Search results for: ritual and identity
637 Guidelines for the Development of Community Classroom for Research and Academic Services in Ranong Province
Authors: Jenjira Chinnawong, Phusit Phukamchanoad
Abstract:
The objective of this study is to explore the guidelines for the development of community classroom for research and academic services in Ranong province. By interviewing leaders involved in the development of learning resources, research, and community services, it was found that the leaders' perceptions in the development of learning resources, research, and community services in Ranong, was at the highest level. They perceived at every step on policies of community classroom implementation, research, and community services in Ranong. Leaders' perceptions were at the moderate level in terms of analysis of problems related to procedures of community classroom management, research and community services in Ranong especially in the planning and implementation of the examination, improvement, and development of learning sources to be in good condition and ready to serve the visitors. Their participation in the development of community classroom, research, and community services in Ranong was at a high level, particularly in the participation in monitoring and evaluation of the development of learning resources as well as in reporting on the result of the development of learning resources. The most important thing in the development of community classroom, research and community services in Ranong is the necessity to integrate the three principles of knowledge building in teaching, research and academic services in order to create the identity of the local and community classroom for those who are interested to visit to learn more about the useful knowledge. As a result, community classroom, research, and community services were well-known both inside and outside the university.Keywords: community classroom, learning resources, development, participation
Procedia PDF Downloads 158636 Challenges and Opportunities of Intercultural Communication in Afghanistan
Authors: Kefayatullah Wahidi
Abstract:
This article examines the challenges and opportunities of intercultural communication in Afghanistan. Afghanistan, with its ancient history and location on the Silk Road, connects the great civilizations of the world. This country holds a sensitive strategic and geopolitical position in the Middle East. In Afghanistan, various ethnic groups live, each with distinct linguistic, religious, and racial cultures. In today's world, elements such as identity, religion, and culture form the main components of international political relations. In some cases, these factors can even overshadow the materialistic and self-interest-driven aspects of international relations. Therefore, we used a qualitative case study method (using interviews) for this research. In this context, we attempted to discuss the issues and problems related to the challenges and opportunities of intercultural communication, with the participation of a sample of 12 Afghan people. The findings of this research show that Afghanistan is facing many challenges in the field of intercultural communication. Cultural dissatisfaction, linguistic and religious differences, and cultural sanctions are among the major challenges that can cause tensions and a lack of mutual understanding. At the same time, intercultural communication is an opportunity to increase mutual understanding, cultural exchange, and constructive interactions. Please note that I have made some minor edits for clarity and grammar, but the overall content remains the same.Keywords: cultural dissatisfactions, language differences, intercultural communication, Afghanistan
Procedia PDF Downloads 44635 A Morphological Analysis of Swardspeak in the Philippines
Authors: Carlo Gadingan
Abstract:
Swardspeak, as a language, highlights the exclusive identity of the Filipino gay men and the oppression they are confronted in the society. This paper presents a morphological analysis of swardspeak in the Philippines. Specifically, it aims to find out the common morphological processes involved in the construction of codes that may unmask the nature of swardspeak as a language. 30 purposively selected expert users of swardspeak from Luzon, Visayas, and Mindanao were asked to codify 30 natural words through the Facebook Messenger application. The results of the structural analysis affirm that swardspeak follows no specific rules revealing complicated combinations of clipping/stylized clipping, borrowing, connotation through images, connotation through actions, connotation through sounds, affixation, repetition, substitution, and simple reversal. Moreover, it was also found out that most of these word formation processes occur in all word classes which indicate that swardspeak is very unpredictable. Although different codes are used for the same words, there are still codes that are really common to all homosexuals and these are Chaka (ugly), Crayola (cry), and Aida (referring to a person with AIDS). Hence, the prevailing word formation processes explored may be termed as observed time-specific patterns because the codes documented in this study may turn obsolete and may be replaced with novel ones in a matter of weeks to month, knowing the creativity of homosexuals and the multiplicity of societal resources which can be used to make the codes more opaque and more confusing for non-homosexuals.Keywords: codes, homosexuals, morphological processes, swardspeak
Procedia PDF Downloads 178634 Offline Signature Verification in Punjabi Based On SURF Features and Critical Point Matching Using HMM
Authors: Rajpal Kaur, Pooja Choudhary
Abstract:
Biometrics, which refers to identifying an individual based on his or her physiological or behavioral characteristics, has the capabilities to the reliably distinguish between an authorized person and an imposter. The Signature recognition systems can categorized as offline (static) and online (dynamic). This paper presents Surf Feature based recognition of offline signatures system that is trained with low-resolution scanned signature images. The signature of a person is an important biometric attribute of a human being which can be used to authenticate human identity. However the signatures of human can be handled as an image and recognized using computer vision and HMM techniques. With modern computers, there is need to develop fast algorithms for signature recognition. There are multiple techniques are defined to signature recognition with a lot of scope of research. In this paper, (static signature) off-line signature recognition & verification using surf feature with HMM is proposed, where the signature is captured and presented to the user in an image format. Signatures are verified depended on parameters extracted from the signature using various image processing techniques. The Off-line Signature Verification and Recognition is implemented using Mat lab platform. This work has been analyzed or tested and found suitable for its purpose or result. The proposed method performs better than the other recently proposed methods.Keywords: offline signature verification, offline signature recognition, signatures, SURF features, HMM
Procedia PDF Downloads 384633 Impact on Underprivileged People Practising Expressive Textile Arts: An Exploratory Study Applied to Ex-Offenders in Hong Kong
Abstract:
This study aims to investigate the impact of practicing expressive textile arts on the underprivileged people namely, ex-offenders after taking a three-month textile arts and fashion creativity workshops from a service-learning subject, offered by the Hong Kong Polytechnic University in May 2016. In this service-learning subject, the subject lecturers, students and ex-offenders co-designed various expressive textile artworks together. During the creative process, the ex-offenders could enhance their self-confidence and rebuild a satisfactory identity through practicing expressive textile arts and fashion creativity. Ten textile arts prototypes in the format of fashion garments were presented in a mini fashion show and an exhibition, both at the Hong Kong Polytechnic University in July 2016. A quantitative research method was adopted and a questionnaire survey was conducted in this study. The research findings suggest that positive impacts are found on the ex-offenders’ perceptions of ‘feelings and thoughts before attending the workshops’, ‘feelings and thoughts during the workshops’, ‘attitude toward the textile arts materials’, and ‘attitude toward the expressive textile artworks’.Keywords: creativity, design, expressive textile arts, fashion, underprivileged people
Procedia PDF Downloads 388632 The Perception of Stallholders About the Early Childhood Education Male Teachers: A Systematic Review
Authors: Endale Fantahun Tadesse, Sabika Khalid
Abstract:
The global call for increased male representation in early childhood education (ECE) has garnered significant attention. Emerging studies have indicated that involving men in ECE can yield positive outcomes for children's physical and psychological development. Challenging the prevailing misconception and stereotype that women dominate the ECE sector is crucial. In light of this, the present study undertakes a systematic review of nine studies on males working in ECE, revealing a dearth of male presence in the field in China as well. To address this issue, substantial structural changes must be implemented to enhance the inadequate pay and working conditions that dissuade both men and women from pursuing a sustainable career in ECE. It is recommended that school leadership raise awareness among female teachers and parents, encouraging them to support and uphold virtuous values for male teachers. Additionally, governing bodies should provide explicit guidelines during training programs to address concerns regarding potential abuse and gender biases. The findings of this review underscore the need for future studies to examine the self-identities of male teachers from various stakeholders' perspectives and explore the consequences of being in the profession through rigorous and robust methodologies that can inform policymakers.Keywords: male teachers, Early Childhood Education (ECE), self-identity, perception of stakeholders
Procedia PDF Downloads 38631 Detection of Latent Fingerprints Recovered from Arson Simulation by a Novel Fluorescent Method
Authors: Somayeh Khanjani, Samaneh Nabavi, Shirin Jalili, Afshin Khara
Abstract:
Fingerprints are area source of ubiquitous evidence and consequential for establishing identity. The detection and subsequent development of fingerprints are thus inevitable in criminal investigations. This becomes a difficult task in the case of certain extreme conditions like fire. A fire scene may be accidental or arson. The evidence subjected to fire is generally overlooked as there is a misconception that they are damaged. There are several scientific approaches to determine whether the fire was deliberate or not. In such as scenario, fingerprints may be most critical to link the perpetrator to the crime. The reason for this may be the destructive nature of fire. Fingerprints subjected to fire are exposed to high temperatures, soot deposition, electromagnetic radiation, and subsequent water force. It is believed that these phenomena damage the fingerprint. A novel fluorescent and a pre existing small particle reagent were investigated for the same. Zinc carbonates based fluorescent small particle reagent was capable of developing latent fingerprints exposed to a maximum temperature of 800 ̊C. Fluorescent SPR may prove very useful in such cases. Fluorescent SPR reagent based on zinc carbonate is a potential method for developing fingerprints from arson sites. The method is cost effective and non hazardous. This formulation is suitable for developing fingerprints exposed to fire/ arson.Keywords: fingerprint, small particle reagent (SPR), arson, novel fluorescent
Procedia PDF Downloads 472630 Diversability and Diversity: Toward Including Disability/Body-Mind Diversity in Educational Diversity, Equity, and Inclusion
Authors: Jennifer Natalya Fink
Abstract:
Since the racial reckoning of 2020, almost every major educational institution has incorporated diversity, equity, and inclusion (DEI) principles into its administrative, hiring, and pedagogical practices. Yet these DEI principles rarely incorporate explicit language or critical thinking about disability. Despite the fact that according to the World Health Organization, one in five people worldwide is disabled, making disabled people the larger minority group in the world, disability remains the neglected stepchild of DEI. Drawing on disability studies and crip theory frameworks, the underlying causes of this exclusion of disability from DEI, such as stigma, shame, invisible disabilities, institutionalization/segregation/delineation from family, and competing models and definitions of disability are examined. This paper explores both the ideological and practical shifts necessary to include disability in university DEI initiatives. It offers positive examples as well as conceptual frameworks such as 'divers ability' for so doing. Using Georgetown University’s 2020-2022 DEI initiatives as a case study, this paper describes how curricular infusion, accessibility, identity, community, and diversity administration infused one university’s DEI initiatives with concrete disability-inclusive measures. It concludes with a consideration of how the very framework of DEI itself might be challenged and transformed if disability were to be included.Keywords: diversity, equity, inclusion, disability, crip theory, accessibility
Procedia PDF Downloads 132629 Developing a Secure Iris Recognition System by Using Advance Convolutional Neural Network
Authors: Kamyar Fakhr, Roozbeh Salmani
Abstract:
Alphonse Bertillon developed the first biometric security system in the 1800s. Today, many governments and giant companies are considering or have procured biometrically enabled security schemes. Iris is a kaleidoscope of patterns and colors. Each individual holds a set of irises more unique than their thumbprint. Every single day, giant companies like Google and Apple are experimenting with reliable biometric systems. Now, after almost 200 years of improvements, face ID does not work with masks, it gives access to fake 3D images, and there is no global usage of biometric recognition systems as national identity (ID) card. The goal of this paper is to demonstrate the advantages of iris recognition overall biometric recognition systems. It make two extensions: first, we illustrate how a very large amount of internet fraud and cyber abuse is happening due to bugs in face recognition systems and in a very large dataset of 3.4M people; second, we discuss how establishing a secure global network of iris recognition devices connected to authoritative convolutional neural networks could be the safest solution to this dilemma. Another aim of this study is to provide a system that will prevent system infiltration caused by cyber-attacks and will block all wireframes to the data until the main user ceases the procedure.Keywords: biometric system, convolutional neural network, cyber-attack, secure
Procedia PDF Downloads 218628 Evaluation of the Urban Regeneration Project: Land Use Transformation and SNS Big Data Analysis
Authors: Ju-Young Kim, Tae-Heon Moon, Jung-Hun Cho
Abstract:
Urban regeneration projects have been actively promoted in Korea. In particular, Jeonju Hanok Village is evaluated as one of representative cases in terms of utilizing local cultural heritage sits in the urban regeneration project. However, recently, there has been a growing concern in this area, due to the ‘gentrification’, caused by the excessive commercialization and surging tourists. This trend was changing land and building use and resulted in the loss of identity of the region. In this regard, this study analyzed the land use transformation between 2010 and 2016 to identify the commercialization trend in Jeonju Hanok Village. In addition, it conducted SNS big data analysis on Jeonju Hanok Village from February 14th, 2016 to March 31st, 2016 to identify visitors’ awareness of the village. The study results demonstrate that rapid commercialization was underway, unlikely the initial intention, so that planners and officials in city government should reconsider the project direction and rebuild deliberate management strategies. This study is meaningful in that it analyzed the land use transformation and SNS big data to identify the current situation in urban regeneration area. Furthermore, it is expected that the study results will contribute to the vitalization of regeneration area.Keywords: land use, SNS, text mining, urban regeneration
Procedia PDF Downloads 293627 Exploring 21st Century Ecolinguistics: Navigating Hybrid Identities in a Changing World
Authors: Dace Aleksandraviča
Abstract:
The paper presents a theoretical exploration of the emerging field of 21st-century ecolinguistics, which examines the multi-faceted relationship between language, ecology, and identity in our rapidly changing global landscape. In an era characterized by unprecedented linguistic and cultural hybridity, understanding the interplay between language and environment is paramount. This paper delves into the concept of hybrid identities, examining how individuals negotiate their linguistic and cultural affiliations within diverse ecological contexts based on relevant prior contributions in the field. Drawing upon interdisciplinary perspectives from linguistics, environmental studies, and cultural studies, the research investigates the ways in which language shapes and is shaped by environmental realities. The abstract underscores the importance of ecolinguistic approaches in fostering environmental stewardship and promoting sustainable practices. By acknowledging the intrinsic link between language, culture, and ecology, it becomes possible to cultivate a deeper appreciation for linguistic diversity and empower individuals to navigate their hybrid identities in a rapidly changing world. In line with that, the paper hopes to contribute to the growing body of literature on ecolinguistics and offer insights into how language can serve as a tool for both environmental conservation and cultural revitalization.Keywords: ecolinguistics, hybrid identities, language, globalization
Procedia PDF Downloads 47626 Cultural Aspect Representation: An Analysis of EFL Textbook Grade 10 Years 2017 in Indonesia
Authors: Soni Ariawan
Abstract:
The discourse of language and culture relation is an interesting issue to be researched. The debate is not about what comes first, language or culture, but it strongly argues that learning foreign language also means learning the culture of the language. The more interesting issue found once constructing an EFL textbook dealing with proportional representation among source culture, target culture and international culture. This study investigates cultural content representation in EFL textbook grade 10 year 2017 in Indonesia. Cortazzi and Jin’s theoretical framework is employed to analyse the reading texts, conversations, and images. The finding shows that national character as the main agenda of Indonesian government is revealed in this textbook since the textbook more frequently highlights the source culture (Indonesian culture) compared to target and international culture. This is aligned with the aim of Indonesian government to strengthen the national identity and promoting local culture awareness through education. To conclude, the study is expected to be significant in providing the idea for government to consider cultural balances representation in constructing textbook. Furthermore, teachers and students should be aware of cultural content revealed in the EFL textbook and be able to enhance intercultural communication not only in the classroom but also in a wider society.Keywords: EFL textbook, intercultural communication, local culture, target culture, international culture
Procedia PDF Downloads 220625 Study on Security and Privacy Issues of Mobile Operating Systems Based on Malware Attacks
Authors: Huang Dennis, Aurelio Aziel, Burra Venkata Durga Kumar
Abstract:
Nowadays, smartphones and mobile operating systems have been popularly widespread in our daily lives. As people use smartphones, they tend to store more private and essential data on their devices, because of this it is very important to develop more secure mobile operating systems and cloud storage to secure the data. However, several factors can cause security risks in mobile operating systems such as malware, malicious app, phishing attacks, ransomware, and more, all of which can cause a big problem for users as they can access the user's private data. Those problems can cause data loss, financial loss, identity theft, and other serious consequences. Other than that, during the pandemic, people will use their mobile devices more and do all sorts of transactions online, which may lead to more victims of online scams and inexperienced users being the target. With the increase in attacks, researchers have been actively working to develop several countermeasures to enhance the security of operating systems. This study aims to provide an overview of the security and privacy issues in mobile operating systems, identifying the potential risk of operating systems, and the possible solutions. By examining these issues, we want to provide an easy understanding to users and researchers to improve knowledge and develop more secure mobile operating systems.Keywords: mobile operating system, security, privacy, Malware
Procedia PDF Downloads 88624 A Social Identity Analysis of Ottoman and Safavid Architects in the Historical Documents of the 16th to 17th Centuries
Authors: Farzaneh Farrokhfar, Mohammad Khazaie
Abstract:
The 16th and 17th centuries coincide with the classical age of Ottoman art history. Simultaneously with this age and in the eastern neighborhood of the Ottoman state, the Safavid Shiite state emerged, which, despite political and religious differences with the Ottomans, played an important role in cultural and artistic exchanges with Anatolia. The harmony of arts, including architecture, is one of the most important manifestations of cultural exchange between the two regions, which shows the intellectual commonalities of the two regions. In parallel with the production of works of art, the registration of information and identities of Ottoman and Safavid artists and craftsmen has been done by many historians and biographers, some of whom, fortunately, are available to us today and can be evaluated. This research first intends to read historical documents and reports related to the architects of the two Ottoman states in Anatolia and Safavid states in Iran in the 16th and 17th centuries and then examines the status of architects' information records and their location in the two regions. The results reveal the names and identities of some Ottoman and Safavid architects in the 16th and 17th centuries and show the method of recording information in the documents of the two regions. This research is done in a comparative historical method, and the method of collecting its resources is a documentary library.Keywords: classical era, Ottoman architecture, Safavid architecture, Central Asian historical documents
Procedia PDF Downloads 129623 Discipline-Specific Culture: A Purpose-Based Investigation
Authors: Sihem Benaouda
Abstract:
English is gaining an international identity as it affects every academic and professional field in the world. Without increasing their cultural understanding, it would obviously be difficult to completely educate learners for communication in a globalised environment. The concept of culture is intricate and needs to be elucidated, especially in an English language teaching (ELT) context. The study focuses on the investigation of the cultural studies integrated into the different types of English for specific purposes (ESP) materials, as opposed to English for general purposes (EGP) textbooks. A qualitative methodology based on a triangulation of techniques was conducted through materials analysis of five textbooks in both advanced EGP and three types of ESP. In addition to a semi-structured interview conducted with Algerian ESP practitioners, data analysis results revealed that culture in ESP textbooks is not overtly isolated into chapters and that cultural studies are predominantly present in business and economics materials, namely English for hotel and catering staff, tourism, and flight attendants. However, implicit cultural instruction is signalled in the social sciences and is negligible in science and technology sources. In terms of content, cultural studies in EGP are more related to generic topics, whereas, in some ESP materials, the topics are rather oriented to the specific field they belong to. Furthermore, the respondents’ answers showed an unawareness of the importance of culture in ESP teaching, besides some disregard for culture teaching per se in ESP contexts.Keywords: ESP, EGP, cultural studies, textbooks, teaching, materials
Procedia PDF Downloads 108622 The Savior, the Absent, and the Model: The Role Social Workers Play in Young Women’s Romantic Relationships
Authors: Tehila Wright
Abstract:
Being involved in romantic relationships is a key task in the development of identity during emerging adulthood. To date, little research has focused on romantic relationships among young women who have coped with situations of distress and are treated by social workers. Moreover, the role of social workers in young women’s romantic relations is underexplored. This paper focuses on young women’s perception of the role played by their social workers in guiding them through romantic relationships. Methodology: This qualitative-feminist study is based on semi-structured in-depth interviews with 25 young heterosexual Jewish women aged 18-25 who are currently supported by social workers in the welfare system. Findings: The findings uncover three meanings given by participants to their relations with social workers regarding the young women's romantic relationships: 1)” The social worker as role model” namely, the social worker as setting an example for healthy conduct in romantic relationships. 2) "The social worker as savior," namely, the social worker as the one who supports participants escaping abusive romantic relationships. 3) "The present-absent social worker,” namely, despite being a significant figure in their lives, the social worker is experienced as disconnected and alienated. Conclusions and practice: Social workers can have a positive and important contribution to the romantic relationships of these young women. To be a central source of support in the young women's life, the social workers must be able to establish a relationship of trust with the young women.Keywords: young women, emerging adulthood, romantic relationship, women in distress
Procedia PDF Downloads 109621 Mixed Number Algebra and Its Application
Authors: Md. Shah Alam
Abstract:
Mushfiq Ahmad has defined a Mixed Number, which is the sum of a scalar and a Cartesian vector. He has also defined the elementary group operations of Mixed numbers i.e. the norm of Mixed numbers, the product of two Mixed numbers, the identity element and the inverse. It has been observed that Mixed Number is consistent with Pauli matrix algebra and a handy tool to work with Dirac electron theory. Its use as a mathematical method in Physics has been studied. (1) We have applied Mixed number in Quantum Mechanics: Mixed Number version of Displacement operator, Vector differential operator, and Angular momentum operator has been developed. Mixed Number method has also been applied to Klein-Gordon equation. (2) We have applied Mixed number in Electrodynamics: Mixed Number version of Maxwell’s equation, the Electric and Magnetic field quantities and Lorentz Force has been found. (3) An associative transformation of Mixed Number numbers fulfilling Lorentz invariance requirement is developed. (4) We have applied Mixed number algebra as an extension of Complex number. Mixed numbers and the Quaternions have isomorphic correspondence, but they are different in algebraic details. The multiplication of unit Mixed number and the multiplication of unit Quaternions are different. Since Mixed Number has properties similar to those of Pauli matrix algebra, Mixed Number algebra is a more convenient tool to deal with Dirac equation.Keywords: mixed number, special relativity, quantum mechanics, electrodynamics, pauli matrix
Procedia PDF Downloads 363620 Children Protection in the Digital Space
Authors: Beverly Komen
Abstract:
Online crimes have been on the rise in the recent days, especially with the hit of the covid-19 pandemic. The coronavirus pandemic has led to an unprecedented rise in screen time, this means more families are relying on technology and digital solutions to keep children learning, spending more time on the virtual platforms can leave children vulnerable to online abuse and exploitation. With ease access of affordable phones, internet, and increased online activities, all children are at risk of being abused online hence making the digital space unsafe for children. With these increased use of technology and its accessibility, children are at risk of facing challenges such as access to inappropriate content, online grooming, identity theft, cyber bullying, among other risks. The big question is; as we enjoy the benefits brought in by technology, how do we ensure that our children are save in this digital space? With the analysis of the current trends, there is a gap in knowledge on people’s understanding on child online protection and safety measures when using the digital space. A survey conducted among 50 parents in Nairobi in Kenya indicated that there is a gap in knowledge on online protection of children and over 50 % of the participants shared that for sure they have no idea on how to protect children online. This paper seeks to address the concept of child protection in the digital space and come up with viable solutions in protecting children from online vices.Keywords: child protection, digital space, online risks, online grooming, cyber bulying, online child sexual exploitation, and abuse
Procedia PDF Downloads 185619 ECG Based Reliable User Identification Using Deep Learning
Authors: R. N. Begum, Ambalika Sharma, G. K. Singh
Abstract:
Identity theft has serious ramifications beyond data and personal information loss. This necessitates the implementation of robust and efficient user identification systems. Therefore, automatic biometric recognition systems are the need of the hour, and ECG-based systems are unquestionably the best choice due to their appealing inherent characteristics. The CNNs are the recent state-of-the-art techniques for ECG-based user identification systems. However, the results obtained are significantly below standards, and the situation worsens as the number of users and types of heartbeats in the dataset grows. As a result, this study proposes a highly accurate and resilient ECG-based person identification system using CNN's dense learning framework. The proposed research explores explicitly the calibre of dense CNNs in the field of ECG-based human recognition. The study tests four different configurations of dense CNN which are trained on a dataset of recordings collected from eight popular ECG databases. With the highest FAR of 0.04 percent and the highest FRR of 5%, the best performing network achieved an identification accuracy of 99.94 percent. The best network is also tested with various train/test split ratios. The findings show that DenseNets are not only extremely reliable but also highly efficient. Thus, they might also be implemented in real-time ECG-based human recognition systems.Keywords: Biometrics, Dense Networks, Identification Rate, Train/Test split ratio
Procedia PDF Downloads 160618 The Evolution of the Human Brain from the Hind Brain to the Fore Brain: Dialectics from the African Perspective in Understanding Stunted Development in Science and Technology
Authors: Philemon Wokoma Iyagba, Obey Onenee Christie
Abstract:
From the hindbrain, which is responsible for motor activities, to the forebrain, responsible for processing information related to complex cognitive activities, the human brain has continued to evolve over the years. This evolution- has been progressive, leading to advancements in science and technology. However, the development of science and technology in Africa, where ancient civilization arguably began, has been retrogressive. Dialectics was done by dissecting different opinions on the reason behind the stunted development of science and technology in Africa. The researchers proposed that the inability to sustain the technological advancements made by early Africans is due to poor or lack of replicability of the African knowledge-based system, almost no or poor documentation of adopted procedures and the approval-seeking mentality that cheaply paved the way for westernization which also led to the adulteration of the African way of life and education without making room for incorporating her identity and proper alignment of her rich cultural heritage in education and her enormous achievements before and during the middle age. This article discussed conceptual issues, with its positions based on established facts, the discussion was based on relevant literature and recommendations were made accordingly.Keywords: forebrain, hindbrain, dialectics from African perspective, development in science and technology
Procedia PDF Downloads 77617 The Morphology of Sri Lankan Text Messages
Authors: Chamindi Dilkushi Senaratne
Abstract:
Communicating via a text or an SMS (Short Message Service) has become an integral part of our daily lives. With the increase in the use of mobile phones, text messaging has become a genre by itself worth researching and studying. It is undoubtedly a major phenomenon revealing language change. This paper attempts to describe the morphological processes of text language of urban bilinguals in Sri Lanka. It will be a typological study based on 500 English text messages collected from urban bilinguals residing in Colombo. The messages are selected by categorizing the deviant forms of language use apparent in text messages. These stylistic deviations are a deliberate skilled performance by the users of the language possessing an in-depth knowledge of linguistic systems to create new words and thereby convey their linguistic identity and individual and group solidarity via the message. The findings of the study solidifies arguments that the manipulation of language in text messages is both creative and appropriate. In addition, code mixing theories will be used to identify how existing morphological processes are adapted by bilingual users in Sri Lanka when texting. The study will reveal processes such as omission, initialism, insertion and alternation in addition to other identified linguistic features in text language. The corpus reveals the most common morphological processes used by Sri Lankan urban bilinguals when sending texts.Keywords: bilingual, deviations, morphology, texts
Procedia PDF Downloads 269616 RSU Aggregated Message Delivery for VANET
Authors: Auxeeliya Jesudoss, Ashraph Sulaiman, Ratnakar Kotnana
Abstract:
V2V communication brings up several questions of scalability issues although message sharing in vehicular ad-hoc networks comprises of both Vehicle-to-Vehicle communications (V2V) and Vehicle to Infrastructure communication (V2I). It is not an easy task for a vehicle to verify all signatures of the messages sent by its neighboring vehicles in a timely manner, without resulting in message loss. Moreover, the communication overhead of a vehicle to authenticate another vehicle would increase together with the security of the system. Another issue to be addressed is the continuous mobility of vehicles which requires at least some information on the node’s own position to be revealed to the neighboring vehicles. This may facilitate the attacker to congregate information on a node’s position or its mobility patterns. In order to tackle these issues, this paper introduces a RSU aggregated message deliverance scheme called RAMeD. With RAMeD, roadside units (RSUs) are responsible for verifying the identity of the vehicles entering in its range, collect messages from genuine vehicles and to aggregate similar messages into groups before sending them to all the vehicles in its communication range. This aggregation will tremendously improve the rate of message delivery and reduce the message lose ratio by avoiding similar messages being sent to the vehicles redundantly. The proposed protocol is analyzed extensively to evaluate its merits and efficiency for vehicular communication.Keywords: vehicular ad-hoc networks, V2V, V2I, VANET communication, scalability, message aggregation
Procedia PDF Downloads 408615 Solving the Refugee Problem in the Modern State System: The Philosophical Dilemma of Sovereignty and Human Right
Authors: Xiaoman Dong
Abstract:
The refugee problem has a long history, but the scale and severity of modern refugee crises demand us to consider if the progress of political history exacerbates the refugee problem. This paper argues that although sovereignty owes its legitimacy to the protection of human rights, the modern state system complicates the refugee problem by first introducing then blurring the line between human rights and civil rights, and making national identity indispensable to basic livelihood and dignity. This paper first explains the source of the modern state system’s legitimacy by putting it in the context of social contract theories and the politics of nation-building. It then discusses how states create the concept of statelessness, which leads to more violations on human rights. Using historical records of the League of Nations High Commission for Refugees and the United Nations High Commissioner for Refugees, this paper reveals that neither the refugee problem of the Cold-War period nor the current refugee crisis is collateral damage of war, but rather the consequence of intentional exclusionary policies produced out of political interests. Finally, it contends that if the modern state system is to sustain, it cannot prioritize the protection of civil rights of a particular group over the protection of basic human rights of all.Keywords: burden sharing, human rights, legitimacy of state, positive externality, sovereignty
Procedia PDF Downloads 190614 Africa as Endemically a War Continent: Explaining the Changing Pattern of Armed Conflicts in Africa
Authors: Kenneth Azaigba
Abstract:
The history of post-colonial African States has been dubbed a history of endemic warfare in existing literature. Indeed, Africa political environment is characterized by a multiplicity of threats to peace and security. Africa's leading drivers of conflict include abundant (especially mineral) resources, personal rule and attendant political authoritarianism, manipulation of identity politics across ethnicity, marginalization of communities, as well as electoral mal-practices resulting in contested legitimacy and resultant violence. However, the character of armed conflicts in Africa is changing. This paper attempts to reconstruct the trajectory of armed conflicts in Africa and explain the changing pattern of armed conflict. The paper contends that large scale political violence in Africa is on the decline rendering the endemic thesis an inappropriate paradigm in explaining political conflicts in Africa. The paper also posits that though small scale conflicts are springing up and exhibiting trans-border dimensions, these patterns of armed conflicts are not peculiar to Africa but emerging waves of global conflicts. The paper explains that the shift in the scale of warfare in Africa is a function of a multiplicity of post-cold war global contradictions. Inclusive governance, social justice and economic security are articulated as workable panaceas for mitigating warfare in Africa.Keywords: Africa, conflicts, pattern, war
Procedia PDF Downloads 387613 Blockchain for Transport: Performance Simulations of Blockchain Network for Emission Monitoring Scenario
Authors: Dermot O'Brien, Vasileios Christaras, Georgios Fontaras, Igor Nai Fovino, Ioannis Kounelis
Abstract:
With the rise of the Internet of Things (IoT), 5G, and blockchain (BC) technologies, vehicles are becoming ever increasingly connected and are already transmitting substantial amounts of data to the original equipment manufacturers (OEMs) servers. This data could be used to help detect mileage fraud and enable more accurate vehicle emissions monitoring. This would not only help regulators but could enable applications such as permitting efficient drivers to pay less tax, geofencing for air quality improvement, as well as pollution tolling and trading platforms for transport-related businesses and EU citizens. Other applications could include traffic management and shared mobility systems. BC enables the transmission of data with additional security and removes single points of failure while maintaining data provenance, identity ownership, and the possibility to retain varying levels of privacy depending on the requirements of the applied use case. This research performs simulations of vehicles interacting with European member state authorities and European Commission BC nodes that are running hyperleger fabric and explores whether the technology is currently feasible for transport applications such as the emission monitoring use-case.Keywords: future transportation systems, technological innovations, policy approaches for transportation future, economic and regulatory trends, blockchain
Procedia PDF Downloads 176612 The Lived Experiences of Stigma in Non-offending Pedophiles
Authors: Rebecca Heron, Steal Adcock, Karen Parsonson
Abstract:
Non-offending pedophiles are an under- researched, hard to reach population. This group of individuals are often hesitant to come forward and fail to seek help ongoing stigma experienced in society.In order to better understand non-offending pedophiles experiences of their identity and the stigma they face, semi-structured qualitative interviews were conducted with 10 non-offending pedophiles, who were recruited through online support groups for individuals who have sexual attractions towards children. Participants were interviewed over skype, and the data was analysed using interpretative phenomenological analysis (IPA) approach, anda number of themes were generated from the rich data set produced. Four main themes emerged, providing insight into how non-offending pedophiles experience stigma. The themes included ‘stigma in relation to themselves’, ‘others’, ‘the media portrayal’and ‘impact of the stigma of MAP’s seeking treatment’. Findings are discussed in relation to existing literature, and practical recommendations are proposed to hopefully allow this population to feel more comfortable sharing their sexual interests, which will allow them to seek help resulting in them not offending and, ultimately, the prevention of sexual abuse. This study fills the void in terms of lack of research with this population, especially when it comes to qualitative in depth studies, including not just male minor attracted persons but female minor attracted persons as well.Keywords: pedophillia, stigma, non-offending pedophiles, minor attracted persons, prevention
Procedia PDF Downloads 128611 Exploring the Birth of Modern Art in Borneo, Post-War Era 1945 to 1970
Authors: Rahah Hasan, Faridah Sahari
Abstract:
This paper describes the development of modern art in Borneo, particularly in Sarawak, Sabah, and Brunei, after the Second World War until the 1970s. This was the period when the British Colonial government dictated the education system, which consequentially inculcated visual art through art and craft subjects imposed on all vernacular schools in Borneo. British influence within the state governance, social, and education system designed with Western ideology created not only a westernized society and mindset but at the same time generated artistic opportunities for emerging local painters to be involved in the initiation of Modern Art in Borneo. Through the historical method and analysis of primary and secondary data, it was obvious that the existence of colonial government departments and institutions such as museums and teaching colleges, and other social organizations in Borneo at that time contributed significantly to the artistic movement. The similar structure and motivation of development in other areas of Borneo confirmed that artistic affirmation of modern art advanced homogenously. Their understanding of easel painting as well as a unique interpretation of culture once distanced from traditional art, resulting in a new visual image that transcended their ethnicity and identity through new mediums and tools. These meticulous interventions modestly visualized in each painting, as discussed in this paper, hopefully, will give a deeper understanding and appreciation of the history of modern art in Borneo.Keywords: art history, Borneo art, fine art, modern art
Procedia PDF Downloads 143610 Forensic Science in Dr. Jekyll and Mr. Hyde: Trails of Utterson's Quest
Authors: Kyu-Jeoung Lee, Jae-Uk Choo
Abstract:
This paper focuses on investigating The Strange Case of Dr Jekyll and Mr Hyde from Utterson’s point of view, referring to: Gabriel John Utterson, a central character in the book. Utterson is no different from a forensic investigator, as he tries to collect evidence on the mysterious Mr. Hyde’s relationship to Dr. Jekyll. From Utterson's perspective, Jekyll is the 'victim' of a potential scandal and blackmail, and Hyde is the 'suspect' of a possible 'crime'. Utterson intends to figure out Hyde's identity, connect his motive with his actions, and gather witness accounts. During Utterson’s quest, the outside materials available to him along with the social backgrounds of Hyde and Jekyll will be analyzed. The archives left from Jekyll’s chamber will also play a part providing evidence. Utterson will investigate, based on what he already knows about Jekyll his whole life, and how Jekyll had acted in his eyes until he was gone, and finding out possible explanations for Jekyll's actions. The relationship between Jekyll and Hyde becomes the major question, as the social background offers clues pointing in the direction of illegitimacy and prostitution. There is still a possibility that Jekyll and Hyde were, in fact, completely different people. Utterson received a full statement and confession from Jekyll himself at the end of the story, which gives the reader the possible truth on what happened. Stevenson’s Dr. Jekyll and Mr. Hyde led readers, as it did Utterson, to find the connection between Hyde and Jekyll using methods of history, culture, and science. Utterson's quest to uncover Hyde shows an example of applying the various fields to in his act to see if Hyde's inheritance was legal. All of this taken together could technically be considered forensic investigation.Keywords: Dr. Jekyll and Mr. Hyde, forensic investigation, illegitimacy, prostitution, Robert Louis Stevenson
Procedia PDF Downloads 211609 The Application of Insects in Forensic Investigations
Authors: Shirin Jalili, Hadi Shirzad, Samaneh Nabavi, Somayeh Khanjani
Abstract:
Forensic entomology is the science of study and analysis of insects evidences to aid in criminal investigation. Being aware of the distribution, biology, ecology and behavior of insects, which are founded at crime scene can provide information about when, where and how the crime has been committed. It has many application in criminal investigations. Its main use is estimation of the minimum time after death in suspicious death. The close association between insects and corpses and the use of insects in criminal investigations is the subject of forensic entomology. Because insects attack to the decomposing corpse and spawning on it from the initial stages. Forensic scientists can estimate the postmortem index by studying the insects population and the developing larval stages.In addition, toxicological and molecular studies of these insects can reveal the cause of death or even the identity of a victim. It also be used to detect drugs and poisons, and determination of incident location. Gathering robust entomological evidences is made possible for experts by recent Techniques. They can provide vital information about death, corpse movement or burial, submersion interval, time of decapitation, identification of specific sites of trauma, post-mortem artefacts on the body, use of drugs, linking a suspect to the scene of a crime, sexual molestations and the identification of suspects.Keywords: Forensic entomology, post mortem interval, insects, larvae
Procedia PDF Downloads 502608 Analyzing Students' Writing in an English Code-Mixing Context in Nepali: An Ecological and Systematic Functional Approach
Authors: Binod Duwadi
Abstract:
This article examines the language and literacy practices of English Code-mixing in Nepalese Classroom. Situating the study within an ecological framework, a systematic functional linguistic (SFL) approach was used to analyze students writing in two Neplease schools. Data collection included interviews with teachers, classroom observations, instructional materials, and focal students’ writing samples. Data analyses revealed vastly different language ecologies between the schools owing to sharp socioeconomic stratification, the structural organization of schools, and the pervasiveness of standard language ideology, with stigmatizes English code mixing (ECM) and privileges Standard English in schools. Functional analysis of students’ writing showed that the nature of the writing tasks at the schools created different affordances for exploiting lexicogrammatically choices for meaning making-enhancing them in the case of one school but severely restricting them in the case of another- perpetuating the academic disadvantage for code mixing speakers. Recommendations for structural and attitudinal changes through teacher training and implementation of approaches that engage students’ bidialectal competence for learning are made as important first steps towards addressing educational inequities in Nepalese schools.Keywords: code-mixing, ecological perspective, systematic functional approach, language and identity
Procedia PDF Downloads 124