Search results for: social networks security issues
14642 Linguistic Codes: Food as a Class Indicator
Authors: Elena Valeryevna Pozhidaeva
Abstract:
This linguistic case study is based on an interaction between the social position and foodways. In every culture there is a social hierarchical system in which there can be means to express and to identify the social status of a person. Food serves as a class indicator. The British being a verbal nation use the words as a preferred medium for signalling and recognising the social status. The linguistic analysis reflects a symbolic hierarchy determined by social groups in the UK. The linguistic class indicators of a British hierarchical system are detectable directly – in speech acts. They are articulated in every aspect of a national identity’s life from preferences of the food and the choice to call it to the names of the meals. The linguistic class indicators can as well be detected indirectly – through symbolic meaning or via the choice of the mealtime, its class (e.g the classes of tea or marmalade), the place to buy food (the class of the supermarket) and consume it (the places for eating out and the frequency of such practices). Under analysis of this study are not only food items and their names but also such categories as cutlery as a class indicator and the act of eating together as a practice of social significance and a class indicator. Current social changes and economic developments are considered and their influence on the class indicators appearance and transformation.Keywords: linguistic, class, social indicator, English, food class
Procedia PDF Downloads 40314641 Qualitative Study Method on Case Assignment Adopted by Singapore Medical Social Workers
Authors: Joleen L. H. Lee, K. F. Yen, Janette W. P. Ng, D. Woon, Mandy M. Y. Lau, Ivan M. H. Woo, S. N. Goh
Abstract:
Case assignment systems are created to meet a need for equity in work distribution and better match between medical social workers' (MSWs) competencies and patients' problems. However, there is no known study that has explored how MSWs in Singapore assign cases to achieve equity in work distribution. Focus group discussions were conducted with MSWs from public hospitals to understand their perception on equitable workload and case allocation. Three approaches to case allocation were found. First is the point system where points are allocated to cases based on a checklist of presenting issues identified most of the time by non-MSWs. Intensity of case is taken into consideration, but allocation of points is often subject to variation in appreciation of roles of MSWs by the source of referral. Second is the round robin system, where all MSWs are allocated cases based on a roster. This approach resulted in perceived equity due to element of luck, but it does not match case complexity with competencies of MSWs. Third approach is unit-based allocation, where MSWs are assigned to attend to cases from specific unit. This approach helps facilitate specialization among MSWs but may result in MSWs having difficulty providing transdisciplinary care due to narrow set of knowledge and skills. Trade-offs resulted across existing approaches for case allocation by MSWs. Conversations are needed among Singapore MSWs to decide on a case allocation system that comes with trade-offs that are acceptable for patients and other key stakeholders of the care delivery system.Keywords: case allocation, equity, medical social worker, work distribution
Procedia PDF Downloads 12514640 Reflecting and Teaching on the Dialectical Nature of Social Work
Authors: Eli Buchbinder
Abstract:
Dialectics theory perceives two or more forces or themes as mutually opposed and negating on the one hand and as interdependent for their definition, existence, and resolution on the other. Such opposites might never be fully reconciled but might, simultaneously, continue to produce a higher level of integration and synthesis as well as tension, contradictions, and paradoxes. The identity of social work is constructed by poles; an understanding that emerges through key concepts that shape the profession. The key concept of person-in-environment creates dialectical tensions between the psychological versus the social pole. Important examples that reflect this focus on the psychological versus the social nature of human beings. This meta-perspective influences and constructs the implementation of values, ways of intervention, and professional relationships, e.g., creating a conflict between personal/social empowerment and social control and correction as the aims of the profession. Social work is dynamic and changing, with a unique way of perceiving and conceptualizing human behavior. Social workers must be able to face and accept the contradicting elements inherent in practicing social work. The basic philosophy for social work education is a dialectic conceptualization. In light of the above, social work students require dialectics as a critical mode of perception, reflection, and intervention. In the presentation, the focus will be on reflection on teaching students to conceptualize dialectics as a frame when training to be social workers. It is believed that the focus should emphasis two points: 1) the need to assist students to identify poles and to analyze the interrelationships created between them while coping emotionally with the tension and difficulties involved in containing these poles; 2) teaching students to integrate poles as a basis for assessment, planning, and intervention.Keywords: professional ontology, a generic social work education, skills and values of social work, reflecting on social work teaching methods
Procedia PDF Downloads 8514639 Measures for Limiting Corruption upon Migration Wave in Europe
Authors: Jordan Georgiev Deliversky
Abstract:
Fight against migrant smuggling has been put as a priority issues at the European Union policy agenda for more than a decade. The trafficked person, who has been targeted as the object of criminal exploitation, is specifically unique for human trafficking. Generally, the beginning of human trafficking activities is related to profit from the victim’s exploitation. The objective of this paper is to present measures that could result in the limitation of corruption mainly through analyzing the existing legislation framework against corruption in Europe. The analysis is focused on exploring the multiple origins of factors influencing migration processes in Europe, as corruption could be characterized as one of the most significant reasons for refugees to flee their countries. The main results show that law enforcement must turn the focus on the financing of the organized crime groups that are involved in migrant smuggling activities. Corruption has a significant role in managing smuggling operations and in particular when criminal organizations and networks are involved. Illegal migrants and refugees usually represent significant sources of additional income for officials involved in the process of boarding protection and immigration control within the European Union borders.Keywords: corruption, influence, human smuggling, legislation, migration
Procedia PDF Downloads 35114638 Modalmetric Fiber Sensor and Its Applications
Authors: M. Zyczkowski, P. Markowski, M. Karol
Abstract:
The team from IOE MUT is developing fiber optic sensors for the security systems for 15 years. The conclusions of the work indicate that these sensors are complicated. Moreover, these sensors are expensive to produce and require sophisticated signal processing methods.We present the results of the investigations of three different applications of the modalmetric sensor: • Protection of museum collections and heritage buildings, • Protection of fiber optic transmission lines, • Protection of objects of critical infrastructure. Each of the presented applications involves different requirements for the system. The results indicate that it is possible to developed a fiber optic sensor based on a single fiber. Modification of optoelectronic parts with a change of the length of the sensor and the method of reflections of propagating light at the end of the sensor allows to adjust the system to the specific application.Keywords: modalmetric fiber optic sensor, security sensor, optoelectronic parts, signal processing
Procedia PDF Downloads 61914637 Wavelength Conversion of Dispersion Managed Solitons at 100 Gbps through Semiconductor Optical Amplifier
Authors: Kadam Bhambri, Neena Gupta
Abstract:
All optical wavelength conversion is essential in present day optical networks for transparent interoperability, contention resolution, and wavelength routing. The incorporation of all optical wavelength convertors leads to better utilization of the network resources and hence improves the efficiency of optical networks. Wavelength convertors that can work with Dispersion Managed (DM) solitons are attractive due to their superior transmission capabilities. In this paper, wavelength conversion for dispersion managed soliton signals was demonstrated at 100 Gbps through semiconductor optical amplifier and an optical filter. The wavelength conversion was achieved for a 1550 nm input signal to1555nm output signal. The output signal was measured in terms of BER, Q factor and system margin.Keywords: all optical wavelength conversion, dispersion managed solitons, semiconductor optical amplifier, cross gain modultation
Procedia PDF Downloads 45314636 Image Steganography Using Least Significant Bit Technique
Authors: Preeti Kumari, Ridhi Kapoor
Abstract:
In any communication, security is the most important issue in today’s world. In this paper, steganography is the process of hiding the important data into other data, such as text, audio, video, and image. The interest in this topic is to provide availability, confidentiality, integrity, and authenticity of data. The steganographic technique that embeds hides content with unremarkable cover media so as not to provoke eavesdropper’s suspicion or third party and hackers. In which many applications of compression, encryption, decryption, and embedding methods are used for digital image steganography. Due to compression, the nose produces in the image. To sustain noise in the image, the LSB insertion technique is used. The performance of the proposed embedding system with respect to providing security to secret message and robustness is discussed. We also demonstrate the maximum steganography capacity and visual distortion.Keywords: steganography, LSB, encoding, information hiding, color image
Procedia PDF Downloads 47414635 Combating Fake News: A Qualitative Evidence Synthesis of Organizational Stakeholder Trust in Social Media Communication during Crisis
Authors: Todd R. Walton
Abstract:
Social media would seem to be an ideal mechanism for crisis communication, yet it has been met with varied results. Natural disasters, such as hurricanes, provide a slow moving view of how social media can be leveraged to guide stakeholders and the public through a crisis. Crisis communication managers have struggled to reach target audiences with credible messaging. This Qualitative Evidence Synthesis (QES) analyzed the findings of eight studies published in the last year to determine how organizations effectively utilize social media for crisis communication. Additionally, the evidence was analyzed to note strategies for establishing credibility in a medium fraught with misinformation. Studies indicated wide agreement on the use of multiple social media channels in addition to frequent accurate messaging in order to establish credibility. Studies indicated mixed agreement on the use of text based emergency notification systems. The findings in this QES will help crisis communication professionals plan for social media use for crisis communication.Keywords: crisis communication, crisis management, emergency response, social media
Procedia PDF Downloads 20614634 Social Anxiety, Parental Criticism and the Mediating Role of Early Maladaptive Schemas
Authors: Tahmeena Ali, Andrew Francis, Keong Yap, Sharynn Schuster
Abstract:
Social anxiety is a chronic and debilitating condition characterized by fear and avoidance of social situations. Several risk factors have emerged, which emphasize the role of early childhood experiences in the development of this condition. As such, the current study tested the hypothesis that early maladaptive schemas (EMSs) mediate the relationship between retrospectively reported parental criticism and social anxiety whilst controlling the effects of depression. Three hundred and thirty-four non-clinical participants completed an online questionnaire consisting of self-report measures of parental criticism, EMSs of disconnection and rejection, and symptoms of social anxiety and depression. The mediation analysis confirmed the hypothesized model, indicating that EMSs mediated the relationship between parental criticism and social anxiety symptoms when controlling for depression. Whilst the current study is limited due to its cross-sectional design, the findings lend support to the developmental formulations of social anxiety and have important therapeutic implications for treatment.Keywords: early maladaptive schema, parental criticism, schema, social anxiety
Procedia PDF Downloads 27014633 Digital Governance Decision-Making in the Aftermath of Cybersecurity Crises, Lessons from Estonia
Authors: Logan Carmichael
Abstract:
As the world’s governments seek to increasingly digitize their service provisions, there exists a subsequent and fully valid concern about the security underpinning these digital governance provisions. Estonia, a small and innovative Baltic nation, has been refining both its digital governance structure and cybersecurity mechanisms for over three decades and has been praised as global ‘best practice’ in both fields. However, the security of the Estonian digital governance system has been ever-evolving and significantly shaped by cybersecurity crises. This paper examines said crises – 2007 cyberattacks on Estonian government, banks, and news media; the 2017 e-ID crisis; the ongoing COVID-19 pandemic; and the 2022 Russian invasion of Ukraine – and how governance decision-making following these crises has shaped the cybersecurity of the digital governance structure in Estonia. This paper employs a blended constructivist and historical institutionalist theoretical approach as a useful means to view governance and decision-making in the wake of cybersecurity incidents affecting the Estonian digital governance structure. Together, these theoretical groundings frame the topics of cybersecurity and digital governance in an Estonian context through a lens of ideation and experience, as well as institutional path dependencies over time and cybersecurity crises as critical junctures to study. Furthermore, this paper takes a qualitative approach, employing discourse analysis, policy analysis, and elite interviewing of Estonian officials involved in digital governance and cybersecurity in order to glean nuanced perspectives into the processes that followed these four crises. Ultimately, the results of this paper will offer insight into how governments undertake policy-driven change following cybersecurity crises to ensure sufficient security of their digitized service provisions. This paper’s findings are informative not only in continued decision-making in the Estonian system but also in other states currently implementing a digital governance structure, for which security mechanisms are of the utmost importance.Keywords: cybersecurity, digital governance, Estonia, crisis management, governance in crisis
Procedia PDF Downloads 11214632 Usage of Military Continuity Management System for Supporting of Emergency Management
Authors: Radmila Hajkova, Jiri Palecek, Hana Malachova, Alena Oulehlova
Abstract:
Ensuring of continuity of business is the basic strategy of every company. Continuity of organization activities includes comprehensive procedures that help in solving unexpected situations of natural and anthropogenic character (for example flood, blaze, economic situations). Planning of continuity operations is a process that helps identify critical processes and implement plans for the security and recovery of key processes. The aim of this article demonstrates application of system approach to managing business continuity called business continuity management systems in military issues. This article describes the life cycle of business continuity management which is based on the established cycle PDCA (plan-do-check-act). After this is carried out by activities which are making by the University of Defence during activation of forces and means of the Integrated rescue system in case of emergencies - accidents at a nuclear power plant in Czech republic. Activities of various stages of deployment earmarked forces and resources are managed and evaluated by using MCMS application (military continuity management system).Keywords: business continuity management system, emergency management, military, nuclear safety
Procedia PDF Downloads 45514631 The Impact of Sensory Overload on Students on the Autism Spectrum in Italian Inclusive Classrooms: Teachers' Perspectives and Training Needs
Authors: Paola Molteni, Luigi d’Alonzo
Abstract:
Background: Sensory issues are now considered one of the key aspects in defining and diagnosing autism, changing the perspectives on behavioural analysis and intervention in mainstream educational services. However, Italian teachers’ training is yet not specific on the topic of autism and its sensory-related effects and this research investigates the teacher’s capability in understanding the student’s needs and his/her challenging behaviours considering sensory perceptions. Objectives: The research aims to analyse mainstream schools teachers’ awareness on students’ sensory perceptions and how this affects classroom inclusion and learning process. The research questions are: i) Are teachers able to identify student’s sensory issues?; ii) Are trained teachers more able to identify sensory problems then untrained ones?; iii) What is the impact of sensory issues on inclusion in mainstream classrooms?; iv) What should teachers know about autistic sensory dimensions? Methods: This research was designed as a pilot study that involves a multi-methods approach, including action and collaborative research methodology. The designed research allows the researcher to catch the complexity of a province school district (from kindergarten to high school) through a deep detailed analysis of selected aspects. The researcher explored the questions described above through 133 questionnaires and 6 focus groups. The qualitative and quantitative data collected during the research were analysed using the Interpretative Phenomenological Analysis (IPA). Results: Mainstream schools teachers are not able to confidently recognise sensory issues of children included in the classroom. The research underlines: how professionals with no specific training on autism are not able to recognise sensory problems in students on the spectrum; how hearing and sight issues have higher impact on classroom inclusion and student’s learning process; how a lack of understanding is often followed by misinterpretations of the impact of sensory issues and challenging behaviours. Conclusions: As this research has shown, promoting and enhancing the importance of understanding sensory issues related to autism is fundamental to enable mainstream schools teachers to define educational and life-long plans able to properly answer the student’s needs and support his/her real inclusion in the classroom. This study is a good example of how the educational research can meet and help the daily practice in working with people on the autism spectrum and support the training design for mainstream school teachers: the emerging need of designed preparation on sensory issues is fundamental to be considered when planning school district in-service training programmes, specifically declined for inclusive services.Keywords: autism spectrum condition, scholastic inclusion, sensory overload, teacher's training
Procedia PDF Downloads 31714630 3D Object Model Reconstruction Based on Polywogs Wavelet Network Parametrization
Authors: Mohamed Othmani, Yassine Khlifi
Abstract:
This paper presents a technique for compact three dimensional (3D) object model reconstruction using wavelet networks. It consists to transform an input surface vertices into signals,and uses wavelet network parameters for signal approximations. To prove this, we use a wavelet network architecture founded on several mother wavelet families. POLYnomials WindOwed with Gaussians (POLYWOG) wavelet families are used to maximize the probability to select the best wavelets which ensure the good generalization of the network. To achieve a better reconstruction, the network is trained several iterations to optimize the wavelet network parameters until the error criterion is small enough. Experimental results will shown that our proposed technique can effectively reconstruct an irregular 3D object models when using the optimized wavelet network parameters. We will prove that an accurateness reconstruction depends on the best choice of the mother wavelets.Keywords: 3d object, optimization, parametrization, polywog wavelets, reconstruction, wavelet networks
Procedia PDF Downloads 28414629 Training a Neural Network Using Input Dropout with Aggressive Reweighting (IDAR) on Datasets with Many Useless Features
Authors: Stylianos Kampakis
Abstract:
This paper presents a new algorithm for neural networks called “Input Dropout with Aggressive Re-weighting” (IDAR) aimed specifically at datasets with many useless features. IDAR combines two techniques (dropout of input neurons and aggressive re weighting) in order to eliminate the influence of noisy features. The technique can be seen as a generalization of dropout. The algorithm is tested on two different benchmark data sets: a noisy version of the iris dataset and the MADELON data set. Its performance is compared against three other popular techniques for dealing with useless features: L2 regularization, LASSO and random forests. The results demonstrate that IDAR can be an effective technique for handling data sets with many useless features.Keywords: neural networks, feature selection, regularization, aggressive reweighting
Procedia PDF Downloads 45514628 The Developmental Model of Self-Efficacy Emotional Intelligence and Social Maturity among High School Boys and Girls
Authors: Shrikant Chavan, Vikas Minchekar
Abstract:
The present study examined the self-efficacy, emotional intelligence and social maturity of High school boys and girls. Furthermore, study aimed at to foster the self-efficacy, emotional intelligence and social maturity of high school students. The study was conducted on 100 high school students, out of which 50 boys and 50 girls were selected through simple random sampling method from the Sangli city of Maharashtra state, India. The age range of the sample is 14 to 16 years. Self-efficacy scale developed by Jesusalem Schwarzer, Emotional intelligence scale developed by Hyde, Pethe and Dhar and social maturity scale developed by Rao were administered to the sample. Data was analyzed using mean, SD and ‘t’ test further Karl Pearson’s product moment, correlation of coefficient was used to know the correlation between emotional intelligence, self-efficacy, and social maturity. Results revealed that boys and girls did not differ significantly in their self-efficacy and social maturity. Further, the analysis revealed that girls are having high emotional intelligence compared to boys, which is significant at 0.01 level. It is also found that there is a significant and positive correlation between self-efficacy and emotional intelligence, self-efficacy and social maturity and emotional intelligence and social maturity. Some developmental strategies to strengthen the self-efficacy, emotional intelligence and social maturity of high school students are suggested in the study.Keywords: self-efficacy, emotional intelligence, social maturity, developmental model and high school students
Procedia PDF Downloads 46814627 Developing a Quality Mentor Program: Creating Positive Change for Students in Enabling Programs
Authors: Bianca Price, Jennifer Stokes
Abstract:
Academic and social support systems are critical for students in enabling education; these support systems have the potential to enhance the student experience whilst also serving a vital role for student retention. In the context of international moves toward widening university participation, Australia has developed enabling programs designed to support underrepresented students to access to higher education. The purpose of this study is to examine the effectiveness of a mentor program based within an enabling course. This study evaluates how the mentor program supports new students to develop social networks, improve retention, and increase satisfaction with the student experience. Guided by Social Learning Theory (SLT), this study highlights the benefits that can be achieved when students engage in peer-to-peer based mentoring for both social and learning support. Whilst traditional peer mentoring programs are heavily based on face-to-face contact, the present study explores the difference between mentors who provide face-to-face mentoring, in comparison with mentoring that takes place through the virtual space, specifically via a virtual community in the shape of a Facebook group. This paper explores the differences between these two methods of mentoring within an enabling program. The first method involves traditional face-to-face mentoring that is provided by alumni students who willingly return to the learning community to provide social support and guidance for new students. The second method requires alumni mentor students to voluntarily join a Facebook group that is specifically designed for enabling students. Using this virtual space, alumni students provide advice, support and social commentary on how to be successful within an enabling program. Whilst vastly different methods, both of these mentoring approaches provide students with the support tools needed to enhance their student experience and improve transition into University. To evaluate the impact of each mode, this study uses mixed methods including a focus group with mentors, in-depth interviews, as well as engaging in netnography of the Facebook group ‘Wall’. Netnography is an innovative qualitative research method used to interpret information that is available online to better understand and identify the needs and influences that affect the users of the online space. Through examining the data, this research will reflect upon best practice for engaging students in enabling programs. Findings support the applicability of having both face-to-face and online mentoring available for students to assist enabling students to make a positive transition into University undergraduate studies.Keywords: enabling education, mentoring, netnography, social learning theory
Procedia PDF Downloads 12114626 The New Educators: The Reasons for Saudi Arabia to Invest More in Student Counseling Programs
Authors: Turki Alotaibi
Abstract:
Student counseling programs can provide many benefits to students in schools all around the world. In theory, the government of the Kingdom of Saudi Arabia (Saudi Arabia) has committed itself to school counseling programs in educational institutions throughout the country. Student counselors face a number of burdens and obstacles that impact student counseling programs. It is also widely known that Saudi Arabia has extremely high prevalence rates for overweight and obesity, anxiety and depression, and diabetes in children. It has also been demonstrated that teachers and staff are inadequately prepared when dealing with health issues relating to diabetes in schools in Saudi Arabia. This study will clearly demonstrate how student counselors in Saudi Arabia could become 'New Educators' in Saudi schools in relation to these health issues. This would allow them to leverage their position as student counselor to improve the management of these health issues in Saudi schools, to improve the quality of care provided to school children, and to overcome burdens and obstacles that are currently negatively affecting student counseling in Saudi schools.Keywords: anxiety and depression, diabetes, overweight and obesity, policy recommendations, student counseling, The Kingdom of Saudi Arabia
Procedia PDF Downloads 35714625 Guidelines for Proper Internal Control of Internet Payment: A Case Study of Internet Payment Gateway, Thailand
Authors: Pichamon Chansuchai
Abstract:
The objective of this research were to investigate electronic payment system on the internet and offer the guidelines for proper internal control of the payment system based on international standard security control (ISO/IEC 17799:2005),in a case study of payment of the internet, Thailand. The guidelines covered five important areas: (1) business requirement for access control, (2) information systems acquisition, development and maintenance, (3) information security incident management, (4) business continuity management, and (5) compliance with legal requirement. The findings from this qualitative study revealed the guidelines for proper internet control that were more reliable and allow the same line of business to implement the same system of control.Keywords: audit, best practice, internet, payment
Procedia PDF Downloads 50014624 'Internationalization': Discussing the Ethics of the Global North Developing Social Work Courses for the Global South
Authors: Mary Goitom, Maria Liegghio
Abstract:
In this paper, we critically explore the ethics of Schools of Social Work from the global North developing courses for programs within the Global South. In it, we discuss our experiences of partnering with the University of Guyana to develop and teach graduate courses in a newly formed Masters of Social Work program. Under the umbrella of our university’s goal for 'internationalization', that is, developing and establishing global and local collaborations for teaching, research and scholarship, we bring into question whether a new form of academic imperialism is occurring under the guise of global citizenship and social justice.Keywords: academic imperialism, global north and south, internationalization, social work education
Procedia PDF Downloads 34314623 A Design of the Infrastructure and Computer Network for Distance Education, Online Learning via New Media, E-Learning and Blended Learning
Authors: Sumitra Nuanmeesri
Abstract:
The research focus on study, analyze and design the model of the infrastructure and computer networks for distance education, online learning via new media, e-learning and blended learning. The collected information from study and analyze process that information was evaluated by the index of item objective congruence (IOC) by 9 specialists to design model. The results of evaluate the model with the mean and standard deviation by the sample of 9 specialists value is 3.85. The results showed that the infrastructure and computer networks are designed to be appropriate to a great extent appropriate to a great extent.Keywords: blended learning, new media, infrastructure and computer network, tele-education, online learning
Procedia PDF Downloads 40214622 Model Observability – A Monitoring Solution for Machine Learning Models
Authors: Amreth Chandrasehar
Abstract:
Machine Learning (ML) Models are developed and run in production to solve various use cases that help organizations to be more efficient and help drive the business. But this comes at a massive development cost and lost business opportunities. According to the Gartner report, 85% of data science projects fail, and one of the factors impacting this is not paying attention to Model Observability. Model Observability helps the developers and operators to pinpoint the model performance issues data drift and help identify root cause of issues. This paper focuses on providing insights into incorporating model observability in model development and operationalizing it in production.Keywords: model observability, monitoring, drift detection, ML observability platform
Procedia PDF Downloads 11214621 Red Green Blue Image Encryption Based on Paillier Cryptographic System
Authors: Mamadou I. Wade, Henry C. Ogworonjo, Madiha Gul, Mandoye Ndoye, Mohamed Chouikha, Wayne Patterson
Abstract:
In this paper, we present a novel application of the Paillier cryptographic system to the encryption of RGB (Red Green Blue) images. In this method, an RGB image is first separated into its constituent channel images, and the Paillier encryption function is applied to each of the channels pixel intensity values. Next, the encrypted image is combined and compressed if necessary before being transmitted through an unsecured communication channel. The transmitted image is subsequently recovered by a decryption process. We performed a series of security and performance analyses to the recovered images in order to verify their robustness to security attack. The results show that the proposed image encryption scheme produces highly secured encrypted images.Keywords: image encryption, Paillier cryptographic system, RBG image encryption, Paillier
Procedia PDF Downloads 23814620 Application of Adaptive Neural Network Algorithms for Determination of Salt Composition of Waters Using Laser Spectroscopy
Authors: Tatiana A. Dolenko, Sergey A. Burikov, Alexander O. Efitorov, Sergey A. Dolenko
Abstract:
In this study, a comparative analysis of the approaches associated with the use of neural network algorithms for effective solution of a complex inverse problem – the problem of identifying and determining the individual concentrations of inorganic salts in multicomponent aqueous solutions by the spectra of Raman scattering of light – is performed. It is shown that application of artificial neural networks provides the average accuracy of determination of concentration of each salt no worse than 0.025 M. The results of comparative analysis of input data compression methods are presented. It is demonstrated that use of uniform aggregation of input features allows decreasing the error of determination of individual concentrations of components by 16-18% on the average.Keywords: inverse problems, multi-component solutions, neural networks, Raman spectroscopy
Procedia PDF Downloads 52814619 Wicking Bed Cultivation System as a Strategic Proposal for the Cultivation of Milpa and Mexican Medicinal Plants in Urban Spaces
Authors: David Lynch Steinicke, Citlali Aguilera Lira, Andrea León García
Abstract:
The proposal posed in this work comes from a researching-action approach. In Mexico, a dialogue of knowledge may function as a link between traditional, local, pragmatic knowledge, and technological, scientific knowledge. The advantage of generating this nexus lies on the positive impact in the environment, in society and economy. This work attempts to combine, on the one hand the traditional Mexican knowledge such as the usage of medicinal herb and the agroecosystem milpa; and on the other hand make use of a newly created agricultural ecotechnology which main function is to take advantage of the urban space and to save water. This ecotechnology is the wicking bed. In a globalized world, is relevant to have a proposal where the most important aspect is to revalorize the culture through the acquisition of traditional knowledge but at the same time adapting them to the new social and urbanized structures without threatening the environment. The methodology used in this work comes from a researching-action approach combined with a practical dimension where an experimental model made of three wickingbeds was implemented. In this model, there were cultivated medicinal herb and milpa components. The water efficiency and the social acceptance were compared with a traditional ground crop, all this practice was made in an urban social context. The implementation of agricultural ecotechnology has had great social acceptance as its irrigation involves minimal effort and it is economically feasible for low-income people. The wicking bed system raised in this project is attainable to be implemented in schools, urban and peri-urban environments, homemade gardens and public areas. The proposal managed to carry out an innovative and sustainable knowledge-based traditional Mexican agricultural technology, allowing regain Milpa agroecosystem in urban environments to strengthen food security in favour of nutritional and protein benefits for the Mexican fare.Keywords: milpa, traditional medicine, urban agriculture, wicking bed
Procedia PDF Downloads 38714618 Correlation of Empathy with Job Satisfaction and Stress of Social Workers
Authors: Theodosios Paralikas, Evangelia Kotrotsiou, Mairy Gouva, Manolis Mentis, Stiliani Stavrotheodorou, Stiliani Kotrotsiou, Maria Malliarou
Abstract:
There is a big discussion in the international literature on empathy, job satisfaction and job occupational among various of disciplines, including social workers. Νevertheless these parameters have not been specifically studied in the Greek territory. This paper aims to study empathy of social workers, to produce results related to whether empathy is influenced by demographic factors such as gender, age, marital status, level of education and study their perceived stress levels and also the satisfaction they derive from their work. For the first time, an attempt is made to link the empathy of these professionals to their job satisfaction and their anxiety. The sample of this survey consists of 165 social workers working on providers of public and private social services. The results showed that social workers have high levels of empathy contrary to the perceived stress levels which were low to moderate. Regarding the field of the job satisfaction, the survey showed that social workers are very satisfied with their workpiece and workplace. The survey shows no significant relationship between empathy and demographic factors, but there is a significant relationship between empathy and the workpiece/job satisfaction and the feeling of success.Keywords: empathy, stress, job satisfaction, social workers
Procedia PDF Downloads 17614617 Improving Energy Efficiency through Industrial Symbiosis: A Conceptual Framework of Energy Management in Energy-Intensive Industries
Authors: Yuanjun Chen, Yongjiang Shi
Abstract:
Rising energy prices have drawn a focus to global energy issues, and the severe pollution that has resulted from energy-intensive industrial sectors has yet to be addressed. By combining Energy Efficiency with Industrial Symbiosis, the practices of efficient energy utilization and improvement can be not only enriched at the factory level but also upgraded into “within and/or between firm level”. The academic contribution of this paper provides a conceptual framework of energy management through IS. The management of waste energy within/between firms can contribute to the reduction of energy consumption and provides a solution to the environmental issues.Keywords: energy efficiency, energy management, industrial symbiosis, energy-intensive industry
Procedia PDF Downloads 43714616 Sustainable Development in India: Towards a New Paradigm
Authors: Raghav Srivastava, Namrata Ramachandran
Abstract:
Strong sustainability has been, by consensus, imagined as comprising economic and extra-economic variables and cannot be viewed merely in terms of a trade-off between the economic needs of today and the potential left for tomorrow. Specifically, the cultural as well the ecological impacts of development projects on the affected communities should be evaluated, in addition to the economic. In developing and densely populated economies such as India, energy intensive development is seen as a sine qua non – a necessary trade off with ecological conservation. Although social impact assessment has been included as an inalienable part of the Environmental Impact Assessment required to be conducted under Indian law, it seems that the same is unable to meet the ends it seeks to achieve. The dissociation between those bearing the costs of development, and those reaping its benefits, lies at the heart of this failure. This paper attempts to study the various cost–benefit relationships for these minority stakeholders using the proposed Nyamjang Chhu hydroelectric power plant in Tawang District of Arunachal Pradesh (in North-east India) as the chief object of study, and discusses whether the current model of sustainable development is truly sustainable, given the level of social dissociation and disintegration that occurs between affected communities and their environment. The economic allure of hydroelectric projects in the hilly regions of India very rarely results in a proper assessment of their ecological and social externalities. Examining the various issues that have been agitated in the course of litigation over the Nyamjang Chhu hydroelectric project, the authors argue that there is a pressing need to re-evaluate the current Indian model of sustainable development going forward.Keywords: hydroelectric power, socio-cultural dissociation, sustainable development, trade offs
Procedia PDF Downloads 28714615 Alumni Experiences of How Their Undergraduate Medical Education Instilled and Fostered a Commitment to Community-Based Work in Later Life: A Sequential Exploratory Mixed-Methods Study
Authors: Harini Aiyer, Kalyani Premkumar
Abstract:
Health professionals are the key players who can help achieve the goals of population health equity. Social accountability (SA) of health professionals emphasizes their role in addressing issues of equity in the population they serve. Therefore, health professional education must focus on instilling SA in health professionals. There is limited literature offering a longitudinal perspective of how students sustain the practice of SA in later life. This project aims to identify the drivers of social accountability among physicians. This study employed an exploratory mixed methods design (QUAL-> Quant) to explore alumni perceptions and experiences. The qualitative data, collected via 20 in-depth, semi-structured interviews, provided an understanding of the perceptions of the alumni regarding the influence of their undergraduate learning environment on their SA. This was followed by a quantitative portion -a questionnaire designed from the themes identified from the qualitative data. Emerging themes from the study highlighted community-centered education and a focus on social and preventative medicine in both curricular and non-curricular facilitators of SA among physicians. Curricular components included opportunities to engage with the community, such as roadside clinics, community-orientation programs, and postings at a secondary hospital. Other facilitators that emerged were the faculty leading by example, a subsidized fee structure, and a system that prepared students for practice in rural and remote areas. The study offers a fresh perspective and dimension on how SA is addressed by medical schools. The findings may be adapted by medical schools to understand how their own SA initiatives have been sustained among physicians over the long run.Keywords: community-based work, global health, health education, medical education, providing health in remote areas, social accountability
Procedia PDF Downloads 8014614 From “Deafness” to “Aphasia”: A Study of Social Retreat of Families With Hearing-Impaired Children. Interviews with 12 Mothers of Hearing-Impaired Children in Beijing
Authors: Yang Jiayue, Liang Junwen
Abstract:
Case interviews with 12 mothers of hearing-impaired children in Beijing found that families with hard-of-hearing children make all-out efforts for rescue and rehabilitation until they exhaust family resources, they travel to work places, homes, and rehabilitation institutions every day, and social relations gradually shrink inward. In the stigmatized social environment, children with hearing impairment find it difficult to integrate into regular communication and gradually return to a silent world; their parents also suffer from social discrimination and affiliate stigma, and they gradually reduce contact with others. Finally, families with hearing-impaired children become invisible people in society; the "deafness" of children leads families to "loss of voice."Keywords: family with hearing-impaired children, social retreat, social exclusion, stigma
Procedia PDF Downloads 7414613 State of Emergency in Turkey (July 2016-July 2018): A Case of Utilization of Law as a Political Instrument
Authors: Neslihan Cetin
Abstract:
In this study, we will aim to analyze how the period of the state of emergency in Turkey lead to gaps in law and the formation of areas in which there was a complete lack of supervision. The state of emergency that was proclaimed following the coup attempt of July 15, 2016, continued until July 18, 2018, that is to say, 2 years, without taking into account whether the initial circumstances persisted. As part of this work, we claim that the state of emergency provided the executive power with important tools for governing, which it took constant use. We can highlight how the concern for security at the center of the basic considerations of the people in a city was exploited as a foundation by the military power in Turkey to interfere in the political, legal, and social spheres. The constitutions of 1924, 1961, and 1982 entrusted the army with the role of protector of the integrity of the state. This became an instrument at the hands of the military to legitimize their interventions in the name of public security. Its interventions in the political field are indeed politically motivated. The constitution, the legislative, and regulatory systems are modified and monopolized by the military power that dominates the legislative, regulatory, and judicial power, leading to a state of exception. With the political convulsions over a decade, the government was able to usurp the instrument called the state of exception. In particular, the decree-laws of the state of emergency, which the executive makes frequent and generally abusive use, became instruments in the hands of the government to take measures that it wishes to escape from the rules and the pre-established control mechanisms. Thus the struggle against the political opposition becomes more unbalanced and destructive. To this must also be added the ineffectiveness of ex-post controls and domestic remedies. This research allows us to stress how a legal concept, such as ‘the state of emergency’ can be politically exploited to make it a legal weapon that continues to produce victims.Keywords: constitutional law, state of emergency, rule of law, instrumentalization of law
Procedia PDF Downloads 143