Search results for: Piaget's theory
2431 Maintaining the Tension between the Classic Seduction Theory and the Role of Unconscious Fantasies
Authors: Galit Harel
Abstract:
This article describes the long-term psychoanalytic psychotherapy of a young woman who had experienced trauma during her childhood. The details of the trauma were unknown, as all memory of the trauma had been repressed. Past trauma is analyzable through a prism of transference, dreaming and dreams, mental states, and thinking processes that offer an opportunity to explore and analyze the influence of both reality and fantasy on the patient. The presented case describes a therapeutic process that strives to discover hidden meanings through the unconscious system and illustrates the movement from unconscious to conscious during exploration of the patient’s personal trauma in treatment. The author discusses the importance of classical and contemporary psychoanalytic models of childhood sexual trauma through the discovery of manifest and latent content, unconscious fantasies, and actual events of trauma. It is suggested that the complexity of trauma is clarified by the tension between these models and by the inclusion of aspects of both of them for a complete understanding.Keywords: dreams, psychoanalytic psychotherapy, thinking processes, transference, trauma
Procedia PDF Downloads 892430 Quality of the Ruin Probabilities Approximation Using the Regenerative Processes Approach regarding to Large Claims
Authors: Safia Hocine, Djamil Aïssani
Abstract:
Risk models, recently studied in the literature, are becoming increasingly complex. It is rare to find explicit analytical relations to calculate the ruin probability. Indeed, the stability issue occurs naturally in ruin theory, when parameters in risk cannot be estimated than with uncertainty. However, in most cases, there are no explicit formulas for the ruin probability. Hence, the interest to obtain explicit stability bounds for these probabilities in different risk models. In this paper, we interest to the stability bounds of the univariate classical risk model established using the regenerative processes approach. By adopting an algorithmic approach, we implement this approximation and determine numerically the bounds of ruin probability in the case of large claims (heavy-tailed distribution).Keywords: heavy-tailed distribution, large claims, regenerative process, risk model, ruin probability, stability
Procedia PDF Downloads 3622429 City Management Transformation: Urban Renewal Empowered by Chinese City Culture in the New Era
Abstract:
China's urbanization rate has exceeded 60%, and in the long term, China's urbanization development will enter a new stage of transformation and development focusing on quality improvement, and urban renewal has become an important part of China's urban development. In the past, many cities in the process of renewal in order to maximize the pursuit of economic interests, large-scale demolition of the old to build new, accelerating the disappearance of regional history and culture, aggravating the homogenization of the city. With the changes in the economic and social development environment, urban renewal requires a more comprehensive perspective of action. Starting from the perspective of the core of urban management theory, this paper is oriented to culture-enabled urban renewal and takes the urban renewal of Changbin Road Area in Yuzhong District of Chongqing as an example to expound the problems and renewal strategies in its urban renewal, so as to provide references for the urban renewal of other Chinese cities in the new period.Keywords: Urban management, Urban culture, Urban renewal in mountainous areas, urban renewal
Procedia PDF Downloads 942428 A Mimetic Textuality in Robert Frost's 'Nothing Gold Can Stay'
Authors: Kurt S. Candilas
Abstract:
This study is a critical analysis of the work of Robert Frost, 'Nothing Gold Can Stay'. It subjects the literary piece into a qualitative analysis using the critical theory of mimesis. In effect, this study is proposed to find out and shed light on the mimetic feature of the poem’s textuality. Generally, it aims to analyze the poem’s deeper meaning in the context of the reality of life from birth to death. For the most part, this critical analysis discerns, investigates, and highlights the features which present the imitation of life in detail and from a deeper view. Based on the result of analysis, it shows that Frost has portrayed the cycle of life from birth to midst life as about proving oneself to others as far as achievements and accomplishments are concerned; secondly, at some point of one’s life, successes and achievements are just one’s perfect signature of living. As Frost discloses his poem, his message of the reality of life from birth to death is clear enough, that nothing is going to last forever.Keywords: Nothing Gold Can Stay, mimesis, birth, death
Procedia PDF Downloads 4692427 Systematic Process for Constructing an Augmented Reality Display Platform
Authors: Cheng Chieh Hsu, Alfred Chen, Yu-Pin Ma, Meng-Jie Lin, Fu Pai Chiu, Yi-Yan Sie
Abstract:
In this study, it is attempted to construct an augmented reality display platform (ARDP), and its objectives are two facets, i.e. 1) providing a creative display mode for museums/historical heritages and 2) providing a benchmark for human-computer interaction professionals to build an augmented reality display platform. A general augmented reality theory has been explored in the very beginning and afterwards a systematic process model is proposed. There are three major core tasks to be done for the platform, i.e. 1) constructing the physical interactive table, 2) designing the media, and 3) designing the media carrier. In order to describe how the platform manipulates, the authors have introduced Tainan Confucius Temple, a cultural heritage in Taiwan, as a case study. As a result, a systematic process with thirteen steps has been developed and it aims at providing a rational method for constructing the platform.Keywords: human-computer interaction, media, media carrier, augmented reality display platform
Procedia PDF Downloads 4142426 Model-Independent Price Bounds for the Swiss Re Mortality Bond 2003
Authors: Raj Kumari Bahl, Sotirios Sabanis
Abstract:
In this paper, we are concerned with the valuation of the first Catastrophic Mortality Bond that was launched in the market namely the Swiss Re Mortality Bond 2003. This bond encapsulates the behavior of a well-defined mortality index to generate payoffs for the bondholders. Pricing this bond is a challenging task. We adapt the payoff of the terminal principal of the bond in terms of the payoff of an Asian put option and present an approach to derive model-independent bounds exploiting comonotonic theory. We invoke Jensen’s inequality for the computation of lower bounds and employ Lagrange optimization technique to achieve the upper bound. The success of these bounds is based on the availability of compatible European mortality options in the market. We carry out Monte Carlo simulations to estimate the bond price and illustrate the strength of these bounds across a variety of models. The fact that our bounds are model-independent is a crucial breakthrough in the pricing of catastrophic mortality bonds.Keywords: mortality bond, Swiss Re Bond, mortality index, comonotonicity
Procedia PDF Downloads 2482425 Big Data Analytics and Data Security in the Cloud via Fully Homomorphic Encryption
Authors: Waziri Victor Onomza, John K. Alhassan, Idris Ismaila, Noel Dogonyaro Moses
Abstract:
This paper describes the problem of building secure computational services for encrypted information in the Cloud Computing without decrypting the encrypted data; therefore, it meets the yearning of computational encryption algorithmic aspiration model that could enhance the security of big data for privacy, confidentiality, availability of the users. The cryptographic model applied for the computational process of the encrypted data is the Fully Homomorphic Encryption Scheme. We contribute theoretical presentations in high-level computational processes that are based on number theory and algebra that can easily be integrated and leveraged in the Cloud computing with detail theoretic mathematical concepts to the fully homomorphic encryption models. This contribution enhances the full implementation of big data analytics based cryptographic security algorithm.Keywords: big data analytics, security, privacy, bootstrapping, homomorphic, homomorphic encryption scheme
Procedia PDF Downloads 3762424 The Impact of Basic TRIZ Training on Psychological Flexibility among University Students
Authors: Bakr M. Saeid
Abstract:
Psychological flexibility is a basic ability that allows people to adapt to a changing, difficult world. TRIZ is a Theory of Solving Inventive Problems that has many applications in both science & technology and creativity development; this research aimed to investigate the impact of basic TRIZ training on psychological flexibility among university students. The research sample included (30) university students divided into two groups: experimental group (n=15) and control group (n=15). The Psychological Flexibility Questionnaire (PFQ) was conducted in the pre-test and post-test on the experimental and control group, as the study treatment was applied to the experimental group only. Data were analyzed statistically by the Mann-Whitney test and Wilcoxon z test; results showed the effectiveness of the TRIZ training program on the development of psychological flexibility and its five factors. Results were interpreted, recommendations were presented.Keywords: psychological flexibility, TRIZ, positive perception of change, self as flexible and innovative, perception of reality
Procedia PDF Downloads 1582423 Glossematics and Textual Structure
Authors: Abdelhadi Nadjer
Abstract:
The structure of the text to the systemic school -(glossématique-Helmslev). At the beginning of the note we have a cursory look around the concepts of general linguistics The science that studies scientific study of human language based on the description and preview the facts away from the trend of education than we gave a detailed overview the founder of systemic school and most important customers and more methods and curriculum theory and analysis they extend to all humanities, practical action each offset by a theoretical and the procedure can be analyzed through the elements that pose as another method we talked to its links with other language schools where they are based on the sharp criticism of the language before and deflected into consideration for the field of language and its erection has outside or language network and its participation in the actions (non-linguistic) and after that we started our Valglosamatik analytical structure of the text is ejected text terminal or all of the words to was put for expression. This text Negotiable divided into types in turn are divided into classes and class should not be carrying a contradiction and be inclusive. It is on the same materials as described relationships that combine language and seeks to describe their relations and identified.Keywords: text, language schools, linguistics, human language
Procedia PDF Downloads 4572422 Contracting Strategies to Foster Industrial Symbiosis Implementation
Authors: Robin Molinier
Abstract:
Industrial symbiosis (I.S) deals with the exchange of waste materials, fatal energy and utilities as resources for production. While it brings environmental benefits from resource conservation its economic profitability is one of the main barriers to its implementation. I.S involves several actors with their own objectives and resources so that each actor must be satisfied by ex-ante arrangements to commit toward investments and transactions. Regarding I.S Transaction cost economics helps to identify hybrid forms of governance for transactions governance due to I.S projects specificities induced by the need for customization (asset specificity, non-homogeneity). Thus we propose a framework to analyze the best contractual practices tailored to address I.S specific risks that we identified as threefold (load profiles and quality mismatch, value fluctuations). Schemes from cooperative game theory and contracting management are integrated to analyze value flows between actors. Contractual guidelines are then proposed to address the identified risks and to split the value for a set of I.S archetypes drawn from actual experiences.Keywords: contracts, economics, industrial symbiosis, risks
Procedia PDF Downloads 2072421 Analysis and Prediction of the Behavior of the Landslide at Ain El Hammam, Algeria Based on the Second Order Work Criterion
Authors: Zerarka Hizia, Akchiche Mustapha, Prunier Florent
Abstract:
The landslide of Ain El Hammam (AEH) is characterized by a complex geology and a high hydrogeology hazard. AEH's perpetual reactivation compels us to look closely at its triggers and to better understand the mechanisms of its evolution in mass and in depth. This study builds a numerical model to simulate the influencing factors such as precipitation, non-saturation, and pore pressure fluctuations, using Plaxis software. For a finer analysis of instabilities, we use Hill's criterion, based on the sign of the second order work, which is the most appropriate material stability criterion for non-associated elastoplastic materials. The results of this type of calculation allow us, in theory, to predict the shape and position of the slip surface(s) which are liable to ground movements of the slope, before reaching the rupture given by the plastic limit of Mohr Coulomb. To validate the numerical model, an analysis of inclinometer measures is performed to confirm the direction of movement and kinematic of the sliding mechanism of AEH’s slope.Keywords: landslide, second order work, precipitation, inclinometers
Procedia PDF Downloads 1772420 Globalisation and Diplomacy: How Can Small States Improve the Practice of Diplomacy to Secure Their Foreign Policy Objectives?
Authors: H. M. Ross-McAlpine
Abstract:
Much of what is written on diplomacy, globalization and the global economy addresses the changing nature of relationships between major powers. While the most dramatic and influential changes have resulted from these developing relationships the world is not, on deeper inspection, governed neatly by major powers. Due to advances in technology, the shifting balance of power and a changing geopolitical order, small states have the ability to exercise a greater influence than ever before. Increasingly interdependent and ever complex, our world is too delicate to be handled by a mighty few. The pressure of global change requires small states to adapt their diplomatic practices and diversify their strategic alliances and relationships. The nature and practice of diplomacy must be re-evaluated in light of the pressures resulting from globalization. This research examines: how small states can best secure their foreign policy objectives? Small state theory is used as a foundation for exploring the case study of New Zealand. The research draws on secondary sources to evaluate the existing theory in relation to modern practices of diplomacy. As New Zealand lacks the required economic and military power to play an active, influential role in international affairs what strategies are used to exert influence? Furthermore, New Zealand lies in a remote corner of the Pacific and is geographically isolated from its nearest neighbors how does this affect security and trade priorities? The findings note a significant shift since the 1970’s in New Zealand’s diplomatic relations. This shift is arguably a direct result of globalization, regionalism and a growing independence from the traditional bi-lateral relationships. The need to source predictable trade, investment and technology are an essential driving force for New Zealand’s diplomatic relations. A lack of hard power aligns New Zealand’s prosperity with a secure, rules-based international system that increases the likelihood of a stable and secure global order. New Zealand’s diplomacy and prosperity has been intrinsically reliant on its reputation. A vital component of New Zealand’s diplomacy is preserving a reputation for integrity and global responsibility. It is the use of this soft power that facilitates the influence that New Zealand enjoys on the world stage. To weave a comprehensive network of successful diplomatic relationships, New Zealand must maintain a reputation of international credibility. Globalization has substantially influenced the practice of diplomacy for New Zealand. The current world order places economic and military might in the hands of a few, subsequently requiring smaller states to use other means for securing their interests. There are clear strategies evident in New Zealand’s diplomacy practice that draw attention to how other smaller states might best secure their foreign policy objectives. While these findings are limited, as with all case study research, there is value in applying the findings to other small states struggling to secure their interests in the wake of rapid globalization.Keywords: diplomacy, foreign policy, globalisation, small state
Procedia PDF Downloads 3952419 Factors Determining the Purchasing Intentions towards Online Shopping: An Evidence from Twin Cities of Pakistan
Authors: Muhammad Waiz, Rana Maruf Tahir, Fatima Javaid
Abstract:
Technology in the recent times is available for everyone in the world that no one is left behind. After getting technology into our daily routine, there is a need to study the different factors regarding online shopping. This study examines the impact of online reviews, mobile shopping and computer literacy on online purchasing intention. The sample size was 200 from which 167 complete questionnaires were collected from students and employees of twin cities. SPSS programming software was used to analyze the impact of different factors on purchasing intention. The results of this study showed that those websites which have good ratings and have online shopping application will attract more customers towards them whereas the results showed that the computer literacy has no impact on online purchasing intention. Findings may help for those who want to increase their sales or to start a new online business. Future research, limitations, and implications are discussed.Keywords: computer literacy, mobile shopping, online purchase intention, online reviews, theory of planned behavior
Procedia PDF Downloads 2252418 2D RF ICP Torch Modelling with Fluid Plasma
Authors: Mokhtar Labiod, Nabil Ikhlef, Keltoum Bouherine, Olivier Leroy
Abstract:
A numerical model for the radio-frequency (RF) Argon discharge chamber is developed to simulate the low pressure low temperature inductively coupled plasma. This model will be of fundamental importance in the design of the plasma magnetic control system. Electric and magnetic fields inside the discharge chamber are evaluated by solving a magnetic vector potential equation. To start with, the equations of the ideal magnetohydrodynamics theory will be presented describing the basic behaviour of magnetically confined plasma and equations are discretized with finite element method in cylindrical coordinates. The discharge chamber is assumed to be axially symmetric and the plasma is treated as a compressible gas. Plasma generation due to ionization is added to the continuity equation. Magnetic vector potential equation is solved for the electromagnetic fields. A strong dependence of the plasma properties on the discharge conditions and the gas temperature is obtained.Keywords: direct-coupled model, magnetohydrodynamic, modelling, plasma torch simulation
Procedia PDF Downloads 4312417 Is the Okun's Law Valid in Tunisia?
Authors: El Andari Chifaa, Bouaziz Rached
Abstract:
The central focus of this paper was to check whether the Okun’s law in Tunisia is valid or not. For this purpose, we have used quarterly time series data during the period 1990Q1-2014Q1. Firstly, we applied the error correction model instead of the difference version of Okun's Law, the Engle-Granger and Johansen test are employed to find out long run association between unemployment, production, and how error correction mechanism (ECM) is used for short run dynamic. Secondly, we used the gap version of Okun’s law where the estimation is done from three band pass filters which are mathematical tools used in macro-economic and especially in business cycles theory. The finding of the study indicates that the inverse relationship between unemployment and output is verified in the short and long term, and the Okun's law holds for the Tunisian economy, but with an Okun’s coefficient lower than required. Therefore, our empirical results have important implications for structural and cyclical policymakers in Tunisia to promote economic growth in a context of lower unemployment growth.Keywords: Okun’s law, validity, unit root, cointegration, error correction model, bandpass filters
Procedia PDF Downloads 3152416 Compact Microstrip Ultra-Wideband Bandstop Filter With Quasi-Elliptic Function Response
Authors: Hussein Shaman, Faris Almansour
Abstract:
This paper proposes a modified optimum bandstop filter with ultra-wideband stopband. The filter consists of three shunt open-circuited stubs and two non-redundant unit elements. The proposed bandstop filter is designed with unequal electrical lengths of the open-circuited stubs at the mid-stopband. Therefore, the filter can exhibit a quasi-elliptic function response that improves the selectivity and enhances the rejection bandwidth. The filter is designed to exhibit a fractional bandwidth of about 114% at a mid-stopband frequency of 3.0 GHz. The filter is successfully realized in theory, simulated, fabricated and measured. An excellent agreement is obtained between calculated, simulated and measured. The fabricated filter has a compact size with a low insertion loss in the passbands, high selectivity and good attenuation level inside the desired stopbandKeywords: microstrip filter, bandstop filter, UWB filter, transmission line filter
Procedia PDF Downloads 1462415 Mindfulness and Employability: A Course on the Control of Stress during the Search for Work
Authors: O. Lasaga
Abstract:
Defining professional objectives and the search for work are some of the greatest stress factors for final year university students and recent graduates. To manage correctly the stress brought about by the uncertainty, confusion and frustration this process often generates, a course to control stress based on mindfulness has been designed and taught. This course provides tools based on relaxation, mindfulness and meditation that enable students to address personal and professional challenges in the transition to the job market, eliminating or easing the anxiety involved. The course is extremely practical and experiential, combining theory classes and practical classes of relaxation, meditation and mindfulness, group dynamics, reflection, application protocols and session integration. The evaluation of the courses highlighted on the one hand the high degree of satisfaction and, on the other, the usefulness for the students in becoming aware of stressful situations and how these affect them and learning new coping techniques that enable them to reach their goals more easily and with greater satisfaction and well-being.Keywords: employability, meditation, mindfulness, relaxation techniques, stress
Procedia PDF Downloads 3852414 Applying Spanning Tree Graph Theory for Automatic Database Normalization
Authors: Chetneti Srisa-an
Abstract:
In Knowledge and Data Engineering field, relational database is the best repository to store data in a real world. It has been using around the world more than eight decades. Normalization is the most important process for the analysis and design of relational databases. It aims at creating a set of relational tables with minimum data redundancy that preserve consistency and facilitate correct insertion, deletion, and modification. Normalization is a major task in the design of relational databases. Despite its importance, very few algorithms have been developed to be used in the design of commercial automatic normalization tools. It is also rare technique to do it automatically rather manually. Moreover, for a large and complex database as of now, it make even harder to do it manually. This paper presents a new complete automated relational database normalization method. It produces the directed graph and spanning tree, first. It then proceeds with generating the 2NF, 3NF and also BCNF normal forms. The benefit of this new algorithm is that it can cope with a large set of complex function dependencies.Keywords: relational database, functional dependency, automatic normalization, primary key, spanning tree
Procedia PDF Downloads 3532413 A User Study on the Adoption of Context-Aware Destination Mobile Applications
Authors: Shu-Lu Hsu, Fang-Yi Chu
Abstract:
With the advances in information and communications technology, mobile context-aware applications have become powerful marketing tools. In Apple online store, there are numerous mobile applications (APPs) developed for destination tour. This study investigated the determinants of adoption of context-aware APPs for destination tour services. A model is proposed based on Technology Acceptance Model and privacy concern theory. The model was empirically tested based on a sample of 259 users of a tourism APP published by Kaohsiung Tourism Bureau, Taiwan. The results showed that the fitness of the model is well and, among all the factors, the perceived usefulness and perceived ease of use have the most significant influences on the intention to adopt context-aware destination APPs. Finally, contrary to the findings of previous literature, the effect of privacy concern on the adoption intention of context-aware APP is insignificant.Keywords: mobile application, context-aware, privacy concern, TAM
Procedia PDF Downloads 2562412 Time "And" Dimension(s) - Visualizing the 4th and 4+ Dimensions
Authors: Siddharth Rana
Abstract:
As we know so far, there are 3 dimensions that we are capable of interpreting and perceiving, and there is a 4th dimension, called time, about which we don’t know much yet. We, as humans, live in the 4th dimension, not the 3rd. We travel 3 dimensionally but cannot yet travel 4 dimensionally; perhaps if we could, then visiting the past and the future would be like climbing a mountain or going down a road. So far, we humans are not even capable of imagining any higher dimensions than the three dimensions in which we can travel. We are the beings of the 4th dimension; we are the beings of time; that is why we can travel 3 dimensionally; however, if, say, there were beings of the 5th dimension, then they would easily be able to travel 4 dimensionally, i.e., they could travel in the 4th dimension as well. Beings of the 5th dimension can easily time travel. However, beings of the 4th dimension, like us, cannot time travel because we live in a 4-D world, traveling 3 dimensionally. That means to ever do time travel, we just need to go to a higher dimension and not only perceive it but also be able to travel in it. However, traveling to the past is not very possible, unlike traveling to the future. Even if traveling to the past were possible, it would be very unlikely that an event in the past would be changed. In this paper, some approaches are provided to define time, our movement in time to the future, some aspects of time travel using dimensions, and how we can perceive a higher dimension.Keywords: time, dimensions, String theory, relativity
Procedia PDF Downloads 1042411 Creating Inclusive Educational Environments for Women Faculty of Color Harnessing Ubuntu Perspectives
Authors: Gonzaga Mukasa, Faith Maina, Amani Zaier
Abstract:
This study investigated whether harnessing Ubuntu perspectives can aid in healing wounds Hierarchical Microaggressive intersectionalities inflict on African immigrant women faculty in predominantly white institutions. The study interviewed 8 African immigrant faculty from different higher education institutions in the United States selected using the snowball sampling technique. The Ubuntu Theory anchored the study. Findings indicated that women faculty of color experience Hierarchical Microaggressive intersectionalities leading them to lose job satisfaction and feel deprofessionalized and isolated. The recommendations were that institutions make their recruitment more inclusive of women of color to avoid isolation. And should embrace Ubuntu perspectives such as survival, solidarity, compassion, dignity, and mutual respect to architect educational environments that foster diversity and inclusion.Keywords: ubuntu, women faculty, African immigrants, hierarchical microaggressive intersectionalities
Procedia PDF Downloads 652410 Vibration Control of a Functionally Graded Carbon Nanotube-Reinforced Composites Beam Resting on Elastic Foundation
Authors: Gholamhosein Khosravi, Mohammad Azadi, Hamidreza Ghezavati
Abstract:
In this paper, vibration of a nonlinear composite beam is analyzed and then an active controller is used to control the vibrations of the system. The beam is resting on a Winkler-Pasternak elastic foundation. The composite beam is reinforced by single walled carbon nanotubes. Using the rule of mixture, the material properties of functionally graded carbon nanotube-reinforced composites (FG-CNTRCs) are determined. The beam is cantilever and the free end of the beam is under follower force. Piezoelectric layers are attached to the both sides of the beam to control vibrations as sensors and actuators. The governing equations of the FG-CNTRC beam are derived based on Euler-Bernoulli beam theory Lagrange- Rayleigh-Ritz method. The simulation results are presented and the effects of some parameters on stability of the beam are analyzed.Keywords: carbon nanotubes, vibration control, piezoelectric layers, elastic foundation
Procedia PDF Downloads 2682409 The Association between Attachment Styles, Satisfaction of Life, Alexithymia, and Psychological Resilience: The Mediational Role of Self-Esteem
Authors: Zahide Tepeli Temiz, Itir Tari Comert
Abstract:
Attachment patterns based on early emotional interactions between infant and primary caregiver continue to be influential in adult life, in terms of mental health and behaviors of individuals. Several studies reveal that infant-caregiver relationships have impressed the affect regulation, coping with stressful and negative situations, general satisfaction of life, and self image in adulthood, besides the attachment styles. The present study aims to examine the relationships between university students’ attachment style and their self-esteem, alexithymic features, satisfaction of life, and level of resilience. In line with this aim, the hypothesis of the prediction of attachment styles (anxious and avoidant) over life satisfaction, self-esteem, alexithymia, and psychological resilience was tested. Additionally, in this study Structural Equational Modeling was conducted to investigate the mediational role of self-esteem in the relationship between attachment styles and alexithymia, life satisfaction, and resilience. This model was examined with path analysis. The sample of the research consists of 425 university students who take education from several region of Turkey. The participants who sign the informed consent completed the Demographic Information Form, Experiences in Close Relationships-Revised, Rosenberg Self-Esteem Scale, The Satisfaction with Life Scale, Toronto Alexithymia Scale, and Resilience Scale for Adults. According to results, anxious, and avoidant dimensions of insecure attachment predicted the self-esteem score and alexithymia in positive direction. On the other hand, these dimensions of attachment predicted life satisfaction in negative direction. The results of linear regression analysis indicated that anxious and avoidant attachment styles didn’t predict the resilience. This result doesn’t support the theory and research indicating the relationship between attachment style and psychological resilience. The results of path analysis revealed the mediational role self esteem in the relation between anxious, and avoidant attachment styles and life satisfaction. In addition, SEM analysis indicated the indirect effect of attachment styles over alexithymia and resilience besides their direct effect. These findings support the hypothesis of this research relation to mediating role of self-esteem. Attachment theorists suggest that early attachment experiences, including supportive and responsive family interactions, have an effect on resilience to harmful situations in adult life, ability to identify, describe, and regulate emotions and also general satisfaction with life. Several studies examining the relationship between attachment styles and life satisfaction, alexithymia, and psychological resilience draw attention to mediational role of self-esteem. Results of this study support the theory of attachment patterns with the mediation of self-image influence the emotional, cognitive, and behavioral regulation of person throughout the adulthood. Therefore, it is thought that any intervention intended for recovery in attachment relationship will increase the self-esteem, life satisfaction, and resilience level, on the one side, decrease the alexithymic features, on the other side.Keywords: alexithymia, anxious attachment, avoidant attachment, life satisfaction, path analysis, resilience, self-esteem, structural equation
Procedia PDF Downloads 1942408 All for One, or One for All: A Comparative Evaluation of the Role of Social Relations in Explaining Individual versus Group Participation in the Radicalization and Terrorism Process amongst Far-Right Actors in the United States
Authors: Jack Wippell
Abstract:
This paper explores the role of social relations in explaining far-right actors' decisions over whether to travel down the process of radicalization and terrorism alone or in a group. To this end, a joint comparative method of difference and agreement is applied to four case studies across key temporal points on the radicalization and terrorism pathway to generate a theory of why individuals decide to radicalize and/or act alone or within a group. While social relations are identified as playing some moderate role in explaining why certain individuals radicalize alone versus within a group, this paper argues they play a significant role in affecting decisions over whether to act alone versus in a group. These findings suggest new avenues of distinction and understanding of far-right actors' processes of radicalization and terrorism, in turn, offering potential new avenues for counter-terrorism policy and important areas for future research.Keywords: far-right, lone-actor, terrorism, United States, radicalization
Procedia PDF Downloads 862407 Generating Music with More Refined Emotions
Authors: Shao-Di Feng, Von-Wun Soo
Abstract:
To generate symbolic music with specific emotions is a challenging task due to symbolic music datasets that have emotion labels are scarce and incomplete. This research aims to generate more refined emotions based on the training datasets that are only labeled with four quadrants in Russel’s 2D emotion model. We focus on the theory of Music Fadernet and map arousal and valence to the low-level attributes, and build a symbolic music generation model by combining transformer and GM-VAE. We adopt an in-attention mechanism for the model and improve it by allowing modulation by conditional information. And we show the music generation model could control the generation of music according to the emotions specified by users in terms of high-level linguistic expression and by manipulating their corresponding low-level musical attributes. Finally, we evaluate the model performance using a pre-trained emotion classifier against a pop piano midi dataset called EMOPIA, and by subjective listening evaluation, we demonstrate that the model could generate music with more refined emotions correctly.Keywords: music generation, music emotion controlling, deep learning, semi-supervised learning
Procedia PDF Downloads 872406 Active Flutter Suppression of Sports Aircraft Tailplane by Supplementary Control Surface
Authors: Aleš Kratochvíl, Svatomír Slavík
Abstract:
The paper presents an aircraft flutter suppression by active damping of supplementary control surface at trailing edge. The mathematical model of thin oscillation airfoil with control surface driven by pilot is developed. The supplementary control surface driven by control law is added. Active damping of flutter by several control law is present. The structural model of tailplane with an aerodynamic strip theory based on the airfoil model is developed by a finite element method. The optimization process of stiffens parameters is carried out to match the structural model with results from a ground vibration test of a small sport airplane. The implementation of supplementary control surface driven by control law is present. The active damping of tailplane model is shown.Keywords: active damping, finite element method, flutter, tailplane model
Procedia PDF Downloads 2892405 The Consumer Responses toward the Offensive Product Advertising
Authors: Chin Tangtarntana
Abstract:
The main purpose of this study was to investigate the effects of animation in offensive product advertising. Experiment was conducted to collect consumer responses toward animated and static ads of offensive and non-offensive products. The study was conducted by distributing questionnaires to the target respondents. According to statistics from Innovative Internet Research Center, Thailand, majority of internet users are 18 – 44 years old. The results revealed an interaction between ad design and offensive product. Specifically, when used in offensive product advertisements, animated ads were not effective for consumer attention, but yielded positive response in terms of attitude toward product. The findings support that information processing model is accurate in predicting consumer cognitive response toward cartoon ads, whereas U&G, arousal, and distinctive theory is more accurate in predicting consumer affective response. In practical, these findings can also be used to guide ad designers and marketers that are suitable for offensive products.Keywords: animation, banner ad design, consumer responses, offensive product advertising, stock exchange of Thailand
Procedia PDF Downloads 2662404 Factors Influencing University Students' Online Disinhibition Behavior: The Moderating Effects of Deterrence and Social Identity
Authors: Wang, Kuei-Ing, Jou-Fan Shih
Abstract:
This study adopts deterrence theory as well as social identities as moderators, and explores their moderating affects on online toxic disinhibition. Survey and Experimental methodologies are applied to test the research model and four hypotheses are developed in this study. The controllability of identity positively influenced the behavior of toxic disinhibition both in experimental and control groups while the fluidity of the identity did not have significant influences on online disinhibition. Punishment certainty, punishment severity as well as social identity negatively moderated the relation between the controllability of the identity and the toxic disinhibition. The result of this study shows that internet users hide their real identities when they behave inappropriately on internet, but once they acknowledge that the inappropriate behavior will be found and punished severely, the inappropriate behavior then will be weakened.Keywords: seductive properties of internet, online disinhibition, punishment certainty, punishment severity, social identity
Procedia PDF Downloads 5072403 Sexual Consent: Exploring the Perceptions of Heterosexual, Gay, and Bisexual Men
Authors: Shulamit Sternin, Raymond M. McKie, Carter Winberg, Robb N. Travers, Terry P. Humphreys, Elke D. Reissing
Abstract:
Issues surrounding sexual consent negotiation have become a major topic of societal concern. The majority of current research focuses on the complexities of sexual consent negotiations and the multitude of nuanced issues that surround the consent obtainment of heterosexual adults in post-secondary educational institutions. To date, the only study that has addressed sexual consent negotiation behaviour in same-sex relationships focused on the extent to which individuals used a variety of different verbal and nonverbal sexual consent behaviours to initiate or respond to sexual activity. The results were consistent with trends found within heterosexual individuals; thus, suggesting that the current understanding of sexual consent negotiation, which is grounded in heterosexual research, can serve as a strong foundation for further exploration of sexual consent negotiation within same-sex relationships populations. The current study quantitatively investigated the differences between heterosexual men and gay and bisexual men (GBM) in their understanding of sexual consent negotiation. Exploring how the perceptions of GBM differ from heterosexual males provides insight into some of the unique challenges faced by GBM. Data were collected from a sample of 252 heterosexual men and 314 GBM from Canada, the United States, and Western Europe. Participants responded to the question, 'do you think sexual consent and sex negotiation is different for heterosexual men compared to gay men? If so, how?' by completed an online survey. Responses were analysed following Braun & Clarke’s (2006) six phase thematic analysis guidelines. Inter-rater coding was validated using Cohen’s Kappa value and was calculated at (ϰ = 0.84), indicating a very strong level of agreement between raters. The final thematic structure yielded four major themes: understanding of sexual interaction, unique challenges, scripted role, and universal consent. Respondents spoke to their understanding of sexual interaction, believing GBM sexual consent negotiation to be faster and more immediate. This was linked to perceptions of emotional attachment and the idea that sexual interaction and emotional involvement were distinct and separate processes in GBM sexual consent negotiation, not believed to be the case in heterosexual interactions. Unique challenges such as different protection concerns, role declaration, and sexualization of spaces were understood to hold differing levels of consideration for heterosexual men and GBM. The perception of a clearly defined sexual script for GBM was suggested as a factor that may create ambiguity surrounding sexual consent negotiation, which in turn holds significant implications on unwanted sexual experiences for GBM. Broadening the scope of the current understanding of sexual consent negotiation by focusing on heterosexual and GBM population, the current study has revealed variations in perception of sexual consent negotiation between these two populations. These differences may be understood within the context of sexual scripting theory and masculinity gender role theory. We suggest that sexual consent negotiation is a health risk factor for GBM that has not yet been adequately understood and addressed. Awareness of the perceptions that surround the sexual consent negotiation of both GBM and heterosexual men holds implications on public knowledge, which in turn can better inform policy making, education, future research, and clinical treatment.Keywords: sexual consent, negotiation, heterosexual men, GBM, sexual script
Procedia PDF Downloads 1982402 Effective Width of Reinforced Concrete U-Shaped Walls Due to Shear Lag Effects
Authors: Ryan D. Hoult
Abstract:
The inherent assumption in the elementary theory of bending that plane sections remain plane is commonly used in the design of reinforced concrete members. However, in reality, a shear flow would develop in non-rectangular sections, where the longitudinal strains in between the web and flanges of the element would lag behind those at the boundary ends. This phenomenon, known as shear lag, can significantly reduce the expected moment capacity of non-rectangular reinforced concrete walls. This study focuses on shear lag effects in reinforced concrete U-shaped walls, which are commonly used as lateral load resisting elements in reinforced concrete buildings. An extensive number of finite element modelling analyses are conducted to estimate the vertical strain distributions across the web and flanges of a U-shaped wall with different axial load ratios and longitudinal reinforcement detailing. The results show that shear lag effects are prominent and sometimes significant in U-shaped walls, particularly for the wall sections perpendicular to the direction of loading.Keywords: shear lag, walls, U-shaped, moment-curvature
Procedia PDF Downloads 209