Search results for: moral issues
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 5556

Search results for: moral issues

3966 Challenges beyond the Singapore Future-Ready School ‘LEADER’ Qualities

Authors: Zoe Boon Suan Loy

Abstract:

An exploratory research undertaken in 2000 at the beginning of the COVID-19 pandemic examined the changing roles of Singapore school leaders as they lead teachers in developing future-ready learners. While it is evident that ‘LEADER’ qualities epitomize the knowledge, competencies, and skills required, recent events in an increasing VUCA and BANI world characterized by massively disruptive Ukraine -Russian war, unabating tense US-Sino relations, issues related to sustainability, and rapid ageing will have an impact on school leadership. As an increasingly complex endeavour, this requires a relook as they lead teachers in nurturing holistically-developed future-ready students. Digitalisation, new technology, and the push for a green economy will be the key driving forces that will have an impact on job availability. Similarly, the rapid growth of artificial intelligence (AI) capabilities, including ChatGPT, will aggravate and add tremendous stress to the work of school leaders. This paper seeks to explore the key school leadership shifts required beyond the ‘LEADER’ qualities as school leaders respond to the changes, challenges, and opportunities in the 21st C new normal. The research findings for this paper are based on an exploratory qualitative study on the perceptions of 26 school leaders (vice-principals) who were attending a milestone educational leadership course at the National Institute of Education, Nanyang Technological University, Singapore. A structured questionnaire is designed to collect the data, which is then analysed using coding methodology. Broad themes on key competencies and skills of future-ready leaders in the Singapore education system are then identified. Key Findings: In undertaking their leadership roles as leaders of future-ready learners, school leaders need to demonstrate the ‘LEADER’ qualities. They need to have a long-term view, understand the educational imperatives, have a good awareness of self and the dispositions of a leader, be effective in optimizing external leverages and are clear about their role expectations. These ‘LEADER’ qualities are necessary and relevant in the post-Covid era. Beyond this, school leaders with ‘LEADER’ qualities are well supported by the Ministry of Education, which takes cognizance of emerging trends and continually review education policies to address related issues. Concluding Statement: Discussions within the education ecosystem and among other stakeholders on the implications of the use of artificial intelligence and ChatGPT on the school curriculum, including content knowledge, pedagogy, and assessment, are ongoing. This augurs well for school leaders as they undertake their responsibilities as leaders of future-ready learners.

Keywords: Singapore education system, ‘LEADER’ qualities, school leadership, future-ready leaders, future-ready learners

Procedia PDF Downloads 72
3965 A Review on Big Data Movement with Different Approaches

Authors: Nay Myo Sandar

Abstract:

With the growth of technologies and applications, a large amount of data has been producing at increasing rate from various resources such as social media networks, sensor devices, and other information serving devices. This large collection of massive, complex and exponential growth of dataset is called big data. The traditional database systems cannot store and process such data due to large and complexity. Consequently, cloud computing is a potential solution for data storage and processing since it can provide a pool of resources for servers and storage. However, moving large amount of data to and from is a challenging issue since it can encounter a high latency due to large data size. With respect to big data movement problem, this paper reviews the literature of previous works, discusses about research issues, finds out approaches for dealing with big data movement problem.

Keywords: Big Data, Cloud Computing, Big Data Movement, Network Techniques

Procedia PDF Downloads 87
3964 Development of Social Competence in the Preparation and Continuing Training of Adult Educators

Authors: Genute Gedviliene, Vidmantas Tutlys

Abstract:

The aim of this paper is to reveal the deployment and development of the social competence in the higher education programmes of adult education and in the continuing training and competence development of the andragogues. There will be compared how the issues of cooperation and communication in the learning and teaching processes are treated in the study programmes and in the courses of continuing training of andragogues. Theoretical and empirical research methods were combined for research analysis. For the analysis the following methods were applied: 1) Literature and document analysis helped to highlight the communication and cooperation as fundamental phenomena of the social competence, it’s important for the adult education in the context of digitalization and globalization. There were also analyzed the research studies on the development of social competence in the field of andragogy, as well as on the place and weight of the social competence in the overall competence profile of the andragogue. 2) The empirical study is based on questionnaire survey method. The population of survey consists of 240 students of bachelor and master degree studies of andragogy in Lithuania and of 320 representatives of the different bodies and institutions involved in the continuing training and professional development of the adult educators in Lithuania. The themes of survey questionnaire were defined on the basis of findings of the literature review and included the following: 1) opinions of the respondents on the role and place of a social competence in the work of andragogue; 2) opinions of the respondents on the role and place of the development of social competence in the curricula of higher education studies and continuing training courses; 3) judgements on the implications of the higher education studies and courses of continuing training for the development of social competence and it’s deployment in the work of andragogue. Data analysis disclosed a wide range of ways and modalities of the deployment and development of social competence in the preparation and continuing training of the adult educators. Social competence is important for the students and adult education providers not only as the auxiliary capability for the communication and transfer of information, but also as the outcome of collective learning leading to the development of new capabilities applied by the learners in the learning process, their professional field of adult education and their social life. Equally so, social competence is necessary for the effective adult education activities not only as an auxiliary capacity applied in the teaching process, but also as a potential for improvement, development and sustainability of the didactic competence and know-how in this field. The students of the higher education programmes in the field of adult education treat social competence as important generic capacity important for the work of adult educator, whereas adult education providers discern the concrete issues of application of social competence in the different processes of adult education, starting from curriculum design and ending with assessment of learning outcomes.

Keywords: adult education, andragogues, social competence, curriculum

Procedia PDF Downloads 142
3963 Design of Composite Joints from Carbon Fibre for Automotive Parts

Authors: G. Hemath Kumar, H. Mohit, K. Karthick

Abstract:

One of the most important issues in the composite technology is the repairing of parts of aircraft structures which is manufactured from composite materials. In such applications and also for joining various composite parts together, they are fastened together either using adhesives or mechanical fasteners. The tensile strength of these joints was carried out using Universal Testing Machine (UTM). A parametric study was also conducted to compare the performance of the hybrid joint with varying adherent thickness, adhesive thickness and overlap length. The composition of the material is combination of epoxy resin and carbon fibre under the method of reinforcement. To utilize the full potential of composite materials as structural elements, the strength and stress distribution of these joints must be understood. The study of tensile strength in the members involved under various design conditions and various joints were took place.

Keywords: carbon fiber, FRP composite, MMC, automotive

Procedia PDF Downloads 410
3962 Filling the Gap of Extraction of Digital Evidence from Emerging Platforms Without Forensics Tools

Authors: Yi Anson Lam, Siu Ming Yiu, Kam Pui Chow

Abstract:

Digital evidence has been tendering to courts at an exponential rate in recent years. As an industrial practice, most digital evidence is extracted and preserved using specialized and well-accepted forensics tools. On the other hand, the advancement in technologies enables the creation of quite a few emerging platforms such as Telegram, Signal etc. Existing (well-accepted) forensics tools were not designed to extract evidence from these emerging platforms. While new forensics tools require a significant amount of time and effort to be developed and verified, this paper tries to address how to fill this gap using quick-fix alternative methods for digital evidence collection (e.g., based on APIs provided by Apps) and discuss issues related to the admissibility of this evidence to courts with support from international courts’ stance and the circumstances of accepting digital evidence using these proposed alternatives.

Keywords: extraction, digital evidence, laws, investigation

Procedia PDF Downloads 68
3961 A Comparative Human Rights Analysis of Deprivation of Citizenship as a Counterterrorism Instrument: An Evaluation of Belgium

Authors: Louise Reyntjens

Abstract:

In response to Islamic-inspired terrorism and the growing trend of foreign fighters, European governments are increasingly relying on the deprivation of citizenship as a security tool. This development fits within a broader securitization of immigration, where the terrorist threat is perceived as emanating from abroad. As a result, immigration law became more and more ‘securitized’. The European migration crisis has reinforced this trend. This research evaluates the deprivation of citizenship from a human rights perspective. For this, the author selected four European countries for a comparative study: Belgium, France, the United Kingdom and Sweden. All these countries face similar social and security issues, vitalizing (the debate on) deprivation of citizenship as a counterterrorism tool. Yet, they adopt a very different approach on this: The United Kingdom positions itself on the repressive side of the spectrum. Sweden on the other hand, also ‘securitized’ its immigration policy after the recent terrorist hit in Stockholm but remains on the tolerant side of the spectrum. Belgium and France are situated in between. This contribution evaluates the deprivation of citizenship in Belgium. Belgian law has provided the possibility to strip someone of their Belgian citizenship since 1919. However, the provision long remained a dead letter. The 2015 Charlie Hebdo attacks in Paris sparked a series of legislative changes, elevating the deprivation measure to a key security tool in Belgian law. Yet, the measure raises profound human rights issues. Firstly, it infringes the right to private and family life. As provided by Article 8 (2) European Court of Human Right (ECHR), this right can be limited if necessary for national security and public safety. Serious questions can however be raised about the necessity for the national security of depriving an individual of its citizenship. Behavior giving rise to this measure will generally be governed by criminal law. From a security perspective, criminal detention will thus already provide in removing the individual from society. Moreover, simply stripping an individual of its citizenship and deporting them constitutes a failure of criminal law’s responsibility to prosecute criminal behavior. Deprivation of citizenship is also discriminatory, because it differentiates, without a legitimate reason, between those liable to deprivation and those who are not. It thereby installs a secondary class of citizens, violating the European Court of Human Right’s principle that no distinction can be tolerated between children on the basis of the status of their parents. If followed by expulsion, deprivation also seriously jeopardizes the right to life and prohibition of torture. This contribution explores the human rights consequences of citizenship deprivation as a security tool in Belgium. It also offers a critical view on its efficacy for protecting national security.

Keywords: Belgium, counterterrorism strategies, deprivation of citizenship, human rights, immigration law

Procedia PDF Downloads 125
3960 Power Quality Evaluation of Electrical Distribution Networks

Authors: Mohamed Idris S. Abozaed, Suliman Mohamed Elrajoubi

Abstract:

Researches and concerns in power quality gained significant momentum in the field of power electronics systems over the last two decades globally. This sudden increase in the number of concerns over power quality problems is a result of the huge increase in the use of non-linear loads. In this paper, power quality evaluation of some distribution networks at Misurata - Libya has been done using a power quality and energy analyzer (Fluke 437 Series II). The results of this evaluation are used to minimize the problems of power quality. The analysis shows the main power quality problems that exist and the level of awareness of power quality issues with the aim of generating a start point which can be used as guidelines for researchers and end users in the field of power systems.

Keywords: power quality disturbances, power quality evaluation, statistical analysis, electrical distribution networks

Procedia PDF Downloads 534
3959 Highly Realistic Facial Expressions of Anthropomorphic Social Agent as a Factor in Solving the 'Uncanny Valley' Problem

Authors: Daniia Nigmatullina, Vlada Kugurakova, Maxim Talanov

Abstract:

We present a methodology and our plans of anthropomorphic social agent visualization. That includes creation of three-dimensional model of the virtual companion's head and its facial expressions. Talking Head is a cross-disciplinary project of developing of the human-machine interface with cognitive functions. During the creation of a realistic humanoid robot or a character, there might be the ‘uncanny valley’ problem. We think about this phenomenon and its possible causes. We are going to overcome the ‘uncanny valley’ by increasing of realism. This article discusses issues that should be considered when creating highly realistic characters (particularly the head), their facial expressions and speech visualization.

Keywords: anthropomorphic social agent, facial animation, uncanny valley, visualization, 3D modeling

Procedia PDF Downloads 290
3958 The Internet of Things Ecosystem: Survey of the Current Landscape, Identity Relationship Management, Multifactor Authentication Mechanisms, and Underlying Protocols

Authors: Nazli W. Hardy

Abstract:

A critical component in the Internet of Things (IoT) ecosystem is the need for secure and appropriate transmission, processing, and storage of the data. Our current forms of authentication, and identity and access management do not suffice because they are not designed to service cohesive, integrated, interconnected devices, and service applications. The seemingly endless opportunities of IoT are in fact circumscribed on multiple levels by concerns such as trust, privacy, security, loss of control, and related issues. This paper considers multi-factor authentication (MFA) mechanisms and cohesive identity relationship management (IRM) standards. It also surveys messaging protocols that are appropriate for the IoT ecosystem.

Keywords: identity relation management, multifactor authentication, protocols, survey of internet of things ecosystem

Procedia PDF Downloads 355
3957 An Empirical Study Comparing Industry Segments as Regards Organisation Management in Open Innovation - Based on a Questionnaire of the Pharmaceutical Industry and IT Component Industry Segment

Authors: Fumihiko Isada, Yuriko Isada

Abstract:

The aim of this research is to clarify the difference by industry segment or product characteristics as regards organisation management for an open innovation to raise R&D performance. In particular, the trait of the pharmaceutical industry is defined in comparison with IT component industry segment. In considering open innovation, both inter-organisational relation and the management in an organisation are important issues. As methodology, a questionnaire was conducted. In conclusion, suitable organisation management according to the difference in industry segment or product characteristics became clear.

Keywords: empirical study, industry segment, open innovation, product-development organisation pattern

Procedia PDF Downloads 427
3956 Impact of Fin Cross Section Shape on Potential Distribution of Nanoscale Trapezoidal FinFETs

Authors: Ahmed Nassim Moulai Khatir

Abstract:

Fin field effect transistors (FinFETs) deliver superior levels of scalability than the classical structure of MOSFETs by offering the elimination of short channel effects. Modern FinFETs are 3D structures that rise above the planar substrate, but some of these structures have inclined surfaces, which results in trapezoidal cross sections instead of rectangular sections usually used. Fin cross section shape of FinFETs results in some device issues, like potential distribution performance. This work analyzes that impact with three-dimensional numeric simulation of several triple-gate FinFETs with various top and bottom widths of fin. Results of the simulation show that the potential distribution and the electrical field in the fin depend on the sidewall inclination angle.

Keywords: FinFET, cross section shape, SILVACO, trapezoidal FinFETs

Procedia PDF Downloads 47
3955 Poster for Sickle Cell Disease and Barriers to Care in South Yorkshire from 2017 to 2023

Authors: Amardass Dhami, Clare Samuelson

Abstract:

Background: Sickle cell disease (SCD) is a complex, multisystem condition that significantly impacts patients' quality of life, characterized by acute illness episodes, progressive organ damage, and reduced life expectancy. In the UK, over 13,000 individuals are affected, with South Yorkshire having the fifth highest prevalence, including approximately 800 patients. Retinal complications in SCD can manifest as either proliferative or non-proliferative disease, with proliferative changes being more prevalent. These retinal issues can cause significant morbidity, including visual loss and increased care requirements, underscoring the need for regular monitoring. An integrated approach was applied to ensure timely interventions, ultimately enhancing patient outcomes and reduce ‘did not attend’ rates. Aim: To assess the factors which may influence attendance to Haematology and Ophthalmology Clinics with attention towards levels of deprivation towards non-attendance. Method : A retrospective study on 84 eligible patients, from the regional tertiary Centre for Sickle Cell Care (Sheffield Teaching Hospital) from 2017 to 2023. The study focused on the incidence of sickle cell eye disease, specifically examining the outcomes of patients who attended the combined haematology and ophthalmology clinics. Patients who did not attend either clinic were excluded from the analysis to ensure a clear understanding of the combined clinic's impact. This data was then compared with the United Kingdom’s Index of Multiple Deprivation (IMD) datasets to assess if inequalities of care affected this population. Results: The study concluded that the effectiveness of combining haematology and ophthalmology clinics was reduced following the intervention. The DNA rates increased to 40% for the haematology clinic. Additionally, a significant proportion of the cohort was classified as residing in areas of deprivation, suggesting a possible link between socioeconomic factors and non-attendance rates Conclusion: These findings underscore the challenges of integrating care for SCD patients, particularly in relation to socioeconomic barriers. Despite the intent to streamline care and improve patient outcomes, the increase in DNA rates points to the need for further investigation into the underlying causes of non-attendance. Addressing these issues, especially in deprived areas, could enhance the effectiveness of combined clinics and ensure that patients receive the necessary monitoring and interventions for their eye health and overall well-being. Future strategies may need to focus on improving accessibility, outreach, and support for patients to mitigate the impact of socioeconomic factors on healthcare attendance.

Keywords: south yorkshire, sickle cell anemia, deprivation, factors, haematology

Procedia PDF Downloads 14
3954 Exploring De-Fi through 3 Case Studies: Transparency, Social Impact, and Regulation

Authors: Dhaksha Vivekanandan

Abstract:

DeFi is a network that avoids reliance on financial intermediaries through its peer-to-peer financial network. DeFi operates outside of government control; hence it is important for us to understand its impacts. This study employs a literature review to understand DeFi and its emergence, as well as its implications on transparency, social impact, and regulation. Further, 3 case studies are analysed within the context of these categories. DeFi’s provision of increased transparency poses environmental and storage costs and can lead to user privacy being endangered. DeFi allows for the provision of entrepreneurial incentives and protection against monetary censorship and capital control. Despite DeFi's transparency issues and volatility costs, it has huge potential to reduce poverty; however, regulation surrounding DeFi still requires further tightening by governments.

Keywords: DeFi, transparency, regulation, social impact

Procedia PDF Downloads 84
3953 Factors Associated with Treatment Adherence among Pulmonary Tuberculosis Patients in New Delhi

Authors: Ilham Zaidi, P. Sankara Sarma, Quazi Taufique Ahmed, V. Raman Kutty, Khalid Umer Khayyam, Gurpreet Singh, Abhishek Royal

Abstract:

Introduction: Tuberculosis is a global public health emergency, but it is particularly acute in India, which has the world's highest tuberculosis burden. Due to overpopulation, lack of sanitation, malnutrition, low living standards, and poor socioeconomic status, among other factors, it is India's most common infectious disease. The long period of treatment is one of the main reasons for considering it as a public health emergency. Consequently, there is an increase in patient noncompliance, which leads to treatment failure, adverse treatment outcomes, and deaths. This could lead to the growth of anti-TB drug resistance. According to the WHO, approximately 558 thousand new cases of Multi-Drug Resistance Tuberculosis were diagnosed worldwide, with 8.5 percent developed Extensively Drug Resistance Tuberculosis. Methodology: This study is a program-based cross-sectional descriptive survey of adult tuberculosis patients enrolled in the Delhi-based Revised National Tuberculosis Program. The study setting was 27 NTEP districts of Delhi. (N=65,893) and Sample size- was 200; the sampling method which is used in the study was the systemic random sampling method. Results: Most of the demographic factors (age, gender, residence, and family type) were not significantly associated with adherence; marital status was found statistically significant with the treatment compliance. Hesitation while telling people about the disease and motivation to strictly follow drug schedule by healthcare workers were other factors where a significant association with drug adherence was observed. The study findings also suggest that provision of food, minimal financial and other moral support from family, counseling, discussion and politeness by healthcare providers might also facilitate adherence. Discussion and Conclusions: For TB treatment, adherence, age, sex, socioeconomic status, types of accommodations, malnutrition, and personal hygiene should all be considered; similar results were observed in previous studies. In the care of TB patients, DOTS services, health workers, and family support play a significant role. According to the country's National Strategic Plan, the Indian government has set a goal of eliminating tuberculosis by 2025 and patients' compliance with TB care and treatment adherence is very crucial to achieve this aim. A cohort study will be able to give a better understanding of factors associated with adherence since this study may have missed some defaulters who were absconding and could not be reached. Important Terms: RNTCP, NTEP, DOTS, DS-TB, DR-TB, RR-TB, MDR-TB, XDR-TB, Treatment failure, Treatment relapse, Treatment adherence.

Keywords: treatment adherence, treatment relapse, treatment failure, drug resistance tuberculosis

Procedia PDF Downloads 200
3952 Exploring Ugliness as an Aesthetic Theme in Contemporary Chinese Literature through Analyzing Five Dragons, Protagonist in Rice by Xianfeng Writer Su Tong

Authors: Ku Yu Yiu

Abstract:

Writers have included the ugly in their works for centuries, but ugliness has often served merely as a contrast to bring out the beautiful, not having emerged as an independent aesthetic category until recent history. In the 1980s, China was going through a series of changes and transformations; the wounds and scars from the Cultural Revolution, a freer literary atmosphere then, and the introduction of Western thoughts into China gave rise to a trend of penning the ugly and the repulsive among writers. Such trend of utilizing 'Ugliness' as a theme of writing in Chinese literature is especially observed among Xianfeng writers (China’s pioneer writers or avant-garde writers). As a prominent Xianfeng writer, Su Tong (1963-) also incorporates ugliness into his novels: shoddy environment, degenerate and ruthless society, distorted and decadent humanity are part and parcel of his deliberate efforts of exploring and depicting the ugly aspects of the world. His full-length novel Rice, staging the appalling protagonist Five Dragons, is a prime example. In fact, all characters in Rice exhibit Ugliness but Five Dragons’s turning into a figure of ugly spite is the most thorough and complete, making Rice a masterpiece of Su Tong’s art in projecting the Ugliness embedded in society and human nature. Approaching Rice from the angle of the aesthetics of the Ugly and selecting Five Dragons as the subject of close reading and analysis, this paper offers insights into both Su Tong’s distinct style of foregrounding and unfolding Ugliness in his novel and the workings of such text when he deploys the Ugly as a center component of his writing. In addition to citing from the discussion of Rice by literary critics and the author himself, this paper also presents textual evidence and analyzes the imageries/motifs and calculated vocabulary/narration employed by Su Tong to illustrate how Five Dragons' extreme behaviors and psychological states are integral to the plot and ultimately to the manifestation of ugliness as the novel’s theme. This study reveals that although the psyche and doings of Five Dragons and other 'ugly' characters are, as the author once stated, imagined products of the writer Su Tong himself, Rice sheds light onto the ugly aspects of life in China in 1920s-30s. Three aspects of Ugliness are identified and discussed in the paper. Lastly, this paper also suggests some effects of Su Tong’s exploration of Ugliness in Rice, proposing that the portrayal of Ugliness per se is not the ends of Su Tong’s mastery of the aesthetics of the Ugly but rather a means to making his writing transcend from provoking spontaneous moral judgment in readers on the doings of Five Dragons to prompting readers to ponder on philosophical questions such as how humanity can still be possible when an individual confronts the dark sides of a self, a society, and his/her fate.

Keywords: aesthetics, Rice, Su Tong, Ugly

Procedia PDF Downloads 169
3951 The Feasibility of Economic Science in Islam With an Emphasis on Sadr's Vantage Point

Authors: Yahya Jahangiri, Ali Almasi

Abstract:

Currently capitalism is one of the most important economic issues discussed by great scholars around the world. But Islamic approach, regarding this issue may differ both western and eastern views. A greatest scholar in Islamic economy ‘especially in Shia’ is Martyr Muhammad Baqir Al-Sadr. He wrote “Our economy” (Iqtisaduna) to present an economic point of view according to the Islamic teachings. In this regard firstly we will mention three approaches which are common in Muslim scullers about the economic science and then the main approach which is Sadr's view is described here. His claim explains that Islam and capitalism are in conflict with each other. And finally he explains the relationship between Islam and economy and he suggests the Islamic point of view in economy and its foundations as a solution for economic problems which we face today.

Keywords: Islam, economic science, capitalism, Martyr Sadr

Procedia PDF Downloads 327
3950 Scheduling in Cloud Networks Using Chakoos Algorithm

Authors: Masoumeh Ali Pouri, Hamid Haj Seyyed Javadi

Abstract:

Nowadays, cloud processing is one of the important issues in information technology. Since scheduling of tasks graph is an NP-hard problem, considering approaches based on undeterminisitic methods such as evolutionary processing, mostly genetic and cuckoo algorithms, will be effective. Therefore, an efficient algorithm has been proposed for scheduling of tasks graph to obtain an appropriate scheduling with minimum time. In this algorithm, the new approach is based on making the length of the critical path shorter and reducing the cost of communication. Finally, the results obtained from the implementation of the presented method show that this algorithm acts the same as other algorithms when it faces graphs without communication cost. It performs quicker and better than some algorithms like DSC and MCP algorithms when it faces the graphs involving communication cost.

Keywords: cloud computing, scheduling, tasks graph, chakoos algorithm

Procedia PDF Downloads 65
3949 A Review of Transformer Modeling for Power Line Communication Applications

Authors: Balarabe Nkom, Adam P. R. Taylor, Craig Baguley

Abstract:

Power Line Communications (PLC) is being employed in existing power systems, despite the infrastructure not being designed with PLC considerations in mind. Given that power transformers can last for decades, the distribution transformer in particular exists as a relic of un-optimized technology. To determine issues that may need to be addressed in subsequent designs of such transformers, it is essential to have a highly accurate transformer model for simulations and subsequent optimization for the PLC environment, with a view to increase data speed, throughput, and efficiency, while improving overall system stability and reliability. This paper reviews various methods currently available for creating transformer models and provides insights into the requirements of each for obtaining high accuracy. The review indicates that a combination of traditional analytical methods using a hybrid approach gives good accuracy at reasonable costs.

Keywords: distribution transformer, modelling, optimization, power line communications

Procedia PDF Downloads 508
3948 Risk and Coping: Understanding Community Responses to Calls for Disaster Evacuation in Central Philippines

Authors: Soledad Natalia M. Dalisay, Mylene De Guzman

Abstract:

In archipelagic countries like the Philippines, many communities thrive along coastal areas. The sea is the community members’ main source of livelihood and the site of many cultural activities. For these communities, the sea is their life and livelihood. Nevertheless, the sea also poses a hazard during the rainy season when typhoons frequent their communities. Coastal communities often encounter threats from storm surges and flooding that are common when there are typhoons. During such periods, disaster evacuation programs are implemented. However, in many instances, evacuation has been the bane of local government officials implementing such programs in their communities as resistance from community members is often encountered. Such resistance is often viewed by program implementers as due to the fact that people were hard headed and ignorant of the potential impacts of living in hazard prone areas. This paper argues that it is not for these reasons that people refused to evacuate. Drawing from data collected from fieldwork done in three sites in Central Philippines affected by super typhoon Haiyan, this study aimed to provide a contextualized understanding of peoples’ refusal to heed disaster evacuation warnings. This study utilized the multi-sited ethnography approach with in-depth episodic interviews, focus group discussions, participatory risk mapping and key informant interviews in gathering data on peoples’ experiences and insights specifically on evacuation during typhoon Haiyan. This study showed that people have priorities and considerations vital in their social lives that they are protecting in their refusal to leave their homes for pre-emptive evacuation. It is not that they are not aware of the risks when the face the hazard. It is more that they had faith in the local knowledge and strategies that they have developed since the time of their ancestors as a result of living and engaging with hazards in their areas for as long as they could remember. The study also revealed that risk in encounters with hazards was gendered. Furthermore, previous engagement with local government officials and the manner in which the pre-emptive evacuation programs were implemented had cast doubt on the value of such programs in saving their lives. Life in the designated evacuation areas can be as dangerous if not more compared with living in their coastal homes. There seems to be the impression that in the evacuation program of the government, people were being moved from hazard zones to death zones. Thus, this paper ends with several recommendations that may contribute to building more responsive evacuation programs that aim to build people’s resilience while taking into consideration the local moral world in communities in identified hazard zones.

Keywords: coastal communities, disaster evacuation, disaster risk perception, social and cultural responses to hazards

Procedia PDF Downloads 337
3947 Water Crisis Management in a Tourism Dependent Community

Authors: Aishath Shakeela

Abstract:

At a global level, water stewardship, water stress and water security are crucial factors in tourism planning and development considerations. Challenges associated with water is of particular concern to the Maldives as there is limited availability of freshwater, high dependency on desalinated water, and high unit cost associated with desalinating water. While the Maldives is promoted as an example of sustainable tourism, a key sustainability challenge facing tourism dependent communities is the efficient use and management of available water resources. A water crisis event in the capital island of Maldives highlighted how precarious water related issues are in this tourism dependent destination. Applying netnography, the focus of this working paper is to present community perceptions of how government policies addressed Malé Water and Sewerage Company (MWSC) water crisis event.

Keywords: crisis management, government policies, Maldives, tourism, water

Procedia PDF Downloads 530
3946 Automatic Threshold Search for Heat Map Based Feature Selection: A Cancer Dataset Analysis

Authors: Carlos Huertas, Reyes Juarez-Ramirez

Abstract:

Public health is one of the most critical issues today; therefore, there is great interest to improve technologies in the area of diseases detection. With machine learning and feature selection, it has been possible to aid the diagnosis of several diseases such as cancer. In this work, we present an extension to the Heat Map Based Feature Selection algorithm, this modification allows automatic threshold parameter selection that helps to improve the generalization performance of high dimensional data such as mass spectrometry. We have performed a comparison analysis using multiple cancer datasets and compare against the well known Recursive Feature Elimination algorithm and our original proposal, the results show improved classification performance that is very competitive against current techniques.

Keywords: biomarker discovery, cancer, feature selection, mass spectrometry

Procedia PDF Downloads 338
3945 Portrayal of Kolkata(the former capital of India) in the ‘Kolkata Trilogy’- A Comparative Study of the Films by Mrinal Sen and Satyajit Ray

Authors: Ronit Chakraborty

Abstract:

Kolkata, formerly known as Calcutta, is the capital of West Bengal state and the former capital of India (1722-1911) of British India. Located at the heart of Hugli river (one of the main channels of Ganges river), the city is the heart of the state, which forms a base for commerce, transport and manufacture. The large and vibrant city thrives amidst the economic, social and political issues arising from the pages of history to the contemporary times. The unique nature, grandeurs, public debates on tea-stalls and obviously the charismatic scenic beauty and heritage keep the city to be criticized in all horizons, across the world. Movies in India are a big source of knowledge, which can be used as a powerful tool for political mobilization and to indirectly communicate with voters since cinema can be used as a tool of propaganda as it has a wide range of public interests. History proves the fact that films produced in India have been apt enough in making public interests be deeply portrayed through their content in a versatile manner. Such is the portrayal of India’s first capital, Kolkata and its ultimate truth being organizingly laid over by the trilogy of two international fame directors-Mrinal Sen and Satyajit Ray, through their ‘magnum opus- the ‘Kolkata trilogy’. Mrinal Sen’s Interview(1971), Calcutta 71(1972), Padatik(The Guerilla Fighter)(1973) and Satyajit Ray’s Pratidwandi (The Adversary)(1970), Seemabaddha(Company Limited)(1971), Jana Aranya(1976). These films picturized the contemporary Kolkata trends, issues and crises arising amidst the political set-up both by the positive and negative variables attributing to the day-to-day happenings of the city. The movies have been set amidst the turmoil that the nation was going through during Indira Gandhi’s declaration of Emergency, resulting from the general sense of disillusionment that prevailed during that time. Ray wasn't affiliated to any political party and his films largely contributed towards the contemporary conditions prevailing in the society. Mrinal Sen, being a Marxist was in constant search of the bitter truth that the society had to offer through his lens under the prevailing darkness through his trilogy. The research paper attempts to widely view and draw a comparative study of the overall description of the city of Kolkata as portrayed by Sen and Ray in their respective trilogies. By the usage of the visual content analysis method, the researcher has explored the six movies; both the trilogies of Mrinal Sen and Satyajit Ray and tried to analyse the differences as well as the similarities pertaining to understand India’s first capital city Kolkata in various dimensions along with its circumference.

Keywords: Kolkata, trilogy, Satyajit Ray, Mrinal Sen, films, comparative study

Procedia PDF Downloads 257
3944 PV Module as a Design Element of Barriers for Protection against Noise

Authors: Budimir S. Sudimac, Andjela N. Dubljevic

Abstract:

The aim of thisresearch paper is to consider possibilities for improving the street lighting on the E75 highway, which passes through Serbia, using renewable sources of energy. In this paper, we analyzed the possibilities for installing sound barriers along the highway and integrating photovoltaic (PV) modules, which would generate electrical energy to power the lighting on the section of the highway running through Belgrade. The main aim of this paper is to analyze, show and promote innovative, hybrid, multi-functional solar technology using PV modules as an element of sound barriers in urban areas. The paper seeks to show the hybridity of using sustainable technologies in solving environmental issues. This structure solves the problem of noise in populated areas and provides the electricity from renewable source.

Keywords: noise, PV modules, solar energy, sound barriers

Procedia PDF Downloads 473
3943 Examining Cyber Crime and Its Impacts on E-Banking in Nigeria

Authors: Auwal Nata'ala

Abstract:

The Information and Communication Technology (ICT) has had impacts in almost every area human endeavor. From business, industries, banks to none profit organizations. ICT has simplified business process such as sorting, summarizing, coding, updating and generating a report in a real-time processing mode. However, the use of these ICT facilities such as computer and internet has also brought unintended consequences of criminal activities such as spamming, credit card frauds, ATM frauds, phishing, identity theft, denial of services and other related cyber crimes. This study sought to examined cyber-crime and its impact on the banking institution in Nigeria. It also examined the existing policy framework and assessed the success of the institutional countermeasures in combating cyber crime in the banking industry. This paper X-ray’s cyber crimes, policies issues and provides insight from a Nigeria perspective.

Keywords: cyber crimes, e-banking, policies, ICT

Procedia PDF Downloads 407
3942 Youth Health Promotion Project for Indigenous People in Canada: Together against Bullying and Cyber-Dependence

Authors: Mohamed El Fares Djellatou, Fracoise Filion

Abstract:

The Ashukin program that means bridge in Naskapi or Atikamekw language, has been designed to offer a partnership between nursing students and an indigenous community. The students design a health promotion project tailored to the needs of the community. The issues of intimidation in primary school and cyber-dependence in high school were some concerns in a rural Atikamekw community. The goal of the project was to have a conversation with indigenous youths, aged 10-16 years old, on the challenges presented by intimidation and cyber dependence as well as promoting healthy relationships online and within the community. Methods: Multiple progressive inquiry questions (PIQs) were used to assess the feasibility and importance of this project for the Atikamekw nation, and to determine a plan to follow. The theoretical foundations to guide the conception of the project were the Population Health Promotion Model (PHPM), the First Nations Holistic Lifelong Learning Model, and the Medicine Wheel. A broad array of social determinants of health were addressed, including healthy childhood development, personal health practices, and coping skills, and education. The youths were encouraged to participate in interactive educational sessions, using PowerPoint presentations and pamphlets as the main effective strategies. Additional tools such as cultural artworks and physical activities were introduced to strengthen the inter-relational and team spirit within the Indigenous population. A quality assurance tool (QAT) was developed specifically to determine the appropriateness of these health promotion tools. Improvements were guided by the feedback issued by the indigenous schools’ teachers and social workers who filled the QATs. Post educational sessions, quantitative results have shown that 93.48% of primary school students were able to identify the different types of intimidation, 72.65% recognized more than two strategies, and 52.1% were able to list at least four resources to diffuse intimidation. On the other hand, around 75% of the adolescents were able to name at least three negative effects, and 50% listed three strategies to reduce cyber-dependence. This project was meant to create a bridge with the First Nation through health promotion, a population that is known to be disadvantaged due to systemic health inequity and disparities. Culturally safe care was proposed to deal with the two identified priority issues, and an educational toolkit was given to both schools to ensure the sustainability of the project. The project was self-financed through fundraising activities, and it yielded better results than expected.

Keywords: indigenous, first nation, bullying, cyber-dependence, internet addiction, intimidation, youth, adolescents, school, community nursing, health promotion

Procedia PDF Downloads 98
3941 Analyzing the Participation of Young People in Politics: An Exploratory Study Applied on Motivation in Croatia

Authors: Valentina Piric, Maja Martinovic, Zoran Barac

Abstract:

The application of marketing to the domain of politics has become relevant in recent times. With this article the authors wanted to explore the issue of the current political engagement among young people in Croatia. The question is what makes young people (age 18-30) politically active in young democracies such as that of the Republic of Croatia. Therefore, the objective of this study was to discover the real or hidden motivations behind the decision to actively participate in politics among young members of the two largest political parties in the country – the Croatian Democratic Union and the Social Democratic Party of Croatia. The study expected to find that the motivation for political engagement of young people is often connected with a possible achievement of individual goals and egoistic needs such as: self-acceptance, social success, financial success, prestige, reputation, status, recognition from the others etc. It was also expected that, due to the poor economic and social situation in the country, young people feel an increasing disconnection from politics. Additionally, the authors expected to find that there is a huge potential to engage young people in the political life of the country through a proper and more interactive use of marketing communication campaigns and social media platforms, with an emphasis on highly ethical motives of political activity and their benefits to society. All respondents included in the quantitative survey (sample size [N=100]) are active in one of the two largest political parties in Croatia. The sampling and distribution of the survey occurred in the field in September 2016. The results of the survey demonstrate that in Croatia, the way young people feel about politics and act accordingly, are in fact similar to what the theory describes. The research findings reveal that young people are politically active; however, the challenge is to find a way to motivate even more young people in Croatia to actively participate in the political and democratic processes in the country and to encourage them to see additional benefits out of this practice, not only related to their individual motives, but related more to the well-being of Croatia as a country and of every member of society. The research also discovered a huge potential for political marketing communication possibilities, especially related to interactive social media. It is possible that the social media channels have a stronger influence on the decision-making process among young people when compared to groups of reference. The level of interest in politics among young Croatians varies; some of them are almost indifferent, whilst others express a serious interest in different ways to actively contribute to the political life of the country, defining a participation in the political life of their country almost as their moral obligation. However, additional observations and further research need to be conducted to get a clearer and more precise picture about the interest in politics among young people in Croatia and their social potential.

Keywords: Croatia, marketing communication, motivation, politics, young people

Procedia PDF Downloads 333
3940 Honneth, Feenberg, and the Redemption of Critical Theory of Technology

Authors: David Schafer

Abstract:

Critical Theory is in sore need of a workable account of technology. It had one in the writings of Herbert Marcuse, or so it seemed until Jürgen Habermas mounted a critique in 'Technology and Science as Ideology' (Habermas, 1970) that decisively put it away. Ever since Marcuse’s work has been regarded outdated – a 'philosophy of consciousness' no longer seriously tenable. But with Marcuse’s view has gone the important insight that technology is no norm-free system (as Habermas portrays it) but can be laden with social bias. Andrew Feenberg is among a few serious scholars who have perceived this problem in post-Habermasian critical theory and has sought to revive a basically Marcusean account of technology. On his view, while so-called ‘technical elements’ that physically make up technologies are neutral with regard to social interests, there is a sense in which we may speak of a normative grammar or ‘technical code’ built-in to technology that can be socially biased in favor of certain groups over others (Feenberg, 2002). According to Feenberg, those perspectives on technology are reified which consider technology only by their technical elements to the neglect of their technical codes. Nevertheless, Feenberg’s account fails to explain what is normatively problematic with such reified views of technology. His plausible claim that they represent false perspectives on technology by itself does not explain how such views may be oppressive, even though Feenberg surely wants to be doing that stronger level of normative theorizing. Perceiving this deficit in his own account of reification, he tries to adopt Habermas’s version of systems-theory to ground his own critical theory of technology (Feenberg, 1999). But this is a curious move in light of Feenberg’s own legitimate critiques of Habermas’s portrayals of technology as reified or ‘norm-free.’ This paper argues that a better foundation may be found in Axel Honneth’s recent text, Freedom’s Right (Honneth, 2014). Though Honneth there says little explicitly about technology, he offers an implicit account of reification formulated in opposition to Habermas’s systems-theoretic approach. On this ‘normative functionalist’ account of reification, social spheres are reified when participants prioritize individualist ideals of freedom (moral and legal freedom) to the neglect of an intersubjective form of freedom-through-recognition that Honneth calls ‘social freedom.’ Such misprioritization is ultimately problematic because it is unsustainable: individual freedom is philosophically and institutionally dependent upon social freedom. The main difficulty in adopting Honneth’s social theory for the purposes of a theory of technology, however, is that the notion of social freedom is predicable only of social institutions, whereas it appears difficult to conceive of technology as an institution. Nevertheless, in light of Feenberg’s work, the idea that technology includes within itself a normative grammar (technical code) takes on much plausibility. To the extent that this normative grammar may be understood by the category of social freedom, Honneth’s dialectical account of the relationship between individual and social forms of freedom provides a more solid basis from which to ground the normative claims of Feenberg’s sociological account of technology than Habermas’s systems theory.

Keywords: Habermas, Honneth, technology, Feenberg

Procedia PDF Downloads 198
3939 The Effects of Perceived Organizational Support and Abusive Supervision on Employee’s Turnover Intention: The Mediating Roles of Psychological Contract and Emotional Exhaustion

Authors: Seung Yeon Son

Abstract:

Workers (especially, competent personnel) have been recognized as a core contributor to overall organizational effectiveness. Hence, verifying the determinants of turnover intention is one of the most important research issues. This study tested the influence of perceived organizational support and abusive supervision on employee’s turnover intention. In addition, mediating roles of psychological contract and emotional exhaustion were examined. Data from 255 Korean employees supported all hypotheses Implications for research and directions for future research are discussed.

Keywords: abusive supervision, emotional exhaustion, perceived organizational support, psychological contract, turnover intention

Procedia PDF Downloads 493
3938 MSG Image Encryption Based on AES and RSA Algorithms "MSG Image Security"

Authors: Boukhatem Mohammed Belkaid, Lahdir Mourad

Abstract:

In this paper, we propose a new encryption system for security issues meteorological images from Meteosat Second Generation (MSG), which generates 12 images every 15 minutes. The hybrid encryption scheme is based on AES and RSA algorithms to validate the three security services are authentication, integrity and confidentiality. Privacy is ensured by AES, authenticity is ensured by the RSA algorithm. Integrity is assured by the basic function of the correlation between adjacent pixels. Our system generates a unique password every 15 minutes that will be used to encrypt each frame of the MSG meteorological basis to strengthen and ensure his safety. Several metrics have been used for various tests of our analysis. For the integrity test, we noticed the efficiencies of our system and how the imprint cryptographic changes at reception if a change affects the image in the transmission channel.

Keywords: AES, RSA, integrity, confidentiality, authentication, satellite MSG, encryption, decryption, key, correlation

Procedia PDF Downloads 383
3937 Mutual Authentication for Sensor-to-Sensor Communications in IoT Infrastructure

Authors: Shadi Janbabaei, Hossein Gharaee Garakani, Naser Mohammadzadeh

Abstract:

Internet of things is a new concept that its emergence has caused ubiquity of sensors in human life, so that at any time, all data are collected, processed and transmitted by these sensors. In order to establish a secure connection, the first challenge is authentication between sensors. However, this challenge also requires some features so that the authentication is done properly. Anonymity, untraceability, and being lightweight are among the issues that need to be considered. In this paper, we have evaluated the authentication protocols and have analyzed the security vulnerabilities found in them. Then an improved light weight authentication protocol for sensor-to-sensor communications is presented which uses the hash function and logical operators. The analysis of protocol shows that security requirements have been met and the protocol is resistant against various attacks. In the end, by decreasing the number of computational cost functions, it is argued that the protocol is lighter than before.

Keywords: anonymity, authentication, Internet of Things, lightweight, un-traceability

Procedia PDF Downloads 293