Search results for: network agency
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 5474

Search results for: network agency

5414 Modelling the Education Supply Chain with Network Data Envelopment Analysis

Authors: Sourour Ramzi, Claudia Sarrico

Abstract:

Little has been done on network DEA in education, and nobody has attempted to model the whole education supply chain using network DEA. As such the contribution of the present paper is to propose a model for measuring the efficiency of education supply chains using network DEA. First, we use a general survey of data envelopment analysis (DEA) to establish the emergent themes for research in DEA, and focus on the theme of Network DEA. Second, we use a survey on two-stage DEA models, and Network DEA to write a state of the art on Network DEA, particularly applied to supply chain management. Third, we use a survey on DEA applications to establish the most influential papers on DEA education applications, in order to establish the state of the art on applications of DEA in education, in general, and applications of DEA to education using network DEA, in particular. Finally, we propose a model for measuring the performance of education supply chains of different education systems (countries or states within a country, for instance). We then use this model on some empirical data.

Keywords: supply chain, education, data envelopment analysis, network DEA

Procedia PDF Downloads 368
5413 Orphan Node Inclusion Protocol for Wireless Sensor Network

Authors: Sandeep Singh Waraich

Abstract:

Wireless sensor network (WSN ) consists of a large number of sensor nodes. The disparity in their energy consumption usually lead to the loss of equilibrium in wireless sensor network which may further results in an energy hole problem in wireless network. In this paper, we have considered the inclusion of orphan nodes which usually remain unutilized as intermediate nodes in multi-hop routing. The Orphan Node Inclusion (ONI) Protocol lets the cluster member to bring the orphan nodes into their clusters, thereby saving important resources and increasing network lifetime in critical applications of WSN.

Keywords: wireless sensor network, orphan node, clustering, ONI protocol

Procedia PDF Downloads 421
5412 Spirits and Social Agency: A Critical Review of Studies from Africa

Authors: Sanaa Riaz

Abstract:

Spirits occupy a world that simultaneously dwells between the divine and the earthly binary while speaking to all forces of nature, marginality, and extremity in between. This paper examines the conceptualizations, interactions with, and experience of spiritual beings in relation to the concept of self and social agency, defined as a continuum of cooperation leaving those involved with an enhanced or diminished perception of self-agency. To do justice to the diverse mythological and popular interpretations of spirit entities, ethnographic examples from Africa, in particular, will be used. An examination of the nature and role of spirits in Africa allows one to understand the ways in which colonial influences brought by Catholicism and Islam added to the pre-colonial repertoire and syncretic imaginations of spirits. A comprehensive framework to analyze spirits requires situating them as a cognitive configuration of humans to communicate with other humans and forces of nature to receive knowledge about the normative in social roles, conduct, and action. Understanding spirits also requires a rethinking of the concept of self as not one encapsulated in the individual but one representing positionalities in collective negotiations, adversity, and alliances. To use the postmodern understanding of identity as a far from a coherent collection of selves fluidly moving between and dialoguing with gravitational and contradictory social forces, benevolent and maleficent spirit forces represent how people make sense of their origin, physiological and ecological changes, subsistence, and political environment and social relations. A discussion on spirits requires examining the rituals and mediational forces and their performance that allow participants to tackle adversity, voicelessness and continue to work safely and morally for the collective good. Moreover, it is important to see the conceptualization of spirits in unison with sorcery and spirit possession, central to voodoo practices, also because they speak volumes about the experiences of slavery and marginalization. This paper has two motives: It presents a critical literature review of ethnographic accounts of spirit entities in African spiritual experiences to examine the ways in which spirits become mediums through which the self is conceptualized and asserted. Second, the paper highlights the ways in which spirits become a medium to represent political and sociocultural ambiguities and desires along a spectrum of social agencies, including joint agency, vicarious agency, and interfered agency.

Keywords: spirits, social agency, self, ethnographic case studies

Procedia PDF Downloads 67
5411 Collaborative Governance for Social Change and Environmental Sustainability: A Case Study of Campania Region

Authors: Zubair Ahmad

Abstract:

The emphasis on collaborative governance and effective leadership to bring any social change is gaining prominence among researchers. This article aims to investigate the role of leadership and collaborative governance in bringing social change concerning waste management in the Campania region. The single-case study of a multi-site, qualitative approach is used in this study. Interviews of relevant politicians, public managers, citizens, waste management organizations and academics were conducted (2023-2024). This research uses the lens of multiple theoretical frameworks such as collaborative governance, network agency and transformational leadership to explore different dynamics of the research. Moreover, several obstacles in the way of achieving social change in Campania concerning waste management and environmental sustainability are identified. The findings of this study added to the theoretical understanding of collaborative governance and social change. Practically, it highlights five interconnected forms from interviews of leadership that civic leaders and managers must establish to promote positive social change: Difficulties in leadership effectiveness, civic potential unused, media mobilization, hope for a miracle, and stakeholder engagement diversification. The public value framework is used to analyze the potential role of leadership in bringing change in society. The research findings are replicable and can be applied to a similar set of circumstances. This research shows how can states effectively improve a social challenge to achieve a greater public good and how leadership help in achieving sustainability. Italy's government has green-lighted projects to make these activities more visible while downplaying their negative impacts on the environment and public health. This study provides an overview of the growing body of research on (un)sustainability practices by demonstrating how states might successfully tackle sustainability-related business difficulties in the service of a higher public good.

Keywords: collaborative governance, transformational leadership, network agency, public value framework, social change, waste management

Procedia PDF Downloads 2
5410 Indigenizing Social Work Practice: Best Practice of Family Service Agency (LK3) State Islamic University (UIN) Syarif Hidayatullah Jakarta

Authors: Siti Napsiyah, Ismet Firdaus, Lisma Dyawati Fuaida, Ellies Sukmawati

Abstract:

This paper examines the existence, role, and challenge of Family Service Agency, in Bahasa Indonesia known as Lembaga Konsultasi Kesejahteraan Keluarga (LK3) of Syarif Hidayatullah State Islamic University (UIN) Jakarta. It has been established since 2012. It is an official agency under the Ministry of Social Affairs of Indonesia. The establishment of LK3 aims to provide psychosocial services for families of students who has psychosocial problem in their life. The study also aims to explore the trend of psychosocial problems of its client (student) for the past three years (2014-2016). The research method of the study is using a qualitative social work research method. A review of selected data of the client of LK3 UIN Syarif Hidayatullah Jakarta around five main issues: Family background, psychosocial mapping, potential resources, student coping mechanism strategy, client strength and network. The study also uses a review of academic performance report as well as an interview and observation. The findings show that the trend of psychosocial problems of the client of LK3 UIN Syarif Hidayatullah Jakarta vary as follow: bad academic performance, low income family, broken home, domestic violence, disability, mental disorder, sexual abuse, and the like. LK3 UIN Syarif Hidayatullah Jakarta has significant roles to provide psychosocial support and services for the survival of the students to deal with their psychosocial problems. Social worker of LK3 performs indigenous social work practice: individual counseling, family counseling, group therapy, home visit, case conference, Islamic Spiritual Approach, and Spiritual Emotional Freedom Technique (SEPT).

Keywords: psychosocial, indigenizing social work, resiliency, coping mechanism

Procedia PDF Downloads 262
5409 Historical Hashtags: An Investigation of the #CometLanding Tweets

Authors: Noor Farizah Ibrahim, Christopher Durugbo

Abstract:

This study aims to investigate how the Twittersphere reacted during the recent historical event of robotic landing on a comet. The news is about Philae, a robotic lander from European Space Agency (ESA), which successfully made the first-ever rendezvous and touchdown of its kind on a nucleus comet on November 12, 2014. In order to understand how Twitter is practically used in spreading messages on historical events, we conducted an analysis of one-week tweet feeds that contain the #CometLanding hashtag. We studied the trends of tweets, the diffusion of the information and the characteristics of the social network created. The results indicated that the use of Twitter as a platform enables online communities to engage and spread the historical event through social media network (e.g. tweets, retweets, mentions and replies). In addition, it was found that comprehensible and understandable hashtags could influence users to follow the same tweet stream compared to other laborious hashtags which were difficult to understand by users in online communities.

Keywords: diffusion of information, hashtag, social media, Twitter

Procedia PDF Downloads 326
5408 An Exploration of Anti-Terrorism Laws in Nigeria

Authors: Sani Mohammed Adam

Abstract:

This work seeks to review the security challenges facing Nigeria and explore the relevance of laws and policies in tackling the menace. The work looks at the adequacy of available legislations and the functionality of relevant institutions such as the Armed Forces, the Nigeria Police Force, the State Security Service, the Defence Intelligence Agency and the Nigerian Intelligence Agency etc. Comparisons would be made with other jurisdictions, such as inter alia, the Homeland Security in the USA and Counter Terrorism Laws of the United Kingdom. Recommendations would be made on how to strengthen both institutions and laws to curtail the growth of Terrorism in Nigeria.

Keywords: legislations, Nigeria, security, terrorism

Procedia PDF Downloads 681
5407 Migration, Agency and Subjectivity in Helon Habila's Travellers

Authors: Bankole Wright

Abstract:

The late 20th to the early 21st century has been predominantly characterized by the movement of individuals from one country to another country or countries. The chief reasons for migration have always been premised on socio-cultural, socio-political and socio-economic factors, with influences of migration finding expression through various ways. Indeed, migration experiences have formed points of subjectivity which functions as agencies that propel migrants to strongly quest for migrating from their home space to other socio-cultural space that performs the role of escape for them. This paper interrogates the discourse of migration, agency and subjectivity in Helon Habila’s Travellers. The essay explores the interconnectedness between migration which is the physical [as deployed in this paper] movement from one location to another, agency as seen in the ability to act based on various ideological frameworks within which the action is taken, and subjectivity which identifies with the predominant factors that influence human actions; and how these connections are responsible for defining the diaspora individual. The discourse of what makes migrants desire to move from their various spaces is as critical as the experiences they face in their various host land. Hence, this paper demonstrates, through the analysis of an African diasporic novel, that the quest for migration is mostly determined by certain agencies in the diaspora home space, which characters have been subjects of and desire to escape. Traveller is a novel which chronicles the various experiences of migrants who journey from their various home space to another land as a result of different agencies that precipitated their migration. This paper engages these agencies as impediments to human survival.

Keywords: migration, agency, subjectivity, Helon Habila, diaspora, home, space

Procedia PDF Downloads 272
5406 Unreality of Real: Debordean Reading of Gillian Flynn's Gone Girl

Authors: Sahand Hamed Moeel Ardebil, Zohreh Taebi Noghondari, Mahmood Reza Ghorban Sabbagh

Abstract:

Gillian Flynn’s Gone Girl, depicts a society in which, as a result of media dominance, the reality is very precarious and difficult to grasp. In Gone Girl, reality and image of reality represented on TV, are challenging to differentiate. Along with reality, individuals’ agency and independence before media and the capitalist rule are called in to question in the novel. In order to expose the unstable nature of reality and an individual’s complicated relationship with media, this study has deployed the ideas of Marxist-media theorist Guy Debord (1931-1992). In his book Society of the Spectacle (1966), Debord delineates a society in which images replace the objective reality, and people are incapable of making real changes. The results of the current study show that despite their efforts, Nick and Amy, the two main characters of the novel, are no more than spectators with very little agency before the media. Moreover, following Debord’s argument about the replacement of reality with images, everyone and every institution in Gone Girl projects an image that does not necessarily embody the objective reality, a fact that makes it very hard to differentiate the real from unreal.

Keywords: agency, Debord, Gone Girl, media studies, society of spectacle, reality

Procedia PDF Downloads 124
5405 Simulation Analysis of Optical Add Drop Multiplexer in a Ring Network

Authors: Surinder Singh, Meenakshi

Abstract:

In this paper MZI-FBG based optical add drop multiplexer is designed and its performance is analyzed in the ring network. In the ring network nodes are composed of optical add drop multiplexer, transmitter and receiver. OADM is used to add or drop any frequency at intermediate nodes without affecting other channels. In this paper the performance of the ring network is carried out by varying various kinds of fiber with or without amplifiers.

Keywords: OADM, ring network, MZI-FBG, transmitter

Procedia PDF Downloads 575
5404 Implementing an English Medium of Instruction Policy in Algerian Higher Education: A Study of Teachers’ Attitudes, Agency, and Professional Identity

Authors: Ikram Metalsi

Abstract:

English as a Medium of Instruction known as (EMI) is expanding rapidly in the world. A growing volume of research has been dedicated to investigating its implementation. However, considerably less attention has been given to understanding EMI in a context where its implementation has been discussed but not yet put into practice. One such context is Algeria, where talks about a possible implementation of EMI have been going on for some time. The present study examines the current discourses and university lecturers’ attitudes towards the potential implementation of EMI as well as investigating the current implicit and explicit language policies in scientific courses in Algerian state universities. The focus is specifically on Engineering departments, as this field has gained worldwide importance in EMI research (Macaro et al. 2018), and, traditionally, French has been the MOI for Engineering in Algerian universities. Using the ROADMAPPING framework (Dafouz and Smit 2016) and the mixed method research approach, the present work explores the language in education policy (LEP) and planning situation in Algeria, the current media of instruction as well as the status and use of the English language in the scientific courses of the tertiary sector. Finally, the current study explores the perceived challenges and benefits of the implementation of EMI programmes from teachers’ perspectives with a particular focus on agency and how this potential policy implementation and teachers’ perceptions of agency around it may reflexively influence their professional identity.

Keywords: media of instruction, language in education policy, lecturers attitudes, teacher agency, professional identity

Procedia PDF Downloads 119
5403 A Tutorial on Network Security: Attacks and Controls

Authors: Belbahi Ahlam

Abstract:

With the phenomenal growth in the Internet, network security has become an integral part of computer and information security. In order to come up with measures that make networks more secure, it is important to learn about the vulnerabilities that could exist in a computer network and then have an understanding of the typical attacks that have been carried out in such networks. The first half of this paper will expose the readers to the classical network attacks that have exploited the typical vulnerabilities of computer networks in the past and solutions that have been adopted since then to prevent or reduce the chances of some of these attacks. The second half of the paper will expose the readers to the different network security controls including the network architecture, protocols, standards and software/ hardware tools that have been adopted in modern day computer networks.

Keywords: network security, attacks and controls, computer and information, solutions

Procedia PDF Downloads 456
5402 End-to-End Control and Management of Multi-AS Virtual Service Networks Using SDN and Autonomic Computing Architecture

Authors: Yong Xue, Daniel A. Menascé

Abstract:

Automated and end-to-end network resource management and provisioning for virtual service networks in a multiple autonomous systems (a.k.a multi-AS) environment is a challenging and open problem. This paper proposes a novel, scalable and interoperable high-level architecture that incorporates a number of emerging enabling technologies including Software Defined Network (SDN), Network Function Virtualization (NFV), Service Oriented Architecture (SOA), and Autonomic Computing. The proposed architecture can be used to not only automate network resource management and provisioning for virtual service networks across multiple autonomous substrate networks, but also provide an adaptive capability for achieving optimal network resource management and maintaining network-level end-to-end network performance as well. The paper argues that this SDN and autonomic computing based architecture lays a solid foundation that can facilitate the development of the future Internet based on the pluralistic paradigm.

Keywords: virtual network, software defined network, virtual service network, adaptive resource management, SOA, multi-AS, inter-domain

Procedia PDF Downloads 532
5401 Implementation of an Associative Memory Using a Restricted Hopfield Network

Authors: Tet H. Yeap

Abstract:

An analog restricted Hopfield Network is presented in this paper. It consists of two layers of nodes, visible and hidden nodes, connected by directional weighted paths forming a bipartite graph with no intralayer connection. An energy or Lyapunov function was derived to show that the proposed network will converge to stable states. By introducing hidden nodes, the proposed network can be trained to store patterns and has increased memory capacity. Training to be an associative memory, simulation results show that the associative memory performs better than a classical Hopfield network by being able to perform better memory recall when the input is noisy.

Keywords: restricted Hopfield network, Lyapunov function, simultaneous perturbation stochastic approximation

Procedia PDF Downloads 134
5400 The Agency of Black Women Professors in Higher Education: A Critical Consciousness Perspective

Authors: Ncamisile T. Zulu, Nicholas Munro

Abstract:

Black women academics in higher education institutions are predominantly portrayed by literature as individuals who usually lack a sense of belonging, progression, and workload management. The oversaturation of this literature can (overtime) perpetuate a stereotypical idea that Black women academics are incapable of coping and succeeding in higher education institutions. The current article explores the agency, motivated by critical consciousness that Black women professors have and utilise in higher education institutions. In order to provide an understanding of how Black women academics can progress, manage their workloads and succeed in higher education institutions, the article considers how these women can take responsibility for their self-development, adaptation, and self-renewal in academic endeavours. As a result, the article presents a line of thought which could help in challenging the stereotype about Black women academics. The study was conducted at two higher education institutions involving Black women professors from different disciplines. A combination of purposive and snowballing sampling was used to recruit nine women participants, while data were collected through interviews. A critical consciousness perspective was adopted to formulate an understanding of the agency of Black women professors in higher education institutions, while thematic analysis was used to analyse the data. The results challenge the widely disseminated view that portrays Black women academics as incapable of coping and succeeding in higher education institutions. The findings highlight Black women professors as proactive, flexible, and self-regulating in their academic endeavours. These findings contribute to the literature by adding a more constructive narrative of Black women academics in higher education.

Keywords: agency, Black women academics, critical consciousness, higher education institutions

Procedia PDF Downloads 156
5399 Designing Directed Network with Optimal Controllability

Authors: Liang Bai, Yandong Xiao, Haorang Wang, Songyang Lao

Abstract:

The directedness of links is crucial to determine the controllability in complex networks. Even the edge directions can determine the controllability of complex networks. Obviously, for a given network, we wish to design its edge directions that make this network approach the optimal controllability. In this work, we firstly introduce two methods to enhance network by assigning edge directions. However, these two methods could not completely mitigate the negative effects of inaccessibility and dilations. Thus, to approach the optimal network controllability, the edge directions must mitigate the negative effects of inaccessibility and dilations as much as possible. Finally, we propose the edge direction for optimal controllability. The optimal method has been found to be successfully useful on real-world and synthetic networks.

Keywords: complex network, dynamics, network control, optimization

Procedia PDF Downloads 187
5398 De/Reconstructing the Notion of Women as Perpetrators of Terrorism: The Case of Boko Haram

Authors: Damilohun D. Ayoyo, Anthony Mpiani, Temitope B. Oriola

Abstract:

The debate on women’s roles in insurgencies and terrorist organizations continues to garner scholarly attention. While some scholars view women insurgents and terrorists as perpetrators, others have argued that they are non-agents and victims. This paper de/reconstructs the notion of ‘women as perpetrators’ of terrorism. Drawing on the narratives of rescued female Boko Haram operatives, and Boko Haram’s tactics for recruiting and deploying women and girls, the paper advances three main arguments. First, the growing social construction of women as perpetrators of terrorism – particularly radical Islamic terrorism – downplays the socio-cultural and structural processes leading to women’s involvement with terrorist organizations. Second, women agency in Boko Haram activities is better understood when grounded in the cultural and structural contexts of Northern Nigeria, Boko Haram’s construction of ‘female,’ and the experiences of female Boko Haram operatives. Third, the mechanisms through which female Boko Haram operatives are recruited and deployed make them more of non-agents and victims than perpetrators of terrorism. The paper draws on the agency-structure approach and argues that the gendered power asymmetries embedded in the cultures and structures of Northern Nigeria –the base of Boko Haram– contribute to the nature and dynamics of women’s involvement in the insurgency. Although the paper does not negate the agency of women in terrorism, it aligns with the studies that consider women insurgents as more victims than perpetrators of terror.

Keywords: Boko Haram, female agency, Northern Nigeria, patriarchy, perpetrator of terror, radical Islamic terrorism, sharia, victim of terror, women insurgents

Procedia PDF Downloads 122
5397 System Survivability in Networks

Authors: Asma Ben Yaghlane, Mohamed Naceur Azaiez

Abstract:

We consider the problem of attacks on networks. We define the concept of system survivability in networks in the presence of intelligent threats. Our setting of the problem assumes a flow to be sent from one source node to a destination node. The attacker attempts to disable the network by preventing the flow to reach its destination while the defender attempts to identify the best path-set to use to maximize the chance of arrival of the flow to the destination node. Our concept is shown to be different from the classical concept of network reliability. We distinguish two types of network survivability related to the defender and to the attacker of the network, respectively. We prove that the defender-based-network survivability plays the role of a lower bound while the attacker-based-network survivability plays the role of an upper bound of network reliability. We also prove that both concepts almost never agree nor coincide with network reliability. Moreover, we use the shortest-path problem to determine the defender-based-network survivability and the min-cut problem to determine the attacker-based-network survivability. We extend the problem to a variety of models including the minimum-spanning-tree problem and the multiple source-/destination-network problems.

Keywords: defense/attack strategies, information, networks, reliability, survivability

Procedia PDF Downloads 397
5396 Impact Assessment of Information Communication, Network Providers, Teledensity, and Consumer Complaints on Gross Domestic Products

Authors: Essang Anwana Onuntuei, Chinyere Blessing Azunwoke

Abstract:

The study used secondary data from foreign and local organizations to explore major challenges and opportunities abound in Information Communication. The study aimed at exploring the tie between tele density (network coverage area) and the number of network subscriptions, probing if the degree of consumer complaints varies significantly among network providers, and assessing if network subscriptions do significantly influence the sector’s GDP contribution. Methods used for data analysis include Pearson product-moment correlation and regression analysis, and the Analysis of Variance (ANOVA) as well. At a two-tailed test of 0.05 confidence level, the results of findings established about 85.6% of network subscriptions were explained by tele density (network coverage area), and the number of network subscriptions; Consumer Complaints’ degree varied significantly among network providers as 80.158291 (F calculated) > 3.490295 (F critical) with very high confidence associated p-value = 0.000000 which is < 0.05; and finally, 65% of the nation’s GDP was explained by network subscription to show a high association.

Keywords: tele density, subscription, network coverage, information communication, consumer

Procedia PDF Downloads 51
5395 Multimodal Convolutional Neural Network for Musical Instrument Recognition

Authors: Yagya Raj Pandeya, Joonwhoan Lee

Abstract:

The dynamic behavior of music and video makes it difficult to evaluate musical instrument playing in a video by computer system. Any television or film video clip with music information are rich sources for analyzing musical instruments using modern machine learning technologies. In this research, we integrate the audio and video information sources using convolutional neural network (CNN) and pass network learned features through recurrent neural network (RNN) to preserve the dynamic behaviors of audio and video. We use different pre-trained CNN for music and video feature extraction and then fine tune each model. The music network use 2D convolutional network and video network use 3D convolution (C3D). Finally, we concatenate each music and video feature by preserving the time varying features. The long short term memory (LSTM) network is used for long-term dynamic feature characterization and then use late fusion with generalized mean. The proposed network performs better performance to recognize the musical instrument using audio-video multimodal neural network.

Keywords: multimodal, 3D convolution, music-video feature extraction, generalized mean

Procedia PDF Downloads 215
5394 Design of Distribution Network for Gas Cylinders in Jordan

Authors: Hazem J. Smadi

Abstract:

Performance of a supply chain is directly related to a distribution network that entails the location of storing materials or products and how products are delivered to the end customer through different stages in the supply chain. This study analyses the current distribution network used for delivering gas cylinders to end customer in Jordan. Evaluation of current distribution has been conducted across customer service components. A modification on the current distribution network in terms of central warehousing in each city in the country improves the response time and customer experience. 

Keywords: distribution network, gas cylinder, Jordan, supply chain

Procedia PDF Downloads 460
5393 A Survey of Novel Opportunistic Routing Protocols in Mobile Ad Hoc Networks

Authors: R. Poonkuzhali, M. Y. Sanavullah, M. R. Gurupriya

Abstract:

Opportunistic routing is used, where the network has the features like dynamic topology changes and intermittent network connectivity. In Delay Tolerant network or Disruption tolerant network opportunistic forwarding technique is widely used. The key idea of opportunistic routing is selecting forwarding nodes to forward data and coordination among these nodes to avoid duplicate transmissions. This paper gives the analysis of pros and cons of various opportunistic routing techniques used in MANET.

Keywords: ETX, opportunistic routing, PSR, throughput

Procedia PDF Downloads 495
5392 Software-Defined Networks in Utility Power Networks

Authors: Ava Salmanpour, Hanieh Saeedi, Payam Rouhi, Elahe Hamzeil, Shima Alimohammadi, Siamak Hossein Khalaj, Mohammad Asadian

Abstract:

Software-defined network (SDN) is a network architecture designed to control network using software application in a central manner. This ability enables remote control of the whole network regardless of the network technology. In fact, in this architecture network intelligence is separated from physical infrastructure, it means that required network components can be implemented virtually using software applications. Today, power networks are characterized by a high range of complexity with a large number of intelligent devices, processing both huge amounts of data and important information. Therefore, reliable and secure communication networks are required. SDNs are the best choice to meet this issue. In this paper, SDN networks capabilities and characteristics will be reviewed and different basic controllers will be compared. The importance of using SDNs to escalate efficiency and reliability in utility power networks is going to be discussed and the comparison between the SDN-based power networks and traditional networks will be explained.

Keywords: software-defined network, SDNs, utility network, open flow, communication, gas and electricity, controller

Procedia PDF Downloads 114
5391 Enhancing Organizational Performance through Employee Empowerment: A Study of Koosar Insurance Company in Tehran

Authors: Masoud Jabar Zadeh Mamaghani

Abstract:

Employee empowerment is an effective technique for increasing employee productivity and utilizing their individual and group capacities toward organizational goals. Empowerment is a process that helps improve and enhance performance through the development and expansion of individuals' and teams' influence and capabilities. In other words, empowerment is a strategy for organizational development and flourishing. In this study, the relationship between training and employee empowerment was examined in addition to measuring the level of empowerment among the employees of Kowsar Tehran Insurance Agency. The research method used was a descriptive correlation, and the statistical population of the study included all official employees with a degree higher than a diploma in Kowsar Tehran Insurance Agency. Data related to training hours while serving employees were extracted from their educational certificates, and data related to employees' empowerment levels were obtained through interviews and questionnaires. The research results showed that the level of empowerment among the employees in this agency is higher than the average in all dimensions. However, no correlation was observed between their empowerment level and the training hours they completed while serving.

Keywords: employee empowerment, organizational development, training, insurance industry

Procedia PDF Downloads 81
5390 Quantitative Comparison Complexity and Robustness of Supply Chain Network Based on Different Configurations

Authors: Ahmadreza Rezaei, Qiong Liu

Abstract:

Supply chain network made based on suppliers and product architecture design. these networks are complex and vulnerable that may be expose disruption risks. any supply chain network configuration has its own related complexity and robustness that can have direct effect on its efficiency. So it's necessary to evaluate any configuration with considering complexity and robustness aspects together. However, there is a lack of research about this subject to managers can evaluate their supply chain configurations and choose configuration with balanced complexity and robustness together. In this study, developed indicators improve robustness of supply chain with using framework to evaluate relationships between complexity and robustness of supply chain network under different network configurations . this framework includes Investigation and analysis of quantitative indicators based on network characteristics. Moreover, overall metrics of Shannon entropy is presented to evaluate network topological complexity. So we will analyze two factor of complexity and robustness of networks based on supply chain configurations As result, Complexity and Robustness are two integral components of network that show network resistances under disruption. It's necessary to attain a balanced level of complexity and robustness in network configurations. the proposed framework could be used in supply chain network to improve efficiency.

Keywords: supply chain design, structural complexity, robustness, supply chain configuration, Shannon entropy

Procedia PDF Downloads 9
5389 Freedom, Thought, and the Will: A Philosophical Reconstruction of Muhammad Iqbal’s Conception of Human Agency

Authors: Anwar ul Haq

Abstract:

Muhammad Iqbal was arguably the most significant South Asian Islamic philosopher of the last two centuries. While he is the most revered philosopher of the region, particularly in Pakistan, he is probably the least studied philosopher outside the region. The paper offers a philosophical reconstruction of Iqbal’s view of human agency; it has three sections. Section 1 focuses on Iqbal’s starting point of reflection in practical philosophy (inspired by Kant): our consciousness of ourselves as free agents. The paper brings out Iqbal’s continuity with Kant but also his divergence, in particular his non-Kantian view that we possess a non-sensory intuition of ourselves as free personal causes. It also offer an argument on Iqbal’s behalf for this claim, which is meant as a defense against a Kantian objection to the possibility of intuition of freedom and a skeptic’s challenge to the possibility of freedom in general. Remaining part of the paper offers a reconstruction of Iqbal’s two preconditions of the possibility of free agency. Section 2 discusses the first precondition, namely, the unity of consciousness involved in thought (this is a precondition of agency whether or not it is free). The unity has two aspects, a quantitative (or numerical) aspect and a qualitative (or rational) one. Section 2 offers a defense of these two aspects of the unity of consciousness presupposed by agency by focusing, with Iqbal, on the case of inference.Section 3 discusses a second precondition of the possibility of free agency, that thought and will must be identical in a free agent. Iqbal offers this condition in relief against Bergson’s view. Bergson (on Iqbal’s reading of him) argues that freedom of the will is possible only if the will’s ends are entirely its own and are wholly undetermined by anything from without, not even by thought. Iqbal observes that Bergson’s position ends in an insurmountable dualism of will and thought. Bergson’s view, Iqbal argues in particular, rests on an untenable conception of what an end consists in. An end, correctly understood, is framed by a thinking faculty, the intellect, and not by an extra-rational faculty. The present section outlines Iqbal’s argument for this claim, which rests on the premise that ends possess a certain unity which is intrinsic to particular ends and holds together different ends, and this unity is none other than the quantitative and qualitative unity of a thinking consciousness but in its practical application. Having secured the rational origin of ends, Iqbal argues that a free will must be identical with thought, or else it will be determined from without and won’t be free on that account. Freedom of the self is not a freedom from thought but a freedom in thought: it involves the ability to live a thoughtful life.

Keywords: iqbal, freedom, will, self

Procedia PDF Downloads 72
5388 Reducing the Stigma of Homelessness through Community Engagement and Reciprocity

Authors: Jessica Federman

Abstract:

The current research offers a longitudinal and qualitative study design to examine how reciprocity improves relations between the homeless and various stakeholders within a community. The study examines a homeless shelter that sought to establish a facility within a community of Los Angeles, that was initially met with strong resistance and opposition from a variety of organizations due to deeply entrenched views about the negative impact of having homeless individuals within the community. The project tested an intervention model that targets the reduction of stigmatization of homeless individuals and promotes synergistic exchanges between conflicted organizational entities in communities. Years later, the data show that there has been a remarkable reversal in the perception of the agency by the very forces that initially prevented it from being established. This reversal was achieved by a few key strategic decisions. Community engagement was the first step toward changing people’s minds and demonstrating how the homeless shelter was helping to alleviate the problem of homelessness instead of contributing to it. Central to the non-profit’s success was the agency’s pioneering formulation of a treatment model known as, Reciprocal Community Engagement Model (RCEM). The model works by reintegrating the homeless back into society through relationship building within a network of programs that foster positive human connections. This approach aims to draw the homeless out of the debilitating isolation of their situation, reintegrate them through purposeful roles in the community while simultaneously providing a reciprocal benefit to the community at large. Through multilevel, simultaneous social interaction, RCEM has a direct impact not only on the homeless shelter’s clients but also for the community as well. The agency’s approach of RCEM led to their homeless clients getting out of the shelter and getting to work in the community directly alongside other community volunteers and for the benefit of other city and community organizations. This led to several opportunities for community members and residents to interact in meaningful ways. Through each successive exposure, the resident and community members’ distrust in one another was gradually eased and a mutually supportive relationship restored. In this process, the community member becomes the locus of change as much as the residents of the shelter. Measurements of community trust and resilience increased while negative perceptions of homeless people decreased.

Keywords: stigma, homelessness, reciprocity, identity

Procedia PDF Downloads 183
5387 Data Clustering in Wireless Sensor Network Implemented on Self-Organization Feature Map (SOFM) Neural Network

Authors: Krishan Kumar, Mohit Mittal, Pramod Kumar

Abstract:

Wireless sensor network is one of the most promising communication networks for monitoring remote environmental areas. In this network, all the sensor nodes are communicated with each other via radio signals. The sensor nodes have capability of sensing, data storage and processing. The sensor nodes collect the information through neighboring nodes to particular node. The data collection and processing is done by data aggregation techniques. For the data aggregation in sensor network, clustering technique is implemented in the sensor network by implementing self-organizing feature map (SOFM) neural network. Some of the sensor nodes are selected as cluster head nodes. The information aggregated to cluster head nodes from non-cluster head nodes and then this information is transferred to base station (or sink nodes). The aim of this paper is to manage the huge amount of data with the help of SOM neural network. Clustered data is selected to transfer to base station instead of whole information aggregated at cluster head nodes. This reduces the battery consumption over the huge data management. The network lifetime is enhanced at a greater extent.

Keywords: artificial neural network, data clustering, self organization feature map, wireless sensor network

Procedia PDF Downloads 518
5386 Assessment of Taiwan Railway Occurrences Investigations Using Causal Factor Analysis System and Bayesian Network Modeling Method

Authors: Lee Yan Nian

Abstract:

Safety investigation is different from an administrative investigation in that the former is conducted by an independent agency and the purpose of such investigation is to prevent accidents in the future and not to apportion blame or determine liability. Before October 2018, Taiwan railway occurrences were investigated by local supervisory authority. Characteristics of this kind of investigation are that enforcement actions, such as administrative penalty, are usually imposed on those persons or units involved in occurrence. On October 21, 2018, due to a Taiwan Railway accident, which caused 18 fatalities and injured another 267, establishing an agency to independently investigate this catastrophic railway accident was quickly decided. The Taiwan Transportation Safety Board (TTSB) was then established on August 1, 2019 to take charge of investigating major aviation, marine, railway and highway occurrences. The objective of this study is to assess the effectiveness of safety investigations conducted by the TTSB. In this study, the major railway occurrence investigation reports published by the TTSB are used for modeling and analysis. According to the classification of railway occurrences investigated by the TTSB, accident types of Taiwan railway occurrences can be categorized into: derailment, fire, Signal Passed at Danger and others. A Causal Factor Analysis System (CFAS) developed by the TTSB is used to identify the influencing causal factors and their causal relationships in the investigation reports. All terminologies used in the CFAS are equivalent to the Human Factors Analysis and Classification System (HFACS) terminologies, except for “Technical Events” which was added to classify causal factors resulting from mechanical failure. Accordingly, the Bayesian network structure of each occurrence category is established based on the identified causal factors in the CFAS. In the Bayesian networks, the prior probabilities of identified causal factors are obtained from the number of times in the investigation reports. Conditional Probability Table of each parent node is determined from domain experts’ experience and judgement. The resulting networks are quantitatively assessed under different scenarios to evaluate their forward predictions and backward diagnostic capabilities. Finally, the established Bayesian network of derailment is assessed using investigation reports of the same accident which was investigated by the TTSB and the local supervisory authority respectively. Based on the assessment results, findings of the administrative investigation is more closely tied to errors of front line personnel than to organizational related factors. Safety investigation can identify not only unsafe acts of individual but also in-depth causal factors of organizational influences. The results show that the proposed methodology can identify differences between safety investigation and administrative investigation. Therefore, effective intervention strategies in associated areas can be better addressed for safety improvement and future accident prevention through safety investigation.

Keywords: administrative investigation, bayesian network, causal factor analysis system, safety investigation

Procedia PDF Downloads 125
5385 Design and Implementation of a Cross-Network Security Management System

Authors: Zhiyong Shan, Preethi Santhanam, Vinod Namboodiri, Rajiv Bagai

Abstract:

In recent years, the emerging network worms and attacks have distributive characteristics, which can spread globally in a very short time. Security management crossing networks to co-defense network-wide attacks and improve the efficiency of security administration is urgently needed. We propose a hierarchical distributed network security management system (HD-NSMS), which can integrate security management across multiple networks. First, we describe the system in macrostructure and microstructure; then discuss three key problems when building HD-NSMS: device model, alert mechanism, and emergency response mechanism; lastly, we describe the implementation of HD-NSMS. The paper is valuable for implementing NSMS in that it derives from a practical network security management system (NSMS).

Keywords: network security management, device organization, emergency response, cross-network

Procedia PDF Downloads 169