Search results for: social security models
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 17523

Search results for: social security models

16683 Balancing Resources and Demands in Activation Work with Young Adults: Exploring Potentials of the Job Demands-Resources Theory

Authors: Gurli Olsen, Ida Bruheim Jensen

Abstract:

Internationally, many young adults not in education, employment, or training (NEET) remain in temporary solutions such as labour market measures or other forms of welfare arrangements. These trends have been associated with ineffective labour market measures, an underfunded theoretical foundation for activation work, limited competence among social workers and labour market employees in using ordinary workplaces as job inclusion measures, and an overemphasis on young adults’ personal limitations such as health challenges and lack of motivation. Two competing models have been prominent in activation work: Place‐Then‐Train and Train‐Then‐Place. A traditional strategy for labour market measures has been to first motivate NEETs to sheltered work and training and then to the regular labour market (train then place). Measures such as Supported Employment (SE) and Individual Placement and Support (IPS) advocate for rapid entry into paid work at the regular labour market with close supervision and training from social workers, employees, and others (place then train). None of these models demonstrate unquestionable results. In this web of working life measures, young adults (NEETs) experience a lack of confidence in their own capabilities and coping strategies vis-á-vis labour market- and educational demands. Drawing on young adults’ own experiences, we argue that the Job Demands-Resources (JD-R) Theory can contribute to the theoretical and practical dimensions of activation work. This presentation will focus on what the JD-R theory entails and how it can be fruitful in activation work with NEETs (what and how). The overarching rationale of the JD-R theory is that an enduring balance between demands (e.g., deadlines, working hours) and resources (e.g., social support, enjoyable work tasks) is important for job performance for people in any job and potentially in other meaningful activities. Extensive research has demonstrated that a balance between demands and resources increases motivation and decreases stress. Nevertheless, we have not identified literature on the JD-R theory in activation work with young adults.

Keywords: activation work, job demands-resources theory, social work, theory development

Procedia PDF Downloads 77
16682 On the Perceived Awareness of Physical Education Teachers on Adoptable ICTs for PE

Authors: Tholokuhle T. Ntshakala, Seraphin D. Eyono Obono

Abstract:

Nations are still finding it quite difficult to win mega sport competitions despite the major contribution of sport to society in terms of social and economic development, personal health, and in education. Even though the world of sports has been transformed into a huge global economy, it is important to note that the first step of sport is usually its introduction to children at school through physical education or PE. In other words, nations who do not win mega sport competitions also suffer from a weak and neglected PE system. This problem of the neglect of PE systems is the main motivation of this research aimed at examining the factors affecting the perceived awareness of physical education teachers on the ICT's that are adoptable for the teaching and learning of physical education. Two types of research objectives will materialize this aim: relevant theories will be identified in relation to the analysis of the perceived ICT awareness of PE teachers and subsequent models will be compiled and designed from existing literature; the empirical testing of such theories and models will also be achieved through the survey of PE teachers from the Camperdown magisterial district of the KwaZulu-Natal province of South Africa. The main hypothesis at the heart of this study is the relationship between the demographics of PE teachers, their behavior both as individuals and as social entities, and their perceived awareness of the ICTs that are adoptable for PE, as postulated by existing literature; except that this study categorizes human behavior under performance expectancy, computer attitude, and social influence. This hypothesis was partially confirmed by the survey conducted by this research in the sense that performance expectancy and teachers’ age, gender, computer usage, and class size were found to be the only factors affecting their awareness of ICT's for physical education.

Keywords: human behavior, ICT Awareness, physical education, teachers

Procedia PDF Downloads 260
16681 Group Boundaries against and Due to Identity Threat

Authors: Anna Siegler, Sara Bigazzi, Sara Serdult, Ildiko Bokretas

Abstract:

Social identity emerging from group membership defines the representational processes of our social reality. Based on our theoretical assumption the subjective perception of identity threat leads to an instable identity structure. The need to re-establish the positive identity will lead us to strengthen group boundaries. Prejudice in our perspective offer psychological security those who thinking in exclusive barriers, and we suggest that those who identify highly with their ingroup/national identity and less with superordinate identities take distance from others and this is related to their perception of threat. In our study we used a newly developed questionnaire, the Multiple Threat and Prejudice Questionnaire (MTPQ) which measure identity threat at different dimensions of identification (national, existential, gender, religious) and the distancing of different outgroups, over and above we worked with Social Dominance Orientation (SDO) and Identification with All Humanity Scale (IWAH). We conduct one data collection (N=1482) in a Hungarian sample to examine the connection between national threat and distance-taking, and this survey includes the investigation (N=218) of identification with different group categories. Our findings confirmed that those who feel themselves threatened in their national identity aspects are less likely to identify themselves with superordinate groups and this correlation is much stronger when they think about the nation as a bio-cultural unit, while if nation defined as a social-economy entity this connection is less powerful and has just the opposite direction.

Keywords: group boundaries, identity threat, prejudice, superordinate groups

Procedia PDF Downloads 405
16680 Contrasted Mean and Median Models in Egyptian Stock Markets

Authors: Mai A. Ibrahim, Mohammed El-Beltagy, Motaz Khorshid

Abstract:

Emerging Markets return distributions have shown significance departure from normality were they are characterized by fatter tails relative to the normal distribution and exhibit levels of skewness and kurtosis that constitute a significant departure from normality. Therefore, the classical Markowitz Mean-Variance is not applicable for emerging markets since it assumes normally-distributed returns (with zero skewness and kurtosis) and a quadratic utility function. Moreover, the Markowitz mean-variance analysis can be used in cases of moderate non-normality and it still provides a good approximation of the expected utility, but it may be ineffective under large departure from normality. Higher moments models and median models have been suggested in the literature for asset allocation in this case. Higher moments models have been introduced to account for the insufficiency of the description of a portfolio by only its first two moments while the median model has been introduced as a robust statistic which is less affected by outliers than the mean. Tail risk measures such as Value-at Risk (VaR) and Conditional Value-at-Risk (CVaR) have been introduced instead of Variance to capture the effect of risk. In this research, higher moment models including the Mean-Variance-Skewness (MVS) and Mean-Variance-Skewness-Kurtosis (MVSK) are formulated as single-objective non-linear programming problems (NLP) and median models including the Median-Value at Risk (MedVaR) and Median-Mean Absolute Deviation (MedMAD) are formulated as a single-objective mixed-integer linear programming (MILP) problems. The higher moment models and median models are compared to some benchmark portfolios and tested on real financial data in the Egyptian main Index EGX30. The results show that all the median models outperform the higher moment models were they provide higher final wealth for the investor over the entire period of study. In addition, the results have confirmed the inapplicability of the classical Markowitz Mean-Variance to the Egyptian stock market as it resulted in very low realized profits.

Keywords: Egyptian stock exchange, emerging markets, higher moment models, median models, mixed-integer linear programming, non-linear programming

Procedia PDF Downloads 312
16679 The Influence of Covariance Hankel Matrix Dimension on Algorithms for VARMA Models

Authors: Celina Pestano-Gabino, Concepcion Gonzalez-Concepcion, M. Candelaria Gil-Fariña

Abstract:

Some estimation methods for VARMA models, and Multivariate Time Series Models in general, rely on the use of a Hankel matrix. It is known that if the data sample is populous enough and the dimension of the Hankel matrix is unnecessarily large, this may result in an unnecessary number of computations as well as in numerical problems. In this sense, the aim of this paper is two-fold. First, we provide some theoretical results for these matrices which translate into a lower dimension for the matrices normally used in the algorithms. This contribution thus serves to improve those methods from a numerical and, presumably, statistical point of view. Second, we have chosen an estimation algorithm to illustrate in practice our improvements. The results we obtained in a simulation of VARMA models show that an increase in the size of the Hankel matrix beyond the theoretical bound proposed as valid does not necessarily lead to improved practical results. Therefore, for future research, we propose conducting similar studies using any of the linear system estimation methods that depend on Hankel matrices.

Keywords: covariances Hankel matrices, Kronecker indices, system identification, VARMA models

Procedia PDF Downloads 241
16678 Comparison of Security Challenges and Issues of Mobile Computing and Internet of Things

Authors: Aabiah Nayeem, Fariha Shafiq, Mustabshra Aftab, Rabia Saman Pirzada, Samia Ghazala

Abstract:

In this modern era of technology, the concept of Internet of Things is very popular in every domain. It is a widely distributed system of things in which the data collected from sensory devices is transmitted, analyzed locally/collectively then broadcasted to network where action can be taken remotely via mobile/web apps. Today’s mobile computing is also gaining importance as the services are provided during mobility. Through mobile computing, data are transmitted via computer without physically connected to a fixed point. The challenge is to provide services with high speed and security. Also, the data gathered from the mobiles must be processed in a secured way. Mobile computing is strongly influenced by internet of things. In this paper, we have discussed security issues and challenges of internet of things and mobile computing and we have compared both of them on the basis of similarities and dissimilarities.

Keywords: embedded computing, internet of things, mobile computing, wireless technologies

Procedia PDF Downloads 312
16677 Challenges of Domestic Water Security for Sustainable Development in North Central Belt of Nigeria

Authors: Samuel Ibbi Ibrahim, Isaiah Ndalassan Ibrahim

Abstract:

Accessibility and availability of good quality water have become a major concern among different users. This paper examines the caustic importance of water security in relation to people’s desire for survival. It observed the democratic ideology of national policy on domestic water supply and demand and its implementation for national and societal development. It used analogy on equilibrium approach to ascertain the household water security. In most communities, it is glaring that several public water management in operation for several years are hardly performing efficiently to reach equilibrium demand. Moreover most settlements being rural or urban lack effective public water system that could ensure regular supplies to the population. The terrain and gradual declining of efficient rainfall northward poses great challenge to the region in managing water supply and demand adequately. This study itemized the need for the government to get clear strategy for a sustainable development on better water efficiency. Partnership in providing workable policy on water security is considered apparently important. It is also suggested that water plant treatment should be established in every medium-sized towns in the country.

Keywords: good quality of water, water accessibility, water availability, water sustainable

Procedia PDF Downloads 523
16676 A Study on Abnormal Behavior Detection in BYOD Environment

Authors: Dongwan Kang, Joohyung Oh, Chaetae Im

Abstract:

Advancement of communication technologies and smart devices in the recent times is leading to changes into the integrated wired and wireless communication environments. Since early days, businesses had started introducing environments for mobile device application to their operations in order to improve productivity (efficiency) and the closed corporate environment gradually shifted to an open structure. Recently, individual user's interest in working environment using mobile devices has increased and a new corporate working environment under the concept of BYOD is drawing attention. BYOD (bring your own device) is a concept where individuals bring in and use their own devices in business activities. Through BYOD, businesses can anticipate improved productivity (efficiency) and also a reduction in the cost of purchasing devices. However, as a result of security threats caused by frequent loss and theft of personal devices and corporate data leaks due to low security, companies are reluctant about adopting BYOD system. In addition, without considerations to diverse devices and connection environments, there are limitations in detecting abnormal behaviors such as information leaks which use the existing network-based security equipment. This study suggests a method to detect abnormal behaviors according to individual behavioral patterns, rather than the existing signature-based malicious behavior detection and discusses applications of this method in BYOD environment.

Keywords: BYOD, security, anomaly behavior detection, security equipment, communication technologies

Procedia PDF Downloads 322
16675 A Model to Assist Military Mission Planners in Identifying and Assessing Variables Impacting Food Security

Authors: Lynndee Kemmet

Abstract:

The U.S. military plays an increasing role in supporting political stability efforts, and this includes efforts to prevent the food insecurity that can trigger political and social instability. This paper presents a model that assists military commanders in identifying variables that impact food production and distribution in their areas of operation (AO), in identifying connections between variables and in assessing the impacts of those variables on food production and distribution. Through use of the model, military units can better target their data collection efforts and can categorize and analyze data within the data categorization framework most widely-used by military forces—PMESII-PT (Political, Military, Economic, Infrastructure, Information, Physical Environment and Time). The model provides flexibility of analysis in that commanders can target analysis to be highly focused on a specific PMESII-PT domain or variable or conduct analysis across multiple PMESII-PT domains. The model is also designed to assist commanders in mapping food systems in their AOs and then identifying components of those systems that must be strengthened or protected.

Keywords: food security, food system model, political stability, US Military

Procedia PDF Downloads 191
16674 A Comparative Human Rights Analysis of Expulsion as a Counterterrorism Instrument: An Evaluation of Belgium

Authors: Louise Reyntjens

Abstract:

Where criminal law used to be the traditional response to cope with the terrorist threat, European governments are increasingly relying on administrative paths. The reliance on immigration law fits into this trend. Terrorism is seen as a civilization menace emanating from abroad. In this context, the expulsion of dangerous aliens, immigration law’s core task, is put forward as a key security tool. Governments all over Europe are focusing on removing dangerous individuals from their territory rather than bringing them to justice. This research reflects on the consequences for the expelled individuals’ fundamental rights. For this, the author selected four European countries for a comparative study: Belgium, France, the United Kingdom and Sweden. All these countries face similar social and security issues, igniting the recourse to immigration law as a counterterrorism tool. Yet, they adopt a very different approach on this: the United Kingdom positions itself on the repressive side of the spectrum. Sweden on the other hand, also 'securitized' its immigration policy after the recent terrorist hit in Stockholm, but remains on the tolerant side of the spectrum. Belgium and France are situated in between. This paper addresses the situation in Belgium. In 2017, the Belgian parliament introduced several legislative changes by which it considerably expanded and facilitated the possibility to expel unwanted aliens. First, the expulsion measure was subjected to new and questionably definitions: a serious attack on the nation’s safety used to be required to expel certain categories of aliens. Presently, mere suspicions suffice to fulfil the new definition of a 'serious threat to national security'. A definition which fails to respond to the principle of legality; the law, nor the prepatory works clarify what is meant by 'a threat to national security'. This creates the risk of submitting this concept’s interpretation almost entirely to the discretion of the immigration authorities. Secondly, in name of intervening more quickly and efficiently, the automatic suspensive appeal for expulsions was abolished. The European Court of Human Rights nonetheless requires such an automatic suspensive appeal under Article 13 and 3 of the Convention. Whether this procedural reform will stand to endure, is thus questionable. This contribution also raises questions regarding expulsion’s efficacy as a key security tool. In a globalized and mobilized world, particularly in a European Union with no internal boundaries, questions can be raised about the usefulness of this measure. Even more so, by simply expelling a dangerous individual, States avoid their responsibility and shift the risk to another State. Criminal law might in these instances be more capable of providing a conclusive and long term response. This contribution explores the human rights consequences of expulsion as a security tool in Belgium. It also offers a critical view on its efficacy for protecting national security.

Keywords: Belgium, counter-terrorism and human rights, expulsion, immigration law

Procedia PDF Downloads 123
16673 The Need for Embodiment Perspectives and Somatic Methods in Social Work Curriculum: Lessons Learned from a Decade of Developing a Program to Support College Students Who Exited the State Foster Care System

Authors: Yvonne A. Unrau

Abstract:

Social work education is a competency-based curriculum that relies mostly on cognitive frameworks and problem-solving models. Absent from the curriculum is knowledge and skills that draw from an embodiment perspective, especially somatic practice methods. Embodiment broadly encompasses the understanding that biological, political, historical, and social factors impact human development via changes to the nervous system. In the past 20 years, research has well-established that unresolved traumatic events, especially during childhood, negatively impacts long-term health and well-being. Furthermore, traumatic stress compromises cognitive processing and activates reflexive action such as ‘fight’ or ‘flight,’ which are the focus of somatic methods. The main objective of this paper is to show how embodiment perspectives and somatic methods can enhance social work practice overall. Using an exploratory approach, the author shares a decade-long journey that involved creating an education-support program for college students who exited the state foster care system. Personal experience, program outcomes and case study narratives revealed that ‘classical’ social work methods were insufficient to fully address the complex needs of college students who were living with complex traumatic stressors. The paper chronicles select case study scenarios and key program development milestones over a 10-year period to show the benefit of incorporating embodiment perspectives in social work practice. The lessons reveal that there is an immediate need for social work curriculum to include embodiment perspectives so that social workers may be equipped to respond competently to their many clients who live with unresolved trauma.

Keywords: social work practice, social work curriculum, embodiment, traumatic stress

Procedia PDF Downloads 120
16672 Impact of Social Transfers on Energy Poverty in Turkey

Authors: Julide Yildirim, Nadir Ocal

Abstract:

Even though there are many studies investigating the extent and determinants of poverty, there is paucity of research investigating the issue of energy poverty in Turkey. The aim of this paper is threefold: First to investigate the extend of energy poverty in Turkey by using Household Budget Survey datasets belonging to 2005 - 2016 period. Second, to examine the risk factors for energy poverty. Finally, to assess the impact of social assistance program participation on energy poverty. Existing literature employs alternative methods to measure energy poverty. In this study energy poverty is measured by employing expenditure approach, where people are considered as energy poor if they disburse more than 10 per cent of their income to meet their energy requirements. Empirical results indicate that energy poverty rate is around 20 per cent during the time period under consideration. Since Household Budget Survey panel data is not available for 2005 - 2016 period, a pseudo panel has been constructed. Panel logistic regression method is utilized to determine the risk factors for energy poverty. The empirical results demonstrate that there is a statistically significant impact of work status and education level on energy poverty likelihood. In the final part of the paper the impact of social transfers on energy poverty has been examined by utilizing panel biprobit model, where social transfer participation and energy poverty incidences are jointly modeled. The empirical findings indicate that social transfer program participation reduces energy poverty. The negative association between energy poverty and social transfer program participation is more pronounced in urban areas compared with the rural areas.

Keywords: energy poverty, social transfers, panel data models, Turkey

Procedia PDF Downloads 136
16671 A Study on 5-11 Year-Old Children's Level of Knowledge about Personal Safety and Protection from Social Dangers

Authors: Özden Kuşcu, Yağmur Kuşcu, Zeynep Çetintaş, S. Sunay Yildirim Doğru

Abstract:

The purpose of this work is to evaluate the effect of the subjects “personal safety” and “protection from dangers” included in primary school curriculum on the students’ levels of knowledge about safety and protection from social dangers. The study group included 469 students between 5–11 years old with 231 preschoolers and 238 primary school students and their parents and teachers. Instruments used to collect data were “Personal Safety Interview Form” for children, “Parent Interview Form” and “Teacher Interview Form”. Forms included 15 open-ended questions about personal safety. The researchers collected the research data through one-on-one interviews with children. Results of the study revealed that preschoolers and 1st, 2nd, and 3rd graders did not know their home addresses and telephone numbers and their families were not aware of that. The study also showed that those who had this information were unsure as to who to share this information with. Accordingly, more should be done to increase the levels of knowledge of preschoolers and 1st, 2nd, and 3rd graders about personal safety and protection from dangers.

Keywords: security, social danger, elementary school, preschool

Procedia PDF Downloads 454
16670 Energy Consumption Models for Electric Vehicles: Survey and Proposal of a More Realistic Model

Authors: I. Sagaama, A. Kechiche, W. Trojet, F. Kamoun

Abstract:

Replacing combustion engine vehicles by electric vehicles (EVs) is a major step in recent years due to their potential benefits. Battery autonomy and charging processes are still a big issue for that kind of vehicles. Therefore, reducing the energy consumption of electric vehicles becomes a necessity. Many researches target introducing recent information and communication technologies in EVs in order to propose reducing energy consumption services. Evaluation of realistic scenarios is a big challenge nowadays. In this paper, we will elaborate a state of the art of different proposed energy consumption models in the literature, then we will present a comparative study of these models, finally, we will extend previous works in order to propose an accurate and realistic energy model for calculating instantaneous power consumption of electric vehicles.

Keywords: electric vehicle, vehicular networks, energy models, traffic simulation

Procedia PDF Downloads 366
16669 Generation of 3d Models Obtained with Low-Cost RGB and Thermal Sensors Mounted on Drones

Authors: Julio Manuel De Luis Ruiz, Javier Sedano Cibrián, RubéN Pérez Álvarez, Raúl Pereda García, Felipe Piña García

Abstract:

Nowadays it is common to resort to aerial photography to carry out the prospection and/or exploration of archaeological sites. In this sense, the classic 3D models are being applied to investigate the direction towards which the generally subterranean structures of an archaeological site may continue and therefore, to help in making the decisions that define the location of new excavations. In recent years, Unmanned Aerial Vehicles (UAVs) have been applied as the vehicles that carry the sensor. This implies certain advantages, such as the possibility of including low-cost sensors, given that these vehicles can carry the sensor at relatively low altitudes. Due to this, low-cost dual sensors have recently begun to be used. This new equipment can collaborate with classic Digital Elevation Models (DEMs) in the exploration of archaeological sites, but this entails the need for a methodological setting to optimise the acquisition, processing and exploitation of the information provided by low-cost dual sensors. This research focuses on the design of an appropriate workflow to obtain 3D models with low-cost sensors carried on UAVs, both in the RGB and thermal domains. All the foregoing has been applied to the archaeological site of Juliobriga, located in Cantabria (Spain).

Keywords: process optimization, RGB models, thermal models, , UAV, workflow

Procedia PDF Downloads 135
16668 Terrorism: A Threat in Constant Evolution Still Misunderstood

Authors: M. J. Gazapo Lapayese

Abstract:

It is a well-established fact that terrorism is one of the foremost threats to present-day international security. The creation of tools or mechanisms for confronting it in an effective and efficient manner will only be possible by way of an objective assessment of the phenomenon. In order to achieve this, this paper has the following three main objectives: Firstly, setting out to find the reasons that have prevented the establishment of a universally accepted definition of terrorism, and consequently trying to outline the main features defining the face of the terrorist threat in order to discover the fundamental goals of what is now a serious blight on world society. Secondly, trying to explain the differences between a terrorist movement and a terrorist organisation, and the reasons for which a terrorist movement can be led to transform itself into an organisation. After analysing these motivations and the characteristics of a terrorist organisation, an example of the latter will be succinctly analysed to help the reader understand the ideas expressed. Lastly, discovering and exposing the factors that can lead to the appearance of terrorist tendencies, and discussing the most efficient and effective responses that can be given to this global security threat.

Keywords: responses, resilience, security, terrorism

Procedia PDF Downloads 450
16667 The Implementation of Strengthening Institutional Model of Women Farmers Group in Developing Household Food Security

Authors: Rahmadanih, Sitti Bulkis, A. Amrullah, R. M. Rukka, N. M. Viantika

Abstract:

Food security is still a global issue, including in Indonesia. In South Sulawesi, this issue also occurs in members of farmer groups/women farmer groups. This study aims to (1) describe the implementation of strengthening institutional model of Women Farmer Groups (WFG) and (2) analyzing the capacity building of WFG members in order to develop food security after the implementations on institutional model. The research was conducted in Bulukumba and Luwu Utara District, South Sulawesi, Indonesia. The research was designed with qualitative and quantitative (mixed) method. Qualitative data were collected through in-depth interview and Focus Group Discussion (FGD); while quantitative data collected through a household survey of WGF members. Two WGF were selected they are WFG in Bulukumba and WGF in Luwu Utara District. Both WGF has been selected as the case unit, which consisting of 60 households. Institutional strengthening model that been implemented is a combination model of (1) institutional support and (2) capacity development of WGF members. The model of institutional support aim is to develop food security could be achieved through facilitation on produce banana chips (initiate a business group formation) and preparation of institution rule (AD/ART). (2) The developing Model of WFG members capacity building are (a) technical training of banana chips producing process, also food and nutrition counseling as well as the utilization of the yard, (b) processing of food products from their yards. Food and nutrition knowledge of WFG members was increased about 30% - 60% and accompanied by the development of households’ food security by 6.7% - 10.0%.; when compared to last year percentage.

Keywords: food security, institutional strengthening, model implementation, women farmer group

Procedia PDF Downloads 177
16666 Designing Product-Service-System Applied to Reusable Packaging Solutions: A Strategic Design Tool

Authors: Yuan Long, Fabrizio Ceschin, David Harrison

Abstract:

Environmental sustainability is under the threat of excessive single-use plastic packaging waste, and current waste management fails to address this issue. Therefore, it has led to a reidentification of the alternative, which can curb the packaging waste without reducing social needs. Reusable packaging represents a circular approach to close the loop of consumption in which packaging can stay longer in the system to satisfy social needs. However, the implementation of reusable packaging is fragmented and lacks systematic approaches. The product-service system (PSS) is widely regarded as a sustainable business model innovation for embracing circular consumption. As a result, applying PSS to reusable packaging solutions will be promising to address the packaging waste issue. This paper aims at filling the knowledge gap relating to apply PSS to reusable packaging solutions and provide a strategic design tool that could support packaging professionals to design reusable packaging solutions. The methodology of this paper is case studies and workshops to provide a design tool. The respondents are packaging professionals who are packaging consultants, NGO professionals, and entrepreneurs. 57 cases collected show that 15 archetypal models operate in the market. Subsequently, a polarity diagram is developed to embrace those 15 archetypal models, and a total number of 24 experts were invited for the workshop to evaluate the design tool. This research finally provides a strategic design tool to support packaging professionals to design reusable packaging solutions. The application of the tool is to support the understanding of the reusable packaging solutions, analyzing the markets, identifying new opportunities, and generate new business models. The implication of this research is to provide insights for academics and businesses in terms of tackling single-use packaging waste and build a foundation for further development of the reusable packaging solution tool.

Keywords: environmental sustainability, product-service system, reusable packaging, design tool

Procedia PDF Downloads 146
16665 Recognition of Cursive Arabic Handwritten Text Using Embedded Training Based on Hidden Markov Models (HMMs)

Authors: Rabi Mouhcine, Amrouch Mustapha, Mahani Zouhir, Mammass Driss

Abstract:

In this paper, we present a system for offline recognition cursive Arabic handwritten text based on Hidden Markov Models (HMMs). The system is analytical without explicit segmentation used embedded training to perform and enhance the character models. Extraction features preceded by baseline estimation are statistical and geometric to integrate both the peculiarities of the text and the pixel distribution characteristics in the word image. These features are modelled using hidden Markov models and trained by embedded training. The experiments on images of the benchmark IFN/ENIT database show that the proposed system improves recognition.

Keywords: recognition, handwriting, Arabic text, HMMs, embedded training

Procedia PDF Downloads 350
16664 The Analysis of the Challenge China’s Energy Transition Faces and Proposed Solutions

Authors: Yuhang Wang

Abstract:

As energy is vital to industrial productivity and human existence, ensuring energy security becomes a critical government responsibility. The Chinese government has implemented the energy transition to safeguard China’s energy security. Throughout this progression, the Chinese government has faced numerous obstacles. This article seeks to describe the causes of China’s energy transition barriers and the steps taken by the Chinese government to overcome them.

Keywords: energy transition, energy market, fragmentation, path dependency

Procedia PDF Downloads 95
16663 Stochastic Age-Structured Population Models

Authors: Arcady Ponosov

Abstract:

Many well-known age-structured population models are derived from the celebrated McKendrick-von Foerster equation (MFE), also called the biological conservation law. A similar technique is suggested for the stochastically perturbed MFE. This technique is shown to produce stochastic versions of the deterministic population models, which appear to be very different from those one can construct by simply appending additive stochasticity to deterministic equations. In particular, it is shown that stochastic Nicholson’s blowflies model should contain both additive and multiplicative stochastic noises. The suggested transformation technique is similar to that used in the deterministic case. The difference is hidden in the formulas for the exact solutions of the simplified boundary value problem for the stochastically perturbed MFE. The analysis is also based on the theory of stochastic delay differential equations.

Keywords: boundary value problems, population models, stochastic delay differential equations, stochastic partial differential equation

Procedia PDF Downloads 250
16662 A Proposal for a Secure and Interoperable Data Framework for Energy Digitalization

Authors: Hebberly Ahatlan

Abstract:

The process of digitizing energy systems involves transforming traditional energy infrastructure into interconnected, data-driven systems that enhance efficiency, sustainability, and responsiveness. As smart grids become increasingly integral to the efficient distribution and management of electricity from both fossil and renewable energy sources, the energy industry faces strategic challenges associated with digitalization and interoperability — particularly in the context of modern energy business models, such as virtual power plants (VPPs). The critical challenge in modern smart grids is to seamlessly integrate diverse technologies and systems, including virtualization, grid computing and service-oriented architecture (SOA), across the entire energy ecosystem. Achieving this requires addressing issues like semantic interoperability, IT/OT convergence, and digital asset scalability, all while ensuring security and risk management. This paper proposes a four-layer digitalization framework to tackle these challenges, encompassing persistent data protection, trusted key management, secure messaging, and authentication of IoT resources. Data assets generated through this framework enable AI systems to derive insights for improving smart grid operations, security, and revenue generation. Furthermore, this paper also proposes a Trusted Energy Interoperability Alliance as a universal guiding standard in the development of this digitalization framework to support more dynamic and interoperable energy markets.

Keywords: digitalization, IT/OT convergence, semantic interoperability, VPP, energy blockchain

Procedia PDF Downloads 173
16661 A Comparative Analysis of the Performance of COSMO and WRF Models in Quantitative Rainfall Prediction

Authors: Isaac Mugume, Charles Basalirwa, Daniel Waiswa, Mary Nsabagwa, Triphonia Jacob Ngailo, Joachim Reuder, Sch¨attler Ulrich, Musa Semujju

Abstract:

The Numerical weather prediction (NWP) models are considered powerful tools for guiding quantitative rainfall prediction. A couple of NWP models exist and are used at many operational weather prediction centers. This study considers two models namely the Consortium for Small–scale Modeling (COSMO) model and the Weather Research and Forecasting (WRF) model. It compares the models’ ability to predict rainfall over Uganda for the period 21st April 2013 to 10th May 2013 using the root mean square (RMSE) and the mean error (ME). In comparing the performance of the models, this study assesses their ability to predict light rainfall events and extreme rainfall events. All the experiments used the default parameterization configurations and with same horizontal resolution (7 Km). The results show that COSMO model had a tendency of largely predicting no rain which explained its under–prediction. The COSMO model (RMSE: 14.16; ME: -5.91) presented a significantly (p = 0.014) higher magnitude of error compared to the WRF model (RMSE: 11.86; ME: -1.09). However the COSMO model (RMSE: 3.85; ME: 1.39) performed significantly (p = 0.003) better than the WRF model (RMSE: 8.14; ME: 5.30) in simulating light rainfall events. All the models under–predicted extreme rainfall events with the COSMO model (RMSE: 43.63; ME: -39.58) presenting significantly higher error magnitudes than the WRF model (RMSE: 35.14; ME: -26.95). This study recommends additional diagnosis of the models’ treatment of deep convection over the tropics.

Keywords: comparative performance, the COSMO model, the WRF model, light rainfall events, extreme rainfall events

Procedia PDF Downloads 259
16660 The Role of Self-Compassion for the Diagnosis of Social Anxiety Disorder in Adolescents

Authors: Diana Vieira Figueiredo, Rita Ramos Miguel, Maria do Céu Salvador, Luiza Nobre-Lima, Daniel RIjo, Paula Vagos

Abstract:

Social Anxiety Disorder (SAD) is characterized by a marked and persistent fear of social and/or performance situations in which one may be exposed to the scrutiny of others.  SAD has its usual onset and is highly prevalent during adolescence; if left untreated, it often has a chronic and unremitting course. So, it seems important to understand the psychological processes that might predict the development of SAD. One of these processes may be self-compassion, which has been found to be associated with social anxiety in both adults and adolescents. Self-compassion involves three main components, each with a positive (compassionate behavior) and negative (uncompassionate behavior) pole – self-kindness versus self-judgment, common humanity versus isolation, and mindfulness versus over-identification. The negative indicators of self-compassion (self-judgement, isolation, and over-identification) were found to be more strongly linked to mental health problems than the positive indicators (self-kindness, common humanity, and mindfulness). Additionally, negative associations were found between the positive indicators of self-compassion (self-kindness, common humanity, mindfulness) and psychopathology. The current study aimed to investigate the role of self-kindness, self-judgment, common humanity, isolation, mindfulness, and over-identification in the likelihood of an adolescent presenting SAD by comparing groups of normative and socially anxious adolescents. The sample consisted of 32 adolescents (Mage = 15.88, SD = .833) of which 23 were girls. Adolescents were assessed through a clinical structured interview that led 17 to be assigned to the clinical group (presenting a primary diagnosis of SAD) and 15 to be assigned to the non-clinical group (presenting no clinical diagnosis). Variables under study were measured through the Self-Compassion Scale for adolescents (SCS-A), which assesses the six indicators of self-compassion presented above. Six separate models were tested, each with one of the subscales of the SCS-A as the independent variable and with the group (clinical versus non-clinical) as the dependent variable. The models considering isolation, over-identification, self-judgement, and self-kindness fitted the data and accurately predicted group belonging for between 75% to 84.4% of cases. Results indicated that the log of the odds of an adolescent presenting SAD was positively related to isolation, over-identification, and self-judgement and negatively associated with self-kindness. Findings provide support for the idea that decreased self-compassion may place adolescents at increased risk for experiencing clinical levels of social anxiety: on the one hand, adolescents with higher levels of isolation, over-identification, and self-judgement seem to be more prone to the development of psychopathological levels of social anxiety; on the other hand, self-kindness may play a protective role in the development of SAD in this developmental phase. So, if focusing on social feared consequences and perceiving to be different from others may be distinctive features of SAD, developing self-kindness may be the antidote to promote diminished levels of social anxiety and more.

Keywords: adolescents, social anxiety disorder, self-compassion, diagnosis odds-ration

Procedia PDF Downloads 157
16659 Social Media Use and Social Connectedness

Authors: Jessica Torres, James W. Sturges

Abstract:

This correlational study explored the potential relationship between social media use and social connectedness. College students (n = 190) were surveyed using the revised Social Connectedness Scale (SCS-R) and were asked about the number of hours they used social media platforms such as Instagram, TikTok, Twitter, Snapchat, and Facebook. We also developed and administered a 14-item Social Media Use Scale (SMUS) to measure potentially maladaptive social media use, such as use that likely interfered with other activities. The SMUS was found to have good inter-item consistency (Cronbach’s alpha = .92) and was significantly correlated with hours of use, r(182) = .622, p < .001. As expected, we found that the SCS-R scores were inversely related to total hours of social media use, r(182) = -.188 (p < .005). This suggested that lots of time allocated to online interactions is negatively associated with social connectedness in general. Interestingly, however, higher social connectedness scores were associated specifically with Snapchat use, r(28) = .210, p = .004. This may have to do with the specific nature of the Snapchat experience and perhaps its original use for one-to-one communication. The use of other social media platforms (Tiktok, Instagram, Twitter) was not related to better social connectedness scores. Although we failed to find that scores on our measure of problem use (the SMUS) were correlated with social connectedness, we are hopeful that the SMUS will be of use in identifying patterns of maladaptive social media use that may have an impact on other important outcome measures of adaptive functioning and well-being.

Keywords: adaptive functioning, college students, social connectedness, social media use

Procedia PDF Downloads 87
16658 From Problem Space to Executional Architecture: The Development of a Simulator to Examine the Effect of Autonomy on Mainline Rail Capacity

Authors: Emily J. Morey, Kevin Galvin, Thomas Riley, R. Eddie Wilson

Abstract:

The key challenges faced by integrating autonomous rail operations into the existing mainline railway environment have been identified through the understanding and framing of the problem space and stakeholder analysis. This was achieved through the completion of the first four steps of Soft Systems Methodology, where the problem space has been expressed via conceptual models. Having identified these challenges, we investigated one of them, namely capacity, via the use of models and simulation. This paper examines the approach used to move from the conceptual models to a simulation which can determine whether the integration of autonomous trains can plausibly increase capacity. Within this approach, we developed an architecture and converted logical models into physical resource models and associated design features which were used to build a simulator. From this simulator, we are able to analyse mixtures of legacy-autonomous operations and produce fundamental diagrams and trajectory plots to describe the dynamic behaviour of mixed mainline railway operations.

Keywords: autonomy, executable architecture, modelling and simulation, railway capacity

Procedia PDF Downloads 76
16657 The Relation Between Social Capital and Trust with Social Network Analysis (SNA)

Authors: Safak Baykal

Abstract:

The purpose of this study is analyzing the relationship between self leadership and social capital of people with using Social Network Analysis. In this study, two aspects of social capital will be focused: bonding, homophilous social capital (BoSC) which implies better, strong, dense or closed network ties, and bridging, heterophilous social capital (BrSC) which implies weak ties, bridging the structural holes. The other concept of the study is Trust (Tr), namely interpersonal trust, willingness to ascribe good intentions to and have confidence in the words and actions of other people. In this study, the sample group, 61 people, was selected from a private firm from the defense industry. The relation between BoSC/BrSC and Tr is shown by using Social Network Analysis (SNA) and statistical analysis with Likert type-questionnaire. The results of the analysis show the Cronbach’s alpha value is 0.73 and social capital values (BoSC/BrSC) is highly correlated with Tr values of the people.

Keywords: bonding social capital, bridging social capital, trust, social network analysis (SNA)

Procedia PDF Downloads 525
16656 Conceptualizing Conflict in the Gray Zone: A Comparative Analysis of Diplomatic, Military and Political Lenses

Authors: John Hardy, Paul Lushenko

Abstract:

he twenty-first century international security order has been fraught with challenges to the credibility and stability of the post-Cold War status quo. Although the American-led international system has rarely been threatened directly by dissatisfied states, an underlying challenge to the international security order has emerged in the form of a slow-burning abnegation of small but significant aspects of the status quo. Meanwhile, those security challenges which have threatened to destabilize order in the international system have not clearly belonged to the traditional notions of diplomacy and armed conflict. Instead, the main antagonists have been both states and non-state actors, the issues have crossed national and international boundaries, and contestation has occurred in a ‘gray zone’ between peace and war. Gray zone conflicts are not easily categorized as military operations, national security policies or political strategies, because they often include elements of diplomacy, military operations, and statecraft in complex combinations. This study applies three approaches to conceptualizing the gray zone in which many contemporary conflicts take place. The first approach frames gray zone conflicts as a form of coercive diplomacy, in which armed force is used to add credibility and commitment to political threats. The second approach frames gray zone conflicts as a form of discrete military operation, in which armed force is used sparingly and is limited to a specific issue. The third approach frames gray zones conflicts as a form of proxy war, in which armed force is used by or through third parties, rather than directly between belligerents. The study finds that each approach to conceptualizing the gray zone accounts for only a narrow range of issues which fall within the gap between traditional notions of peace and war. However, in combination, all three approaches are useful in explicating the gray zone and understanding the character of contemporary security challenges which defy simple categorization. These findings suggest that coercive diplomacy, discrete military operations, and proxy warfare provide three overlapping lenses for conceptualizing the gray zone and for understanding the gray zone conflicts which threaten international security in the early twenty-first century.

Keywords: gray zone, international security, military operations, national security, strategy

Procedia PDF Downloads 155
16655 Transition from Linear to Circular Business Models with Service Design Methodology

Authors: Minna-Maari Harmaala, Hanna Harilainen

Abstract:

Estimates of the economic value of transitioning to circular economy models vary but it has been estimated to represent $1 trillion worth of new business into the global economy. In Europe alone, estimates claim that adopting circular-economy principles could not only have environmental and social benefits but also generate a net economic benefit of €1.8 trillion by 2030. Proponents of a circular economy argue that it offers a major opportunity to increase resource productivity, decrease resource dependence and waste, and increase employment and growth. A circular system could improve competitiveness and unleash innovation. Yet, most companies are not capturing these opportunities and thus the even abundant circular opportunities remain uncaptured even though they would seem inherently profitable. Service design in broad terms relates to developing an existing or a new service or service concept with emphasis and focus on the customer experience from the onset of the development process. Service design may even mean starting from scratch and co-creating the service concept entirely with the help of customer involvement. Service design methodologies provide a structured way of incorporating customer understanding and involvement in the process of designing better services with better resonance to customer needs. A business model is a depiction of how the company creates, delivers, and captures value; i.e. how it organizes its business. The process of business model development and adjustment or modification is also called business model innovation. Innovating business models has become a part of business strategy. Our hypothesis is that in addition to linear models still being easier to adopt and often with lower threshold costs, companies lack an understanding of how circular models can be adopted into their business and how customers will be willing and ready to adopt the new circular business models. In our research, we use robust service design methodology to develop circular economy solutions with two case study companies. The aim of the process is to not only develop the service concepts and portfolio, but to demonstrate the willingness to adopt circular solutions exists in the customer base. In addition to service design, we employ business model innovation methods to develop, test, and validate the new circular business models further. The results clearly indicate that amongst the customer groups there are specific customer personas that are willing to adopt and in fact are expecting the companies to take a leading role in the transition towards a circular economy. At the same time, there is a group of indifferents, to whom the idea of circularity provides no added value. In addition, the case studies clearly show what changes adoption of circular economy principles brings to the existing business model and how they can be integrated.

Keywords: business model innovation, circular economy, circular economy business models, service design

Procedia PDF Downloads 130
16654 Winning Consumers and Influencing Them Using Social Media: A Cross Generational Impact Case Study

Authors: J. Garfield, B. O'Hare, V. Bell

Abstract:

The use of social media is continuing to grow and is now widely used for product and service advertising. This research investigated the social media usage across all age ranges in the United Kingdom to determine the impact on purchasing habits. A questionnaire was distributed to people of different ages and with different experiences of social media usage. The results showed that Facebook continues to be the most popular social media network. Respondents in the younger age group were more likely to be influenced by brand marketing and advertising, but the study concluded that celebrity endorsements had little or no influence.

Keywords: social media advertising, social networking sites, electronic word of mouth, celebrity endorsements

Procedia PDF Downloads 127