Search results for: democratic weaknesses
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 800

Search results for: democratic weaknesses

560 Restructurasation of the Concept of Empire in the Social Consciousness of Modern Americans

Authors: Maxim Kravchenko

Abstract:

The paper looks into the structure and contents of the concept of empire in the social consciousness of modern Americans. To construct the model of this socially and politically relevant concept we have conducted an experiment with respondents born and living in the USA. Empire is seen as a historic notion describing such entities as the British empire, the Russian empire, the Ottoman empire and others. It seems that the democratic regime adopted by most countries worldwide is incompatible with imperial status of a country. Yet there are countries which tend to dominate in the contemporary world and though they are not routinely referred to as empires, in many respects they are reminiscent of historical empires. Thus, the central hypothesis of the study is that the concept of empire is cultivated in some states through the intermediary of the mass media though it undergoes a certain transformation to meet the expectations of a democratic society. The transformation implies that certain components which were historically embedded in its structure are drawn to the margins of the hierarchical structure of the concept whereas other components tend to become central to the concept. This process can be referred to as restructuration of the concept of empire. To verify this hypothesis we have conducted a study which falls into two stages. First we looked into the definition of empire featured in dictionaries, the dominant conceptual components of empire are: importance, territory/lands, recognition, independence, authority/power, supreme/absolute. However, the analysis of 100 articles from American newspapers chosen at random revealed that authors rarely use the word «empire» in its basic meaning (7%). More often «empire» is used when speaking about countries, which no longer exist or when speaking about some corporations (like Apple or Google). At the second stage of the study we conducted an associative experiment with the citizens of the USA aged 19 to 45. The purpose of the experiment was to find out the dominant components of the concept of empire and to construct the model of the transformed concept. The experiment stipulated that respondents should give the first association, which crosses their mind, on reading such stimulus phrases as “strong military”, “strong economy” and others. The list of stimuli features various words and phrases associated with empire including the words representing the dominant components of the concept of empire. Then the associations provided by the respondents were classified into thematic clusters. For instance, the associations to the stimulus “strong military” were compartmentalized into three groups: 1) a country with strong military forces (North Korea, the USA, Russia, China); 2) negative impression of strong military (war, anarchy, conflict); 3) positive impression of strong military (peace, safety, responsibility). The experiment findings suggest that the concept of empire is currently undergoing a transformation which brings about a number of changes. Among them predominance of positively assessed components of the concept; emergence of two poles in the structure of the concept, that is “hero” vs. “enemy”; marginalization of any negatively assessed components.

Keywords: associative experiment, conceptual components, empire, restructurasation of the concept

Procedia PDF Downloads 304
559 Towards a Security Model against Denial of Service Attacks for SIP Traffic

Authors: Arellano Karina, Diego Avila-Pesántez, Leticia Vaca-Cárdenas, Alberto Arellano, Carmen Mantilla

Abstract:

Nowadays, security threats in Voice over IP (VoIP) systems are an essential and latent concern for people in charge of security in a corporate network, because, every day, new Denial-of-Service (DoS) attacks are developed. These affect the business continuity of an organization, regarding confidentiality, availability, and integrity of services, causing frequent losses of both information and money. The purpose of this study is to establish the necessary measures to mitigate DoS threats, which affect the availability of VoIP systems, based on the Session Initiation Protocol (SIP). A Security Model called MS-DoS-SIP is proposed, which is based on two approaches. The first one analyzes the recommendations of international security standards. The second approach takes into account weaknesses and threats. The implementation of this model in a VoIP simulated system allowed to minimize the present vulnerabilities in 92% and increase the availability time of the VoIP service into an organization.

Keywords: Denial-of-Service SIP attacks, MS-DoS-SIP, security model, VoIP-SIP vulnerabilities

Procedia PDF Downloads 189
558 Challenge Response-Based Authentication for a Mobile Voting System

Authors: Tohari Ahmad, Hudan Studiawan, Iwang Aryadinata, Royyana M. Ijtihadie, Waskitho Wibisono

Abstract:

A manual voting system has been implemented worldwide. It has some weaknesses which may decrease the legitimacy of the voting result. An electronic voting system is introduced to minimize this weakness. It has been able to provide a better result, in terms of the total time taken in the voting process and accuracy. Nevertheless, people may be reluctant to go to the polling location because of some reasons, such as distance and time. In order to solve this problem, mobile voting is implemented by utilizing mobile devices. There are many mobile voting architectures available. Overall, authenticity of the users is the common problem of all voting systems. There must be a mechanism which can verify the users’ authenticity such that only verified users can give their vote once; others cannot vote. In this paper, a challenge response-based authentication is proposed by utilizing properties of the users, for example, something they have and know. In terms of speed, the proposed system provides good result, in addition to other capabilities offered by the system.

Keywords: authentication, data protection, mobile voting, security

Procedia PDF Downloads 401
557 A Flagship Framework with Feet of Clay: Operational and Structural Challenges of the African Peace and Security Architecture

Authors: Wiriranai Brilliant Masara

Abstract:

The African Peace and Security Architecture is widely celebrated and revered as a paragon of the will to address peace and security challenges in Africa. However, like any other institution, it is embedded with operational and institutional challenges that prevent it from effectively carrying out its mandate and turning goals into achieved results. The article examines the fundamental flaws and weaknesses of the African Peace and Security Architecture by focusing on its institutions, norms, instruments, and its relationship to Africa’s Regional Economic Communities. Therefore, the article reviews the flaws of the five elements of the African Peace and Security Architecture which are the Peace and Security Council, Panel of the Wise, Continental Early Warning System, African Standby Force, and Peace Fund.

Keywords: African Union, African Peace and Security Architecture, peace and security council, continental early warning system, African Standby Force, Panel of the Wise, Peace Fund

Procedia PDF Downloads 125
556 An Innovative Poly System Theory for the Go-Out of Chinese Culture

Authors: Jianhua Wang, Ying Zhou, Han Guo

Abstract:

Translation underwent culture turn for more than half a century, which brought translation and its studies beyond intra-texts. Different cultures in recent years have developed towards a translation turn, which made a great contribution to relocate national or local cultures being localized to become regional or global cultures. As China grows quickly economically integrating into the world, it becomes urgent to relate China’s story and disseminate the Chinese culture. Due to the weaknesses and drawbacks of different existing cultural translation theories for Chinese culture to go out, a new perspective on translation turn for the go-out of Chinese culture should be drawn to spread better and disseminate Chinese culture to other countries. Based on the existing cultural translation theories, the equivalence of ideology, style of the translator and agency of the support are proposed to draw a new perspective: an innovative poly-system theory for Chinese culture translation.

Keywords: cultural translation theory, Chinese culture, innovative poly system, global cultures

Procedia PDF Downloads 440
555 State Violence: The Brazilian Amnesty Law and the Fight Against Impunity

Authors: Flavia Kroetz

Abstract:

From 1964 to 1985, Brazil was ruled by a dictatorial regime that, under the discourse of fight against terrorism and subversion, implemented cruel and atrocious practices against anyone who opposed the State ideology. At the same time, several Latin American countries faced dictatorial periods and experienced State repression through apparatuses of violence institutionalized in the very governmental structure. Despite the correspondence between repressive methods adopted by authoritarian regimes in States such as Argentina, Chile, El Salvador, Peru and Uruguay, the mechanisms of democratic transition adopted with the end of each dictatorship were significantly different. While some States have found ways to deal with past atrocities through serious and transparent investigations of the crimes perpetrated in the name of repression, in others, as in Brazil, a culture of impunity remains rooted in society, manifesting itself in the widespread disbelief of the population in governmental and democratic institutions. While Argentina, Chile, Peru and Uruguay are convincing examples of the possibility and importance of the prosecution of crimes such as torture, forced disappearance and murder committed by the State, El Salvador demonstrates the complete failure to punish or at least remove from power the perpetrators of serious crimes against civilians and political opponents. In a scenario of widespread violations of human rights, State violence becomes entrenched within society as a daily and even necessary practice. In Brazil, a lack of political and judicial will withstands the impunity of those who, during the military regime, committed serious crimes against human rights under the authority of the State. If the reproduction of violence is a direct consequence of the culture of denial and the rejection of everyone considered to be different, ‘the other’, then the adoption of transitional mechanisms that underpin the historical and political contexts of the time seems essential. Such mechanisms must strengthen democracy through the effective implementation of the rights to memory and to truth, the right to justice and reparations for victims and their families, as well as institutional changes in order to remove from power those who, when in power, could not distinguish between legality and authoritarianism. Against this background, this research analyses the importance of transitional justice for the restoration of democracy, considering the adoption of amnesty laws as a strategy to preclude criminal prosecution of offenses committed during dictatorial regimes. The study investigates the scope of Law No 6.683/79, the Brazilian amnesty law, which, according to a 2010 decision of the Brazilian Constitutional Supreme Court, granted amnesty to those responsible for political crimes and related crimes, committed between September 2, 1961 and August 15, 1979. Was the purpose of this Law to grant amnesty to violent crimes committed by the State? If so, is it possible to recognize the legitimacy of a Congress composed of indirectly elected politicians controlled by the dictatorship?

Keywords: amnesty law, criminal justice, dictatorship, state violence

Procedia PDF Downloads 430
554 Empirical Exploration of Correlations between Software Design Measures: A Replication Study

Authors: Jehad Al Dallal

Abstract:

Software engineers apply different measures to quantify the quality of software design. These measures consider artifacts developed at low or high level software design phases. The results are used to point to design weaknesses and to indicate design points that have to be restructured. Understanding the relationship among the quality measures and among the design quality aspects considered by these measures is important to interpreting the impact of a measure for a quality aspect on other potentially related aspects. In addition, exploring the relationship between quality measures helps to explain the impact of different quality measures on external quality aspects, such as reliability and maintainability. In this paper, we report a replication study that empirically explores the correlation between six well known and commonly applied design quality measures. These measures consider several quality aspects, including complexity, cohesion, coupling, and inheritance. The results indicate that inheritance measures are weakly correlated to other measures, whereas complexity, coupling, and cohesion measures are mostly strongly correlated.  

Keywords: quality attribute, quality measure, software design quality, Spearman correlation

Procedia PDF Downloads 286
553 Low-Cost Reversible Logic Serial Multipliers with Error Detection Capability

Authors: Mojtaba Valinataj

Abstract:

Nowadays reversible logic has received many attentions as one of the new fields for reducing the power consumption. On the other hand, the processing systems have weaknesses against different external effects. In this paper, some error detecting reversible logic serial multipliers are proposed by incorporating the parity-preserving gates. This way, the new designs are presented for signed parity-preserving serial multipliers based on the Booth's algorithm by exploiting the new arrangements of existing gates. The experimental results show that the proposed 4×4 multipliers in this paper reach up to 20%, 35%, and 41% enhancements in the number of constant inputs, quantum cost, and gate count, respectively, as the reversible logic criteria, compared to previous designs. Furthermore, all the proposed designs have been generalized for n×n multipliers with general formulations to estimate the main reversible logic criteria as the functions of the multiplier size.

Keywords: Booth’s algorithm, error detection, multiplication, parity-preserving gates, quantum computers, reversible logic

Procedia PDF Downloads 216
552 Cultural Heritage Impact Assessments and the Negotiation of Identity in South Africa

Authors: Rosabelle Boswell

Abstract:

South Africa, a country with experience of both colonial rule and apartheid is now more than 25 years past its first democratic elections. However, and as noted in this article, South Africa is still experiencing the legacies of racial segregation and is concerned to address inequality by attracting investment for socioeconomic development. The paper offered considers five cultural heritage impact assessments conducted in South Africa for offshore oil and gas exploration and development. The results of the research, from more than 20 towns and cities in southern Africa, indicate a rich intangible cultural heritage in South Africa and Namibia, and the potential impacts on investor engagements for more inclusive and sustainable coastal development practices. The discussion advances critical heritage studies, taking into account socioeconomic realities and aboriginal concepts of nature and nature management.

Keywords: cultural heritage impact assessments, intangible cultural heritage, South Africa, ocean philosophies

Procedia PDF Downloads 144
551 Using Lean Six-Sigma in the Improvement of Service Quality at Aviation Industry: Case Study at the Departure Area in KKIA

Authors: Tareq Al Muhareb, Jasper Graham-Jones

Abstract:

The service quality is a significant element in aviation industry especially in the international airports. Through this paper, the researchers built a model based on Lean six sigma methodologies and applied it in the departure area at KKIA (King Khalid International Airport) in order to assess it. This model characterized with many special features that can become over the cultural differences in aviation industry since it is considered the most critical circumstance in this field. Applying the model of this study is depending on following the DMAIC procedure systemized in lean thinking aspects. This model of Lean-six-sigma as a managerial procedure is mostly focused on the change management culture that requires high level of planning, organizing, modifying, and controlling in order to benefit from strengths as well as revoke weaknesses.

Keywords: lean-six-sigma, service quality, aviation industry, KKIA (King Khalid International Airport), SERVQUAL

Procedia PDF Downloads 409
550 A Survey of Feature Selection and Feature Extraction Techniques in Machine Learning

Authors: Samina Khalid, Shamila Nasreen

Abstract:

Dimensionality reduction as a preprocessing step to machine learning is effective in removing irrelevant and redundant data, increasing learning accuracy, and improving result comprehensibility. However, the recent increase of dimensionality of data poses a severe challenge to many existing feature selection and feature extraction methods with respect to efficiency and effectiveness. In the field of machine learning and pattern recognition, dimensionality reduction is important area, where many approaches have been proposed. In this paper, some widely used feature selection and feature extraction techniques have analyzed with the purpose of how effectively these techniques can be used to achieve high performance of learning algorithms that ultimately improves predictive accuracy of classifier. An endeavor to analyze dimensionality reduction techniques briefly with the purpose to investigate strengths and weaknesses of some widely used dimensionality reduction methods is presented.

Keywords: age related macular degeneration, feature selection feature subset selection feature extraction/transformation, FSA’s, relief, correlation based method, PCA, ICA

Procedia PDF Downloads 478
549 Taiwan’s Democratic Institutions: The Electoral Rise and Recall of Kuomintang’s Han Kuo-YU Mayor

Authors: Ryan Brading

Abstract:

The results of Taiwan’s presidential election, which took place on 11 January 2020, were alarming for the Kuomintang (KMT). A party that was once the pillar of Taiwan’s institutional apparatus is now losing its direction. Since 2016, the inability of KMT to construct a winning presidential election campaign strategy has made its Chinese ancestry an obstacle in Taiwan’s vibrant and transparent democracy. The appearance of the little-known legislator Han Kuo-yu as the leadership alternative opened the possibility of reigniting the party. Han’s victory in the Kaohsiung mayoral election in November 2018 provided hope that Han could also win the presidency. Wrongly described as a populist, Han, however, was defeated in the January 2020 presidential race. This article analyses why Han is not a populist, his triumph in Kaohsiung, humiliation in running for the presidency and suffering a complete ‘loss of face’ when Kaohsiungers democratically ousted him from the mayoral post on 6 June 2020.

Keywords: populism, 1992 consensus, youth vote, Taiwan, recall

Procedia PDF Downloads 158
548 Survey on Data Security Issues Through Cloud Computing Amongst Sme’s in Nairobi County, Kenya

Authors: Masese Chuma Benard, Martin Onsiro Ronald

Abstract:

Businesses have been using cloud computing more frequently recently because they wish to take advantage of its advantages. However, employing cloud computing also introduces new security concerns, particularly with regard to data security, potential risks and weaknesses that could be exploited by attackers, and various tactics and strategies that could be used to lessen these risks. This study examines data security issues on cloud computing amongst sme’s in Nairobi county, Kenya. The study used the sample size of 48, the research approach was mixed methods, The findings show that data owner has no control over the cloud merchant's data management procedures, there is no way to ensure that data is handled legally. This implies that you will lose control over the data stored in the cloud. Data and information stored in the cloud may face a range of availability issues due to internet outages; this can represent a significant risk to data kept in shared clouds. Integrity, availability, and secrecy are all mentioned.

Keywords: data security, cloud computing, information, information security, small and medium-sized firms (SMEs)

Procedia PDF Downloads 71
547 Improving Cyber Resilience in Mobile Field Hospitals: Towards an Assessment Model

Authors: Nasir Baba Ahmed, Nicolas Daclin, Marc Olivaux, Gilles Dusserre

Abstract:

The Mobile field hospital is critical in terms of managing emergencies in crisis. It is a sub-section of the main hospitals and the health sector, tasked with delivering responsive, immediate, and efficient medical services during a crisis. With the aim to prevent further crisis, the assessment of the cyber assets follows different methods, to distinguish its strengths and weaknesses, and in turn achieve cyber resiliency. The work focuses on assessments of cyber resilience in field hospitals with trends growing in both the field hospital and the health sector in general. This creates opportunities for the adverse attackers and the response improvement objectives for attaining cyber resilience, as the assessments allow users and stakeholders to know the level of risks with regards to its cyber assets. Thus, the purpose is to show the possible threat vectors which open up opportunities, with contrast to current trends in the assessment of the mobile field hospitals’ cyber assets.

Keywords: assessment framework, cyber resilience, cyber security, mobile field hospital

Procedia PDF Downloads 150
546 The Comparison of Community Home-Based Care for the Aged in Kishiwada, Japan and Hangzhou, China

Authors: Zijiao Chai, Wangming Li

Abstract:

Hangzhou is one of the cities with the most serious aging in China. Community home-based care for the aged is an important solution to old-age care in aging society. In this aspect, Europe, the United States and Japan are on the top in the world. As an East Asian country, Japan has similar cultural traditions in pension with China. So, there is much enlightenment China can get from Japan in the mode of community home-based care for the aged. This paper introduces the mode of community home-based care for the aged in Kishiwada, Japan and Hangzhou, China. Then compare the two modes in the aspects of insurance system for the aged, community service and facilities, support system and so on. Thereby the success experience of Kishiwada and weaknesses of Hangzhou are summarized. At last, the improvement strategy of facility plan and service mode of community home-based care for the aged in China are also proposed.

Keywords: community, comparison, elderly-oriented, home-based care for the aged, support system

Procedia PDF Downloads 500
545 Institutionalizing Peace in Iraqi Kurdistan Post-civil War, 1998 to Present

Authors: Hawre Hasan Hama, Choman Mahmood H. Rashid

Abstract:

The four-year armed conflict between the Kurdistan Democratic Party (KDP) and the Patriotic Union of Kurdistan (PUK) ended in September 1998 under the terms of the Washington Agreement. Since then, there has been a quarter-century of durable peace between the two combatant parties, though they have often been at odds politically. Based on interviews with Kurdish political leaders from both parties, this paper argues that sharing or dividing power across all four dimensions of state power — political, military, territorial, and economic — has played a vital role ensuring the durability of the peace settlement. The paper traces the KDP-PUK power sharing system through three stages: the transition stage (1998-2006), the “golden” period (2006-2013), the “weakening” period (2013 to present).

Keywords: peace settlement, enduring peace, power-sharing and power dividing, Iraqi Kurdistan.

Procedia PDF Downloads 82
544 Reconsidering Curriculum: Educational Responses for Peace-Building in and outside the Classroom

Authors: S. Roman

Abstract:

This qualitative study used semi-structured interviews with three Canadian educators to examine peace-based pedagogies used in varied teaching contexts and the degree to which the teaching strategies implemented were aligned with goals of peace-keeping, peace-making or peace-building in the classroom. In this research, the teachers’ peace-oriented pedagogy was influenced by various strands of peace education theory, and as such shaped their conceptualization of ‘peace’. The study’s result shows that when educators implemented government-mandated curriculum, they worked around it and/or added content that increased opportunities for democratic peacebuilding. In addition, all three teachers also strengthened their peace-oriented practice by incorporating conflict resolution skills in and outside the classroom to augment a common social-justice oriented goal for peace-making and peace-keeping and made various distinctions around the conditions necessary for peace-building.

Keywords: citizenship, peace-building education, peace-building curriculum, pedagogy

Procedia PDF Downloads 178
543 Conceptualizing Power, Progress and Time: An Essay on Islam and Democracy in the Arab World

Authors: Kechikeche Nabil

Abstract:

The MENA region has undergone many mutations throughout history. The most significant one was, yet, to happen during the colonial era, where the Arab Muslim ‘cosmic’ clock was recalibrated to match a more or less modern perception of time. As for modern civic and political experiences of life, they were left in a state of inertia. This article considers the problematic amalgam of traditional Islam, modernity and democratization in the Arab world, as well as the effects on the configuration of recent progressive endeavours. It is argued that the assimilation of democratic ethos - as a requisite for modernity - depends on the assimilation of power, progress and time, by what is referred to as the Umma. Drawing on postmodern and political literature, it is suggested that because of a conceptualization which draws mainly on traditional Islam, the Umma and the state in the Arab world remain in conflict while, at times, they appear to act collaboratively, either to embrace modernity or to obstruct democratization.

Keywords: Islam, democracy, Arab world, modernity

Procedia PDF Downloads 27
542 Proactive WPA/WPA2 Security Using DD-WRT Firmware

Authors: Mustafa Kamoona, Mohamed El-Sharkawy

Abstract:

Although the latest Wireless Local Area Network technology Wi-Fi 802.11i standard addresses many of the security weaknesses of the antecedent Wired Equivalent Privacy (WEP) protocol, there are still scenarios where the network security are still vulnerable. The first security model that 802.11i offers is the Personal model which is very cheap and simple to install and maintain, yet it uses a Pre Shared Key (PSK) and thus has a low to medium security level. The second model that 802.11i provide is the Enterprise model which is highly secured but much more expensive and difficult to install/maintain and requires the installation and maintenance of an authentication server that will handle the authentication and key management for the wireless network. A central issue with the personal model is that the PSK needs to be shared with all the devices that are connected to the specific Wi-Fi network. This pre-shared key, unless changed regularly, can be cracked using offline dictionary attacks within a matter of hours. The key is burdensome to change in all the connected devices manually unless there is some kind of algorithm that coordinate this PSK update. The key idea of this paper is to propose a new algorithm that proactively and effectively coordinates the pre-shared key generation, management, and distribution in the cheap WPA/WPA2 personal security model using only a DD-WRT router.

Keywords: Wi-Fi, WPS, TLS, DD-WRT

Procedia PDF Downloads 221
541 Role of Judiciary in Developing Countries

Authors: Amir Shafiq, Asif Shahzad, Shabbar Mehmood, Muhammad Saeed, Hamid Mustafa

Abstract:

Administration of justice in a society is evolutionary process. In pre-modern societies vital organs that we consider separate today i.e. legislation, implementation and adjudication were controlled by a King, the sovereign authority. Whereas now it is recognized that Development of a country revolves in seven arenas i.e. Civil Society, Political Society, Economic Society, Legislature, Judiciary, Executive & Bureaucracy. Each society whether developing or developed, has need of institutions and structures that can resolve difference of opinions of private or public nature between contending parties. Administration of justice has a key-role in the development of the society. Through this paper, it is to highlight that an independent judiciary having the support of public opinion therefore is inevitable to wriggle out from such problems in order to restore and protect the fundamental rights, constitution and democratic political system in third world countries like Pakistan.

Keywords: role of judiciary, developing countries, judicial activism, present scenario

Procedia PDF Downloads 377
540 Project Management at University: Towards an Evaluation Process around Cooperative Learning

Authors: J. L. Andrade-Pineda, J.M. León-Blanco, M. Calle, P. L. González-R

Abstract:

The enrollment in current Master's degree programs usually pursues gaining the expertise required in real-life workplaces. The experience we present here concerns the learning process of "Project Management Methodology (PMM)", around a cooperative/collaborative mechanism aimed at affording students measurable learning goals and providing the teacher with the ability of focusing on the weaknesses detected. We have designed a mixed summative/formative evaluation, which assures curriculum engage while enriches the comprehension of PMM key concepts. In this experience we converted the students into active actors in the evaluation process itself and we endowed ourselves as teachers with a flexible process in which along with qualifications (score), other attitudinal feedback arises. Despite the high level of self-affirmation on their discussion within the interactive assessment sessions, they ultimately have exhibited a great ability to review and correct the wrong reasoning when that was the case.

Keywords: cooperative-collaborative learning, educational management, formative-summative assessment, leadership training

Procedia PDF Downloads 157
539 Damages Inflicted on Steel Structures and Metal Buildings due to Insufficient Supervision and Monitoring and Non-Observance of the Rules of the Regulations

Authors: Ehsan Sadie

Abstract:

Despite the experience of heavy losses and damages of recent earthquakes such as 8 km E of Pāhala, Hawaii, 11 km W of Salvaleón de Higüey, Dominican Republic and 49 km SSE of Punta Cana, Dominican Republic earthquakes, the possibility of large earthquakes in most populated areas of any country and the serious need for quality control in the design and implementation of buildings, not enough attention has been paid to the proper construction. Steel structures constitute a significant part of construction in any metropolitan area. This article gives a brief overview of the implementation status of these buildings in urban areas and considers the weaknesses of performance that typically occur due to negligence or insufficient mastery of the building supervisor in the principles of operation of earthquake-resistant buildings, and provides appropriate and possible solutions to improve the construction.

Keywords: bracing member, concentrated load, diaphragm system, earthquake engineering, load-bearing system, shear force, seismic retrofitting, steel building, strip foundation, supervising engineer, vulnerability of building

Procedia PDF Downloads 124
538 A Review of Methods for Handling Missing Data in the Formof Dropouts in Longitudinal Clinical Trials

Authors: A. Satty, H. Mwambi

Abstract:

Much clinical trials data-based research are characterized by the unavoidable problem of dropout as a result of missing or erroneous values. This paper aims to review some of the various techniques to address the dropout problems in longitudinal clinical trials. The fundamental concepts of the patterns and mechanisms of dropout are discussed. This study presents five general techniques for handling dropout: (1) Deletion methods; (2) Imputation-based methods; (3) Data augmentation methods; (4) Likelihood-based methods; and (5) MNAR-based methods. Under each technique, several methods that are commonly used to deal with dropout are presented, including a review of the existing literature in which we examine the effectiveness of these methods in the analysis of incomplete data. Two application examples are presented to study the potential strengths or weaknesses of some of the methods under certain dropout mechanisms as well as to assess the sensitivity of the modelling assumptions.

Keywords: incomplete longitudinal clinical trials, missing at random (MAR), imputation, weighting methods, sensitivity analysis

Procedia PDF Downloads 401
537 The Differences in Normative Beliefs among Schoolchildren with Reactive, Proactive, Reactive-Proactive Aggression, and without Aggression

Authors: Annis Lai Chu Fung

Abstract:

This study is to fill up a research gap on examining the differences in normative beliefs (namely acceptance of weaknesses, acceptance of provoked aggression, and acceptance of unprovoked aggression) among different subtypes of aggressors and non-aggressors (reactive aggressors, proactive aggressors, reactive-proactive aggressors, and non-aggressors,). 2,236 students (1,372 males and 864 females), aged from 11 to 18, completed a self-reported questionnaire. Results revealed that (a) schoolchildren with reactive-proactive aggression have the highest acceptance of provoked aggression, the highest acceptance of unprovoked aggression, and the lowest acceptance of weakness; (b) schoolchildren with proactive aggression have higher acceptance of unprovoked aggression and lower acceptance of weakness than reactive aggressors; and (c) schoolchildren without aggression have the lowest acceptance of provoked aggression, the lowest acceptance of unprovoked aggression, and the highest acceptance of weakness.

Keywords: normative belief, schoolchildren, reactive, proactive, aggression

Procedia PDF Downloads 271
536 Qatari Licensure System: Giving Voice to Educators at Government-Funded Schools

Authors: Abdullah Abu-Tineh, Hissa Sadiq, Fatma Al-Mutawah, Youmen Chabaan

Abstract:

The current study examined the experiences of educators in Qatar with the licensure process currently implemented at government schools. Using a survey study design, a total of 1,669 participants expressed their perceptions on the strengths and weaknesses of the licensure system, the professional standards, and the professional portfolio. Findings included participants’ beliefs on the importance of the licensure system in improving their performance, the necessity of using the professional standards as tools for professional growth and development, the importance of refining the professional portfolio for authenticity and reliability, and the inclusion of multiple sources of evidence, such as classroom observations, interviews, student learning outcomes, and surveys. Documenting teachers’ and school leaders’ voices was fundamental in finding ways to successfully drive future developments of the licensure system. The findings may also provide implications for other countries interested in developing or refining their own appraisal systems.

Keywords: licensure system, educator voice, professional standards, professional portfolio

Procedia PDF Downloads 186
535 The Efficacy of a Student Designed and Led Near Peer Anatomy Teaching

Authors: Mark Heads, Carrie Adamson

Abstract:

Introduction This study evaluated the educational merits of the teaching activities of ‘Sheffield Anatomy Society,’ a student society with minimal faculty oversight which delivers near peer teaching in a range of formats to support students in their revision. Near peer, teaching is defined as teaching delivered by more senior students who have themselves recently completed the course content. This study was conducted between early April and late May 2022. This programme aims to improve student knowledge of anatomy, increase student confidence in their anatomy learning and cultivate a sense of community. The sessions were delivered by more senior medical students and by medical students undertaking an intercalated Master's degree in Human Anatomy with Education. Background: The majority of studies concerning near peer teaching focus on faculty designed programmes. Few studies have examined entirely student led near peer teaching of anatomy. Existing studies have been favourable but have limited qualitative examination of the benefits and weaknesses of near peer teaching. Various drawbacks have been proposed in the literature but not extensively investigated in practice. This study examines student led near peer anatomy teaching across a range of formats and considers these proposed criticisms. Methods: The teaching series consisted of 11 online lectures, a small group teaching session, two in person mock spotter examinations, and an online mock examination. Feedback forms were given for each session, and follow up interviews were conducted. Thematic analysis utilising an interpretivist epistemology was conducted on the feedback form responses and interview transcripts. Findings: 207 first year medical students, 34 second year biomedical science students, and 12 third year biomedical science students completed one or more feedback forms following these sessions, with 875 responses being collected in total. Six interviews were conducted. 99.5% of respondents said that they would recommend these sessions to other students. The quantitative results ranged from a mean of 4.6-4.8/5 per session when asked to rate how useful the students found it. Qualitative: analysis yielded numerous strengths and some weaknesses of the programme. The most commonly cited strength was that students found the explanations readily comprehensible. Students also praised the interactive nature of the sessions, with students frequently saying they felt more able to engage with interactive elements and ask questions in these sessions than in faculty teaching. Students did, however, raise some issues. The most common drawback students mentioned was a desire for more help preparing for their examinations, especially more examination style questions. Criticisms of the teaching itself were less prominent and typically reflected time constraints and limited resources. Conclusions : This study suggests student organised near peer teaching, utilising interactive online lectures, small group teaching, and mock examinations, can be an effective method for supporting students studying anatomy. Students reported improvements in their knowledge as a result of the sessions, greater confidence approaching their examinations, and this programme has helped foster an environment where students feel able to ask questions outside of sessions and even get involved with teaching themselves the following academic year.

Keywords: medical education, near peer teaching, anatomy teaching, online learning

Procedia PDF Downloads 51
534 On the Impracticality of Kierkegaard's Community of Authentic Individuals

Authors: Andrew Ka Pok Tam

Abstract:

Kierkegaard has been misinterpreted as an anti-social philosopher for a long time until in recent years when there are more discussions on his concept of community in Journals and Papers inspired by Karl Bayer. Community which is based upon an individual's relations to others is different from the crowd or the public where the numerical or the majority make decisions. As a result, authenticity is only possible in the community. But Kierkegaard did not explain how we can preserve the individual's authenticity by establishing a community instead of a public in the reality. Kierkegaard was against the democratic reform in 1848 Denmark because he thought all elections mean the majority wins and the authenticity of a single individual would be suppressed. However, Kierkegaard himself does not suggest an alternative political system that may preserve the authenticity of individual. This paper aims to evaluate the possibility for us to establish a Kierkegaadian community in practice so as to preserve every individual's authenticity. This paper argues that the practicality of Kierekegaadian community is limited. In order to have effective communications and relations among individuals, a Kierkegaardian community must be small and inefficient as every individual's must remain authentic in all political decision for the whole community.

Keywords: authenticity, community, individual, kierkegaard

Procedia PDF Downloads 344
533 Continuous Improvement Model for Creative Industries Development

Authors: Rolandas Strazdas, Jurate Cerneviciute

Abstract:

Creative industries are defined as those industries which produce tangible or intangible artistic and creative output and have a potential for income generation by exploitingcultural assets and producing knowledge-based goods and services (both traditional and contemporary). With the emergence of an entire sector of creative industriestriggered by the development of creative products managingcreativity-based business processes becomes a critical issue. Diverse managerial practices and models on effective management of creativity have beenexamined in scholarly literature. Even thoughthese studies suggest how creativity in organisations can be nourished, they do not sufficiently relate the proposed practices to the underlying business processes. The article analyses a range of business process improvement methods such as PDCA, DMAIC, DMADV and TOC. The strengths and weaknesses of these methods aimed to improvethe innovation development process are identified. Based on the analysis of the existing improvement methods, a continuous improvement model was developed and presented in the article.

Keywords: continuous improvement, creative industries, improvement model, process mapping

Procedia PDF Downloads 452
532 Linguistic Identities of Post-Democratic South African Youth

Authors: J. Lück, S. Rudman

Abstract:

Language has long been a site of struggle in South Africa with an educational language policy that favoured English and Afrikaans as high status languages and positioned other language users in deficit ways. Furthermore, a segregationist past led to individuals viewing each other as racial beings and racial categorisations still prevail in private and public life. It has been argued that it is important to explore how South African youth identities are being constructed, if past discourses still shape their identities or if they are negotiating new ways of being. The paper probes the role of language, discourse and embedded ideologies in the persistence or not of youth linguistic identities and discourses, the implications for their lived realities and for their construction of other language users and the possibilities of shifts occurring with an awareness of such discourses. It finds that past discourses continue to shape youth identities and are surging in the light of what is happening in the country today.

Keywords: discourse, ideologies, language, linguistic identities

Procedia PDF Downloads 384
531 Investigation of Failures in Wadi-Crossing Pipe Culverts, Sennar State, Sudan

Authors: Magdi M. E. Zumrawi

Abstract:

Crossing culverts are essential element of rural roads. The paper aims to investigate failures of recently constructed wadi-crossing pipe culverts in Sennar state and provide necessary remedial measures. The investigation is conducted to provide an extensive diagnosis study in order to find out the main structural and hydrological weaknesses of the culverts. Literature of steel pipe culverts related to construction practices and common types of culvert failures and their appropriate mitigation measures were reviewed. A detailed field survey was conducted to detect failures and defects appeared on the existing culverts. The results revealed that seepage of water through the embankment and foundation of the culverts leads to excessive erosion and scouring causing sever failures and damages. The design mistakes and poor construction were detected as the main causes of culverts failures. For sustainability of the culverts, various remedial measures are recommended to be considered in urgent rehabilitation of the existing crossings.

Keywords: culvert, erosion, failure, sustainability

Procedia PDF Downloads 300