Search results for: security experiences
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 5406

Search results for: security experiences

2616 Autonomic Management for Mobile Robot Battery Degradation

Authors: Martin Doran, Roy Sterritt, George Wilkie

Abstract:

The majority of today’s mobile robots are very dependent on battery power. Mobile robots can operate untethered for a number of hours but eventually they will need to recharge their batteries in-order to continue to function. While computer processing and sensors have become cheaper and more powerful each year, battery development has progress very little. They are slow to re-charge, inefficient and lagging behind in the general progression of robotic development we see today. However, batteries are relatively cheap and when fully charged, can supply high power output necessary for operating heavy mobile robots. As there are no cheap alternatives to batteries, we need to find efficient ways to manage the power that batteries provide during their operational lifetime. This paper proposes the use of autonomic principles of self-adaption to address the behavioral changes a battery experiences as it gets older. In life, as we get older, we cannot perform tasks in the same way as we did in our youth; these tasks generally take longer to perform and require more of our energy to complete. Batteries also suffer from a form of degradation. As a battery gets older, it loses the ability to retain the same charge capacity it would have when brand new. This paper investigates how we can adapt the current state of a battery charge and cycle count, to the requirements of a mobile robot to perform its tasks.

Keywords: autonomic, self-adaptive, self-optimising, degradation

Procedia PDF Downloads 378
2615 Understanding Human Rights Violations in the Fight against Boko Haram: A Historical Perspective

Authors: Anthony Mpiani

Abstract:

Recent media and NGO reports suggest that human rights violations have been a salient characteristic of the government Joint Task Force (JTF) in the war on Boko Haram. However, there has been relatively scant scholarly engagement with the forms of abuses committed by the JTF against civilians and why such human rights violations occur. The focus of this paper is to analyse the various human rights violations committed by JTF in the war against Boko Haram. Employing a historical approach, it argues that the JTF's human rights violations is shaped by the philosophy of colonial policing in Nigeria. Consequently, the failure of successive post-colonial governments to ideologically transform policing is accountable for the human rights abuses being witnessed in Nigeria today. A philosophical transformation in Nigeria's security forces especially the police and military is a prerequisite for ending human rights abuses in the fight against Boko Haram.

Keywords: colonialism, policing, joint task force, counterinsurgency, Boko Haram, human rights violations

Procedia PDF Downloads 158
2614 Medical Error: Concept and Description According to Brazilian Physicians

Authors: Vitor S. Mendonca, Maria Luisa S. Schmidt

Abstract:

The Brazilian medical profession is viewed as being error-free, so healthcare professionals who commit an error are condemned there. Medical errors occur frequently in the Brazilian healthcare system, so identifying better options for handling this issue has become of interest primarily for physicians. The purpose of this study is to better understand the tensions involved in the fear of making an error due to the harm and risk this would represent for those involved. A qualitative study was performed by means of the narratives of the lived experiences of ten acting physicians in the State of Sao Paulo. The concept and characterization of errors were discussed, together with the fear of making an error, the near misses or error in itself, how to deal with errors and what to do to avoid them. The analysis indicates an excessive pressure in the medical profession for error-free practices, with a well-established physician-patient relationship to facilitate the management of medical errors. The error occurs, but a lack of information and discussion often leads to its concealment due to fear or possible judgment by society or peers. The establishment of programs that encourage appropriate medical conduct in the event of an error requires coherent answers for humanization in Brazilian medical science. It is necessary to improve the discussion about medical errors and disseminate models of communication and notification of errors in Brazil.

Keywords: medical error, narrative, physician-patient relationship, qualitative research

Procedia PDF Downloads 176
2613 The Analysis of One Million Reddit Confessions Corpus: The Use of Emotive Verbs and First Person Singular Pronoun as Linguistic Psychotherapy Features

Authors: Natalia Wojarnik

Abstract:

The paper aims to present the analysis of a Reddit confessions corpus. The interpretation focuses on the use of emotional language, in particular emotive verbs, in the context of personal pronouns. The analysis of the linguistic properties answers the question of what the Reddit users confess about and who is the subject of confessions. The study reveals that the specific language patterns used in Reddit confessions reflect the language of depression and the language used by patients during different stages of their psychotherapy sessions. The paper concludes that Reddit users are more willing to confess about their own experiences, not rarely very private and intimate, extensively using the first person singular pronoun I. It indicates that the Reddit users use the language of depression and the language used by psychotherapy patients. The language they use is very emotionally impacted and includes many emotive verbs such as want, feel, need, hate, love. This finding in Reddit confessions correlates with the extensive use of stative affective verbs in the first stages of the psychotherapy sessions. Lastly, the paper refers to the positive and negative lexicon and helps determine how online posts can serve as a depression detector and “talking cure” for the users.

Keywords: confessions, emotional language, emotive verbs, pronouns, first person pronoun, language of depression, depression detection, psychotherapy language

Procedia PDF Downloads 117
2612 Japanese and Europe Legal Frameworks on Data Protection and Cybersecurity: Asymmetries from a Comparative Perspective

Authors: S. Fantin

Abstract:

This study is the result of the legal research on cybersecurity and data protection within the EUNITY (Cybersecurity and Privacy Dialogue between Europe and Japan) project, aimed at fostering the dialogue between the European Union and Japan. Based on the research undertaken therein, the author offers an outline of the main asymmetries in the laws governing such fields in the two regions. The research is a comparative analysis of the two legal frameworks, taking into account specific provisions, ratio legis and policy initiatives. Recent doctrine was taken into account, too, as well as empirical interviews with EU and Japanese stakeholders and project partners. With respect to the protection of personal data, the European Union has recently reformed its legal framework with a package which includes a regulation (General Data Protection Regulation), and a directive (Directive 680 on personal data processing in the law enforcement domain). In turn, the Japanese law under scrutiny for this study has been the Act on Protection of Personal Information. Based on a comparative analysis, some asymmetries arise. The main ones refer to the definition of personal information and the scope of the two frameworks. Furthermore, the rights of the data subjects are differently articulated in the two regions, while the nature of sanctions take two opposite approaches. Regarding the cybersecurity framework, the situation looks similarly misaligned. Japan’s main text of reference is the Basic Cybersecurity Act, while the European Union has a more fragmented legal structure (to name a few, Network and Information Security Directive, Critical Infrastructure Directive and Directive on the Attacks at Information Systems). On an relevant note, unlike a more industry-oriented European approach, the concept of cyber hygiene seems to be neatly embedded in the Japanese legal framework, with a number of provisions that alleviate operators’ liability by turning such a burden into a set of recommendations to be primarily observed by citizens. With respect to the reasons to fill such normative gaps, these are mostly grounded on three basis. Firstly, the cross-border nature of cybercrime brings to consider both magnitude of the issue and its regulatory stance globally. Secondly, empirical findings from the EUNITY project showed how recent data breaches and cyber-attacks had shared implications between Europe and Japan. Thirdly, the geopolitical context is currently going through the direction of bringing the two regions to significant agreements from a trade standpoint, but also from a data protection perspective (with an imminent signature by both parts of a so-called ‘Adequacy Decision’). The research conducted in this study reveals two asymmetric legal frameworks on cyber security and data protection. With a view to the future challenges presented by the strengthening of the collaboration between the two regions and the trans-national fashion of cybercrime, it is urged that solutions are found to fill in such gaps, in order to allow European Union and Japan to wisely increment their partnership.

Keywords: cybersecurity, data protection, European Union, Japan

Procedia PDF Downloads 119
2611 The Use of Cross-cultural Approaches (CCAs) in Psychotherapy in Addressing Mental Health Issues Amongst Women of Ethnic Minority

Authors: Adaku Thelma Olatise

Abstract:

Mental health disparities among women from diverse ethnic, cultural, and religious backgrounds remain a pressing concern, particularly as current psychotherapeutic models often fail to address the unique challenges these groups face. This is of particular concern since epidemiological studies across various countries and cultures consistently demonstrate higher prevalence rates of common mental disorders amongst these groups of women because of a lack of access to culturally oriented psychotherapeutic services. This literature review aims to examine how CCAs in psychotherapy can address the specific ethnic, cultural, and religious challenges women encounter in accessing mental health care. A search of relevant articles was conducted through PsycARTICLES and PubMed databases, using terms such as ‘mental health’, ‘women’, ‘culture’, and ‘ethnic minorities’. Supplementary searches on Google Scholar were also performed to capture literature not covered by traditional databases. While the importance of cross-cultural approaches in psychotherapy has become more apparent because people from diverse ethnic backgrounds inevitably perceive the world through different lenses, influencing their interpretations of human behavior and norms, there is a notable gap in the literature in understanding the influences of using of CCAs in psychotherapy amongst women of an ethnic minority. This gap not only reflects a poor understanding of the complex stressors faced by these women—such as familial, communal, and societal expectations—but also highlights the lack of support and culturally adapted interventions available to them. Even though scholars have posited that aligning treatment approaches with patients' cultural backgrounds is important to enhance therapeutic effectiveness, and the acknowledgment of culture is crucial in psychotherapy theory and practice. As well as the increasing global focus on psychotherapy applications that integrate non-Western practices, such as spiritual healing and community-based interventions, the adaptation of these approaches in mainstream mental health care has remained limited. This review found that the expectations and experiences of ethnic minority women were heavily influenced by family and community pressures. However, there were limited evidence-based, culturally oriented psychotherapeutic interventions tailored to ethnic minority women. This gap extends to inadequate representation of minority groups in clinical research, as well as a lack of culturally validated mental health outcome measures. Furthermore, studies have shown that psychotherapeutic models have largely been Western-oriented and Euro-centric because of socially constructed hierarchies. The origin of psychology from the Western world has predominantly reflected Western cultural traditions, shaped by historical, linguistic, and sociopolitical influences. These factors have led to a lack of recognition of therapeutic approaches from minority ethnic groups and the biases that emanate from hegemonic cultural beliefs and power dynamics influence the decisions about which psychotherapeutic modalities to integrate and practice. Therefore, this plethora of factors adds to the challenges women from ethnically and culturally diverse backgrounds face in accessing mental health services at the individual, familial, community, and societal levels. In conclusion, a cross-cultural approach is urgently needed within psychotherapy to address these challenges, ensuring that treatment frameworks are both culturally sensitive and gender responsive. Only by considering the lived experiences of minority women, particularly in relation to their cultural and religious contexts, can mental health services provide the appropriate care necessary to support their well-being.

Keywords: mental health, women, culture, ethnicity

Procedia PDF Downloads 13
2610 Discussion of Leadership Styles and Performance Management in MNEs

Authors: Yin-Tsuo Huang

Abstract:

Most leadership theories focus on leader's development. However, in reality, the led is also very important in the leadership process. Development relates to ensure the individual to grow in the skills, knowledge, and abilities to perform at leaders’ highest possible level now and for the future. The topic area of the relationships among leadership styles, subordinate maturity, and information distinction was identified because it is a practical problem and personal experiences occurring in multinational enterprises. Some questions to be answered through this critical analysis of the literature are: (1) What are the effective leadership styles in the leader-member and member-member relationships? (2) How do the subordinates react to leaders’ managerial style? (3) What are the relationships among leadership styles, subordinate maturity, and resulting information distinction? (4) What kinds of information distinction effects the relationships between leadership styles and subordinate maturity? (5) Where do leaders and subordinates can get information, and how? (6) In what areas are leaders’ or subordinates’ knowledge weakest, and how can they get others to prove the information they need? (7) How important is that information to the subordinates? (8) Do the leaders keep too much information for their subordinates because it is inconvenient? The main purpose of this review is to explore the theoretical and empirical literature about the relationships among leadership style, subordinates maturity, and information distinction implications in multinational Taiwanese organizations to identify areas of future scholarly inquiry.

Keywords: leadership style, subordinate maturity, information distinction, multinational organization

Procedia PDF Downloads 505
2609 Four Phase Methodology for Developing Secure Software

Authors: Carlos Gonzalez-Flores, Ernesto Liñan-García

Abstract:

A simple and robust approach for developing secure software. A Four Phase methodology consists in developing the non-secure software in phase one, and for the next three phases, one phase for each of the secure developing types (i.e. self-protected software, secure code transformation, and the secure shield). Our methodology requires first the determination and understanding of the type of security level needed for the software. The methodology proposes the use of several teams to accomplish this task. One Software Engineering Developing Team, a Compiler Team, a Specification and Requirements Testing Team, and for each of the secure software developing types: three teams of Secure Software Developing, three teams of Code Breakers, and three teams of Intrusion Analysis. These teams will interact among each other and make decisions to provide a secure software code protected against a required level of intruder.

Keywords: secure software, four phases methodology, software engineering, code breakers, intrusion analysis

Procedia PDF Downloads 395
2608 Creating a Professional Knowledge Base for Multi-Grade Teaching: Case Studies

Authors: Matshidiso Joyce Taole, Linley Cornish

Abstract:

Teacher’s professional knowledge has become the focus of interest over decades and the interest has intensified in the 21st century. Teachers are expected to develop their professional academic expertise continually, on an ongoing basis. Such professional development may relate to acquiring enhanced expertise in terms of leadership, curriculum development, teaching and learning, assessment of/for learning and feedback for enhanced learning. The paper focuses on professional knowledge base required for teachers in multi-grade contexts. This paper argues that although teacher knowledge is strongly related to individual experiences and contexts, there are elements of teacher knowledge that are particular to multi-grade context. The study employed qualitative design using interviews and observations. The participants were multi-grade teachers and teaching principals. The study revealed that teachers need to develop skills such as learner grouping, differentiating the curriculum, planning, time management and be life-long learners so that they stay relevant and up to date with developments not only in the education sector but globally. This will help teachers to learn increasingly sophisticated methods for engaging the diverse needs of students in their classrooms.

Keywords: curriculum differentiation, multi-grade, planning, teacher knowledge

Procedia PDF Downloads 412
2607 Fetal Movement Study Using Biomimics of the Maternal March

Authors: V. Diaz, B. Pardo , D. Villegas

Abstract:

In premature births most babies have complications at birth, these complications can be reduced, if an atmosphere of relaxation is provided and is also similar to intrauterine life, for this, there are programs where their mothers lull and sway them; however, the conditions in which they do so and the way in they do it may not be the indicated. Here we describe an investigation based on the biomimics of the kinematics of human fetal movement, which consists of determining the movements that the fetus experiences and the deformations of the components that surround the fetus during a gentle walk at week 32 of the gestation stage. This research is based on a 3D model that has the anatomical structure of the pelvis, fetus, muscles, uterus and its most important supporting elements (ligaments). Normal load conditions are applied to this model according to the stage of gestation and the kinematics of a gentle walk of a pregnant mother, which focuses on the pelvic bone, this allows to receive a response from the other elements of the model. To accomplish this modeling and subsequent simulation Solidworks software was used. From this analysis, the curves that describe the movement of the fetus at three different points were obtained. Additionally, we could found the deformation of the uterus and the ligaments that support it, showing the characteristics that these tissues can have in the face of the support of the fetus. These data can be used for the construction of artifacts that help the normal development of premature infants.

Keywords: simulation, biomimic, uterine model, fetal movement study

Procedia PDF Downloads 163
2606 Open Minds but Closed Access: Why Are There so Few Gold Open Access LIS Journals And Why Are so Many Librarians Unwilling to Unlock Their Scholarship?

Authors: Sarah Baker, Jayati Chaudhuri

Abstract:

Librarians have embraced the open access movement in all disciplines but their own. They are strong advocates on college campuses and curate institutional repositories, yet there are surprisingly few open access LIS journals. Presenters evaluated the open access availability of library and information science literature. After analyzing the top 100 library science journals (the top 50 journals from Scimago and JCR) and finding very few gold open access journals, they then investigated the availability of open access articles from the top 10 closed access journals. Presenters would like to generate a conversation on what type of proactive approach librarians can take to increase open access to literature within our discipline. Librarians like their colleagues in other disciplines are not motivated to submit their articles to their institutional repositories. Presenters have found a similar reluctance from their fellow colleagues regarding open access initiatives on campus. Presenters will describe Open Access Week activities as part of a campus-wide initiative and share some faculty comments, concerns, and misconceptions that came up as a part of this dialog. Presenters will discuss their personal experiences providing access to faculty publications through the California State University Los Angeles institutional repository.

Keywords: faculty scholarship, institutional repositories, library and information science journals, open access

Procedia PDF Downloads 328
2605 Sociocultural Barriers to the Development of Autonomous Foreign Language Learning: Some Teaching Strategies to Overcome Such Challenges in a Mexican Context

Authors: Zaideth Zobeida Ponce Alonso, Laura Emilia Fierro Lopez, Maria del Rocio Dominguez Gaona

Abstract:

The present study is part of the Master in Modern Languages at the Universidad Autónoma de Baja California, and it aims to analyze how the sociocultural background might influence the development of learner autonomy in foreign language education in order to propose some strategies to overcome such challenges. Given the lack of research on the sociocultural barriers in learner autonomy in a Mexican context and the need to hear teachers’ voices about this issue, qualitative data was obtained from semi-structured interviews with six language teachers on their perspectives on learner autonomy, its application to the language classroom, and their experiences with Mexican and foreign learners/contexts in order to find out differences regarding learner autonomy. The results suggest three main sociocultural characteristics: preference for an authority figure, tendency towards collectivism, and low tolerance of ambiguity. Finally, nine strategies were proposed in order to help language teachers to deal with such sociocultural characteristics when fostering learner autonomy in the border city of Mexicali, where this study was carried out.

Keywords: learner autonomy, Mexican context, sociocultural influence, teachers' perspectives, teaching strategies

Procedia PDF Downloads 154
2604 Online Social Network Vital to Hospitality and Tourism Marketing and Management

Authors: Nureni Asafe Yekini, Olawale Nasiru Lawal, Bola Dada, Gabriel Adeyemi Okunlola

Abstract:

This study is focused on the strengths and challenges associated with using the online social network as a rapidly evolving medium in marketing tourism services and businesses among the youths in Nigeria. The paper examines the Nigerian tourists’ attitude, mainly towards three aspects: application of Internet for travel and tourism; usage of online social networks in sharing travel and tourism experiences; and trust in electronic-media for marketing tourism businesses and services. The aim of this research is to determine the level of application of internet tools in marketing tourism businesses and services in Nigeria. This study reports an empirical analysis based on data obtained from a survey among 1004 Nigerian tourists. The outcome confirms the research hypothesis and points to crucial importance of introducing online social network site for marketing tourism businesses and services in Nigeria, and increasing the awareness for Nigeria as a tourist destination. Moreover, the paper strongly recommends the use of online social network as a tool for marketing tourism businesses and services, and the need for identifying effective framework for application of ICT tools in marketing tourism businesses and services in Nigeria at large.

Keywords: tourism business, internet, online social networks, tourism services, ICT

Procedia PDF Downloads 353
2603 Revolutionizing Accounting: Unleashing the Power of Artificial Intelligence

Authors: Sogand Barghi

Abstract:

The integration of artificial intelligence (AI) in accounting practices is reshaping the landscape of financial management. This paper explores the innovative applications of AI in the realm of accounting, emphasizing its transformative impact on efficiency, accuracy, decision-making, and financial insights. By harnessing AI's capabilities in data analysis, pattern recognition, and automation, accounting professionals can redefine their roles, elevate strategic decision-making, and unlock unparalleled value for businesses. This paper delves into AI-driven solutions such as automated data entry, fraud detection, predictive analytics, and intelligent financial reporting, highlighting their potential to revolutionize the accounting profession. Artificial intelligence has swiftly emerged as a game-changer across industries, and accounting is no exception. This paper seeks to illuminate the profound ways in which AI is reshaping accounting practices, transcending conventional boundaries, and propelling the profession toward a new era of efficiency and insight-driven decision-making. One of the most impactful applications of AI in accounting is automation. Tasks that were once labor-intensive and time-consuming, such as data entry and reconciliation, can now be streamlined through AI-driven algorithms. This not only reduces the risk of errors but also allows accountants to allocate their valuable time to more strategic and analytical tasks. AI's ability to analyze vast amounts of data in real time enables it to detect irregularities and anomalies that might go unnoticed by traditional methods. Fraud detection algorithms can continuously monitor financial transactions, flagging any suspicious patterns and thereby bolstering financial security. AI-driven predictive analytics can forecast future financial trends based on historical data and market variables. This empowers organizations to make informed decisions, optimize resource allocation, and develop proactive strategies that enhance profitability and sustainability. Traditional financial reporting often involves extensive manual effort and data manipulation. With AI, reporting becomes more intelligent and intuitive. Automated report generation not only saves time but also ensures accuracy and consistency in financial statements. While the potential benefits of AI in accounting are undeniable, there are challenges to address. Data privacy and security concerns, the need for continuous learning to keep up with evolving AI technologies, and potential biases within algorithms demand careful attention. The convergence of AI and accounting marks a pivotal juncture in the evolution of financial management. By harnessing the capabilities of AI, accounting professionals can transcend routine tasks, becoming strategic advisors and data-driven decision-makers. The applications discussed in this paper underline the transformative power of AI, setting the stage for an accounting landscape that is smarter, more efficient, and more insightful than ever before. The future of accounting is here, and it's driven by artificial intelligence.

Keywords: artificial intelligence, accounting, automation, predictive analytics, financial reporting

Procedia PDF Downloads 66
2602 Learners as Consultants: Knowledge Acquisition and Client Organisations-A Student as Producer Case Study

Authors: Barry Ardley, Abi Hunt, Nick Taylor

Abstract:

As a theoretical and practical framework, this study uses the student-as-producer approach to learning in higher education, as adopted by the Lincoln International Business School, University of Lincoln, UK. Students as producer positions learners as skilled and capable agents, able to participate as partners with tutors in live research projects. To illuminate the nature of this approach to learning and to highlight its critical issues, the authors report on two guided student consultancy projects. These were set up with the assistance of two local organisations in the city of Lincoln, UK. Using the student as a producer model to deliver the projects enabled learners to acquire and develop a range of key skills and knowledge not easily accessible in more traditional educational settings. This paper presents a systematic case study analysis of the eight organising principles of the student-as-producer model, as adopted by university tutors. The experience of tutors implementing students as producers suggests that the model can be widely applied to benefit not only the learning and teaching experiences of higher education students and staff but additionally a university’s research programme and its community partners.

Keywords: consultancy, learning, student as producer, research

Procedia PDF Downloads 78
2601 Cross-Cultural Competence Development through 'Learning by Reflection': A Case Study of Chinese International Students Learning through Taking Part-Time Jobs in the UK

Authors: Xin Zhao

Abstract:

The project aims to expand the notion of narrative learning and address the importance of learning by reflection in our learning and teaching context at a British university. Drawing on the key concepts such as development ZPD, transition and reflection-in and –on-action, this project analyses the learning experiences of a small sample of Chinese postgraduate students in a British University, who use part-time job experience to develop cross-cultural communication skills. The project adopts a mixed methods approach. Questionnaires and focus group interviews are used to examine the way in which students adapt (or not adapt) to the culture of learning in a British university and develop a renewed sense of self in transitions from one culture to the other. The project also looks at how the students appropriate opportunities for learning not just from classrooms but outside classrooms from everyday encounters. The project aims to address the implication of learning by reflection as development in transition. Time in and for learning, or duration, is taken for granted in theorising narrative learning. The project shall explore this very issue of time in relation to learning by reflection in considering time in/of/for learning as duration.

Keywords: cross-cultural competence, learning by refection, international student transition, part-time work experience

Procedia PDF Downloads 181
2600 Synthesis of Highly Valuable Fuel Fractions from Waste Date Seeds Oil

Authors: Farrukh Jamil, Ala'A H. Al-Muhtaseb, Lamya Al-Haj, Mohab A. Al-Hinai

Abstract:

Environmental problems and the security of energy supply have motivated the attention in the expansion of alternatives for fossil based fuels. Biomass has been recognized as a capable resource because it is plentifully available and in principle carbon dioxide neutral. Present study focuses on utilization date seeds oil for synthesizing high value fuels formulations such as green diesel and jet fuel. The hydrodeoxygenation of date seeds oil occurred to be highly efficient at following operating conditions temperature 300°C pressure 10bar with continuous stirring at 500 rpm. Products characterization revealed the efficiency of hydrodeoxygenation by formation of linear hydrocarbons (paraffin) in larger fraction. Based on the type of components in product oil it was calculated that maximum fraction lies within the range of green diesel 72.78 % then jet fuel 28.25 % by using Pt/C catalyst. It can be concluded that waste date seeds oil has potential to be used for obtaining high value products.

Keywords: date seeds, hydrodeoxygenation, paraffin, deoxygenation

Procedia PDF Downloads 261
2599 Trauma-Informed Applied Theatre: Using Performance to Connect with Mental Dysfunction Using Physical Embodiment Begins with Ancient Civilizations

Authors: Stephanie Elizabeth Talder

Abstract:

Art therapy is a field that is growing exponentially with new groundbreaking discoveries that allow for embodying trauma and mental healing. Applied theatre and performance is a continuously growing and developing field that can help people who are struggling to work through traumatic experiences plaguing their life. By using performance, there is an ability to target sensitive topics in a manner that does not lead to re-traumatization. The use of theatre as a healing agent has been going on for centuries, with clear applications beginning in Greek theatre and tragedy. When working with complex mental illness, issues such as PTSD, anxiety, and depression can be managed and worked through. A central component of drama therapy is the connection to community and self. The ability to connect mind-body to stories as well as to other people allows for healing to occur. There is the opportunity for healing through emotional catharsis and community building. Applied theatre in connection to the medical field can allow for there to be a meaningful impact made on mental health. Though there is still a significant amount of progress to be made within the stigmatization of mental health problems, bringing in a varying option that allows for there to be movement and community building possesses a strong ability to impact people in a positive way.

Keywords: applied theatre, drama therapy, art therapy, performance, theatre

Procedia PDF Downloads 84
2598 The Experience of Grandparenthood among Grandparents of Children with Autism in the Arab–Bedouin Society

Authors: Binoun Chaki Hagar

Abstract:

Studies have investigated grandparents' perceptions relating to their grandchildren with disabilities. Literature on grandparenthood focuses on the Western grandparents. Autism within the Arab populations has also being investigated. Moreover, the Bedouin population can also be seen in various studies related to different experiences and different perceptions about disabilities in general and among children in particular. However, as far as we know, no studies were found on grand parenting a child with autism in Bedouin society. This study combines three areas of knowledge, to create another knowledge domain. The aim of this study was to learn about the experience of grand parenting an autistic child in the Bedouin Arab society, to examine how it affects the grandparents' relationships, feelings, and functioning within the family, and as individuals, as well as to examine their coping mechanisms and their social support networks. This study is significant and as it examines autism and grandparents among the Bedouin Arab population in Israel, a population that has unique socio-demographic, cultural and traditional characteristics. The study revealed three themes concerning the meaning of grandparenthood to be associated with family continuity, how autism is perceived, and the importance of religion. It also suggests another category – the status of the elderly in the Arab-Bedouin family. It is recognized that the role of the elderly is held in high esteem, and can be affected by the grandchild’s’ autism.

Keywords: Arab–Bedouin family, autism, grandparents, family relationships

Procedia PDF Downloads 288
2597 Herbal Medicines Used for the Cure of Jaundice among the Some Tribal Populations of Madhya Pradesh, India

Authors: Awdhesh Narayan Sharma

Abstract:

The use of herbal medicines for the cure of various ailments among the tribal population is as old as human origin itself. Most of the tribal populations of Madhya Pradesh inhabit in remote and inaccessible ecological setup. From long back, tribals and forests are interrelated to each other. They use an enormous range of wild plants for their basic needs and medicines. The tribal developed a unique understanding with wild plants, herbs, etc., and earned specialized knowledge of disease pattern and curative therapy-through hard experiences, common sense, trial, and error methods. They have passed this knowledge through traditions, taboos, totems, folklore by words of mouth from generation to generation. Here, an attempt has been made to study the possible aspects of herbal medicine for the cure of Jaundice among the tribal populations of Madhya Pradesh, India, through primary data as well as available secondary data. The data have been collected from the 305 Bharias of Patalkot, Madhya Pradesh, India, and included available secondary source of data by various investigators. It may be concluded that a sizable herbal medicinal plants' wealth exists in Madhya Pradesh, India, which still awaits for scientific exploration. The existing herbal medicines used for the cure of jaundice need an extensive investigation from the pharmaceutical point of view.

Keywords: Bharias, herbal medicine, tribal, Madhya Pradesh

Procedia PDF Downloads 172
2596 A Research and Application of Feature Selection Based on IWO and Tabu Search

Authors: Laicheng Cao, Xiangqian Su, Youxiao Wu

Abstract:

Feature selection is one of the important problems in network security, pattern recognition, data mining and other fields. In order to remove redundant features, effectively improve the detection speed of intrusion detection system, proposes a new feature selection method, which is based on the invasive weed optimization (IWO) algorithm and tabu search algorithm(TS). Use IWO as a global search, tabu search algorithm for local search, to improve the results of IWO algorithm. The experimental results show that the feature selection method can effectively remove the redundant features of network data information in feature selection, reduction time, and to guarantee accurate detection rate, effectively improve the speed of detection system.

Keywords: intrusion detection, feature selection, iwo, tabu search

Procedia PDF Downloads 525
2595 Comparison the Energy Consumption with Sustainability in Campus: Case Study of Four American Universities

Authors: Bifeng Zhu, Zhekai Wang, Chaoyang Sun, Bart Dewancker

Abstract:

Under the tide of promoting sustainable development in the world, American universities that have been committed to sustainable practice and innovation, not only have its sustainable campus construction been in the forefront of the world, but also have developed STARS (The Sustainability Tracking, Assessment & Rating System), which is widely used in the world and highly recognized. At the same time, in the process of global sustainable campus construction, energy problem is often regarded as one of the most important sustainable aspects, even equivalent to the sustainability of campus. Therefore, the relationship between campus energy and sustainability is worth discussing. In this study, four American universities with the highest level evaluated by STARS are selected as examples to compare and analyze the campus energy consumption and the use of new energy, GHG emissions and the overall sustainability of the campus, in order to explore the relationship between campus energy and sustainable construction. It is found that the advantages of sustainable campus construction in the United States are mainly focused on the "software" of management, education, activities, etc. Although different energy-saving measures have been taken in campus energy, the construction results are quite different. Moreover, as an important aspect of sustainable campus, energy can not fully represent the sustainability of campus, but because of the various measures it takes, it can greatly promote the sustainable construction of the whole campus. These measures and construction experiences are worthy of summary and promotion, and have positive reference significance for other universities even communities around the world.

Keywords: sustainable campus, energy consumption, STARS assessment, GHG emissions

Procedia PDF Downloads 270
2594 Strategies of Risk Management for Smallholder Farmers in South Africa: A Case Study on Pigeonpea (Cajanus cajan) Production

Authors: Sanari Chalin Moriri, Kwabena Kingsley Ayisi, Alina Mofokeng

Abstract:

Dryland smallholder farmers in South Africa are vulnerable to all kinds of risks, and it negatively affects crop productivity and profit. Pigeonpea is a leguminous and multipurpose crop that provides food, fodder, and wood for smallholder farmers. The majority of these farmers are still growing pigeonpea from traditional unimproved seeds, which comprise a mixture of genotypes. The objectives of the study were to identify the key risk factors that affect pigeonpea productivity and to develop management strategies on how to alleviate the risk factors in pigeonpea production. The study was conducted in two provinces (Limpopo and Mpumalanga) of South Africa in six municipalities during the 2020/2021 growing seasons. The non-probability sampling method using purposive and snowball sampling techniques were used to collect data from the farmers through a structured questionnaire. A total of 114 pigeonpea producers were interviewed individually using a questionnaire. Key stakeholders in each municipality were also identified, invited, and interviewed to verify the information given by farmers. Data collected were subjected to SPSS statistical software 25 version. The findings of the study were that majority of farmers affected by risk factors were women, subsistence, and old farmers resulted in low food production. Drought, unavailability of improved pigeonpea seeds for planting, access to information, and processing equipment were found to be the main risk factors contributing to low crop productivity in farmer’s fields. Above 80% of farmers lack knowledge on the improvement of the crop and also on the processing techniques to secure high prices during the crop off-season. Market availability, pricing, and incidence of pests and diseases were found to be minor risk factors which were triggered by the major risk factors. The minor risk factors can be corrected only if the major risk factors are first given the necessary attention. About 10% of the farmers found to use the crop as a mulch to reduce soil temperatures and to improve soil fertility. The study revealed that most of the farmers were unaware of its utilisation as fodder, much, medicinal, nitrogen fixation, and many more. The risk of frequent drought in dry areas of South Africa where farmers solely depend on rainfall poses a serious threat to crop productivity. The majority of these risk factors are caused by climate change due to unrealistic, low rainfall with extreme temperatures poses a threat to food security, water, and the environment. The use of drought-tolerant, multipurpose legume crops such as pigeonpea, access to new information, provision of processing equipment, and support from all stakeholders will help in addressing food security for smallholder farmers. Policies should be revisited to address the prevailing risk factors faced by farmers and involve them in addressing the risk factors. Awareness should be prioritized in promoting the crop to improve its production and commercialization in the dryland farming system of South Africa.

Keywords: management strategies, pigeonpea, risk factors, smallholder farmers

Procedia PDF Downloads 208
2593 The Relationship between Dispositional Mindfulness, Adult Attachment Orientations, and Emotion Regulation

Authors: Jodie Stevenson, Lisa-Marie Emerson, Abigail Millings

Abstract:

Mindfulness has been conceptualized as a dispositional trait, which is different across individuals. Previous research has independently identified both adult attachment orientations and emotion regulation abilities as correlates of dispositional mindfulness. Research has also presented a two-factor model of the relationship between these three constructs. The present study aimed to further develop this model and investigated theses relationships in a sample of 186 participants. Participants completed the Five Factor Mindfulness Questionnaire Short Form (FFMQ-SF), the Experiences in Close Relationships Scale for global attachment (ECR), the Emotion Regulation Questionnaire (ERC), and the Adult Disorganized Attachment scale (ADA). Exploratory factor analysis revealed a 3-factor solution accounting for 59% of the variance across scores on these measures. The first factor accounted for 32% of the variance and loaded highly on attachment and mindfulness subscales. The second factor accounted for 15% of the variance with strong loadings on emotion regulation subscales. The third factor accounted for 12% of the variance with strong loadings on disorganized attachment, and the mindfulness observes subscale. The results further confirm the relationship between attachment, mindfulness, and emotion regulation along with the unique addition of disorganized attachment. The extracted factors will then be used to predict well-being outcomes for an undergraduate student population.

Keywords: adult attachment, emotion regulation, mindfulness, well-being

Procedia PDF Downloads 376
2592 Review Paper on an Algorithm Enhancing Privacy and Security in Online Meeting Platforms Using a Secured Encryption

Authors: Tonderai Muchenje, Mkhatshwa Phethile

Abstract:

Humans living in this current situation know that communication with one another is necessary for themselves. There are many ways to communicate with each other; during unexpected natural disasters and outbreak of epidemics and pandemics, the need for online meeting platforms are considered most important. Apparently, the development in the telecommunication sector also played an important role. Therefore, the epidemic of the Covid-19 Pandemic and the new normal situation resulted in the overwhelming production of online meeting platforms to prevent the situation. This software is commonly used in business communications in the beginning. Rapidly the COVID-19 pandemic changed the situation. At present-day, these virtual meeting applications are not only used to have informal meetings with friends and relatives but also to be used to have formal meetings in the business and education (universities) sector. In this article, an attempt has been made to list out the useful secured ways for using online meeting platforms.

Keywords: virtual background, zoom, secure online algorithm, RingCentral, Pexip Pexip, TeamViewer, microsoft teams

Procedia PDF Downloads 109
2591 Enhancing Experiential Learning in a Smart Flipped Classroom: A Case Study

Authors: Fahri Benli, Sitalakshmi Venkartraman, Ye Wei, Fiona Wahr

Abstract:

A flipped classroom which is a form of blended learning shifts the focus from a teacher-centered approach to a learner-centered approach. However, not all learners are ready to take the active role of knowledge and skill acquisition through a flipped classroom and they continue to delve in a passive mode of learning. This challenges educators in designing, scaffolding and facilitating in-class activities for students to have active learning experiences in a flipped classroom environment. Experiential learning theories have been employed by educators in the past in physical classrooms based on the principle that knowledge could be actively developed through direct experience. However, with more of online teaching witnessed recently, there are inherent limitations in designing and simulating an experiential learning activity for an online environment. In this paper, we explore enhancing experiential learning using smart digital tools that could be employed in a flipped classroom within a higher education setting. We present the use of smart collaborative tools online to enhance the experiential learning activity to teach higher-order cognitive concepts of business process modelling as a case study.

Keywords: experiential learning, flipped classroom, smart software tools, online learning higher-order learning attributes

Procedia PDF Downloads 183
2590 Real-Time Image Encryption Using a 3D Discrete Dual Chaotic Cipher

Authors: M. F. Haroun, T. A. Gulliver

Abstract:

In this paper, an encryption algorithm is proposed for real-time image encryption. The scheme employs a dual chaotic generator based on a three dimensional (3D) discrete Lorenz attractor. Encryption is achieved using non-autonomous modulation where the data is injected into the dynamics of the master chaotic generator. The second generator is used to permute the dynamics of the master generator using the same approach. Since the data stream can be regarded as a random source, the resulting permutations of the generator dynamics greatly increase the security of the transmitted signal. In addition, a technique is proposed to mitigate the error propagation due to the finite precision arithmetic of digital hardware. In particular, truncation and rounding errors are eliminated by employing an integer representation of the data which can easily be implemented. The simple hardware architecture of the algorithm makes it suitable for secure real-time applications.

Keywords: chaotic systems, image encryption, non-autonomous modulation, FPGA

Procedia PDF Downloads 504
2589 A Secure System for Handling Information from Heterogeous Sources

Authors: Shoohira Aftab, Hammad Afzal

Abstract:

Information integration is a well known procedure to provide consolidated view on sets of heterogeneous information sources. It not only provides better statistical analysis of information but also facilitates users to query without any knowledge on the underlying heterogeneous information sources The problem of providing a consolidated view of information can be handled using Semantic data (information stored in such a way that is understandable by machines and integrate-able without manual human intervention). However, integrating information using semantic web technology without any access management enforced, will results in increase of privacy and confidentiality concerns. In this research we have designed and developed a framework that would allow information from heterogeneous formats to be consolidated, thus resolving the issue of interoperability. We have also devised an access control system for defining explicit privacy constraints. We designed and applied our framework on both semantic and non-semantic data from heterogeneous resources. Our approach is validated using scenario based testing.

Keywords: information integration, semantic data, interoperability, security, access control system

Procedia PDF Downloads 348
2588 [Keynote Speech]: Experimental Study on the Effects of Water-in-Oil Emulsions to the Pressure Drop in Pipeline Flow

Authors: S. S. Dol, M. S. Chan, S. F. Wong, J. S. Lim

Abstract:

Emulsion formation is unavoidable and can be detrimental to an oil field production. The presence of stable emulsions also reduces the quality of crude oil and causes more problems in the downstream refinery operations, such as corrosion and pipeline pressure drop. Hence, it is important to know the effects of emulsions in the pipeline. Light crude oil was used for the continuous phase in the W/O emulsions where the emulsions pass through a flow loop to test the pressure drop across the pipeline. The results obtained shows that pressure drop increases as water cut is increased until it peaks at the phase inversion of the W/O emulsion between 30% to 40% water cut. Emulsions produced by gradual constrictions show a lower stability as compared to sudden constrictions. Lower stability of emulsions in gradual constriction has the higher influence of pressure drop compared to a sudden sharp decrease in diameter in sudden constriction. Generally, sudden constriction experiences pressure drop of 0.013% to 0.067% higher than gradual constriction of the same ratio. Lower constriction ratio cases cause larger pressure drop ranging from 0.061% to 0.241%. Considering the higher profitability in lower emulsion stability and lower pressure drop at the developed flow region of different constrictions, an optimum design of constriction is found to be gradual constriction with a ratio of 0.5.

Keywords: constriction, pressure drop, turbulence, water-in-oil emulsions

Procedia PDF Downloads 330
2587 Interliterariness: Teaching Dystopia in the Arab Classrooms

Authors: Firas Al-Jubouri

Abstract:

Literature has been a subject of studying English at secondary, university, and postgraduate levels in many countries and for several decades. One of the prominent literary genres, which is being increasingly used in the literature classrooms, is dystopian literature. However, since teachers usually address the educational requirements of teaching canonical English literature to meet the expected objectives of the particular 1organisation, and the learner’s needs in the non- Anglophone context, they must also negotiate the issues of cultural differences, aesthetic values, literary significance, and the rationale of storytelling. This paper examines how teaching certain dystopian themes in Aldous Huxley’s Brave New World (1932), an extremely influential dystopian canon, has to take into consideration the ideas, traditions, cultures, and means of literary interpretation inherent in the Arab Muslim world, with specific emphasis on the GCC region. It suggests the use of DionýzĎurišin’s (1929-1997) system of interliterariness in teaching world and comparative literature to help improve the interpretation of canonical literary texts in the international and inter-ethnic classrooms and contexts. Thus, this study helps to define a means of integrating global content and cross-cultural experiences into an effective teaching methodology that helps mitigate the major divides between the Anglophone text and the non-Anglophone readers.

Keywords: anglophone, dystopia, brave new world, huxley, interliterariness

Procedia PDF Downloads 74