Search results for: athletic identity
634 The Power of Symbol in the Powerful Symbol: Case Study of Symbol Visualization Change in the Form of Pelinggih in Bali
Authors: I Nyoman Larry Julianto, Pribadi Widodo
Abstract:
The phenomenon of cultural change is the result of the process of shifting, reducing and adding elements of cultural systems because of the process of interaction with the environment. Interestingly in the temple area in Bali, there is a phenomenon of symbol visualization change in the form of pelinggih, which is in the shaped of the car. As a result of the sacralization process of the symbol, the function of its essence is remained as a place of worship. Hindu communities in Bali can accept that phenomenon in their religious life as a process of today's cultural acculturation. Through an interpretive ethnographic study, it is tried to understand the 'creative concept’of that symbol materialization in its interaction process. The result of the research stated that the interaction value of the symbol visualization change is constructed from the application of 'value' and 'meaning' of the previous pelinggih. The ritual procession and the reinforcement of the mythical mind, make the 'value' of the visualization change of the pelinggih leads to a sacred, religious conception. In the future, the development of the human mind is more functional, but it does not eliminate the mythological value due to the interaction with the surrounding social environment, so the visualization of the symbol in the form of pelinggih which is in the shape of the car will be the identity of a new cultural heritage. The understanding of the influence of mental representation of human being in an effort toward his spiritual awareness will be able to be the advanced research.Keywords: the power of symbol, visual change, pelinggih, Bali
Procedia PDF Downloads 165633 Detection of Latent Fingerprints Recovered from Arson Simulation by a Novel Fluorescent Method
Authors: Somayeh Khanjani, Samaneh Nabavi, Shirin Jalili, Afshin Khara
Abstract:
Fingerprints are area source of ubiquitous evidence and consequential for establishing identity. The detection and subsequent development of fingerprints are thus inevitable in criminal investigations. This becomes a difficult task in the case of certain extreme conditions like fire. A fire scene may be accidental or arson. The evidence subjected to fire is generally overlooked as there is a misconception that they are damaged. There are several scientific approaches to determine whether the fire was deliberate or not. In such as scenario, fingerprints may be most critical to link the perpetrator to the crime. The reason for this may be the destructive nature of fire. Fingerprints subjected to fire are exposed to high temperatures, soot deposition, electromagnetic radiation, and subsequent water force. It is believed that these phenomena damage the fingerprint. A novel fluorescent and a pre existing small particle reagent were investigated for the same. Zinc carbonates based fluorescent small particle reagent was capable of developing latent fingerprints exposed to a maximum temperature of 800 ̊C. Fluorescent SPR may prove very useful in such cases. Fluorescent SPR reagent based on zinc carbonate is a potential method for developing fingerprints from arson sites. The method is cost effective and non hazardous. This formulation is suitable for developing fingerprints exposed to fire/ arson.Keywords: fingerprint, small particle reagent (SPR), arson, novel fluorescent
Procedia PDF Downloads 472632 Diversability and Diversity: Toward Including Disability/Body-Mind Diversity in Educational Diversity, Equity, and Inclusion
Authors: Jennifer Natalya Fink
Abstract:
Since the racial reckoning of 2020, almost every major educational institution has incorporated diversity, equity, and inclusion (DEI) principles into its administrative, hiring, and pedagogical practices. Yet these DEI principles rarely incorporate explicit language or critical thinking about disability. Despite the fact that according to the World Health Organization, one in five people worldwide is disabled, making disabled people the larger minority group in the world, disability remains the neglected stepchild of DEI. Drawing on disability studies and crip theory frameworks, the underlying causes of this exclusion of disability from DEI, such as stigma, shame, invisible disabilities, institutionalization/segregation/delineation from family, and competing models and definitions of disability are examined. This paper explores both the ideological and practical shifts necessary to include disability in university DEI initiatives. It offers positive examples as well as conceptual frameworks such as 'divers ability' for so doing. Using Georgetown University’s 2020-2022 DEI initiatives as a case study, this paper describes how curricular infusion, accessibility, identity, community, and diversity administration infused one university’s DEI initiatives with concrete disability-inclusive measures. It concludes with a consideration of how the very framework of DEI itself might be challenged and transformed if disability were to be included.Keywords: diversity, equity, inclusion, disability, crip theory, accessibility
Procedia PDF Downloads 135631 Developing a Secure Iris Recognition System by Using Advance Convolutional Neural Network
Authors: Kamyar Fakhr, Roozbeh Salmani
Abstract:
Alphonse Bertillon developed the first biometric security system in the 1800s. Today, many governments and giant companies are considering or have procured biometrically enabled security schemes. Iris is a kaleidoscope of patterns and colors. Each individual holds a set of irises more unique than their thumbprint. Every single day, giant companies like Google and Apple are experimenting with reliable biometric systems. Now, after almost 200 years of improvements, face ID does not work with masks, it gives access to fake 3D images, and there is no global usage of biometric recognition systems as national identity (ID) card. The goal of this paper is to demonstrate the advantages of iris recognition overall biometric recognition systems. It make two extensions: first, we illustrate how a very large amount of internet fraud and cyber abuse is happening due to bugs in face recognition systems and in a very large dataset of 3.4M people; second, we discuss how establishing a secure global network of iris recognition devices connected to authoritative convolutional neural networks could be the safest solution to this dilemma. Another aim of this study is to provide a system that will prevent system infiltration caused by cyber-attacks and will block all wireframes to the data until the main user ceases the procedure.Keywords: biometric system, convolutional neural network, cyber-attack, secure
Procedia PDF Downloads 220630 Evaluation of the Urban Regeneration Project: Land Use Transformation and SNS Big Data Analysis
Authors: Ju-Young Kim, Tae-Heon Moon, Jung-Hun Cho
Abstract:
Urban regeneration projects have been actively promoted in Korea. In particular, Jeonju Hanok Village is evaluated as one of representative cases in terms of utilizing local cultural heritage sits in the urban regeneration project. However, recently, there has been a growing concern in this area, due to the ‘gentrification’, caused by the excessive commercialization and surging tourists. This trend was changing land and building use and resulted in the loss of identity of the region. In this regard, this study analyzed the land use transformation between 2010 and 2016 to identify the commercialization trend in Jeonju Hanok Village. In addition, it conducted SNS big data analysis on Jeonju Hanok Village from February 14th, 2016 to March 31st, 2016 to identify visitors’ awareness of the village. The study results demonstrate that rapid commercialization was underway, unlikely the initial intention, so that planners and officials in city government should reconsider the project direction and rebuild deliberate management strategies. This study is meaningful in that it analyzed the land use transformation and SNS big data to identify the current situation in urban regeneration area. Furthermore, it is expected that the study results will contribute to the vitalization of regeneration area.Keywords: land use, SNS, text mining, urban regeneration
Procedia PDF Downloads 294629 Exploring 21st Century Ecolinguistics: Navigating Hybrid Identities in a Changing World
Authors: Dace Aleksandraviča
Abstract:
The paper presents a theoretical exploration of the emerging field of 21st-century ecolinguistics, which examines the multi-faceted relationship between language, ecology, and identity in our rapidly changing global landscape. In an era characterized by unprecedented linguistic and cultural hybridity, understanding the interplay between language and environment is paramount. This paper delves into the concept of hybrid identities, examining how individuals negotiate their linguistic and cultural affiliations within diverse ecological contexts based on relevant prior contributions in the field. Drawing upon interdisciplinary perspectives from linguistics, environmental studies, and cultural studies, the research investigates the ways in which language shapes and is shaped by environmental realities. The abstract underscores the importance of ecolinguistic approaches in fostering environmental stewardship and promoting sustainable practices. By acknowledging the intrinsic link between language, culture, and ecology, it becomes possible to cultivate a deeper appreciation for linguistic diversity and empower individuals to navigate their hybrid identities in a rapidly changing world. In line with that, the paper hopes to contribute to the growing body of literature on ecolinguistics and offer insights into how language can serve as a tool for both environmental conservation and cultural revitalization.Keywords: ecolinguistics, hybrid identities, language, globalization
Procedia PDF Downloads 47628 Cultural Aspect Representation: An Analysis of EFL Textbook Grade 10 Years 2017 in Indonesia
Authors: Soni Ariawan
Abstract:
The discourse of language and culture relation is an interesting issue to be researched. The debate is not about what comes first, language or culture, but it strongly argues that learning foreign language also means learning the culture of the language. The more interesting issue found once constructing an EFL textbook dealing with proportional representation among source culture, target culture and international culture. This study investigates cultural content representation in EFL textbook grade 10 year 2017 in Indonesia. Cortazzi and Jin’s theoretical framework is employed to analyse the reading texts, conversations, and images. The finding shows that national character as the main agenda of Indonesian government is revealed in this textbook since the textbook more frequently highlights the source culture (Indonesian culture) compared to target and international culture. This is aligned with the aim of Indonesian government to strengthen the national identity and promoting local culture awareness through education. To conclude, the study is expected to be significant in providing the idea for government to consider cultural balances representation in constructing textbook. Furthermore, teachers and students should be aware of cultural content revealed in the EFL textbook and be able to enhance intercultural communication not only in the classroom but also in a wider society.Keywords: EFL textbook, intercultural communication, local culture, target culture, international culture
Procedia PDF Downloads 223627 Study on Security and Privacy Issues of Mobile Operating Systems Based on Malware Attacks
Authors: Huang Dennis, Aurelio Aziel, Burra Venkata Durga Kumar
Abstract:
Nowadays, smartphones and mobile operating systems have been popularly widespread in our daily lives. As people use smartphones, they tend to store more private and essential data on their devices, because of this it is very important to develop more secure mobile operating systems and cloud storage to secure the data. However, several factors can cause security risks in mobile operating systems such as malware, malicious app, phishing attacks, ransomware, and more, all of which can cause a big problem for users as they can access the user's private data. Those problems can cause data loss, financial loss, identity theft, and other serious consequences. Other than that, during the pandemic, people will use their mobile devices more and do all sorts of transactions online, which may lead to more victims of online scams and inexperienced users being the target. With the increase in attacks, researchers have been actively working to develop several countermeasures to enhance the security of operating systems. This study aims to provide an overview of the security and privacy issues in mobile operating systems, identifying the potential risk of operating systems, and the possible solutions. By examining these issues, we want to provide an easy understanding to users and researchers to improve knowledge and develop more secure mobile operating systems.Keywords: mobile operating system, security, privacy, Malware
Procedia PDF Downloads 90626 A Social Identity Analysis of Ottoman and Safavid Architects in the Historical Documents of the 16th to 17th Centuries
Authors: Farzaneh Farrokhfar, Mohammad Khazaie
Abstract:
The 16th and 17th centuries coincide with the classical age of Ottoman art history. Simultaneously with this age and in the eastern neighborhood of the Ottoman state, the Safavid Shiite state emerged, which, despite political and religious differences with the Ottomans, played an important role in cultural and artistic exchanges with Anatolia. The harmony of arts, including architecture, is one of the most important manifestations of cultural exchange between the two regions, which shows the intellectual commonalities of the two regions. In parallel with the production of works of art, the registration of information and identities of Ottoman and Safavid artists and craftsmen has been done by many historians and biographers, some of whom, fortunately, are available to us today and can be evaluated. This research first intends to read historical documents and reports related to the architects of the two Ottoman states in Anatolia and Safavid states in Iran in the 16th and 17th centuries and then examines the status of architects' information records and their location in the two regions. The results reveal the names and identities of some Ottoman and Safavid architects in the 16th and 17th centuries and show the method of recording information in the documents of the two regions. This research is done in a comparative historical method, and the method of collecting its resources is a documentary library.Keywords: classical era, Ottoman architecture, Safavid architecture, Central Asian historical documents
Procedia PDF Downloads 130625 Discipline-Specific Culture: A Purpose-Based Investigation
Authors: Sihem Benaouda
Abstract:
English is gaining an international identity as it affects every academic and professional field in the world. Without increasing their cultural understanding, it would obviously be difficult to completely educate learners for communication in a globalised environment. The concept of culture is intricate and needs to be elucidated, especially in an English language teaching (ELT) context. The study focuses on the investigation of the cultural studies integrated into the different types of English for specific purposes (ESP) materials, as opposed to English for general purposes (EGP) textbooks. A qualitative methodology based on a triangulation of techniques was conducted through materials analysis of five textbooks in both advanced EGP and three types of ESP. In addition to a semi-structured interview conducted with Algerian ESP practitioners, data analysis results revealed that culture in ESP textbooks is not overtly isolated into chapters and that cultural studies are predominantly present in business and economics materials, namely English for hotel and catering staff, tourism, and flight attendants. However, implicit cultural instruction is signalled in the social sciences and is negligible in science and technology sources. In terms of content, cultural studies in EGP are more related to generic topics, whereas, in some ESP materials, the topics are rather oriented to the specific field they belong to. Furthermore, the respondents’ answers showed an unawareness of the importance of culture in ESP teaching, besides some disregard for culture teaching per se in ESP contexts.Keywords: ESP, EGP, cultural studies, textbooks, teaching, materials
Procedia PDF Downloads 109624 The Savior, the Absent, and the Model: The Role Social Workers Play in Young Women’s Romantic Relationships
Authors: Tehila Wright
Abstract:
Being involved in romantic relationships is a key task in the development of identity during emerging adulthood. To date, little research has focused on romantic relationships among young women who have coped with situations of distress and are treated by social workers. Moreover, the role of social workers in young women’s romantic relations is underexplored. This paper focuses on young women’s perception of the role played by their social workers in guiding them through romantic relationships. Methodology: This qualitative-feminist study is based on semi-structured in-depth interviews with 25 young heterosexual Jewish women aged 18-25 who are currently supported by social workers in the welfare system. Findings: The findings uncover three meanings given by participants to their relations with social workers regarding the young women's romantic relationships: 1)” The social worker as role model” namely, the social worker as setting an example for healthy conduct in romantic relationships. 2) "The social worker as savior," namely, the social worker as the one who supports participants escaping abusive romantic relationships. 3) "The present-absent social worker,” namely, despite being a significant figure in their lives, the social worker is experienced as disconnected and alienated. Conclusions and practice: Social workers can have a positive and important contribution to the romantic relationships of these young women. To be a central source of support in the young women's life, the social workers must be able to establish a relationship of trust with the young women.Keywords: young women, emerging adulthood, romantic relationship, women in distress
Procedia PDF Downloads 110623 Mixed Number Algebra and Its Application
Authors: Md. Shah Alam
Abstract:
Mushfiq Ahmad has defined a Mixed Number, which is the sum of a scalar and a Cartesian vector. He has also defined the elementary group operations of Mixed numbers i.e. the norm of Mixed numbers, the product of two Mixed numbers, the identity element and the inverse. It has been observed that Mixed Number is consistent with Pauli matrix algebra and a handy tool to work with Dirac electron theory. Its use as a mathematical method in Physics has been studied. (1) We have applied Mixed number in Quantum Mechanics: Mixed Number version of Displacement operator, Vector differential operator, and Angular momentum operator has been developed. Mixed Number method has also been applied to Klein-Gordon equation. (2) We have applied Mixed number in Electrodynamics: Mixed Number version of Maxwell’s equation, the Electric and Magnetic field quantities and Lorentz Force has been found. (3) An associative transformation of Mixed Number numbers fulfilling Lorentz invariance requirement is developed. (4) We have applied Mixed number algebra as an extension of Complex number. Mixed numbers and the Quaternions have isomorphic correspondence, but they are different in algebraic details. The multiplication of unit Mixed number and the multiplication of unit Quaternions are different. Since Mixed Number has properties similar to those of Pauli matrix algebra, Mixed Number algebra is a more convenient tool to deal with Dirac equation.Keywords: mixed number, special relativity, quantum mechanics, electrodynamics, pauli matrix
Procedia PDF Downloads 367622 Children Protection in the Digital Space
Authors: Beverly Komen
Abstract:
Online crimes have been on the rise in the recent days, especially with the hit of the covid-19 pandemic. The coronavirus pandemic has led to an unprecedented rise in screen time, this means more families are relying on technology and digital solutions to keep children learning, spending more time on the virtual platforms can leave children vulnerable to online abuse and exploitation. With ease access of affordable phones, internet, and increased online activities, all children are at risk of being abused online hence making the digital space unsafe for children. With these increased use of technology and its accessibility, children are at risk of facing challenges such as access to inappropriate content, online grooming, identity theft, cyber bullying, among other risks. The big question is; as we enjoy the benefits brought in by technology, how do we ensure that our children are save in this digital space? With the analysis of the current trends, there is a gap in knowledge on people’s understanding on child online protection and safety measures when using the digital space. A survey conducted among 50 parents in Nairobi in Kenya indicated that there is a gap in knowledge on online protection of children and over 50 % of the participants shared that for sure they have no idea on how to protect children online. This paper seeks to address the concept of child protection in the digital space and come up with viable solutions in protecting children from online vices.Keywords: child protection, digital space, online risks, online grooming, cyber bulying, online child sexual exploitation, and abuse
Procedia PDF Downloads 187621 ECG Based Reliable User Identification Using Deep Learning
Authors: R. N. Begum, Ambalika Sharma, G. K. Singh
Abstract:
Identity theft has serious ramifications beyond data and personal information loss. This necessitates the implementation of robust and efficient user identification systems. Therefore, automatic biometric recognition systems are the need of the hour, and ECG-based systems are unquestionably the best choice due to their appealing inherent characteristics. The CNNs are the recent state-of-the-art techniques for ECG-based user identification systems. However, the results obtained are significantly below standards, and the situation worsens as the number of users and types of heartbeats in the dataset grows. As a result, this study proposes a highly accurate and resilient ECG-based person identification system using CNN's dense learning framework. The proposed research explores explicitly the calibre of dense CNNs in the field of ECG-based human recognition. The study tests four different configurations of dense CNN which are trained on a dataset of recordings collected from eight popular ECG databases. With the highest FAR of 0.04 percent and the highest FRR of 5%, the best performing network achieved an identification accuracy of 99.94 percent. The best network is also tested with various train/test split ratios. The findings show that DenseNets are not only extremely reliable but also highly efficient. Thus, they might also be implemented in real-time ECG-based human recognition systems.Keywords: Biometrics, Dense Networks, Identification Rate, Train/Test split ratio
Procedia PDF Downloads 164620 The Evolution of the Human Brain from the Hind Brain to the Fore Brain: Dialectics from the African Perspective in Understanding Stunted Development in Science and Technology
Authors: Philemon Wokoma Iyagba, Obey Onenee Christie
Abstract:
From the hindbrain, which is responsible for motor activities, to the forebrain, responsible for processing information related to complex cognitive activities, the human brain has continued to evolve over the years. This evolution- has been progressive, leading to advancements in science and technology. However, the development of science and technology in Africa, where ancient civilization arguably began, has been retrogressive. Dialectics was done by dissecting different opinions on the reason behind the stunted development of science and technology in Africa. The researchers proposed that the inability to sustain the technological advancements made by early Africans is due to poor or lack of replicability of the African knowledge-based system, almost no or poor documentation of adopted procedures and the approval-seeking mentality that cheaply paved the way for westernization which also led to the adulteration of the African way of life and education without making room for incorporating her identity and proper alignment of her rich cultural heritage in education and her enormous achievements before and during the middle age. This article discussed conceptual issues, with its positions based on established facts, the discussion was based on relevant literature and recommendations were made accordingly.Keywords: forebrain, hindbrain, dialectics from African perspective, development in science and technology
Procedia PDF Downloads 77619 The Morphology of Sri Lankan Text Messages
Authors: Chamindi Dilkushi Senaratne
Abstract:
Communicating via a text or an SMS (Short Message Service) has become an integral part of our daily lives. With the increase in the use of mobile phones, text messaging has become a genre by itself worth researching and studying. It is undoubtedly a major phenomenon revealing language change. This paper attempts to describe the morphological processes of text language of urban bilinguals in Sri Lanka. It will be a typological study based on 500 English text messages collected from urban bilinguals residing in Colombo. The messages are selected by categorizing the deviant forms of language use apparent in text messages. These stylistic deviations are a deliberate skilled performance by the users of the language possessing an in-depth knowledge of linguistic systems to create new words and thereby convey their linguistic identity and individual and group solidarity via the message. The findings of the study solidifies arguments that the manipulation of language in text messages is both creative and appropriate. In addition, code mixing theories will be used to identify how existing morphological processes are adapted by bilingual users in Sri Lanka when texting. The study will reveal processes such as omission, initialism, insertion and alternation in addition to other identified linguistic features in text language. The corpus reveals the most common morphological processes used by Sri Lankan urban bilinguals when sending texts.Keywords: bilingual, deviations, morphology, texts
Procedia PDF Downloads 271618 RSU Aggregated Message Delivery for VANET
Authors: Auxeeliya Jesudoss, Ashraph Sulaiman, Ratnakar Kotnana
Abstract:
V2V communication brings up several questions of scalability issues although message sharing in vehicular ad-hoc networks comprises of both Vehicle-to-Vehicle communications (V2V) and Vehicle to Infrastructure communication (V2I). It is not an easy task for a vehicle to verify all signatures of the messages sent by its neighboring vehicles in a timely manner, without resulting in message loss. Moreover, the communication overhead of a vehicle to authenticate another vehicle would increase together with the security of the system. Another issue to be addressed is the continuous mobility of vehicles which requires at least some information on the node’s own position to be revealed to the neighboring vehicles. This may facilitate the attacker to congregate information on a node’s position or its mobility patterns. In order to tackle these issues, this paper introduces a RSU aggregated message deliverance scheme called RAMeD. With RAMeD, roadside units (RSUs) are responsible for verifying the identity of the vehicles entering in its range, collect messages from genuine vehicles and to aggregate similar messages into groups before sending them to all the vehicles in its communication range. This aggregation will tremendously improve the rate of message delivery and reduce the message lose ratio by avoiding similar messages being sent to the vehicles redundantly. The proposed protocol is analyzed extensively to evaluate its merits and efficiency for vehicular communication.Keywords: vehicular ad-hoc networks, V2V, V2I, VANET communication, scalability, message aggregation
Procedia PDF Downloads 409617 Solving the Refugee Problem in the Modern State System: The Philosophical Dilemma of Sovereignty and Human Right
Authors: Xiaoman Dong
Abstract:
The refugee problem has a long history, but the scale and severity of modern refugee crises demand us to consider if the progress of political history exacerbates the refugee problem. This paper argues that although sovereignty owes its legitimacy to the protection of human rights, the modern state system complicates the refugee problem by first introducing then blurring the line between human rights and civil rights, and making national identity indispensable to basic livelihood and dignity. This paper first explains the source of the modern state system’s legitimacy by putting it in the context of social contract theories and the politics of nation-building. It then discusses how states create the concept of statelessness, which leads to more violations on human rights. Using historical records of the League of Nations High Commission for Refugees and the United Nations High Commissioner for Refugees, this paper reveals that neither the refugee problem of the Cold-War period nor the current refugee crisis is collateral damage of war, but rather the consequence of intentional exclusionary policies produced out of political interests. Finally, it contends that if the modern state system is to sustain, it cannot prioritize the protection of civil rights of a particular group over the protection of basic human rights of all.Keywords: burden sharing, human rights, legitimacy of state, positive externality, sovereignty
Procedia PDF Downloads 192616 Africa as Endemically a War Continent: Explaining the Changing Pattern of Armed Conflicts in Africa
Authors: Kenneth Azaigba
Abstract:
The history of post-colonial African States has been dubbed a history of endemic warfare in existing literature. Indeed, Africa political environment is characterized by a multiplicity of threats to peace and security. Africa's leading drivers of conflict include abundant (especially mineral) resources, personal rule and attendant political authoritarianism, manipulation of identity politics across ethnicity, marginalization of communities, as well as electoral mal-practices resulting in contested legitimacy and resultant violence. However, the character of armed conflicts in Africa is changing. This paper attempts to reconstruct the trajectory of armed conflicts in Africa and explain the changing pattern of armed conflict. The paper contends that large scale political violence in Africa is on the decline rendering the endemic thesis an inappropriate paradigm in explaining political conflicts in Africa. The paper also posits that though small scale conflicts are springing up and exhibiting trans-border dimensions, these patterns of armed conflicts are not peculiar to Africa but emerging waves of global conflicts. The paper explains that the shift in the scale of warfare in Africa is a function of a multiplicity of post-cold war global contradictions. Inclusive governance, social justice and economic security are articulated as workable panaceas for mitigating warfare in Africa.Keywords: Africa, conflicts, pattern, war
Procedia PDF Downloads 392615 Blockchain for Transport: Performance Simulations of Blockchain Network for Emission Monitoring Scenario
Authors: Dermot O'Brien, Vasileios Christaras, Georgios Fontaras, Igor Nai Fovino, Ioannis Kounelis
Abstract:
With the rise of the Internet of Things (IoT), 5G, and blockchain (BC) technologies, vehicles are becoming ever increasingly connected and are already transmitting substantial amounts of data to the original equipment manufacturers (OEMs) servers. This data could be used to help detect mileage fraud and enable more accurate vehicle emissions monitoring. This would not only help regulators but could enable applications such as permitting efficient drivers to pay less tax, geofencing for air quality improvement, as well as pollution tolling and trading platforms for transport-related businesses and EU citizens. Other applications could include traffic management and shared mobility systems. BC enables the transmission of data with additional security and removes single points of failure while maintaining data provenance, identity ownership, and the possibility to retain varying levels of privacy depending on the requirements of the applied use case. This research performs simulations of vehicles interacting with European member state authorities and European Commission BC nodes that are running hyperleger fabric and explores whether the technology is currently feasible for transport applications such as the emission monitoring use-case.Keywords: future transportation systems, technological innovations, policy approaches for transportation future, economic and regulatory trends, blockchain
Procedia PDF Downloads 177614 The Lived Experiences of Stigma in Non-offending Pedophiles
Authors: Rebecca Heron, Steal Adcock, Karen Parsonson
Abstract:
Non-offending pedophiles are an under- researched, hard to reach population. This group of individuals are often hesitant to come forward and fail to seek help ongoing stigma experienced in society.In order to better understand non-offending pedophiles experiences of their identity and the stigma they face, semi-structured qualitative interviews were conducted with 10 non-offending pedophiles, who were recruited through online support groups for individuals who have sexual attractions towards children. Participants were interviewed over skype, and the data was analysed using interpretative phenomenological analysis (IPA) approach, anda number of themes were generated from the rich data set produced. Four main themes emerged, providing insight into how non-offending pedophiles experience stigma. The themes included ‘stigma in relation to themselves’, ‘others’, ‘the media portrayal’and ‘impact of the stigma of MAP’s seeking treatment’. Findings are discussed in relation to existing literature, and practical recommendations are proposed to hopefully allow this population to feel more comfortable sharing their sexual interests, which will allow them to seek help resulting in them not offending and, ultimately, the prevention of sexual abuse. This study fills the void in terms of lack of research with this population, especially when it comes to qualitative in depth studies, including not just male minor attracted persons but female minor attracted persons as well.Keywords: pedophillia, stigma, non-offending pedophiles, minor attracted persons, prevention
Procedia PDF Downloads 128613 Exploring the Birth of Modern Art in Borneo, Post-War Era 1945 to 1970
Authors: Rahah Hasan, Faridah Sahari
Abstract:
This paper describes the development of modern art in Borneo, particularly in Sarawak, Sabah, and Brunei, after the Second World War until the 1970s. This was the period when the British Colonial government dictated the education system, which consequentially inculcated visual art through art and craft subjects imposed on all vernacular schools in Borneo. British influence within the state governance, social, and education system designed with Western ideology created not only a westernized society and mindset but at the same time generated artistic opportunities for emerging local painters to be involved in the initiation of Modern Art in Borneo. Through the historical method and analysis of primary and secondary data, it was obvious that the existence of colonial government departments and institutions such as museums and teaching colleges, and other social organizations in Borneo at that time contributed significantly to the artistic movement. The similar structure and motivation of development in other areas of Borneo confirmed that artistic affirmation of modern art advanced homogenously. Their understanding of easel painting as well as a unique interpretation of culture once distanced from traditional art, resulting in a new visual image that transcended their ethnicity and identity through new mediums and tools. These meticulous interventions modestly visualized in each painting, as discussed in this paper, hopefully, will give a deeper understanding and appreciation of the history of modern art in Borneo.Keywords: art history, Borneo art, fine art, modern art
Procedia PDF Downloads 143612 Forensic Science in Dr. Jekyll and Mr. Hyde: Trails of Utterson's Quest
Authors: Kyu-Jeoung Lee, Jae-Uk Choo
Abstract:
This paper focuses on investigating The Strange Case of Dr Jekyll and Mr Hyde from Utterson’s point of view, referring to: Gabriel John Utterson, a central character in the book. Utterson is no different from a forensic investigator, as he tries to collect evidence on the mysterious Mr. Hyde’s relationship to Dr. Jekyll. From Utterson's perspective, Jekyll is the 'victim' of a potential scandal and blackmail, and Hyde is the 'suspect' of a possible 'crime'. Utterson intends to figure out Hyde's identity, connect his motive with his actions, and gather witness accounts. During Utterson’s quest, the outside materials available to him along with the social backgrounds of Hyde and Jekyll will be analyzed. The archives left from Jekyll’s chamber will also play a part providing evidence. Utterson will investigate, based on what he already knows about Jekyll his whole life, and how Jekyll had acted in his eyes until he was gone, and finding out possible explanations for Jekyll's actions. The relationship between Jekyll and Hyde becomes the major question, as the social background offers clues pointing in the direction of illegitimacy and prostitution. There is still a possibility that Jekyll and Hyde were, in fact, completely different people. Utterson received a full statement and confession from Jekyll himself at the end of the story, which gives the reader the possible truth on what happened. Stevenson’s Dr. Jekyll and Mr. Hyde led readers, as it did Utterson, to find the connection between Hyde and Jekyll using methods of history, culture, and science. Utterson's quest to uncover Hyde shows an example of applying the various fields to in his act to see if Hyde's inheritance was legal. All of this taken together could technically be considered forensic investigation.Keywords: Dr. Jekyll and Mr. Hyde, forensic investigation, illegitimacy, prostitution, Robert Louis Stevenson
Procedia PDF Downloads 211611 The Application of Insects in Forensic Investigations
Authors: Shirin Jalili, Hadi Shirzad, Samaneh Nabavi, Somayeh Khanjani
Abstract:
Forensic entomology is the science of study and analysis of insects evidences to aid in criminal investigation. Being aware of the distribution, biology, ecology and behavior of insects, which are founded at crime scene can provide information about when, where and how the crime has been committed. It has many application in criminal investigations. Its main use is estimation of the minimum time after death in suspicious death. The close association between insects and corpses and the use of insects in criminal investigations is the subject of forensic entomology. Because insects attack to the decomposing corpse and spawning on it from the initial stages. Forensic scientists can estimate the postmortem index by studying the insects population and the developing larval stages.In addition, toxicological and molecular studies of these insects can reveal the cause of death or even the identity of a victim. It also be used to detect drugs and poisons, and determination of incident location. Gathering robust entomological evidences is made possible for experts by recent Techniques. They can provide vital information about death, corpse movement or burial, submersion interval, time of decapitation, identification of specific sites of trauma, post-mortem artefacts on the body, use of drugs, linking a suspect to the scene of a crime, sexual molestations and the identification of suspects.Keywords: Forensic entomology, post mortem interval, insects, larvae
Procedia PDF Downloads 503610 Analyzing Students' Writing in an English Code-Mixing Context in Nepali: An Ecological and Systematic Functional Approach
Authors: Binod Duwadi
Abstract:
This article examines the language and literacy practices of English Code-mixing in Nepalese Classroom. Situating the study within an ecological framework, a systematic functional linguistic (SFL) approach was used to analyze students writing in two Neplease schools. Data collection included interviews with teachers, classroom observations, instructional materials, and focal students’ writing samples. Data analyses revealed vastly different language ecologies between the schools owing to sharp socioeconomic stratification, the structural organization of schools, and the pervasiveness of standard language ideology, with stigmatizes English code mixing (ECM) and privileges Standard English in schools. Functional analysis of students’ writing showed that the nature of the writing tasks at the schools created different affordances for exploiting lexicogrammatically choices for meaning making-enhancing them in the case of one school but severely restricting them in the case of another- perpetuating the academic disadvantage for code mixing speakers. Recommendations for structural and attitudinal changes through teacher training and implementation of approaches that engage students’ bidialectal competence for learning are made as important first steps towards addressing educational inequities in Nepalese schools.Keywords: code-mixing, ecological perspective, systematic functional approach, language and identity
Procedia PDF Downloads 124609 Transgender Community in Pakistan through the Lens of Television Dramas
Authors: Ashbeelah Shafaqat Ali
Abstract:
Pakistan is a country where the transgender community has not been accepted as a third gender yet, but in recent years Pakistani drama industry has taken an initiative to include Transgender characters in the past few years. This research based on qualitative method i.e. content analysis and in-depth interviews investigates the depiction of transgender community in Pakistani television dramas. This study examined two dramas i.e.' Khuda Mera Bhi Hai' and 'Alif Allah Aur Insaan' to analyze the representation of transgender community whereas, in-depth Interviews from 15 transgender people lived in Lahore to observe their opinion regarding their representation in Pakistani television dramas. Snow-ball sampling technique was used for conducting interviews from the transgender community. The results concluded that transgender community did not get equal coverage in Pakistani television dramas but inclusion as characters were observed. This study is helpful in providing a base for observing role of Pakistani television dramas in the development of transgender identity. The major finding revealed is that the inclusion of representation of transgender community in Pakistani television dramas has indicated a successful development towards positive representation. Although, it was suggested by the interviewers that before producing a television drama, appropriate research must be conducted to depict the real life story, problems and struggles of the transgender community. Furthermore, it was analyzed that only fair and equal representation of transgender community by Pakistani drama industry can be beneficial in promoting the third gender rights in the society.Keywords: Pakistani dramas, portrayal, stereotypes, transgender
Procedia PDF Downloads 190608 A Distributed Cryptographically Generated Address Computing Algorithm for Secure Neighbor Discovery Protocol in IPv6
Authors: M. Moslehpour, S. Khorsandi
Abstract:
Due to shortage in IPv4 addresses, transition to IPv6 has gained significant momentum in recent years. Like Address Resolution Protocol (ARP) in IPv4, Neighbor Discovery Protocol (NDP) provides some functions like address resolution in IPv6. Besides functionality of NDP, it is vulnerable to some attacks. To mitigate these attacks, Internet Protocol Security (IPsec) was introduced, but it was not efficient due to its limitation. Therefore, SEND protocol is proposed to automatic protection of auto-configuration process. It is secure neighbor discovery and address resolution process. To defend against threats on NDP’s integrity and identity, Cryptographically Generated Address (CGA) and asymmetric cryptography are used by SEND. Besides advantages of SEND, its disadvantages like the computation process of CGA algorithm and sequentially of CGA generation algorithm are considerable. In this paper, we parallel this process between network resources in order to improve it. In addition, we compare the CGA generation time in self-computing and distributed-computing process. We focus on the impact of the malicious nodes on the CGA generation time in the network. According to the result, although malicious nodes participate in the generation process, CGA generation time is less than when it is computed in a one-way. By Trust Management System, detecting and insulating malicious nodes is easier.Keywords: NDP, IPsec, SEND, CGA, modifier, malicious node, self-computing, distributed-computing
Procedia PDF Downloads 278607 CEO Narcissism and Gender Diversity
Authors: Emma Garcia-Meca, Jennifer Martinez-Ferrero, Camino Ramon Llorens
Abstract:
This paper provides insights into how narcissistic Chief Executive Officers (CEOs) influence the presence of women in top management teams (TMT). We also study whether a CEO's power and gender and the gender diversity of the firm's board moderate the relationship between CEO narcissism and TMT gender diversity. Our results reveal that narcissistic CEOs are less likely to support women in TMTs, confirming that CEO personality traits influence team structure. Further results suggest that this aversion increases as the CEO's power grows when female representation on boards decreases and when the CEO is a woman. This paper integrates theories that use the social psychology and upper echelon theories, offering a greater understanding of how CEO personality traits influence the structure of firms. We also contribute to the knowledge about how different governance characteristics can moderate the influence of narcissistic CEOs on women in TMTs, highlighting the relevance of governance traits that increase the effect of narcissism. The results demonstrate different female behavior toward promoting TMT gender equality depending on the specific position of women in the firm's hierarchy and their psychological attributes. We find that women directors support social identity values, and narcissistic female CEOs act like queen bees.Keywords: gender diversity, board, corporate governance, female CEO, management
Procedia PDF Downloads 121606 Analytical Formulae for the Approach Velocity Head Coefficient
Authors: Abdulrahman Abdulrahman
Abstract:
Critical depth meters, such as abroad crested weir, Venture Flume and combined control flume are standard devices for measuring flow in open channels. The discharge relation for these devices cannot be solved directly, but it needs iteration process to account for the approach velocity head. In this paper, analytical solution was developed to calculate the discharge in a combined critical depth-meter namely, a hump combined with lateral contraction in rectangular channel with subcritical approach flow including energy losses. Also analytical formulae were derived for approach velocity head coefficient for different types of critical depth meters. The solution was derived by solving a standard cubic equation considering energy loss on the base of trigonometric identity. The advantage of this technique is to avoid iteration process adopted in measuring flow by these devices. Numerical examples are chosen for demonstration of the proposed solution.Keywords: broad crested weir, combined control meter, control structures, critical flow, discharge measurement, flow control, hydraulic engineering, hydraulic structures, open channel flow
Procedia PDF Downloads 275605 The Impact of Brand-Related User-Generated Content on Brand Positioning: A Study on Private Higher Education Institutes in Vietnam
Authors: Charitha Harshani Perera, Rajkishore Nayak, Long Thang Van Nguyen
Abstract:
With the advent of social media, Vietnam has changed the way customers perceive the information about the brand. In the context of higher education, the adoption of social media has received attention with the increasing rate of social media usage among undergraduates. Brand-related user-generated content (UGC) on social media emphasizes the social ties between users and users’ participation, which promotes the communication to build and maintain the relationship with the brands. Although brand positioning offers a significant competitive advantage, the association with brand-related user-generated content in social media with brand positioning in the context of higher education is still an under-researched area. Accordingly, using social identity theory and social exchange theory, this research aims to deepen our understanding of the influence of brand-related user-generated content on brand positioning and purchase intention. Employing a quantitative survey design,384 Vietnamese undergraduates were selected based on purposive sampling. The findings suggest that brand-related user-generated content influence brand positioning and brand choice intention. However, there is a significant mediating effect of the reliability and understandability of the content.Keywords: brand positioning, brand-related user-generated content, emerging countries, higher education
Procedia PDF Downloads 178