Search results for: new creative paradigm
588 The Impact of Artificial Intelligence on Digital Crime
Authors: Á. L. Bendes
Abstract:
By the end of the second decade of the 21st century, artificial intelligence (AI) has become an unavoidable part of everyday life and has necessarily aroused the interest of researchers in almost every field of science. This is no different in the case of jurisprudence, whose main task is not only to create its own theoretical paradigm related to AI. Perhaps the biggest impact on digital crime is artificial intelligence. In addition, the need to create legal frameworks suitable for the future application of the law has a similar importance. The prognosis according to which AI can reshape the practical application of law and, ultimately, the entire legal life is also of considerable importance. In the past, criminal law was basically created to sanction the criminal acts of a person, so the application of its concepts with original content to AI-related violations is not expected to be sufficient in the future. Taking this into account, it is necessary to rethink the basic elements of criminal law, such as the act and factuality, but also, in connection with criminality barriers and criminal sanctions, several new aspects have appeared that challenge both the criminal law researcher and the legislator. It is recommended to continuously monitor technological changes in the field of criminal law as well since it will be timely to re-create both the legal and scientific frameworks to correctly assess the events related to them, which may require a criminal law response. Artificial intelligence has completely reformed the world of digital crime. New crimes have appeared, which the legal systems of many countries do not or do not adequately regulate. It is considered important to investigate and sanction these digital crimes. The primary goal is prevention, for which we need a comprehensive picture of the intertwining of artificial intelligence and digital crimes. The goal is to explore these problems, present them, and create comprehensive proposals that support legal certainty.Keywords: artificial intelligence, chat forums, defamation, international criminal cooperation, social networking, virtual sites
Procedia PDF Downloads 89587 Planning for Sustainability in the Built Environment
Authors: Adedayo Jeremiah Adeyekun, Samuel Oluwagbemiga Ishola
Abstract:
This paper aimed to identify the significance of sustainability in the built environment, the economic and environmental importance to building and construction projects. Sustainability in the built environment has been a key objective of research over the past several decades. Sustainability in the built environment requires reconciliation between economic, environmental and social impacts of design and planning decisions made during the life cycle of a project from inception to termination. Planning for sustainability in the built environment needs us to go beyond our individual disciplines to consider the variety of economic, social and environmental impacts of our decisions in the long term. A decision to build a green residential development in an isolated location may pass some of the test of sustainability through its reduction in stormwater runoff, energy efficiency, and ecological sustainability in the building, but it may fail to be sustainable from a transportation perspective. Sustainability is important to the planning, design, construction, and preservation of the built environment; because it helps these activities reflect multiple values and considerations. In fact, the arts and sciences of the built environment have traditionally integrated values and fostered creative expression, capabilities that can and should lead the sustainability movement as society seeks ways to live in dynamic balance with its own diverse needs and the natural world. This research aimed to capture the state-of-the-art in the development of innovative sustainable design and planning strategies for building and construction projects. Therefore, there is a need for a holistic selection and implication approach for identifying potential sustainable strategies applicable to a particular project and evaluating the overall life cycle impact of each alternative by accounting for different applicable impacts and making the final selection among various viable alternatives.Keywords: sustainability, built environment, planning, design, construction
Procedia PDF Downloads 176586 Appropriation of Cryptocurrencies as a Payment Method by South African Retailers
Authors: Neliswa Dyosi
Abstract:
Purpose - Using an integrated Technology-Organization-Environment (TOE) framework and the model of technology appropriation (MTA) as a theoretical lens, this interpretive qualitative study seeks to understand and explain the factors that influence the appropriation, non-appropriation, and disappropriation of bitcoin as a payment method by South African retailers. Design/methodology/approach –The study adopts the interpretivist philosophical paradigm. Multiple case studies will be adopted as a research strategy. For data collection, the study follows a qualitative approach. Qualitative data will be collected from the six retailers in various industries. Semi-structured interviews and documents will be used as the data collection techniques. Purposive and snowballing sampling techniques will be used to identify participants within the organizations. Data will be analyzed using thematic analysis. Originality/value - Using the deduction approach, the study seeks to provide a descriptive and explanatory contribution to theory. The study contributes to theory development by integrating the MTA and TOE frameworks as a means to understand technology adoption behaviors of organizations, in this case, retailers. This is also the first study that looks at an integrated approach of the Technology-Organization-Environment (TOE) framework and the MTA framework to understand the adoption and use of a payment method. South Africa is ranked amongst the top ten countries in the world on cryptocurrency adoption. There is, however, still a dearth of literature on the current state of adoption and usage of bitcoin as a payment method in South Africa. The study will contribute to the existing literature as bitcoin cryptocurrency is gaining popularity as an alternative payment method across the globe.Keywords: cryptocurrency, bitcoin, payment methods, blockchain, appropriation, online retailers, TOE framework, disappropriation, non-appropriation
Procedia PDF Downloads 136585 Laser Corneoplastique™: A Refractive Surgery for Corneal Scars
Authors: Arun C. Gulani, Aaishwariya A. Gulani, Amanda Southall
Abstract:
Background: Laser Corneoplastique™ as a least interventional, visually promising technique for patients with vision disability from corneal scars of varied causes has been retrospectively reviewed and proves to cause a paradigm shift in mindset and approach towards corneal scars as a Refractive surgery aiming for emmetropic, unaided vision of 20;/20 in most cases. Three decades of work on this technique has been compiled in this 15-year study. Subject and Methods: The objective of this study was to determine the success of Laser Corneoplastique™ surgery as a treatment of corneal scar cases. A survey of corneal scar cases caused by various medical histories that had undergone Laser Corneoplastique™ surgery over the past twenty years by a single surgeon Arun C. Gulani, M.D. were retrospectively reviewed. The details of each of the cases were retrieved from their medical records and analyzed. Each patient had been examined thoroughly at their preoperative appointments for stability of refraction and vision, depth of scar, pachymetry, topography, pattern of the scar and uncorrected and best corrected vision potential, which were all taken into account in the patients' treatment plans. Results: 64 eyes of 53 patients were investigated for scar etiology, keratometry, visual acuity, and complications. There were 25 different etiologies seen, with the most common being a Herpetic scar. The average visual acuity post-op was, on average, 20/23.55 (±7.05). Laser parameters used were depth and pulses. Overall, the mean Laser ablation depth was 30.67 (±19.05), ranging from 2 to 73 µm. Number of Laser pulses averaged 191.85 (±112.02). Conclusion: Refractive Laser Corneoplastique™ surgery, when practiced as an art, can address all levels of ametropia while reversing complex corneas and scars from refractive surgery complications back to 20/20 vision.Keywords: corneal scar, refractive surgery, corneal transplant, laser corneoplastique
Procedia PDF Downloads 189584 A System Dynamics Model for Analyzing Customer Satisfaction in Healthcare Systems
Authors: Mahdi Bastan, Ali Mohammad Ahmadvand, Fatemeh Soltani Khamsehpour
Abstract:
Health organizations’ sustainable development has nowadays become highly affected by customers’ satisfaction due to significant changes made in the business environment of the healthcare system and emerging of Competitiveness paradigm. In case we look at the hospitals and other health organizations as service providers concerning profit issues, the satisfaction of employees as interior customers, and patients as exterior customers would be of significant importance in health business success. Furthermore, satisfaction rate could be considered in performance assessment of healthcare organizations as a perceived quality measure. Several researches have been carried out in identification of effective factors on patients’ satisfaction in health organizations. However, considering a systemic view, the complex causal relations among many components of healthcare system would be an issue that its acquisition and sustainability requires an understanding of the dynamic complexity, an appropriate cognition of different components, and effective relationships among them resulting ultimately in identifying the generative structure of patients’ satisfaction. Hence, the presenting paper applies system dynamics approaches coherently and methodologically to represent the systemic structure of customers’ satisfaction of a health system involving the constituent components and interactions among them. Then, the results of different policies taken on the system are simulated via developing mathematical models, identifying leverage points, and using scenario making technique and then, the best solutions are presented to improve customers’ satisfaction of the services. The presenting approach supports taking advantage of decision support systems. Additionally, relying on understanding of system behavior Dynamics, the effective policies for improving the health system would be recognized.Keywords: customer satisfaction, healthcare, scenario, simulation, system dynamics
Procedia PDF Downloads 415583 A Study on Interaction between Traditional Culture and Modern Womenswear
Authors: Yu-Wei Chu, Marie Aja-Herrera, Denis Antoine, Mengjie Di
Abstract:
The purpose of this paper is to explore the innovative perspective of the local traditional culture of garments from different continents. The relationship between the local culture, the indigenous traditional technique of textile manufacture, and modern womenswear will be investigated. This will include exploring and discussing traditional techniques to create textiles reflecting different cultures and relevant handicrafts, including the history of these different peoples and regions. However, along with the improvement of technology, the diversity of culture is usually unified into a single aesthetic element, which makes fashion lack traditional cultural layers. Local cultural awareness has been gradually emerging in womenswear in recent years with the strong sweep of globalization. The possible loss of traditional art and crafts became an awareness for different cultures, who realized the necessity to protect and preserve their individual uniqueness. Modern womenswear is one of the largest markets in the fashion and apparel marketplace. Therefore, the commonalities of traditional textiles and garments for modern womenswear will be researched. Localized traditional fabrics have some elements, such as weaving techniques and other related crafts, in common with more modern manufacturing methods. In addition, the common point of traditional clothing is the use of draping, construction, and fabric manipulation. This paper aims to explore these factors, as discussed above, and also apply, in an innovative and creative manner, some of these traditional arts and crafts to modern womenswear. The combination of textile manipulation and different construction techniques can support the development of innovative womenswear to include a diversity of aesthetics. The main contribution of the paper is to find out the solution to bring local culture into the formal womenswear market with modern aesthetics to realize the ideal of traditional culture reconstruction.Keywords: traditional culture, modern womenswear, diversity, aesthetics
Procedia PDF Downloads 114582 Panganay-bunso Syndrome: A Contextualized Filipino Concept of Seniority in an Industrial Setting
Authors: Anne Camille P. Balabag, Via B. Cabarda, Ruffa Mae Lomboy, Aira Joyce Nesus
Abstract:
Nowadays, Filipinos seem to dominate the outsourcing industry, one factor that affects quality service is organization mismanagement. Traditionally, Filipino promotions are based on tenure rather than competence. Seniority refers to a superior rank that an employee holds in an industrial setting based on a position withheld in a company. Yet, seniority also holds the paradigm for Filipino family structures. With this, the researchers believe that Filipinos have a deeper take on seniority, which became the motivation for this study. The researchers wanted to contextualize the Filipino concept of seniority, the perception, and reactions of Filipino employees to its existence, and uncover their relevant experiences within the industrial setting. Following a phenomenological research design, data collected from ten (10) participants with various demographic backgrounds, chosen through purposive sampling, and interviewed utilizing a semi-structured interview and analyzed using thematic analysis revealed seven primary themes: (1) Reality of Tenureship and Competence, (2) Disparity in Age Influence, (3) Special Power of Seniority, (4) Seniority is Necessity, (5) The Filipino Organizational Values, (6) Art of Seniority in Human Resource, and (7) Confessions of the Inner Child. The findings suggest that seniority exists based on a ranking system created through human resource management and mirrored from traditional Filipino values. Also, the researchers identified three Filipino industrial values: respect, pakikipagkapwa-tao (treating others as a fellow human being), and utang na loob (debt of gratitude). Lastly, birth order was found to have direct and indirect effects on their conduct in an industrial context.Keywords: organizational psychology, human resource management, filipino psychology, industrial values
Procedia PDF Downloads 122581 A Methodology for the Identification of Technological Gaps and the Measurement of the Level of Technological Acceptance in the Rural Sector in Colombia
Authors: Anyi Katherine Garzon Robles, Luis Carlos Gomez Florez
Abstract:
Since the advent of the Internet, the use of Information Technologies (IT) has increased exponentially. The field of informatics and telecommunications has put on the table countless possibilities for the development of different socio-economic activities, promoting a change of social paradigm and the emergence of the so-called information and knowledge society. For more than a decade, the Colombian government has been working on the incorporation of IT into the public sector through an e-government strategy. However, to date, many technological gaps has not yet been identified in the country to our knowledge, especially in rural areas and far from large cities, where factors such as low investment and the expansion of the armed conflict have led to economic and technological stagnation. This paper presents the research results obtained from the execution of a research project, which was approach from a qualitative approach and a methodological design of a participatory action research type. This design consists of nine fundamental stages divided into four work cycles. For which different strategies for data collection and analysis were established. From which, a methodology was obtained for the identification of technological gaps and the measurement of the level of technological acceptance in the rural sector, based on the TAM (Technology Acceptance Model) model, as a previous activity to the development of IT solutions framed in the e-government strategy in Colombia. The result of this research work represents a contribution from academia for the improvement of the country's technological development and a guide for the proper planning of IT solutions aimed at promoting a close relationship between government and citizens.Keywords: E-government, knowledge society, level of technological acceptance, technological gaps, technology acceptance model
Procedia PDF Downloads 237580 Not ‘Just Danish’: How Young Multiracial Danes Challenge White Hegemony
Authors: Mette Evelyn Bjerre
Abstract:
Nordic Exceptionalism is a racial paradigm that inhibits a critical examination of structural discrimination and the daily experiences of minority-racialised Danes. As a result, the category ethnic-Danish is a White hegemonic construct that limits access for multiracial ethnic Danes irrespective of their multigenerational Danish heritage. An anti-immigrant public discourse and frequent racialisation as ‘other’ in social interactions are part of a boundary-making process that sustains White hegemony and excludes multiracial ethnic Danes from a collective national identity. With an analysis of interview data with 40 multiracial ethnic Danes, this research finds that the understanding of race as a category and the salience of race for multiracial ethnic Danes has changed over time concurrently with demographic changes and a heightened awareness of racialisation processes. The older generation is more likely to conform to White hegemony by trivialising racialised experiences. In contrast, younger multiracial ethnic Danes have the knowledge and cultural capital to challenge Whiteness actively. They do this by claiming their multiracial identity as a crucial part of their Danish identity and acknowledging race as a social fact that impacts their lives. Many young multiracial participants also dispute that the public immigration debate is race-neutral and is active in organisations supporting immigrants and refugees. These findings suggest that young multiracial Danes are uniquely positioned to push public discourse toward a better understanding of how Whiteness is integral to national identity and advocate for a broader Danish identity type that challenges White hegemony and Nordic exceptionalism.Keywords: multiracial Danes, nordic exceptionalism, racial identity, white hegemony
Procedia PDF Downloads 23579 Intrusion Detection in Cloud Computing Using Machine Learning
Authors: Faiza Babur Khan, Sohail Asghar
Abstract:
With an emergence of distributed environment, cloud computing is proving to be the most stimulating computing paradigm shift in computer technology, resulting in spectacular expansion in IT industry. Many companies have augmented their technical infrastructure by adopting cloud resource sharing architecture. Cloud computing has opened doors to unlimited opportunities from application to platform availability, expandable storage and provision of computing environment. However, from a security viewpoint, an added risk level is introduced from clouds, weakening the protection mechanisms, and hardening the availability of privacy, data security and on demand service. Issues of trust, confidentiality, and integrity are elevated due to multitenant resource sharing architecture of cloud. Trust or reliability of cloud refers to its capability of providing the needed services precisely and unfailingly. Confidentiality is the ability of the architecture to ensure authorization of the relevant party to access its private data. It also guarantees integrity to protect the data from being fabricated by an unauthorized user. So in order to assure provision of secured cloud, a roadmap or model is obligatory to analyze a security problem, design mitigation strategies, and evaluate solutions. The aim of the paper is twofold; first to enlighten the factors which make cloud security critical along with alleviation strategies and secondly to propose an intrusion detection model that identifies the attackers in a preventive way using machine learning Random Forest classifier with an accuracy of 99.8%. This model uses less number of features. A comparison with other classifiers is also presented.Keywords: cloud security, threats, machine learning, random forest, classification
Procedia PDF Downloads 320578 When Digital Innovation Augments Cultural Heritage: An Innovation from Tradition Story
Authors: Danilo Pesce, Emilio Paolucci, Mariolina Affatato
Abstract:
Looking at the future and at the post-digital era, innovations commonly tend to dismiss the old and replace it with the new. The aim of this research is to study the role that digital innovation can play alongside the information chain within the traditional sectors and the subsequent value creation opportunities that actors and stakeholders can exploit. By drawing on a wide body of literature on innovation and strategic management and by conducting a case study on the cultural heritage industry, namely Google Arts & Culture, this study shows that technology augments complements, and amplifies the way people experience their cultural interests and experience. Furthermore, the study shows a process of democratization of art since museums can exploit new digital and virtual ways to distribute art globally. Moreover, new needs arose from the 2020 pandemic that hit and forced the world to a state of cultural fasting and caused a radical transformation of the paradigm online vs. onsite. Finally, the study highlights the capabilities that are emerging at different stages of the value chain, owing to the technological innovation available in the market. In essence, this research underlines the role of Google in allowing museums to reach users worldwide, thus unlocking new mechanisms of value creation in the cultural heritage industry. Likewise, this study points out how Google provides value to users by means of increasing the provision of artworks, improving the audience engagement and virtual experience, and providing new ways to access the online contents. The paper ends with a discussion of managerial and policy-making implications.Keywords: big data, digital platforms, digital transformation, digitization, Google Arts and Culture, stakeholders’ interests
Procedia PDF Downloads 157577 Data-Driven Simulations Tools for Der and Battery Rich Power Grids
Authors: Ali Moradiamani, Samaneh Sadat Sajjadi, Mahdi Jalili
Abstract:
Power system analysis has been a major research topic in the generation and distribution sections, in both industry and academia, for a long time. Several load flow and fault analysis scenarios have been normally performed to study the performance of different parts of the grid in the context of, for example, voltage and frequency control. Software tools, such as PSCAD, PSSE, and PowerFactory DIgSILENT, have been developed to perform these analyses accurately. Distribution grid had been the passive part of the grid and had been known as the grid of consumers. However, a significant paradigm shift has happened with the emergence of Distributed Energy Resources (DERs) in the distribution level. It means that the concept of power system analysis needs to be extended to the distribution grid, especially considering self sufficient technologies such as microgrids. Compared to the generation and transmission levels, the distribution level includes significantly more generation/consumption nodes thanks to PV rooftop solar generation and battery energy storage systems. In addition, different consumption profile is expected from household residents resulting in a diverse set of scenarios. Emergence of electric vehicles will absolutely make the environment more complicated considering their charging (and possibly discharging) requirements. These complexities, as well as the large size of distribution grids, create challenges for the available power system analysis software. In this paper, we study the requirements of simulation tools in the distribution grid and how data-driven algorithms are required to increase the accuracy of the simulation results.Keywords: smart grids, distributed energy resources, electric vehicles, battery storage systsms, simulation tools
Procedia PDF Downloads 103576 The Priming Effect of Morphology, Phonology, Semantics, and Orthography in Mandarin Chinese: A Prime Paradigm Study
Authors: Bingqing Xu, Wenxing Shuai
Abstract:
This study investigates the priming effects of different Chinese compound words by native Mandarin speakers. There are lots of homonym, polysemy, and synonym in Chinese. However, it is unclear which kind of words have the biggest priming effect. Native Mandarin speakers were tested in a visual-word lexical decision experiment. The stimuli, which are all two-character compound words, consisted of two parts: primes and targets. Five types of relationships were used in all stimuli: morphologically related condition, in which the prime and the target contain the same morpheme; orthographically related condition, in which the target and the prime contain the different morpheme with the same form; phonologically related condition, in which the target and the prime contain the different morpheme with the same phonology; semantically related condition, in which the target and the prime contain the different morpheme with similar meanings; totally unrelated condition. The time since participants saw the target to respond was recorded. Analyses on reaction time showed that the average reaction time of morphologically related targets was much shorter than others, suggesting the morphological priming effect is the biggest. However, the reaction time of the phonologically related conditions was the longest, even longer than unrelated conditions. According to scatter plots analyses, 86.7% of participants had priming effects in morphologically related conditions, only 20% of participants had priming effects in phonologically related conditions. These results suggested that morphologically related conditions had the biggest priming effect. The orthographically and semantically related conditions also had priming effects, whereas the phonologically related conditions had few priming effects.Keywords: priming effect, morphology, phonology, semantics, orthography
Procedia PDF Downloads 146575 Development of Medical Intelligent Process Model Using Ontology Based Technique
Authors: Emmanuel Chibuogu Asogwa, Tochukwu Sunday Belonwu
Abstract:
An urgent demand for creative solutions has been created by the rapid expansion of medical knowledge, the complexity of patient care, and the requirement for more precise decision-making. As a solution to this problem, the creation of a Medical Intelligent Process Model (MIPM) utilizing ontology-based appears as a promising way to overcome this obstacle and unleash the full potential of healthcare systems. The development of a Medical Intelligent Process Model (MIPM) using ontology-based techniques is motivated by a lack of quick access to relevant medical information and advanced tools for treatment planning and clinical decision-making, which ontology-based techniques can provide. The aim of this work is to develop a structured and knowledge-driven framework that leverages ontology, a formal representation of domain knowledge, to enhance various aspects of healthcare. Object-Oriented Analysis and Design Methodology (OOADM) were adopted in the design of the system as we desired to build a usable and evolvable application. For effective implementation of this work, we used the following materials/methods/tools: the medical dataset for the test of our model in this work was obtained from Kaggle. The ontology-based technique was used with Confusion Matrix, MySQL, Python, Hypertext Markup Language (HTML), Hypertext Preprocessor (PHP), Cascaded Style Sheet (CSS), JavaScript, Dreamweaver, and Fireworks. According to test results on the new system using Confusion Matrix, both the accuracy and overall effectiveness of the medical intelligent process significantly improved by 20% compared to the previous system. Therefore, using the model is recommended for healthcare professionals.Keywords: ontology-based, model, database, OOADM, healthcare
Procedia PDF Downloads 78574 Examining the Notion of Duality: The Interaction between Neo-Academicism and University Teachers' Agency within the Performativity Context Defined by Public Managerialism
Authors: Tien Hui Chiang
Abstract:
Along with the predominant influence of neo-liberalism, public managerialism is viewed as a panacea for curing the institutionalized weakness caused by the monopoly of the public sector. In the name of efficiency, its outcome-led approach acquires a legitimate status and, in turn, it transforms into the discourse of performativity, reformulating the souls of individual members into the form of docile bodies who are willing to demonstrate their own ability in organizational contributions. The evaluation system and the organizational reconstruction are viewed as the crucial means for achieving this mission. Inevitably, university teachers are confined within a rigid and bureaucratic setting, in which they do not have too much latitude but are subject to the commands of senior administrators. However, the notion of duality highlights the interaction between structural constraints and agency. If the actor discovers the rules or properties of social structure, he/she is able to transform structural constraints into resources for developing creative actions, conceptualized as an agency. This study was designed for examining how duality operates within this hierarchical arrangement formed by public managerialism. Fourteen informants were interviewed from February to August 2014. The findings show that the evaluation system created the culture of neo-academicalism, addressing excellence in research and, in turn, motivating academic-oriented teachers. This correspondence provided a gateway for them to win honor, dignity, and prestige in groups. However, unlike the concept of duality, this agency was operating within the institutionalized context, regulated by structural constraint. Furthermore, complying with the rule/property of social structure was able to secure their advantages.Keywords: public managerialism, social discourse, neo-academicalism, duality, structural constraint, agency
Procedia PDF Downloads 237573 Exploring the Role of Data Mining in Crime Classification: A Systematic Literature Review
Authors: Faisal Muhibuddin, Ani Dijah Rahajoe
Abstract:
This in-depth exploration, through a systematic literature review, scrutinizes the nuanced role of data mining in the classification of criminal activities. The research focuses on investigating various methodological aspects and recent developments in leveraging data mining techniques to enhance the effectiveness and precision of crime categorization. Commencing with an exposition of the foundational concepts of crime classification and its evolutionary dynamics, this study details the paradigm shift from conventional methods towards approaches supported by data mining, addressing the challenges and complexities inherent in the modern crime landscape. Specifically, the research delves into various data mining techniques, including K-means clustering, Naïve Bayes, K-nearest neighbour, and clustering methods. A comprehensive review of the strengths and limitations of each technique provides insights into their respective contributions to improving crime classification models. The integration of diverse data sources takes centre stage in this research. A detailed analysis explores how the amalgamation of structured data (such as criminal records) and unstructured data (such as social media) can offer a holistic understanding of crime, enriching classification models with more profound insights. Furthermore, the study explores the temporal implications in crime classification, emphasizing the significance of considering temporal factors to comprehend long-term trends and seasonality. The availability of real-time data is also elucidated as a crucial element in enhancing responsiveness and accuracy in crime classification.Keywords: data mining, classification algorithm, naïve bayes, k-means clustering, k-nearest neigbhor, crime, data analysis, sistematic literature review
Procedia PDF Downloads 64572 Challenging Perceptions of Disability: Exploring the Link between Ableism, Social Stigma, Vision Impairment, and Autism Spectrum Disorder
Authors: Aikaterini Tavoulari
Abstract:
This research aims to address the types of repetitive behaviours (RBs) observed by adults in children with vision impairment (VI) or autism spectrum disorder (ASD), the explanations the adults employ to interpret these behaviours, and the impact RBs have on the child, the caregiver, the professional and society. The underlying reason for this is an attempt to discover any potential differences between two different disabilities in a comparative fashion. The study is based on the interpretivism paradigm and follows a qualitative approach. A comparative case study design based on the ecological systems theory (EST) is adopted. Thirty-five caregivers and accredited professionals were recruited (17 for the VI group, out of whom 8 were caregivers and 9 were professionals, and 18 for the ASD group, out of whom 9 were caregivers and 9 were professionals). Following the completion of a pilot study, all participants were interviewed regarding one specific child – their own child/student – via semi-structured interviews. During the interviews, the researcher used a research diary as a methodological tool and video elicitation as a facilitation tool. A cross-case analysis was conducted, and data were analysed according to the method of thematic analysis. A link has been indicated between VI and ASD, which concerns perceptions about the socially constructed manner in which an RB is perceived. ASD is perceived by the participants as a disability with challenging characteristics, such as an RB. The ASD group perceived RB as linked to ableism, social stigmatisation, and taboo, in contrast to VI, where the existence of RB seems to be a consequence of sensory loss. Bi-directionality of EST seems to have been lost completely, and the macrosystem seems to drive the interactions between the ecological systems.Keywords: ableism, social stigma, disability, repetitive behaviour, vision impairment, autism spectrum disorder, perceptions
Procedia PDF Downloads 90571 An Increase in Glucose Uptake per se is Insufficient to Induce Oxidative Stress and Vascular Endothelial Cell Dysfunction
Authors: Heba Khader, Victor Solodushko, Brian Fouty
Abstract:
Hyperglycemia is a hallmark of uncontrolled diabetes and causes vascular endothelial dysfunction. An increase in glucose uptake and metabolism by vascular endothelial cells is the presumed trigger for this hyperglycemia-induced dysfunction. Glucose uptake into vascular endothelial cells is mediated largely by Glut-1. Glut-1 is an equilibrative glucose transporter with a Km value of 2 mM. At physiologic glucose concentrations, Glut-1 is almost saturated and, therefore, increasing glucose concentration does not increase glucose uptake unless Glut-1 is upregulated. However, hyperglycemia downregulates Glut-1 and decreases rather than increases glucose uptake in vascular endothelial cells. This apparent discrepancy necessitates further study on the effect of increasing glucose uptake on the oxidative state and function of vascular endothelial cells. To test this, a Tet-on system was generated to conditionally regulate Glut-1 expression in endothelial cells by the addition and removal of doxycycline. Glut-1 overexpression was confirmed by Western blot and radiolabeled glucose uptake measurements. Upregulation of Glut-1 resulted in a 4-fold increase in glucose uptake into endothelial cells as determined by 3H deoxy-D-glucose uptake. Increased glucose uptake through Glut-1 did not induce an oxidative stress nor did it cause endothelial dysfunction in rat pulmonary microvascular endothelial cells determined by monolayer resistance, cell proliferation or advanced glycation end product formation. Increased glucose uptake through Glut-1did not lead to an increase in glucose metabolism, due in part to inhibition of hexokinase in Glut-1 overexpressing cells. In summary, this study demonstrates that increasing glucose uptake and intracellular glucose by overexpression of Glut-1 does not alter the oxidative state of rat pulmonary microvascular endothelial cells or cause endothelial cell dysfunction. These results conflict with the current paradigm that hyperglycemia leads to oxidative stress and endothelial dysfunction in vascular endothelial cells through an increase in glucose uptake.Keywords: endothelial cells, glucose uptake, Glut1, hyperglycemia
Procedia PDF Downloads 340570 User Authentication Using Graphical Password with Sound Signature
Authors: Devi Srinivas, K. Sindhuja
Abstract:
This paper presents architecture to improve surveillance applications based on the usage of the service oriented paradigm, with smart phones as user terminals, allowing application dynamic composition and increasing the flexibility of the system. According to the result of moving object detection research on video sequences, the movement of the people is tracked using video surveillance. The moving object is identified using the image subtraction method. The background image is subtracted from the foreground image, from that the moving object is derived. So the Background subtraction algorithm and the threshold value is calculated to find the moving image by using background subtraction algorithm the moving frame is identified. Then, by the threshold value the movement of the frame is identified and tracked. Hence, the movement of the object is identified accurately. This paper deals with low-cost intelligent mobile phone-based wireless video surveillance solution using moving object recognition technology. The proposed solution can be useful in various security systems and environmental surveillance. The fundamental rule of moving object detecting is given in the paper, then, a self-adaptive background representation that can update automatically and timely to adapt to the slow and slight changes of normal surroundings is detailed. While the subtraction of the present captured image and the background reaches a certain threshold, a moving object is measured to be in the current view, and the mobile phone will automatically notify the central control unit or the user through SMS (Short Message System). The main advantage of this system is when an unknown image is captured by the system it will alert the user automatically by sending an SMS to user’s mobile.Keywords: security, graphical password, persuasive cued click points
Procedia PDF Downloads 537569 A Case Study Using Sounds Write and The Writing Revolution to Support Students with Literacy Difficulties
Authors: Emilie Zimet
Abstract:
During our department meetings for teachers of children with learning disabilities and difficulties, we often discuss the best practices for supporting students who come to school with literacy difficulties. After completing Sounds Write and Writing Revolution courses, it seems there is a possibility to link approaches and still maintain fidelity to a program and provide individualised instruction to support students with such difficulties and disabilities. In this case study, the researcher has been focussing on how best to use the knowledge acquired to provide quality intervention that targets the varied areas of challenge that students require support in. Students present to school with a variety of co-occurring reading and writing deficits and with complementary approaches, such as The Writing Revolution and Sounds Write, it is possible to support students to improve their fundamental skills in these key areas. Over the next twelve weeks, the researcher will collect data on current students with whom this approach will be trialled and then compare growth with students from last year who received support using Sounds-Write only. Maintaining fidelity may be a potential challenge as each approach has been tested in a specific format for best results. The aim of this study is to determine if approaches can be combined, so the implementation will need to incorporate elements of both reading (from Sounds Write) and writing (from The Writing Revolution). A further challenge is the time length of each session (25 minutes), so the researcher will need to be creative in the use of time to ensure both writing and reading are targeted while ensuring the programs are implemented. The implementation will be documented using student work samples and planning documents. This work will include a display of findings using student learning samples to demonstrate the importance of co-targeting the reading and writing challenges students come to school with.Keywords: literacy difficulties, intervention, individual differences, methods of provision
Procedia PDF Downloads 54568 Saponins vs Anthraquinones: Different Chemicals, Similar Ecological Roles in Marine Symbioses
Authors: Guillaume Caulier, Lola Brasseur, Patrick Flammang, Pascal Gerbaux, Igor Eeckhaut
Abstract:
Saponins and quinones are two major groups of secondary metabolites widely distributed in the biosphere. More specifically, triterpenoid saponins and anthraquinones are mainly found in a wide variety of plants, bacteria and fungi. In the animal kingdom, these natural organic compounds are rare and only found in small quantities in arthropods, marine sponges and echinoderms. In this last group, triterpenoid saponins are specific to holothuroids (sea cucumbers) while anthraquinones are the chemical signature of crinoids (feather stars). Depending on the species, they present different molecular cocktails. Despite presenting different chemical properties, these molecules share numerous similarities. This study compares the biological distribution, the pharmacological effects and the ecological roles of holothuroid saponins and crinoid anthraquinones. Both of them have been defined as allomones repelling predators and parasites (i.e. chemical defense) and have interesting pharmacological properties (e.g. anti-bacterial, anti-fungal, anti-cancer). Our study investigates the chemical ecology of two symbiotic associations models; between the snapping shrimp Synalpheus stimpsonii associated with crinoids and the Harlequin crab Lissocarcinus orbicularis associated with holothuroids. Using behavioral experiments in olfactometers, chemical extractions and mass spectrometry analyses, we discovered that saponins and anthraquinones present a second ecological role: the attraction of obligatory symbionts towards their hosts. They can, therefore, be defined as kairomones. This highlights a new paradigm in marine chemical ecology: Chemical repellents are attractants to obligatory symbionts because they constitute host specific chemical signatures.Keywords: anthraquinones, kairomones, marine symbiosis, saponins, attractant
Procedia PDF Downloads 199567 Challenging Barriers to the Evolution of the Saudi Animation Industry Life-Cycle
Authors: Ohud Alharbi, Emily Baines
Abstract:
The animation industry is one of the creative industries that have attracted recent historiographical attention. However, there has been very limited research on Saudi Arabian and wider Arabian animation industries, while there are a large number of studies that have covered this issue for North America, Europe and East Asia. The existing studies show that developed countries such as USA, Japan and the UK have reached the Maturity stage in their animation industry life-cycle. On the other hand, developing countries that are still in the Introduction phase of the industry life-cycle face challenges to improve their industry. Saudi Arabia is one of the countries whose animation industry is still in its infancy. Thus, the aim of this paper is to address the main barriers that hinder the evolution of the industry life-cycle for Saudi animation – challenges that are also relevant to many other early stage industries in developing countries. These barriers have been analysed using the early mobility barriers defined by Porter, to provide a conceptual structure for defining recommendations to enable the transition to a strong Growth phase industry. This study utilized qualitative methods to collect data, which involved in-depth interviews, document analysis and observations. It also undertook a comparative case study approach to investigate the animation industry life-cycle, with three selected case studies that have a more developed industry than Saudi animation. Case studies include: the United Kingdom, which represents a Mature animation industry; Egypt, which represents an established Growth stage industry; and the United Arab of Emirates, which is an early Growth stage industry. This study suggests adopting appropriate strategies that arise as findings from the comparative case studies, to overcome barriers and facilitate the growth of the Saudi animation industry.Keywords: barriers, industry life-cycle, Saudi animation, industry
Procedia PDF Downloads 578566 Invisible and Visible Helpers in Negotiating Child Parenting by Single Mothers: A Comparative Analysis of South Africa and Germany
Authors: Maud Mthembu, Tanusha Raniga, Michael Boecker
Abstract:
In South Africa and Germany, countless number of children are raised by single mothers with little or no support from the biological fathers. As evidenced in literature, having an involved father living at home can have a positive influence in the life of a child and the mother can be supported in her role. Often single parenting is seen as a causative factor in numerous psychological and social challenges which are faced by children from single-parent households, which is an indication of a pathological lens of viewing single parenting. The empirical data from our study reveals that single mothers in formal employment experience social, economic and emotional hardships of parenting. However, a sense of determination to raise healthy and well-balanced children using economic and social capital accessible to them was one of the key findings. The participants reported visible and invisible sources of support which creates an enabling environment for them to negotiate the challenges of parenting without support from non-residence fathers. Using a qualitative paradigm, a total of twenty professional single mothers were interviewed in Germany and South Africa. Four key themes emerged from the data analysis namely; internal locus of control, positive new experiences, access to economic capital and dependable social support. This study suggests that single mothers who are economically self-reliant and have access to bonding social capital are able to cope with the demands of single parenting. Understanding this multi-dimensional experience of parenting by single parents in formal employment is important to advocate for supportive working conditions for mothers.Keywords: child parenting, child protection, single parenting, social capital
Procedia PDF Downloads 154565 The Use of Mobile Phone as Enhancement to Mark Multiple Choice Objectives English Grammar and Literature Examination: An Exploratory Case Study of Preliminary National Diploma Students, Abdu Gusau Polytechnic, Talata Mafara, Zamfara State, Nigeria
Authors: T. Abdulkadir
Abstract:
Most often, marking and assessment of multiple choice kinds of examinations have been opined by many as a cumbersome and herculean task to accomplished manually in Nigeria. Usually this may be in obvious nexus to the fact that mass numbers of candidates were known to take the same examination simultaneously. Eventually, marking such a mammoth number of booklets dared and dread even the fastest paid examiners who often undertake the job with the resulting consequences of stress and boredom. This paper explores the evolution, as well as the set aim to envision and transcend marking the Multiple Choice Objectives- type examination into a thing of creative recreation, or perhaps a more relaxing activity via the use of the mobile phone. A more “pragmatic” dimension method was employed to achieve this work, rather than the formal “in-depth research” based approach due to the “novelty” of the mobile-smartphone e-Marking Scheme discovery. Moreover, being an evolutionary scheme, no recent academic work shares a direct same topic concept with the ‘use of cell phone as an e-marking technique’ was found online; thus, the dearth of even miscellaneous citations in this work. Additional future advancements are what steered the anticipatory motive of this paper which laid the fundamental proposition. However, the paper introduces for the first time the concept of mobile-smart phone e-marking, the steps to achieve it, as well as the merits and demerits of the technique all spelt out in the subsequent pages.Keywords: cell phone, e-marking scheme (eMS), mobile phone, mobile-smart phone, multiple choice objectives (MCO), smartphone
Procedia PDF Downloads 259564 Mobile Crowdsensing Scheme by Predicting Vehicle Mobility Using Deep Learning Algorithm
Authors: Monojit Manna, Arpan Adhikary
Abstract:
In Mobile cloud sensing across the globe, an emerging paradigm is selected by the user to compute sensing tasks. In urban cities current days, Mobile vehicles are adapted to perform the task of data sensing and data collection for universality and mobility. In this work, we focused on the optimality and mobile nodes that can be selected in order to collect the maximum amount of data from urban areas and fulfill the required data in the future period within a couple of minutes. We map out the requirement of the vehicle to configure the maximum data optimization problem and budget. The Application implementation is basically set up to generalize a realistic online platform in which real-time vehicles are moving apparently in a continuous manner. The data center has the authority to select a set of vehicles immediately. A deep learning-based scheme with the help of mobile vehicles (DLMV) will be proposed to collect sensing data from the urban environment. From the future time perspective, this work proposed a deep learning-based offline algorithm to predict mobility. Therefore, we proposed a greedy approach applying an online algorithm step into a subset of vehicles for an NP-complete problem with a limited budget. Real dataset experimental extensive evaluations are conducted for the real mobility dataset in Rome. The result of the experiment not only fulfills the efficiency of our proposed solution but also proves the validity of DLMV and improves the quantity of collecting the sensing data compared with other algorithms.Keywords: mobile crowdsensing, deep learning, vehicle recruitment, sensing coverage, data collection
Procedia PDF Downloads 77563 Guidelines for Sustainable Urban Mobility in Historic Districts from International Experiences
Authors: Tamer ElSerafi
Abstract:
In recent approaches to heritage conservation, the whole context of historic areas becomes as important as the single historic building. This makes the provision of infrastructure and network of mobility an effective element in the urban conservation. Sustainable urban conservation projects consider the high density of activities, the need for a good quality access system to the transit system, and the importance of the configuration of the mobility network by identifying the best way to connect the different districts of the urban area through a complex unique system that helps the synergic development to achieve a sustainable mobility system. A sustainable urban mobility is a key factor in maintaining the integrity between socio-cultural aspects and functional aspects. This paper illustrates the mobility aspects, mobility problems in historic districts, and the needs of the mobility systems in the first part. The second part is a practical analysis for different mobility plans. It is challenging to find innovative and creative conservation solutions fitting modern uses and needs without risking the loss of inherited built resources. Urban mobility management is becoming an essential and challenging issue in the urban conservation projects. Depending on literature review and practical analysis, this paper tries to define and clarify the guidelines for mobility management in historic districts as a key element in sustainability of urban conservation and development projects. Such rules and principles could control the conflict between the socio–cultural and economic activities, and the different needs for mobility in these districts in a sustainable way. The practical analysis includes a comparison between mobility plans which have been implemented in four different cities; Freiburg in Germany, Zurich in Switzerland and Bray Town in Ireland. This paper concludes with a matrix of guidelines that considers both principles of sustainability and livability factors in urban historic districts.Keywords: sustainable mobility, urban mobility, mobility management, historic districts
Procedia PDF Downloads 158562 Indigeneity of Transgender Cultures: Traditional Knowledge and Appropriation
Authors: Priyanka Sinnarkar
Abstract:
The appropriation of traditional knowledge has already deprived vast indigenous communities of material benefits. One such industry in India responsible for the extensive exploitation of the indigenous communities is Bollywood or the film industry. Indigenous communities are usually marginalized and exploited, whilst the beneficiary is always the third part. Transgender culture in India dates back to 400 AD with a precise description in the Kama Sutra. Since then, with escalating evolution in governance, the community lost its glory and was criminalized until late 2014. However, the traditional knowledge and cultural practices never diminished. The formation of cults (gharanas) and peculiar folklore has remained in place. This study is intended to highlight the culture of the hijra gharanas and their contribution to intangible cultural heritage. Whilst adhering to the norms of the United Nations pertaining to traditional knowledge and indigenous communities, these papers focuses on the fact that one of the most marginalized and ostracized communities in India treasures a huge amount of rituals and practices that are appropriated by the film industry, leaving the transgender community to indulge into odd jobs and commercial sex work leading to poverty and illiteracy. A comparison between caste reservations and no reservation for this community will bring to light the lacuna in the democratic system. Also, through empirical findings, it can be inferred that a creative sector of the society is not properly exploited to its complete potential, thereby restricting a good contribution to intellectual property. It is important to state that the roots of this problem are not in modern practices. Thus an etymological analysis from mythology to the present will help understand that appropriate application of human rights in this segment will be useful to render justice to this community and thereby recognize the IP that has been succumbed since ages.Keywords: indigenous, intellectual property, traditional knowedge, transgender
Procedia PDF Downloads 123561 From the Sharing Economy to Social Manufacturing: Analyzing Collaborative Service Networks in the Manufacturing Domain
Authors: Babak Mohajeri
Abstract:
In recent years, the conventional business model of ownership has been changed towards accessibility in a variety of markets. Two trends can be observed in the evolution of this rental-like business model. Firstly, the technological development that enables the emergence of new business models. These new business models increasingly become agile and flexible. For example Spotify, an online music stream company provides consumers access to over millions of music tracks, conveniently through the smartphone, tablet or computer. Similarly, Car2Go, the car sharing company accesses its members with flexible and nearby sharing cars. The second trend is the increasing communication and connections via social networks. This trend enables a shift to peer-to-peer accessibility based business models. Conventionally, companies provide access for their customers to own companies products or services. In peer-to-peer model, nonetheless, companies facilitate access and connection across their customers to use other customers owned property or skills, competencies or services .The is so-called the sharing economy business model. The aim of this study is to investigate into a new and emerging type of the sharing economy model in which role of customers and service providers may dramatically change. This new model is called Collaborative Service Networks. We propose a mechanism for Collaborative Service Networks business model. Uber and Airbnb, two successful growing companies, have been selected for our case studies and their business models are analyzed. Finally, we study the emergence of the collaborative service networks in the manufacturing domain. Our finding results to a new manufacturing paradigm called social manufacturing.Keywords: sharing economy, collaborative service networks, social manufacturing, manufacturing development
Procedia PDF Downloads 317560 Entrepreneurship And Heritage Tourism: Identifying Opportunities Around Tsodilo Hills World Heritage Site
Authors: O. Nthoi-Molefe, V. Makwinja
Abstract:
In the North West district of Botswana, Heritage tourism has the potential to offer tremendous economic and social opportunities for local communities in terms of supporting Tourism product development and entrepreneurship. This paper Identifies that Cultural Heritage Entrepreneur brings to the market goods and services, organizes and runs cultural heritage in a commercial or non-profit manner depending on characteristics of cultural resources identified. Data was collected through a series of focus group discussions that included sixteen village community members within the region. Data collected was transcribed and then further analyzed thematically to bring forward results to be analysed. Using Tsodilo Hills World Heritage Site as a case study, the researchers acknowledged that Cultural Heritage Entrepreneurs in that area should use a creative approach in order toidentify suitable solutions for financing different tourism activities starting with sponsored events, grant funds, donations, including the benefits of financial opportunities brough be foreign visitors and domestic tourists alike. The researchers also identified a need for specialized training for the identified entrepreneurs in order to maintain quality services of tourism products and sites (interpretation), information for tourists, visitation services, diversification, and upgrading of the heritage experience. The research reveals that the identified Cultural Heritage Entrepreneurs prefer economic motivation, exploitation over the cultural value of their resources, further calling for recommendations of the research that emphasize on the need for detailed training on how to valorize their cultural resources for the growth of Tourism in the area.Keywords: education, community development, entrepreneurship, cultural tourism
Procedia PDF Downloads 159559 Cybersecurity Challenges in the Era of Open Banking
Authors: Krish Batra
Abstract:
The advent of open banking has revolutionized the financial services industry by fostering innovation, enhancing customer experience, and promoting competition. However, this paradigm shift towards more open and interconnected banking ecosystems has introduced complex cybersecurity challenges. This research paper delves into the multifaceted cybersecurity landscape of open banking, highlighting the vulnerabilities and threats inherent in sharing financial data across a network of banks and third-party providers. Through a detailed analysis of recent data breaches, phishing attacks, and other cyber incidents, the paper assesses the current state of cybersecurity within the open banking framework. It examines the effectiveness of existing security measures, such as encryption, API security protocols, and authentication mechanisms, in protecting sensitive financial information. Furthermore, the paper explores the regulatory response to these challenges, including the implementation of standards such as PSD2 in Europe and similar initiatives globally. By identifying gaps in current cybersecurity practices, the research aims to propose a set of robust, forward-looking strategies that can enhance the security and resilience of open banking systems. This includes recommendations for banks, third-party providers, regulators, and consumers on how to mitigate risks and ensure a secure open banking environment. The ultimate goal is to provide stakeholders with a comprehensive understanding of the cybersecurity implications of open banking and to outline actionable steps for safeguarding the financial ecosystem in an increasingly interconnected world.Keywords: open banking, financial services industry, cybersecurity challenges, data breaches, phishing attacks, encryption, API security protocols, authentication mechanisms, regulatory response, PSD2, cybersecurity practices
Procedia PDF Downloads 60