital Library of Theses and Dissertations in Taiwan. [17] Sheng-Yi Hung (2013, September10).Worldwide sale of smartphones to hit one billion IDC:Android dominate the market. ETtoday. Retrieved data form the available protocol:2013/10/3. [18] Thompson, R.L., Higgins, C.A., and Howell, J.M.(1991), “Personal Computing: Toward a Conceptual Model of Utilization”, MIS Quarterly(15:1), pp. 125-143. [19] Venkatesh, V., M.G. Morris, G.B. Davis, and F. D. Davis (2003), “User acceptance of information technology: Toward a unified view, ” MIS Quarterly, 27, No. 3, pp.425-478. [20] Vijayasarathy, L. R. (2004), Predicting Consumer Intentions to Use On-Line Shopping: The Case for an Augmented Technology Acceptance Model, Information and Management, Vol.41, No.6, pp.747-762. [21] Wikipedia - smartphone (http://zh.wikipedia.org/zh-tw/%E6%99%BA%E8%83%BD%E6%89%8B%E6%9C%BA)。 [22] Wu-Minsan (2008).The impacts of self-efficacy, social support on work adjustment with hearing impaired. (Master's dissertation, Southern Taiwan University of Science and Technology, 2008).National Digital Library of Theses and Dissertations in Taiwan. [23] Yu-min Lin (2006). The Influence of Business Employee’s MSN Self-efficacy On Instant Messaging Usage Behavior and Communicaiton Satisfaction.(Master's dissertation, National Taiwan University of Science and Technology, 2006).National Digital Library of Theses and Dissertations in Taiwan.
Procedia PDF Downloads 4096471 A Lightweight Blockchain: Enhancing Internet of Things Driven Smart Buildings Scalability and Access Control Using Intelligent Direct Acyclic Graph Architecture and Smart Contracts
Authors: Syed Irfan Raza Naqvi, Zheng Jiangbin, Ahmad Moshin, Pervez Akhter
Abstract:
Currently, the IoT system depends on a centralized client-servant architecture that causes various scalability and privacy vulnerabilities. Distributed ledger technology (DLT) introduces a set of opportunities for the IoT, which leads to practical ideas for existing components at all levels of existing architectures. Blockchain Technology (BCT) appears to be one approach to solving several IoT problems, like Bitcoin (BTC) and Ethereum, which offer multiple possibilities. Besides, IoTs are resource-constrained devices with insufficient capacity and computational overhead to process blockchain consensus mechanisms; the traditional BCT existing challenge for IoTs is poor scalability, energy efficiency, and transaction fees. IOTA is a distributed ledger based on Direct Acyclic Graph (DAG) that ensures M2M micro-transactions are free of charge. IOTA has the potential to address existing IoT-related difficulties such as infrastructure scalability, privacy and access control mechanisms. We proposed an architecture, SLDBI: A Scalable, lightweight DAG-based Blockchain Design for Intelligent IoT Systems, which adapts the DAG base Tangle and implements a lightweight message data model to address the IoT limitations. It enables the smooth integration of new IoT devices into a variety of apps. SLDBI enables comprehensive access control, energy efficiency, and scalability in IoT ecosystems by utilizing the Masked Authentication Message (MAM) protocol and the IOTA Smart Contract Protocol (ISCP). Furthermore, we suggest proof-of-work (PoW) computation on the full node in an energy-efficient way. Experiments have been carried out to show the capability of a tangle to achieve better scalability while maintaining energy efficiency. The findings show user access control management at granularity levels and ensure scale up to massive networks with thousands of IoT nodes, such as Smart Connected Buildings (SCBDs).Keywords: blockchain, IOT, direct acyclic graphy, scalability, access control, architecture, smart contract, smart connected buildings
Procedia PDF Downloads 1226470 Linguistic Devices Reflecting Violence in Border–Provinces of Southern Thailand on the Front Page of Local and National Newspapers
Authors: Chanokporn Angsuviriya
Abstract:
The objective of the study is to analyse linguistic devices reflecting the violence in the south border provinces; namely Pattani, Yala, Narathiwat and Songkla on 1,344 front pages of three local newspapers; namely ChaoTai, Focus PhakTai and Samila Time and of two national newspapers, including ThaiRath and Matichon, between 2004 and 2005, and 2011 and 2012. The study shows that there are two important linguistic devices: 1) lexical choices consisting of the use of verbs describing violence, the use of quantitative words and the use of words naming someone who committed violent acts, and 2) metaphors consisting of “a violent problem is heat”, “a victim is a leaf”, and “a terrorist is a dog”. Comparing linguistic devices between two types of newspapers, national newspapers choose to use words more violently than local newspapers do. Moreover, they create more negative images of the south of Thailand by using stative verbs. In addition, in term of metaphors “a terrorist is a fox.” is only found in national newspapers. As regards naming terrorists “southern insurgents”, this noun phrase which is collectively called by national newspapers has strongly negative meaning. Moreover, “southern insurgents” have been perceived by the Thais in the whole country while “insurgents” that are not modified have been only used by local newspapers.Keywords: linguistic devices, local newspapers, national newspapers, violence
Procedia PDF Downloads 2416469 Monitoring Trends of Science and Technology Policies in South Korea
Authors: Jeonghwan Jeon
Abstract:
As the science and technology(S&T) has been rapidly advanced, the national government attempts to reflect changes in the S&T for promoting public R&D activities and economic development. Amongst others, due to the rapid advances and changes of S&T, it becomes important to monitor the trends of S&T policies for formulating the new policy and investigating promising S&T fields. Thus, this paper aims to trace the national S&T policies during this decade for monitoring the change of major S&T fields in the case of South Korea. As one of the organization for S&T policy in South Korea, the National Science and Technology Council (NSTC) has been established to coordinate inter-ministerial policies and programs and to determine all of the national and public S&T policy of South Korea. In this regard, the items on national S&T policy determined by the NSTC are useful for understanding the needs for major S&T fields and adapting to the rapid change of S&T. To this end, we first gathered the data on 512 items on the S&T agenda from 1999 to 2013. Based on these items, the trend of S&T policies is monitored and the major S&T fields are derived. Differences of policy purposes between S&T fields are identified to provide guideline for policy making such as budget allocation or investment promotion as well.Keywords: science and technology policy, trends, S&T field, monitoring
Procedia PDF Downloads 3216468 Using Wearable Technology to Monitor Perinatal Health: Perspectives of Community Health Workers and Potential Use by Underserved Perinatal Women in California
Authors: Tamara Jimah, Priscilla Kehoe, Pamela Pimentel, Amir Rahmani, Nikil Dutt, Yuqing Guo
Abstract:
Ensuring equitable access to maternal health care is critical for public health. Particularly for underserved women, community health workers (CHWs) have been invaluable in providing support through health education and strategies for improved maternal self-care management. Our research aimed to assess the acceptance of technology by CHWs and perinatal women to promote healthy pregnancy and postpartum wellness. This pilot study was conducted at a local community organization in Orange County, California, where CHWs play an important role in supporting low-income women through home visitations. Questionnaires were administered to 14 CHWs and 114 pregnant and postpartum women, literate in English and/or Spanish. CHWs tested two wearable devices (Galaxy watch and Oura ring) and shared their user experience, including potential reception by the perinatal women they served. In addition, perinatal women provided information on access to a smart phone and the internet, as well as their interest in using wearable devices to self-monitor personal health with guidance from a CHW. Over 85% of CHWs agreed that it was useful to track pregnancy with the smart watch and ring. The majority of perinatal women owned a smartphone (97.4%), had access to the internet (80%) and unlimited data plans (78%), expressed interest in using the smart wearable devices to self-monitor health, and were open to receiving guidance from a CHW (87%). Community health workers and perinatal women embraced the use of wearable technology to monitor maternal health. These preliminary findings have formed the basis of an ongoing research study that integrates CHW guidance and technology (i.e., smart watch, smart ring, and a mobile phone app) to promote self-efficacy and self-management among underserved perinatal women.Keywords: community health workers, health promotion and education, health equity, maternal and child health, technology
Procedia PDF Downloads 1476467 The Stereotypical Images of Marginalized Women in the Poetry of Rita Dove
Authors: Wafaa Kamal Isaac
Abstract:
This paper attempts to shed light upon the stereotypical images of marginalized black women as shown through the poetry of Rita Dove. Meanwhile, it explores how stereotypical images held by the society and public perceptions perpetuate the marginalization of black women. Dove is considered one of the most fundamental African-American poets who devoted her writings to explore the problem of identity that confronted marginalized women in America. Besides tackling the issue of black women’s stereotypical images, this paper focuses upon the psychological damage which the black women had suffered from due to their stripped identity. In ‘Thomas and Beulah’, Dove reflects the black woman’s longing for her homeland in order to make up for her lost identity. This poem represents atavistic feelings deal with certain recurrent images, both aural and visual, like the image of Beulah who represents the African-American woman who searches for an identity, as she is being denied and humiliated one in the newly founded society. In an attempt to protest against the stereotypical mule image that had been imposed upon black women in America, Dove in ‘On the Bus with Rosa Parks’ tries to ignite the beaten spirits to struggle for their own rights by revitalizing the rebellious nature and strong determination of the historical figure ‘Rosa Parks’ that sparked the Civil Rights Movement. In ‘Daystar’, Dove proves that black women are subjected to double-edged oppression; firstly, in terms of race as a black woman in an unjust white society that violates her rights due to her black origins and secondly, in terms of gender as a member of the female sex that is meant to exist only to serve man’s needs. Similarly, in the ‘Adolescence’ series, Dove focuses on the double marginalization which the black women had experienced. It concludes that the marginalization of black women has resulted from the domination of the masculine world and the oppression of the white world. Moreover, Dove’s ‘Beauty and the Beast’ investigates the African-American women’s problem of estrangement and identity crisis in America. It also sheds light upon the psychological consequences that resulted from the violation of marginalized women’s identity. Furthermore, this poem shows the black women’s self-debasement, helplessness, and double consciousness that emanate from the sense of uprootedness. Finally, this paper finds out that the negative, debased and inferior stereotypical image held by the society did not only contribute to the marginalization of black women but also silenced and muted their voices.Keywords: stereotypical images, marginalized women, Rita Dove, identity
Procedia PDF Downloads 1646466 The Social Perception of National Security Risks: A Comparative Perspective
Authors: Nicula Valentin, Andrei Virginia
Abstract:
Nowadays, the individual plays a central role in the state’s architecture. This is why the subjective dimension of the security represents a key concept in risk assessment. The paper’s scope is to emphasize the discrepancy between expert and lay evaluations of national security hazards, which is caused by key factors like emotions, personal experience, knowledge and media. Therefore, we have chosen to apply, using these two different groups of respondents, the Q-sort method, which reveals individual beliefs, attitudes, preferences hidden behind the subjects’ own way of prioritizing the risks they are confronted with. Our study’s conclusions are meant to unveil significant indicators needed to be taken into consideration by a state’s leadership in order to understand the social perception of national security hazards, to communicate better with the public opinion and prevent or mitigate the overestimation of the severity or probability of these dangers.Keywords: risk perception, Q-sort method, national security hazards, individual beliefs
Procedia PDF Downloads 3096465 Building an Integrated Relational Database from Swiss Nutrition National Survey and Swiss Health Datasets for Data Mining Purposes
Authors: Ilona Mewes, Helena Jenzer, Farshideh Einsele
Abstract:
Objective: The objective of the study was to integrate two big databases from Swiss nutrition national survey (menuCH) and Swiss health national survey 2012 for data mining purposes. Each database has a demographic base data. An integrated Swiss database is built to later discover critical food consumption patterns linked with lifestyle diseases known to be strongly tied with food consumption. Design: Swiss nutrition national survey (menuCH) with approx. 2000 respondents from two different surveys, one by Phone and the other by questionnaire along with Swiss health national survey 2012 with 21500 respondents were pre-processed, cleaned and finally integrated to a unique relational database. Results: The result of this study is an integrated relational database from the Swiss nutritional and health databases.Keywords: health informatics, data mining, nutritional and health databases, nutritional and chronical databases
Procedia PDF Downloads 1126464 Humor and Public Hygiene: A Critical Social Semiotic Analysis of Singapore’s National Campaigns
Authors: Kelsi Matwick, Keri Matwick
Abstract:
This presentation focuses on national campaigns as a government tactic of social behavior and order. Focusing on one of Singapore’s first national campaigns, Keep Singapore Clean (1968), particularly its iterations of public hygiene in recent years: Keep the Toilets Clean (2012-2019) and UnLittering with Mary Chongo (2019), the study examines how humor and the use of multimodality reflect contemporary practices in political practice. A critical social semiotic analysis involving the textual (linguistic and visual design) and material (print cartoons and videos) is undertaken to show how these messages are communicated. Incongruity and parody are humorous mechanisms used to project the government as likeable, effectively capture the public attention, and instill individual responsibility for the greater community. In focusing on public hygiene national campaigns, the study further illustrates how humor offers a polite way to address crude behavior while providing models of exemplary behavior.Keywords: communication strategies, critical social semiotics, humor, national campaigns
Procedia PDF Downloads 1186463 US-Iran Hostage Crisis by the Metaphor of Argo in the Light of Post-Modernist Post-Colonial and Realist Theories
Authors: Hatice Idil Gorgen
Abstract:
This paper argues that discourses and textuality which is literary tool of Western ethnocentrism create aggressive foreign policy against the West by Non-West countries. Quasi-colonial experiences create an inferiority complex on officially or not colonized areas by reconstructing their identity. This reconstructed identity leads revolution and resistance movement to feel secure themselves as a psychological defense against colonial powers. Knowledge learned by successful implementation of discourses grants right to has power for authority, in addition to serving as a tool to reinforce power of authority by its cognitive traits on foreign policy decision making. The combination of these points contributes to shaping and then make predictable state policies. In the methodology of paper, secondary data was firstly reviewed through university library using a range of sources such as academic abstract, OPAC system, bibliography databases and internet search engines. The film of Argo was used to strengthen and materialize theoretical explanations as a metaphor. This paper aims to highlight the cumulative effects on the construction of the identity throughout embedded discourses by textuality. To demonstrate it by a metaphor, Argo will be used as a primary source for good story-telling about history. U.S-Iran hostage crisis is mainly applied by aiming to see foundations Iran’s behavior in the context of its revolutionary identity and major influences of actions of U.S on it.Keywords: discourse, post colonialism, post modernism, objectivity
Procedia PDF Downloads 1606462 Message Authentication Scheme for Vehicular Ad-Hoc Networks under Sparse RSUs Environment
Authors: Wen Shyong Hsieh, Chih Hsueh Lin
Abstract:
In this paper, we combine the concepts of chameleon hash function (CHF) and identification based cryptography (IBC) to build a message authentication environment for VANET under sparse RSUs. Based on the CHF, TA keeps two common secrets that will be embedded to all identities to be as the evidence of mutual trusting. TA will issue one original identity to every RSU and vehicle. An identity contains one public ID and one private key. The public ID, includes three components: pseudonym, random key, and public key, is used to present one entity and can be verified to be a legal one. The private key is used to claim the ownership of the public ID. Based on the concept of IBC, without any negotiating process, a CHF pairing key multiplied by one private key and other’s public key will be used for mutually trusting and to be utilized as the session key of secure communicating between RSUs and vehicles. To help the vehicles to do message authenticating, the RSUs are assigned to response the vehicle’s temple identity request using two short time secretes that are broadcasted by TA. To light the loading of request information, one day is divided into M time slots. At every time slot, TA will broadcast two short time secretes to all valid RSUs for that time slot. Any RSU can response the temple identity request from legal vehicles. With the collected announcement of public IDs from the neighbor vehicles, a vehicle can set up its neighboring set, which includes the information about the neighbor vehicle’s temple public ID and temple CHF pairing key that can be derived by the private key and neighbor’s public key and will be used to do message authenticating or secure communicating without the help of RSU.Keywords: Internet of Vehicles (IOV), Vehicular Ad-hoc Networks (VANETs), Chameleon Hash Function (CHF), message authentication
Procedia PDF Downloads 3916461 Dynamic Response of Doubly Curved Composite Shell with Embedded Shape Memory Alloys Wires
Authors: Amin Ardali, Mohammadreza Khalili, Mohammadreza Rezai
Abstract:
In this paper, dynamic response of thin smart composite panel subjected to low-velocity transverse impact is investigated. Shape memory wires are used to reinforced curved composite panel in a smart way. One-dimensional thermodynamic constitutive model by Liang and Rogers is used for estimating the structural recovery stress. The two degrees-of-freedom mass-spring model is used for evaluation of the contact force between the curved composite panel and the impactor. This work is benefited from the Hertzian linear contact model which is linearized for the impact analysis of curved composite panel. The governing equations of curved panel are provided by first-order shear theory and solved by Fourier series related to simply supported boundary condition. For this purpose, the equation of doubly curved panel motion included the uniform in-plane forces is obtained. By the present analysis, the curved panel behavior under low-velocity impact, and also the effect of the impact parameters, the shape memory wire and the curved panel dimensions are studied.Keywords: doubly curved shell, SMA wire, impact response, smart material, shape memory alloy
Procedia PDF Downloads 4056460 Study on Planning of Smart GRID Using Landscape Ecology
Authors: Sunglim Lee, Susumu Fujii, Koji Okamura
Abstract:
Smart grid is a new approach for electric power grid that uses information and communications technology to control the electric power grid. Smart grid provides real-time control of the electric power grid, controlling the direction of power flow or time of the flow. Control devices are installed on the power lines of the electric power grid to implement smart grid. The number of the control devices should be determined, in relation with the area one control device covers and the cost associated with the control devices. One approach to determine the number of the control devices is to use the data on the surplus power generated by home solar generators. In current implementations, the surplus power is sent all the way to the power plant, which may cause power loss. To reduce the power loss, the surplus power may be sent to a control device and sent to where the power is needed from the control device. Under assumption that the control devices are installed on a lattice of equal size squares, our goal is to figure out the optimal spacing between the control devices, where the power sharing area (the area covered by one control device) is kept small to avoid power loss, and at the same time the power sharing area is big enough to have no surplus power wasted. To achieve this goal, a simulation using landscape ecology method is conducted on a sample area. First an aerial photograph of the land of interest is turned into a mosaic map where each area is colored according to the ratio of the amount of power production to the amount of power consumption in the area. The amount of power consumption is estimated according to the characteristics of the buildings in the area. The power production is calculated by the sum of the area of the roofs shown in the aerial photograph and assuming that solar panels are installed on all the roofs. The mosaic map is colored in three colors, each color representing producer, consumer, and neither. We started with a mosaic map with 100 m grid size, and the grid size is grown until there is no red grid. One control device is installed on each grid, so that the grid is the area which the control device covers. As the result of this simulation we got 350 m as the optimal spacing between the control devices that makes effective use of the surplus power for the sample area.Keywords: landscape ecology, IT, smart grid, aerial photograph, simulation
Procedia PDF Downloads 4446459 Smart Side View Mirror Camera for Real Time System
Authors: Nunziata Ivana Guarneri, Arcangelo Bruna, Giuseppe Spampinato, Antonio Buemi
Abstract:
In the last decade, automotive companies have invested a lot in terms of innovation about many aspects regarding the automatic driver assistance systems. One innovation regards the usage of a smart camera placed on the car’s side mirror for monitoring the back and lateral road situation. A common road scenario is the overtaking of the preceding car and, in this case, a brief distraction or a loss of concentration can lead the driver to undertake this action, even if there is an already overtaking vehicle, leading to serious accidents. A valid support for a secure drive can be a smart camera system, which is able to automatically analyze the road scenario and consequentially to warn the driver when another vehicle is overtaking. This paper describes a method for monitoring the side view of a vehicle by using camera optical flow motion vectors. The proposed solution detects the presence of incoming vehicles, assesses their distance from the host car, and warns the driver through different levels of alert according to the estimated distance. Due to the low complexity and computational cost, the proposed system ensures real time performances.Keywords: camera calibration, ego-motion, Kalman filters, object tracking, real time systems
Procedia PDF Downloads 2286458 Exploring Artistic Creation and Autoethnography in the Spatial Context of Geography
Authors: Sinem Tas
Abstract:
This research paper attempts to study the perspective of personal experience in relation to spatial dynamics and artistic outcomes within the realm of cultural identity. This article serves as a partial analysis within a broader PhD investigation that focuses on the cultural dynamics and political structures behind cultural identity through an autoethnography of narrative while presenting its correlation with artistic creation in the context of space and people. Focusing on the artistic/creative practice project AUTRUI, the primary goal is to analyse and understand the influence of personal experiences and culturally constructed identity as an artist in resulting in the compositional modality of the last image considering self-reflective experience. Referencing the works of Joyce Davidson and Christine Milligan - the scholars who emphasise the importance of emotion and spatial experience in geographical studies contribute to this work as they highlight the significance of emotion across various spatial scales in their work Embodying Emotion Sensing Space: Introducing Emotional Geographies (2004). Their perspective suggests that understanding emotions within different spatial contexts is crucial for comprehending human experiences and interactions with space. Incorporating the insights of scholars like Yi-Fu Tuan, particularly his seminal work Space and Place: The Perspective of Experience (1979), is important for creating an in-depth frame of geographical experience. Tuan's humanistic perspective on space and place provides a valuable theoretical framework for understanding the interplay between personal experiences and spatial contexts. A substantial contextualisation of the geopolitics of Turkey - the implications for national identity and cohesion - will be addressed by drawing an outline of the political and geographical frame as a methodological strategy to understand the dynamics behind this research. Besides the bibliographical reading, the methods used to study this relation are participatory observation, memory work along with memoir analysis, personal interviews, and discussion of photographs and news. The utilisation of the self as data requires the analysis of the written sources with personal engagement. By delving into written sources such as written communications or diaries as well as memoirs, the research gains a firsthand perspective, enriching the analytical depth of the study. Furthermore, the examination of photography and news articles serves as a valuable means of contextualising experiences from a journalist's background within specific geographical settings. The inclusion of interviews with close family members access provides firsthand perspectives and intimate insights rooted in shared experiences within similar geographical contexts, offering complementary insights and diversified viewpoints, enhancing the comprehensiveness of the investigation.Keywords: art, autoethnography, place and space, Turkey
Procedia PDF Downloads 506457 Creativity as a National System: An Exploratory Model towards Enhance Innovation Ecosystems
Authors: Oscar Javier Montiel Mendez
Abstract:
The link between knowledge-creativity-innovation-entrepreneurship is well established, and broadly emphasized the importance of national innovation systems (NIS) as an approach stresses that the flow of information and technology among people, organizations and institutions are key to its process. Understanding the linkages among the actors involved in innovation is relevant to NIS. Creativity is supposed to fuel NIS, mainly focusing on a personal, group or organizational level, leaving aside the fourth one, as a national system. It is suggested that NIS takes Creativity for granted, an ex-ante stage already solved through some mechanisms, like programs for nurturing it at elementary and secondary schools, universities, or public/organizational specific programs. Or worse, that the individual already has this competence, and that the elements of the NIS will communicate between in a way that will lead to the creation of S curves, with an impact on national systems/programs on entrepreneurship, clusters, and the economy. But creativity constantly appears at any time during NIS, being the key input. Under an initial, exploratory, focused and refined literature review, based on Csikszentmihalyi’s systemic model, Amabile's componential theory, Kaufman and Beghetto’s 4C model, and the OECD’s (Organisation for Economic Co-operation and Development) NIS model (expanded), an NCS theoretical model is elaborated. Its suggested that its implementation could become a significant factor helping strengthen local, regional and national economies. The results also suggest that the establishment of a national creativity system (NCS), something that appears not been previously addressed, as a strategic/vital companion for a NIS, installing it not only as a national education strategy, but as its foundation, managing it and measuring its impact on NIS, entrepreneurship and the rest of the ecosystem, could make more effective public policies. Likewise, it should have a beneficial impact on the efforts of all the stakeholders involved and should help prevent some of the possible failures that NIS present.Keywords: national creativity system, national innovation system, entrepreneurship ecosystem, systemic creativity
Procedia PDF Downloads 430