Search results for: romantic accounts
577 Performance Practices in Classic Piano Music
Authors: Mahdi Kazemi
Abstract:
Today's performances on Piano Forte or Fortepiano are cheerful, musical, expressive, and at the same time informative. AlterMuskie is an exciting and richly drawn magazine that is unmatched in its field. First published in 1973, it is a magazine for anyone interested in early music and its contemporary interpretation. Alexander Scriabin's (1871_1915) work has traditionally focused on his music in the mid and late 1902s. The discussion of his personal philosophy and his influence on music also focuses on these two periods. Over the last few decades, the repertoire of British classical solo pianos has received increasing interest from researchers. From the piano rolls of the early 20th century, much can be inferred about the practice of romantic piano playing. Summary Haydn's most important piano works are the sonatas, which generally represent Haydn's development as a composer from the early to the last three sonata dates, 1794.Keywords: piano, classic piano, performance, music
Procedia PDF Downloads 188576 Exploring Polyphonic Texture in Chopin's Piano Works
Authors: Parham Bakhtiari
Abstract:
Frederic Chopin created numerous acclaimed piano compositions that have been both appreciated and analyzed by musicians starting from the Romantic Period. These compositions are still being played globally with specific privileges among pianists. This study examines particular elements within Chopin's piano works and how they can be interpreted and instructed to those who are not acquainted with his pieces. The theory suggests that particular melodic attributes can be found in Chopin's piano compositions. Therefore, various elements can be recognized, such as polyphonic textures, decorated phrases, themes and variations, inner patterns tuning, blending harmonics, and conflicting beats. These characteristics were discovered within theoretical analysis has identified many of Chopin's compositions. The aim of this study is to identify the musical characteristics of analyzable through music theory and demonstrate a distinctive pianistic polyphonic texture in Chopin's solo piano compositions.Keywords: Chopin, piano, composition, polyphonic, texture
Procedia PDF Downloads 35575 Analyzing the Effects of Supply and Demand Shocks in the Spanish Economy
Authors: José M Martín-Moreno, Rafaela Pérez, Jesús Ruiz
Abstract:
In this paper we use a small open economy Dynamic Stochastic General Equilibrium Model (DSGE) for the Spanish economy to search for a deeper characterization of the determinants of Spain’s macroeconomic fluctuations throughout the period 1970-2008. In order to do this, we distinguish between tradable and non-tradable goods to take into account the fact that the presence of non-tradable goods in this economy is one of the largest in the world. We estimate a DSGE model with supply and demand shocks (sectorial productivity, public spending, international real interest rate and preferences) using Kalman Filter techniques. We find the following results. First of all, our variance decomposition analysis suggests that 1) the preference shock basically accounts for private consumption volatility, 2) the idiosyncratic productivity shock accounts for non-tradable output volatility, and 3) the sectorial productivity shock along with the international interest rate both greatly account for tradable output. Secondly, the model closely replicates the time path observed in the data for the Spanish economy and finally, the model captures the main cyclical qualitative features of this economy reasonably well.Keywords: business cycle, DSGE models, Kalman filter estimation, small open economy
Procedia PDF Downloads 416574 Personality Traits, Probability of Marital Infidelity and Risk of Divorce
Authors: Bahareh Zare
Abstract:
The theory of the investment model of dating infidelity maintains that loyalty is an essential power within romantic relationships. Loyalty signifies both motivation and psychological attachment to maintain a relationship. This study examined the relationship between the Big Five Personality Factors (Extraversion, Neuroticism, Openness, Conscientiousness, and Agreeableness), probability of marital infidelity, and risk of divorce. The participants completed NEO-FFI, INFQ (infidelity questionnaire) and were interviewed by OHI (Oral History Interview). The results demonstrated that extraversion and agreeableness traits were significant predictors for the probability of infidelity and risk of divorce. In addition, conscientiousness predicted the probability of infidelity, while neuroticism predicted the risk of divorce.Keywords: five factors personality, infidelity, risk of divorce, investment theory
Procedia PDF Downloads 93573 Glimpses into the History of Makkah in the Light of Archaeological Finds
Authors: Heba Aboul-Enein
Abstract:
The blessed Mecca (Makkah) has been attacked as a city without a pre-Islamic history. Many claims have been posited denying the historicity of this holy city, and mythicizing Arabic historical records. Hence, the current paper attempted to shed light on this controversial history of Makkah. To achieve the intended objective, the study recoursed to archaeological, historical, and linguistic evidence, to prove that the holy city existed since the dawn of human history. The data under study include the results of recent excavations; archaeological surveys in Saudi Arabia, academic works of archaeologists, newspaper reports of the latest archaeological discoveries, and the findings of Saudi explorers. In addition, the study examined ancient and contemporary references; western accounts of Makkah, the bible, Jewish, Christian, Islamic, and Arabic references, in an effort to reconcile these texts with the archeological findings. The paper also reviewed the latest results of aerial archeology of the region. The study proved based on archaeological finds, and contrary to fallacious claims, that Makkah is an ancient city that existed and was inhabited by humans in varied historical eras.Keywords: aerial archaeology, archaeological finds in the Makkan region, archaeological surveys, Western, Jewish and Islamic accounts of Makkah
Procedia PDF Downloads 475572 ISIS and Social Media
Authors: Neda Jebellie
Abstract:
New information and communication technologies (ICT) not only has revolutionized the world of communication but has also strongly impacted the state of international terrorism. Using the potential of social media, the new wave of terrorism easily can recruit new jihadi members, spread their violent ideology and garner financial support. IS (Islamic State) as the most dangerous terrorist group has already conquered a great deal of social media space and has deployed sophisticated web-based strategies to promote its extremist doctrine. In this respect the vastly popular social media are the perfect tools for IS to establish its virtual Caliphate (e-caliphate) and e-Ommah (e-citizen).Using social media to release violent videos of beheading journalists, burning their hostages alive and mass killing of prisoners are IS strategies to terrorize and subjugate its enemies. Several Twitter and Facebook accounts which are IS affiliations have targeted young generation of Muslims all around the world. In fact IS terrorists use modern resources of communication not only to share information and conduct operations but also justify their violent acts. The strict Wahhabi doctrine of ISIS is based on a fundamental interpretation of Islam in which religious war against non Muslims (Jihad) and killing infidels (Qatal) have been praised and recommended. Via social media IS disseminates its propaganda to inspire sympathizers across the globe. Combating this new wave of terrorism which is exploiting new communication technologies is the most significant challenge for authorities. Before the rise of internet and social media governments had to control only mosques and religious gathering such as Friday sermons(Jamaah Pray) to prevent spreading extremism among Muslims community in their country. ICT and new communication technologies have heighten the challenge of dealing with Islamic radicalism and have amplified its threat .According to the official reports even some of the governments such as UK have created a special force of Facebook warriors to engage in unconventional warfare in digital age. In compare with other terrorist groups, IS has effectively grasped social media potential. Their horrifying released videos on YouTube easily got viral and were re-twitted and shared by thousands of social media users. While some of the social media such as Twitter and Facebook have shut down many accounts alleged to IS but new ones create immediately so only blocking their websites and suspending their accounts cannot solve the problem as terrorists recreate new accounts. To combat cyber terrorism focusing on disseminating counter narrative strategies can be a solution. Creating websites and providing online materials to propagate peaceful and moderate interpretation of Islam can provide a cogent alternative to extremist views.Keywords: IS-islamic state, cyber terrorism, social media, terrorism, information, communication technologies
Procedia PDF Downloads 487571 Women Retelling the Iranian Revolution: A Comparative Study of Novelists Maryam Madjidi and Negar Djavadi
Authors: Alessandro Giardino
Abstract:
The Iranian Revolution has been the object of numberless historical and semi-fictional accounts, often providing a monolithic perspective on the events, due to the westerner positioning of those recounting them. Against this tradition, two contemporary French-Iranian novels "Disoriental" (2016) by Negar Djavadi and "Marx and The Doll" (2017) by Maryam Madjidi have offered readers a female-oriented and interestingly layered representation of the Iranian Revolution, hence addressing the responsibilities and misconceptions of Western countries. Furthermore, these two women writers have shed light on the disenchantment of the Iranian intellectual class vis-à-vis the foundation of the Islamic Republic, by particularly focusing on the deterioration of women’s rights, as well as the repression of political, ethnical, religious and sexual minorities. By a psycholinguistic and semasiological analysis of the two novels by Djavadi and Madjidi, this essay will focus on alternative accounts of the revolution in order to reflect upon the role of intersectional literature to the understanding of history. More specifically, as both women, refugees, and bi-cultural writers, Djavadi and Madjidi unearthed moments and figures of the revolution which had disappeared from the prevalent narrative. In doing so, however, these two writers resorted to entirely opposite styles of writing that, it will be argued, stem from different types of female resistance. In defining these two approaches as a "narrative resistance" and a "photographic resistance," the essay will elucidate the dependence of these writers’ language on generational and psychological factors, but it will also stir a reflection on their different communicative strategies.Keywords: Iranian revolution, French-Iranian, intersectionality, literature, women writers
Procedia PDF Downloads 158570 Equality, Friendship, and Violence in Slash or Yaoi Fan Art
Authors: Proud Arunrangsiwed
Abstract:
Slash or Yaoi fan art is the artwork that contains a homosexual relationship between fictional male characters, which were heterosexual in the original media. Previous belief about Slash or Yaoi fan art is that the fan fiction writers and the fan artists need to see the equality in romantic relationship. They do not prefer the pairing of man and woman, since both genders are not equal. The objectives of the current study are to confirm this belief, and to examine the relationship between equality found in Slash fan art, friendship in original media, and violence contained in fan art. Mean comparisons show that equality could be found in the pairing of hero and hero, but rarely found in the pairing of hero and villain. Regression analysis shows that the level of equality in fan art and friendship in original media are significant predictors of violence contained in fan art. Since villain-related pairings yield a high level of violence in fan art and a low level of equality, researchers of future studies should find the strategies to prevent fans to include villains in their Slash or Yaoi fan art.Keywords: equality, fan art, slash, violence, yaoi
Procedia PDF Downloads 253569 Secure and Privacy-Enhanced Blockchain-Based Authentication System for University User Management
Authors: Ali El Ksimi
Abstract:
In today's digital academic environment, secure authentication methods are essential for managing sensitive user data, including that of students and faculty. The rise in cyber threats and data breaches has exposed the vulnerabilities of traditional authentication systems used in universities. Passwords, often the first line of defense, are particularly susceptible to hacking, phishing, and brute-force attacks. While multi-factor authentication (MFA) provides an additional layer of security, it can still be compromised and often adds complexity and inconvenience for users. As universities seek more robust security measures, blockchain technology emerges as a promising solution. Renowned for its decentralization, immutability, and transparency, blockchain has the potential to transform how user management is conducted in academic institutions. In this article, we explore a system that leverages blockchain technology specifically for managing user accounts within a university setting. The system enables the secure creation and management of accounts for different roles, such as administrators, teachers, and students. Each user is authenticated through a decentralized application (DApp) that ensures their data is securely stored and managed on the blockchain. By eliminating single points of failure and utilizing cryptographic techniques, the system enhances the security and integrity of user management processes. We will delve into the technical architecture, security benefits, and implementation considerations of this approach. By integrating blockchain into user management, we aim to address the limitations of traditional systems and pave the way for the future of digital security in education.Keywords: blockchain, university, authentication, decentralization, cybersecurity, user management, privacy
Procedia PDF Downloads 24568 Software Component Identification from Its Object-Oriented Code: Graph Metrics Based Approach
Authors: Manel Brichni, Abdelhak-Djamel Seriai
Abstract:
Systems are increasingly complex. To reduce their complexity, an abstract view of the system can simplify its development. To overcome this problem, we propose a method to decompose systems into subsystems while reducing their coupling. These subsystems represent components. Consisting of an existing object-oriented systems, the main idea of our approach is based on modelling as graphs all entities of an oriented object source code. Such modelling is easy to handle, so we can apply restructuring algorithms based on graph metrics. The particularity of our approach consists in integrating in addition to standard metrics, such as coupling and cohesion, some graph metrics giving more precision during the components identication. To treat this problem, we relied on the ROMANTIC approach that proposed a component-based software architecture recovery from an object oriented system.Keywords: software reengineering, software component and interfaces, metrics, graphs
Procedia PDF Downloads 501567 The Use of the Social Media as a Propaganda Tool from the Political Parties in Europe against the Immigrants
Authors: Gülbuğ Erol, Caner Çakı
Abstract:
In Europe, it is seen that the immigrant population has increased in recent years. The rapid increase in the immigrant population has led to that some extreme right-wing parties increased their harsh discourse against the immigrants in Europe. In particular, it is seen that some right-wing parties in some European countries have demanded that the immigrant population could be controlled in the countries they are in, and even those immigrants should be removed from their countries. In this process, it is seen that these parties have effectively used social media platforms in the propaganda activities carried out for immigrants in recent years. In particular, the social media has great advantages in that these parties can address to the entire population in the country, apart from the limited masses that political parties address. How these political parties benefit from these advantages has great importance for the political parties to demonstrate their influence in political arena. In this study, it was tried to investigate how and why the extreme right-wing parties in Europe have used social media in their propaganda activities towards immigrant populations in Europe. For this purpose, the political parties of the three German-speaking countries in Europe were elected; Die Nationaldemokratische Partei Deutschlands (NPD) from Germany, Die Freiheitliche Partei Österreichs (FPÖ) from Austria, Die Schweizerische Volkspartei (SVP) from Switzerland. As social media platform, only their Facebook accounts were analyzed in this study. Accounts The political parties selected were examined with content analysis, and that social media was effectively used by extreme right-wing parties for propaganda purposes towards immigrants in Europe revealed.In this process, it is seen that these parties have effectively used social media platforms in the propaganda activities carried out for immigrants in recent years. In particular, the social media has great advantages in that these parties can address to the entire population in the country, apart from the limited masses that political parties address. How these political parties benefit from these advantages has great importance for the political parties to demonstrate their influence in political arena. In Europe, it is seen that the immigrant population has increased in recent years. The rapid increase in the immigrant population has led to that some extreme right-wing parties increased their harsh discourse against the immigrants in Europe. In particular, it is seen that some right-wing parties in some European countries have demanded that the immigrant population should be controlled in the countries they are in, and even those immigrants should be removed from their countries. In this process, it is seen that these parties have effectively used social media platforms in the propaganda activities carried out for immigrants in recent years. In particular, the social media has great advantages in that these parties can address to the entire population in the country, apart from the limited masses that political parties address. How these political parties benefit from these advantages has great importance for the political parties to demonstrate their influence in political arena. In this study, it was tried to investigate how and why the extreme right-wing parties in Europe have used social media in their propaganda activities towards immigrant populations in Europe. For this purpose, the political parties of the three German-speaking countries in Europe were elected; Die Nationaldemokratische Partei Deutschlands (NPD) from Germany, Die Freiheitliche Partei Österreichs (FPÖ) from Austria, Die Schweizerische Volkspartei (SVP) from Switzerland. As social media platform, only their Facebook accounts were analyzed in this study. Accounts The political parties selected were examined with content analysis and that social media was effectively used by extreme right-wing parties for propaganda purposes towards immigrants in Europe revealed.Keywords: content analysis, political parties, propaganda, social media
Procedia PDF Downloads 416566 Fashion as a Tool of Modernity and Female Empowerment in the Nineteenth-Century Zenana
Authors: Ira Solomatina
Abstract:
This paper looks at the role of fashion and clothes in the context of the late nineteenth-century Indian zenana. It suggests that fashion and clothes served as tools for self-assertion and empowerment among the zenana women, allowing them to negotiate between tradition and modernity and establish themselves as modern subjects. In pre-Independence India and in upper-class Indians households, zenana was women's part of the house, where women lived separately from men and in seclusion (purdah). To male colonial scholars and officials, zenana remained impenetrable, inviting speculations about the position of the zenana women. In the colonial imagination, the Indian woman was not only the helpless victim, oppressed by the Indian man but also the agent of deviant sexuality. Consequently, in the colonial British scholarship, zenana was portrayed as a space of idleness, perverse sexuality, ignorance, and illness. Contrary to the dominating ideas about zenana, some Western women writers presented more varied accounts of the zenana life, noting on the good education, dignified manners, and sophisticated fashion choices of the women in the zenana. Contemporary research by postcolonial scholars shows that zenana women in purdah travelled, had access to education and political power. The history of India has examples of women rulers in purdah and more than enough instances of zenana women influencing politics and culture. Zenana, in short, was not an ahistorical, dark realm of idleness but the space of culture and a space impacted by modernity. The paper proves that in the context of zenana, clothes, and fashion provided a visual vocabulary for the women to establish themselves as modern subjects and negotiate between modernity and tradition. To do so, it relies on photographs of zenana women and written accounts about and from the nineteenth-century zenana.Keywords: woman's fashion, colonial India, modernity, zenana
Procedia PDF Downloads 150565 Love and Money: Societal Attitudes Toward Income Disparities in Age-Gap Relationships
Authors: Victoria Scarratt
Abstract:
Couples involved in age-gap relationships generally evoke negative stereotypes, opinions, and social disapproval. This research seeks to examine whether financial disparities in age-discrepant relationships cause negative attitudes in study participants. It was hypothesized that an age-gap couple (29 year difference) would receive a greater degree of societal disapproval when the couple also had a large salary gap compared to a similarly aged couple (1 year difference) with a salary gap. Additionally, there would be no significant difference between age-gap couples without a salary-gap compared to a similarly aged couple without a salary gap. To test the hypothesis, participants were given one of four scenarios regarding a couple in a romantic relationship.Then they were asked to respond to nine Likert scale questions. Results indicated that participants perceived age-gap relationships with a salary disparity to be less equitable in regard to a power imbalance between the couple and the financial and general gain that one partner will receive. A significant interaction was also detected for evoking feelings of disgust in participants and how morally correct it is for the couple to continue their relationship.Keywords: age gap relationships, love, financial disparities, societal stigmas, relationship dynamics
Procedia PDF Downloads 114564 Conspiracy Theories and the Right to Believe
Authors: Zwelenkani Mdlalose
Abstract:
From the moment Covid 19 was declared a pandemic it became clear that conspiracy theories would significantly impact our response to the crisis that the virus was to become. Central to the interest in conspiracy theories evoked by a pandemic is a more general concern for the impact they have on society and social harmony. The specific brand of Conspiracy Theory that is in question is not any and all theories about conspiracies but rather those conspiracy theories which contradict official accounts. For example, where the official account on the terrorist attacks of September 11 2001 is of a conspiracy involving 19 militants associated with the Islamic extremist group al-Qaeda against targets in the United States, the nature of conspiracy theory under study is the one contradicting this official account to the extent that its attributes the attacks not to al-Qaeda militants but to actors in the United States government itself. The study is not an investigation into the truth value of conspiracy theories but rather an attempt at observing the essential qualities of the type of belief that is belief in conspiracy theories compared to belief in official accounts provided by authoritative sources such as governments, experts and mainstream media. These qualities include the psychological, epistemic and socio-political foundations on which belief in conspiracy theories are established. Based on a foundational understanding of the sort of belief that are beliefs in conspiracy theories, we may then extrapolate implied ethical demands on both authoritative bodies and actors as well as believers in conspiracy theories. For example: in their unofficial ‘non-factual’ status, is there not some violation of epistemic right in the same way we observe in cases where people are prejudiced because of their religious beliefs? In other words, is there an epistemic injustice suffered by believers in conspiracy theories in the way their beliefs are rejected as illegitimate? Conversely, to what extent do believers bear an epistemic responsibility in their adoption of their beliefs in conspiracy theories. From this position, perhaps we can then develop responses to the problem that foster greater social harmony even in the midst of suspicion and distrust.Keywords: conspiracy theories, subjugated knowledge, epistemic injustice, epistemic responsibility
Procedia PDF Downloads 102563 Unspoken Delights: Creative Strategies for Bypass Censorship System and Depicting Male-Female Relationships in Iranian Cinema
Authors: Parsa Naji
Abstract:
Following the Iran Islamic Revolution in 1979 and the subsequent formation of a theocratic regime, the new regime implemented stringent regulations and a complicated censorship system in the film industry. Thereupon, the screening of films showing the relationships between males and females encountered numerous limitations. Not only did these limits encompass the physical portrayal of the relationship between males and females, but also the dialogues containing explicit sexual or even passionate romantic themes, resulting in a film being permanently consigned to archival storage. However, despite these limitations, Iranian filmmakers persevered in creating their interesting cinematic works. Throughout the years after the revolution, Iranian directors have navigated a series of challenges and obstacles, employing innovative and unconventional methods to bypass the rigorous censorship system imposed by the government, ensuring the screening of their films. This study aims to analyze the creative approaches employed by Iranian filmmakers to circumvent governmental censorship regulations.Keywords: censorship, Iranian cinema, Islamic revolution, male-female relationship
Procedia PDF Downloads 47562 Contact Phenomena in Medieval Business Texts
Authors: Carmela Perta
Abstract:
Among the studies flourished in the field of historical sociolinguistics, mainly in the strand devoted to English history, during its Medieval and early modern phases, multilingual texts had been analysed using theories and models coming from contact linguistics, thus applying synchronic models and approaches to the past. This is true also in the case of contact phenomena which would transcend the writing level involving the language systems implicated in contact processes to the point of perceiving a new variety. This is the case for medieval administrative-commercial texts in which, according to some Scholars, the degree of fusion of Anglo-Norman, Latin and middle English is so high a mixed code emerges, and there are recurrent patterns of mixed forms. Interesting is a collection of multilingual business writings by John Balmayn, an Englishman overseeing a large shipment in Tuscany, namely the Cantelowe accounts. These documents display various analogies with multilingual texts written in England in the same period; in fact, the writer seems to make use of the above-mentioned patterns, with Middle English, Latin, Anglo-Norman, and the newly added Italian. Applying an atomistic yet dynamic approach to the study of contact phenomena, we will investigate these documents, trying to explore the nature of the switching forms they contain from an intra-writer variation perspective. After analysing the accounts and the type of multilingualism in them, we will take stock of the assumed mixed code nature, comparing the characteristics found in this genre with modern assumptions. The aim is to evaluate the possibility to consider the switching forms as core elements of a mixed code, used as professional variety among merchant communities, or whether such texts should be analysed from a switching perspective.Keywords: historical sociolinguistics, historical code switching, letters, medieval england
Procedia PDF Downloads 75561 Life-Cycle Assessment of Residential Buildings: Addressing the Influence of Commuting
Authors: J. Bastos, P. Marques, S. Batterman, F. Freire
Abstract:
Due to demands of a growing urban population, it is crucial to manage urban development and its associated environmental impacts. While most of the environmental analyses have addressed buildings and transportation separately, both the design and location of a building affect environmental performance and focusing on one or the other can shift impacts and overlook improvement opportunities for more sustainable urban development. Recently, several life-cycle (LC) studies of residential buildings have integrated user transportation, focusing exclusively on primary energy demand and/or greenhouse gas emissions. Additionally, most papers considered only private transportation (mainly car). Although it is likely to have the largest share both in terms of use and associated impacts, exploring the variability associated with mode choice is relevant for comprehensive assessments and, eventually, for supporting decision-makers. This paper presents a life-cycle assessment (LCA) of a residential building in Lisbon (Portugal), addressing building construction, use and user transportation (commuting with private and public transportation). Five environmental indicators or categories are considered: (i) non-renewable primary energy (NRE), (ii) greenhouse gas intensity (GHG), (iii) eutrophication (EUT), (iv) acidification (ACID), and (v) ozone layer depletion (OLD). In a first stage, the analysis addresses the overall life-cycle considering the statistical model mix for commuting in the residence location. Then, a comparative analysis compares different available transportation modes to address the influence mode choice variability has on the results. The results highlight the large contribution of transportation to the overall LC results in all categories. NRE and GHG show strong correlation, as the three LC phases contribute with similar shares to both of them: building construction accounts for 6-9%, building use for 44-45%, and user transportation for 48% of the overall results. However, for other impact categories there is a large variation in the relative contribution of each phase. Transport is the most significant phase in OLD (60%); however, in EUT and ACID building use has the largest contribution to the overall LC (55% and 64%, respectively). In these categories, transportation accounts for 31-38%. A comparative analysis was also performed for four alternative transport modes for the household commuting: car, bus, motorcycle, and company/school collective transport. The car has the largest results in all impact categories. When compared to the overall LC with commuting by car, mode choice accounts for a variability of about 35% in NRE, GHG and OLD (the categories where transportation accounted for the largest share of the LC), 24% in EUT and 16% in ACID. NRE and GHG show a strong correlation because all modes have internal combustion engines. The second largest results for NRE, GHG and OLD are associated with commuting by motorcycle; however, for ACID and EUT this mode has better performance than bus and company/school transport. No single transportation mode performed best in all impact categories. Integrated assessments of buildings are needed to avoid shifts of impacts between life-cycle phases and environmental categories, and ultimately to support decision-makers.Keywords: environmental impacts, LCA, Lisbon, transport
Procedia PDF Downloads 362560 Analyzing the Efficiency of Initiatives Taken against Disinformation during Election Campaigns: Case Study of Young Voters
Authors: Fatima-Zohra Ghedir
Abstract:
Social media platforms have been actively working on solutions and combined their efforts with media, policy makers, educators and researchers to protect citizens and prevent interferences in information, political discourses and elections. Facebook, for instance, deleted fake accounts, implemented fake accounts and fake content detection algorithms, partnered with news agencies to manually fact check content and changed its newsfeeds display. Twitter and Instagram regularly communicate on their efforts and notify their users of improvements and safety guidelines. More funds have been allocated to media literacy programs to empower citizens in prevision of the coming elections. This paper investigates the efficiency of these initiatives and analyzes the metrics to measure their success or failure. The objective is also to determine the segments of population more prone to fall in disinformation traps during the elections despite the measures taken over the last four years. This study will also examine the groups who were positively impacted by these measures. This paper relies on both desk and field methodologies. For this study, a survey was administered to French students aged between 17 and 29 years old. Semi-guided interviews were conducted on a similar audience. The analysis of the survey and of the interviews show that respondents were exposed to the initiatives described above and are aware of the existence of disinformation issues. However, they do not understand what disinformation really entails or means. For instance, for most of them, disinformation is synonymous of the opposite point of view without taking into account the truthfulness of the content. Besides, they still consume and believe the information shared by their friends and family, with little questioning about the ways their closed ones get informed.Keywords: democratic elections, disinformation, foreign interference, social media, success metrics
Procedia PDF Downloads 109559 On the Development of Evidential Contrasts in the Greater Himalayan Region
Authors: Marius Zemp
Abstract:
Evidentials indicate how the speaker obtained the information conveyed in a statement. Detailed diachronic-functional accounts of evidential contrasts found in the Greater Himalayan Region (GHR) reveal that contrasting evidentials are not only defined against each other but also that most of them once had different aspecto-temporal (TA) values which must have aligned when their contrast was conventionalized. Based on these accounts, the present paper sheds light on hitherto unidentified mechanisms of grammatical change. The main insights of the present study were facilitated by ‘functional reconstruction’, which (i) revolves around morphemes which appear to be used in divergent ways within a language and/or across different related languages, (ii) persistently devises hypotheses as to how these functional divergences may have developed, and (iii) retains those hypotheses which most plausibly and economically account for the data. Based on the dense and detailed grammatical literature on the Tibetic language family, the author of this study is able to reconstruct the initial steps by which its evidentiality systems developed: By the time Proto-Tibetan started to be spread across much of Central Asia in the 7th century CE, verbal concatenations with and without a connective -s had become common. As typical for resultative constructions around the globe, Proto-Tibetan *V-s-’dug ‘was there, having undergone V’ (employing the simple past of ’dug ‘stay, be there’) allowed both for a perfect reading (‘the state resulting from V holds at the moment of speech’) and an inferential reading (‘(I infer from its result that) V has taken place’). In Western Tibetic, *V-s-’dug grammaticalized in its perfect meaning as it became contrasted with perfect *V-s-yod ‘is there, having undergone V’ (employing the existential copula yod); that is, *V-s-’dug came to mean that the speaker directly witnessed the profiled result of V, whereas *V-s-yod came to mean that the speaker does not depend on direct evidence of the result, as s/he simply knows that it holds. In Eastern Tibetic, on the other hand, V-s-’dug grammaticalized in its inferential past meaning as it became contrasted with past *V-thal ‘went past V-ing’ (employing the simple past of thal ‘go past’); that is, *V-s-’dug came to mean that the profiled past event was inferred from its result, while *V-thal came to mean that it was directly witnessed. Hence, depending on whether it became contrasted with a perfect or a past construction, resultative V-s-’dug grammaticalized either its direct evidential perfect or its inferential past function. This means that in both cases, evidential readings of constructions with distinct but overlapping TA-values became contrasted, and in order for their contrasting meanings to grammaticalize, the constructions had to agree on their tertium comparationis, which was their shared TA-value. By showing that other types of evidential contrasts in the GHR are also TA-aligned, while no single markers (or privative contrasts) are found to have grammaticalized evidential functions, the present study suggests that, at least in this region of the world, evidential meanings grammaticalize only in equipollent contrasts, which always end up TA-aligned.Keywords: evidential contrasts, functional-diachronic accounts, grammatical change, himalayan languages, tense/aspect-alignment
Procedia PDF Downloads 128558 Non-Monogamy as Rebellion against Tradition in Jhumpa Lahiri’s The Namesake
Authors: Jingya Huang
Abstract:
This paper argues that Moushumi Mazoomdar has non-monogamous relationships with different men before and after her marriage as a form of rebellion against the traditional Indian culture deeply ingrained in her. Written by Jhumpa Lahiri, The Namesake (2004) features an Indian couple migrating to America who gives birth to two children, including the main character Gogol. Moushumi, like Gogol, is also a second-generation Indian American. Because of the influence of American culture, Moushumi prefers to marry for love, disdaining any thought of an arranged marriage. This paper is divided into two parts: before and after marriage which can also be seen in the light of polyamory and infidelity. First, according to Anapol (2010), polyamory is a newly created word from Greek and Latin which means “loving more than one person at a time when it comes to romantic or erotic love.” The discussion of polyamory mainly focuses on the most basic heterosexual relationship without mentioning of homosexual and bisexual love relationships. By adopting Anapol’s concept of polyamory, this paper examines the nature of the relationships between Moushumi and other men before her marriage. Afterwards, the concept of infidelity is discussed to analyze the interaction between Moushumi and Dimitri. How Moushumi rebels against tradition is shown through these two main discussions.Keywords: Indian American, non-monogamous relationship, rebellion, polyamory, infidelity
Procedia PDF Downloads 339557 The Governance of UK Museums and Art Galleries: Implications for Accountability
Authors: Aminah Abdullah, Iqbal Khadaroo
Abstract:
This paper investigates to what ends, how and by whom museums and art galleries in the UK are governed, and to whom they provide accounts to justify their behavior and activities. A theoretical framework is developed by drawing from the governance and accountability literature and is fleshed out by using empirical data from secondary sources. The findings show that the governance model used, informed by the new public management (NPM) philosophy, and has created tensions between the managerial and social forms of accountability. Museums and art galleries have adopted a managerial culture of getting done what gets measured.Keywords: governance, accountability, UK museums and art galleries, public sector
Procedia PDF Downloads 334556 Theorizing Optimal Use of Numbers and Anecdotes: The Science of Storytelling in Newsrooms
Authors: Hai L. Tran
Abstract:
When covering events and issues, the news media often employ both personal accounts as well as facts and figures. However, the process of using numbers and narratives in the newsroom is mostly operated through trial and error. There is a demonstrated need for the news industry to better understand the specific effects of storytelling and data-driven reporting on the audience as well as explanatory factors driving such effects. In the academic world, anecdotal evidence and statistical evidence have been studied in a mutually exclusive manner. Existing research tends to treat pertinent effects as though the use of one form precludes the other and as if a tradeoff is required. Meanwhile, narratives and statistical facts are often combined in various communication contexts, especially in news presentations. There is value in reconceptualizing and theorizing about both relative and collective impacts of numbers and narratives as well as the mechanism underlying such effects. The current undertaking seeks to link theory to practice by providing a complete picture of how and why people are influenced by information conveyed through quantitative and qualitative accounts. Specifically, the cognitive-experiential theory is invoked to argue that humans employ two distinct systems to process information. The rational system requires the processing of logical evidence effortful analytical cognitions, which are affect-free. Meanwhile, the experiential system is intuitive, rapid, automatic, and holistic, thereby demanding minimum cognitive resources and relating to the experience of affect. In certain situations, one system might dominate the other, but rational and experiential modes of processing operations in parallel and at the same time. As such, anecdotes and quantified facts impact audience response differently and a combination of data and narratives is more effective than either form of evidence. In addition, the present study identifies several media variables and human factors driving the effects of statistics and anecdotes. An integrative model is proposed to explain how message characteristics (modality, vividness, salience, congruency, position) and individual differences (involvement, numeracy skills, cognitive resources, cultural orientation) impact selective exposure, which in turn activates pertinent modes of processing, and thereby induces corresponding responses. The present study represents a step toward bridging theoretical frameworks from various disciplines to better understand the specific effects and the conditions under which the use of anecdotal evidence and/or statistical evidence enhances or undermines information processing. In addition to theoretical contributions, this research helps inform news professionals about the benefits and pitfalls of incorporating quantitative and qualitative accounts in reporting. It proposes a typology of possible scenarios and appropriate strategies for journalists to use when presenting news with anecdotes and numbers.Keywords: data, narrative, number, anecdote, storytelling, news
Procedia PDF Downloads 79555 Serial Position Curves under Compressively Expanding and Contracting Schedules of Presentation
Authors: Priya Varma, Denis John McKeown
Abstract:
Psychological time, unlike physical time, is believed to be ‘compressive’ in the sense that the mental representations of a series of events may be internally arranged with ever decreasing inter-event spacing (looking back from the most recently encoded event). If this is true, the record within immediate memory of recent events is severely temporally distorted. Although this notion of temporal distortion of the memory record is captured within some theoretical accounts of human forgetting, notably temporal distinctiveness accounts, the way in which the fundamental nature of the distortion underpins memory and forgetting broadly is barely recognised or at least directly investigated. Our intention here was to manipulate the spacing of items for recall in order to ‘reverse’ this supposed natural compression within the encoding of the items. In Experiment 1 three schedules of presentation (expanding, contracting and fixed irregular temporal spacing) were created using logarithmic spacing of the words for both free and serial recall conditions. The results of recall of lists of 7 words showed statistically significant benefits of temporal isolation, and more excitingly the contracting word series (which we may think of as reversing the natural compression within the mental representation of the word list) showed best performance. Experiment 2 tested for effects of active verbal rehearsal in the recall task; this reduced but did not remove the benefits of our temporal scheduling manipulation. Finally, a third experiment used the same design but with Chinese characters as memoranda, in a further attempt to subvert possible verbal maintenance of items. One change to the design here was to introduce a probe item following the sequence of items and record response times to this probe. Together the outcomes of the experiments broadly support the notion of temporal compression within immediate memory.Keywords: memory, serial position curves, temporal isolation, temporal schedules
Procedia PDF Downloads 217554 On q-Non-extensive Statistics with Non-Tsallisian Entropy
Authors: Petr Jizba, Jan Korbel
Abstract:
We combine an axiomatics of Rényi with the q-deformed version of Khinchin axioms to obtain a measure of information (i.e., entropy) which accounts both for systems with embedded self-similarity and non-extensivity. We show that the entropy thus obtained is uniquely solved in terms of a one-parameter family of information measures. The ensuing maximal-entropy distribution is phrased in terms of a special function known as the Lambert W-function. We analyze the corresponding ‘high’ and ‘low-temperature’ asymptotics and reveal a non-trivial structure of the parameter space.Keywords: multifractals, Rényi information entropy, THC entropy, MaxEnt, heavy-tailed distributions
Procedia PDF Downloads 443553 Women's Cyber Intimate Partner Violence Victimization
Authors: Mylène Fernet, Geneviève Brodeur, Martine Hébert
Abstract:
Background: The growth of information and communication technologies has led to an increase in the prevalence of cyber intimate partner violence among women in early adulthood. However, there is a lack of research addressing the intervention needs of women who have been victims of cyber intimate partner violence. This qualitative study aimed to identify the knowledge, resources, and tools that women require to better respond to such violence. Methodology: Semi-structured individual interviews and four online discussion groups were conducted with 28 Canadian women aged 18 to 29 who had experienced cyber intimate partner violence by a romantic or intimate partner or an ex-partner. The data were analyzed using thematic analysis. Findings: The key elements identified suggest that women need information to help them recognize the signs and varied forms of cyber intimate partner violence, particularly those that are more nuanced and harder to detect. Furthermore, participants emphasized the importance of having access to both online and offline support to aid in their recovery from cyber intimate partner violence. Additionally, the women's narratives also highlighted their need for resources on how to protect themselves from cyber intimate partner violence. Conclusion: Based on the findings from this study, it is essential to develop prevention and intervention strategies for cyber intimate partner violence that address these knowledge gaps, provide support options, and offer prevention tools tailored to adult women.Keywords: women, cyberviolence, intimate partner violence, prevention strategies
Procedia PDF Downloads 20552 Sorting Fish by Hu Moments
Authors: J. M. Hernández-Ontiveros, E. E. García-Guerrero, E. Inzunza-González, O. R. López-Bonilla
Abstract:
This paper presents the implementation of an algorithm that identifies and accounts different fish species: Catfish, Sea bream, Sawfish, Tilapia, and Totoaba. The main contribution of the method is the fusion of the characteristics of invariance to the position, rotation and scale of the Hu moments, with the proper counting of fish. The identification and counting is performed, from an image under different noise conditions. From the experimental results obtained, it is inferred the potentiality of the proposed algorithm to be applied in different scenarios of aquaculture production.Keywords: counting fish, digital image processing, invariant moments, pattern recognition
Procedia PDF Downloads 408551 Curbing Abuses of Legal Power in the Society
Authors: Tajudeen Ojo Ibraheem
Abstract:
In a world characterized by greed and the lust for power and its attendant trappings, abuse of legal power is nothing new to most of us. Legal abuses of power abound in all fields of human endeavour. Accounts of such abuses dominate the mass media and for the average individual, no single day goes by without his getting to hear about at least one such occurrence. This paper briefly looks at the meaning of legal power, what legal abuse is all about, its causes, and some of its manifestations in the society. Its consequences will also be discussed and some suggestions for reform will be made. In the course of the paper, references will be made to various jurisdictions around the world.Keywords: abuse, legal, power, society
Procedia PDF Downloads 446550 Use of Social Media in Political Communications: Example of Facebook
Authors: Havva Nur Tarakci, Bahar Urhan Torun
Abstract:
The transformation that is seen in every area of life by technology, especially internet technology changes the structure of political communications too. Internet, which is at the top of new communication technologies, affects political communications with its structure in a way that no traditional communication tools ever have and enables interaction and the channel between receiver and sender, and it becomes one of the most effective tools preferred among the political communication applications. This state as a result of technological convergence makes Internet an unobtainable place for political communication campaigns. Political communications, which means every kind of communication strategies that political parties called 'actors of political communications' use with the aim of messaging their opinions and party programmes to their present and potential voters who are a target group for them, is a type of communication that is frequently used also among social media tools at the present day. The electorate consisting of different structures is informed, directed, and managed by social media tools. Political parties easily reach their electorate by these tools without any limitations of both time and place and also are able to take the opinions and reactions of their electorate by the element of interaction that is a feature of social media. In this context, Facebook, which is a place that political parties use in social media at most, is a communication network including in our daily life since 2004. As it is one of the most popular social networks today, it is among the most-visited websites in the global scale. In this way, the research is based on the question, “How do the political parties use Facebook at the campaigns, which they conduct during the election periods, for informing their voters?” and it aims at clarifying the Facebook using practices of the political parties. In direction of this objective the official Facebook accounts of the four political parties (JDP–AKParti, PDP–BDP, RPP-CHP, NMP-MHP), which reach their voters by social media besides other communication tools, are treated, and a frame for the politics of Turkey is formed. The time of examination is constricted with totally two weeks, one week before the mayoral elections and one week after the mayoral elections, when it is supposed that the political parties use their Facebook accounts in full swing. As a research method, the method of content analysis is preferred, and the texts and the visual elements that are gotten are interpreted based on this analysis.Keywords: Facebook, political communications, social media, electrorate
Procedia PDF Downloads 383549 Managing Risks of Civil War: Accounting Practices in Egyptian Households
Authors: Sumohon Matilal, Neveen Abdelrehim
Abstract:
The purpose of this study is to examine the way households manage the risks of civil war, using the calculative practices of accounting as a lens. As is the case with other social phenomena, accounting serves as a conduit for attributing values and rationales to crisis and in the process makes it visible and calculable. Our focus, in particular, is on the dialogue facilitated by the numerical logic of accounting between the householder and a crisis scenario, such as civil war. In other words, we seek to study how the risk of war is rationalized through household budgets, income and expenditure statements etc. and how such accounting constructs in turn shape attitudes toward earnings and spending in a wartime economy. The existing literature on war and accounting demonstrates how an accounting logic can have potentially destabilising consequences and how it is used to legitimise war. However, very few scholars have looked at the way accounting constructs are used to internalise the effects of war in an average household and the behavioural consequences that arise from such accounting. Relatedly, scholars studying household accounting have mostly focussed on the links between gender and hierarchy in relation to managing the financial affairs. Few have focused on the role of household accounts in a crisis scenario. This study intends to fill this gap. We draw upon Egypt, a country in the middle of civil war since 2011 for our purpose. We intend to carry out 15-20 semi-structured interviews with middle income households in Cairo that maintain some form of accounts to study the following issues: 1. How do people internalise the risks of civil war? What kind of accounting constructs do they use (this may take the form of simple budgets, income-expenditure notes/statements on a periodic basis, spreadsheets etc.) 2. How has civil war affected household expenditure? Are people spending more/less than before? 3. How has civil war affected household income? Are people finding it difficult/easy to survive on the pre-war income? 4. How is such accounting affecting household behaviour towards earnings and expenditure? Are families prioritising expenditure on necessities alone? Are they refraining from indulging in luxuries? Are family members doing two or three jobs to cope with difficult times? Are families increasingly turning toward borrowing? Is credit available? From whom?Keywords: risk, accounting, war, crisis
Procedia PDF Downloads 201548 Behavior of Laminated Plates under Mechanical Loading
Authors: Mahmoudi Noureddine
Abstract:
In this study the use of two variable refined plate theories of laminated composite plates to static response of laminated plates. The plate theory accounts for parabolic distribution of the transverse shear strains, and satisfies the zero traction boundary conditions on the surfaces of the plate without using shear correction factor. The validity of the present theory is demonstrated by comparison with solutions available in the literature and finite element method. The result is presented for the static response of simply supported rectangular plates under uniform sinusoidal mechanical loadings.Keywords: bending, composite, laminate, plates, fem
Procedia PDF Downloads 406