Search results for: used personal computer
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 4431

Search results for: used personal computer

1701 Behavioral Experiments of Small Societies in Social Media: Facebook Expressions of Anchored Relationships

Authors: Nuran Öze

Abstract:

Communities and societies have been changing towards computer mediated communication. This paper explores online and offline identities and how relationships are formed and negotiated within internet environments which offer opportunities for people who know each other offline and move into relationships online. The expectations and norms of behavior within everyday life cause people to be embodied self. According to the age categories of Turkish Cypriots, their measurements of attitudes in Facebook will be investigated. Face-to-face field research and semi-structured interview methods are used in the study. Face-to-face interview has been done with Turkish Cypriots who are using Facebook already. According to the study, in constructing a linkage between real and virtual identities mostly affected from societal relations serves as a societal grooming tool for Turkish Cypriots.

Keywords: facebook, identity, social media, virtual reality

Procedia PDF Downloads 291
1700 The Impact of Information and Communications Technology (ICT)-Enabled Service Adaptation on Quality of Life: Insights from Taiwan

Authors: Chiahsu Yang, Peiling Wu, Ted Ho

Abstract:

From emphasizing economic development to stressing public happiness, the international community mainly hopes to be able to understand whether the quality of life for the public is becoming better. The Better Life Index (BLI) constructed by OECD uses living conditions and quality of life as starting points to cover 11 areas of life and to convey the state of the general public’s well-being. In light of the BLI framework, the Directorate General of Budget, Accounting and Statistics (DGBAS) of the Executive Yuan instituted the Gross National Happiness Index to understand the needs of the general public and to measure the progress of the aforementioned conditions in residents across the island. Whereas living conditions consist of income and wealth, jobs and earnings, and housing conditions, health status, work and life balance, education and skills, social connections, civic engagement and governance, environmental quality, personal security. The ICT area consists of health care, living environment, ICT-enabled communication, transportation, government, education, pleasure, purchasing, job & employment. In the wake of further science and technology development, rapid formation of information societies, and closer integration between lifestyles and information societies, the public’s well-being within information societies has indeed become a noteworthy topic. the Board of Science and Technology of the Executive Yuan use the OECD’s BLI as a reference in the establishment of the Taiwan-specific ICT-Enabled Better Life Index. Using this index, the government plans to examine whether the public’s quality of life is improving as well as measure the public’s satisfaction with current digital quality of life. This understanding will enable the government to gauge the degree of influence and impact that each dimension of digital services has on digital life happiness while also serving as an important reference for promoting digital service development. The content of the ICT Enabled Better Life Index. Information and communications technology (ICT) has been affecting people’s living styles, and further impact people’s quality of life (QoL). Even studies have shown that ICT access and usage have both positive and negative impact on life satisfaction and well-beings, many governments continue to invest in e-government programs to initiate their path to information society. This research is the few attempts to link the e-government benchmark to the subjective well-being perception, and further address the gap between user’s perception and existing hard data assessment, then propose a model to trace measurement results back to the original public policy in order for policy makers to justify their future proposals.

Keywords: information and communications technology, quality of life, satisfaction, well-being

Procedia PDF Downloads 333
1699 Behavior of SPEC CPU2006 Based on Optimization Levels

Authors: Faisel Elramalli, Ibrahim Althomali Amjad Sabbagh, Dhananjay Tambe

Abstract:

SPEC CPU benchmarks are used to evaluate the performance of CPUs on computer systems. In our project we are going to use SPEC CPU suite that contains several benchmarks running on two different compilers gcc and icc in different optimizations levels to evaluate the performance of a CPU. The motivation of this project is to find out which compiler and in which optimization level makes the CPU reaches the best performance. The results of that evaluation will help users of these compilers to choose the best compiler and optimization level that perform efficiently for their work. In other words, it will give users the best performance of the CPU while doing their works. This project is interesting since it will provide the method used to measure the performance of CPU and how different optimization levels of compilers can help achieve a higher performance. Moreover, it will give a good understanding of how benchmarks are used to evaluate a CPU performance. For the reader, in reality SPEC CPU benchmarks are used to measure the performance of new released CPUs to be compared to other CPUs.

Keywords: SPEC, CPU, GCC, ICC, copilers

Procedia PDF Downloads 469
1698 Infection Control Drill: To Assess the Readiness and Preparedness of Staffs in Managing Suspected Ebola Patients in Tan Tock Seng Hospital Emergency Department

Authors: Le Jiang, Chua Jinxing

Abstract:

Introduction: The recent outbreak of Ebola virus disease in the west Africa has drawn global concern. With a high fatality rate and direct human-to-human transmission, it has spread between countries and caused great damages for patients and family who are affected. Being the designated hospital to manage epidemic outbreak in Singapore, Tan Tock Seng Hospital (TTSH) is facing great challenges in preparation and managing of potential outbreak of emerging infectious disease such as Ebola virus disease. Aim: We conducted an infection control drill in TTSH emergency department to assess the readiness of healthcare and allied health workers in managing suspected Ebola patients. It also helps to review current Ebola clinical protocol and work instruction to ensure more smooth and safe practice in managing Ebola patients in TTSH emergency department. Result: General preparedness level of staffs involved in managing Ebola virus disease in TTSH emergency department is not adequate. Knowledge deficits of staffs on Ebola personal protective equipment gowning and degowning process increase the risk of potential cross contamination in patient care. Loopholes are also found in current clinical protocol, such as unclear instructions and inaccurate information, which need to be revised to promote better staff performance in patient management. Logistic issues such as equipment dysfunction and inadequate supplies can lead to ineffective communication among teams and causing harm to patients in emergency situation. Conclusion: The infection control drill identified the need for more well-structured and clear clinical protocols to be in place to promote participants performance. In addition to quality protocols and guidelines, systemic training and annual refresher for all staffs in the emergency department are essential to prepare staffs for the outbreak of Ebola virus disease. Collaboration and communication with allied health staffs are also crucial for smooth delivery of patient care and minimising the potential human suffering, properties loss or injuries caused by disease. Therefore, more clinical drills with collaboration among various departments involved are recommended to be conducted in the future to monitor and assess readiness of TTSH emergency department in managing Ebola virus disease.

Keywords: ebola, emergency department, infection control drill, Tan Tock Seng Hospital

Procedia PDF Downloads 101
1697 Human Rights on Digital Platforms

Authors: Niina Meriläinen

Abstract:

Digital platforms are arenas for dialogue, various kinds of political debates, information and news gathering, policymaking, and social change processes. Human rights serve as examples of social and political issues that are universally noted as principles and yet often violated on digital platforms as well as in the analog world. Digital platforms in this study are different Internet sites, blogs, discussion platforms, social media apps, and gaming. Various actors, from human rights activists and non-governmental organizations to individual people, governments, and corporations, use digital platforms along with analog arenas to discuss and defend human rights, while violators can find new victims and continue violating rights on the same platforms. Digital platforms create opportunities for various women and minorities to empower themselves and others and to be active in various arenas of society and policymaking. At the same time, digital platforms pose threats to human rights globally, especially to women, girls, and minorities. The results of this meta-study of n=120 academic case studies indicate that more research is needed to determine the framework of human rights and human rights on digital platforms. A broad discussion must be had on what human rights require in the digital realm and how ICTs may enhance or threaten our ability to respect, protect, and fulfill a wide variety of human rights while various digital platforms pose multiple threats to human rights. This relates to the willingness of political decision-makers to act upon various crimes committed on and with online platforms. More research is needed to determine the framework of digital human rights and human rights on digital platforms in relation to political communication and decision-making. It is important to develop a framework in which these are defined. It must be discussed who participates in this process: those whose rights are violated, companies that profit by selling our personal data, activists, governments, and some unknown actors. In the end, the question comes back to who has the power to define what we talk about, when, and where. This use of power plays a big role. Digital platforms illustrate the darker side of technological progress, which, on the one hand, has given various people the possibility to engage in society, empower themselves, and take ownership of their rights globally. At the same time, the platforms enable others to use the same platforms to find victims, abuse them, and exploit them. Bullying, harassment, and violence are rampant on various digital platforms, where minorities and people with limited support are victims. There is indeed a need for a discussion of normative values in the era of fake news, the power of influencers, Trumpism, and institutionalized disregard for human rights, gender equality, and the elimination of gender-based violence online. Attention and obligations must be placed on politicians and internet architecture, such as corporations, and their roles in human rights and their violations online.

Keywords: human rights, digital platforms, violations, internet, social media

Procedia PDF Downloads 34
1696 Effect of Hybrid Learning in Higher Education

Authors: A. Meydanlioglu, F. Arikan

Abstract:

In recent years, thanks to the development of information and communication technologies, the computer and internet have been used widely in higher education. Internet-based education is impacting traditional higher education as online components increasingly become integrated into face-to-face (FTF) courses. The goal of combined internet-based and traditional education is to take full advantage of the benefits of each platform in order to provide an educational opportunity that can promote student learning better than can either platform alone. Research results show that the use of hybrid learning is more effective than online or FTF models in higher education. Due to the potential benefits, an increasing number of institutions are interested in developing hybrid courses, programs, and degrees. Future research should evaluate the effectiveness of hybrid learning. This paper is designed to determine the impact of hybrid learning on higher education.

Keywords: e-learning, higher education, hybrid learning, online education

Procedia PDF Downloads 881
1695 Mobile Technology Use by People with Learning Disabilities: A Qualitative Study

Authors: Peter Williams

Abstract:

Mobile digital technology, in the form of smart phones, tablets, laptops and their accompanying functionality/apps etc., is becoming ever more used by people with Learning Disabilities (LD) - for entertainment, to communicate and socialize, and enjoy self-expression. Despite this, there has been very little research into the experiences of such technology by this cohort, it’s role in articulating personal identity and self-advocacy and the barriers encountered in negotiating technology in everyday life. The proposed talk describes research funded by the British Academy addressing these issues. It aims to explore: i) the experiences of people with LD in using mobile technology in their everyday lives – the benefits, in terms of entertainment, self-expression and socialising, and possible greater autonomy; and the barriers, such as accessibility or usability issues, privacy or vulnerability concerns etc. ii) how the technology, and in particular the software/apps and interfaces, can be improved to enable the greater access to entertainment, information, communication and other benefits it can offer. It is also hoped that results will inform parents, carers and other supporters regarding how they can use the technology with their charges. Rather than the project simply following the standard research procedure of gathering and analysing ‘data’ to which individual ‘research subjects’ have no access, people with Learning Disabilities (and their supporters) will help co-produce an accessible, annotated and hyperlinked living e-archive of their experiences. Involving people with LD as informants, contributors and, in effect, co-researchers will facilitate digital inclusion and empowerment. The project is working with approximately 80 adults of all ages who have ‘mild’ learning disabilities (people who are able to read basic texts and write simple sentences). A variety of methods is being used. Small groups of participants have engaged in simple discussions or storytelling about some aspect of technology (such as ‘when my phone saved me’ or ‘my digital photos’ etc.). Some individuals have been ‘interviewed’ at a PC, laptop or with a mobile device etc., and asked to demonstrate their usage and interests. Social media users have shown their Facebook pages, Pinterest uploads or other material – giving them an additional focus they have used to discuss their ‘digital’ lives. During these sessions, participants have recorded (or employed the researcher to record) their observations on to the e-archive. Parents, carers and other supporters are also being interviewed to explore their experiences of using mobile technology with the cohort, including any difficulties they have observed their charges having. The archive is supplemented with these observations. The presentation will outline the methods described above, highlighting some of the special considerations required when working inclusively with people with LD. It will describe some of the preliminary findings and demonstrate the e-archive with a commentary on the pages shown.

Keywords: inclusive research, learning disabilities, methods, technology

Procedia PDF Downloads 210
1694 Cigarette Smoke Detection Based on YOLOV3

Authors: Wei Li, Tuo Yang

Abstract:

In order to satisfy the real-time and accurate requirements of cigarette smoke detection in complex scenes, a cigarette smoke detection technology based on the combination of deep learning and color features was proposed. Firstly, based on the color features of cigarette smoke, the suspicious cigarette smoke area in the image is extracted. Secondly, combined with the efficiency of cigarette smoke detection and the problem of network overfitting, a network model for cigarette smoke detection was designed according to YOLOV3 algorithm to reduce the false detection rate. The experimental results show that the method is feasible and effective, and the accuracy of cigarette smoke detection is up to 99.13%, which satisfies the requirements of real-time cigarette smoke detection in complex scenes.

Keywords: deep learning, computer vision, cigarette smoke detection, YOLOV3, color feature extraction

Procedia PDF Downloads 70
1693 Usability Issues of Smart Phone Applications: For Visually Challenged People

Authors: Anam Ashraf, Arif Raza

Abstract:

In this era of globalization, adoption of technology is quite difficult for people with physical disabilities compared to people with normal abilities. The advancement in mobile based accessible applications has opened up several different avenues for the visually challenged across the globe. Smartphones applications are not very common for blind people, but they access and use these applications in their daily lives to some extent. Several smartphone applications have a number of usability issues for the visually impaired. In this paper, we evaluate the usability of various android and iPhone applications for blind people through analysis and surveys. This paper aspires to provide guidance in order to increase smartphone application accessibility for the visually impaired. An abstract application design is also proposed to overcome usability issues in smartphone applications for visually challenged people.

Keywords: eyes-free shell, human computer interaction, usability engineering, visually challenged

Procedia PDF Downloads 347
1692 Interoperability Model Design of Smart Grid Power System

Authors: Seon-Hack Hong, Tae-Il Choi

Abstract:

Interoperability is defined as systems, components, and devices developed by different entities smoothly exchanging information and functioning organically without mutual consultation, being able to communicate with each other and computer systems of the same type or different types, and exchanging information or the ability of two or more systems to exchange information and use the information exchanged without extra effort. Insufficiencies such as duplication of functions when developing systems and applications due to lack of interoperability in the electric power system and low efficiency due to a lack of mutual information transmission system between the inside of the application program and the design is improved, and the seamless linkage of newly developed systems is improved. Since it is necessary to secure interoperability for this purpose, we designed the smart grid-based interoperability standard model in this paper.

Keywords: interoperability, power system, common information model, SCADA, IEEE2030, Zephyr

Procedia PDF Downloads 103
1691 Stress Solitary Waves Generated by a Second-Order Polynomial Constitutive Equation

Authors: Tsun-Hui Huang, Shyue-Cheng Yang, Chiou-Fen Shieha

Abstract:

In this paper, a nonlinear constitutive law and a curve fitting, two relationships between the stress-strain and the shear stress-strain for sandstone material were used to obtain a second-order polynomial constitutive equation. Based on the established polynomial constitutive equations and Newton’s second law, a mathematical model of the non-homogeneous nonlinear wave equation under an external pressure was derived. The external pressure can be assumed as an impulse function to simulate a real earthquake source. A displacement response under nonlinear two-dimensional wave equation was determined by a numerical method and computer-aided software. The results show that a suit pressure in the sandstone generates the phenomenon of stress solitary waves.

Keywords: polynomial constitutive equation, solitary, stress solitary waves, nonlinear constitutive law

Procedia PDF Downloads 478
1690 Simulation-Based Unmanned Surface Vehicle Design Using PX4 and Robot Operating System With Kubernetes and Cloud-Native Tooling

Authors: Norbert Szulc, Jakub Wilk, Franciszek Górski

Abstract:

This paper presents an approach for simulating and testing robotic systems based on PX4, using a local Kubernetes cluster. The approach leverages modern cloud-native tools and runs on single-board computers. Additionally, this solution enables the creation of datasets for computer vision and the evaluation of control system algorithms in an end-to-end manner. This paper compares this approach to method commonly used Docker based approach. This approach was used to develop simulation environment for an unmanned surface vehicle (USV) for RoboBoat 2023 by running a containerized configuration of the PX4 Open-source Autopilot connected to ROS and the Gazebo simulation environment.

Keywords: cloud computing, Kubernetes, single board computers, simulation, ROS

Procedia PDF Downloads 59
1689 Forensic Investigation: The Impact of Biometric-Based Solution in Combatting Mobile Fraud

Authors: Mokopane Charles Marakalala

Abstract:

Research shows that mobile fraud has grown exponentially in South Africa during the lockdown caused by the COVID-19 pandemic. According to the South African Banking Risk Information Centre (SABRIC), fraudulent online banking and transactions resulted in a sharp increase in cybercrime since the beginning of the lockdown, resulting in a huge loss to the banking industry in South Africa. While the Financial Intelligence Centre Act, 38 of 2001, regulate financial transactions, it is evident that criminals are making use of technology to their advantage. Money-laundering ranks among the major crimes, not only in South Africa but worldwide. This paper focuses on the impact of biometric-based solutions in combatting mobile fraud at the South African Risk Information. SABRIC had the challenges of a successful mobile fraud; cybercriminals could hijack a mobile device and use it to gain access to sensitive personal data and accounts. Cybercriminals are constantly looting the depths of cyberspace in search of victims to attack. Millions of people worldwide use online banking to do their regular bank-related transactions quickly and conveniently. This was supported by the SABRIC, who regularly highlighted incidents of mobile fraud, corruption, and maladministration in SABRIC, resulting in a lack of secure their banking online; they are vulnerable to falling prey to fraud scams such as mobile fraud. Criminals have made use of digital platforms since the development of technology. In 2017, 13 438 instances involving banking apps, internet banking, and mobile banking caused the sector to suffer gross losses of more than R250,000,000. The final three parties are forced to point fingers at one another while the fraudster makes off with the money. A non-probability sampling (purposive sampling) was used in selecting these participants. These included telephone calls and virtual interviews. The results indicate that there is a relationship between remote online banking and the increase in money-laundering as the system allows transactions to take place with limited verification processes. This paper highlights the significance of considering the development of prevention mechanisms, capacity development, and strategies for both financial institutions as well as law enforcement agencies in South Africa to reduce crime such as money-laundering. The researcher recommends that strategies to increase awareness for bank staff must be harnessed through the provision of requisite training and to be provided adequate training.

Keywords: biometric-based solution, investigation, cybercrime, forensic investigation, fraud, combatting

Procedia PDF Downloads 75
1688 Plantation Forests Height Mapping Using Unmanned Aerial System

Authors: Shiming Li, Qingwang Liu, Honggan Wu, Jianbing Zhang

Abstract:

Plantation forests are useful for timber production, recreation, environmental protection and social development. Stands height is an important parameter for the estimation of forest volume and carbon stocks. Although lidar is suitable technology for the vertical parameters extraction of forests, but high costs make it not suitable for operational inventory. With the development of computer vision and photogrammetry, aerial photos from unmanned aerial system can be used as an alternative solution for height mapping. Structure-from-motion (SfM) photogrammetry technique can be used to extract DSM and DEM information. Canopy height model (CHM) can be achieved by subtraction DEM from DSM. Our result shows that overlapping aerial photos is a potential solution for plantation forests height mapping.

Keywords: forest height mapping, plantation forests, structure-from-motion photogrammetry, UAS

Procedia PDF Downloads 266
1687 Engaging Women Entrepreneurs in School Adolescent Health Program to Ensure Menstrual Hygiene Management in Rural Bangladesh

Authors: Toslim Uddin Khan, Jesmin Akter, Mohiuddin Ahmed

Abstract:

Menstrual hygiene management (MHM) and personal health-care practice is a critical issue to prevent morbidity and other reproductive health complications among adolescent girls in Bangladesh. Inadequate access to water, sanitation and hygiene (WASH) facilities lead to unhealthy MHM practices that resulted in poor reproductive health outcomes. It is evident from different studies that superstitions and misconception are more common in rural communities that limit young girls’ access to and understanding of the menstrual hygiene and self care practices. The state-of-the-art approach of Social Marketing Company (SMC) is proved to be instrumental in delivering reinforcing health messages, making public health and hygiene products available at the door steps of the community through community mobilization programs in rural Bangladesh. School health program is one of the flagship interventions of SMC to equip adolescent girls and boys with correct knowledge of health and hygiene practices among themselves, their families and peers. In Bangladeshi culture, adolescent girls often feel shy to ask fathers or male family members about buying sanitary napkin from local pharmacy and they seem to be reluctant to seek help regarding their menstrual problems. A recent study reveals that 48% adolescent girls are using sanitary napkins while majority of them are unaware of menstrual hygiene practices in Bangladesh. Under school adolescent program, SMC organizes health education sessions for adolescent girls from grade seven to ten using enter-educate approach with special focus on sexual and reproductive health and menstrual hygiene issues including delaying marriage and first pregnancy. In addition, 2500 rural women entrepreneurs branded as community sales agents are also involved in disseminating health messages and selling priority health products including sanitary napkin at the household level. These women entrepreneurs are serving as a source of sustainable supply of the sanitary napkins for the rural adolescent girls and thereby they are earning profit margins on the sales they make. A recent study on the impact of adolescent program activities reveals that majority (71%) of the school adolescent girls are currently using sanitary napkins. Health education equips and empowers adolescent girls with accurate knowledge about menstrual hygiene practices and self-care as well. Therefore, engagement of female entrepreneurs in school adolescent health program at the community level is one of the promising ways to improve menstrual hygiene practices leading to increased use of sanitary napkin in rural and semi-rural communities in Bangladesh.

Keywords: school adolescent program, social marketing, women entrepreneurs, menstrual hygiene management

Procedia PDF Downloads 175
1686 Examining the Importance of the Structure Based on Grid Computing Service and Virtual Organizations

Authors: Sajjad Baghernezhad, Saeideh Baghernezhad

Abstract:

Vast changes and developments achieved in information technology field in recent decades have made the review of different issues such as organizational structures unavoidable. Applying informative technologies such as internet and also vast use of computer and related networks have led to new organizational formations with a nature completely different from the traditional, great and bureaucratic ones; some common specifications of such organizations are transfer of the affairs out of the organization, benefiting from informative and communicative networks and centered-science workers. Such communicative necessities have led to network sciences development including grid computing. First, the grid computing was only to relate some sites for short – time and use their sources simultaneously, but now it has gone beyond such idea. In this article, the grid computing technology was examined, and at the same time, virtual organization concept was discussed.

Keywords: grid computing, virtual organizations, software engineering, organization

Procedia PDF Downloads 313
1685 Real Time Multi Person Action Recognition Using Pose Estimates

Authors: Aishrith Rao

Abstract:

Human activity recognition is an important aspect of video analytics, and many approaches have been recommended to enable action recognition. In this approach, the model is used to identify the action of the multiple people in the frame and classify them accordingly. A few approaches use RNNs and 3D CNNs, which are computationally expensive and cannot be trained with the small datasets which are currently available. Multi-person action recognition has been performed in order to understand the positions and action of people present in the video frame. The size of the video frame can be adjusted as a hyper-parameter depending on the hardware resources available. OpenPose has been used to calculate pose estimate using CNN to produce heap-maps, one of which provides skeleton features, which are basically joint features. The features are then extracted, and a classification algorithm can be applied to classify the action.

Keywords: human activity recognition, computer vision, pose estimates, convolutional neural networks

Procedia PDF Downloads 122
1684 Struggles of Non-Binary People in an Organizational Setting in Iceland

Authors: Kevin Henry

Abstract:

Introduction: This research identifies the main struggles of non-binary people in an organizational setting using the ZMET – method of in-depth interviews. The research was done in Iceland, a country that is repeatedly listed in the top countries for gender equality and found three main categories of non-binary struggles in organizations. These categories can be used to improve organizational non-binary inclusion. Aim: The main questions this paper will answer are: Which unique obstacles are non-binary people facing in their daily organizational life? Which organizational and individual measures help with more inclusion of non-binary people? How can organizational gender equality measures be made more inclusive of non-binary issues? Background: Even though gender equality is a much-researched topic, the struggles of non-binary people are often overlooked in gender equality research. Additionally, non-binary and transgender people are frequently researched together, even though their struggles can be very different. Research focused on non-binary people is, in many cases, done on a more structural or organizational level with quantitative data such as salary or position within an organization. This research focuses on the individual and their struggles with qualitative data to derive measures for non-binary inclusion and equality. Method: An adapted approach of the ZMET-Method (Zaltman Metaphor Elicitation Technique) will be used, during which in-depth interviews are held with individuals, utilizing pictures as a metaphorical starting point to discuss their main thoughts and feelings on being non-binary in an organizational setting. Interviewees prepared five pictures, each representing one key thought or feeling about their organizational life. The interviewer then lets the interviewee describe each picture and asks probing questions to get a deeper understanding of each individual topic. This method helps with a mostly unbiased data collection process by only asking probing questions during the interview and not leading the interviewee in any certain direction. Results: This research has identified three main categories of struggles non-binary people are facing in an organizational setting: internal (personal) struggles, external struggles and structural struggles. Internal struggles refer to struggles that originate from the person themselves (e.g., struggles with their own identity). External struggles refer to struggles from the outside (e.g. harassment from coworkers, exclusion). Structural struggles refer to struggles that are built into the organizational policy or facilities (e.g. restrooms, gendered language). Conclusion: This study shows that there are many struggles for non-binary people in organizations and that even in countries that pride themselves on being progressive and having a high level of gender equality, there is still much to be done for non-binary inclusion. Implications for Organizations: Organizations that strive to improve the inclusion of all genders should pay attention to how their structures are built, how their training is conducted, and how their policies affect people of various genders. Simple changes like making restrooms gender-neutral and using neutral language in company communications are good examples of small structural steps for more inclusion.

Keywords: gender equality, non-binary, organizations, ZMET

Procedia PDF Downloads 22
1683 Nature Manifestations: An Archetypal Analysis of Selected Nightwish Songs

Authors: Suzanne Strauss, Leandi Steenkamp

Abstract:

The Finnish symphonic metal band Nightwish is the brainchild of songwriter and lyricist TuomasHolopainen and the band recorded their first demonstration recording in 1996. The band has since produced nine full-length studio albums, the most recent being the 2020 album Human. :||: Nature., and has reached massive international success. The band is well known for songs about fantasy and escapism and employs many sonic, visual and branding tools and techniques to communicate these constructs to the audience. Among these, is the band’s creation of the so-called “Nightwish world and mythology” with a set of recurring characters and narratives which, in turn, creates a psychological anchor and safe space for Nightwish fans around the globe. Nature and the reverence of nature are central themes in Nightwish’s self-created mythology.Swiss psychologist Carl Jung’s theory of the collective unconscious identified a mysterious reservoir of psychological constructs common to all people, being derived from ancestral memory and experience, common to all humankind, and distinct from the individual’s personal unconscious. Furthermore, he defined archetypes as timeless collective patterns and images that springs forth from the collective unconscious. Archetypes can be actualized when they enter consciousness as images in interaction with the outside world. Archetypal patterns or images can manifest in different ways across world cultures, but follow common patterns, also known as archetypal themes and symbols. The Jungian approach to the psyche places great emphasis on nature, positing a direct link betweenthe concept of wholeness and responsible care for nature and the environment.In our proposed paper, we examine, by means of thematic content analysis, how Nightwish makes use of archetypal themes and symbols referring to nature and the environment in selected songs from their ninth full-length album Human. II Nature. Furthermore, we argue that the longing for and reverence of nature in selected Nightwish songs may serve as a type of “social intervention” and social critique on modern capitalist society. The type of social critique that the band offers is generally connoted intertextually and is not equally explicit in their songs. The band uses a unique combination of escapism, fantasy, and nature narratives to inspire a sense of wonder, enchantment, and magic in the listener. In this way, escapism, fantasy, and nature serve as postmodern frames of reference that aim to “re-enchant” the disenchanted and de-spiritualized. In this way, re-enchantment could also refer to spiritual and/or psychological healing and rebirth.

Keywords: archetypes, metal music, nature, Nightwish, social interventions

Procedia PDF Downloads 95
1682 Violence against Women: A Study on the Aggressors' Profile

Authors: Giovana Privatte Maciera, Jair Izaías Kappann

Abstract:

Introduction: The violence against woman is a complex phenomenon that accompanies the woman throughout her life and is a result of a social, cultural, political and religious construction, based on the differences among the genders. Those differences are felt, mainly, because of the patriarchal system that is still present which just naturalize and legitimate the asymmetry of power. As consequence of the women’s lasting historical and collective effort for a legislation against the impunity of violence against women in the national scenery, it was ordained, in 2006, a law known as Maria da Penha. The law was created as a protective measure for women that were victims of violence and consequently for the punishment of the aggressor. Methodology: Analysis of police inquiries is established by the Police Station of Defense of the Woman of Assis city, by formal authorization of the justice, in the period of 2013 to 2015. For the evaluating of the results will be used the content analysis and the theoretical referential of Psychoanalysis. Results and Discussion: The final analysis of the inquiries demonstrated that the violence against women is reproduced by the society and the aggressor, in most cases it is a member of their own family, mainly the current or former-spouse. The most common kinds of aggression were: the threat bodily harm, and the physical violence, that normally happens accompanied by psychological violence, being the most painful for the victims. The biggest part of the aggressors was white, older than the victim, worker and had primary school. But, unlike the expected, the minority of the aggressors were users of alcohol and/or drugs and possessed children in common with the victim. There is a contrast among the number of victims who already admitted have suffered some type of violence earlier by the same aggressor and the number of victims who has registered the occurrence before. The aggressors often use the discourse of denial in their testimony or try to justify their act like the blame was of the victim. It is believed in the interaction of several factors that can influence the aggressor to commit the abuse, including psychological, personal and sociocultural factors. One hypothesis is that the aggressor has a violence history in the family origin. After the aggressor being judged, condemned or not, usually there is no rehabilitation plan or supervision that enable his change. Conclusions: It has noticed the importance of studying the aggressor’s characteristics and the reasons that took him to commit such violence, making possible the implementation of an appropriate treatment to prevent and reduce the aggressions, as well the creation of programs and actions that enable communication and understanding concerning the theme. This is because the recurrence is still high, since the punitive system is not enough and the law is still ineffective and inefficient in certain aspects and in its own functioning. It is perceived a compulsion in repeat so much for the victims as for the aggressors, because they end involving, almost always, in disturbed and violent relationships, with the relation of subordination-dominance as characteristic.

Keywords: aggressors' profile, gender equality, Maria da Penha law, violence against women

Procedia PDF Downloads 318
1681 Developing a Culturally Adapted Family Intervention for Relatives Living with Schizophrenia in Oman

Authors: Aziza Al-Sawafi

Abstract:

Introduction: The evidence of family interventions in schizophrenia is robust primarily in high-income settings. However, they have been adapted to other settings and cultures to improve effectiveness and acceptability. In Oman, there is limited integration of psychosocial interventions in the treatment of schizophrenia. Therefore, the adaptation of family intervention to the Omani culture may facilitate its uptake. Most service users in Oman live with their families outside the healthcare system, and nothing is known about their experience, needs, or resources. Furthermore, understanding caregivers' and mental health professionals' preferences, perceptions, and experience is a fundamental element in the process of intervention development. Therefore, this study aims to develop a culturally sensitive, feasible, and acceptable family intervention for relatives living with schizophrenia in Oman. Method: The Medical Research Council's framework for the evaluation of complex health care interventions provided the conceptual structure for the study. The development phase was carried out, which involved three stages: 1) systematically reviewing the available literature regarding culturally adapted family interventions in the Arab world 2) In-depth interviews with caregivers to explore their experience and perceived needs and preferences regarding intervention 3) A focus group study involving health professionals to explore the acceptability and feasibility of delivering the family intervention in the Omani context. Data synthesis determined the design of the proposed intervention according to the findings obtained from the previous stages. Results: Stage one: The systematic review found limited evidence of culturally-adapted family interventions in the Arab region. However, the cultural adaptation process was comprehensive, and the implementation was reported to be feasible and acceptable. Stage two: The experience of family caregivers illuminated four main themes: burden, stigma, violence, and family needs. Burdens of care included objective and subjective burdens, positive feelings, and coping mechanisms. Caregivers gave their opinion about the content and preference of the intervention from their personal experiences. Stage three: mental health professionals discussed the delivery system of the intervention from a clinical standpoint concerning issues and barriers to implementation. They recommended modifications to the components of the intervention to ensure its acceptability and feasibility in the local setting. Data synthesis was carried out, and the intervention was designed. Conclusion: This study provides evidence of the potential applicability and acceptability of a culturally sensitive family intervention for families of individuals with schizophrenia in Oman. However, more work needs to be done to test the feasibility of the study and overcome the practical challenges.

Keywords: cultural-adaptation, family intervention, Oman, schizophrenia

Procedia PDF Downloads 129
1680 Food Insecurity Among Afghan Women Refugees in Pakistan

Authors: Farhana Nosheen, Maleeha Fatima

Abstract:

This study on Afghan refugee women living in Punjab, Pakistan, shows a strong relationship between poor socio-economic status and lower nutritional health status. Pakistan is one of the significant countries accepting refugees from the Afghan war. Universally, refugees are vulnerable to food security and basic life necessities. The in-hand study aimed to investigate food insecurity among afghan refugees who recently migrated to Pakistan. Purposive sampling technique was employed to collect the data from afghan women refugees settled in refugee camp settled in Capital city Islamabad, Pakistan. Data was collected through an interview tool. It revealed from data that the majority of women were underweight, about 74.7% in their reproductive years, which is an alarming situation for the forthcoming children and families. It is also shown that There’s a strong impact of their income level, education, dietary habits and food insecurity on their overall health status. It can also be observed in their Body Mass Index and in their physical appearance; they also show extremely poor levels of hemoglobin which is directly indicated anemic condition, especially iron deficiency anemia among the young Afghan refugee women. The illiteracy rate is about 93.33% among the selected participants as well as a majority of this population has 10-12 family size in comparison with their income level of about 10,000-15,000 Pakistani rupees per month, which can hardly meet their daily food expenditure. Adequate food is rarely accessible to young girls and women due to fewer national and international food aids program available in Pakistan. The majority have pale yellowish skin color (due to low iron content) along with clear white eyes (low hemoglobin level), thin hairs (protein deficiency) and spoon-shaped nails (a direct indicator of low iron level). Data showed a significant relation between appetite and BMI as their appetite is very low, which is directly indicated in their underweight body condition. About 56.67% of the participants had Urinary Tract Infections. The main causes included personal unhygienic conditions and lack of washrooms as well as drinking water facilities in their refugee camps. It is suggested that National and international food aid programs should cater to the nutritional demands of women refugees in the world to protect them from food insecurities as well as future researchers should find out better ways of analysis and treatment plans for such kind of communities who are highly prone to nutritional deficiencies and lack of basic supplies.

Keywords: food insecurity, refugees, women, vulnerable

Procedia PDF Downloads 85
1679 Establishing the Optimum Location of a Single Tower Crane Using a Smart Mathematical Model

Authors: Yasser Abo El-Magd, Wael Fawzy Mohamed

Abstract:

Due to the great development in construction and building field, there are many projects and huge works appeared which consume many construction materials. Accordingly, that causes difficulty in handling traditional transportation means (ordinary cranes) due to their limited capacity; there is an urgent need to use high capacity cranes such as tower cranes. However, with regard to their high expense, we have to take into consideration selecting what type of cranes to be utilized which has been discussed by many researchers. In this research, a proposed technique was created to select the suitable type of crane and the best place for crane erection, in addition to minimum radius for requested crane in order to minimize cost. To fulfill that target, a computer program is designed to numerate these problems, demonstrating an example explaining how to apply program and the result donated the best place.

Keywords: tower crane, jib length, operating time, location, feasible area

Procedia PDF Downloads 199
1678 Optimization of Hydraulic Fracturing for Horizontal Wells in Enhanced Geothermal Reservoirs

Authors: Qudratullah Muradi

Abstract:

Geothermal energy is a renewable energy source that can be found in abundance on our planet. Only a small fraction of it is currently converted to electrical power, though in recent years installed geothermal capacity has increased considerably all over the world. In this paper, we assumed a model for designing of Enhanced Geothermal System, EGS. We used computer modeling group, CMG reservoir simulation software to create the typical Hot Dry Rock, HDR reservoir. In this research two wells, one injection of cold water and one production of hot water are included in the model. There are some hydraulic fractures created by the mentioned software. And cold water is injected in order to produce energy from the reservoir. The result of injecting cold water to the reservoir and extracting geothermal energy is defined by some graphs at the end of this research. The production of energy is quantified in a period of 10 years.

Keywords: geothermal energy, EGS, HDR, hydraulic fracturing

Procedia PDF Downloads 173
1677 Cybercrime: International Police Cooperation with Europol

Authors: Daniel Suarez Alonso

Abstract:

Cybercrime is a growing international threat and a challenge for law enforcement agencies and judicial systems worldwide. International cooperation is necessary to solve this problem because cybercrime knows no borders and often involves multiple jurisdictions, being related to organised crime. The purpose of this article is to analyse international cooperation in the investigation and prosecution of cybercrime, focusing on the framework of the Regulation of the European Union Agency for Law Enforcement Cooperation (EUROPOL), cooperation that takes place between police authorities from different countries. It examines the legal and operational mechanisms in place to facilitate international cooperation in Europe in this area and assesses their effectiveness in the fight against cybercrime. In addition, the study of a Spanish investigation where cooperation with EUROPOL took place will be examined, analyzing how international cooperation was carried out to investigate and track down criminals. Lessons learned from this case will be discussed and recommendations for improving international cooperation in the fight against cybercrime will be proposed.

Keywords: Europol, international cooperation, cybercrime, computer crime, law

Procedia PDF Downloads 54
1676 20 Definitions in 20 Years: Exploring the Evolution of Blended Learning Definitions from 2003-2022

Authors: Damian Gordon, Paul Doyle, Anna Becevel, Tina Baloh

Abstract:

The goal of this research is to explore the evolution of the concept of “blended learning” over a twenty-year period, to see whether or not the conceptualization has remained consistent or if it has become either more specific or more general. To achieve this goal, the term “blended learning” (and variations) was searched for in various bibliographical repositories for each year 2003-2022 to locate a highly cited paper that is not behind a paywall, to locate unique definitions that would be freely available to all academics each year. Each of the twenty unique definitions is explored to identify how they categorize both the Classroom Component and the Computer Component of blended learning, as well as identify which discipline each definition originates from and which country it comes from to see if there are any significant geographical variations. Based on this analysis, trends that appear in the definitions are noted, as well as an overall interpretation of the notion of “Blended Learning.”

Keywords: blended learning, definitions of blended learning, e-learning, thematic searches

Procedia PDF Downloads 111
1675 The Effect of Mamanet Cachibol League on Psychosomatic Symptoms, Eating Habits, and Social Support among Arab Women: A Mixed Methods Study

Authors: Karin Eines, Riki Tesler

Abstract:

Introduction: The Mamanet Cachibol League (MCL) is a community-based model developed in Israel to promote physical activity (PA) and amateur team sports among women. team sports are not just groups in the context of specific sport activity but also incorporated into a person’s sense of self and become influencing factor on sport-related behavior among the players. While in the non-Arabic sector, sport venues are available for the local authority population, the Arabic sector authorities face limited access sport facilities, with 168 sport venues and authorities with no venues at all. Within the Arab community, women participation in sports has traditionally been limited and, even more so for participation in team sports. Aims: The purpose of the study was to explore attributes of women MCL activity via: (1) assess differences between participants in the MCL and non-participants among Arab women regarding well-being level; (2) to examine among MCL participants the relationship between health maintenance characteristics and the likelihood of participating in the MCL; and (3) Use qualitative approach to shed light over the question why Arabic women participate in MCL and continue their engagement in PA. Methods: An explanatory sequential mixed-method design was employed to gain a deeper understanding of the advantages and motivations among women participating in community-based team sports. A cross-sectional survey was conducted among Israeli Arab women aged 25–59. Demographic characteristics, well-being (SRH and psychosomatic symptoms), eating habits, and social support were analyzed using two-way analyses of covariance and multiple regression models with a sequential entry of the variables. Quantitative results were further explored in qualitative in-depth interviews among 30 of the MCL participants, which shed light on additional reasons for participation in PA. Results: MCL participants reported better self-reported health (p < 0.001) and lower rates of psychosomatic symptoms (p < 0.001) compared to non-participants. Participation in MCL was also related to higher levels of well-being and healthy eating habits. Women who participated also experienced a profound sense of belonging, leading to enhanced social interactions and positivity in their personal and professional lives. They were dedicated to the group and felt empowered by the reciprocal commitment. The group promoted equality, making the women feel valued and respected, resulting in community admiration. Their involvement positively impacted their families, justifying their time commitment.

Keywords: wellbeing, obesity, community based sports, healthy eating habits, arab women

Procedia PDF Downloads 62
1674 Youth Health Promotion Project for Indigenous People in Canada: Together against Bullying and Cyber-Dependence

Authors: Mohamed El Fares Djellatou, Fracoise Filion

Abstract:

The Ashukin program that means bridge in Naskapi or Atikamekw language, has been designed to offer a partnership between nursing students and an indigenous community. The students design a health promotion project tailored to the needs of the community. The issues of intimidation in primary school and cyber-dependence in high school were some concerns in a rural Atikamekw community. The goal of the project was to have a conversation with indigenous youths, aged 10-16 years old, on the challenges presented by intimidation and cyber dependence as well as promoting healthy relationships online and within the community. Methods: Multiple progressive inquiry questions (PIQs) were used to assess the feasibility and importance of this project for the Atikamekw nation, and to determine a plan to follow. The theoretical foundations to guide the conception of the project were the Population Health Promotion Model (PHPM), the First Nations Holistic Lifelong Learning Model, and the Medicine Wheel. A broad array of social determinants of health were addressed, including healthy childhood development, personal health practices, and coping skills, and education. The youths were encouraged to participate in interactive educational sessions, using PowerPoint presentations and pamphlets as the main effective strategies. Additional tools such as cultural artworks and physical activities were introduced to strengthen the inter-relational and team spirit within the Indigenous population. A quality assurance tool (QAT) was developed specifically to determine the appropriateness of these health promotion tools. Improvements were guided by the feedback issued by the indigenous schools’ teachers and social workers who filled the QATs. Post educational sessions, quantitative results have shown that 93.48% of primary school students were able to identify the different types of intimidation, 72.65% recognized more than two strategies, and 52.1% were able to list at least four resources to diffuse intimidation. On the other hand, around 75% of the adolescents were able to name at least three negative effects, and 50% listed three strategies to reduce cyber-dependence. This project was meant to create a bridge with the First Nation through health promotion, a population that is known to be disadvantaged due to systemic health inequity and disparities. Culturally safe care was proposed to deal with the two identified priority issues, and an educational toolkit was given to both schools to ensure the sustainability of the project. The project was self-financed through fundraising activities, and it yielded better results than expected.

Keywords: indigenous, first nation, bullying, cyber-dependence, internet addiction, intimidation, youth, adolescents, school, community nursing, health promotion

Procedia PDF Downloads 84
1673 UniFi: Universal Filter Model for Image Enhancement

Authors: Aleksei Samarin, Artyom Nazarenko, Valentin Malykh

Abstract:

Image enhancement is becoming more and more popular, especially on mobile devices. Nowadays, it is a common approach to enhance an image using a convolutional neural network (CNN). Such a network should be of significant size; otherwise, a possibility for the artifacts to occur is overgrowing. The existing large CNNs are computationally expensive, which could be crucial for mobile devices. Another important flaw of such models is they are poorly interpretable. There is another approach to image enhancement, namely, the usage of predefined filters in combination with the prediction of their applicability. We present an approach following this paradigm, which outperforms both existing CNN-based and filter-based approaches in the image enhancement task. It is easily adaptable for mobile devices since it has only 47 thousand parameters. It shows the best SSIM 0.919 on RANDOM250 (MIT Adobe FiveK) among small models and is thrice faster than previous models.

Keywords: universal filter, image enhancement, neural networks, computer vision

Procedia PDF Downloads 86
1672 Psychopathic Manager Behavior and the Employee Workplace Deviance: The Mediating Role of Revenge Motive, the Moderating Roles of Core Self-Evaluations and Attitude Importance

Authors: Sinem Bulkan

Abstract:

This study introduces the construct of psychopathic manager behaviour and aims for the development of psychopathic manager behaviour (Psycho-Man B) measure. The study also aims for the understanding of the relationship between psychopathic manager behaviour and workplace deviance while investigating the mediating role of a revenge motive and the moderating roles of the core self-evaluations and the attitude importance. Data were collected from 519 employees from a wide variety of jobs and industries who currently work for or previously worked for a manager in a collectivist culture, Turkey. Psycho-Man B Measure was developed resulting in five dimensions as opposed to the proposed ten dimensions. Simple linear and hierarchical regression analyses were conducted to test the hypotheses. The results of simple linear regression analyses showed that psychopathic manager behaviour was positively significantly related to supervisor-directed and organisation-directed deviance. Revenge motive towards the manager partially mediated the relationship between psychopathic manager behaviour and supervisor-directed deviance. Similarly, revenge motive towards the organisation partially mediated the relationship between psychopathic manager behaviour and organisation-directed deviance. Furthermore, no support was found for the expected moderating role of core self-evaluations in the revenge motive towards the manager-supervisor-directed deviance and revenge motive towards the organisation-organisation-directed deviance relationships. Attitude importance moderated the relationship between revenge motive towards the manager and supervisor-directed deviance; revenge motive towards the organisation and organisation-directed deviance. Moderated-mediation hypotheses were not supported for core self-evaluations but were supported for the attitude importance. Additional analyses for sub-dimensions were conducted to further examine the hypotheses. Demographic variables were examined through independent samples t-tests, and one way ANOVA. Finally, findings are discussed; limitations, suggestions and implications are presented. The major contribution of this study is that ‘psychopathic manager behaviour’ construct was introduced to the literature and a scale for the reliable identification of psychopathic manager behaviour was developed in to evaluate managers’ level of sub-clinical psychopathy in the workforce. The study introduced that employees engage in different forms of supervisor-directed deviance and organisation-directed deviance depending on the level of the emotions and personal goals. Supervisor-directed deviant behaviours and organisation-directed deviant behaviours became distinct in a way as impulsive and premeditated, active or passive, direct and indirect actions. Accordingly, it is important for organisations to notice that employees’ level of affective state and attitude importance for psychopathic manager behaviours predetermine the certain type of employee deviant behaviours.

Keywords: attitude importance, core self evaluations, psychopathic manager behaviour, revenge motive, workplace deviance

Procedia PDF Downloads 249