Search results for: resource-based view theory
5711 Using an Empathy Intervention Model to Enhance Empathy and Socially Shared Regulation in Youth with Autism Spectrum Disorder
Authors: Yu-Chi Chou
Abstract:
The purpose of this study was to establish a logical path of an instructional model of empathy and social regulation, providing feasibility evidence on the model implementation in students with autism spectrum disorder (ASD). This newly developed Emotional Bug-Out Bag (BoB) curriculum was designed to enhance the empathy and socially shared regulation of students with ASD. The BoB model encompassed three instructional phases of basic theory lessons (BTL), action plan practices (APP), and final theory practices (FTP) during implementation. Besides, a learning flow (teacher-directed instruction, student self-directed problem-solving, group-based task completion, group-based reflection) was infused into the progress of instructional phases to deliberately promote the social regulatory process in group-working activities. A total of 23 junior high school students with ASD were implemented with the BoB curriculum. To examine the logical path for model implementation, data was collected from the participating students’ self-report scores on the learning nodes and understanding questions. Path analysis using structural equation modeling (SEM) was utilized for analyzing scores on 10 learning nodes and 41 understanding questions through the three phases of the BoB model. Results showed (a) all participants progressed throughout the implementation of the BoB model, and (b) the models of learning nodes and phases were positive and significant as expected, confirming the hypothesized logic path of this curriculum.Keywords: autism spectrum disorder, empathy, regulation, socially shared regulation
Procedia PDF Downloads 675710 Development and Optimization of German Diagnostical Tests in Mathematics for Vocational Training
Authors: J. Thiele
Abstract:
Teachers working at vocational Colleges are often confronted with the problem, that many students graduated from different schools and therefore each had a different education. Especially in mathematics many students lack fundamentals or had different priorities at their previous schools. Furthermore, these vocational Colleges have to provide Graduations for many different working-fields, with different core themes. The Colleges are interested in measuring the different Education levels of their students and providing assistance for those who need to catch up. The Project mathe-meistern was initiated to remedy this problem at vocational Colleges. For this purpose, online-tests were developed. The aim of these tests is to evaluate basic mathematical abilities of the students. The tests are online Multiple-Choice-Tests with a total of 65 Items. They are accessed online with a unique Transaction-Number (TAN) for each participant. The content is divided in several Categories (Arithmetic, Algebra, Fractions, Geometry, etc.). After each test, the student gets a personalized summary depicting their strengths and weaknesses in mathematical Basics. Teachers can visit a special website to examine the results of their classes or single students. In total 5830 students did participate so far. For standardization and optimization purposes the tests are being evaluated, using the classic and probabilistic Test-Theory regarding Objectivity, Reliability and Validity, annually since 2015. This Paper is about the Optimization process considering the Rasch-scaling and Standardization of the tests. Additionally, current results using standardized tests will be discussed. To achieve this Competence levels and Types of errors of students attending vocational Colleges in Nordrheinwestfalen, Germany, were determined, using descriptive Data and Distractorevaluations.Keywords: diagnostical tests in mathematics, distractor devaluation, test-optimization, test-theory
Procedia PDF Downloads 1285709 Men's Intimate Violence: Theory and Practice Relationship
Authors: Omer Zvi Shaked
Abstract:
Intimate Partner Violence (IPV) is a widespread social problem. Since the 1970's, and due to political changes resulting from the feminist movement, western society has been changing its attitude towards the phenomenon and has been taking an active approach to reduce its magnitude. Enterprises in the form of legislation, awareness and prevention campaigns, women's shelters, and community intervention programs became more prevalent as years progressed. Although many initiatives were found to be productive, the effectiveness of one, however, remained questionable throughout the years: intervention programs for men's intimate violence. Surveys outline two main intervention models for men's intimate violence. The first is the Duluth model, which argued that men are socialized to be dominant - while women are socialized to be subordinate - and men are therefore required by social imperative to enforce, physically if necessary, their dominance. The Duluth model became the chief authorized intervention program, and some states in the US even regulated it as the standard criminal justice program for men's intimate violence. However, meta-analysis findings demonstrated that based on a partner's reports, Duluth treatment completers have 44% recidivism rate, and between 40% and 85% dropout range. The second model is the Cognitive-Behavioral Model (CBT), which is a highly accepted intervention worldwide. The model argues that cognitive misrepresentations of intimate situations precede violent behaviors frequently when anger predisposition exists. Since anger dysregulation mediates between one's cognitive schemes and violent response, anger regulation became the chief purpose of the intervention. Yet, a meta-analysis found only a 56% risk reduction for CBT interventions. It is, therefore, crucial to understand the background behind the domination of both the Duluth model and CBT interventions. This presentation will discuss the ways in which theoretical conceptualizations of men's intimate violence, as well as ideologies, had contributed to the above-mentioned interventions' wide acceptance, despite known lack of scientific and evidential support. First, the presentation will review the prominent interventions for male intimate violence, the Duluth model, and CBT. Second, the presentation will review the prominent theoretical models explaining men's intimate violence: The Patriarchal model, the Abusive Personality model, and the Post-Traumatic Stress model. Third, the presentation will discuss the interrelation between theory and practice, and the nature of affinity between research and practice regarding men's intimate violence. Finally, the presentation will set new directions for further research, aiming to improve intervention's efficiency with men's intimate violence and advance social work practice in the field.Keywords: intimate partner violence, theory and practice relationship, Duluth, CBT, abusive personality, post-traumatic stress
Procedia PDF Downloads 1275708 Arabic Handwriting Recognition Using Local Approach
Authors: Mohammed Arif, Abdessalam Kifouche
Abstract:
Optical character recognition (OCR) has a main role in the present time. It's capable to solve many serious problems and simplify human activities. The OCR yields to 70's, since many solutions has been proposed, but unfortunately, it was supportive to nothing but Latin languages. This work proposes a system of recognition of an off-line Arabic handwriting. This system is based on a structural segmentation method and uses support vector machines (SVM) in the classification phase. We have presented a state of art of the characters segmentation methods, after that a view of the OCR area, also we will address the normalization problems we went through. After a comparison between the Arabic handwritten characters & the segmentation methods, we had introduced a contribution through a segmentation algorithm.Keywords: OCR, segmentation, Arabic characters, PAW, post-processing, SVM
Procedia PDF Downloads 745707 Research of Data Cleaning Methods Based on Dependency Rules
Authors: Yang Bao, Shi Wei Deng, WangQun Lin
Abstract:
This paper introduces the concept and principle of data cleaning, analyzes the types and causes of dirty data, and proposes several key steps of typical cleaning process, puts forward a well scalability and versatility data cleaning framework, in view of data with attribute dependency relation, designs several of violation data discovery algorithms by formal formula, which can obtain inconsistent data to all target columns with condition attribute dependent no matter data is structured (SQL) or unstructured (NoSQL), and gives 6 data cleaning methods based on these algorithms.Keywords: data cleaning, dependency rules, violation data discovery, data repair
Procedia PDF Downloads 5655706 A TgCNN-Based Surrogate Model for Subsurface Oil-Water Phase Flow under Multi-Well Conditions
Authors: Jian Li
Abstract:
The uncertainty quantification and inversion problems of subsurface oil-water phase flow usually require extensive repeated forward calculations for new runs with changed conditions. To reduce the computational time, various forms of surrogate models have been built. Related research shows that deep learning has emerged as an effective surrogate model, while most surrogate models with deep learning are purely data-driven, which always leads to poor robustness and abnormal results. To guarantee the model more consistent with the physical laws, a coupled theory-guided convolutional neural network (TgCNN) based surrogate model is built to facilitate computation efficiency under the premise of satisfactory accuracy. The model is a convolutional neural network based on multi-well reservoir simulation. The core notion of this proposed method is to bridge two separate blocks on top of an overall network. They underlie the TgCNN model in a coupled form, which reflects the coupling nature of pressure and water saturation in the two-phase flow equation. The model is driven by not only labeled data but also scientific theories, including governing equations, stochastic parameterization, boundary, and initial conditions, well conditions, and expert knowledge. The results show that the TgCNN-based surrogate model exhibits satisfactory accuracy and efficiency in subsurface oil-water phase flow under multi-well conditions.Keywords: coupled theory-guided convolutional neural network, multi-well conditions, surrogate model, subsurface oil-water phase
Procedia PDF Downloads 885705 A Blending Analysis of Metaphors and Metonymies Used to Depict the Deal of the Century by Jordanian Cartoonists
Authors: Aseel Zibin, Abdel Rahman Altakhaineh
Abstract:
This study analyses 30 cartoons depicting THE DEAL OF THE CENTURY as envisaged by two Jordanian cartoonists, namely, EmadHajjaj and Osama Hajjaj. Conceptual Blending Theory (CBT) and Multimodal Metaphor Theory (MMT) are adopted as a theoretical framework to interpret the metaphors and metonymies used in the target cartoons. The results reveal that the target domain THE DEAL OF THE CENTURY was conceptualized mainly through layered metaphors that have metonymic basis and event metaphors\allegories. Specifically, 6 groups were identified: OBJECT or a situation involving OBJECTS, situations involving HUMANS\HYBRIDS of HUMANS and OBJECTS, an ANIMAL OR situation involving an ANIMAL, hybrids of WEAPONS and humans, and event metaphors used to build a story\allegory. The target domain was also depicted via event metaphors used to build a story; some of which are embedded in the Jordanian culture, while others could be perceivable cross-culturally. The results also demonstrate that the most widely used configurations to construe the metaphors was the pictorial source–verbal target in line with Lan and Zuo (2016); the motivation was probably the greater conceptual density and concreteness of visual representation since the target is better captured verbally because of its abstractness. The use of cross-modal mappings of this type was attributed to the abstractness of the target domain, THE DEAL OF THE CENTURY, which makes it more construable via verbal cues rather than visual ones. In contrast, the source domains used were mainly concrete and thus perceivable pictorially rather than verbally.Keywords: semiotics, cognitive semantics, metaphor, culture, blending, cartoon
Procedia PDF Downloads 1825704 Method to Find a ε-Optimal Control of Stochastic Differential Equation Driven by a Brownian Motion
Authors: Francys Souza, Alberto Ohashi, Dorival Leao
Abstract:
We present a general solution for finding the ε-optimal controls for non-Markovian stochastic systems as stochastic differential equations driven by Brownian motion, which is a problem recognized as a difficult solution. The contribution appears in the development of mathematical tools to deal with modeling and control of non-Markovian systems, whose applicability in different areas is well known. The methodology used consists to discretize the problem through a random discretization. In this way, we transform an infinite dimensional problem in a finite dimensional, thereafter we use measurable selection arguments, to find a control on an explicit form for the discretized problem. Then, we prove the control found for the discretized problem is a ε-optimal control for the original problem. Our theory provides a concrete description of a rather general class, among the principals, we can highlight financial problems such as portfolio control, hedging, super-hedging, pairs-trading and others. Therefore, our main contribution is the development of a tool to explicitly the ε-optimal control for non-Markovian stochastic systems. The pathwise analysis was made through a random discretization jointly with measurable selection arguments, has provided us with a structure to transform an infinite dimensional problem into a finite dimensional. The theory is applied to stochastic control problems based on path-dependent stochastic differential equations, where both drift and diffusion components are controlled. We are able to explicitly show optimal control with our method.Keywords: dynamic programming equation, optimal control, stochastic control, stochastic differential equation
Procedia PDF Downloads 1905703 Niftiness of the COLME to Promote Shared Decision-Making in Organizations
Authors: Prakash Singh
Abstract:
The question that arises is whether a theory such as the Collegial Leadership Model of Emancipation (COLME) has the potency to introduce leadership change by empowering and emancipating their employees. It is a fallacy to simply assume that experience alone, in the absence of theory, will contribute to this knowledge base to develop collegial leaders. The focus of this study is to therefore ascertain whether the COLME can serve as a conceptual framework to transform traditional bureaucratic management practices (TBMPs) in order to promote shared decision-making in organizations such as schools. All the respondents in this exploratory qualitative study embraced collegiality to transform TBMPs in their organizations. For the positive effects to be sustained, the collegial practices need to be evolutionary and emancipatory in order to evoke the values of collegial leadership as elucidated by the findings of this study. Interviewees affirmed that the COLME provides an astute framework to develop commendable collegial leadership practices as it clearly outlines procedures to develop and use the leadership potential of all the employees in order to foster joint accountability. They acknowledged that when the principles of collegiality are flexibly applied, they contribute to the creation of a holistic milieu in which all employees are able to express themselves freely, without fear of failure, and thus feel that they are part of the democratic decision-making process. Evidently, a conceptual framework such as the COLME can serve as a benchmark for leadership effectiveness because organizational outcomes need to be measured against standards of excellence in meeting both employee and customer expectations.Keywords: collegial leadership model, employee empowerment, shared decision-making, traditional bureaucratic management practices
Procedia PDF Downloads 4955702 Language Learning Motivation in Mozambique: A Quantitative Study of University Students
Authors: Simao E. Luis
Abstract:
From the 1960s to the 1990s, the social-psychological framework of language attitudes that emerged from the Canadian research tradition was very influential. Integrativeness was one of the main variables in Gardner’s theory because refugees and immigrants were motivated to learn English and French to integrate into the Canadian community. Second language (L2) scholars have expressed concerns over integrativeness because it cannot explain the motivation of L2 learners in global contexts. This study aims to investigate student motivation to learn English as a foreign language in Mozambique, and to contribute to the ongoing validation of the L2 Motivational Self System theory in an under-researched country. One hundred thirty-seven (N=137) university students completed a well-established motivation questionnaire. The data were analyzed with SPSS, and descriptive statistics, correlations, multiple regressions, and MANOVA were conducted. Results show that many variables contribute to motivated learning behavior, particularly the L2 learning experience and attitudes towards the English language. Statistically significant differences were found between males and females, with males expressing more motivation to learn the English language for personal interests. Statistically significant differences were found between older and younger students, with older students reporting more vivid images of themselves as future English language users. These findings have pedagogical implications because motivational strategies are positively correlated with student motivated learning behavior. Therefore, teachers should design L2 tasks that can help students to develop their future L2 selves.Keywords: English as a foreign language, L2 motivational self system, Mozambique, university students
Procedia PDF Downloads 1205701 Beyond Geometry: The Importance of Surface Properties in Space Syntax Research
Authors: Christoph Opperer
Abstract:
Space syntax is a theory and method for analyzing the spatial layout of buildings and urban environments to understand how they can influence patterns of human movement, social interaction, and behavior. While direct visibility is a key factor in space syntax research, important visual information such as light, color, texture, etc., are typically not considered, even though psychological studies have shown a strong correlation to the human perceptual experience within physical space – with light and color, for example, playing a crucial role in shaping the perception of spaciousness. Furthermore, these surface properties are often the visual features that are most salient and responsible for drawing attention to certain elements within the environment. This paper explores the potential of integrating these factors into general space syntax methods and visibility-based analysis of space, particularly for architectural spatial layouts. To this end, we use a combination of geometric (isovist) and topological (visibility graph) approaches together with image-based methods, allowing a comprehensive exploration of the relationship between spatial geometry, visual aesthetics, and human experience. Custom-coded ray-tracing techniques are employed to generate spherical panorama images, encoding three-dimensional spatial data in the form of two-dimensional images. These images are then processed through computer vision algorithms to generate saliency-maps, which serve as a visual representation of areas most likely to attract human attention based on their visual properties. The maps are subsequently used to weight the vertices of isovists and the visibility graph, placing greater emphasis on areas with high saliency. Compared to traditional methods, our weighted visibility analysis introduces an additional layer of information density by assigning different weights or importance levels to various aspects within the field of view. This extends general space syntax measures to provide a more nuanced understanding of visibility patterns that better reflect the dynamics of human attention and perception. Furthermore, by drawing parallels to traditional isovist and VGA analysis, our weighted approach emphasizes a crucial distinction, which has been pointed out by Ervin and Steinitz: the difference between what is possible to see and what is likely to be seen. Therefore, this paper emphasizes the importance of including surface properties in visibility-based analysis to gain deeper insights into how people interact with their surroundings and to establish a stronger connection with human attention and perception.Keywords: space syntax, visibility analysis, isovist, visibility graph, visual features, human perception, saliency detection, raytracing, spherical images
Procedia PDF Downloads 775700 Capitalizing on Differential Network Ties: Unpacking Individual Creativity from Social Capital Perspective
Authors: Yuanyuan Wang, Chun Hui
Abstract:
Drawing on social capital theory, this article discusses how individuals may utilize network ties to come up with creativity. Social capital theory elaborates how network ties enhances individual creativity from three dimensions: structural access, and relational and cognitive mechanisms. We categorize network ties into strong and weak in terms of tie strength. With less structural constraints, weak ties allow diverse and heterogeneous knowledge to prosper, further facilitating individuals to build up connections among diverse even distant ideas. On the other hand, strong ties with the relational mechanism of cooperation and trust may benefit the accumulation of psychological capital, ultimately to motivate and sustain creativity. We suggest that differential ties play different roles for individual creativity: Weak ties deliver informational benefit directly rifling individual creativity from informational resource aspect; strong ties offer solidarity benefits to reinforce psychological capital, which further inspires individual creativity engagement from a psychological viewpoint. Social capital embedded in network ties influence individuals’ informational acquisition, motivation, as well as cognitive ability to be creative. Besides, we also consider the moderating effects constraining the relatedness between network ties and creativity, such as knowledge articulability. We hypothesize that when the extent of knowledge articulability is low, that is, with low knowledge codifiability, and high dependency and ambiguity, weak ties previous serving as knowledge reservoir will not become ineffective on individual creativity. Two-wave survey will be employed in Mainland China to empirically test mentioned propositions.Keywords: network ties, social capital, psychological capital, knowledge articulability, individual creativity
Procedia PDF Downloads 4065699 Surrogacy: A Comparative, Legal, Children’s Rights Perspective
Authors: Ronli Sifris
Abstract:
The last Australian Parliamentary inquiry into surrogacy took place in 2016. Since then, a number of countries have reviewed their surrogacy laws, including countries such as New Zealand and the United Kingdom, which traditionally have invoked similar legal approaches to Australia on a broad range of issues. The time is ripe to reform Australia’s surrogacy laws with a view to putting in place a system that best protects the rights of all parties to a surrogacy arrangement, and especially the rights of the child. There are two specific, linked issues which tend to be particularly contentious in the surrogacy context. The first relates to legal parentage. There are questions around whether the surrogate or the intended parents should be deemed the legal parents of a child born through surrogacy and what should be the process for any transfer of parentage. The second key issue relates to compensation and whether a surrogate should be compensated for the reproductive labour inherent in conceiving, gestating, and birthing a child. This paper will invoke a comparative analysis with a view to considering how different countries are regulating surrogacy and which approach best protects the rights all parties involved in the surrogacy arrangement, especially the rights of the children born through surrogacy. The specific countries to be considered are Australia, Canada, and California (United States). I have selected these countries for the following reasons: Australia is the jurisdiction where the author is based, it is, therefore, the jurisdiction with which she has the most familiarity. It allows altruistic surrogacy only and post-birth parentage orders in favour of the intended parents of children born through altruistic surrogacy California, as a jurisdiction allowing for compensated surrogacy and pre-birth parentage orders in favour of the intended parents, sits at the other end of the spectrum to Australia thereby providing an interesting point of comparison. Canada sits somewhere in the middle; it ostensibly allows only altruistic surrogacy, but in practice, many aspects of the Canadian process resemble compensated surrogacy. In addition to conducting a comparative analysis with other countries, the paper will also consider international human rights law as its overarching framework for determining the approach that best protects the rights of a child born through surrogacy. Particular attention will be paid to the United Nations Convention on the Rights of the Child as the key children’s rights treaty. The European Court of Human Rights will also be extensively considered as it has decided a number of cases relating to the rights of children born through surrogacy.Keywords: surrogacy, children’s rights, australia, compensation, parentage
Procedia PDF Downloads 1335698 From Plate to Self-Perception: Unravelling the Interplay Between Food Security and Self-Esteem Among Malaysian University Students
Authors: Amiraa Ali Mansor, Haslinda Abdullah, Angela Chan Nguk Fong, Norhaida Hanim Binti Ahmad Tajudin, Asnarulkhadi Abu Samah
Abstract:
Obesity has risen sharply over the past three decades, posing a grave public health concern globally. In Malaysia, it has also emerged as a significant health threat. While the second Sustainable Development Goal, "Zero Hunger", aims to ensure equitable access to nutritious food for all, a key challenge lies in addressing food insecurity. Food insecurity not only pertains to the quantity but also the quality of food, with both dimensions playing a pivotal role in health outcomes. To date, much of the research on food security has focused on household levels. There remains a research gap concerning university students, a population transitioning to independence from parental support and grappling with limited resources. This study seeks to bridge this gap by extending the Food Security Theory to incorporate the psychological dimension of self-esteem. Using a quantitative approach, data was collected from 452 public university students in Malaysia through a cross-sectional research design and a multi-stage cluster sampling technique. The anticipated findings will provide novel insights by linking food security with self-esteem. Such insights have implications for healthcare policy and the framing of preventive strategies against obesity. It is hoped that this research will not only contribute to the academic discourse on Food Security Theory but also serve as a foundation for refining national health policies and programs aimed at fostering a healthier lifestyle.Keywords: obesity, food security, body image, self-esteem
Procedia PDF Downloads 795697 Person-Led Organizations Nurture Bullying Behavior: A Qualitative Study
Authors: Shreya Mishra, Manosi Chaudhuri, Ajoy K. Dey
Abstract:
Workplace bullying is a social phenomenon which has proved to be hazardous not only for employees’ well-being but also organizations. Despite being prevalent across geographical boundaries, Indian organizations have failed to acknowledge its vices. This paper aims to understand targets’ perception on what makes bullying nurture in organizations. The paper suggests that person-led Indian work settings give birth to bullying behavior as it lacks professional acumen and systems. An analysis of 13 in-depth interviews of employees from the organized sector suggests that organizations, where decision making lies with single individual, may be a hub of hostile behavior due to the culture which promotes ‘yesmanship’, ‘authoritarianism’ and/or blind belief of leaders on certain set of employees. The study used constructivist grounded theory approach, and the data was analyzed using R Based Qualitative Data Analysis (RQDA) software. Respondents reported that bullying behavior is taken lightly by the management with 'just ignore it' attitude. According to the respondents, the behavior prolong as the perpetrator have a direct approach to the top authority. The study concludes that person-led organizations may create a family-like environment which is favored by employees; however, authoritative leaders are unable to gain the trust of employees. Also, employees who are close to the leader may either be a perpetrator or a target of bullying. It is recommended that leaders in such organizations need to acknowledge the presence of bullying which affects an employees’ commitment towards their job and/or organization. They need to have an assertive check on individuals who hide behind ‘yesman’ attitude. This may help employees feel safe in such work settings.Keywords: constructivist grounded theory, person-led organization, RQDA, workplace bullying
Procedia PDF Downloads 2065696 Short-Range and Long-Range Ferrimagnetic Order in Fe(Te₁.₅Se₀.₅)O₅Cl
Authors: E. S. Kozlyakova, A. A. Eliseev, A. V. Moskin, A. Y. Akhrorov, P. S. Berdonosov, V. A. Dolgikh, K. N. Denisova, P. Lemmens, B. Rahaman, S. Das, T. Saha-Dasgupta, A. N. Vasiliev, O. S. Volkova
Abstract:
Considerable attention has been paid recently to FeTe₂O₅Cl due to reduced dimensionality and frustration in the magnetic subsystem, succession of phase transitions, and multiferroicity. The efforts to grow its selenite sibling resulted in mixed halide compound, Fe(Te₁.₅Se₀.₅)O₅Cl, which was found crystallizing in a new structural type and possessing properties drastically different from those of a parent system. Hereby we report the studies of magnetization M and specific heat Cₚ, combined with Raman spectroscopy and density functional theory calculations in Fe(Te₁.₅Se₀.₅)O₅Cl. Its magnetic subsystem features weakly coupled Fe³⁺ - Fe³⁺ dimers showing the regime of short-range correlations at TM ~ 70 K and long-range order at TN = 22 K. In a magnetically ordered state, sizable spin-orbital interactions lead to a small canting of Fe³⁺ moments. The density functional theory calculations of leading exchange interactions were found in agreement with measurements of thermodynamic properties and Raman spectroscopy. Besides, because of the relatively large magnetic moment of the Fe³⁺ ion, we found that magnetic dipole-dipole interactions contribute significantly to experimentally observed orientation of magnetization easy axis in ac-plane. As a conclusion, we suggest a model of magnetic subsystem in magnetically ordered state of Fe(Te₁.₅Se₀.₅)O₅Cl based on a model of interacting dimers.Keywords: dipole-dipole interactions, low dimensional magnetism, selenite, spin canting
Procedia PDF Downloads 1675695 Analysis and Quantification of Historical Drought for Basin Wide Drought Preparedness
Authors: Joo-Heon Lee, Ho-Won Jang, Hyung-Won Cho, Tae-Woong Kim
Abstract:
Drought is a recurrent climatic feature that occurs in virtually every climatic zone around the world. Korea experiences the drought almost every year at the regional scale mainly during in the winter and spring seasons. Moreover, extremely severe droughts at a national scale also occurred at a frequency of six to seven years. Various drought indices had developed as tools to quantitatively monitor different types of droughts and are utilized in the field of drought analysis. Since drought is closely related with climatological and topographic characteristics of the drought prone areas, the basins where droughts are frequently occurred need separate drought preparedness and contingency plans. In this study, an analysis using statistical methods was carried out for the historical droughts occurred in the five major river basins in Korea so that drought characteristics can be quantitatively investigated. It was also aimed to provide information with which differentiated and customized drought preparedness plans can be established based on the basin level analysis results. Conventional methods which quantifies drought execute an evaluation by applying a various drought indices. However, the evaluation results for same drought event are different according to different analysis technique. Especially, evaluation of drought event differs depend on how we view the severity or duration of drought in the evaluation process. Therefore, it was intended to draw a drought history for the most severely affected five major river basins of Korea by investigating a magnitude of drought that can simultaneously consider severity, duration, and the damaged areas by applying drought run theory with the use of SPI (Standardized Precipitation Index) that can efficiently quantifies meteorological drought. Further, quantitative analysis for the historical extreme drought at various viewpoints such as average severity, duration, and magnitude of drought was attempted. At the same time, it was intended to quantitatively analyze the historical drought events by estimating the return period by derived SDF (severity-duration-frequency) curve for the five major river basins through parametric regional drought frequency analysis. Analysis results showed that the extremely severe drought years were in the years of 1962, 1988, 1994, and 2014 in the Han River basin. While, the extreme droughts were occurred in 1982 and 1988 in the Nakdong river basin, 1994 in the Geumg basin, 1988 and 1994 in Youngsan river basin, 1988, 1994, 1995, and 2000 in the Seomjin river basin. While, the extremely severe drought years at national level in the Korean Peninsula were occurred in 1988 and 1994. The most damaged drought were in 1981~1982 and 1994~1995 which lasted for longer than two years. The return period of the most severe drought at each river basin was turned out to be at a frequency of 50~100 years.Keywords: drought magnitude, regional frequency analysis, SPI, SDF(severity-duration-frequency) curve
Procedia PDF Downloads 4085694 Moving Forward to Stand Still: Social Experiences of Children with a Parent in Prison in Ireland
Authors: Aisling Parkes, Fiona Donson
Abstract:
There is no doubt that parental imprisonment directly alters the social experiences of childhood for many children worldwide today. Indeed, the extent to which meaningful contact with a parent in prison can positively impact on the life of a child is well documented as are the benefits for the prisoner, particularly in the long term and post-release. However, despite the growing acceptance of children’s rights in Ireland over the past decade in particular, it appears that children’s rights have not yet succeeded in breaking through the walls of Irish prisons when children are visiting an incarcerated parent. In a prison system that continues to prioritise security over all other considerations, little attention has been given to the importance of recognising and protecting the rights of children affected by parental imprisonment in Ireland for children, families and society in the long term. This paper will present the findings which have emerged from a national qualitative research project (the first of its kind to be conducted in Ireland) which examines the current visiting conditions for children and families, and the related culture of visitation within the Irish Prison system. This study investigated, through semi-structured interviews and focus groups, the unique and specialist perspectives of senior prison management, prison governors, prison officers, support organisations, prison child care workers, as well as those with a family member in prison who have direct experience of prison visits in Ireland which involve children and young people. The reality of the current system of visitation that operates in Irish prisons and its impact on children’s rights is presented from a variety of perspectives. The idea of what meaningful contact means from a children’s rights based perspective is interrogated as are the benefits long term for both the child and the offender. The current system is benchmarked against well-accepted international children’s rights norms as reflected under the UN Convention on the Rights of the Child 1989. The dissonance that continues to exist between the theory of children’s rights which includes the right to maintain meaningful contact with a parent in prison and current practice and procedure in Irish Prisons will be explored. In adopting a children’s rights based perspective combined with socio-legal research, this paper will explore the added value that this approach to prison visiting might offer in responding to this particularly marginalised group of children in terms of their social experience of childhood. Finally, the question will be raised as to whether or not there is a responsibility on prisons to view children as independent rights holders when they come to visit the prison or is the prison entitled to focus solely on the prisoner with their children being viewed as a circumstance of the offender? Do the interests of the child and the prisoner have to be exclusive or is there any way of marrying the two?Keywords: children’s rights, prisoners, sociology, visitation
Procedia PDF Downloads 2545693 Primary and Secondary Big Bangs Theory of Creation of Universe
Authors: Shyam Sunder Gupta
Abstract:
The current theory for the creation of the universe, the Big Bang theory, is widely accepted but leaves some unanswered questions. It does not explain the origin of the singularity or what causes the Big Bang. The theory of the Big Bang also does not explain why there is such a huge amount of dark energy and dark matter in our universe. Also, there is a question related to one universe or multiple universes which needs to be answered. This research addresses these questions using the Bhagvat Puran and other Vedic scriptures as the basis. There is a Unique Pure Energy Field that is eternal, infinite, and finest of all and never transforms when in its original form. The Carrier Particles of Unique Pure Energy are Param-anus- Fundamental Energy Particles. Param-anus and a combination of these particles create bigger particles from which the Universe gets created. For creation to initiate, Unique Pure Energy is represented in three phases: positive phase energy, neutral phase eternal time energy and negative phase energy. Positive phase energy further expands in three forms of creative energies (CE1, CE2andCE3). From CE1 energy, three energy modes, mode of activation, mode of action, and mode of darkness, were created. From these three modes, 16 Principles, subtlest forms of energies, namely Pradhan, Mahat-tattva, Time, Ego, Intellect, Mind, Sound, Space, Touch, Air, Form, Fire, Taste, Water, Smell, and Earth, get created. In the Mahat-tattva, dominant in the Mode of Darkness, CE1 energy creates innumerable primary singularities from seven principles: Pradhan, Mahat-tattva, Ego, Sky, Air, Fire, and Water. CE1 energy gets divided as CE2 and enters, along with three modes and time, in each singularity, and primary Big Bang takes place, and innumerable Invisible Universes get created. Each Universe has seven coverings of 7 principles, and each layer is 10 times thicker than the previous layer. By energy CE2, space in Invisible Universe under the coverings is divided into two halves. In the lower half, the process of evolution gets initiated, and seeds of 24 elements get created, out of which 5 fundamental elements, building blocks of matter, Sky, Air, Fire, Water and Earth, create seeds of stars, planets, galaxies and all other matter. Since 5 fundamental elements get created out of the mode of darkness, it explains why there is so much dark energy and dark matter in our Universe. This process of creation, in the lower half of Invisible universe continues for 2.16 billion years. Further, in the lower part of the energy field, exactly at the Centre of Invisible Universe, Secondary Singularity is created, through which, by force of Mode of Action, Secondary Big Bang takes place and Visible Universe gets created in the shape of Lotus Flower, expanding into upper part. Visible matter starts appearing after a gap of 360,000 years. Within the Visible Universe, a small part gets created known as the Phenomenal Material World, which is our Solar System, the sun being in the Centre. Diameter of Solar planetary system is 6.4 billion km.Keywords: invisible universe, phenomenal material world, primary Big Bang, secondary Big Bang, singularities, visible universe
Procedia PDF Downloads 915692 Governance and Financial Constraints the Impact on Corporate Social Responsibility Implementation in Cooperatives
Authors: Wanlapha Phraibueng, Patrick Sentis, Geraldine Riviere-Giordano
Abstract:
Corporate Social Responsibility (CSR) initiatives have been widely discussed especially in investor-oriented firms. In contrast, cooperatives pay less attention to CSR because their activities have integrated the responsibility and the solidity of social, economic and environment. On the other hand, by adopting ownership theory and agency theory – cooperatives ignore CSR investment due to unclarified decision control in the governance and the limitation to acquire the capital financed. The unique governance and financial structures in cooperatives lead to the conflict among the stakeholders and long-term investment which have an impact on firm financial performance. As an illustration of cooperatives dilemmas, we address the question of Whether or not cooperatives in term of governance and financial structures are the constraints on implementing CSR policies. We find that the governance and financial structures in large cooperatives are the influence factors which predispose cooperatives to invest on CSR. In contrast, in the startup or small cooperatives, its governance and financial structures are the constraints on implementing CSR policies. We propose the alternative financial structure based on the trade-off between debt and equity which aims to relax the restrictions in cooperatives’ governance and allow cooperatives to acquire the capital financed either from its members or non-members. We suggest that engaging equity as a financial structure induces cooperatives to invest on CSR policies. Alternative financial structure eliminates not only cooperative ownership control problem but also the constraints in capital acquisition. By implementing CSR activities consistent with the alternative financial choice, cooperatives can increase firm’s value and reduce the conflict among their stakeholders.Keywords: cooperatives, corporate social responsibility, financial, governance
Procedia PDF Downloads 1405691 Walking across the Government of Egypt: A Single Country Comparative Study of the Past and Current Condition of the Government of Egypt
Authors: Homyr L. Garcia, Jr., Anne Margaret A. Rendon, Carla Michaela B. Taguinod
Abstract:
Nothing is constant in this world but change. This is the reality wherein a lot of people fail to recognize and maybe, it is because of the fact that some see things that are happening with little value or no value at all until it’s gone. For the past years, Egypt was known for its stable government. It was able to withstand a lot of problems and crisis which challenged their country in ways which can never be imagined. In the present time, it seems like in just a snap of a finger, the said stability vanished and it was immediately replaced by a crisis which resulted to a failure in some parts of their government. In addition, this problem continued to worsen and the current situation of Egypt is just a reflection or a result of it. On the other hand, as the researchers continued to study the reasons why the government of Egypt is unstable, they concluded that there might be a possibility that they will be able to produce ways in which their country could be helped or improved. The instability of the government of Egypt is the product of combining all the problems which affects the lives of the people. Some of the reasons that the researchers found are the following: 1) unending doubts of the people regarding the ruling capacity of elected presidents, 2) removal of President Mohamed Morsi in position, 3) economic crisis, 4) a lot of protests and revolution happened, 5) resignation of the long term President Hosni Mubarak and 6) the office of the President is most likely available only to the chosen successor. Also, according to previous researches, there are two plausible scenarios for the instability of Egypt: 1) a military intervention specifically the Supreme Council of the Armed Forces or SCAF, resulting from a contested succession and 2) an Islamist push for political power which highlights the claim that religion is a hindrance towards the development of their country and government. From the eight possible reasons, the researchers decided that they will be focusing on economic crisis since the instability is more clearly seen in the country’s economy which directly affects the people and the government itself. In addition, they made a hypothesis which states that stable economy is a prerequisite towards a stable government. If they will be able to show how this claim is true by using the Social Autopsy Research Design for the qualitative method and Pearson’s correlation coefficient for the quantitative method, the researchers might be able to produce a proposal on how Egypt can stabilize their government and avoid such problems. Also, the hypothesis will be based from the Rational Action Theory which is a theory for understanding and modeling social and economy as well as individual behavior.Keywords: Pearson’s correlation coefficient, rational action theory, social autopsy research design, supreme council of the armed forces (SCAF)
Procedia PDF Downloads 4115690 Scenario-Based Scales and Situational Judgment Tasks to Measure the Social and Emotional Skills
Authors: Alena Kulikova, Leonid Parmaksiz, Ekaterina Orel
Abstract:
Social and emotional skills are considered by modern researchers as predictors of a person's success both in specific areas of activity and in the life of a person as a whole. The popularity of this scientific direction ensures the emergence of a large number of practices aimed at developing and evaluating socio-emotional skills. Assessment of social and emotional development is carried out at the national level, as well as at the level of individual regions and institutions. Despite the fact that many of the already existing social and emotional skills assessment tools are quite convenient and reliable, there are now more and more new technologies and task formats which improve the basic characteristics of the tools. Thus, the goal of the current study is to develop a tool for assessing social and emotional skills such as emotion recognition, emotion regulation, empathy and a culture of self-care. To develop a tool assessing social and emotional skills, Rasch-Gutman scenario-based approach was used. This approach has shown its reliability and merit for measuring various complex constructs: parental involvement; teacher practices that support cultural diversity and equity; willingness to participate in the life of the community after psychiatric rehabilitation; educational motivation and others. To assess emotion recognition, we used a situational judgment task based on OCC (Ortony, Clore, and Collins) emotions theory. The main advantage of these two approaches compare to classical Likert scales is that it reduces social desirability in answers. A field test to check the psychometric properties of the developed instrument was conducted. The instrument was developed for the presidential autonomous non-profit organization “Russia - Land of Opportunity” for nationwide soft skills assessment among higher education students. The sample for the field test consisted of 500 people, students aged from 18 to 25 (mean = 20; standard deviation 1.8), 71% female. 67% of students are only studying and are not currently working and 500 employed adults aged from 26 to 65 (mean = 42.5; SD 9), 57% female. Analysis of the psychometric characteristics of the scales was carried out using the methods of IRT (Item Response Theory). A one-parameter rating scale model RSM (Rating scale model) and Graded Response model (GRM) of the modern testing theory were applied. GRM is a polyatomic extension of the dichotomous two-parameter model of modern testing theory (2PL) based on the cumulative logit function for modeling the probability of a correct answer. The validity of the developed scales was assessed using correlation analysis and MTMM (multitrait-multimethod matrix). The developed instrument showed good psychometric quality and can be used by HR specialists or educational management. The detailed results of a psychometric study of the quality of the instrument, including the functioning of the tasks of each scale, will be presented. Also, the results of the validity study by MTMM analysis will be discussed.Keywords: social and emotional skills, psychometrics, MTMM, IRT
Procedia PDF Downloads 765689 Study of Motion of Impurity Ions in Poly(Vinylidene Fluoride) from View Point of Microstructure of Polymer Solid
Authors: Yuichi Anada
Abstract:
Electrical properties of polymer solid is characterized by dielectric relaxation phenomenon. Complex permittivity shows a high dependence on frequency of external stimulation in the broad frequency range from 0.1mHz to 10GHz. The complex-permittivity dispersion gives us a lot of useful information about the molecular motion of polymers and the structure of polymer aggregates. However, the large dispersion of permittivity at low frequencies due to DC conduction of impurity ions often covers the dielectric relaxation in polymer solid. In experimental investigation, many researchers have tried to remove the DC conduction experimentally or analytically for a long time. On the other hand, our laboratory chose another way of research for this problem from the point of view of a reversal in thinking. The way of our research is to use the impurity ions in the DC conduction as a probe to detect the motion of polymer molecules and to investigate the structure of polymer aggregates. In addition to the complex permittivity, the electric modulus and the conductivity relaxation time are strong tools for investigating the ionic motion in DC conduction. In a non-crystalline part of melt-crystallized polymers, free spaces with inhomogeneous size exist between crystallites. As the impurity ions exist in the non-crystalline part and move through these inhomogeneous free spaces, the motion of ions reflects the microstructure of non-crystalline part. The ionic motion of impurity ions in poly(vinylidene fluoride) (PVDF) is investigated in this study. Frequency dependence of the loss permittivity of PVDF shows a characteristic of the direct current (DC) conduction below 1 kHz of frequency at 435 K. The electric modulus-frequency curve shows a characteristic of the dispersion with the single conductivity relaxation time. Namely, it is the Debye-type dispersion. The conductivity relaxation time analyzed from this curve is 0.00003 s at 435 K. From the plot of conductivity relaxation time of PVDF together with the other polymers against permittivity, it was found that there are two group of polymers; one of the group is characterized by small conductivity relaxation time and large permittivity, and another is characterized by large conductivity relaxation time and small permittivity.Keywords: conductivity relaxation time, electric modulus, ionic motion, permittivity, poly(vinylidene fluoride), DC conduction
Procedia PDF Downloads 1725688 Technological Affordances of a Mobile Fitness Application- A Role of Escapism and Social Outcome Expectation
Authors: Inje Cho
Abstract:
The leading health risks threatening the world today are associated with a modern lifestyle characterized by sedentary behavior, stress, anxiety, and an obesogenic food environment. To counter this alarming trend, the Centers for Disease Control and Prevention have proffered Physical Activity guidelines to bolster physical engagement. Concurrently, the burgeon of smartphones and mobile applications has witnessed a proliferation of fitness applications aimed at invigorating exercise adherence and real-time activity monitoring. Grounded in the Uses and gratification theory, this study delves into the technological affordances of mobile fitness applications, discerning the mediating influences of escapism and social outcome expectations on attitudes and exercise intention. The theory explains how individuals employ distinct communication mediums to satiate their exigencies and desires. Technological affordances manifest as attributes of emerging technologies that galvanize personal engagement in physical activities. Several features of mobile fitness applications include affordances for goal setting, virtual rewards, peer support, and exercise information. Escapism, denoting the inclination to disengage from normal routines, has emerged as a salient motivator for the consumption of new media. This study postulates that individual’s perceptions technological affordances within mobile fitness applications, can affect escapism and social outcome expectations, potentially influencing attitude, and behavior formation. Thus, the integrated model has been developed to empirically examine the interrelationships between technological affordances, escapism, social outcome expectations, and exercise intention. Structural Equation Modelling serves as the methodological tool, and a cohort of 400 Fitbit users shall be enlisted from the Prolific, data collection platform. A sequence of multivariate data analyses will scrutinize both the measurement and hypothesized structural models. By delving into the effects of mobile fitness applications, this study contributes to the growing of new media studies in sport management. Moreover, the novel integration of the uses and gratification theory, technological affordances, via the prism of escapism, illustrates the dynamics that underlies mobile fitness user’s attitudes and behavioral intentions. Therefore, the findings from this study contribute to theoretical understanding and provide pragmatic insights to developers and practitioners in optimizing the impact of mobile fitness applications.Keywords: technological affordances, uses and gratification, mobile fitness apps, escapism, physical activity
Procedia PDF Downloads 815687 Electrochemical Study of Ti-O Modified Electrode towards Tyrosinase Catalytic Activity
Authors: Riya Thomas, Denis Music, Tautgirdas Ruzgas
Abstract:
The detection of tyrosinase holds considerable interest in the domains of food nutrition and human health due to its significant role in causing a detrimental effect on the colour, flavour, and nutritional value of food as well as in the synthesis of melanin causing skin melanoma. Compared to other conventional analytical techniques, electrochemical (EC) sensors are highly promising owing to their quick response, great sensitivity, ease of use, and low cost. Particularly, titania nanoparticle-based electrochemical sensors have drawn special attention in identifying several biomolecules including enzymes, antibodies, and receptors, owing to their enhanced electrocatalytic activity and electron-accepting properties. In this study, Ti-O film-modified electrode is fabricated using reactive magnetron sputtering, and its affinity towards tyrosinase is examined via electrochemical methods. To comprehend the physiochemical and surface properties-governed electrocatalytic activity of modified electrodes, Ti-O films are grown under various compositional ranges and deposition temperature, and their corresponding electrochemical activity towards tyrosinase is studied. Further, to understand the underlying atomistic mechanisms and electronic-scale electrochemical characteristics, density functional theory (DFT) is employed. The main goal of the current work is to determine the correlation between macroscopic measurements and the underlying atomic properties to improve the tyrosinase activity on Ti-O surfaces. Moreover, this work offers an intriguing new perspective on the use of Ti-O-modified electrodes to detect tyrosinase in the areas of clinical diagnosis, skincare, and food science.Keywords: density functional theory, electrochemical sensor, Ti-O film, tyrosinase
Procedia PDF Downloads 255686 Significant Aspects and Drivers of Germany and Australia's Energy Policy from a Political Economy Perspective
Authors: Sarah Niklas, Lynne Chester, Mark Diesendorf
Abstract:
Geopolitical tensions, climate change and recent movements favouring a transformative shift in institutional power structures have influenced the economics of conventional energy supply for decades. This study takes a multi-dimensional approach to illustrate the potential of renewable energy (RE) technology to provide a pathway to a low-carbon economy driven by ecologically sustainable, independent and socially just energy. This comparative analysis identifies economic, political and social drivers that shaped the adoption of RE policy in two significantly different economies, Germany and Australia, with strong and weak commitments to RE respectively. Two complementary political-economy theories frame the document-based analysis. Régulation Theory, inspired by Marxist ideas and strongly influenced by contemporary economic problems, provides the background to explore the social relationships contributing the adoption of RE within the macro-economy. Varieties of Capitalism theory, a more recently developed micro-economic approach, examines the nature of state-firm relationships. Together these approaches provide a comprehensive lens of analysis. Germany’s energy policy transformed substantially over the second half of the last century. The development is characterised by the coordination of societal, environmental and industrial demands throughout the advancement of capitalist regimes. In the Fordist regime, mass production based on coal drove Germany’s astounding economic recovery during the post-war period. Economic depression and the instability of institutional arrangements necessitated the impulsive seeking of national security and energy independence. During the postwar Flexi-Fordist period, quality-based production, innovation and technology-based competition schemes, particularly with regard to political power structures in and across Europe, favoured the adoption of RE. Innovation, knowledge and education were institutionalized, leading to the legislation of environmental concerns. Lastly the establishment of government-industry-based coordinative programs supported the phase out of nuclear power and the increased adoption of RE during the last decade. Australia’s energy policy is shaped by the country’s richness in mineral resources. Energy policy largely served coal mining, historically and currently one of the most capital-intense industry. Assisted by the macro-economic dimensions of institutional arrangements, social and financial capital is orientated towards the export-led and strongly demand-oriented economy. Here energy policy serves the maintenance of capital accumulation in the mining sector and the emerging Asian economies. The adoption of supportive renewable energy policy would challenge the distinct role of the mining industry within the (neo)-liberal market economy. The state’s protective role of the mining sector has resulted in weak commitment to RE policy and investment uncertainty in the energy sector. Recent developments, driven by strong public support for RE, emphasize the sense of community in urban and rural areas and the emergence of a bottom-up approach to adopt renewables. Thus, political economy frameworks on both the macro-economic (Regulation Theory) and micro-economic (Varieties of Capitalism theory) scales can together explain the strong commitment to RE in Germany vis-à-vis the weak commitment in Australia.Keywords: political economy, regulation theory, renewable energy, social relationships, energy transitions
Procedia PDF Downloads 3845685 Strength Parameters and the Rate Process Theory Applied to Compacted Fadama Soils
Authors: Samuel Akinlabi Ola, Emeka Segun Nnochiri, Stephen Kayode Aderomose, Paul Ayesemhe Edoh
Abstract:
Fadama soils of Northern Nigeria are generally a problem soil for highway and geotechnical engineers. There has been no consistent conclusion on the effect of the strain rate on the shear strength of soils, thus necessitating the need to clarify this issue with various types of soil. Consolidated undrained tests with pore pressure measurements were conducted at optimum moisture content and maximum dry density using standard proctor compaction. Back pressures were applied to saturate the soil. The shear strength parameters were determined. Analyzing the results and model studies using the Rate Process Theory, functional relationships between the deviator stress and strain rate were determined and expressed mathematically as deviator stress = β0+ β1 log(strain rate) at each cell pressure where β0 and β1 are constants. Also, functional relationships between the pore pressure coefficient Āf and the time to failure were determined and expressed mathematically as pore pressure coefficient, Āf = ψ0+ѱ1log (time to failure) where ψ0 and ѱ1 are constants. For cell pressure between 69 – 310 kN/m2 (10 - 45psi) the constants found for Fadama soil in this study are ψ0=0.17 and ѱ1=0.18. The study also shows the dependence of the angle of friction (ø’) on the rate of strain as it increases from 22o to 25o for an increase in the rate of strain from 0.08%/min to 1.0%/min. Conclusively, the study also shows that within the strain rate utilized in the research, the deviator strength increased with the strain rate while the excess pore water pressure decreased with an increase in the rate of strain.Keywords: deviator stress, Fadama soils, pore pressure coefficient, rate process
Procedia PDF Downloads 785684 Secularization of Europe and the Rise of Nationalism
Authors: Sterling C. DeVerter
Abstract:
In recent decades, there has been continually growing concern amongst scholars and political leaders towards the global resurgence of nationalism, particularly in Europe, the United States, and China. However, very few studies have attempted to empirically examine the relationship between religion and nationalism at the level of the individual, and none are known to have done so quantitatively. Building on Tajfel's and Turner's (1978) Social Identity Theory (SIT), and Anderson (1991) and Marx (2003), this study will employ SIT and regression analysis to compare the sources and patterns of nationalistic sentiment among European respondents in eight countries to the average levels of self-reported religiosity, religious participation, age, education, and income levels. Survey reports from the International Social Survey Programme were the primary quantitative data sources. It was hypothesized that the increase in nationalism across Europe follows this same evolution as first identified by Anderson, and is positively correlated to the reduction in reported religiosity. However, this study failed to reject the null, there was no substantial ( < .035) correlation between nationalistic sentiment and any of the measures of religiosity, nor were there any substantial correlations between nationalistic sentiment and either of the three control variables ( < .008). Across all countries examined, it was discovered that inclusionary nationalism has slightly declined (-5.08%), while exclusionary nationalism had increased substantially (+17.25%). The combined trend reflected an overall rise in nationalism across the time period and a forecast that suggests the current levels are also elevated. The primary implications include the demand to readdress the notion of religion and nationalism, and the correlation between the two, as well as the current nationalism trends in terms of support or non-support for future political and social movements.Keywords: European Union, secularization, nationalism, social identity theory
Procedia PDF Downloads 1285683 GPU-Based Back-Projection of Synthetic Aperture Radar (SAR) Data onto 3D Reference Voxels
Authors: Joshua Buli, David Pietrowski, Samuel Britton
Abstract:
Processing SAR data usually requires constraints in extent in the Fourier domain as well as approximations and interpolations onto a planar surface to form an exploitable image. This results in a potential loss of data requires several interpolative techniques, and restricts visualization to two-dimensional plane imagery. The data can be interpolated into a ground plane projection, with or without terrain as a component, all to better view SAR data in an image domain comparable to what a human would view, to ease interpretation. An alternate but computationally heavy method to make use of more of the data is the basis of this research. Pre-processing of the SAR data is completed first (matched-filtering, motion compensation, etc.), the data is then range compressed, and lastly, the contribution from each pulse is determined for each specific point in space by searching the time history data for the reflectivity values for each pulse summed over the entire collection. This results in a per-3D-point reflectivity using the entire collection domain. New advances in GPU processing have finally allowed this rapid projection of acquired SAR data onto any desired reference surface (called backprojection). Mathematically, the computations are fast and easy to implement, despite limitations in SAR phase history data size and 3D-point cloud size. Backprojection processing algorithms are embarrassingly parallel since each 3D point in the scene has the same reflectivity calculation applied for all pulses, independent of all other 3D points and pulse data under consideration. Therefore, given the simplicity of the single backprojection calculation, the work can be spread across thousands of GPU threads allowing for accurate reflectivity representation of a scene. Furthermore, because reflectivity values are associated with individual three-dimensional points, a plane is no longer the sole permissible mapping base; a digital elevation model or even a cloud of points (collected from any sensor capable of measuring ground topography) can be used as a basis for the backprojection technique. This technique minimizes any interpolations and modifications of the raw data, maintaining maximum data integrity. This innovative processing will allow for SAR data to be rapidly brought into a common reference frame for immediate exploitation and data fusion with other three-dimensional data and representations.Keywords: backprojection, data fusion, exploitation, three-dimensional, visualization
Procedia PDF Downloads 875682 Bring Your Own Device Security Model in a Financial Institution of South Africa
Authors: Michael Nthabiseng Moeti, Makhulu Relebogile Langa, Joey Jansen van Vuuren
Abstract:
This paper examines the utilization of personal electronic devices like laptops, tablets, and smartphones for professional duties within a financial organization. This phenomenon is known as bring your own device (BYOD). BYOD accords employees the freedom to use their personal devices to access corporate resources from anywhere in the world with Internet access. BYOD arrangements introduce significant security risks for both organizations and users. These setups change the threat landscape for enterprises and demand unique security strategies, as conventional tools tailored for safeguarding managed devices fall short in adequately protecting enterprise assets without active user cooperation. This paper applies protection motivation theory (PMT) to highlight behavioral risks from BYOD users that may impact the security of financial institutions. Thematic analysis was applied to gain a comprehensive understanding of how users perceive this phenomenon. These findings demonstrates that the existence of a security policy does not ensure that all employees will take measures to protect their personal devices. Active promotion of BYOD security policies is crucial for financial institution employees and management. This paper developed a BYOD security model which is useful for understanding compliant behaviors. Given that BYOD security is becoming a major concern across financial sector, it is important. The paper recommends that future research could expand the number of universities from which data is collected.Keywords: BYOD, information security, protection motivation theory, security risks, thematic analysis
Procedia PDF Downloads 34