Search results for: identity representation
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 2768

Search results for: identity representation

1028 Exploring the Birth of Modern Art in Borneo, Post-War Era 1945 to 1970

Authors: Rahah Hasan, Faridah Sahari

Abstract:

This paper describes the development of modern art in Borneo, particularly in Sarawak, Sabah, and Brunei, after the Second World War until the 1970s. This was the period when the British Colonial government dictated the education system, which consequentially inculcated visual art through art and craft subjects imposed on all vernacular schools in Borneo. British influence within the state governance, social, and education system designed with Western ideology created not only a westernized society and mindset but at the same time generated artistic opportunities for emerging local painters to be involved in the initiation of Modern Art in Borneo. Through the historical method and analysis of primary and secondary data, it was obvious that the existence of colonial government departments and institutions such as museums and teaching colleges, and other social organizations in Borneo at that time contributed significantly to the artistic movement. The similar structure and motivation of development in other areas of Borneo confirmed that artistic affirmation of modern art advanced homogenously. Their understanding of easel painting as well as a unique interpretation of culture once distanced from traditional art, resulting in a new visual image that transcended their ethnicity and identity through new mediums and tools. These meticulous interventions modestly visualized in each painting, as discussed in this paper, hopefully, will give a deeper understanding and appreciation of the history of modern art in Borneo.

Keywords: art history, Borneo art, fine art, modern art

Procedia PDF Downloads 143
1027 Using Systems Theory and Collective Impact Approaches to Increase the Retention and Success of University Student Stem Majors

Authors: Araceli Martínez Ortiz

Abstract:

An educational research effort is analyzed using systems theory to document the power of collective impact when addressing multiple factors contributing towards the retention of students majoring in science, technology, engineering and mathematics (STEM) academic programs. This research promotes understanding on how networked communities may work effectively toward a shared vision and mutually aligned activities that result in sustained, large scale change. The actions of a team of researchers in their third year of collaboration are presented to describe a model that positively aligns work efforts resulting in greater total gains. The goals of the multiple programs managed by the funded program team are to: 1) expand the number of students who choose to study a STEM field of study; 2) promote student collaborative learning; 3) support faculty understanding of the funds of knowledge of diverse students and 4) establish innovative and robust STEM education research that will lead to the development of nationally replicable, scalable models for broadening participation in STEM. The impacts of this research effort are measured through quantitative statistical analysis of the changes in second-year STEM undergraduate student retention rates and representation rates of women, Hispanics and African American STEM majors.

Keywords: collaborative impact, diversity, student retention, systems theory, STEM education

Procedia PDF Downloads 266
1026 Forensic Science in Dr. Jekyll and Mr. Hyde: Trails of Utterson's Quest

Authors: Kyu-Jeoung Lee, Jae-Uk Choo

Abstract:

This paper focuses on investigating The Strange Case of Dr Jekyll and Mr Hyde from Utterson’s point of view, referring to: Gabriel John Utterson, a central character in the book. Utterson is no different from a forensic investigator, as he tries to collect evidence on the mysterious Mr. Hyde’s relationship to Dr. Jekyll. From Utterson's perspective, Jekyll is the 'victim' of a potential scandal and blackmail, and Hyde is the 'suspect' of a possible 'crime'. Utterson intends to figure out Hyde's identity, connect his motive with his actions, and gather witness accounts. During Utterson’s quest, the outside materials available to him along with the social backgrounds of Hyde and Jekyll will be analyzed. The archives left from Jekyll’s chamber will also play a part providing evidence. Utterson will investigate, based on what he already knows about Jekyll his whole life, and how Jekyll had acted in his eyes until he was gone, and finding out possible explanations for Jekyll's actions. The relationship between Jekyll and Hyde becomes the major question, as the social background offers clues pointing in the direction of illegitimacy and prostitution. There is still a possibility that Jekyll and Hyde were, in fact, completely different people. Utterson received a full statement and confession from Jekyll himself at the end of the story, which gives the reader the possible truth on what happened. Stevenson’s Dr. Jekyll and Mr. Hyde led readers, as it did Utterson, to find the connection between Hyde and Jekyll using methods of history, culture, and science. Utterson's quest to uncover Hyde shows an example of applying the various fields to in his act to see if Hyde's inheritance was legal. All of this taken together could technically be considered forensic investigation.

Keywords: Dr. Jekyll and Mr. Hyde, forensic investigation, illegitimacy, prostitution, Robert Louis Stevenson

Procedia PDF Downloads 211
1025 The Application of Insects in Forensic Investigations

Authors: Shirin Jalili, Hadi Shirzad, Samaneh Nabavi, Somayeh Khanjani

Abstract:

Forensic entomology is the science of study and analysis of insects evidences to aid in criminal investigation. Being aware of the distribution, biology, ecology and behavior of insects, which are founded at crime scene can provide information about when, where and how the crime has been committed. It has many application in criminal investigations. Its main use is estimation of the minimum time after death in suspicious death. The close association between insects and corpses and the use of insects in criminal investigations is the subject of forensic entomology. Because insects attack to the decomposing corpse and spawning on it from the initial stages. Forensic scientists can estimate the postmortem index by studying the insects population and the developing larval stages.In addition, toxicological and molecular studies of these insects can reveal the cause of death or even the identity of a victim. It also be used to detect drugs and poisons, and determination of incident location. Gathering robust entomological evidences is made possible for experts by recent Techniques. They can provide vital information about death, corpse movement or burial, submersion interval, time of decapitation, identification of specific sites of trauma, post-mortem artefacts on the body, use of drugs, linking a suspect to the scene of a crime, sexual molestations and the identification of suspects.

Keywords: Forensic entomology, post mortem interval, insects, larvae

Procedia PDF Downloads 502
1024 Analyzing Students' Writing in an English Code-Mixing Context in Nepali: An Ecological and Systematic Functional Approach

Authors: Binod Duwadi

Abstract:

This article examines the language and literacy practices of English Code-mixing in Nepalese Classroom. Situating the study within an ecological framework, a systematic functional linguistic (SFL) approach was used to analyze students writing in two Neplease schools. Data collection included interviews with teachers, classroom observations, instructional materials, and focal students’ writing samples. Data analyses revealed vastly different language ecologies between the schools owing to sharp socioeconomic stratification, the structural organization of schools, and the pervasiveness of standard language ideology, with stigmatizes English code mixing (ECM) and privileges Standard English in schools. Functional analysis of students’ writing showed that the nature of the writing tasks at the schools created different affordances for exploiting lexicogrammatically choices for meaning making-enhancing them in the case of one school but severely restricting them in the case of another- perpetuating the academic disadvantage for code mixing speakers. Recommendations for structural and attitudinal changes through teacher training and implementation of approaches that engage students’ bidialectal competence for learning are made as important first steps towards addressing educational inequities in Nepalese schools.

Keywords: code-mixing, ecological perspective, systematic functional approach, language and identity

Procedia PDF Downloads 124
1023 Unsteady Three-Dimensional Adaptive Spatial-Temporal Multi-Scale Direct Simulation Monte Carlo Solver to Simulate Rarefied Gas Flows in Micro/Nano Devices

Authors: Mirvat Shamseddine, Issam Lakkis

Abstract:

We present an efficient, three-dimensional parallel multi-scale Direct Simulation Monte Carlo (DSMC) algorithm for the simulation of unsteady rarefied gas flows in micro/nanosystems. The algorithm employs a novel spatiotemporal adaptivity scheme. The scheme performs a fully dynamic multi-level grid adaption based on the gradients of flow macro-parameters and an automatic temporal adaptation. The computational domain consists of a hierarchical octree-based Cartesian grid representation of the flow domain and a triangular mesh for the solid object surfaces. The hybrid mesh, combined with the spatiotemporal adaptivity scheme, allows for increased flexibility and efficient data management, rendering the framework suitable for efficient particle-tracing and dynamic grid refinement and coarsening. The parallel algorithm is optimized to run DSMC simulations of strongly unsteady, non-equilibrium flows over multiple cores. The presented method is validated by comparing with benchmark studies and then employed to improve the design of micro-scale hotwire thermal sensors in rarefied gas flows.

Keywords: DSMC, oct-tree hierarchical grid, ray tracing, spatial-temporal adaptivity scheme, unsteady rarefied gas flows

Procedia PDF Downloads 299
1022 Analysing Representations of ‘Leftover’ Women in Chinese Media: Taking the Film ‘The Last Woman Standing’ and ‘I Do’ as Examples

Authors: Ting Li Liu

Abstract:

‘Leftover woman’ or ‘3S’ woman is the term used to describe a well-educated, high income, independent woman who is single and never married around 30 years in Chinese society. With the naming of this demographic of ‘leftover women’, their family, dating culture, mate selection and marriage attract public concern. Massive media representations of ‘leftover women’ occur daily; the research aims to present several media representations of women’s anxiety about their singlehood and related marital issues around thirty. The research triangulates two areas of media representation of ‘leftover women’: films and audience reviews on ‘Douban Movie’ website. Drawing on traditional media studies, Fairclough’s critical discourse analysis combined with multimodal techniques is applied to the research to analyze the representations of ‘leftover women’ and their implications for marital culture in China, in conjunction with a feminist perspective. The conference paper will discuss two case studies: the film ‘The last woman standing’ and ‘I Do’. Paying attention to different aspects of ‘leftover women’, the research aims to re-examine the representations of ‘leftover women’ in selected scenes, such as their age anxiety, family, marriage, dating process, careers, etc. The paper also includes public beliefs about ‘leftover women’ from online audience reviews. In conclusion, the emergence of ‘leftover women’ is a reflection of Chinese tradition’s impact on people’s lives and new changes in Chinese families and their attitude to marriage.

Keywords: leftover women, marriage, family, media culture, China

Procedia PDF Downloads 254
1021 Power Relation, Symbolic Rules and the Position of Belis in the Habitus of the East Nusa Tenggara Society’s Customary Marriage

Authors: Siti Rodliyah, Andrik Purwasito, Bani Sudardi, Abdullah Wakit

Abstract:

This study employs sociological-ethnographic basic method and the cultural studies paradigm as the approach in understanding the habitus within the customary marriage of the East Nusa Tenggara society who require belis as a bride-price. The conceptual basis underlying the application of habitus theory and symbolic power in East Nusa Tenggara (NTT) society refers to the Bourdieu’s framework. This study is a result of participatory observation on habitus of a marital system using belis observed by the NTT society as a cognitive structure which connects individuals to the social activities of the customary marriage and makes it unquestionable habits. Knowledge of the social world under the pretext of prosperity for the recipients (family) of a bride-price can be a political instrument for the sustainability of power relations. The ritual-mythical system in the society has never been fully present as a neutral habit. The habitus reflected in the marital relationship among the NTT society enables the men to obtain and exercise their power relations. The sustainability of power relations can be seen from the representation of the social status of a girl and the properties attached to her. This is what gave birth to a symbolic rule, in which the social rules about bride-price or belis eventually will serve the interests of those who occupy a dominant position in the social structure, namely the rich men.

Keywords: belis, habitus, East Nusa Tenggara, marital system, power, symbolic

Procedia PDF Downloads 244
1020 An Analysis of Miguel Syjuco’s Ilustrado: The Reconstructed Oriental Image

Authors: Christine Ivy A. Nogot

Abstract:

Under the colony of Spain for more than three centuries, the Philippines has a deep-rooted structure of Western ideologies and colonialism. The late 19th century, the period of Enlightenment, created a significant impact on our history when a group of middle-class Filipino men were sent to Europe to study. They were called Ilustrados, a Spanish word for erudite. They were the enlightened; the well-educated, intellectual scholars. Their writings provide intellectual grounds for the awakening of national consciousness that eventually prompted national movements and revolutions. They helped to establish a postcolonial society. In the modern era, Miguel Syjuco, a Filipino expatriate, wrote a novel and titled it Ilustrado. It is a representation of the liberal mind of the diasporic author in contemporary discourse. It provides a critical examination of the ilustrado in transition through the character of Miguel, who is also an expatriate writer. Using Syjuco’s award-winning novel as the primary text and anchored on Said’s concept of Orientalism, this paper examines how the depiction of features of the Eastern world is presented in the literary discourse. This paper looks into Said’s concept of orientalism as a hegemonic discursive structure and shows how Western superiority influences the Eastern culture in literary discourse. It explores Gramsci’s theory of cultural hegemony to explore Said’s argument that Western powers conquer the orient through culture and ideology. This paper presents how dominant ideologies and the social context redefine the ilustrado in the contemporary era.

Keywords: cultural hegemony, ilustrado, orientalism, postcolonial

Procedia PDF Downloads 76
1019 Children Beliefs about Illness, Treatments and Vaccines after the Experience of Covid 19 Pandemic

Authors: Margarida Maria Cabugueira Csutódio dos Santos, Joana Filipa Pintéus Pereira

Abstract:

The way children understand the concept of health and illness influences their reaction in contexts where these concepts are present (e.g.,illness; vaccination). The recognition of the importance of children's beliefs/representations about health and disease has led to the development of models that seek to explain the development process of these concepts. In the construction of their representations, children are influenced not only by their cognitive competence but also by their life experiences. In the last 3 years, children have experienced a pandemic health crisis that has exposed them to anomalous and stressful situations. Objective: the aim of this study was (1) to identify children’s representations about disease (including symptoms, causes, control/treatment) and prevention (including health procedures and vaccines) and (2) whether COVID19 is mentioned and influences their representations. Methodology: a qualitative study in which 67 children with 7 to 10 years old (mean 8,8) participated. A semi-structured interview was used following the Bibace and Walsh model, focusing on the representation of the disease and its prevention. Results show a marked influence of the lived experience with regard to causes of the disease, disease control and treatment, and adherence to vaccination. Age-dependent differences were found with older children being able to talk about illness and contamination process and younger displaying more basic, concrete and rigid representations. Conclusions: The results of this study bring clues to the adequacy of communication with the child in the context of health and illness and discriminately in a future health pandemic crisis.

Keywords: childen, health beliefs, pediatrics, covid19, vaccines

Procedia PDF Downloads 89
1018 Towards Addressing the Cultural Snapshot Phenomenon in Cultural Mapping Libraries

Authors: Mousouris Spiridon, Kavakli Evangelia

Abstract:

This paper focuses on Digital Libraries (DLs) that contain and geovisualise cultural data, highlighting the need to define them as a separate category termed Cultural Mapping Libraries, based on their inherent connection of culture with geographic location and their design requirements in support of visual representation of cultural data on the map. An exploratory analysis of DLs that conform to the above definition brought forward the observation that existing Cultural Mapping Libraries fail to geovisualise the entirety of cultural data per point of interest thus resulting in a Cultural Snapshot phenomenon. The existence of this phenomenon was reinforced by the results of a systematic bibliographic research. In order to address the Cultural Snapshot, this paper proposes the use of the Semantic Web principles to efficiently interconnect spatial cultural data through time, per geographic location. In this way points of interest are transformed into scenery where culture evolves over time. This evolution is expressed as occurrences taking place chronologically, in an event oriented approach, a conceptualization also endorsed by the CIDOC Conceptual Reference Model (CIDOC CRM). In particular, we posit the use of CIDOC CRM as the baseline for defining the logic of Cultural Mapping Libraries as part of the Culture Domain in accordance with the Digital Library Reference Model, in order to define the rules of cultural data management by the system. Our future goal is to transform this conceptual definition in to inferencing rules that resolve the Cultural Snapshot and lead to a more complete geovisualisation of cultural data.

Keywords: digital libraries, semantic web, geovisualization, CIDOC-CRM

Procedia PDF Downloads 109
1017 A Distributed Cryptographically Generated Address Computing Algorithm for Secure Neighbor Discovery Protocol in IPv6

Authors: M. Moslehpour, S. Khorsandi

Abstract:

Due to shortage in IPv4 addresses, transition to IPv6 has gained significant momentum in recent years. Like Address Resolution Protocol (ARP) in IPv4, Neighbor Discovery Protocol (NDP) provides some functions like address resolution in IPv6. Besides functionality of NDP, it is vulnerable to some attacks. To mitigate these attacks, Internet Protocol Security (IPsec) was introduced, but it was not efficient due to its limitation. Therefore, SEND protocol is proposed to automatic protection of auto-configuration process. It is secure neighbor discovery and address resolution process. To defend against threats on NDP’s integrity and identity, Cryptographically Generated Address (CGA) and asymmetric cryptography are used by SEND. Besides advantages of SEND, its disadvantages like the computation process of CGA algorithm and sequentially of CGA generation algorithm are considerable. In this paper, we parallel this process between network resources in order to improve it. In addition, we compare the CGA generation time in self-computing and distributed-computing process. We focus on the impact of the malicious nodes on the CGA generation time in the network. According to the result, although malicious nodes participate in the generation process, CGA generation time is less than when it is computed in a one-way. By Trust Management System, detecting and insulating malicious nodes is easier.

Keywords: NDP, IPsec, SEND, CGA, modifier, malicious node, self-computing, distributed-computing

Procedia PDF Downloads 278
1016 Analytical Formulae for the Approach Velocity Head Coefficient

Authors: Abdulrahman Abdulrahman

Abstract:

Critical depth meters, such as abroad crested weir, Venture Flume and combined control flume are standard devices for measuring flow in open channels. The discharge relation for these devices cannot be solved directly, but it needs iteration process to account for the approach velocity head. In this paper, analytical solution was developed to calculate the discharge in a combined critical depth-meter namely, a hump combined with lateral contraction in rectangular channel with subcritical approach flow including energy losses. Also analytical formulae were derived for approach velocity head coefficient for different types of critical depth meters. The solution was derived by solving a standard cubic equation considering energy loss on the base of trigonometric identity. The advantage of this technique is to avoid iteration process adopted in measuring flow by these devices. Numerical examples are chosen for demonstration of the proposed solution.

Keywords: broad crested weir, combined control meter, control structures, critical flow, discharge measurement, flow control, hydraulic engineering, hydraulic structures, open channel flow

Procedia PDF Downloads 274
1015 The Impact of Brand-Related User-Generated Content on Brand Positioning: A Study on Private Higher Education Institutes in Vietnam

Authors: Charitha Harshani Perera, Rajkishore Nayak, Long Thang Van Nguyen

Abstract:

With the advent of social media, Vietnam has changed the way customers perceive the information about the brand. In the context of higher education, the adoption of social media has received attention with the increasing rate of social media usage among undergraduates. Brand-related user-generated content (UGC) on social media emphasizes the social ties between users and users’ participation, which promotes the communication to build and maintain the relationship with the brands. Although brand positioning offers a significant competitive advantage, the association with brand-related user-generated content in social media with brand positioning in the context of higher education is still an under-researched area. Accordingly, using social identity theory and social exchange theory, this research aims to deepen our understanding of the influence of brand-related user-generated content on brand positioning and purchase intention. Employing a quantitative survey design,384 Vietnamese undergraduates were selected based on purposive sampling. The findings suggest that brand-related user-generated content influence brand positioning and brand choice intention. However, there is a significant mediating effect of the reliability and understandability of the content.

Keywords: brand positioning, brand-related user-generated content, emerging countries, higher education

Procedia PDF Downloads 177
1014 A Multi-Science Study of Modern Synergetic War and Its Information Security Component

Authors: Alexander G. Yushchenko

Abstract:

From a multi-science point of view, we analyze threats to security resulting from globalization of international information space and information and communication aggression of Russia. A definition of Ruschism is formulated as an ideology supporting aggressive actions of modern Russia against the Euro-Atlantic community. Stages of the hybrid war Russia is leading against Ukraine are described, including the elements of subversive activity of the special services, the activation of the military phase and the gradual shift of the focus of confrontation to the realm of information and communication technologies. We reveal an emergence of a threat for democratic states resulting from the destabilizing impact of a target state’s mass media and social networks being exploited by Russian secret services under freedom-of-speech disguise. Thus, we underline the vulnerability of cyber- and information security of the network society in regard of hybrid war. We propose to define the latter a synergetic war. Our analysis is supported with a long-term qualitative monitoring of representation of top state officials on popular TV channels and Facebook. From the memetics point of view, we have detected a destructive psycho-information technology used by the Kremlin, a kind of information catastrophe, the essence of which is explained in detail. In the conclusion, a comprehensive plan for information protection of the public consciousness and mentality of Euro-Atlantic citizens from the aggression of the enemy is proposed.

Keywords: cyber and information security, hybrid war, psycho-information technology, synergetic war, Ruschism

Procedia PDF Downloads 134
1013 A Framework for Chinese Domain-Specific Distant Supervised Named Entity Recognition

Authors: Qin Long, Li Xiaoge

Abstract:

The Knowledge Graphs have now become a new form of knowledge representation. However, there is no consensus in regard to a plausible and definition of entities and relationships in the domain-specific knowledge graph. Further, in conjunction with several limitations and deficiencies, various domain-specific entities and relationships recognition approaches are far from perfect. Specifically, named entity recognition in Chinese domain is a critical task for the natural language process applications. However, a bottleneck problem with Chinese named entity recognition in new domains is the lack of annotated data. To address this challenge, a domain distant supervised named entity recognition framework is proposed. The framework is divided into two stages: first, the distant supervised corpus is generated based on the entity linking model of graph attention neural network; secondly, the generated corpus is trained as the input of the distant supervised named entity recognition model to train to obtain named entities. The link model is verified in the ccks2019 entity link corpus, and the F1 value is 2% higher than that of the benchmark method. The re-pre-trained BERT language model is added to the benchmark method, and the results show that it is more suitable for distant supervised named entity recognition tasks. Finally, it is applied in the computer field, and the results show that this framework can obtain domain named entities.

Keywords: distant named entity recognition, entity linking, knowledge graph, graph attention neural network

Procedia PDF Downloads 93
1012 A Critical Discourse Analysis of the Impact of the Linguistic Behavior of the Soccer Moroccan Coach in Light of Motivation Theory and Discursive Psychology

Authors: Abdelaadim Bidaoui

Abstract:

As one of the most important linguistic inquiries, the topic of the intertwined relationship between language, the mind, and the world has attracted many scholars. In the fifties, Sapir and Whorf advocated the hypothesis that language shapes our cultural realities as an early attempt to provide answers to this linguistic inquiry. Later, discursive psychology views the linguistic behavior as “a dynamic form of social practice which constructs the social world, individual selves and identity.” (Jorgensen & Phillips 2002, 118). Discursive psychology also considers discourse as a trigger of social action and change. Building on discursive psychology and motivation theory, this paper examines the impact of linguistic behavior of the Moroccan coach Walid Reggragui on the Moroccan team’s exceptional performance in Qatar 2022 Soccer World Cup. The data used in the research is based on interviews conducted by the Moroccan coach prior and during the World Cup. Using a discourse analysis of the linguistic behavior of Reggragui, this paper shows how the linguistic behavior of Reggragui provided support for the three psychological needs: sense of belonging, competence, and autonomy. As any CDA research, this paper uses a triangulated theoretical framework that includes language, cognition and society.

Keywords: critical discourse analysis, motivation theory, discursive psychology, linguistic behavior

Procedia PDF Downloads 90
1011 Preprocessing and Fusion of Multiple Representation of Finger Vein patterns using Conventional and Machine Learning techniques

Authors: Tomas Trainys, Algimantas Venckauskas

Abstract:

Application of biometric features to the cryptography for human identification and authentication is widely studied and promising area of the development of high-reliability cryptosystems. Biometric cryptosystems typically are designed for patterns recognition, which allows biometric data acquisition from an individual, extracts feature sets, compares the feature set against the set stored in the vault and gives a result of the comparison. Preprocessing and fusion of biometric data are the most important phases in generating a feature vector for key generation or authentication. Fusion of biometric features is critical for achieving a higher level of security and prevents from possible spoofing attacks. The paper focuses on the tasks of initial processing and fusion of multiple representations of finger vein modality patterns. These tasks are solved by applying conventional image preprocessing methods and machine learning techniques, Convolutional Neural Network (SVM) method for image segmentation and feature extraction. An article presents a method for generating sets of biometric features from a finger vein network using several instances of the same modality. Extracted features sets were fused at the feature level. The proposed method was tested and compared with the performance and accuracy results of other authors.

Keywords: bio-cryptography, biometrics, cryptographic key generation, data fusion, information security, SVM, pattern recognition, finger vein method.

Procedia PDF Downloads 150
1010 The Impact of Technology on Handicapped and Disability

Authors: George Kamil Kamal Abdelnor

Abstract:

Every major educational institution has incorporated diversity, equity, and inclusion (DEI) principles into its administrative, hiring, and pedagogical practices. Yet these DEI principles rarely incorporate explicit language or critical thinking about disability. Despite the fact that according to the World Health Organization, one in five people worldwide is disabled, making disabled people the larger minority group in the world, disability remains the neglected stepchild of DEI. Drawing on disability studies and crip theory frameworks, the underlying causes of this exclusion of disability from DEI, such as stigma, shame, invisible disabilities, institutionalization/segregation/delineation from family, and competing models and definitions of disability are examined. This paper explores both the ideological and practical shifts necessary to include disability in university DEI initiatives. It offers positive examples as well as conceptual frameworks such as 'divers ability' for so doing. Using Georgetown University’s 2020-2022 DEI initiatives as a case study, this paper describes how curricular infusion, accessibility, identity, community, and diversity administration infused one university’s DEI initiatives with concrete disability-inclusive measures. It concludes with a consideration of how the very framework of DEI itself might be challenged and transformed if disability were to be included.

Keywords: cognitive disability, cognitive diversity, disability, higher education disability, Standardized Index of Diversity of Disability (SIDD), differential and diversity in disability, 60+ population diversity, equity, inclusion, crip theory, accessibility

Procedia PDF Downloads 38
1009 Heterogeneity of Soil Moisture and Its Impacts on the Mountainous Watershed Hydrology in Northwest China

Authors: Chansheng He, Zhongfu Wang, Xiao Bai, Jie Tian, Xin Jin

Abstract:

Heterogeneity of soil hydraulic properties directly affects hydrological processes at different scales. Understanding heterogeneity of soil hydraulic properties such as soil moisture is therefore essential for modeling watershed ecohydrological processes, particularly in hard to access, topographically complex mountainous watersheds. This study maps spatial variations of soil moisture by in situ observation network that consists of sampling points, zones, and tributaries, and monitors corresponding hydrological variables of air and soil temperatures, evapotranspiration, infiltration, and runoff in the Upper Reach of the Heihe River Watershed, a second largest inland river (terminal lake) with a drainage area of over 128,000 km² in Northwest China. Subsequently, the study uses a hydrological model, SWAT (Soil and Water Assessment Tool) to simulate the effects of heterogeneity of soil moisture on watershed hydrological processes. The spatial clustering method, Full-Order-CLK was employed to derive five soil heterogeneous zones (Configuration 97, 80, 65, 40, and 20) for soil input to SWAT. Results show the simulations by the SWAT model with the spatially clustered soil hydraulic information from the field sampling data had much better representation of the soil heterogeneity and more accurate performance than the model using the average soil property values for each soil type derived from the coarse soil datasets. Thus, incorporating detailed field sampling soil heterogeneity data greatly improves performance in hydrologic modeling.

Keywords: heterogeneity, soil moisture, SWAT, up-scaling

Procedia PDF Downloads 346
1008 Study on the Renewal Strategy of Mountain City Trail Based on Place Attachment Theory

Authors: Long Xumeng

Abstract:

Place attachment focuses on the emotions and practices between people and their environment, and the influencing factors of place attachment vary depending on the nature of the place. As an important carrier of public slow-moving activities and urban culture, the feelings, cognition, and behaviors of the subjects involved in the use of mountain city trails have become the focus of research in this field. This paper will take Daijiaxiang Cliff Walkway in Yuzhong District, Chongqing City, as an example and analyze the evaluation results and correlation of each factor through questionnaire survey and field observation, using the three scales of Recreational Experience Scale, Satisfaction Scale, and Place Attachment Scale, as well as the intensity of activity, by using SPSS software. The study shows that there is a significant difference between the demographic variables of users' identity and age and the formation of place attachment; the degree of place attachment is significantly positively correlated with the emotion, industry, and service quality of recreational experience; and the recreational experience of the Mountain City Trail is significantly positively correlated with the overall satisfaction. By analyzing the influencing factors of recreational experience, satisfaction and place attachment, the corresponding conclusions and enhancement strategies were drawn to provide references for the renewal and construction of mountain city trails.

Keywords: mountain city trail, place attachment, recreational experience, satisfaction, urban renewal

Procedia PDF Downloads 88
1007 Tourism and Urban Planning for Intermediate Cities: An Empirical Approach toward Cultural Heritage Conservation in Damavand, Iran

Authors: M. Elham Ghabouli

Abstract:

Intermediate cities which also called medium size cities have an important role in the process of globalization. It is argued that, in some cases this type of cities may be depopulated or in otherwise may be transformed as the periphery of metropolitans so that the personal identity of the city and its local cultural heritage could suffer from its neighbor metropolitan. Over the last decades, the role of tourism in development process and the cultural heritage is increased. The effect of tourism in socio-economic growth makes motivation for study on tourism development in regional and urban planning process. Tourism potentially has a specific role in promoting sustainable development especially by its economic and socio-cultural effects. The positive role of tourism in local development and in cultural heritage should be empowered by urban and regional planning. Damavand is an intermediate city located in Tehran province, Iran. Considering its local specific characteristic like social structure, antiquities and natural monuments made a suitable case study for studying on urban tourism planning method. Focusing on recognition of historical and cultural heritage of Damavand, this paper tried to peruse cultural-historical heritage protecting issue through “base plan methodology” which is introduced as a first step of urban planning for intermediate cities.

Keywords: urban planning, tourism, cultural heritage, intermediate cities

Procedia PDF Downloads 533
1006 Genomic Sequence Representation Learning: An Analysis of K-Mer Vector Embedding Dimensionality

Authors: James Jr. Mashiyane, Risuna Nkolele, Stephanie J. Müller, Gciniwe S. Dlamini, Rebone L. Meraba, Darlington S. Mapiye

Abstract:

When performing language tasks in natural language processing (NLP), the dimensionality of word embeddings is chosen either ad-hoc or is calculated by optimizing the Pairwise Inner Product (PIP) loss. The PIP loss is a metric that measures the dissimilarity between word embeddings, and it is obtained through matrix perturbation theory by utilizing the unitary invariance of word embeddings. Unlike in natural language, in genomics, especially in genome sequence processing, unlike in natural language processing, there is no notion of a “word,” but rather, there are sequence substrings of length k called k-mers. K-mers sizes matter, and they vary depending on the goal of the task at hand. The dimensionality of word embeddings in NLP has been studied using the matrix perturbation theory and the PIP loss. In this paper, the sufficiency and reliability of applying word-embedding algorithms to various genomic sequence datasets are investigated to understand the relationship between the k-mer size and their embedding dimension. This is completed by studying the scaling capability of three embedding algorithms, namely Latent Semantic analysis (LSA), Word2Vec, and Global Vectors (GloVe), with respect to the k-mer size. Utilising the PIP loss as a metric to train embeddings on different datasets, we also show that Word2Vec outperforms LSA and GloVe in accurate computing embeddings as both the k-mer size and vocabulary increase. Finally, the shortcomings of natural language processing embedding algorithms in performing genomic tasks are discussed.

Keywords: word embeddings, k-mer embedding, dimensionality reduction

Procedia PDF Downloads 137
1005 Enhanced Planar Pattern Tracking for an Outdoor Augmented Reality System

Authors: L. Yu, W. K. Li, S. K. Ong, A. Y. C. Nee

Abstract:

In this paper, a scalable augmented reality framework for handheld devices is presented. The presented framework is enabled by using a server-client data communication structure, in which the search for tracking targets among a database of images is performed on the server-side while pixel-wise 3D tracking is performed on the client-side, which, in this case, is a handheld mobile device. Image search on the server-side adopts a residual-enhanced image descriptors representation that gives the framework a scalability property. The tracking algorithm on the client-side is based on a gravity-aligned feature descriptor which takes the advantage of a sensor-equipped mobile device and an optimized intensity-based image alignment approach that ensures the accuracy of 3D tracking. Automatic content streaming is achieved by using a key-frame selection algorithm, client working phase monitoring and standardized rules for content communication between the server and client. The recognition accuracy test performed on a standard dataset shows that the method adopted in the presented framework outperforms the Bag-of-Words (BoW) method that has been used in some of the previous systems. Experimental test conducted on a set of video sequences indicated the real-time performance of the tracking system with a frame rate at 15-30 frames per second. The presented framework is exposed to be functional in practical situations with a demonstration application on a campus walk-around.

Keywords: augmented reality framework, server-client model, vision-based tracking, image search

Procedia PDF Downloads 275
1004 Exploring Intercultural Communication and Organizational Challenges of Women's Stereotypes: Gendered Expectancies

Authors: Andrew Enaifoghe

Abstract:

Women's roles in the past and modern society were typically subordinate to men. This form of discrimination against women prevented them from taking on leadership roles as they were considered male roles. However, some theories, like social thought, suggest that human minds form a map during socialization, where each category of things/objects is represented in schemata or nodes. These representations or nodules are interrelated, subject to their probability of developing together and formed based on previous experiences. The consequences of gender roles and the threat of stereotyping in the workplace have been debated by the researcher. The study also looks at the effects of stereotypes beyond test performance and the submission of socio-cultural briefs low-cost interventions in the working environment through organizational and intercultural communication. This study adopted a qualitative research method with a systematic document analysis, which allows researchers to study by consulting and making sense of written materials available in the public or private domain. The study employed the Social Identity Theory (SIT) and Organizational Control Theory to conceptualize this paper. The study discovered that when women use an interpersonally oriented leadership style in male-dominated industries, they have been found to suffer from high levels of mental ill-health and continue to endure significant amounts of pressure from their professions.

Keywords: gender roles, stereotyping, organizational, intercultural communication

Procedia PDF Downloads 12
1003 The Methodology of System Modeling of Mechatronic Systems

Authors: Lakhoua Najeh

Abstract:

Aims of the work: After a presentation of the functionality of an example of a mechatronic system which is a paint mixer system, we present the concepts of modeling and safe operation. This paper briefly discusses how to model and protect the functioning of a mechatronic system relying mainly on functional analysis and safe operation techniques. Methods: For the study of an example of a mechatronic system, we use methods for external functional analysis that illustrate the relationships between a mechatronic system and its external environment. Thus, we present the Safe-Structured Analysis Design Technique method (Safe-SADT) which allows the representation of a mechatronic system. A model of operating safety and automation is proposed. This model enables us to use a functional analysis technique of the mechatronic system based on the GRAFCET (Graphe Fonctionnel de Commande des Etapes et Transitions: Step Transition Function Chart) method; study of the safe operation of the mechatronic system based on the Safe-SADT method; automation of the mechatronic system based on a software tool. Results: The expected results are to propose a model and safe operation of a mechatronic system. This methodology enables us to analyze the relevance of the different models based on Safe-SADT and GRAFCET in relation to the control and monitoring functions and to study the means allowing exploiting their synergy. Conclusion: In order to propose a general model of a mechatronic system, a model of analysis, safety operation and automation of a mechatronic system has been developed. This is how we propose to validate this methodology through a case study of a paint mixer system.

Keywords: mechatronic systems, system modeling, safe operation, Safe-SADT

Procedia PDF Downloads 245
1002 Choosing Local Organic Food: Consumer Motivations and Ethical Spaces

Authors: Artur Saraiva, Moritz von Schwedler, Emília Fernandes

Abstract:

In recent years, the organic sector has increased significantly. However, with the ‘conventionalization’ of these products, it has been questioned whether these products have been losing their original vision. Accordingly, this research based on 31 phenomenological interviews with committed organic consumers in urban and rural areas of Portugal, aims to analyse how ethical motivations and ecological awareness are related to organic food consumption. The content thematic analysis highlights aspects related to society and environmental concerns. On an individual level, the importance of internal coherence, peace of mind and balance that these consumers find in the consumption of local organic products was stressed. For these consumers, local organic products consumption made for significant changes in their lives, aiding in the establishment of a green identity, and involves a certain philosophy of life. This vision of an organic lifestyle is grounded in a political and ecological perspective, beyond the usual organic definition, as a ‘post-organic era’. The paper contributes to better understand how an ideological environmental discourse allows highlighting the relationship between consumers’ environmental concerns and the politics of food, resulting in a possible transition to new sustainable consumption practices.

Keywords: organic consumption, localism, content thematic analysis, pro-environmental discourse, political consumption, Portugal

Procedia PDF Downloads 212
1001 Refined Edge Detection Network

Authors: Omar Elharrouss, Youssef Hmamouche, Assia Kamal Idrissi, Btissam El Khamlichi, Amal El Fallah-Seghrouchni

Abstract:

Edge detection is represented as one of the most challenging tasks in computer vision, due to the complexity of detecting the edges or boundaries in real-world images that contains objects of different types and scales like trees, building as well as various backgrounds. Edge detection is represented also as a key task for many computer vision applications. Using a set of backbones as well as attention modules, deep-learning-based methods improved the detection of edges compared with the traditional methods like Sobel and Canny. However, images of complex scenes still represent a challenge for these methods. Also, the detected edges using the existing approaches suffer from non-refined results while the image output contains many erroneous edges. To overcome this, n this paper, by using the mechanism of residual learning, a refined edge detection network is proposed (RED-Net). By maintaining the high resolution of edges during the training process, and conserving the resolution of the edge image during the network stage, we make the pooling outputs at each stage connected with the output of the previous layer. Also, after each layer, we use an affined batch normalization layer as an erosion operation for the homogeneous region in the image. The proposed methods are evaluated using the most challenging datasets including BSDS500, NYUD, and Multicue. The obtained results outperform the designed edge detection networks in terms of performance metrics and quality of output images.

Keywords: edge detection, convolutional neural networks, deep learning, scale-representation, backbone

Procedia PDF Downloads 102
1000 Evaluation of Genetic Diversity Through RAPD Markers Among Melia azedarach L (Chinabery)

Authors: Nadir Ali Rind, Özlem Aksoy, Muhammad Umar Dahot, Salih Dikilitaş, Muhammad Rafiq, Burçak Tütünoğlu

Abstract:

Melia azedarach L. is freshly fruited small to medium sized tree native to China and North western India. It is growing in Pakistan and Turkey in various areas facing great environmental changes to maintain its survival. The species is valued for its high quality wood, medicinal, ornamental and shade purposes. The present work was aimed to estimate the genetic variation among the populations of Melia azedarach L. leaf samples that were collected from five different locations of Turkey and three different areas of Pakistan. These populations were chosen on the random bases by applying RAPD primers in order to construct a dendogram using UPGMA method to show genetic diversity. After that appropriate conservation strategies were suggested. 14 primers producing polymorphic and monomorphic bands were analyzed. Genetic distances were calculated for all the species studied by RAPD-PCR methods. According to the results the lowest genetic identity values and the highest genetic polymorphic values were determined. It is observed that there was a clear split among populations from different areas in Turkey and Pakistan. These differences may be due to eco-geographical association with genetic variation and should be conserved to retain the genetic variation of the species.

Keywords: melia azedarach L., genetic diversity, conservation, RAPD-PCR, medicinal plant

Procedia PDF Downloads 465
999 Effects of Screen Time on Children from a Systems Engineering Perspective

Authors: Misagh Faezipour

Abstract:

This paper explores the effects of screen time on children from a systems engineering perspective. We reviewed literature from several related works on the effects of screen time on children to explore all factors and interrelationships that would impact children that are subjected to using long screen times. Factors such as kids' age, parent attitudes, parent screen time influence, amount of time kids spend with technology, psychosocial and physical health outcomes, reduced mental imagery, problem-solving and adaptive thinking skills, obesity, unhealthy diet, depressive symptoms, health problems, disruption in sleep behavior, decrease in physical activities, problematic relationship with mothers, language, social, emotional delays, are examples of some factors that could be either a cause or effect of screen time. A systems engineering perspective is used to explore all the factors and factor relationships that were discovered through literature. A causal model is used to illustrate a graphical representation of these factors and their relationships. Through the causal model, the factors with the highest impacts can be realized. Future work would be to develop a system dynamics model to view the dynamic behavior of the relationships and observe the impact of changes in different factors in the model. The different changes on the input of the model, such as a healthier diet or obesity rate, would depict the effect of the screen time in the model and portray the effect on the children’s health and other factors that are important, which also works as a decision support tool.

Keywords: children, causal model, screen time, systems engineering, system dynamics

Procedia PDF Downloads 144