Search results for: critical thinking.
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 6136

Search results for: critical thinking.

4636 Impact of Hepatitis C Virus Chronic Infection on Quality of Life in Egypt

Authors: Ammal M. Metwally, Ghada A. Abdel-Latif, Walaa A. Fouad, Thanaa M. Rabah, Amira Mohsen, Fatma A. Shaaban, Iman I. Salama

Abstract:

The study aimed at determining the impact of chronic hepatitis C virus (HCV) infection on patients’ Quality of Life (QoL) , its relation to geographical characteristics of patients, awareness of the disease, treatment regimen, co-morbid psychiatric or other diseases. 457 patients were randomly selected from ten National Treatment Reference Centers of Ministry of Health hospitals from four community locations representing Egypt. Health related QoL assessment questionnaire with the 36-item Short Form used for assessment of the enrolled patients. The study showed no significant difference between HCV patients in different governorates as regards total QoL. Females, illiterate patients and those had bilharziasis, diabetes mellitus, hypertension or were depressed had significantly the lowest QoL score. HCV patients who knew the danger of the disease had significant lower mean score of physical and mental health components. Optimal care of overall well-being of HCV patients requires adequate knowledge of their neurological and psychological status. It is important to know that any patient will need to take the time to know that his new physical limitations do not limit him as a person, as soul, no matter what other people are thinking as a positive hopeful attitude is essential for combating HCV.

Keywords: hepatitis C virus chronic infection - physical health component and mental health component of QoL– total quality of life

Procedia PDF Downloads 448
4635 Critical Discourse Analysis of Xenophobia in UK Political Party Blogs

Authors: Nourah Almulhim

Abstract:

This paper takes a critical discourse analysis (CDA) approach to investigate discourse and ideology in political blogs, focusing in particular on the Conservative Home blog from the UK’s current governing party. The Conservative party member’s discourse strategies as the blogger, alongside the discourse used by members of the public who reply to the blog in the below-the-lines comments, will be examined. The blog discourse reflects the writer's political identity and authorial voice. The analysis of the below-the-lines comments enables members of the public to engage in creating adversative positions, introducing different language users who bring their own individual and collective identities. These language users can play the role of news reporters, political analysts, protesters or supporters of a specific agenda and current socio-political topics or events. This study takes a qualitative approach to analyze the discriminatory context towards Islam/Muslims in ' The Conservative Home' blog. A cognitive approach is adopted and an analysis of dominant discourses in the blog text and the below-the-line comments is used. The focus of the study is, firstly, on the construction of self/ collective national identity in comparison to Muslim identity, highlighting the in-group and out-group construction. Second, the type of attitudes, whether feelings or judgments, related to these social actors as they are explicated to draw on the social values. Third, the role of discursive strategies in justifying and legitimizing those Islamophobic discriminatory practices. Therefore, the analysis is based on the systematic analysis of social actors drawing on actors, actions, and arguments to explicate identity construction and its development in the different discourses. A socio-semantic categorization of social actors is implemented to draw on the discursive strategies in addition to using literature to understand these strategies. An appraisal analysis is further used to classify attitudes and elaborate on core values in both genres. Finally, the grammar of othering is applied to explain how discriminatory dichotomies of 'Us' Vs. ''Them' actions are carried in discourse. Some of the key findings of the analysis can be summarized in two main points. First, the discursive practice used to represent Muslims/Islam as different from ‘Us’ are different in both genres as the blogger uses a covert voice while the commenters generally use an overt voice. This is to say that the blogger uses a mitigated strategy to represent the Muslim identity, for example, using the noun phrase ‘British Muslim’ but then representing them as ‘radical’ and ‘terrorists'. Contrary to this is in below the lines comments, where a direct strategy with an active declarative voice is used to negatively represent the Muslim identity as ‘oppressors’ and ‘terrorists’ with no inclusion of the noun phrase ‘British Muslims’. Second, the negotiation of the ‘British’ identity and values, such as culture and democracy, are prominent in the comment section as being unique and under threat by Muslims, while in the article, these standpoints are not represented.

Keywords: xenophobia, blogs, identity, critical discourse analysis

Procedia PDF Downloads 92
4634 Creative Potential of Children with Learning Disabilities

Authors: John McNamara

Abstract:

Growing up creative is an important idea in today’s classrooms. As education seeks to prepare children for their futures, it is important that the system considers traditional as well as non-traditional pathways. This poster describes the findings of a research study investigating creative potential in children with learning disabilities. Children with learning disabilities were administered the Torrance Test of Creative Problem Solving along with subtests from the Comprehensive Test of Phonological Processing. A quantitative comparative analysis was computed using paired-sample t-tests. Results indicated statistically significant difference between children’s creative problem-solving skills and their reading-based skills. The results lend support to the idea that children with learning disabilities have inherent strengths in the area of creativity. It can be hypothesized that the success of these children may be associated with the notion that they are using a type of neurological processing that is not otherwise used in academic tasks. Children with learning disabilities, a presumed left-side neurological processing problem, process information with the right side of the brain – even with tasks that should be processed with the left side (i.e. language). In over-using their right hemisphere, it is hypothesized that children with learning disabilities have well-developed right hemispheres and, as such, have strengths associated with this type of processing, such as innovation and creativity. The current study lends support to the notion that children with learning disabilities may be particularly primed to succeed in areas that call on creativity and creative thinking.

Keywords: learning disabilities, educational psychology, education, creativity

Procedia PDF Downloads 69
4633 Waste Management in Africa

Authors: Peter Ekene Egwu

Abstract:

Waste management is of critical importance in Africa for reasons related to public health, human dignity, climate resilience and environmental preservation. However, delivering waste management services requires adequate funding, which has generally been lacking in a context where the generation of waste is outpacing the development of waste management infrastructure in most cities. The sector represents a growing percentage of cities’ greenhouse gas (GHG) emissions, and some of the African cities profiled in this study are now designing waste management strategies with emission reduction in mind.

Keywords: management waste material, Africa, uses of new technology to manage waste, waste management

Procedia PDF Downloads 75
4632 Social Studies Teachers’ Sustained, Collaborative Professional Development Centered Round Innovative Curriculum Materials

Authors: Cory Callahan

Abstract:

Here the author synthesizes findings and implications from two research studies that comprise a continuing line of inquiry into the potential of an innovative professional development program to help in-service teachers understand and implement a complex model of social studies instruction. The paper specifically explores the question: To what degree can a collaborative professional development program centered around innovative curriculum materials help social studies teachers understand and implement a powerful social studies approach? Findings suggest the teachers increasingly incorporated substantive thinking (i.e., second-order historical domain knowledge) into their respective practice and they facilitated students’ use of historical photographs as evidence to begin to answer a compelling question. The teachers also began to effectively support students’ abilities to make claims about the past. Implications include the foregrounding of high-quality questions during planning and the need for explicit guidance in the form of structures and procedures (i.e., scaffolds) to help teachers systematically review students’ work products. The work shared here may contribute to scholarship that posits explanations for why teacher-support is routinely ineffectual and suggests ways to provide substantive collaborative support for in-service social studies teachers.

Keywords: educative curriculum, social studies, professional development, lesson study

Procedia PDF Downloads 63
4631 Designing Entrepreneurship Education Contents for Entrepreneurial Intention Building among Undergraduates in India

Authors: Sumita Srivastava

Abstract:

Despite several measures taken by the Government of India, entrepreneurship is still not perceived as a viable career option by the young generation. Although the rate of startups has improved a little after the penetration of e portals as business platforms, still the numbers are not very significant. It is also important to note that entrepreneurial initiatives are mostly taken up by graduates of premier institutions of India like Indian Institute of Technology (IITs) and Indian Institute of Management (IIMs). The scenario is not very satisfactory amongst the masses graduating from mainstream universities of the country. Indian youth at large are not attracted towards entrepreneurship as a career choice. The reason probably lies in the social fabric of the country and inappropriate education system which does not support the entrepreneurship at large amongst youth in the country. Education is critical to the development of an economy from the poverty level to the level of self-sustenance and development. The current curriculum in the majority of business schools in India prepares the average graduate to become employed by the available firms or business owners in society. For graduates in other streams, employment opportunities are very limited. The aim of this study was to identify and design entrepreneurship education contents to encourage undergraduates to pursue entrepreneurship as a career choice. This comprehensive study was conducted in multiple stages. Extensive research was conducted at each stage with an appropriate methodology. These stages of the project study were interconnected with each other, and each preceding stage provided inputs for the following stage of the study. In the first stage of the study, an empirical analysis was conducted to understand the current state of entrepreneurial intentions of undergraduates of Agra city. Various stakeholders were contacted at the stage, including students (n = 500), entrepreneurs (n = 20) and academicians and field experts (n = 10). At the second stage of the project study, a systems science technique, Nominal Group Technique (NGT) was used to identify the critical elements of entrepreneurship education in India based upon the findings of stage 1. The application of the Nominal Group Technique involved a workshop format; 15 domain experts participated in the workshop. Throughout the process, a democratic process was followed to avoid individual dominance and premature focusing on a single idea. The study obtained 63 responses from experts for effective entrepreneurship education in India. The responses were reduced to seven elements after a few thematic iterations. These elements were then segregated into content (knowledge, skills and attitude) and learning interaction on the basis of experts’ responses. After identifying critical elements of entrepreneurship education in the previous stage, the course was designed and validated at stage 3 of the project. Scientific methods were used at this stage to validate the curriculum contents and training interventions experimentally. The educational and training interventions designed through this study would not only help in developing entrepreneurial intentions but also creating skills relevant to the local entrepreneurial opportunities in the vicinity.

Keywords: curriculum design, entrepreneurial intention, entrepreneuship education, nominal group technique

Procedia PDF Downloads 129
4630 Streamlining Cybersecurity Risk Assessment for Industrial Control and Automation Systems: Leveraging the National Institute of Standard and Technology’s Risk Management Framework (RMF) Using Model-Based System Engineering (MBSE)

Authors: Gampel Alexander, Mazzuchi Thomas, Sarkani Shahram

Abstract:

The cybersecurity landscape is constantly evolving, and organizations must adapt to the changing threat environment to protect their assets. The implementation of the NIST Risk Management Framework (RMF) has become critical in ensuring the security and safety of industrial control and automation systems. However, cybersecurity professionals are facing challenges in implementing RMF, leading to systems operating without authorization and being non-compliant with regulations. The current approach to RMF implementation based on business practices is limited and insufficient, leaving organizations vulnerable to cyberattacks resulting in the loss of personal consumer data and critical infrastructure details. To address these challenges, this research proposes a Model-Based Systems Engineering (MBSE) approach to implementing cybersecurity controls and assessing risk through the RMF process. The study emphasizes the need to shift to a modeling approach, which can streamline the RMF process and eliminate bloated structures that make it difficult to receive an Authorization-To-Operate (ATO). The study focuses on the practical application of MBSE in industrial control and automation systems to improve the security and safety of operations. It is concluded that MBSE can be used to solve the implementation challenges of the NIST RMF process and improve the security of industrial control and automation systems. The research suggests that MBSE provides a more effective and efficient method for implementing cybersecurity controls and assessing risk through the RMF process. The future work for this research involves exploring the broader applicability of MBSE in different industries and domains. The study suggests that the MBSE approach can be applied to other domains beyond industrial control and automation systems.

Keywords: authorization-to-operate (ATO), industrial control systems (ICS), model-based system’s engineering (MBSE), risk management framework (RMF)

Procedia PDF Downloads 92
4629 Identification of Electric Energy Storage Acceptance Types: Empirical Findings from the German Manufacturing Industry

Authors: Dominik Halstrup, Marlene Schriever

Abstract:

The industry, as one of the main energy consumer, is of critical importance along the way of transforming the energy system to Renewable Energies. The distributed character of the Energy Transition demands for further flexibility being introduced to the grid. In order to shed further light on the acceptance of Electric Energy Storage (ESS) from an industrial point of view, this study therefore examines the German manufacturing industry. The analysis in this paper uses data composed of a survey amongst 101 manufacturing companies in Germany. Being part of a two-stage research design, both qualitative and quantitative data was collected. Based on a literature review an acceptance concept was developed in the paper and four user-types identified: (Dedicated) User, Impeded User, Forced User and (Dedicated) Non-User and incorporated in the questionnaire. Both descriptive and bivariate analysis is deployed to identify the level of acceptance in the different organizations. After a factor analysis has been conducted, variables were grouped to form independent acceptance factors. Out of the 22 organizations that do show a positive attitude towards ESS, 5 have already implemented ESS and show a positive attitude towards ESS. They can be therefore considered ‘Dedicated Users’. The remaining 17 organizations have a positive attitude but have not implemented ESS yet. The results suggest that profitability plays an important role as well as load-management systems that are already in place. Surprisingly, 2 organizations have implemented ESS even though they have a negative attitude towards it. This is an example for a ‘Forced User’ where reasons of overriding importance or supporters with overriding authority might have forced the company to implement ESS. By far the biggest subset of the sample shows (critical) distance and can therefore be considered ‘(Dedicated) Non-Users’. The results indicate that the majority of the respondents have not thought ESS in their own organization through yet. For the majority of the sample one can therefore not speak of critical distance but rather a distance due to insufficient information and the perceived unprofitability. This paper identifies the relative state of acceptance of ESS in the manufacturing industry as well as current reasons for hindrance and perspectives for future growth of ESS in an industrial setting from a policy level. The interest that is currently generated by the media could be channeled and taken into a more substantial and individual discussion about ESS in an industrial setting. If the current perception of profitability could be addressed and communicated accordingly, ESS and their use in for instance cooperative business models could become a topic for more organizations in Germany and other parts of the world. As price mechanisms tend to favor existing technologies, policy makers need to further access the use of ESS and acknowledge the positive effects when integrated in an energy system. The subfields of generation, transmission and distribution become increasingly intertwined. New technologies and business models, such as ESS or cooperative arrangements entering the market, increase the number of stakeholders. Organizations need to find their place within this array of stakeholders.

Keywords: acceptance, energy storage solutions, German energy transition, manufacturing industry

Procedia PDF Downloads 224
4628 A Morphological Thinking Approach for Conceptualising Product-Service Systems Solutions

Authors: Nicolas Haber

Abstract:

The study addresses the conceptual design of Product-Service Systems (PSSs) as a means of innovating solutions with the aim of reducing the environmental load of conventional product based solutions. Functional approaches targeting PSS solutions are developed in instinctive methods within the constraints of the setting in which they are conceived. Adopting morphological matrices in designing PSS concepts allows a thorough understanding of the settings, stakeholders, and functional requirements. Additionally, such a methodology is robust and adaptable to product-oriented, use-oriented and result-oriented systems. The research is based on a functional decomposition of the task in a similar way as in product design; while extended to include service components, providers, and receivers, while assessing the adaptability and homogeneity of the selected components and actors. A use-oriented concept is presented via a practical case study at an agricultural boom-sprayer manufacturer to demonstrate the effectiveness of the morphological approach to justify its viability. Additionally, a life cycle analysis is carried out in order to evaluate the environmental advantages inherited in a PSS solution versus a conventional solution. In light of the applications presented, the morphological approach appears to be a valid and generic tactic to conceiving integrated solutions whilst capturing the interrelations between the actors and elements of an integrated product-service system.

Keywords: conceptual design, design for sustainability, functional decomposition, product-service systems

Procedia PDF Downloads 263
4627 Feedback of an Automated Hospital about the Performance of an Automated Drug Dispensing System’s Implementation

Authors: Bouami Hind, Millot Patrick

Abstract:

The implementation of automated devices in life-critical systems such as hospitals can bring a new set of challenges related to automation malfunctions. While automation has been identified as great leverage for the medication dispensing system’s security and efficiency, it also increases the complexity of the organization. In particular, the installation and operation stage of automated devices can be complex when malfunctions related to automated systems occur. This paper aims to document operators’ situation awareness about the malfunctions of automated drug delivery systems (ADCs) during their implementation through Saint Brieuc hospital’s feedback. Our evaluation approach has been deployed in Saint Brieuc hospital center’s pharmacy, which has been equipped with automated nominative drug dispensing systems since January of 2021. The analysis of Saint Brieuc hospital center pharmacy’s automation revealed numerous malfunctions related to the implementation of Automated Delivery Cabinets. It appears that the targeted performance is not reached in the first year of implementation in this case study. Also, errors have been collected in patients' automated treatments’ production such as lack of drugs in pill boxes or nominative carnets, excess of drugs, wrong location of the drug, drug blister damaged, non-compliant sachet, or ticket errors. Saint Brieuc hospital center’s pharmacy is doing a tremendous job of setting up and monitoring performance indicators from the beginning of automation and throughout ADC’s operation to control ADC’s malfunctions and meet the performance targeted by the hospital. Health professionals, including pharmacists, biomedical engineers and directors of work, technical services and safety, are heavily involved in an automation project. This study highlights the importance of the evaluation of ADCs’ performance throughout the implementation process and the hospital’s team involvement in automation supervision and management.

Keywords: life-critical systems, situation awareness, automated delivery cabinets, implementation, risks and malfunctions

Procedia PDF Downloads 98
4626 CFD Simulation of a Large Scale Unconfined Hydrogen Deflagration

Authors: I. C. Tolias, A. G. Venetsanos, N. Markatos

Abstract:

In the present work, CFD simulations of a large scale open deflagration experiment are performed. Stoichiometric hydrogen-air mixture occupies a 20 m hemisphere. Two combustion models are compared and are evaluated against the experiment. The Eddy Dissipation Model and a Multi-physics combustion model which is based on Yakhot’s equation for the turbulent flame speed. The values of models’ critical parameters are investigated. The effect of the turbulence model is also examined. k-ε model and LES approach were tested.

Keywords: CFD, deflagration, hydrogen, combustion model

Procedia PDF Downloads 502
4625 Protection Plan of Medium Voltage Distribution Network in Tunisia

Authors: S. Chebbi, A. Meddeb

Abstract:

The distribution networks are often exposed to harmful incidents which can halt the electricity supply of the customer. In this context, we studied a real case of a critical zone of the Tunisian network which is currently characterized by the dysfunction of its plan of protection. In this paper, we were interested in the harmonization of the protection plan settings in order to ensure a perfect selectivity and a better continuity of service on the whole of the network.

Keywords: distribution network Gabes-Tunisia, continuity of service, protection plan settings, selectivity

Procedia PDF Downloads 510
4624 The South African Polycentric Water Resource Governance-Management Nexus: Parlaying an Institutional Agent and Structured Social Engagement

Authors: J. H. Boonzaaier, A. C. Brent

Abstract:

South Africa, a water scarce country, experiences the phenomenon that its life supporting natural water resources is seriously threatened by the users that are totally dependent on it. South Africa is globally applauded to have of the best and most progressive water laws and policies. There are however growing concerns regarding natural water resource quality deterioration and a critical void in the management of natural resources and compliance to policies due to increasing institutional uncertainties and failures. These are in accordance with concerns of many South African researchers and practitioners that call for a change in paradigm from talk to practice and a more constructive, practical approach to governance challenges in the management of water resources. A qualitative theory-building case study through longitudinal action research was conducted from 2014 to 2017. The research assessed whether a strategic positioned institutional agent can be parlayed to facilitate and execute WRM on catchment level by engaging multiple stakeholders in a polycentric setting. Through a critical realist approach a distinction was made between ex ante self-deterministic human behaviour in the realist realm, and ex post governance-management in the constructivist realm. A congruence analysis, including Toulmin’s method of argumentation analysis, was utilised. The study evaluated the unique case of a self-steering local water management institution, the Impala Water Users Association (WUA) in the Pongola River catchment in the northern part of the KwaZulu-Natal Province of South Africa. Exploiting prevailing water resource threats, it expanded its ancillary functions from 20,000 to 300,000 ha. Embarking on WRM activities, it addressed natural water system quality assessments, social awareness, knowledge support, and threats, such as: soil erosion, waste and effluent into water systems, coal mining, and water security dimensions; through structured engagement with 21 different catchment stakeholders. By implementing a proposed polycentric governance-management model on a catchment scale, the WUA achieved to fill the void. It developed a foundation and capacity to protect the resilience of the natural environment that is critical for freshwater resources to ensure long-term water security of the Pongola River basin. Further work is recommended on appropriate statutory delegations, mechanisms of sustainable funding, sufficient penetration of knowledge to local levels to catalyse behaviour change, incentivised support from professionals, back-to-back expansion of WUAs to alleviate scale and cost burdens, and the creation of catchment data monitoring and compilation centres.

Keywords: institutional agent, water governance, polycentric water resource management, water resource management

Procedia PDF Downloads 138
4623 A Systematic Review on Challenges in Big Data Environment

Authors: Rimmy Yadav, Anmol Preet Kaur

Abstract:

Big Data has demonstrated the vast potential in streamlining, deciding, spotting business drifts in different fields, for example, producing, fund, Information Technology. This paper gives a multi-disciplinary diagram of the research issues in enormous information and its procedures, instruments, and system identified with the privacy, data storage management, network and energy utilization, adaptation to non-critical failure and information representations. Other than this, result difficulties and openings accessible in this Big Data platform have made.

Keywords: big data, privacy, data management, network and energy consumption

Procedia PDF Downloads 311
4622 Attachment Patterns in a Sample of South African Children at Risk in Middle Childhood

Authors: Renate Gericke, Carol Long

Abstract:

Despite the robust empirical support of attachment, advancement in the description and conceptualization of attachment has been slow and has not significantly advanced beyond the identification of attachment security or type (namely, secure, avoidant, ambivalent and disorganized). This has continued despite papers arguing for theoretical refinement in the classification of attachment presentations. For thinking and practice to advance, it is critically important that these categories and their assessment be interrogated in different contexts and across developmental age. To achieve this, a quantitative design was used with descriptive and inferential statistics, and general linear models were employed to analyze the data. The Attachment Story Completion Test (ASCT) was administered to 105 children between the ages of eight and twelve from socio-economically deprived contexts with high exposure to trauma. A staggering 93% of the children had insecure attachments (specifically, avoidant 37%, disorganized 34% and ambivalent 22%) and attachment was more complex than currently conceptualized in the attachment literature. Primary attachment did not only present as one of four discreet categories, but 70% of the sample had a complex attachment with more than one type of maternal attachment style. Attachment intensity also varied along a continuum (between 1 and 5). The findings have implications for a) research that has not considered the potential complexity of attachment or attachment intensity, b) policy to more actively support mother-infant dyads, particularly in high-risk contexts and c) question the applicability of a western conceptualization of a primary maternal attachment figure in non-western collectivist societies.

Keywords: attachment, children at risk, middle childhood, non-western context

Procedia PDF Downloads 190
4621 Makerspaces as Centers of Innovation: An Assessment of the Impact of Technology Incubation Centers in Nigeria

Authors: Bisi Olawoyin

Abstract:

The idea of knowledge sharing facilitated by the internet and complemented by a collaborative offline process in form of shared workshops called Makerspaces has become an attractive economic development agenda worldwide. Towards this end, Nigeria has established a number of Technology Incubation Centers (TICs) across the country with a view to using them as institutional mechanisms for commercializing Research and Development results; thus helping to promote venture creation and economic development. This study thus examines the impact of the nurturing by the TICs, on the performance of selected incubated enterprises that have grown into medium scale businesses in different sectors of the economy. The objective is to determine the extent to which the process of incubation has contributed to their growth in relation to similar businesses that developed outside the TICs. Six enterprises nurtured by TICs and six others outside, these were selected for the study. Data were collected in respect of the twelve enterprises covering their first five years of operation. Performances in terms of annual turnover, market share, and product range were analysed by scatter diagram plotted to show these variables against time and on comparative basis between TIC and non-TIC enterprises. Results showed an initial decline in performance for most of the incubatees in the first two years due to sluggish adjustment to withdrawal of subsidies enjoyed at the TICs. However, four of them were able to catch up with improved performance and surpass their non–TIC counterparts consistently from the third year. Analysis of year on year performance also showed average growth rate of 7% and 5 % respectively for TIC and non–TIC enterprises. The study, therefore, concludes that TICs have great role to play in nurturing new, innovative businesses but sees the need for government to address the provision of critical facilities especially electricity and utilities that constitute critical cost components for businesses. It must also address the issue of investment grants, loans including the development of technology/industrial parks that will serve to boost business survival.

Keywords: entrepreneurship, incubation, innovation, makerspaces

Procedia PDF Downloads 220
4620 Eradication of Mental Illness through Buddhism

Authors: Deshar Bashu Dev

Abstract:

In this modern age, most people in developed and developing countries are affected by mental illness. There are many mental illnesses, and their differing symptoms impact peoples’ lives in different ways. These illnesses affect the way people think and feel, as well as how they behave with others. Mental illness results from compound interactions between the mind, body, and environment. New technologies and sciences make the world a better place. These technologies are becoming smarter and are being developed every day to help make daily life easier However, people suffer from mental illness in every part of the world. The philosophy propounded by the Buddha, Buddhism, teaches that all life is connected, from the microcosm to macrocosm. In the 2,500 years that elapsed since the death of the Buddha, his disciples have spread his teachings and developed sophisticated psycho-therapeutic methodologies. We can find many examples in Buddhist texts and in the modern age where Buddhist philosophy modern science could not solve. The Noble Eightfold Path, which is one of the main philosophies of Buddhism; it eradicates hatred and ill will and cultivates good deeds, kindness, and compassion. Buddhism, as a practice of dialectic conversation and mindfulness training, is full of rich therapeutic tools that the mental health community has adopted to help people. Similarly, Buddhist meditation is very necessary; it purifies thoughts and avoids unnecessary thinking. This research aims to study different causes of mental illness; analyzes the different approaches to eradicate mental illness problems and provides conclusions and recommendations present solutions through Buddhism in this modern age.

Keywords: mental illness, Buddhism, mindfulness, Buddhist practices

Procedia PDF Downloads 251
4619 From Name-Calling to Insidious Rhetoric: Construction and Evolution of the Transgender Imagery in News Discourse, 1953-2016

Authors: Hsiao-Yung Wang

Abstract:

This essay aims to examine how the transgender imagery has been constructed in the Taiwanese news media and its evolution from 1953 to 2016. It also explores the discourse patterns and rhetorical strategies in the transgender-related issues which contributed to levels of evaluation in forming ‘social deviance.’ Samples for analysis were selected from mainstream newspapers, including China Times, United Daily and Apple Daily. The time frame for sample selection is from August 1953 (when the first transgender case was reported in Taiwan) to June 2016. To enhance understanding of media representation as nominalistic-based, the author refers to the representative of critical rhetoric Raymie McKerrow for his study on remembrance and forgetfulness in public discourse (especially in his model of ‘critique of domination’); thereby categorizing the 64 years of transgender discourse into five periods: (1) transgender as ‘intersex’ of surgical-reparative medical treatment; (2) transgender as ‘freak gender-bender’ with criminal behaviors; (3) transgender as ‘ladyboy’ (‘katoey in a Thai term) of bar girls or sex workers; (4) transgender as ‘cross dresser’ of transvestite performance; and (5) transgender as ‘life-style or human right’ of spontaneous gender identification. Based on the research findings, this essay argues that the characterization of transgender reporting as a site for the production of compulsory sexism and gender stereotype by the specific forms of name-calling. Besides, the evolution of word-image addressing to transgender issues also pinpoints media as a reflection of fashion of the day. While the transgender imagery might be crystallized as ‘still social problems’ or ‘gender transgression’ in insidious rhetoric; and while the so-called ‘phobia’ persistently embodies in media discourse to exercise name-calling in an ambiguous (rather than in a bullying) way or under the cover of humanist-liberalist rationales, these emergent rhetorical dilemma should be resolved without any delay.

Keywords: critical rhetoric, media representation, McKerrow, nominalistic, social deviance, transgender

Procedia PDF Downloads 312
4618 2D Ferromagnetism in Van der Waals Bonded Fe₃GeTe₂

Authors: Ankita Tiwari, Jyoti Saini, Subhasis Ghosh

Abstract:

For many years, researchers have been fascinated by the subject of how properties evolve as dimensionality is lowered. Early on, it was shown that the presence of a significant magnetic anisotropy might compensate for the lack of long-range (LR) magnetic order in a low-dimensional system (d < 3) with continuous symmetry, as proposed by Hohenberg-Mermin and Wagner (HMW). Strong magnetic anisotropy allows an LR magnetic order to stabilize in two dimensions (2D) even in the presence of stronger thermal fluctuations which is responsible for the absence of Heisenberg ferromagnetism in 2D. Van der Waals (vdW) ferromagnets, including CrI₃, CrTe₂, Cr₂X₂Te₆ (X = Si and Ge) and Fe₃GeTe₂, offer a nearly ideal platform for studying ferromagnetism in 2D. Fe₃GeTe₂ is the subject of extensive investigation due to its tunable magnetic properties, high Curie temperature (Tc ~ 220K), and perpendicular magnetic anisotropy. Many applications in the field of spintronics device development have been quite active due to these appealing features of Fe₃GeTe₂. Although it is known that LR-driven ferromagnetism is necessary to get around the HMW theorem in 2D experimental realization, Heisenberg 2D ferromagnetism remains elusive in condensed matter systems. Here, we show that Fe₃GeTe₂ hosts both localized and delocalized spins, resulting in itinerant and local-moment ferromagnetism. The presence of LR itinerant interaction facilitates to stabilize Heisenberg ferromagnet in 2D. With the help of Rhodes-Wohlfarth (RW) and generalized RW-based analysis, Fe₃GeTe₂ has been shown to be a 2D ferromagnet with itinerant magnetism that can be modulated by an external magnetic field. Hence, the presence of both local moment and itinerant magnetism has made this system interesting in terms of research in low dimensions. We have also rigorously performed critical analysis using an improvised method. We show that the variable critical exponents are typical signatures of 2D ferromagnetism in Fe₃GeTe₂. The spontaneous magnetization exponent β changes the universality class from mean-field to 2D Heisenberg with field. We have also confirmed the range of interaction via the renormalization group (RG) theory. According to RG theory, Fe₃GeTe₂ is a 2D ferromagnet with LR interactions.

Keywords: Van der Waal ferromagnet, 2D ferromagnetism, phase transition, itinerant ferromagnetism, long range order

Procedia PDF Downloads 70
4617 Toward the Understanding of Shadow Port's Growth: The Level of Shadow Port

Authors: Chayakarn Bamrungbutr, James Sillitoe

Abstract:

The term ‘shadow port’ is used to describe a port whose markets are dominated by an adjacent port that has a more competitive capability. Recently, researchers have put effort into studying the mechanisms of how a regional port, in the shadow of a nearby predominant port which is a capital city port, can compete and grow. However, such mechanism is still unclear. This study thus focuses on understanding the growth of shadow port and the type of shadow port by using the two capital city ports of Thailand; Bangkok port (the former main port) and Laem Chabang port (the current main port), as the case study. By developing an understanding of the mechanisms of shadow, port could ultimately lead to an increase in the competitiveness. In this study, a framework of opportunity capture (introduced by Magala, 2004) will be used to create a framework for the study of the growth of the selected shadow port. In the process of building this framework, five groups of port development experts, consisting of government, council, academia, logistics provider and industry, will be interviewed. To facilitate this work, the Noticing, Collecting and Thinking model which was developed by Seidel (1998) will be used in an analysis of the dataset. The resulting analysis will be used to classify the type of shadow port. The type of these ports will be a significant factor for developing a feasible strategic guideline for the future management planning of ports, particularly, shadow ports, and then to increase the competitiveness of a nation’s maritime transport industry, and eventually lead to a boost in the national economy.

Keywords: shadow port, Bangkok Port, Laem Chabang Port, port growth

Procedia PDF Downloads 175
4616 The Safety Transfer in Acute Critical Patient by Telemedicine (START) Program at Udonthani General Hospital

Authors: Wisit Wichitkosoom

Abstract:

Objective:The majority of the hisk-risk patients (ST-elevation myocardial infarction (STEMI), Acute cerebrovascular accident, Sepsis, Acute Traumatic patient ) are admitted to district or lacal hospitals (average 1-1.30 hr. from Udonthani general hospital, Northeastern province, Thailand) without proper facilities. The referral system was support to early care and early management at pre-hospital stage and prepare for the patient data to higher hospital. This study assessed the reduction in treatment delay achieved by pre-hospital diagnosis and referral directly to Udonthani General Hospital. Methods and results: Four district or local hospitals without proper facilities for treatment the very high-risk patient were serving the study region. Pre-hospital diagnoses were established with the simple technology such as LINE, SMS, telephone and Fax for concept of LEAN process and then the telemedicine, by ambulance monitoring (ECG, SpO2, BT, BP) in both real time and snapshot mode was administrated during the period of transfer for safety transfer concept (inter-hospital stage). The standard treatment for patients with STEMI, Intracranial injury and acute cerebrovascular accident were done. From 1 October 2012 to 30 September 2013, the 892 high-risk patients transported by ambulance and transferred to Udonthani general hospital were registered. Patients with STEMI diagnosed pre-hospitally and referred directly to the Udonthani general hospital with telemedicine closed monitor (n=248). The mortality rate decreased from 11.69% in 2011 to 6.92 in 2012. The 34 patients were arrested on the way and successful to CPR during transfer with the telemedicine consultation were 79.41%. Conclusion: The proper innovation could apply for health care system. The very high-risk patients must had the closed monitoring with two-way communication for the “safety transfer period”. It could modified to another high-risk group too.

Keywords: safety transfer, telemedicine, critical patients, medical and health sciences

Procedia PDF Downloads 305
4615 How to Guide Students from Surface to Deep Learning: Applied Philosophy in Management Education

Authors: Lihong Wu, Raymond Young

Abstract:

The ability to learn is one of the most critical skills in the information age. However, many students do not have a clear understanding of what learning is, what they are learning, and why they are learning. Many students study simply to pass rather than to learn something useful for their career and their life. They have a misconception about learning and a wrong attitude towards learning. This research explores student attitudes to study in management education and explores how to intercede to lead students from shallow to deeper modes of learning.

Keywords: knowledge, surface learning, deep learning, education

Procedia PDF Downloads 497
4614 Uncovering Consumer Culture-Driven Media in Disguise of Feminism: A Multimodal Content Analysis of Sisters Who Make Wave

Authors: Zhen Li

Abstract:

In contemporary China, the rise of consumer culture and feminism has facilitated the ‘She-Economy’, where Chinese women’s consumption power has been boosted along with the thriving Chinese economy. Domestic reality TV shows such as Sisters Who Make Waves (hereafter SWMW) target female audiences by bringing women's issues such as age, appearance, and balance between family and career to the discussion. Against this backdrop, this study adopted multimodal content analysis to investigate how SWMW failed to live up to the feminist goals the show had claimed and how serious women’s issues were consumed and capitalized by the consumer media culture from consumer culture and feminist perspectives. The findings reveal that while the female-themed work claims to uncover the charm that age brings to women over their thirties, it merely mentions female anxiety and uses feminism in disguise to achieve commercial success without in-depth thinking and discussion of what real-life issues women in China are tackling. They further show that the mass media-promoted modern femininity combined with consumerism deepens anxiety over aging among female audiences. The study sheds light on understanding the new development of Chinese femininity and the impact of consumer culture on feminist consciousness in contemporary China.

Keywords: consumer culture, feminism, multimodal content analysis, she-economy

Procedia PDF Downloads 91
4613 Controlling Images and Survival Strategies for Muslim Women in Pakistan

Authors: Ayesha Murtza

Abstract:

Controlling images develop misinformed behaviors about impoverished Muslim Pakistani women that add to the oppression these Pakistani women endure their whole lives. Meanwhile, patriarchal and stereotypical societies provide an ideological justification for gender, class, and racial oppression, especially for women. Cojoining the concepts of controlling images by Patricia Hill Collins (1990) and binary thinking by Barbara Christian (1987), this paper discusses the ways in which various controlling images of urban and rural women are being presented in Pakistani dramas. These images reinforce an interlocking system of oppression for women in Pakistan. This paper further explores how these controlling images of intersecting components like class, gender, religion, ethnicity, physical appearance, color, and caste normalize hegemonic gendered oppression in society and how men have the same attitude towards women of their family whether they belong to the rural or urban class since they are the product of the same society. It further sheds light on how these matrixes of domination are an inevitable part of Pakistani women’s everyday lives and how these women reinforce survival strategies for coping with all these forms of oppression. By employing the feminist interactional framework, this paper elucidates the role of masculinity, femininity, feminist activism, and traditional knowledge against a monolithic image of Pakistani women. By highlighting these, this paper complicates the role of descriptive and visual images, religion, women’s rights, and the stereotypical role of women in Pakistani dramas.

Keywords: controlling images, oppression, women, Pakistan

Procedia PDF Downloads 84
4612 The Politics of Identity: A Longitudinal Study of the Sociopolitical Development of Education Leaders

Authors: Shelley Zion

Abstract:

This study examines the longitudinal impact (10 years) of a course for education leaders designed to encourage the development of critical consciousness surrounding issues of equity, oppression, power, and privilege. The ability to resist and challenge oppression across social and cultural contexts can be acquired through the use of transformative pedagogies that create spaces that use the practice of exploration to make connections between pervasive structural and institutional practices and race and ethnicity. This study seeks to extend this understanding by exploring the longitudinal influence of participating in a course that utilizes transformative pedagogies, course materials, exercises, and activities to encourage the practice of exploration of student experiences with racial and ethnic discrimination with the end goal of providing them with the necessary knowledge and skills that foster their ability to resist and challenge oppression and discrimination -critical action- in their lives. To this end, we use the explanatory power of the theories of critical consciousness development, sociopolitical development, and social identity construction that view exploration as a crucial practice in understanding the role ethnic and racial differences play in creating opportunities or barriers in the lives of individuals. When educators use transformative pedagogies, they create a space where students collectively explore their experiences with racial and ethnic discrimination through course readings, in-class activities, and discussions. The end goal of this exploration is twofold: first, to encourage the student’s ability to understand how differences are identified, given meaning to, and used to position them in specific places and spaces in their world; second, to scaffold students’ ability to make connections between their individual and collective differences and particular institutional and structural practices that create opportunities or barriers in their lives. Studies have found the formal exploration of students’ individual and collective differences in relation to their experiences with racial and ethnic discrimination results in developing an understanding of the roles race and ethnicity play in their lives. To trace the role played by exploration in identity construction, we utilize an integrative approach to identity construction informed by multiple theoretical frameworks grounded in cultural studies, social psychology, and sociology that understand social-cultural, racial, and ethnic -identities as dynamic and ever-changing based on context-specific environments. Stuart Hall refers to this practice as taking “symbolic detours through the past” while reflecting on the different ways individuals have been positioned based on their roots (group membership) and also how they, in turn, chose to position themselves through collective sense-making of the various meanings their differences carried through the routes they have taken. The practice of exploration in the construction of ethnic-racial identities has been found to be beneficial to sociopolitical development.

Keywords: political polarization, civic participation, democracy, education

Procedia PDF Downloads 55
4611 Learning the Most Common Causes of Major Industrial Accidents and Apply Best Practices to Prevent Such Accidents

Authors: Rajender Dahiya

Abstract:

Investigation outcomes of major process incidents have been consistent for decades and validate that the causes and consequences are often identical. The debate remains as we continue to experience similar process incidents even with enormous development of new tools, technologies, industry standards, codes, regulations, and learning processes? The objective of this paper is to investigate the most common causes of major industrial incidents and reveal industry challenges and best practices to prevent such incidents. The author, in his current role, performs audits and inspections of a variety of high-hazard industries in North America, including petroleum refineries, chemicals, petrochemicals, manufacturing, etc. In this paper, he shares real life scenarios, examples, and case studies from high hazards operating facilities including key challenges and best practices. This case study will provide a clear understanding of the importance of near miss incident investigation. The incident was a Safe operating limit excursion. The case describes the deficiencies in management programs, the competency of employees, and the culture of the corporation that includes hazard identification and risk assessment, maintaining the integrity of safety-critical equipment, operating discipline, learning from process safety near misses, process safety competency, process safety culture, audits, and performance measurement. Failure to identify the hazards and manage the risks of highly hazardous materials and processes is one of the primary root-causes of an incident, and failure to learn from past incidents is the leading cause of the recurrence of incidents. Several investigations of major incidents discovered that each showed several warning signs before occurring, and most importantly, all were preventable. The author will discuss why preventable incidents were not prevented and review the mutual causes of learning failures from past major incidents. The leading causes of past incidents are summarized below. Management failure to identify the hazard and/or mitigate the risk of hazardous processes or materials. This process starts early in the project stage and continues throughout the life cycle of the facility. For example, a poorly done hazard study such as HAZID, PHA, or LOPA is one of the leading causes of the failure. If this step is performed correctly, then the next potential cause is. Management failure to maintain the integrity of safety critical systems and equipment. In most of the incidents, mechanical integrity of the critical equipment was not maintained, safety barriers were either bypassed, disabled, or not maintained. The third major cause is Management failure to learn and/or apply learning from the past incidents. There were several precursors before those incidents. These precursors were either ignored altogether or not taken seriously. This paper will conclude by sharing how a well-implemented operating management system, good process safety culture, and competent leaders and staff contributed to managing the risks to prevent major incidents.

Keywords: incident investigation, risk management, loss prevention, process safety, accident prevention

Procedia PDF Downloads 56
4610 Machiavellian Language at Work: The Signs of Machiavellianism in Work-Related Interviews

Authors: Gyongyver Csapo, Andrea Czibor

Abstract:

Machiavellianism is a personality trait based on the exploitation and deception of others. Machiavellian individuals are motivated to gain and to maintain power with the help of their strategic thinking, manipulation tactics, and interpersonal skills. Consequently, Machiavellianism is treated as a personality trait that can affect an individual’s career and work-related behavior. The aim of our research is to provide a narrative psychological approach to Machiavellianism in order to get a more comprehensive picture about the attitudes, values, and work-related behaviors of Machiavellian individuals. In this study, semi-structured interviews were made with employees (N=275) about their work-related experiences. Additionally, participants completed questionnaires about their turnover intention and perceived stress. The interviews were examined with narrative psychological content analysis and thematic analyzes. Based on the thematic analysis, mentioning of two topics (recognition at work and control) were associated with Machiavellianism. Scientific narrative psychological content analysis showed a negative association between Machiavellianism and positive emotions. Turnover intention and the magnitude of perceived work-related stress showed a significant positive correlation with Machiavellianism. In this study, qualitative and quantitative methodologies were combined in order to get a deeper insight of Machiavellianism from an organizational psychological perspective. Our research can contribute to a better understanding of this personality trait and provides an excellent basis for further investigations.

Keywords: machiavellianism, narrative psychology, turnover intention, work-related stress

Procedia PDF Downloads 133
4609 The Academic-Practitioner Nexus in Countering Terrorism in New Zealand

Authors: John Battersby, Rhys Ball

Abstract:

After the 15 March 2019 Mosque attacks in Christchurch, the New Zealand security sector has had to address its training and preparedness levels for dealing with contemporary terrorist threats as well as potential future manifestations of terrorism. From time to time, members of the academic community from Australia and New Zealand have been asked to assist agencies in this endeavour. In the course of 2018, New Zealand security sector professionals working in the counter-terrorism area were interviewed about how they regarded academic contributions to understanding terrorism and counter-terrorism. Responses were mixed, ranging from anti-intellectualism, a belief that the inability to access classified material rendered academic work practically useless - to some genuine interest and desire for broad based academic studies on issues practitioners did not have the time to look at. Twelve months later, researchers have revisited those spoken to prior to the Brenton Tarrant 15 March shooting to establish if there has been a change in the way academic research is perceived, viewed and valued, and what key factors have contributed to this shift in thinking. This paper takes this data, combined with a consideration of the literature on higher education within professional police and intelligence forces, and on the general perception of academics by practitioners, to present a series of findings that will contribute to a more proactive and effective set of engagements, between two distinct but important security sectors, that reflect more closely with international practice.

Keywords: academic, counter terrorism, intelligence, practitioner, research, security

Procedia PDF Downloads 106
4608 From Risk/Security Analysis via Timespace to a Model of Human Vulnerability and Human Security

Authors: Anders Troedsson

Abstract:

For us humans, risk and insecurity are intimately linked to vulnerabilities - where there is vulnerability, there is potentially risk and insecurity. Reducing vulnerability through compensatory measures means decreasing the likelihood of a certain external event be qualified as a risk/threat/assault, and thus also means increasing the individual’s sense of security. The paper suggests that a meaningful way to approach the study of risk/ insecurity is to organize thinking about the vulnerabilities that external phenomena evoke in humans as perceived by them. Such phenomena are, through a set of given vulnerabilities, potentially translated into perceptions of "insecurity." An ontological discussion about salient timespace characteristics of external phenomena as perceived by humans, including such which potentially can be qualified as risk/threat/assault, leads to the positing of two dimensions which are central for describing what in the paper is called the essence of risk/threat/assault. As is argued, such modeling helps analysis steer free of the subjective factor which is intimately connected to human perception and which mediates between phenomena “out there” potentially identified as risk/threat/assault, and their translation into an experience of security or insecurity. A proposed set of universally given vulnerabilities are scrutinized with the help of the two dimensions, resulting in a modeling effort featuring four realms of vulnerabilities which together represent a dynamic whole. This model in turn informs modeling on human security.

Keywords: human vulnerabilities, human security, immediate-inert, material-immaterial, timespace

Procedia PDF Downloads 295
4607 Reliability and Availability Analysis of Satellite Data Reception System using Reliability Modeling

Authors: Ch. Sridevi, S. P. Shailender Kumar, B. Gurudayal, A. Chalapathi Rao, K. Koteswara Rao, P. Srinivasulu

Abstract:

System reliability and system availability evaluation plays a crucial role in ensuring the seamless operation of complex satellite data reception system with consistent performance for longer periods. This paper presents a novel approach for the same using a case study on one of the antenna systems at satellite data reception ground station in India. The methodology involves analyzing system's components, their failure rates, system's architecture, generation of logical reliability block diagram model and estimating the reliability of the system using the component level mean time between failures considering exponential distribution to derive a baseline estimate of the system's reliability. The model is then validated with collected system level field failure data from the operational satellite data reception systems that includes failure occurred, failure time, criticality of the failure and repair times by using statistical techniques like median rank, regression and Weibull analysis to extract meaningful insights regarding failure patterns and practical reliability of the system and to assess the accuracy of the developed reliability model. The study mainly focused on identification of critical units within the system, which are prone to failures and have a significant impact on overall performance and brought out a reliability model of the identified critical unit. This model takes into account the interdependencies among system components and their impact on overall system reliability and provides valuable insights into the performance of the system to understand the Improvement or degradation of the system over a period of time and will be the vital input to arrive at the optimized design for future development. It also provides a plug and play framework to understand the effect on performance of the system in case of any up gradations or new designs of the unit. It helps in effective planning and formulating contingency plans to address potential system failures, ensuring the continuity of operations. Furthermore, to instill confidence in system users, the duration for which the system can operate continuously with the desired level of 3 sigma reliability was estimated that turned out to be a vital input to maintenance plan. System availability and station availability was also assessed by considering scenarios of clash and non-clash to determine the overall system performance and potential bottlenecks. Overall, this paper establishes a comprehensive methodology for reliability and availability analysis of complex satellite data reception systems. The results derived from this approach facilitate effective planning contingency measures, and provide users with confidence in system performance and enables decision-makers to make informed choices about system maintenance, upgrades and replacements. It also aids in identifying critical units and assessing system availability in various scenarios and helps in minimizing downtime and optimizing resource allocation.

Keywords: exponential distribution, reliability modeling, reliability block diagram, satellite data reception system, system availability, weibull analysis

Procedia PDF Downloads 83