Search results for: identity threat
1424 Commercial Surrogacy and Rights of the Children Born
Authors: Neha Tiwari
Abstract:
Rights are prerequisite for individuals to pursue their aims and enrich themselves. Laski has said rights are, ‘conditions of social life without which no man can seek himself at his best.’ However with superior technology, rights of many individuals are at stake as well. One such sufferer is the babies born out of the practice of commercial surrogacy. Commercial surrogacy has emerged as the most viable option for the childless couples. The practice has garnered lot of debate in both academia and media. Some argue for a complete ban and some for strict rules and regulation. Most of the time the debate is regarding the rights of the surrogate, something which we cannot ignore. Equally important are the rights of the children born out of such arrangements. However, not much attention is being paid to them. Recently, a controversy emerged when a surrogate gave birth to twins. One of the babies, Gammy born with down syndrome was left behind by the couple. Gammy could die because his poor Thai surrogate mother may not be able to pay for his treatment. Even if he survives, he will never know his twin sister as her identity would never be disclosed. This is just one of many such cases where the future of such babies is being played with. If the rights of these children are not taken care of many of them will have to bear the brunt of society's ignorance and perhaps live with a scar which won't heal in their lifetime.Keywords: babies, commercial surrogacy, rights, technology
Procedia PDF Downloads 2871423 Multi-Tooled Robotic Hand for Tele-Operation of Explosive Devices
Authors: Faik Derya Ince, Ugur Topgul, Alp Gunay, Can Bayoglu, Dante J. Dorantes-Gonzalez
Abstract:
Explosive attacks are arguably the most lethal threat that may occur in terrorist attacks. In order to counteract this issue, explosive ordnance disposal operators put their lives on the line to dispose of a possible improvised explosive device. Robots can make the disposal process more accurately and saving human lives. For this purpose, there is a demand for more accurate and dexterous manipulating robotic hands that can be teleoperated from a distance. The aim of this project is to design a robotic hand that contains two active and two passive DOF for each finger, as well as a minimum set of tools for mechanical cutting and screw driving within the same robotic hand. Both hand and toolset, are teleoperated from a distance from a haptic robotic glove in order to manipulate dangerous objects such as improvised explosive devices. SolidWorks® Computer-Aided Design, computerized dynamic simulation, and MATLAB® kinematic and static analysis were used for the robotic hand and toolset design. Novel, dexterous and robust solutions for the fingers were obtained, and six servo motors are used in total to remotely control the multi-tooled robotic hand. This project is still undergoing and presents currents results. Future research steps are also presented.Keywords: Explosive Manipulation, Robotic Hand, Tele-Operation, Tool Integration
Procedia PDF Downloads 1411422 Comparison of Different in vitro Models of the Blood-Brain Barrier for Study of Toxic Effects of Engineered Nanoparticles
Authors: Samir Dekali, David Crouzier
Abstract:
Due to their new physico-chemical properties engineered nanoparticles (ENPs) are increasingly employed in numerous industrial sectors (such as electronics, textile, aerospace, cosmetics, pharmaceuticals, food industry, etc). These new physico-chemical properties can also represent a threat for the human health. Consumers can notably be exposed involuntarily by different routes such as inhalation, ingestion or through the skin. Several studies recently reported a possible biodistribution of these ENPs on the blood-brain barrier (BBB). Consequently, there is a great need for developing BBB in vitro models representative of the in vivo situation and capable of rapidly and accurately assessing ENPs toxic effects and their potential translocation through this barrier. In this study, several in vitro models established with micro-endothelial brain cell lines of different origins (bEnd.3 mouse cell line or a new human cell line) co-cultivated or not with astrocytic cells (C6 rat or C8-B4 mouse cell lines) on Transwells® were compared using different endpoints: trans-endothelial resistance, permeability of the Lucifer yellow and protein junction labeling. Impact of NIST diesel exhaust particles on BBB cell viability is also discussed.Keywords: nanoparticles, blood-brain barrier, diesel exhaust particles, toxicology
Procedia PDF Downloads 4401421 Vocabulary Paradigm in Learning Romanian As a Foreign Language
Authors: Georgiana Ciobotaru
Abstract:
The vocabulary that foreign students assimilate once they start studying the Romanian language must allow them to develop the linguistic competence of oral and written expression, but also the intercultural one, necessary for their integration into the new socio-cultural environment. Therefore, the familiarization courses with Romanian as a foreign language aim at fundamental language acquisitions in order to obtain the expected level of Romanian language. They also relate differently to the new culture and the new language they come in contact with, having a distinct way of expressing themselves. Foreign students want to continue their university and postgraduate studies at specialized faculties in the country; therefore, they need both a general language for their integration into society and for interaction with others, Romanians or students from countries other than their own, but also from a specialized language that facilitates didactic communication and professional development. The complexity of the vocabulary must thus cover the daily communication needs, but also the subsequent evolution of each one. This paper aims to illustrate the most important semantic fields that students must assimilate in order to crystallize a linguistic identity in the new context of their personal and professional development and to help them cope with the culture shock.Keywords: integration, intercultural, language, linguistic, vocabulary
Procedia PDF Downloads 1951420 Challenges of Integrating Islamic Education with Contemporary Secular System in Igaland, Kogi State Of Nigeria
Authors: Yunusa Odiba
Abstract:
Islam, from its root is a divine religion and it does not exercise anything except within the scope of its divinity-its culture, tradition morality, and the like. The damage done to the legacies, traditions, culture, morality, viability, continued existence and relevance of the Islamic religious way of life by the prevalent western secular education system in the Muslim world has become a thing of interest to many scholars especially, the Muslim scholars, hence, advocating the integration of Islamic education with the western circular educational system. The aim is to produce a new generation of dedicated Muslims whose education has prepared them for the challenges of contemporary materialistic circulation alongside real Islamic knowledge. This paper, however, examines the process of integrating Islamic schools with the contemporary western based schools that would under-take the unification which should function as basic organ of Muslim ideological revivalism, cultural retention, identity formation, socio-economic development, and scientific and ecological inventiveness.Keywords: challenges, integrating, Islamic education, secular system, Igalaland
Procedia PDF Downloads 6921419 A Curricular Approach to Organizational Mentoring Programs: The Integrated Mentoring Curriculum Model
Authors: Christopher Webb
Abstract:
This work presents a new model of mentoring in an organizational environment and has important implications for both practice and research, the model frames the organizational environment as organizational curriculum, which includes the elements that affect learning within the organization. This includes the organizational structure and culture, roles within the organization, and accessibility of knowledge. The program curriculum includes the elements of the mentoring program, including materials, training, and scheduled events for the program participants. The term dyadic curriculum is coined in this work. The dyadic curriculum describes the participation, behavior, and identities of the pairs participating in mentorships. This also includes the identity work of the participants and their views of each other. Much of this curriculum is unprescribed and is unique within each dyad. It describes how participants mediate the elements of organizational and program curricula. These three curricula interact and affect each other in predictable ways. A detailed example of a mentoring program framed in this model is provided.Keywords: curriculum, mentoring, organizational learning and development, social learning
Procedia PDF Downloads 2021418 Enactments of Global Citizenship Education: Social Justice in Public Spheres of Education
Authors: Sabrina Jafralie
Abstract:
This proposed chapter explains how civic religious literacy is a means to promote social justice in Canada. It will first present the specific conception of global citizenship education that will undergird the discussion in the chapter. Then, it will offer a conception of civic religious literacy that explains how it promotes social justice as a form of global citizenship education. To illustrate this point, I will list specific examples of social and political inequities in Canada, such as hate crime statistics from 2013-2018 across the country and in specific provinces and cities. I will also highlight different types of discrimination, such as that towards religious minorities, Indigenous peoples, and those that conflate race and religion, and other intersections of identity that civic religious literacy can address. To conclude this initial section of the chapter, I will cite international studies that discuss religious literacy as a means to promote characteristics and aims of global citizenship education.Keywords: Civic Literacy, Pedagogy, Quebec, Social Justice
Procedia PDF Downloads 1631417 Response of Chickpea (Cicer arietinum L.) Genotypes to Drought Stress at Different Growth Stages
Authors: Ali. Marjani, M. Farsi, M. Rahimizadeh
Abstract:
Chickpea (Cicer arietinum L.) is one of the important grain legume crops in the world. However, drought stress is a serious threat to chickpea production, and development of drought-resistant varieties is a necessity. Field experiments were conducted to evaluate the response of 8 chickpea genotypes (MCC* 696, 537, 80, 283, 392, 361, 252, 397) and drought stress (S1: non-stress, S2: stress at vegetative growth stage, S3: stress at early bloom, S4: stress at early pod visible) at different growth stages. Experiment was arranged in split plot design with four replications. Difference among the drought stress time was found to be significant for investigated traits except biological yield. Differences were observed for genotypes in flowering time, pod information time, physiological maturation time and yield. Plant height reduced due to drought stress in vegetative growth stage. Stem dry weight reduced due to drought stress in pod visibly. Flowering time, maturation time, pod number, number of seed per plant and yield cause of drought stress in flowering was also reduced. The correlation between yield and number of seed per plant and biological yield was positive. The MCC283 and MCC696 were the high-tolerance genotypes. These results demonstrated that drought stress delayed phonological growth in chickpea and that flowering stage is sensitive.Keywords: chickpea, drought stress, growth stage, tolerance
Procedia PDF Downloads 2611416 Integration of Wireless Sensor Networks and Radio Frequency Identification (RFID): An Assesment
Authors: Arslan Murtaza
Abstract:
RFID (Radio Frequency Identification) and WSN (Wireless sensor network) are two significant wireless technologies that have extensive diversity of applications and provide limitless forthcoming potentials. RFID is used to identify existence and location of objects whereas WSN is used to intellect and monitor the environment. Incorporating RFID with WSN not only provides identity and location of an object but also provides information regarding the condition of the object carrying the sensors enabled RFID tag. It can be widely used in stock management, asset tracking, asset counting, security, military, environmental monitoring and forecasting, healthcare, intelligent home, intelligent transport vehicles, warehouse management, and precision agriculture. This assessment presents a brief introduction of RFID, WSN, and integration of WSN and RFID, and then applications related to both RFID and WSN. This assessment also deliberates status of the projects on RFID technology carried out in different computing group projects to be taken on WSN and RFID technology.Keywords: wireless sensor network, RFID, embedded sensor, Wi-Fi, Bluetooth, integration, time saving, cost efficient
Procedia PDF Downloads 3341415 The Shadow of Terrorism in the World Tourism Industry: Impacts, Prevention and Recovery Strategies
Authors: Maria Brás
Abstract:
The main purpose of the presentation is to identify the impacts and appropriate measures to prevent potential attacks, or minimize the risk of an attack in tourist destination. Terrorism has been growing in the shadow of unpredictability, however, is possible to minimize the danger of a terrorist attack by doing the: (1) recognition; (2); evaluation; (3) avoidance; (4) threat reduction. The vulnerability of tourism industry to terrorism is an undeniable fact, and terrorists know it. They use this advantage attacking tourists for very specific reasons, such as the: (1) international coverage by the media, “if it bleeds it leads” ; (2) chances of getting different nationalities at the same place and time; (3) possibility of destroyed the economy of a destination, or destinations (“terrorism contamination effect”), through the reduction of tourist demand; (4) psychological, and social disruption based on fear of negative consequences. Security incidents, such as terrorism, include different preventive measures that can be conducted in partnership with: tourism industry (hotels, airports, tourist attractions, among others); central government; public and/or private sector; local community; and media. The recovery strategies must be based on the dissemination of positive information to the media; in creating new marketing strategies that emphasize the social and cultural values of the destination; encourage domestic tourism; get government, or state, financial support.Keywords: terrorism, tourism, safety, security, impacts, prevention, recovery
Procedia PDF Downloads 3431414 Climate Refugees In International Law – Analyzing The Legal Framework
Authors: Kristof Lukas Heidemann
Abstract:
The adverse effects of climate change, such as rising sea levels, increased temperatures, and extreme weather events are already posing a significant threat to the lives of people living in extreme weather zones all around the globe and could displace more than a billion people worldwide in the upcoming decades, causing a wave of climate-induced migration. Notwithstanding the urgency of the situation, this situation has so far not been addressed in a specific international treaty. Therefore, this paper analyses whether solutions might be found through existing legal framework. Accordingly, the investigation scrutinizes the possibilities of overcoming the conceptual challenge of combining climate law, refugee law, and human rights law. To this end, the study particularly reflects upon the example of Pacific Islanders by assessing the reasoning within the decisions Ioane Teitota v. New Zealand and Daniel Billy and Others v. Australia. The paper concludes that the differences in objective, scope, and enforcement of the three fields are too fundamental to be surmounted by overlapping concepts, e.g. state responsibility or the non-refoulement principle. Consequently, states are urged to tackle the problem with a separate international treaty in which the advantages of the different traditions are incorporated into a new protection mechanism.Keywords: climate change, climate treaties, forcibly displaced persons, human rights, improving and creating advanced knowledge of concepts, non-refoulement, state responsibility, refugee law, refugee status
Procedia PDF Downloads 81413 Context Aware Anomaly Behavior Analysis for Smart Home Systems
Authors: Zhiwen Pan, Jesus Pacheco, Salim Hariri, Yiqiang Chen, Bozhi Liu
Abstract:
The Internet of Things (IoT) will lead to the development of advanced Smart Home services that are pervasive, cost-effective, and can be accessed by home occupants from anywhere and at any time. However, advanced smart home applications will introduce grand security challenges due to the increase in the attack surface. Current approaches do not handle cybersecurity from a holistic point of view; hence, a systematic cybersecurity mechanism needs to be adopted when designing smart home applications. In this paper, we present a generic intrusion detection methodology to detect and mitigate the anomaly behaviors happened in Smart Home Systems (SHS). By utilizing our Smart Home Context Data Structure, the heterogeneous information and services acquired from SHS are mapped in context attributes which can describe the context of smart home operation precisely and accurately. Runtime models for describing usage patterns of home assets are developed based on characterization functions. A threat-aware action management methodology, used to efficiently mitigate anomaly behaviors, is proposed at the end. Our preliminary experimental results show that our methodology can be used to detect and mitigate known and unknown threats, as well as to protect SHS premises and services.Keywords: Internet of Things, network security, context awareness, intrusion detection
Procedia PDF Downloads 1911412 Unpacking Systemic Racism Within Educational Leadership
Authors: Henry Lee, Daniel Shiu
Abstract:
Educational organizations are currently exploring ways to increase equity, diversity, and inclusion (EDI), and this is now evident within the K-12 school system, universities, and teacher unions. These organizations have been creating and implementing new EDI specific policies. Their goal is to provide the framework and supports needed to establish EDI into the organizational culture. However, the implementation of EDI policies does not always lead to the intended outcomes. The purpose of this paper is to explore some factors regarding why the implementation of EDI policies within educational organizations can be problematic. This includes how Whiteness is replicated, promoted, and celebrated in educational leadership. How Whiteness and White supremacy are operationalized by BIPOC leaders within educational spaces, and how EDI specific training fails to understand the different training needed for both IBPOC (Indigenous, Black, People of Colour) and non-IBPOC leaders. This paper also addresses the model minority myth and how this informs and guides IBPOC identity and leadership within a predominately White dominant leadership in education.Keywords: critical race theory, equity & diversity & inclusion, educational leadership, intersectionality
Procedia PDF Downloads 1331411 Self in Networks: Public Sphere in the Era of Globalisation
Authors: Sanghamitra Sadhu
Abstract:
A paradigm shift from capitalism to information technology is discerned in the era globalisation. The idea of public sphere, which was theorized in terms of its decline in the wake of the rise of commercial mass media has now emerged as a transnational or global sphere with the discourse being dominated by the ‘network society’. In other words, the dynamic of globalisation has brought about ‘a spatial turn’ in the social and political sciences which is also manifested in the public sphere, Especially the global public sphere. The paper revisits the Habermasian concept of the public sphere and focuses on the various social networking sites with their plausibility to create a virtual global public sphere. Situating Habermas’s notion of the bourgeois public sphere in the present context of global public sphere, it considers the changing dimensions of the public sphere across time and examines the concept of the ‘public’ with its shifting transformation from the concrete collective to the fluid ‘imagined’ category. The paper addresses the problematic of multimodal self-portraiture in the social networking sites as well as various online diaries/journals with an attempt to explore the nuances of the networked self.Keywords: globalisation, network society, public sphere, self-fashioning, identity, autonomy
Procedia PDF Downloads 4161410 Emotional Artificial Intelligence and the Right to Privacy
Authors: Emine Akar
Abstract:
The majority of privacy-related regulation has traditionally focused on concepts that are perceived to be well-understood or easily describable, such as certain categories of data and personal information or images. In the past century, such regulation appeared reasonably suitable for its purposes. However, technologies such as AI, combined with ever-increasing capabilities to collect, process, and store “big data”, not only require calibration of these traditional understandings but may require re-thinking of entire categories of privacy law. In the presentation, it will be explained, against the background of various emerging technologies under the umbrella term “emotional artificial intelligence”, why modern privacy law will need to embrace human emotions as potentially private subject matter. This argument can be made on a jurisprudential level, given that human emotions can plausibly be accommodated within the various concepts that are traditionally regarded as the underlying foundation of privacy protection, such as, for example, dignity, autonomy, and liberal values. However, the practical reasons for regarding human emotions as potentially private subject matter are perhaps more important (and very likely more convincing from the perspective of regulators). In that respect, it should be regarded as alarming that, according to most projections, the usefulness of emotional data to governments and, particularly, private companies will not only lead to radically increased processing and analysing of such data but, concerningly, to an exponential growth in the collection of such data. In light of this, it is also necessity to discuss options for how regulators could address this emerging threat.Keywords: AI, privacy law, data protection, big data
Procedia PDF Downloads 881409 Use of Protection Motivation Theory to Assess Preventive Behaviors of COVID-19
Authors: Maryam Khazaee-Pool, Tahereh Pashaei, Koen Ponnet
Abstract:
Background: The global prevalence and morbidity of Coronavirus disease 2019 (COVID-19) are high. Preventive behaviors are proven to reduce the damage caused by the disease. There is a paucity of information on determinants of preventive behaviors in response to COVID-19 in Mazandaran province, north of Iran. So, we aimed to evaluate the protection motivation theory (PMT) in promoting preventive behaviors of COVID-19 in Mazandaran province. Materials and Methods: In this descriptive cross-sectional study, 1220 individuals participated. They were selected via social networks using convenience sampling in 2020. Data were collected online using a demographic questionnaire and a valid and reliable scale based on PMT. Data analysis was done using the Pearson correlation coefficient and linear regression in SPSS V24. Result: The mean age of the participants was 39.34±8.74 years. The regression model showed perceived threat (ß =0.033, P =0.007), perceived costs (ß=0.039, P=0.045), perceived self-efficacy (ß =0.116, P>0.001), and perceived fear (ß=0.131, P>0.001) as the significant predictors of COVID-19 preventive behaviors. This model accounted for 78% of the variance in these behaviors. Conclusion: According to constructs of the PMT associated with protection against COVID-19, educational programs and health promotion based on the theory and benefiting from social networks could be helpful in increasing the motivation of people towards protective behaviors against COVID-19.Keywords: questionnaire development, validation, intention, prevention, covid-19
Procedia PDF Downloads 421408 The Phenomenon: Harmonious Bilingualism in America
Authors: Irdawati Bay Nalls
Abstract:
This study looked at Bilingual First Language Acquisition (BFLA) Spanish-English Mexican Americans across an elementary public school in the United States and the possibility of maintaining harmonious bilingualism. Adopting a phenomenological approach, with a focus on the status of bilingualism in education within a marginalized community, classroom observations, and small group and one-on-one interviews were conducted. This study explored the struggles of these bilinguals as they acculturated in America through their attempt to blend heritage and societal languages and cultural practices. Results revealed that bilinguals as young as 5 years old expressed their need to retain Spanish as a heritage language while learning English. 12 years old foresee that Spanish will not be taught to them in schools and highlighted the need to learn Spanish outside the school environments. Their voices revealed counter-narratives on identity and the need to maintain harmonious bilingualism as these students strived to give equal importance to the learning of English and Spanish as first languages despite the setbacks faced.Keywords: BFLA, Mexican-American, bilingual, harmonious bilingualism
Procedia PDF Downloads 1421407 Blockchain’s Feasibility in Military Data Networks
Authors: Brenden M. Shutt, Lubjana Beshaj, Paul L. Goethals, Ambrose Kam
Abstract:
Communication security is of particular interest to military data networks. A relatively novel approach to network security is blockchain, a cryptographically secured distribution ledger with a decentralized consensus mechanism for data transaction processing. Recent advances in blockchain technology have proposed new techniques for both data validation and trust management, as well as different frameworks for managing dataflow. The purpose of this work is to test the feasibility of different blockchain architectures as applied to military command and control networks. Various architectures are tested through discrete-event simulation and the feasibility is determined based upon a blockchain design’s ability to maintain long-term stable performance at industry standards of throughput, network latency, and security. This work proposes a consortium blockchain architecture with a computationally inexpensive consensus mechanism, one that leverages a Proof-of-Identity (PoI) concept and a reputation management mechanism.Keywords: blockchain, consensus mechanism, discrete-event simulation, fog computing
Procedia PDF Downloads 1381406 Fingerprint Image Encryption Using a 2D Chaotic Map and Elliptic Curve Cryptography
Authors: D. M. S. Bandara, Yunqi Lei, Ye Luo
Abstract:
Fingerprints are suitable as long-term markers of human identity since they provide detailed and unique individual features which are difficult to alter and durable over life time. In this paper, we propose an algorithm to encrypt and decrypt fingerprint images by using a specially designed Elliptic Curve Cryptography (ECC) procedure based on block ciphers. In addition, to increase the confusing effect of fingerprint encryption, we also utilize a chaotic-behaved method called Arnold Cat Map (ACM) for a 2D scrambling of pixel locations in our method. Experimental results are carried out with various types of efficiency and security analyses. As a result, we demonstrate that the proposed fingerprint encryption/decryption algorithm is advantageous in several different aspects including efficiency, security and flexibility. In particular, using this algorithm, we achieve a margin of about 0.1% in the test of Number of Pixel Changing Rate (NPCR) values comparing to the-state-of-the-art performances.Keywords: arnold cat map, biometric encryption, block cipher, elliptic curve cryptography, fingerprint encryption, Koblitz’s encoding
Procedia PDF Downloads 2041405 Memory, Self, and Time: A Bachelardian Perspective
Authors: Michael Granado
Abstract:
The French philosopher Gaston Bachelard’s philosophy of time is articulated in his two works on the subject, the Intuition of the Instant (1932) and his The Dialectic of Duration (1936). Both works present a systematic methodology predicated upon the assumption that our understanding of time has radically changed as a result of Einstein and subsequently needs to be reimagined. Bachelard makes a major distinction in his discussion of time: 1. Time as it is (physical time), 2. Time as we experience it (phenomenological time). This paper will focus on the second distinction, phenomenological time, and explore the connections between Bachelard’s work and contemporary psychology. Several aspects of Bachelard’s philosophy of time nicely complement our current understanding of memory and self and clarify how the self relates to experienced time. Two points, in particular, stand out; the first is the relative nature of subjective time, and the second is the implications of subjective time in the formation of the narrative self. Bachelard introduces two philosophical concepts to explain these points: rhythmanalysis and reverie. By exploring these concepts, it will become apparent that there is an undeniable link between memory, self, and time. Through the use of narrative self, the individual connects and links memories and time together to form a sense of personal identity.Keywords: Gaston Bachelard, memory, self, time
Procedia PDF Downloads 1651404 Fulani Herdsmen and the Threat to Grassroots Security in Rural Nigeria
Authors: Akachi Odoemene
Abstract:
There is an ongoing grassroots war in Nigeria, particularly in its north central zone, as well as all through its southern parts, which have been most bloody. The war is between Fulani herdsmen and farming communities – an age-long problem which has escalated in the last decade and has assumed a very deadly dimension. In a typical scenario, Fulani herdsmen move into non-Fulani homelands with their cattle which graze on local farmlands, destroying farmers’ crops. This provokes their victims – the farmers – to acts of resistance, preventing the Fulani and their cattle from entering into farmlands. In some cases, there have been incidences of killing and/or stealing cattle, or poisoning of fields. In response, the herders wedge deadly attacks on farming communities, leading to the death of thousands of people. To be sure, this has been a major factor of instability in the rural areas of Nigeria. This paper aims at engaging the issues and cross-cutting issues of interest, as well as providing context and perspectives to the violent conflicts between Fulani herders and local communities in Nigeria. It particularly interrogates four central issues: (1) the nature and dynamics of the crisis, (2) the positions and stakes of the parties to the crisis, (3) the remedies available for containing/managing the conflicts and their desirability, and (4) perspectives on the positions of government(s) (and the African Union) on this conflict. Both primary and secondary sources were used for the purposes of this essay.Keywords: Fulani Herdsmen, violent conflicts and insecurity, sustainable remedies, Nigeria
Procedia PDF Downloads 2541403 Transportation Mode Classification Using GPS Coordinates and Recurrent Neural Networks
Authors: Taylor Kolody, Farkhund Iqbal, Rabia Batool, Benjamin Fung, Mohammed Hussaeni, Saiqa Aleem
Abstract:
The rising threat of climate change has led to an increase in public awareness and care about our collective and individual environmental impact. A key component of this impact is our use of cars and other polluting forms of transportation, but it is often difficult for an individual to know how severe this impact is. While there are applications that offer this feedback, they require manual entry of what transportation mode was used for a given trip, which can be burdensome. In order to alleviate this shortcoming, a data from the 2016 TRIPlab datasets has been used to train a variety of machine learning models to automatically recognize the mode of transportation. The accuracy of 89.6% is achieved using single deep neural network model with Gated Recurrent Unit (GRU) architecture applied directly to trip data points over 4 primary classes, namely walking, public transit, car, and bike. These results are comparable in accuracy to results achieved by others using ensemble methods and require far less computation when classifying new trips. The lack of trip context data, e.g., bus routes, bike paths, etc., and the need for only a single set of weights make this an appropriate methodology for applications hoping to reach a broad demographic and have responsive feedback.Keywords: classification, gated recurrent unit, recurrent neural network, transportation
Procedia PDF Downloads 1371402 The Effect of Brand Mascots on Consumers' Purchasing Behaviors
Authors: Isari Pairoa, Proud Arunrangsiwed
Abstract:
Brand mascots are the cartoon characters, which are mainly designed for advertising or other related marketing purposes. Many brand mascots are extremely popular, since they were presented in commercial advertisements and Line Stickers. Brand Line Stickers could lead the users to identify with the brand and brand mascots, where might influence users to become loyal customers, and share the identity with the brand. The objective of the current study is to examine the effect of brand mascots on consumers’ decision and consumers’ intention to purchase the product. This study involved 400 participants, using cluster sampling from 50 districts in Bangkok metropolitan area. The descriptive analysis shows that using brand mascot causes consumers' positive attitude toward the products, and also heightens the possibility to purchasing the products. The current study suggests the new type of marketing strategy, which is brand fandom. This study has also contributed the knowledge to the area of integrated marketing communication and identification theory.Keywords: brand mascot, consumers’ behavior, marketing communication, purchasing
Procedia PDF Downloads 2601401 Potential Use of Spore-Forming Biosurfactant Producing Bacteria in Oil-Pollution Bioremediation
Authors: S. N. Al-Bahry, Y. M. Al-Wahaibi, S. J. Joshi, E. A. Elshafie, A. S. Al-Bimani
Abstract:
Oman is one of the oil producing countries in the Arabian Peninsula and the Gulf region. About 30-40 % of oil produced from the Gulf is transported globally along the seacoast of Oman. Oil pollution from normal tanker operations, ballast water, illegal discharges and accidental spills are always serious threats to terrestrial and marine habitats. Due to Oman’s geographical location at arid region where the temperature ranges between high 40s and low 50s Celsius in summers with low annual rainfall, the main source of fresh water is desalinated sea and brackish water. Oil pollution, therefore, pose a major threat to drinking water. Biosurfactants are secondary metabolites produced by microorganisms in hydrophobic environments to release nutrients from solid surfaces, such as oil. In this study, indigenous oil degrading thermophilic spore forming bacteria were isolated from oil fields contaminated soil. The isolates were identified using MALDI-TOF biotyper and 16s RNA. Their growth conditions were optimized for the production of biosurfactant. Surface tension, interfacial tensions and microbial oil biodegradation capabilities were tested. Some thermophilic bacteria degraded either completely or partially heavy crude oil (API 10-15) within 48h suggesting their high potential in oil spill bioremediation and avoiding the commonly used physical and chemical methods which usually lead to other environmental pollution.Keywords: bacteria, bioremediation, biosurfactant, crude-oil-pollution
Procedia PDF Downloads 4281400 The Subaltern Woman and the Reproductive Body - A Reading of Devi's 'Breast Stories'
Authors: Sharon Lopez
Abstract:
Much of critical thought dismisses the notion of subaltern women engaging in resistance because of her complex colonial identity. She is seen in postcolonial theory as being "doubly effaced" and removed from exercising control to speak up and taking part in defiance. This line of reasoning suggests a critical area in which engaging with issues unavoidably excludes subaltern women from the emerging resistance discourse. A position like this also suggests a closed-minded view of human experience and a desire to maintain subalternity. The argument here is that subaltern women might be understood as achieving agency when they engage in resistance and speak out about their circumstances, whether aloud or in silence. Using deductions from Mahasweta Devi's literary narratives such as Imaginary Maps and Breast Stories, the study investigates the tactics Devi employs to engage marginalised women into resistance and establishes that the 'body' emerges in her stories not just as a site of oppression but also as an important motif of power and resistance.Keywords: subaltern woman, reproductive docy, breast giver, devi
Procedia PDF Downloads 1071399 Preparation and Characterization of Bioplastic from Sorghum Husks
Authors: Hannatu Abubakar Sani, Abubakar Umar Birnin Yauri, Aliyu Muhammad, Mujahid Salau, Aminu Musa, Hadiza Adamu Kwazo
Abstract:
The increase in the global population and advances in technology have made plastic materials to have wide applications in every aspect of life. However, the non-biodegradability of these petrochemical-based materials and their increasing accumulation in the environment has been a threat to the planet and has been a source of environmental concerns and hence, the driving force in the search for ‘green’ alternatives for which agricultural waste remains the front liner. Sorghum husk, an agricultural waste with potentials as a raw material in the production of bioplastic, was used in this research to prepare bioplastic using sulphuric acid-catalyzed acetylation process. The prepared bioplastic was characterized by X-ray diffraction and Fourier transform infrared spectroscopy (FTIR), and the structure of the prepared bioplastic was confirmed. The Fourier transform infrared spectroscopy (FTIR) spectra of the product displayed the presence of OH, C-H, C=O, and C-O absorption peaks. The bioplastic obtained is biodegradable and is affected by acid, salt, and alkali to a lesser extent. Other tests like solubility and swelling studies were carried out to ensure the commercial properties of these bioplastic materials. Therefore, this revealed that new bioplastics with better environmental and sustainable properties could be produced from agricultural waste, which may have applications in many industries.Keywords: agricultural waste, bioplastic, characterization, Sorghum Husk
Procedia PDF Downloads 1571398 The Political Economy of Human Trafficking and Human Insecurity in Asia: The Case of Japan, Thailand and India
Authors: Mohammed Bashir Uddin
Abstract:
Human trafficking remains as a persistent problem in many parts of the world. It is considered by many countries as an issue of a threat to national security. Border enforcement to prevent trafficking has been the main incentive, which eventually causes human insecurity for vulnerable people, especially for women. This research argues that focus needs to be placed on the political economy of trafficking, hence on the supply and demand sides of trafficking from a broader socio-economic perspective. Trafficking is a global phenomenon with its contemporary origins in the international capitalist market system. This research investigates particularly the supply-demand nexus on the backdrop of globalization and its impact on human security. It argues that the nexus varies across the countries, particularly the demand side. While prostitution has been the sole focus of the demand side in all countries in Asia, the paper argues that organ trade, bonded labor, cheap and exploitable labor through false recruitment (male trafficking) and adoption are some of the rising demands that explore new trends of trafficking, which could be better explained through international political economy (IPE). Following a qualitative research method, the paper argues that although demands vary in destination countries, they are the byproducts of IPE which have different socio-economic impacts both on trafficked individuals and the states.Keywords: globalization, human security, human trafficking, political economy
Procedia PDF Downloads 4711397 The Intention to Use Telecare in People of Fall Experience: Application of Fuzzy Neural Network
Authors: Jui-Chen Huang, Shou-Hsiung Cheng
Abstract:
This study examined their willingness to use telecare for people who have had experience falling in the last three months in Taiwan. This study adopted convenience sampling and a structural questionnaire to collect data. It was based on the definition and the constructs related to the Health Belief Model (HBM). HBM is comprised of seven constructs: perceived benefits (PBs), perceived disease threat (PDT), perceived barriers of taking action (PBTA), external cues to action (ECUE), internal cues to action (ICUE), attitude toward using (ATT), and behavioral intention to use (BI). This study adopted Fuzzy Neural Network (FNN) to put forward an effective method. It shows the dependence of ATT on PB, PDT, PBTA, ECUE, and ICUE. The training and testing data RMSE (root mean square error) are 0.028 and 0.166 in the FNN, respectively. The training and testing data RMSE are 0.828 and 0.578 in the regression model, respectively. On the other hand, as to the dependence of ATT on BI, as presented in the FNN, the training and testing data RMSE are 0.050 and 0.109, respectively. The training and testing data RMSE are 0.529 and 0.571 in the regression model, respectively. The results show that the FNN method is better than the regression analysis. It is an effective and viable good way.Keywords: fall, fuzzy neural network, health belief model, telecare, willingness
Procedia PDF Downloads 2011396 The Influence of Minority Stress on Depression among Thai Lesbian, Gay, Bisexual, and Transgender Adults
Authors: Priyoth Kittiteerasack, Alana Steffen, Alicia K. Matthews
Abstract:
Depression is a leading cause of the worldwide burden of disability and disease burden. Notably, lesbian, gay, bisexual, and transgender (LGBT) populations are more likely to be a high-risk group for depression compared to their heterosexual and cisgender counterparts. To date, little is known about the rates and predictors of depression among Thai LGBT populations. As such, the purpose of this study was to: 1) measure the prevalence of depression among a diverse sample of Thai LGBT adults and 2) determine the influence of minority stress variables (discrimination, victimization, internalized homophobia, and identity concealment), general stress (stress and loneliness), and coping strategies (problem-focused, avoidance, and seeking social support) on depression outcomes. This study was guided by the Minority Stress Model (MSM). The MSM posits that elevated rates of mental health problems among LGBT populations stem from increased exposures to social stigma due to their membership in a stigmatized minority group. Social stigma, including discrimination and violence, represents unique sources of stress for LGBT individuals and have a direct impact on mental health. This study was conducted as part of a larger descriptive study of mental health among Thai LGBT adults. Standardized measures consistent with the MSM were selected and translated into the Thai language by a panel of LGBT experts using the forward and backward translation technique. The psychometric properties of translated instruments were tested and acceptable (Cronbach’s alpha > .8 and Content Validity Index = 1). Study participants were recruited using convenience and snowball sampling methods. Self-administered survey data were collected via an online survey and via in-person data collection conducted at a leading Thai LGBT organization. Descriptive statistics and multivariate analyses using multiple linear regression models were conducted to analyze study data. The mean age of participants (n = 411) was 29.5 years (S.D. = 7.4). Participants were primarily male (90.5%), homosexual (79.3%), and cisgender (76.6%). The mean score for depression of study participant was 9.46 (SD = 8.43). Forty-three percent of LGBT participants reported clinically significant levels of depression as measured by the Beck Depression Inventory. In multivariate models, the combined influence of demographic, stress, coping, and minority stressors explained 47.2% of the variance in depression scores (F(16,367) = 20.48, p < .001). Minority stressors independently associated with depression included discrimination (β = .43, p < .01) victimization (β = 1.53, p < .05), and identity concealment (β = -.54, p < .05). In addition, stress (β = .81, p < .001), history of a chronic disease (β = 1.20, p < .05), and coping strategies (problem-focused coping β = -1.88, p < .01, seeking social support β = -1.12, p < .05, and avoidance coping β = 2.85, p < .001) predicted depression scores. The study outcomes emphasized that minority stressors uniquely contributed to depression levels among Thai LGBT participants over and above typical non-minority stressors. Study findings have important implications for nursing practice and the development of intervention research.Keywords: depression, LGBT, minority stress, sexual and gender minority, Thailand
Procedia PDF Downloads 1271395 The Tourist Satisfaction on Logo Design of Huay Kon Border Market, Chaloemphrakiat District, Nan Province
Authors: Panupong Chanplin, Wilailuk Mepracha, Sathapath Kilaso
Abstract:
The aims of this research were twofold: 1) to logo design of Huay Kon Border Market, Chaloemphrakiat District, Nan Province and 2) to study the level of tourist satisfaction towards logo design of Huay Kon Border Market, Chaloemphrakiat District, Nan Province. Tourist satisfaction was measured using four criteria: a unique product identity, ease of remembrance, product utility, and beauty/impressiveness. The researcher utilized a probability sampling method via simple random sampling. The sample consisted of 30 tourists in the Huay Kon Border Market. Statistics utilized for data analysis were percentage, mean, and standard deviation. The results suggest that tourist had high levels of satisfaction towards all four criteria of the logo design that was designed to target them. This study proposes that specifically logo designed of Huay Kon Border Market could also be implemented with other real media already available on the market.Keywords: satisfaction, logo, design, Huay Kon border market
Procedia PDF Downloads 223