Search results for: academic social networks
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 13575

Search results for: academic social networks

11505 Designing Social Media into Higher Education Courses

Authors: Thapanee Seechaliao

Abstract:

This research paper presents guiding on how to design social media into higher education courses. The research methodology used a survey approach. The research instrument was a questionnaire about guiding on how to design social media into higher education courses. Thirty-one lecturers completed the questionnaire. The data were scored by frequency and percentage. The research results were the lecturers’ opinions concerning the designing social media into higher education courses as follows: 1) Lecturers deem that the most suitable learning theory is Collaborative Learning. 2) Lecturers consider that the most important learning and innovation Skill in the 21st century is communication and collaboration skills. 3) Lecturers think that the most suitable evaluation technique is authentic assessment. 4) Lecturers consider that the most appropriate portion used as blended learning should be 70% in the classroom setting and 30% online.

Keywords: instructional design, social media, courses, higher education

Procedia PDF Downloads 510
11504 Social Entrepreneurship and Women: A Bibliometric Analysis

Authors: S. Jailapdeen

Abstract:

Social entrepreneurship (SE)plays a pivotal role in the country which can contribute to women’s empowerment by providing them employment opportunities. SE plays a vital role in improving the economic condition of women, with self-motivated women entrepreneurs engaging several of their community members in their enterprises. Social enterprises unearth women’s inherent ability to be engaged in jobs other than agricultural and allied fields for their livelihoods. This paper highlights the role of social entrepreneurship in socio-economic empowerment of women. The researcher performed a bibliographic analysis of previously published works from peer-reviewed journals. The results are presented in the form of descriptive findings and discussions. The paper concludes by setting an agenda for future researchers in this field.

Keywords: social entrepreneurship, women’s socio-economic empowerment, bibliometric analysis, agenda for future researchers

Procedia PDF Downloads 88
11503 Disputed Heritage: Modernism as Resistance

Authors: Marcos Fabris

Abstract:

The flaccidity of the contemporary art production, its banality and incapacity of raising social and political relevant issues, and its ubiquitous connection to an ever prospering art market have become a trite, prosaic mantra, a thought-terminating cliché repeated by many, at least in the academic circles, who constantly lament the absence of pressing issues, artistically articulated from a Marxist perspective. This ‘resignation’ or crystalized insistence to consider Contemporary Art as a monolithic block – insufficiently critical – seems to be part of a pattern in Art History, not excluding its leftist wings: the idea that Modernism was, too, a homogeneous movement, one that despite its attempts to establish meaningful connections between art and society are now part of a museological past. This post-mortem attributed to a ‘flat’ modernism disregards it’s highly contradictory character and diverging tendencies, in permanent conflict between themselves and part of a larger movement that questioned Capitalism – as a system. The aim of this presentation is to shed light on some of the most radical modern tendencies, how they articulated ways to figure the uneven and combined development, and how this ‘Alternative Modernism’ may inform, inspire, and make us advance critically in our struggles against the returns of Capitalism.

Keywords: art criticism, art history, contemporary art, modernism

Procedia PDF Downloads 257
11502 Presentation of HVA Faults in SONELGAZ Underground Network and Methods of Faults Diagnostic and Faults Location

Authors: I. Touaїbia, E. Azzag, O. Narjes

Abstract:

Power supply networks are growing continuously and their reliability is getting more important than ever. The complexity of the whole network comprises numerous components that can fail and interrupt the power supply for the end user. Underground distribution systems are normally exposed to permanent faults, due to specific construction characteristics. In these systems, visual inspection cannot be performed. In order to enhance service restoration, accurate fault location techniques must be applied. This paper describes the different faults that affect the underground distribution system of SONELGAZ (National Society of Electricity and Gas of Algeria), and cable fault location procedure with impulse reflection method (TDR), based in the analyses of the cable response of the electromagnetic impulse, allows cable fault prelocation. The results are obtained from real test in the underground distribution feeder from electrical network of energy distribution company of Souk-Ahras, in order to know the influence of cable characteristics in the types and frequency of faults.

Keywords: distribution networks, fault location, TDR, underground cable

Procedia PDF Downloads 533
11501 Corporate Social Responsibility a Comparison between European and Latin American Companies

Authors: Eva Wagner, Lucely Vargas

Abstract:

Corporate Social Responsibility (CSR) plays an important role in (large-scale) enterprises’ business strategy in developed and emerging countries. This article approaches CSR in international comparison by examining the CSR reporting of 116 leading companies in Austria, Germany, Colombia and Chile from 2006 to 2010. We have used an independently developed scoring model which analyzes reported CSR-activities using seven dimensions to efficiently assess CSR. The study reveals that there are significant differences in CSR-commitment among countries and regions: German companies, as expected, lead most of the investigated CSR dimensions revealing stronger commitment to CSR than their Austrian, Colombian and Chilean counterparts. Even if Latin American companies lag behind their European counterparts, they exhibit high CSR-performance in the social dimension: corporate giving and philanthropic activities are firmly anchored in the tradition of Latin American companies. This indicates that particular CSR-emphases reflect the political and social circumstances of each individual country.

Keywords: corporate social responsibility, corporate social performance, international comparison

Procedia PDF Downloads 316
11500 2D Convolutional Networks for Automatic Segmentation of Knee Cartilage in 3D MRI

Authors: Ananya Ananya, Karthik Rao

Abstract:

Accurate segmentation of knee cartilage in 3-D magnetic resonance (MR) images for quantitative assessment of volume is crucial for studying and diagnosing osteoarthritis (OA) of the knee, one of the major causes of disability in elderly people. Radiologists generally perform this task in slice-by-slice manner taking 15-20 minutes per 3D image, and lead to high inter and intra observer variability. Hence automatic methods for knee cartilage segmentation are desirable and are an active field of research. This paper presents design and experimental evaluation of 2D convolutional neural networks based fully automated methods for knee cartilage segmentation in 3D MRI. The architectures are validated based on 40 test images and 60 training images from SKI10 dataset. The proposed methods segment 2D slices one by one, which are then combined to give segmentation for whole 3D images. Proposed methods are modified versions of U-net and dilated convolutions, consisting of a single step that segments the given image to 5 labels: background, femoral cartilage, tibia cartilage, femoral bone and tibia bone; cartilages being the primary components of interest. U-net consists of a contracting path and an expanding path, to capture context and localization respectively. Dilated convolutions lead to an exponential expansion of receptive field with only a linear increase in a number of parameters. A combination of modified U-net and dilated convolutions has also been explored. These architectures segment one 3D image in 8 – 10 seconds giving average volumetric Dice Score Coefficients (DSC) of 0.950 - 0.962 for femoral cartilage and 0.951 - 0.966 for tibia cartilage, reference being the manual segmentation.

Keywords: convolutional neural networks, dilated convolutions, 3 dimensional, fully automated, knee cartilage, MRI, segmentation, U-net

Procedia PDF Downloads 261
11499 Resilience with Spontaneous Volunteers in Disasters-Coordination Using an It System

Authors: Leo Latasch, Mario Di Gennaro

Abstract:

Introduction: The goal of this project was to increase the resilience of the population as well as rescue organizations to make both quality and time-related improvements in handling crises. A helper network was created for this purpose. Methods: Social questions regarding the structure and purpose of helper networks were considered - specifically with regard to helper motivation, the level of commitment and collaboration between populations and agencies. The exchange of information, the coordinated use of volunteers, and the distribution of available resources will be ensured through defined communication and cooperation routines. Helper smartphones will also be used provide a picture of the situation on the ground. Results: The helper network was established and deployed based on the RESIBES information technology system. It consists of a service platform, a web portal and a smartphone app. The service platform is the central element for collaboration between the various rescue organizations, as well as for persons, associations, and companies from the population offering voluntary aid. The platform was used for: Registering helpers and resources and then requesting and assigning it in case of a disaster. These services allow the population's resources to be organized. The service platform also allows for a secure data exchange between services and external systems. Conclusions: The social and technical work priorities have allowed us to cover a full cycle of advance structural work, gaining an overview, damage management, evaluation, and feedback on experiences. This cycle allows experiences gained while handling the crisis to feed back into the cycle and improve preparations and management strategies.

Keywords: coordination, disaster, resilience, volunteers

Procedia PDF Downloads 142
11498 An Indoor Positioning System in Wireless Sensor Networks with Measurement Delay

Authors: Pyung Soo Kim, Eung Hyuk Lee, Mun Suck Jang

Abstract:

In the current paper, an indoor positioning system is proposed with consideration of measurement delay. Firstly, an estimation filter with a measurement delay is designed for the indoor positioning mechanism under a weighted least square criterion, which utilizes only finite measurements on the most recent window. The proposed estimation filtering based scheme gives the filtered estimates for position, velocity and acceleration of moving target in real-time, while removing undesired noisy effects and preserving desired moving positions. Secondly, the proposed scheme is shown to have good inherent properties such as unbiasedness, efficiency, time-invariance, deadbeat, and robustness due to the finite memory structure. Finally, computer simulations shows that the performance of the proposed estimation filtering based scheme can outperform to the existing infinite memory filtering based mechanism.

Keywords: indoor positioning system, wireless sensor networks, measurement delay

Procedia PDF Downloads 482
11497 Halal Education in TVET : Roles of Malaysian Polytechnics in Creating Halal Competent Workforce

Authors: Ahmad Sahir Jais

Abstract:

This paper is focusing on the roles played by Malaysian polytechnics in halal education in the context of technical, vocational education and training (TVET). A critical review of the previous literature, as well as documents analysis of the curriculum structure, highlighted several theme concerning dietary halal sectors in Malaysia as well as the depth of halal education ingrained in Malaysia polytechnics education system. Dietary halal in Malaysia has gained prominence exposure lately, due to the heighten awareness among Muslim consumers. Therefore, this has contributed to a surge in demand for halal food. Growth in halal sub sectors has a consequent effect with the demand for halal competent human capital resulting in demands for halal competent human capital by the industries cannot be matched by the educational institution. It can be concluded that, Malaysian Polytechnics has taken up the lead role in halal education in comparison with other academic institution in filling the needs for halal competent workers by offering halal related courses at diploma level as well as short courses for the local communities. They has successfully positioned themselves as an academic institution that meets the demands of the industry as the demand for halal competent workers which is expected to grow significantly due to new legislation introduces by the government, expansion of halal economy and increase awareness and interest in halal among consumer.

Keywords: halal in TVET, TVET, halal, Malaysian polytechnics

Procedia PDF Downloads 274
11496 Engineering the Human Mind: Social Engineering Attack Using Kali Linux

Authors: Joy Winston James, Abdul Kadher Jilani

Abstract:

This review article provides a comprehensive overview of social engineering attacks, specifically those executed through the Kali Linux operating system. It aims to present an in-depth analysis of the background and importance of social engineering in cybersecurity, the tools, and techniques used in these attacks, real-world case studies that demonstrate their effectiveness, and ethical considerations that need to be taken into account while using them. The article highlights the Kali Linux tools that are commonly used in social engineering attacks, including SET, Metasploit, and BeEF, and discusses techniques such as phishing, pretexting, and baiting that are crucial in conducting successful social engineering attacks. It further explores real-world case studies that demonstrate the effectiveness of these techniques, emphasizing the importance of implementing effective countermeasures to reduce the risk of successful social engineering attacks. Moreover, the article sheds light on ethical considerations that need to be taken into account while using social engineering tools, emphasizing the importance of using them ethically and legally. Finally, the article provides potential countermeasures such as two-factor authentication, strong password policies, and regular security audits to help individuals and organizations better protect themselves against this growing threat. By understanding the tools and techniques used in social engineering attacks and implementing appropriate countermeasures, individuals and organizations can minimize the risk of successful social engineering attacks and improve their cybersecurity posture. To illustrate the effectiveness of social engineering attacks, we present real-world case studies that demonstrate how easily individuals and organizations can fall prey to these attacks. We also discuss ethical considerations that must be taken into account while using social engineering tools, emphasizing the need for responsible and legal use of these tools.

Keywords: pen testing, hacking, Kali Linux, social engineering

Procedia PDF Downloads 98
11495 O-LEACH: The Problem of Orphan Nodes in the LEACH of Routing Protocol for Wireless Sensor Networks

Authors: Wassim Jerbi, Abderrahmen Guermazi, Hafedh Trabelsi

Abstract:

The optimum use of coverage in wireless sensor networks (WSNs) is very important. LEACH protocol called Low Energy Adaptive Clustering Hierarchy, presents a hierarchical clustering algorithm for wireless sensor networks. LEACH is a protocol that allows the formation of distributed cluster. In each cluster, LEACH randomly selects some sensor nodes called cluster heads (CHs). The selection of CHs is made with a probabilistic calculation. It is supposed that each non-CH node joins a cluster and becomes a cluster member. Nevertheless, some CHs can be concentrated in a specific part of the network. Thus, several sensor nodes cannot reach any CH. to solve this problem. We created an O-LEACH Orphan nodes protocol, its role is to reduce the sensor nodes which do not belong the cluster. The cluster member called Gateway receives messages from neighboring orphan nodes. The gateway informs CH having the neighboring nodes that not belong to any group. However, Gateway called (CH') attaches the orphaned nodes to the cluster and then collected the data. O-Leach enables the formation of a new method of cluster, leads to a long life and minimal energy consumption. Orphan nodes possess enough energy and seeks to be covered by the network. The principal novel contribution of the proposed work is O-LEACH protocol which provides coverage of the whole network with a minimum number of orphaned nodes and has a very high connectivity rates.As a result, the WSN application receives data from the entire network including orphan nodes. The proper functioning of the Application requires, therefore, management of intelligent resources present within each the network sensor. The simulation results show that O-LEACH performs better than LEACH in terms of coverage, connectivity rate, energy and scalability.

Keywords: WSNs; routing; LEACH; O-LEACH; Orphan nodes; sub-cluster; gateway; CH’

Procedia PDF Downloads 371
11494 Social Reforms and the Welfare State in America after the New Deal (1945-1969)

Authors: Aziza Tahar Djebbar

Abstract:

Throughout American history, many American presidents have tried to create new reforms to enhance the living conditions of the American citizens and promote their welfare. Among these reforms were those dealing with health care, education, as well as social security, which would facilitate accordingly the evolution of the American welfare state. After the New Deal, from 1945 to 1969, American presidents sought to carry out and enlarge the scope of the welfare state that emerged during the Roosevelt Administration by introducing new social reforms. Yet, there were some American presidents who succeeded, and there were some presidents who failed.The task of this research work is to depict the postwar period from 1945 to 1969. Some light will be shed on the main causes that led to the delay of many programs from 1945 to 1960. Further, the focus will be on the main factors that contributed to the reappearance of many social reforms and the dramatic expansion of the welfare state all along the 1960s.

Keywords: new deal, great society, medicaid, medicare, war on poverty, social reforms, welfare reforms

Procedia PDF Downloads 458
11493 Motivational Antecedents that Influenced a Higher Education Institution in the Philippines to Adopt Enterprise Architecture

Authors: Ma. Eliza Jijeth V. dela Cruz

Abstract:

Technology is a recent prodigy in people’s everyday life that has taken off. It infiltrated almost every aspect of one’s lives, changing how people work, how people learn and how people perceive things. Academic Institutions, just like other organizations, have deeply modified its strategies to integrate technology into the institutional vision and corporate strategy that has never been greater. Information and Communications Technology (ICT) continues to be recognized as a major factor in organizations realizing its aims and objectives. Consequently, ICT has an important role in the mobilization of an academic institution’s strategy to support the delivery of operational, strategic or transformational objectives. This ICT strategy should align the institution with the radical changes of the ICT world through the use of Enterprise Architecture (EA). Hence, EA’s objective is to optimize the islands of legacy processes to be integrated that is receptive to change and supportive of the delivery of the strategy. In this paper, the focus is to explore the motivational antecedents during the adoption of EA in a Higher Education Institution in the Philippines for its ICT strategic plan. The seven antecedents (viewpoint, stakeholders, human traits, vision, revolutionary innovation, techniques and change components) provide understanding into EA adoption and the antecedents that influences the process of EA adoption.

Keywords: Enterprise Architecture, Adoption, Antecedents, Higher Educational Institutions

Procedia PDF Downloads 112
11492 Fear of Gender-Based Crime and Women Empowerment: An Empirical Study among the Urban Residents of Bangladesh

Authors: Mohammad Ashraful Alam, Biro Judit

Abstract:

Fear of gender-based crime and fear of crime victimization for women is a major concern in the urban areas of Bangladesh. Based on the recent data from various human rights organizations and international literature the study found that gender-based crime especially sexual assault and rape are increasing in Bangladesh at a significant rate in comparison to other countries. The major focus of the study was to identify the relationship between fear of gender-based crime and women empowerment. To explore the fact the study followed the mixed methodological approach comprising with quantitative and qualitative methods and used secondary information from national and international sources. Corresponding global pictures the present study found that gender, age, complexion, social position, and ethnicity were more common factors of sexual assault and victimization in Bangladesh which lead to women become more fearful about crime victimization than men. Fear of gender-based crime traumatizes women which leads to withdrawal of their non-essential everyday works and some time from the essential works based on their social position, financial status, and social honor in the society. The increasing crime rate also increases the propensity to fear of criminal victimization, traumatization, and feeling of helplessness which make them vulnerable. The patriarchal culture and practices in Bangladesh based on religious culture and established social norms women always feel defenseless therefore they withdraw themselves from various social activities and own interest. Women who have already victimized feel more fear and become traumatized, and who do not victimize yet but know the severity of victimization from the media and others’ have the feeling of fear of crime. Women who find themselves as weak bonding and low networks with their neighbors and living for a short duration have a feeling of more fear and avoid visiting a certain place in a certain time and avoid some social activities. The study found the young women have more possibilities to become victimized through the feeling of fear of crime is higher among elderly women than young. Though women feel fear of all kinds of crime but usually all aged women are more fearful of sexual assault and rape than other violent crimes. Therefore, elderly women and another person in the family does not allow younger girls to go and involve outside activities to secure their family status. On the other hand, fear of crime in public transport is more common to all aged women at a higher level and sometimes they compromise their freedom, independence, financial opportunities, the job only to avoid the perceived threat, and save their social and cultural honor. The study also explores that fear of crime does not always depend on crime rate but the crime news, the severity of the crime, delay justice, the ineffectiveness of police, bail of criminals, corruption and political favoritism, etc. Finally, the study shows that the fear of gender-based crime and violence is working as a potential barrier to ensuring women's empowerment in Bangladesh.

Keywords: compromise personal freedom, fear of crime, fear of gender-based crime, fear of violent crime victimization, rape, sexual assaults, withdrawal from regular activities, women empowerment

Procedia PDF Downloads 136
11491 Social Network Analysis, Social Power in Water Co-Management (Case Study: Iran, Shemiranat, Jirood Village)

Authors: Fariba Ebrahimi, Mehdi Ghorbani, Ali Salajegheh

Abstract:

Comprehensively water management considers economic, environmental, technical and social and also sustainability of water resources for future generations. Grassland management implies cooperative approach and involves all stakeholders and also introduces issues to managers, decision and policy makers. Solving these issues needs integrated and system approach. According to the recognition of actors or key persons in necessary to apply cooperative management of Water. Therefore, based on stakeholder analysis and social network analysis can be used to demonstrate the most effective actors for environmental decisions. In this research, social powers according are specified to social network approach at Water utilizers’ level of Natural in Jirood catchment of Latian basin. In this paper, utilizers of water resources were recognized using field trips and then, trust and collaboration matrix produced using questionnaires. In the next step, degree centrality index were Examined. Finally, geometric position of each actor was illustrated in the network. The results of the research based on centrality index have a key role in recognition of cooperative management of Water in Jirood and also will help managers and planners of water in the case of recognition of social powers in order to organization and implementation of sustainable management of Water.

Keywords: social network analysis, water co-management, social power, centrality index, local stakeholders network, Jirood catchment

Procedia PDF Downloads 372
11490 Sexual Risk Behaviours of High School Students in an Urban Town of Cameroon

Authors: Elvis Enowbeyang Tarkang

Abstract:

Background: Since students in high schools in Cameroon fall within the age group hardest hit by HIV/AIDS, it is assumed that these students might be exposed to sexual risk behaviours. Sexual risk behaviours include engaging in unprotected sexual intercourse, early sexual debut, multiple sexual partners and coerced or forced sex, and these behaviours might predispose youth to HIV transmission. However, little has been explored on the sexual risk behaviours of high school learners in Cameroon. This study aimed at examining the sexual risk behaviours of high school students in an urban town of Cameroon. Method: A quantitative cross sectional design was adopted, using a self-administered questionnaire to collect data from a disproportional stratified simple random sample of 480 (240 male and 240 female) grade 10 to grade 12 students from two participating secondary school in Limbe in the Southwest region of Cameroon August 2014. Descriptive and Chi square statistics were calculated using statistical Package for Social Sciences (SPSS) version 20 software program at the level 0.05. Results: Majority of the respondents, 63.4% reported being sexually active, of whom only 33.2% used condoms consistently. Up to 37% of the sexually active respondents had multiple sexual partners in the past one year before the study, while 23% had multiple sexual partners during the study period. The mean age of first sex was 15.4 years. Among Christians, Pentecostals, 17 (58.6%) were more likely to have experienced sexual coercion than non-Pentecostals, 111 (42.2%) (p= 0.000). Christians, 41 (10.3%) were more likely to have been forced into first sex than Muslims, 0 (0.0%); while among the Christians, Pentecostals, 6 (15.0%) were more likely to have been forced into first sex than non-Pentecostals, 35 (10.9%) (p=0.004). Among the Christians, Pentecostals, 16 (66.7%) were more likely to have experienced sex by age 16 years than non-Pentecostals, 125 (64.1%) (p= 0.000). Students who lived in rented places, 32 (22.7%) were more likely to have had multiple sexual partners than those who lived in their parents’ houses, 35 (18.1%) (p= 0.000). Males, 36 (16.0%) were likely to have had multiple concurrent sexual partners than females, 14 (6.0%) (p=0.002). Students who used condoms consistently, 25 (33.3%) were more likely to have a higher perception of risk of contracting HIV than those who did not use condoms consistently, 38 (29.9%) (p=0.002). Students who lived in their parents’ houses, 35 (35.4%) were more likely to use condoms consistently during sex, than those who lived in rented places, 31 (29.8%) (p=0.021). Students who passed their examinations, 57 (30.9%) were more likely to have used condoms consistently than those with low academic profiles, 24 (27.9%) (p= 0.034). Conclusions and Recommendations: Gender, lack of parental control, religion, academic profile, poverty, place of residence and perception of risk of HIV infection were the main factors associated with sexual risk behaviours among students in urban Cameroon. The findings indicate that sexual risk behaviours exist among high school students in Limbe urban town of Cameroon. There is need for campaigns and interventions to bring about sexual behaviour change.

Keywords: Cameroon, high school students, HIV/AIDS, Limbe urban town, sexual risk behaviours

Procedia PDF Downloads 331
11489 Perception of Value Affecting Engagement Through Online Audio Communication

Authors: Apipol Penkitti

Abstract:

The new normal or a new way of life stemmed from the COVID-19 outbreak, gave rise to a new form of social media: audio-based social platforms (ABSPs), known as Clubhouse, Twitter space, and Facebook live audio room. These platforms, on which audio-based communication is featured, became popular in a short span of time. The objective of the research study is to understand ABSPs users’ behaviors in Thailand. The study, in which functional attitude theory, uses and gratifications theory, and social influence theory are referred to, is conducted through consumer perceived utilitarian, hedonic, and social value that affect engagement. This research study is mixed method paradigm, utilizing Model of Triangulation as its framework. The data acquisition is proceeded through questionnaires from a sample of 384 male, female and LGBTQA+ individuals aged 25 - 34 who, from various occupations, have used audio-based social platform applications. This research study employs the structural equation modeling to analyze the relationships between variables, and it uses the semi - structured interviewing to comprehend the rationality of the variables in the study. The study found that hedonic value directly affects engagement.

Keywords: audio based social platform, engagement, hedonic, perceived value, social, utilitarian

Procedia PDF Downloads 126
11488 Sustainability in Higher Education: A Case of Transition Management from a Private University in Turkey (Ongoing Study)

Authors: Ayse Collins

Abstract:

The Agenda 2030 puts Higher Education Institutions (HEIs) in the situation where they should emphasize ways to promote sustainability accordingly. However, it is still unclear: a) how sustainability is understood, and b) which actions have been taken in both discourse and practice by HEIs regarding the three pillars of sustainability, society, environment, and economy. There are models of sustainable universities developed by different authors from different countries; For Example, The Global Reporting Initiative (GRI) methodology which offers a variety of indicators to diagnose performance. However, these models have never been developed for universities in particular. Any model, in this sense, cannot be completed adequately without defining the appropriate tools to measure, analyze and control the performance of initiatives. There is a need to conduct researches in different universities from different countries to understand where we stand in terms of sustainable higher education. Therefore, this study aims at exploring the actions taken by a university in Ankara, Turkey, since Agenda 2030 should consider localizing its objectives and targets according to a certain geography. This university just announced 2021-2022 as “Sustainability Year.” Therefore, this research is a multi-methodology longitudinal study and uses the theoretical framework of the organization and transition management (TM). It is designed to examine the activities as being strategic, tactical, operational, and reflexive in nature and covers the six main aspects: academic community, administrative staff, operations and services, teaching, research, and extension. The preliminary research will answer the role of the top university governance, perception of the stakeholders (students, instructors, administrative and support staff) regarding sustainability, and the level of achievement at the mid-evaluation and final, end of year evaluation. TM Theory is a multi-scale, multi-actor, process-oriented approach with the analytical framework to explore and promote change in social systems. Therefore, the stages and respective methodology for collecting data in this research is: Pre-development Stage: a) semi-structured interviews with university governance, c) open-ended survey with faculty, students, and administrative staff d) Semi-structured interviews with support staff, and e) analysis of current secondary data for sustainability. Take-off Stage: a) semi-structured interviews with university governance, faculty, students, administrative and support staff, b) analysis of secondary data. Breakthrough stabilization a) survey with all stakeholders at the university, b) secondary data analysis by using selected indicators for the first sustainability report for universities The findings from the predevelopment stage highlight how stakeholders, coming from different faculties, different disciplines with different identities and characteristics, face the sustainability challenge differently. Though similar sustainable development goals ((social, environmental, and economic) are set in the institution, there are differences across disciplines and among different stakeholders, which need to be considered to reach the optimum goal. It is believed that the results will help changes in HEIs organizational culture to embed sustainability values in their strategic planning, academic and managerial work by putting enough time and resources to be successful in coping with sustainability.

Keywords: higher education, sustainability, sustainability auditing, transition management

Procedia PDF Downloads 108
11487 Statistically Accurate Synthetic Data Generation for Enhanced Traffic Predictive Modeling Using Generative Adversarial Networks and Long Short-Term Memory

Authors: Srinivas Peri, Siva Abhishek Sirivella, Tejaswini Kallakuri, Uzair Ahmad

Abstract:

Effective traffic management and infrastructure planning are crucial for the development of smart cities and intelligent transportation systems. This study addresses the challenge of data scarcity by generating realistic synthetic traffic data using the PeMS-Bay dataset, improving the accuracy and reliability of predictive modeling. Advanced synthetic data generation techniques, including TimeGAN, GaussianCopula, and PAR Synthesizer, are employed to produce synthetic data that replicates the statistical and structural characteristics of real-world traffic. Future integration of Spatial-Temporal Generative Adversarial Networks (ST-GAN) is planned to capture both spatial and temporal correlations, further improving data quality and realism. The performance of each synthetic data generation model is evaluated against real-world data to identify the best models for accurately replicating traffic patterns. Long Short-Term Memory (LSTM) networks are utilized to model and predict complex temporal dependencies within traffic patterns. This comprehensive approach aims to pinpoint areas with low vehicle counts, uncover underlying traffic issues, and inform targeted infrastructure interventions. By combining GAN-based synthetic data generation with LSTM-based traffic modeling, this study supports data-driven decision-making that enhances urban mobility, safety, and the overall efficiency of city planning initiatives.

Keywords: GAN, long short-term memory, synthetic data generation, traffic management

Procedia PDF Downloads 26
11486 Investigation of Preschool Children's Mathematics Concept Acquisition in Terms of Different Variables

Authors: Hilal Karakuş, Berrin Akman

Abstract:

Preschool years are considered as critical years because of shaping the future lives of individuals. All of the knowledge, skills, and concepts are acquired during this period. Also, basis of academic skills is based on this period. As all of the developmental areas are the fastest in that period, the basis of mathematics education should be given in this period, too. Mathematics is seen as a difficult and abstract course by the most people. Therefore, the enjoyable side of mathematics should be presented in a concrete way in this period to avoid any bias of children for mathematics. This study is conducted to examine mathematics concept acquisition of children in terms of different variables. Screening model is used in this study which is carried out in a quantity way. The study group of this research consists of total 300 children, selected from each class randomly in groups of five, who are from public and private preschools in Çankaya, which is district of Ankara, in 2014-2015 academic year and attending children in the nursery classes and preschool institutions are connected to the Ministry of National Education. The study group of the research was determined by stage sampling method. The schools, which formed study group, are chosen by easy sampling method and the children are chosen by simple random method. Research data were collected with Bracken Basic Concept Scale–Revised Form and Child’s Personal Information Form generated by the researcher in order to get information about children and their families. Bracken Basic Concept Scale-Revised Form consists of 11 sub-dimensions (color, letter, number, size, shape, comparison, direction-location, and quantity, individual and social awareness, building- material) and 307 items. Subtests related to the mathematics were used in this research. In the “Child Individual Information Form” there are items containing demographic information as followings: age of children, gender of children, attending preschools educational intuitions for children, school attendance, mother’s and father’s education levels. At the result of the study, while it was found that children’s mathematics skills differ from age, state of attending any preschool educational intuitions , time of attending any preschool educational intuitions, level of education of their mothers and their fathers; it was found that it does not differ by the gender and type of school they attend.

Keywords: preschool education, preschool period children, mathematics education, mathematics concept acquisitions

Procedia PDF Downloads 350
11485 The Effectiveness of Cognitive Behavioural Intervention in Alleviating Social Avoidance for Blind Students

Authors: Mohamed M. Elsherbiny

Abstract:

Social Avoidance is one of the most important problems that face a good number of disabled students. It results from the negative attitudes of non-disabled students, teachers and others. Some of the past research has shown that non-disabled individuals hold negative attitudes toward persons with disabilities. The present study aims to alleviate Social Avoidance by applying the Cognitive Behavioral Intervention. 24 Blind students aged 19–24 (university students) were randomly chosen we compared an experimental group (consisted of 12 students) who went through the intervention program, with a control group (12 students also) who did not go through such intervention. We used the Social Avoidance and Distress Scale (SADS) to assess social anxiety and distress behavior. The author used many techniques of cognitive behavioral intervention such as modeling, cognitive restructuring, extension, contingency contracts, self-monitoring, assertiveness training, role play, encouragement and others. Statistically, T-test was employed to test the research hypothesis. Result showed that there is a significance difference between the experimental group and the control group after the intervention and also at the follow up stages of the Social Avoidance and Distress Scale. Also for the experimental group, there is a significance difference before the intervention and the follow up stages for the scale. Results showed that, there is a decrease in social avoidance. Accordingly, cognitive behavioral intervention program was successful in decreasing social avoidance for blind students.

Keywords: social avoidance, cognitive behavioral intervention, blind disability, disability

Procedia PDF Downloads 409
11484 Personality Traits of Students Effecting Entrepreneurial Intention

Authors: Muhammad Ali, Aamir Sohail, Umair Malik

Abstract:

Research in entrepreneurship has gained much attention in current academic environment. Youngsters are taking interest to start their own business in spite of risk matter. The objective of the study is to explain how various personality traits (personal attitude, locus of control, instrumental readiness and perceived behavioral control) are affecting entrepreneurial intention of students. The theory of planned behavior supports out study which explains that personal attractiveness, social norms and feasibility are the main factors that affect intentions of an individual. The sample data of 120 is collected from graduating batch of three reputed universities of Islamabad through questionnaires. Our results support the hypothesis that personality traits positively influence the entrepreneurial intention. We conclude from the study that many graduating students are willing to start a new venture, but most of them are likely to do a job in their respective fields. Risk factor also exists in their minds because in our country most people are risk-averse and they do not want to lose their money in case of loss.

Keywords: entrepreneurship, instrumental readiness, locus of control, personal attitude

Procedia PDF Downloads 202
11483 Leadership Strategies in Social Enterprises through Reverse Accountability: Analysis of Social Control for Pragmatic Organizational Design

Authors: Ananya Rajagopal

Abstract:

The study is based on an analysis of qualitative data used to analyze the business performance of entrepreneurs in emerging markets based on core variables such as collective leadership in reference to social entrepreneurship and reverse accountability attributes of stakeholders. In-depth interviews were conducted with 25 emerging enterprises within Mexico across five industrial segments. The study has been conducted focusing on five major research questions, which helped in developing the grounded theory related to reverser accountability. The results of the study revealed that the traditional entrepreneurship model based on an individualistic leadership style is being replaced by a collective leadership model. The study focuses on the leadership styles within social enterprises aimed at enhancing managerial capabilities and competencies, stakeholder values, and entrepreneurial growth. The theoretical motivation of this study has been derived from stakeholder theory and agency theory.

Keywords: reverse accountability, social enterprises, collective leadership, grounded theory, social governance

Procedia PDF Downloads 121
11482 Reading and Writing Memories in Artificial and Human Reasoning

Authors: Ian O'Loughlin

Abstract:

Memory networks aim to integrate some of the recent successes in machine learning with a dynamic memory base that can be updated and deployed in artificial reasoning tasks. These models involve training networks to identify, update, and operate over stored elements in a large memory array in order, for example, to ably perform question and answer tasks parsing real-world and simulated discourses. This family of approaches still faces numerous challenges: the performance of these network models in simulated domains remains considerably better than in open, real-world domains, wide-context cues remain elusive in parsing words and sentences, and even moderately complex sentence structures remain problematic. This innovation, employing an array of stored and updatable ‘memory’ elements over which the system operates as it parses text input and develops responses to questions, is a compelling one for at least two reasons: first, it addresses one of the difficulties that standard machine learning techniques face, by providing a way to store a large bank of facts, offering a way forward for the kinds of long-term reasoning that, for example, recurrent neural networks trained on a corpus have difficulty performing. Second, the addition of a stored long-term memory component in artificial reasoning seems psychologically plausible; human reasoning appears replete with invocations of long-term memory, and the stored but dynamic elements in the arrays of memory networks are deeply reminiscent of the way that human memory is readily and often characterized. However, this apparent psychological plausibility is belied by a recent turn in the study of human memory in cognitive science. In recent years, the very notion that there is a stored element which enables remembering, however dynamic or reconstructive it may be, has come under deep suspicion. In the wake of constructive memory studies, amnesia and impairment studies, and studies of implicit memory—as well as following considerations from the cognitive neuroscience of memory and conceptual analyses from the philosophy of mind and cognitive science—researchers are now rejecting storage and retrieval, even in principle, and instead seeking and developing models of human memory wherein plasticity and dynamics are the rule rather than the exception. In these models, storage is entirely avoided by modeling memory using a recurrent neural network designed to fit a preconceived energy function that attains zero values only for desired memory patterns, so that these patterns are the sole stable equilibrium points in the attractor network. So although the array of long-term memory elements in memory networks seem psychologically appropriate for reasoning systems, they may actually be incurring difficulties that are theoretically analogous to those that older, storage-based models of human memory have demonstrated. The kind of emergent stability found in the attractor network models more closely fits our best understanding of human long-term memory than do the memory network arrays, despite appearances to the contrary.

Keywords: artificial reasoning, human memory, machine learning, neural networks

Procedia PDF Downloads 271
11481 Designing Disaster Resilience Research in Partnership with an Indigenous Community

Authors: Suzanne Phibbs, Christine Kenney, Robyn Richardson

Abstract:

The Sendai Framework for Disaster Risk Reduction called for the inclusion of indigenous people in the design and implementation of all hazard policies, plans, and standards. Ensuring that indigenous knowledge practices were included alongside scientific knowledge about disaster risk was also a key priority. Indigenous communities have specific knowledge about climate and natural hazard risk that has been developed over an extended period of time. However, research within indigenous communities can be fraught with issues such as power imbalances between the researcher and researched, the privileging of researcher agendas over community aspirations, as well as appropriation and/or inappropriate use of indigenous knowledge. This paper documents the process of working alongside a Māori community to develop a successful community-led research project. Research Design: This case study documents the development of a qualitative community-led participatory project. The community research project utilizes a kaupapa Māori research methodology which draws upon Māori research principles and concepts in order to generate knowledge about Māori resilience. The research addresses a significant gap in the disaster research literature relating to indigenous knowledge about collective hazard mitigation practices as well as resilience in rurally isolated indigenous communities. The research was designed in partnership with the Ngāti Raukawa Northern Marae Collective as well as Ngā Wairiki Ngāti Apa (a group of Māori sub-tribes who are located in the same region) and will be conducted by Māori researchers utilizing Māori values and cultural practices. The research project aims and objectives, for example, are based on themes that were identified as important to the Māori community research partners. The research methodology and methods were also negotiated with and approved by the community. Kaumātua (Māori elders) provided cultural and ethical guidance over the proposed research process and will continue to provide oversight over the conduct of the research. Purposive participant recruitment will be facilitated with support from local Māori community research partners, utilizing collective marae networks and snowballing methods. It is envisaged that Māori participants’ knowledge, experiences and views will be explored using face-to-face communication research methods such as workshops, focus groups and/or semi-structured interviews. Interviews or focus groups may be held in English and/or Te Reo (Māori language) to enhance knowledge capture. Analysis, knowledge dissemination, and co-authorship of publications will be negotiated with the Māori community research partners. Māori knowledge shared during the research will constitute participants’ intellectual property. New knowledge, theory, frameworks, and practices developed by the research will be co-owned by Māori, the researchers, and the host academic institution. Conclusion: An emphasis on indigenous knowledge systems within the Sendai Framework for Disaster Risk Reduction risks the appropriation and misuse of indigenous experiences of disaster risk identification, mitigation, and response. The research protocol underpinning this project provides an exemplar of collaborative partnership in the development and implementation of an indigenous project that has relevance to policymakers, academic researchers, other regions with indigenous communities and/or local disaster risk reduction knowledge practices.

Keywords: community resilience, indigenous disaster risk reduction, Maori, research methods

Procedia PDF Downloads 124
11480 Benefits of Social Justice Pedagogy and Ecofeminist Discourse for Engineering Education

Authors: Hollie M. Lewis

Abstract:

A large body of corroborating research provides evidence that traditional undergraduate engineering education fails to provide students with a role and identity that requires social concern and moral reasoning. Engineering students demonstrate a low level of engagement with social and political contexts, which further declines over the course of engineering education. This detachment is thought to stem from beliefs that the role of the engineer is purely to design machines, systems, and structures. In effect, engineers objectify the world. The purpose of this paper is to provide an ecofeminist critique of engineering education and pose the benefits of social justice pedagogies incorporating ecofeminist discourse. The challenges currently facing the world stem from anthropocentric industrialization, an agenda that is historically absent of Environmental, Feminist, People of Color, and Indigenous voices. A future in which the global collective achieves its Sustainable Development Goals requires its engineers to have a solid understanding of the broader social and political contexts in which they manage projects. Engineering education must convey the influence of the professional role of engineer and encourage the practice of critical reflection and social perspective-taking, priming students with the skills to engage with varying perspectives and discourses. There will be discussed the facets of social justice pedagogies that aid students in surpassing threshold concepts in social justice.

Keywords: feminism in engineering, sustainable development, engineering education, social justice pedagogies

Procedia PDF Downloads 60
11479 Privacy-Preserving Model for Social Network Sites to Prevent Unwanted Information Diffusion

Authors: Sanaz Kavianpour, Zuraini Ismail, Bharanidharan Shanmugam

Abstract:

Social Network Sites (SNSs) can be served as an invaluable platform to transfer the information across a large number of individuals. A substantial component of communicating and managing information is to identify which individual will influence others in propagating information and also whether dissemination of information in the absence of social signals about that information will be occurred or not. Classifying the final audience of social data is difficult as controlling the social contexts which transfers among individuals are not completely possible. Hence, undesirable information diffusion to an unauthorized individual on SNSs can threaten individuals’ privacy. This paper highlights the information diffusion in SNSs and moreover it emphasizes the most significant privacy issues to individuals of SNSs. The goal of this paper is to propose a privacy-preserving model that has urgent regards with individuals’ data in order to control availability of data and improve privacy by providing access to the data for an appropriate third parties without compromising the advantages of information sharing through SNSs.

Keywords: anonymization algorithm, classification algorithm, information diffusion, privacy, social network sites

Procedia PDF Downloads 321
11478 Neural Networks and Genetic Algorithms Approach for Word Correction and Prediction

Authors: Rodrigo S. Fonseca, Antônio C. P. Veiga

Abstract:

Aiming at helping people with some movement limitation that makes typing and communication difficult, there is a need to customize an assistive tool with a learning environment that helps the user in order to optimize text input, identifying the error and providing the correction and possibilities of choice in the Portuguese language. The work presents an Orthographic and Grammatical System that can be incorporated into writing environments, improving and facilitating the use of an alphanumeric keyboard, using a prototype built using a genetic algorithm in addition to carrying out the prediction, which can occur based on the quantity and position of the inserted letters and even placement in the sentence, ensuring the sequence of ideas using a Long Short Term Memory (LSTM) neural network. The prototype optimizes data entry, being a component of assistive technology for the textual formulation, detecting errors, seeking solutions and informing the user of accurate predictions quickly and effectively through machine learning.

Keywords: genetic algorithm, neural networks, word prediction, machine learning

Procedia PDF Downloads 194
11477 Social Entrepreneurship and Organizational Effectiveness: Evidence from Malaysia

Authors: Fakhrul Anwar Zainol, Wan Norhayate Wan Daud, Zulhamri Abdullah, Mohd Rafi Yaacob

Abstract:

Malaysia has made great strides in eradicating poverty. Based on the latest figures of the 9th Malaysian Plan Mid-term review, the overall hardcore poverty percentage is down to 0.7%, and only 3.6% of the Malaysian population is living below the overall poverty line. While in the past significant efforts had been taken by the government through various developmental project to alleviate poverty in rural area had proven successful. Today, urban poverty in Malaysia is an increasingly visible phenomenon due to rural-urban migration and the natural population growth in urban areas. Given the changing dimensions and emerging new forms of poverty as a result of unwanted effects of development there is a dire need to re-examine and re-visit urban poverty in Malaysia. Based on the leaders’ perceptions, this study affirmed that social entrepreneurship organizations in Malaysia have try to overcome the urban poverty through social entrepreneurship. The new framework has been developed from the results of this study. It shows that social entrepreneurship contributed to the organizational effectiveness. This result indicates that it is important to have social entrepreneurship in order to increase the socio economy and achieve the organization’s mission. Therefore, this study has proven that social entrepreneurship is beneficial to the Malaysian.

Keywords: Social Entrepreneurship, Organizational Effectiveness, Urban Poverty, Malaysia.

Procedia PDF Downloads 507
11476 From Medusa to #MeToo: Different Discourses on Sexual Violence with Particular Reference to the Situation in Serbia

Authors: Jelena Riznić

Abstract:

Sexual violence is a social fact that is both ubiquitous and invisible. From the myth of Medusa and Lucretia, through legends about sexual violence in war conflicts, to Hollywood films and other productions — sexual violence exists as a motive, implicitly or explicitly. Many Hollywood films contain a scene of rape, and the media is increasingly reporting on cases of sexual violence, often not following the guidelines for sensitized and ethical reporting. On the other hand, sexual violence remains an invisible phenomenon if we are talking from the perspective of the survivors. Only the wave of women's testimonies that flooded social networks after the #MeToo campaign in 2017 pointed to the prevalence and to the existing ideas about sexual violence that persist at the level of myths in society, but also through formal norms in the hearing of justice systems. The problem is also in the way rape is defined in the criminal codes of different countries, and all of this affects the reproduction of sexual violence. Precisely because it is a deeply intimate experience of violence, but also a structural problem; on the other hand, understanding sexual violence requires sociological imagination. Accordingly, the subject of this paper is the presentation and analysis of various discourses on sexual violence throughout history — pre/anti-feminist, feminist and criminal law, with particular reference to the situation in Serbia. The paper uses a critical review and comparative analysis of various sources on sexual violence, as well as an analysis of the impact of these sources on the modern legal framework that regulates sexual violence. Research has shown that despite feminist contributions, myths about sexual violence persist and influence the treatment of women who have survived violence in criminal systems and society in general.

Keywords: sexual violence, gender-based violence, MeToo campaign, feminism, Serbia

Procedia PDF Downloads 85