Search results for: pseudo voter identity scheme PVID
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 3361

Search results for: pseudo voter identity scheme PVID

2581 Cooperative Cross Layer Topology for Concurrent Transmission Scheduling Scheme in Broadband Wireless Networks

Authors: Gunasekaran Raja, Ramkumar Jayaraman

Abstract:

In this paper, we consider CCL-N (Cooperative Cross Layer Network) topology based on the cross layer (both centralized and distributed) environment to form network communities. Various performance metrics related to the IEEE 802.16 networks are discussed to design CCL-N Topology. In CCL-N topology, nodes are classified as master nodes (Master Base Station [MBS]) and serving nodes (Relay Station [RS]). Nodes communities are organized based on the networking terminologies. Based on CCL-N Topology, various simulation analyses for both transparent and non-transparent relays are tabulated and throughput efficiency is calculated. Weighted load balancing problem plays a challenging role in IEEE 802.16 network. CoTS (Concurrent Transmission Scheduling) Scheme is formulated in terms of three aspects – transmission mechanism based on identical communities, different communities and identical node communities. CoTS scheme helps in identifying the weighted load balancing problem. Based on the analytical results, modularity value is inversely proportional to that of the error value. The modularity value plays a key role in solving the CoTS problem based on hop count. The transmission mechanism for identical node community has no impact since modularity value is same for all the network groups. In this paper three aspects of communities based on the modularity value which helps in solving the problem of weighted load balancing and CoTS are discussed.

Keywords: cross layer network topology, concurrent scheduling, modularity value, network communities and weighted load balancing

Procedia PDF Downloads 245
2580 Node Pair Selection Scheme in Relay-Aided Communication Based on Stable Marriage Problem

Authors: Tetsuki Taniguchi, Yoshio Karasawa

Abstract:

This paper describes a node pair selection scheme in relay-aided multiple source multiple destination communication system based on stable marriage problem. A general case is assumed in which all of source, relay and destination nodes are equipped with multiantenna and carry out multistream transmission. Based on several metrics introduced from inter-node channel condition, the preference order is determined about all source-relay and relay-destination relations, and then the node pairs are determined using Gale-Shapley algorithm. The computer simulations show that the effectiveness of node pair selection is larger in multihop communication. Some additional aspects which are different from relay-less case are also investigated.

Keywords: relay, multiple input multiple output (MIMO), multiuser, amplify and forward, stable marriage problem, Gale-Shapley algorithm

Procedia PDF Downloads 384
2579 Evidence of the Effect of the Structure of Social Representations on Group Identification

Authors: Eric Bonetto, Anthony Piermatteo, Fabien Girandola, Gregory Lo Monaco

Abstract:

The present contribution focuses on the effect of the structure of social representations on group identification. A social representation (SR) is defined as an organized and structured set of cognitions, produced and shared by members of a same group about a same social object. Within this framework, the central core theory establishes a structural distinction between central cognitions – or 'core' – and peripheral ones: the former are theoretically considered as more connected than the later to group members’ social identity and may play a greater role in SRs’ ability to allow group identification by means of a common vision of the object of representation. Indeed, the central core provides a reference point for the in-group as it constitutes a consensual vision that gives meaning to a social object particularly important to individuals and to the group. However, while numerous contributions clearly refer to the underlying role of SRs in group identification, there are only few empirical evidences of this aspect. Thus, we hypothesize an effect of the structure of SRs on group identification. More precisely, central cognitions (vs. peripheral ones) will lead to a stronger group identification. In addition, we hypothesize that the refutation of a cognition will lead to a stronger group identification than its activation. The SR mobilized here is that of 'studying' among a population of first-year undergraduate psychology students. Thus, a pretest (N = 82), using an Attribute-Challenge Technique, was designed in order to identify the central and the peripheral cognitions to use in the primings of our main study. The results of this pretest are in line with previous studies. Then, the main study (online; N = 184), using a social priming methodology, was based on a 2 (Structural status of the cognitions belonging to the prime: central vs. peripheral) x 2 (Type of prime: activation vs. refutation) experimental design in order to test our hypotheses. Results revealed, as expected, the main effect of the structure of the SR on group identification. Indeed, central cognitions trigger a higher level of identification than the peripheral ones. However, we observe neither effect of the type of prime, nor interaction effect. These results experimentally demonstrate for the first time the effect of the structure of SRs on group identification and indicate that central cognitions are more connected than peripheral ones to group members’ social identity. These results will be discussed considering the importance of understanding identity as a function of SRs and on their ability to potentially solve the lack of consideration of the definition of the group in Social Representations Theory.

Keywords: group identification, social identity, social representations, structural approach

Procedia PDF Downloads 179
2578 Defending Motherhood: Strategic Comparisons and the Management of Moral Self-Worth among Ex-Offender Mothers

Authors: Geniece Mondé

Abstract:

This article examines how formerly incarcerated mothers deploy strategic comparisons to support their claims of moral self-worth. In depth interviews with 69 ex-offender mothers show that although women occupy a morally ambiguous space, they frame their roles as “good” mothers as independent of past illegal activity. In substantiating the “good” mother narrative women draw comparisons with two groups of women. Some respondents identify individuals perceived as morally disadvantaged and draw comparisons that illustrate their comparative strength in relation to mothers who fail to adequately meet the needs of their children. Women also compared themselves to morally advantaged mothers and expressed a desire to embody the ideals and values of women they viewed as superior mothers. Findings reveal that respondents’ use of strategic comparisons substantiates their framing of personal moral identity, as well as their goals for the future. The paper concludes by examining the theoretical implications of strategic comparisons for the study of morality and identity construction.

Keywords: Ex-Offender, Rehabilitation, Incarceration, Motherhood

Procedia PDF Downloads 120
2577 Frequency of Occurrence Hybrid Watermarking Scheme

Authors: Hamza A. Ali, Adnan H. M. Al-Helali

Abstract:

Generally, a watermark is information that identifies the ownership of multimedia (text, image, audio or video files). It is achieved by introducing modifications into these files that are imperceptible to the human senses but easily recoverable by a computer program. These modifications are done according to a secret key in a descriptive model that would be either in the time domain or frequency domain or both. This paper presents a procedure for watermarking by mixing amplitude modulation with frequency transformation histogram; namely a specific value is used to modulate the intensity component Y of the YIQ components of the carrier image. This scheme is referred to as histogram embedding technique (HET). Results comparison with those of other techniques such as discrete wavelet transform (DWT), discrete cosine transform (DCT) and singular value decomposition (SVD) have shown an enhance efficiency in terms of ease and performance. It has manifested a good degree of robustness against various environment effects such as resizing, rotation and different kinds of noise. This method would prove very useful technique for copyright protection and ownership judgment.

Keywords: watermarking, ownership, copyright protection, steganography, information hiding, authentication

Procedia PDF Downloads 358
2576 Brand Building in Higher Education: A Grounded Theory Investigation of the Impact of the ‘Positive-Visualization-Course in Brand Identity’ upon Freshmen Student's Perception

Authors: Maria Kountouridou, Dino Domic

Abstract:

Within an increasingly competitive and dynamic environment, the higher education sector is becoming more commodified, with the concept of branding to become exceedingly imperative and an inextricable ingredient for the university’s success. Branding in higher education has proven to be an effective strategy that managed to receive considerable attention in the recent few years, and a growing number of articles have begun to appear in the literature. However, a clear void in the literature confirms that the concept of students’ perceptions towards the university’s brand image has not been researched extensively. An investigation on this central concept is of paramount importance since it will facilitate the development of an inductively generated theoretical model concerning branding in higher education. This research focuses on examining the impact of the ‘positive-visualization-course in brand identity’ upon the perception of freshmen students towards a university’s brand image. A grounded theory methodology has been selected, consisting of semi-structured interviews. Forty-two students have participated in the research, among which twenty-five women and seventeen men. The identification of the sample emerged through the use of the snowball sampling technique. The participants were divided into two groups (experimental and control group) after the researcher had taken into consideration the factor ‘program of study’, to eliminate any possible interaction between the participants of each group. An experiment was carried out where a ‘positive-visualization-course in brand identity’ was conducted among the participants of the experimental group, while the participants of the control group have not been exposed to the course. For the purpose of this research, the term ‘positive-visualization-course in brand identity’ refers to a course where brand history, past achievements/recognitions/awards, its values, and its mission are presented. Prior to the course implementation, face-to-face semi-structured interviews were carried out among the participants of both groups, with the aim of examining the freshmen students’ perceptions towards the university’s brand image. One week after the course implementation, the researcher carried out semi-structured interviews with the participants of the experimental group only in order to identify whether students’ perceptions had been affected after the course completion. Four months after the course completion, semi-structured interviews were carried out among the participants of both groups. Eight months after the course completion, semi-structured interviews were conducted with the aim of identifying the freshmen students’ updated perceptions. Data has been analyzed using substantive coding (open and selective coding), theoretical coding, field memos, and constant comparative analysis. The findings strongly suggest that the ‘positive-visualization-course in brand identity’ can positively affect freshmen students’ perceptions towards a university’s brand image. Additionally, other factors conduce to the formation of perception throughout the months. This study contributes and expands upon the existing literature by presenting an inductively generated theoretical model to guide future research in the links between ‘positive-visualization-course in brand identity’ and the perception of freshmen students towards a university’s brand image.

Keywords: brand image, brand name, branding, higher education marketing, perception

Procedia PDF Downloads 165
2575 A Robust Digital Image Watermarking Against Geometrical Attack Based on Hybrid Scheme

Authors: M. Samadzadeh Mahabadi, J. Shanbehzadeh

Abstract:

This paper presents a hybrid digital image-watermarking scheme, which is robust against varieties of attacks and geometric distortions. The image content is represented by important feature points obtained by an image-texture-based adaptive Harris corner detector. These feature points are extracted from LL2 of 2-D discrete wavelet transform which are obtained by using the Harris-Laplacian detector. We calculate the Fourier transform of circular regions around these points. The amplitude of this transform is rotation invariant. The experimental results demonstrate the robustness of the proposed method against the geometric distortions and various common image processing operations such as JPEG compression, colour reduction, Gaussian filtering, median filtering, and rotation.

Keywords: digital watermarking, geometric distortions, geometrical attack, Harris Laplace, important feature points, rotation, scale invariant feature

Procedia PDF Downloads 487
2574 The Optimization of TICSI in the Convergence Mechanism of Urban Water Management

Authors: M. Macchiaroli, L. Dolores, V. Pellecchia

Abstract:

With the recent Resolution n. 580/2019/R/idr, the Italian Regulatory Authority for Energy, Networks, and Environment (ARERA) for the Urban Water Management has introduced, for water managements characterized by persistent critical issues regarding the planning and organization of the service and the implementation of the necessary interventions for the improvement of infrastructures and management quality, a new mechanism for determining tariffs: the regulatory scheme of Convergence. The aim of this regulatory scheme is the overcoming of the Water Service Divided in order to improve the stability of the local institutional structures, technical quality, contractual quality, as well as in order to guarantee transparency elements for Users of the Service. Convergence scheme presupposes the identification of the cost items to be considered in the tariff in parametric terms, distinguishing three possible cases according to the type of historical data available to the Manager. The study, in particular, focuses on operations that have neither data on tariff revenues nor data on operating costs. In this case, the Manager's Constraint on Revenues (VRG) is estimated on the basis of a reference benchmark and becomes the starting point for defining the structure of the tariff classes, in compliance with the TICSI provisions (Integrated Text for tariff classes, ARERA's Resolution n. 665/2017/R/idr). The proposed model implements the recent studies on optimization models for the definition of tariff classes in compliance with the constraints dictated by TICSI in the application of the Convergence mechanism, proposing itself as a support tool for the Managers and the local water regulatory Authority in the decision-making process.

Keywords: decision-making process, economic evaluation of projects, optimizing tools, urban water management, water tariff

Procedia PDF Downloads 104
2573 Highlighting Adverse Effects of Privatization of Heritage on Taj Mahal and Providing Solutions to Improve the Condition without Privatizing

Authors: Avani Saraswat

Abstract:

The paper studies the present condition of Taj Mahal (the UNESCO world heritage site) and the reasons behind deterioration. Analysis is done to explore the reasons behind this building to be included in the list of adopt heritage scheme, by the Government of India. The aim is to find out the future effects on Taj Mahal after being adopted by a private body. Finally, it suggests solutions which can lead to improvement of the present condition of the building. In order to establish a research, a further analysis is done through a case study of Red Fort, New Delhi (another UNESCO world heritage site). This monument was given to Dalmia Group of India Pvt. Ltd. for the tenure of 5 years. Paper discusses the consequences of privatization on Red Fort and then analyze it for Taj Mahal. It terms monument as riches of a heritage chest, not as a commercial tourist place. The study is concluded with the ideas and suggestions proposed for saving Taj Mahal and advantages on improving the health of the building.

Keywords: privatisation of heritage, heritage, Taj Mahal, adopt heritage scheme

Procedia PDF Downloads 129
2572 Identity and Ethnic Conflicts in Afghanistan: Diversity as a Cultural Treasure

Authors: Morteza Azimi

Abstract:

In Afghanistan, as a multi-ethnic country, there have been ethnic conflicts, especially after 2001. These conflicts are more visible among the four main ethnicities Pashtun, Tajik, Hazara, and Uzbek. In this paper, such ethnic conflicts and their roles in the political sphere will be discussed. The distribution of personal electronic ID cards, for example, has been one of the most controversial and unsuccessful projects in Afghanistan. As a result, the lack of clear population statistics has led to several corrupted and unsuccessful presidential elections since 2001. The nation-building process in post-Taliban Afghanistan, as well as the Afghan government’s failure to build a nation, are discussed. By referring to the hybridity theory of Homi Bhabha, it is argued that the process of assimilation for nation-building has not only failed but has deepened ethnic divisions. In the end, some suggestions and solutions for making the most out of ethnic diversity rather than suffering from it will be provided. It will be argued that diversity or difference improves the freedom of choices for groups and individuals; it boosts agency in comparison with life in an assimilated, coherent, and homogeneous society.

Keywords: Afghan identity, ethnicity, nation-building, political system, self and other

Procedia PDF Downloads 216
2571 Adapting to College: Exploration of Psychological Well-Being, Coping, and Identity as Markers of Readiness

Authors: Marit D. Murry, Amy K. Marks

Abstract:

The transition to college is a critical period that affords abundant opportunities for growth in conjunction with novel challenges for emerging adults. During this time, emerging adults are garnering experiences and acquiring hosts of new information that they are required to synthesize and use to inform life-shaping decisions. This stage is characterized by instability and exploration, which necessitates a diverse set of coping skills to successfully navigate and positively adapt to their evolving environment. However, important sociocultural factors result in differences that occur developmentally for minority emerging adults (i.e., emerging adults with an identity that has been or is marginalized). While the transition to college holds vast potential, not all are afforded the same chances, and many individuals enter into this stage at varying degrees of readiness. Understanding the nuance and diversity of student preparedness for college and contextualizing these factors will better equip systems to support incoming students. Emerging adulthood for ethnic, racial minority students presents itself as an opportunity for growth and resiliency in the face of systemic adversity. Ethnic, racial identity (ERI) is defined as an identity that develops as a function of one’s ethnic-racial group membership. Research continues to demonstrate ERI as a resilience factor that promotes positive adjustment in young adulthood. Adaptive coping responses (e.g., engaging in help-seeking behavior, drawing on personal and community resources) have been identified as possible mechanisms through which ERI buffers youth against stressful life events, including discrimination. Additionally, trait mindfulness has been identified as a significant predictor of general psychological health, and mindfulness practice has been shown to be a self-regulatory strategy that promotes healthy stress responses and adaptive coping strategy selection. The current study employed a person-centered approach to explore emerging patterns across ethnic identity development and psychological well-being criterion variables among college freshmen. Data from 283 incoming college freshmen at Northeastern University were analyzed. The Brief COPE Acceptance and Emotional Support scales, the Five Factor Mindfulness Questionnaire, and MIEM Exploration and Affirmation measures were used to inform the cluster profiles. The TwoStep auto-clustering algorithm revealed an optimal three-cluster solution (BIC = 848.49), which classified 92.6% (n = 262) of participants in the sample into one of the three clusters. The clusters were characterized as ‘Mixed Adjustment’, ‘Lowest Adjustment’, and ‘Moderate Adjustment.’ Cluster composition varied significantly by ethnicity X² (2, N = 262) = 7.74 (p = .021) and gender X² (2, N = 259) = 10.40 (p = .034). The ‘Lowest Adjustment’ cluster contained the highest proportion of students of color, 41% (n = 32), and male-identifying students, 44.2% (n = 34). Follow-up analyses showed higher ERI exploration in ‘Moderate Adjustment’ cluster members, also reported higher levels of psychological distress, with significantly elevated depression scores (p = .011), psychological diagnoses of depression (p = .013), anxiety (p = .005) and psychiatric disorders (p = .025). Supporting prior research, students engaging with identity exploration processes often endure more psychological distress. These results indicate that students undergoing identity development may require more socialization and different services beyond normal strategies.

Keywords: adjustment, coping, college, emerging adulthood, ethnic-racial identity, psychological well-being, resilience

Procedia PDF Downloads 96
2570 The Design of Multiple Detection Parallel Combined Spread Spectrum Communication System

Authors: Lixin Tian, Wei Xue

Abstract:

Many jobs in society go underground, such as mine mining, tunnel construction and subways, which are vital to the development of society. Once accidents occur in these places, the interruption of traditional wired communication is not conducive to the development of rescue work. In order to realize the positioning, early warning and command functions of underground personnel and improve rescue efficiency, it is necessary to develop and design an emergency ground communication system. It is easy to be subjected to narrowband interference when performing conventional underground communication. Spreading communication can be used for this problem. However, general spread spectrum methods such as direct spread communication are inefficient, so it is proposed to use parallel combined spread spectrum (PCSS) communication to improve efficiency. The PCSS communication not only has the anti-interference ability and the good concealment of the traditional spread spectrum system, but also has a relatively high frequency band utilization rate and a strong information transmission capability. So, this technology has been widely used in practice. This paper presents a PCSS communication model-multiple detection parallel combined spread spectrum (MDPCSS) communication system. In this paper, the principle of MDPCSS communication system is described, that is, the sequence at the transmitting end is processed in blocks and cyclically shifted to facilitate multiple detection at the receiving end. The block diagrams of the transmitter and receiver of the MDPCSS communication system are introduced. At the same time, the calculation formula of the system bit error rate (BER) is introduced, and the simulation and analysis of the BER of the system are completed. By comparing with the common parallel PCSS communication, we can draw a conclusion that it is indeed possible to reduce the BER and improve the system performance. Furthermore, the influence of different pseudo-code lengths selected on the system BER is simulated and analyzed, and the conclusion is that the larger the pseudo-code length is, the smaller the system error rate is.

Keywords: cyclic shift, multiple detection, parallel combined spread spectrum, PN code

Procedia PDF Downloads 123
2569 A Double Differential Chaos Shift Keying Scheme for Ultra-Wideband Chaotic Communication Technology Applied in Low-Rate Wireless Personal Area Network

Authors: Ghobad Gorji, Hasan Golabi

Abstract:

The goal of this paper is to describe the design of an ultra-wideband (UWB) system that is optimized for the low-rate wireless personal area network application. To this aim, we propose a system based on direct chaotic communication (DCC) technology. Based on this system, a 2-GHz wide chaotic signal is directly generated into the lower band of the UWB spectrum, i.e., 3.1–5.1 GHz. For this system, two simple modulation schemes, namely chaotic on-off keying (COOK) and differential chaos shift keying (DCSK), were studied before, and their performance was evaluated. We propose a modulation scheme, namely Double DCSK, to improve the performance of UWB DCC. Different characteristics of these systems, with Monte Carlo simulations based on the Additive White Gaussian Noise (AWGN) and the IEEE 802.15.4a standard channel models, are compared.

Keywords: UWB, DCC, IEEE 802.15.4a, COOK, DCSK

Procedia PDF Downloads 61
2568 Gender Policies and Political Culture: An Examination of the Canadian Context

Authors: Chantal Maille

Abstract:

This paper is about gender-based analysis plus (GBA+), an intersectional gender policy used in Canada to assess the impact of policies and programs for men and women from different origins. It looks at Canada’s political culture to explain the nature of its gender policies. GBA+ is defined as an analysis method that makes it possible to assess the eventual effects of policies, programs, services, and other initiatives on women and men of different backgrounds because it takes account of gender and other identity factors. The ‘plus’ in the name serves to emphasize that GBA+ goes beyond gender to include an examination of a wide range of other related identity factors, such as age, education, language, geography, culture, and income. The point of departure for GBA+ is that women and men are not homogeneous populations and gender is never the only factor in defining a person’s identity; rather, it interacts with factors such as ethnic origin, age, disabilities, where the person lives, and other aspects of individual and social identity. GBA+ takes account of these factors and thus challenges notions of similarity or homogeneity within populations of women and men. Comparative analysis based on sex and gender may serve as a gateway to studying a given question, but women, men, girls, and boys do not form homogeneous populations. In the 1990s, intersectionality emerged as a new feminist framework. The popularity of the notion of intersectionality corresponds to a time when, in hindsight, the damage done to minoritized groups by state disengagement policies in concert with global intensification of neoliberalism, and vice versa, can be measured. Although GBA+ constitutes a form of intersectionalization of GBA, it must be understood that the two frameworks do not spring from a similar logic. Intersectionality first emerged as a dynamic analysis of differences between women that was oriented toward change and social justice, whereas GBA is a technique developed by state feminists in a context of analyzing governmental policies and aiming to promote equality between men and women. It can nevertheless be assumed that there might be interest in such a policy and program analysis grid that is decentred from gender and offers enough flexibility to take account of a group of inequalities. In terms of methodology, the research is supported by a qualitative analysis of governmental documents about GBA+ in Canada. Research findings identify links between Canadian gender policies and its political culture. In Canada, diversity has been taken into account as an element at the basis of gendered analysis of public policies since 1995. The GBA+ adopted by the government of Canada conveys an opening to intersectionality and a sensitivity to multiculturalism. The Canadian Multiculturalism Act, adopted 1988, proposes to recognize the fact that multiculturalism is a fundamental characteristic of the Canadian identity and heritage and constitutes an invaluable resource for the future of the country. In conclusion, Canada’s distinct political culture can be associated with the specific nature of its gender policies.

Keywords: Canada, gender-based analysis, gender policies, political culture

Procedia PDF Downloads 208
2567 Providing a Secure Hybrid Method for Graphical Password Authentication to Prevent Shoulder Surfing, Smudge and Brute Force Attack

Authors: Faraji Sepideh

Abstract:

Nowadays, purchase rate of the smart device is increasing and user authentication is one of the important issues in information security. Alphanumeric strong passwords are difficult to memorize and also owners write them down on papers or save them in a computer file. In addition, text password has its own flaws and is vulnerable to attacks. Graphical password can be used as an alternative to alphanumeric password that users choose images as a password. This type of password is easier to use and memorize and also more secure from pervious password types. In this paper we have designed a more secure graphical password system to prevent shoulder surfing, smudge and brute force attack. This scheme is a combination of two types of graphical passwords recognition based and Cued recall based. Evaluation the usability and security of our proposed scheme have been explained in conclusion part.

Keywords: brute force attack, graphical password, shoulder surfing attack, smudge attack

Procedia PDF Downloads 145
2566 International Collaboration: Developing the Practice of Social Work Curriculum through Study Abroad and Participatory Research

Authors: Megan Lindsey

Abstract:

Background: Globalization presents international social work with both opportunities and challenges. Thus, the design of this international experience aligns with the three charges of the Commission on Global Social Work Education. An international collaborative effort between an American and Scottish University Social Work Program was based on an established University agreement. The presentation provides an overview of an international study abroad among American and Scottish Social Work students. Further, presenters will discuss the opportunities of international collaboration and the challenges of the project. First, we will discuss the process of a successful international collaboration. This discussion will include the planning, collaboration, execution of the experience, along with its application to the international field of social work. Second, we will discuss the development and implementation of participatory action research in which the student engage to enhance their learning experience. A collaborative qualitative research project was undertaken with three goals. First, students gained experience in Scottish social services, including agency visits and presentations. Second, a collaboration between American and Scottish MSW Students allowed the exchange of ideas and knowledge about services and social work education. Third, students collaborated on a qualitative research method to reflect on their social work education and the formation of their professional identity. Methods/Methodology: American and Scottish students engaged in participatory action research by using Photovoice methods while studying together in Scotland. The collaboration between faculty researchers framed a series of research questions. Both universities obtained IRB approval and trained students in Photovoice methods. The student teams used the research question and Photovoice method to discover images that represented their professional identity formation. Two Photovoice goals grounded the study's research question. First, the methods enabled the individual students to record and reflect on their professional strengths and concerns. Second, student teams promoted critical dialogue and knowledge about personal and professional issues through large and small group discussions of photographs. Results: The international participatory approach generated the ability for students to contextualize their common social work education and practice experiences. Team discussions between representatives of each country resulted in understanding professional identity formation and the processes of social work education that contribute to that identity. Students presented the photograph narration of their knowledge and understanding of international social work education and practice. Researchers then collaborated on finding common themes. The results found commonalities in the quality and depth of social work education. The themes found differences regarding how professional identity is formed. Students found great differences between their and American accreditation and certification. Conclusions: Faculty researchers’ collaboration themes sought to categorize the students’ experiences of their professional identity. While the social work education systems are similar, there are vast differences. The Scottish themes noted structures within American social work not found in the United Kingdom. The American researchers noted that Scotland, as does the United Kingdom, relies on programs, agencies, and the individual social worker to provide structure to identity formation. Other themes will be presented.

Keywords: higher education curriculum, international collaboration, social sciences, action research

Procedia PDF Downloads 109
2565 Hydraulic Analysis of Irrigation Approach Channel Using HEC-RAS Model

Authors: Muluegziabher Semagne Mekonnen

Abstract:

This study was intended to show the irrigation water requirements and evaluation of canal hydraulics steady state conditions to improve on scheme performance of the Meki-Ziway irrigation project. The methodology used was the CROPWAT 8.0 model to estimate the irrigation water requirements of five major crops irrigated in the study area. The results showed that for the whole existing and potential irrigation development area of 2000 ha and 2599 ha, crop water requirements were 3,339,200 and 4,339,090.4 m³, respectively. Hydraulic simulation models are fundamental tools for understanding the hydraulic flow characteristics of irrigation systems. Hydraulic simulation models are fundamental tools for understanding the hydraulic flow characteristics of irrigation systems. In this study Hydraulic Analysis of Irrigation Canals Using HEC-RAS Model was conducted in Meki-Ziway Irrigation Scheme. The HEC-RAS model was tested in terms of error estimation and used to determine canal capacity potential.

Keywords: HEC-RAS, irrigation, hydraulic. canal reach, capacity

Procedia PDF Downloads 44
2564 Territorialisation and Elections: Land and Politics in Benin

Authors: Kamal Donko

Abstract:

In the frontier zone of Benin Republic, land seems to be a fundamental political resource as it is used as a tool for socio-political mobilization, blackmail, inclusion and exclusion, conquest and political control. This paper seeks to examine the complex and intriguing interlinks between land, identity and politics in central Benin. It aims to investigate what roles territorialisation and land ownership are playing in the electioneering process in central Benin. It employs ethnographic multi-sited approach to data collections including observations, interviews and focused group discussions. Research findings reveal a complex and intriguing relationship between land ownership and politics in central Benin. Land is found to be playing a key role in the electioneering process in the region. The study has also discovered many emerging socio-spatial patterns of controlling and maintaining political power in the zone which are tied to land politics. These include identity reconstruction and integration mechanism through intermarriages, socio-political initiatives and construction of infrastructure of sovereignty. It was also found that ‘Diaspora organizations’ and identity issues; strategic creation of administrative units; alliance building strategy; gerrymandering local political field, etc. These emerging socio-spatial patterns of territorialisation for maintaining political power affect migrant and native communities’ relationships. It was also found that ‘Diaspora organizations’ and identity issues; strategic creation of administrative units; alliance building strategy; gerrymandering local political field, etc. are currently affecting migrant’s and natives’ relationships. The study argues that territorialisation is not only about national boundaries and the demarcation between different nation states, but more importantly, it serves as a powerful tool of domination and political control at the grass root level. Furthermore, this study seems to provide another perspective from which the political situation in Africa can be studied. Investigating how the dynamics of land ownership is influencing politics at the grass root or micro level, this study is fundamental to understanding spatial issues in the frontier zone.

Keywords: land, migration, politics, territorialisation

Procedia PDF Downloads 344
2563 The Use of Mobile Phone as Enhancement to Mark Multiple Choice Objectives English Grammar and Literature Examination: An Exploratory Case Study of Preliminary National Diploma Students, Abdu Gusau Polytechnic, Talata Mafara, Zamfara State, Nigeria

Authors: T. Abdulkadir

Abstract:

Most often, marking and assessment of multiple choice kinds of examinations have been opined by many as a cumbersome and herculean task to accomplished manually in Nigeria. Usually this may be in obvious nexus to the fact that mass numbers of candidates were known to take the same examination simultaneously. Eventually, marking such a mammoth number of booklets dared and dread even the fastest paid examiners who often undertake the job with the resulting consequences of stress and boredom. This paper explores the evolution, as well as the set aim to envision and transcend marking the Multiple Choice Objectives- type examination into a thing of creative recreation, or perhaps a more relaxing activity via the use of the mobile phone. A more “pragmatic” dimension method was employed to achieve this work, rather than the formal “in-depth research” based approach due to the “novelty” of the mobile-smartphone e-Marking Scheme discovery. Moreover, being an evolutionary scheme, no recent academic work shares a direct same topic concept with the ‘use of cell phone as an e-marking technique’ was found online; thus, the dearth of even miscellaneous citations in this work. Additional future advancements are what steered the anticipatory motive of this paper which laid the fundamental proposition. However, the paper introduces for the first time the concept of mobile-smart phone e-marking, the steps to achieve it, as well as the merits and demerits of the technique all spelt out in the subsequent pages.

Keywords: cell phone, e-marking scheme (eMS), mobile phone, mobile-smart phone, multiple choice objectives (MCO), smartphone

Procedia PDF Downloads 230
2562 Kinetics and Thermodynamics Adsorption of Phenolic Compounds on Organic-Inorganic Hybrid Mesoporous Material

Authors: Makhlouf Mourad, Messabih Sidi Mohamed, Bouchher Omar, Houali Farida, Benrachedi Khaled

Abstract:

Mesoporous materials are very commonly used as adsorbent materials for removing phenolic compounds. However, the adsorption mechanism of these compounds is still poorly controlled. However, understanding the interactions mesoporous materials/adsorbed molecules is very important in order to optimize the processes of liquid phase adsorption. The difficulty of synthesis is to keep an orderly and cubic pore structure and achieve a homogeneous surface modification. The grafting of Si(CH3)3 was chosen, to transform hydrophilic surfaces hydrophobic surfaces. The aim of this work is to study the kinetics and thermodynamics of two volatile organic compounds VOC phenol (PhOH) and P hydroxy benzoic acid (4AHB) on a mesoporous material of type MCM-48 grafted with an organosilane of the Trimethylchlorosilane (TMCS) type, the material thus grafted or functionalized (hereinafter referred to as MCM-48-G). In a first step, the kinetic and thermodynamic study of the adsorption isotherms of each of the VOCs in mono-solution was carried out. In a second step, a similar study was carried out on a mixture of these two compounds. Kinetic models (pseudo-first order, pseudo-second order) were used to determine kinetic adsorption parameters. The thermodynamic parameters of the adsorption isotherms were determined by the adsorption models (Langmuir, Freundlich). The comparative study of adsorption of PhOH and 4AHB proved that MCM-48-G had a high adsorption capacity for PhOH and 4AHB; this may be related to the hydrophobicity created by the organic function of TMCS in MCM-48-G. The adsorption results for the two compounds using the Freundlich and Langmuir models show that the adsorption of 4AHB was higher than PhOH. The values ​​obtained by the adsorption thermodynamics show that the adsorption interactions for our sample with the phenol and 4AHB are of a physical nature. The adsorption of our VOCs on the MCM-48 (G) is a spontaneous and exothermic process.

Keywords: adsorption, kinetics, isotherm, mesoporous materials, Phenol, P-hydroxy benzoique acid

Procedia PDF Downloads 192
2561 Teachers of English for Accounting Purpose: Self-Identity and Self-Reflectivity

Authors: Nanis Setyorini

Abstract:

This is an interpretive study that aims to explore English teachers’ self-identity and self-reflection on teaching of English for accounting purpose in Indonesian accounting schools. Pierre Bourdieu’s concepts of capitals, habitus, and field are applied to capture and analyze the outright feelings, dilemma, and efforts of how English teachers see their educational background and adjust their understanding of English teaching for specific purpose, how they deliver unrecognized materials about accountancy, how they build confidence in teaching accountancy experts, and how to develop their professional commitment as English teachers for accounting purpose. Therefore, semi-structured interviews and focus group discussions are conducted to 16 English teachers in accounting schools within five state and private universities in East Java, Indonesia. The appropriateness of English teachers for accounting students remains a debatable topic. Previous literatures assume that the best English teachers for accounting students should be those who can demonstrate good quality use of English as well as those who have sound accounting knowledge and experience; however, such teachers are rare to find. Most English teachers in Indonesian accounting schools generally graduate from English education or English literature that provide a very limited pedagogic theories and practices of English for specific purpose (ESP). As a result, ESP teachers often had misconception and loss of face when they deliver subject contents to their accounting students who sometimes have been employed as professional accountants. The teachers also face a dilemma in locating themselves as the insiders in English knowledge, but the outsiders in accounting field. These situations are generally problems in their early-stage of teaching due to the lack of ESP knowledge, the shortage of teaching preparation, the absence of ESP in-house trainings on English for accountancy, and the unconducive relations with accounting educators as well as other ESP teachers. Then, self-learning with various resources and strategies is said as their effort to develop their teaching competence so they are able to teach English for accounting students more effectively.

Keywords: ESP teacher, English for accounting, self-identity, self-reflectivity

Procedia PDF Downloads 385
2560 Process Data-Driven Representation of Abnormalities for Efficient Process Control

Authors: Hyun-Woo Cho

Abstract:

Unexpected operational events or abnormalities of industrial processes have a serious impact on the quality of final product of interest. In terms of statistical process control, fault detection and diagnosis of processes is one of the essential tasks needed to run the process safely. In this work, nonlinear representation of process measurement data is presented and evaluated using a simulation process. The effect of using different representation methods on the diagnosis performance is tested in terms of computational efficiency and data handling. The results have shown that the nonlinear representation technique produced more reliable diagnosis results and outperforms linear methods. The use of data filtering step improved computational speed and diagnosis performance for test data sets. The presented scheme is different from existing ones in that it attempts to extract the fault pattern in the reduced space, not in the original process variable space. Thus this scheme helps to reduce the sensitivity of empirical models to noise.

Keywords: fault diagnosis, nonlinear technique, process data, reduced spaces

Procedia PDF Downloads 231
2559 Narrative Family Therapy and the Treatment of Perinatal Mood and Anxiety Disorders

Authors: Jamie E. Banker

Abstract:

For many families, pregnancy and the postpartum time are filled with both anticipation and change. For some pregnant or postpartum women, this time is marked by the onset of a mood or anxiety disorder. Experiencing a mood or anxiety disorders during this time of life differs from depression or anxiety at other times of life. Not only because of the physical changes occurring in the mother’s body but also the mental and physical preparation necessary to redefine family roles, responsibilities, and develop new identities in the life transition. The presence of a mood or anxiety disorder can influence the way in which a mother defines herself and can complicate her understanding of her abilities and competencies as a mother. The complexity of experiencing a mood or anxiety disorder in the midst of these changes necessitates specific treatment interventions to match both the symptomatology and psychological adjustments. This study explores the use of narrative family therapy techniques when treating a mother who is experiencing postpartum depression. Externalization is a common technique used in narrative family therapy and can help client’s separate their identity from the problems they are experiencing. This is crucial to a new mom who is in the middle of defining her identity during her transition to parenthood. The goal of this study is to examine how the use of externalization techniques help postpartum women separate their mood and anxiety symptoms from their identity as a mother. An exploratory case study design was conducted in a single setting, private practice therapy office, and explored how a narrative family therapy approach can be used to treat perinatal mood and anxiety disorders. The therapy sessions were audio recorded and transcribed. Constructivism and narrative theory are used as theoretical frameworks and data from the therapy sessions, and a follow-up survey was triangulated and analyzed. During the course of the treatment, the participant reports using the new externalizing labels for her symptoms. Within one month of treatment, the participant reports that she could stop herself from thinking the harmful thoughts faster, and within three months, the harmful thoughts went away. The main themes in this study were building courage and less self-blame. This case highlights the role narrative family therapy can play in the treatment of perinatal mood and anxiety disorders and the importance of separating a women’s mood from her identity as a mother. This conceptual framework was beneficial to the postpartum mother when treating perinatal mood and anxiety disorder symptoms.

Keywords: externalizing techniques, narrative family therapy, perinatal mood and anxiety disorders, postpartum depression

Procedia PDF Downloads 249
2558 Formal Development of Electronic Identity Card System Using Event-B

Authors: Tomokazu Nagata, Jawid Ahmad Baktash

Abstract:

The goal of this paper is to explore the use of formal methods for Electronic Identity Card System. Nowadays, one of the core research directions in a constantly growing distributed environment is the improvement of the communication process. The responsibility for proper verification becomes crucial. Formal methods can play an essential role in the development and testing of systems. The thesis presents two different methodologies for assessing correctness. Our first approach employs abstract interpretation techniques for creating a trace based model for Electronic Identity Card System. The model was used for building a semi decidable procedure for verifying the system model. We also developed the code for the eID System and can cover three parts login to system sending of Acknowledgment from user side, receiving of all information from server side and log out from system. The new concepts of impasse and spawned sessions that we introduced led our research to original statements about the intruder’s knowledge and eID system coding with respect to secrecy. Furthermore, we demonstrated that there is a bound on the number of sessions needed for the analysis of System.Electronic identity (eID) cards promise to supply a universal, nation-wide mechanism for user authentication. Most European countries have started to deploy eID for government and private sector applications. Are government-issued electronic ID cards the proper way to authenticate users of online services? We use the eID project as a showcase to discuss eID from an application perspective. The new eID card has interesting design features, it is contact-less, it aims to protect people’s privacy to the extent possible, and it supports cryptographically strong mutual authentication between users and services. Privacy features include support for pseudonymous authentication and per service controlled access to individual data items. The article discusses key concepts, the eID infrastructure, observed and expected problems, and open questions. The core technology seems ready for prime time and government projects deploy it to the masses. But application issues may hamper eID adoption for online applications.

Keywords: eID, event-B, Pro-B, formal method, message passing

Procedia PDF Downloads 216
2557 An Excellent Adventure: The Stories of National Tertiary Teaching Excellence Award Winners

Authors: Claire Goode

Abstract:

This paper reports on a doctoral research project using narrative inquiry to investigate the stories of twelve national Tertiary Teaching Excellence Award winners in New Zealand. Preliminary findings highlight awardees’ views on their identity, their professional practice, and on what they consider to be excellence in tertiary teaching. The research also reports on common themes in the personal qualities that awardees describe, and on what these nationally recognised educators would like to see in place around Tertiary Teacher Development. Educators, mentors, trainers, and curriculum designers can gain a deeper understanding of what teaching excellence looks like, and of how teachers perceive their own practice and their impact on others. This may enable different interventions to develop best practice from staff, and to raise standards. It is hoped too that, by reflecting on the stories of teachers who have been recognised for ‘excellence’, educators will relate to and recognise elements of their own practice, and will feel motivated and inspired to share these with their peers and the wider academic community.

Keywords: academic identity, narrative inquiry, teacher development, teaching excellence

Procedia PDF Downloads 112
2556 Using Printouts as Social Media Evidence and Its Authentication in the Courtroom

Authors: Chih-Ping Chang

Abstract:

Different from traditional objective evidence, social media evidence has its own characteristics with easily tampering, recoverability, and cannot be read without using other devices (such as a computer). Simply taking a screenshot from social network sites must be questioned its original identity. When the police search and seizure digital information, a common way they use is to directly print out digital data obtained and ask the signature of the parties at the presence, without taking original digital data back. In addition to the issue on its original identity, this conduct to obtain evidence may have another two results. First, it will easily allege that is tampering evidence because the police wanted to frame the suspect and falsified evidence. Second, it is not easy to discovery hidden information. The core evidence associated with crime may not appear in the contents of files. Through discovery the original file, data related to the file, such as the original producer, creation time, modification date, and even GPS location display can be revealed from hidden information. Therefore, how to show this kind of evidence in the courtroom will be arguably the most important task for ruling social media evidence. This article, first, will introduce forensic software, like EnCase, TCT, FTK, and analyze their function to prove the identity with another digital data. Then turning back to the court, the second part of this article will discuss legal standard for authentication of social media evidence and application of that forensic software in the courtroom. As the conclusion, this article will provide a rethinking, that is, what kind of authenticity is this rule of evidence chase for. Does legal system automatically operate the transcription of scientific knowledge? Or furthermore, it wants to better render justice, not only under scientific fact, but through multivariate debating.

Keywords: federal rule of evidence, internet forensic, printouts as evidence, social media evidence, United States v. Vayner

Procedia PDF Downloads 277
2555 Reference Intensity Ratio Semi-Quantitative Analysis of Cordierite-Mullite Synthesis by a Solid State Method

Authors: D. Wattanasiriwech, S. Wattanasiriwech

Abstract:

In this paper, attempt to synthesize designed cordierite-mullite system with various ratios was performed using a solid-state method. Alumina, quartz, magnesia, and talc were used as starting materials for the synthesis. Talc was added for two purposes; to assist the reaction progress and to be the Mg source. The raw materials were mixed and fired at 1350°C for 2 h and 1400°C for 2 and 4 h. The resulting phase compositions were analysed using the Reference Intensity Ratio (RIR) semi-quantitative analysis method. The highest amount of cordierite up to Cordierite phase 96% could be obtained at the firing scheme of 1400°C for 4 h in the C100-M0. Mullite could not be formed at the selected scheme if talc did not present so no pure mullite was observed in the selected firing regime. The highest amount of mullite co-existed with cordierite and other phases were 74%.

Keywords: RIR semi-quantitative analysis, cordierite-mullite system, solid state synthesis, X-Ray diffraction

Procedia PDF Downloads 158
2554 The School Threshold's Identity as a Place for Interaction: Research Project with the Participation of Elementary-School Children

Authors: Natalia Bazaiou

Abstract:

The school entrance is one of the most important places in the everyday lives of children. As an intersection between school and public realm of the city, it is characterized by gradations of porous and rigid boundaries. Depending on its function, it can serve as a threshold or as a boundary. Additionally, it is a spatial condition that facilitates a dialogue between the school and the city and draws content from both. School thresholds are important in supporting the role of the school as an important node in the city and a bridge between children's various everyday life dynamics by demonstrating prominent usage and meaning as a place that is open to the community as well as to possibilities and physical interaction. In this research, we examine the role of the "realm of the in-between" between school and city through the architecture workshops for children at Hill Memorial School in Athens, in which we explore children's perceptions, wishes, and ideas related to their familiar everyday places of transition from school to city and vice versa. Also discussed in the presentation are the writings of Herman Hertzberger, Aldo Van Eyck, Jaap Bakema and others.

Keywords: threshold, city, play, identity, cinematic tools, children, school architecture

Procedia PDF Downloads 57
2553 A Multi Agent Based Protection Scheme for Smart Distribution Network in Presence of Distributed Energy Resources

Authors: M. R. Ebrahimi, B. Mahdaviani

Abstract:

Conventional electric distribution systems are radial in nature, supplied at one end through a main source. These networks generally have a simple protection system usually implemented using fuses, re-closers, and over-current relays. Recently, great attention has been paid to applying Distributed energy resources (DERs) throughout electric distribution systems. Presence of such generation in a network leads to losing coordination of protection devices. Therefore, it is desired to develop an algorithm which is capable of protecting distribution systems that include DER. On the other hand smart grid brings opportunities to the power system. Fast advancement in communication and measurement techniques accelerates the development of multi agent system (MAS). So in this paper, a new approach for the protection of distribution networks in the presence of DERs is presented base on MAS. The proposed scheme has been implemented on a sample 27-bus distribution network.

Keywords: distributed energy resource, distribution network, protection, smart grid, multi agent system

Procedia PDF Downloads 592
2552 Walls against Legal Identity: A Qualitative Study on Children of Refugees without Birth Registration in Malaysia

Authors: Rodziana M. Razali, Tamara J. Duraisingham

Abstract:

Malaysia is not a signatory to the 1951 Refugee Convention and its 1967 Protocol despite receiving the largest share of refugee inflows in Southeast Asia aside from Thailand. In Peninsular Malaysia, the majority of refugees and asylum seekers are from Myanmar, with Rohingya refugees recording the highest number compared to all other ethnicities. In the eastern state of Sabah, the presence of refugees who have long established themselves in the state is connected to those who escaped military persecution in southern Philippines in the 1970’s and 1980’s. A combination of legal and non-legal factors has created and sustained an adverse atmosphere of deprivation of legal identity for children of migrants including refugees born in Malaysia. This paper aims to qualitatively analyse the barriers to birth registration as the cornerstone of every person’s legal identity for children of refugees born in this country, together with the associated human rights implications. Data obtained through semi-structured interviews with refugees in Kota Kinabalu, Sabah and Rohingya refugees in Peninsular Malaysia shall be studied alongside secondary sources. Results show that births out of medical facilities, suspension of birth records, illiteracy, lack of awareness on the importance and procedures of birth registration, inability to meet documentary requirements, as well as fear of immigration enforcement, are the key factors hindering birth registration. These challenges exist against the backdrop of restrictive integration policy to avoid destabilising demographic and racial balance, political sentiment stirring xenophobic prejudices, as well as other economic and national security considerations. With no proof of their legal identity, the affected children grow up in a legal limbo, facing multiple human rights violations across generations. This research concludes that the country’s framework and practice concerning birth registration is in need of serious reform and improvement to reflect equality and universality of access to its birth registration system. Such would contribute significantly towards meeting its commitments to the post-2015 sustainable development agenda that pledges to 'Leave no one behind', as well as its recently announced National Human Rights Action Plan.

Keywords: birth registration, children, Malaysia, refugees

Procedia PDF Downloads 155