Search results for: security experiences
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 5360

Search results for: security experiences

2420 An Intelligent Tutoring System Enriched with 3D Virtual Reality for Dentistry Students

Authors: Meltem Eryılmaz

Abstract:

With the emergence of the COVID-19 infection outbreak, the socio-cultural, political, economic, educational systems dynamics of the world have gone through a major change, especially in the educational field, specifically dentistry preclinical education, where the students must have a certain amount of real-time experience in endodontics and other various procedures. The totality of the digital and physical elements that make our five sense organs feel as if we really exist in a virtual world is called virtual reality. Virtual reality, which is very popular today, has started to be used in education. With the inclusion of developing technology in education and training environments, virtual learning platforms have been designed to enrich students' learning experiences. The field of health is also affected by these current developments, and the number of virtual reality applications developed for students studying dentistry is increasing day by day. The most widely used tools of this technology are virtual reality glasses. With virtual reality glasses, you can look any way you want in a world designed in 3D and navigate as you wish. With this project, solutions that will respond to different types of dental practices of students who study dentistry with virtual reality applications are produced. With this application, students who cannot find the opportunity to work with patients in distance education or who want to improve themselves at home have unlimited trial opportunities. Unity 2021, Visual Studio 2019, Cardboard SDK are used in the study.

Keywords: dentistry, intelligent tutoring system, virtual reality, online learning, COVID-19

Procedia PDF Downloads 200
2419 An Investigation of the Effects of Emotional Experience Induction on Mirror Neurons System Activity with Regard to Spectrum of Depressive Symptoms

Authors: Elyas Akbari, Jafar Hasani, Newsha Dehestani, Mohammad Khaleghi, Alireza Moradi

Abstract:

The aim of the present study was to assess the effect of emotional experience induction in the mirror neurons systems (MNS) activity with regard to the spectrum of depressive symptoms. For this purpose, at first stage, 449 students of Kharazmi University of Tehran were selected randomly and completed the second version of the Beck Depression Inventory (BDI-II). Then, 36 students with standard Z-score equal or above +1.5 and equal or equal or below -1.5 were selected to construct two groups of high and low spectrum of depressive symptoms. In the next stage, the basic activity of MNS was recorded (mu wave) before presenting the positive and negative emotional video clips by Electroencephalography (EEG) technique. The findings related to emotion induction (neutral, negative and positive emotion) demonstrated that the activity of recorded mirror neuron areas had a significant difference between the depressive and non-depressive groups. These findings suggest that probably processing of negative emotions in depressive individuals is due to the idea that the mirror neurons in motor cortex matched up the activity of cognitive regions with the person’s schema. Considering the results of the present study, it could be said that the MNS provides a substrate where emotional disorders can be studied and evaluated.

Keywords: emotional experiences, mirror neurons, depressive symptoms, negative and positive emotion

Procedia PDF Downloads 352
2418 Broadcast Routing in Vehicular Ad hoc Networks (VANETs)

Authors: Muazzam A. Khan, Muhammad Wasim

Abstract:

Vehicular adhoc network (VANET) Cars for network (VANET) allowing vehicles to talk to each other, which is committed to building a strong network of mobile vehicles is technical. In VANETs vehicles are equipped with special devices that can get and share info with the atmosphere and other vehicles in the network. Depending on this data security and safety of the vehicles can be enhanced. Broadcast routing is dispersion of any audio or visual medium of mass communication scattered audience distribute audio and video content, but usually using electromagnetic radiation (waves). The lack of server or fixed infrastructure media messages in VANETs plays an important role for every individual application. Broadcast Message VANETs still open research challenge and requires some effort to come to good solutions. This paper starts with a brief introduction of VANET, its applications, and the law of the message-trends in this network starts. This work provides an important and comprehensive study of reliable broadcast routing in VANET scenario.

Keywords: vehicular ad-hoc network , broadcasting, networking protocols, traffic pattern, low intensity conflict

Procedia PDF Downloads 528
2417 Factors That Stimulate Employee Development in Polish Small Enterprises

Authors: Ewa Rak

Abstract:

This paper is part of a broader research project on employee development in small enterprises, financed by Polish National Science Centre. The project results will serve as basis for a doctoral dissertation. The paper utilises literature studies and qualitative research conducted in small enterprises operating in the Lower Silesia region of Poland. This paper aims to identify some of the factors that stimulate employee development in small companies operating in Poland. The great variety of business pursuits and applications represented by this sector makes it hard to determine a universal configuration of factors to offer best possible conditions for employee development. Research results suggest that each of the examined companies had one or two of such factors in focus, and serving as the basis for the entire pro-development system. These include: employment security (both for employee and entrepreneur) and extensive knowledge and experience of entrepreneurs, but only if it is combined with a willingness and ability to share it.

Keywords: employee development, factors that stimulate employee development, human resources development, Poland, small enterprises, training

Procedia PDF Downloads 264
2416 Leveraging Advanced Technologies and Data to Eliminate Abandoned, Lost, or Otherwise Discarded Fishing Gear and Derelict Fishing Gear

Authors: Grant Bifolchi

Abstract:

As global environmental problems continue to have highly adverse effects, finding long-term, sustainable solutions to combat ecological distress are of growing paramount concern. Ghost Gear—also known as abandoned, lost or otherwise discarded fishing gear (ALDFG) and derelict fishing gear (DFG)—represents one of the greatest threats to the world’s oceans, posing a significant hazard to human health, livelihoods, and global food security. In fact, according to the UN Food and Agriculture Organization (FAO), abandoned, lost and discarded fishing gear represents approximately 10% of marine debris by volume. Around the world, many governments, governmental and non-profit organizations are doing their best to manage the reporting and retrieval of nets, lines, ropes, traps, floats and more from their respective bodies of water. However, these organizations’ ability to effectively manage files and documents about the environmental problem further complicates matters. In Ghost Gear monitoring and management, organizations face additional complexities. Whether it’s data ingest, industry regulations and standards, garnering actionable insights into the location, security, and management of data, or the application of enforcement due to disparate data—all of these factors are placing massive strains on organizations struggling to save the planet from the dangers of Ghost Gear. In this 90-minute educational session, globally recognized Ghost Gear technology expert Grant Bifolchi CET, BBA, Bcom, will provide real-world insight into how governments currently manage Ghost Gear and the technology that can accelerate success in combatting ALDFG and DFG. In this session, attendees will learn how to: • Identify specific technologies to solve the ingest and management of Ghost Gear data categories, including type, geo-location, size, ownership, regional assignment, collection and disposal. • Provide enhanced access to authorities, fisheries, independent fishing vessels, individuals, etc., while securely controlling confidential and privileged data to globally recognized standards. • Create and maintain processing accuracy to effectively track ALDFG/DFG reporting progress—including acknowledging receipt of the report and sharing it with all pertinent stakeholders to ensure approvals are secured. • Enable and utilize Business Intelligence (BI) and Analytics to store and analyze data to optimize organizational performance, maintain anytime-visibility of report status, user accountability, scheduling, management, and foster governmental transparency. • Maintain Compliance Reporting through highly defined, detailed and automated reports—enabling all stakeholders to share critical insights with internal colleagues, regulatory agencies, and national and international partners.

Keywords: ghost gear, ALDFG, DFG, abandoned, lost or otherwise discarded fishing gear, data, technology

Procedia PDF Downloads 90
2415 The Effectiveness of Psychodrama on Self-esteem Enhancement in Adolescent Boys

Authors: Saeed Dehnavi, Zahra Dehnavi

Abstract:

Background: Psychodrama, as a form of art therapy, helps people to enact and use role-plays for a specific problem, rather than just talking about it, in an effort to review the problem, gain feedback from group members, find appropriate solutions, and practice them for their life. This paper evaluated the effectiveness of psychodrama on enhancing self-esteem of young adolescent boys. Methodology: This is aquasi-experimental research study, using a pre-post testing plan with control group.From four secondary schools in Kermanshah – Iran, 210 adolescent boys (aged 13 and 14 years) were asked to complete Koper Smith's self-esteem measure scale. Given the low self-esteem scores (less than the cut-off of 23), a number of 20 individuals were selected and randomly placed into two control and experimental groups. The experimental group participated in a twelve-session psychodrama therapy plan for 6 weeks, while the control group received no intervention. Data analysis was carried out by the analysis of covariance (ANCOVA). Results: The results of ANCOVA analysis showed an increase in the post-test scores for self-esteem, and such increase was statistically significant. Conclusion: The findings indicated the effectiveness of psychodrama on self-esteem enhancement of young boys. During psychodrama sessions, the adolescents learned to take the initiative, communicate with others in an excited state, and improve their self-esteem with positive and constructive experiences.

Keywords: psychodrama, self-esteem, young adolescents, boys

Procedia PDF Downloads 468
2414 Positioning a Southern Inclusive Framework Embedded in the Social Model of Disability Theory Contextualised for Guyana

Authors: Lidon Lashley

Abstract:

This paper presents how the social model of disability can be used to reshape inclusive education practices in Guyana. Inclusive education in Guyana is metamorphosizing but still firmly held in the tenets of the Medical Model of Disability which influences the experiences of children with Special Education Needs and/or Disabilities (SEN/D). An ethnographic approach to data gathering was employed in this study. Qualitative data was gathered from the voices of children with and without SEN/D as well as their mainstream teachers to present the interplay of discourses and subjectivities in the situation. The data was analyzed using Adele Clarke's postmodern approach to grounded theory analysis called situational analysis. The data suggest that it is possible but will be challenging to fully contextualize and adopt Loreman's synthesis and Booths and Ainscow's Index in the two mainstream schools studied. In addition, the data paved the way for the presentation of the social model framework specific to Guyana called 'Southern Inclusive Education Framework for Guyana' and its support tool called 'The Inclusive Checker created for Southern mainstream primary classrooms.

Keywords: social model of disability, medical model of disability, subjectivities, metamorphosis, special education needs, postcolonial Guyana, inclusion, culture, mainstream primary schools, Loreman's synthesis, Booths and Ainscow's index

Procedia PDF Downloads 156
2413 The Difference Between Islamic Terrorism and Tha Human Rights In The Middle East

Authors: Mina Latif Ghaly Sawiras

Abstract:

The difference between Islamic terrorism and human-rights has become a big question in the fight against Islamic terrorism globally. This is was raised on the fact that terrorism and human rights are interrelated to the extent that, when the former starts, the latter is violated. This direct linkage was recognized in the Vienna Declaration and Program of Action as adopted by the World Conference on Human Rights in Vienna on 25 June 1993 which agreed that acts of terrorism in all its forms and manifestations are aimed at the destruction of human rights. Hence, Islamic-terrorism constitutes a violation on our most basic human rights. To this end, the first part of this paper will focus on the nexus between terrorism and human rights and endeavors to draw a co-relation between these two concepts. The second part thereafter will analyse the emerging concept of cyber-terrorism and how it takes place. Further, an analysis of cyber counter-terrorism balanced as against human rights will also be undertaken. This will be done through the analysis of the concept of ‘securitization’ of human rights as well as the need to create a balance between counterterrorism efforts as against the protection of human rights at all costs. The paper will then conclude with recommendations on how to balance counter-terrorism and human rights in the modern age.

Keywords: balance, counter-terrorism, cyber-terrorism, human rights, security, violation

Procedia PDF Downloads 56
2412 Predictive Models of Ruin Probability in Retirement Withdrawal Strategies

Authors: Yuanjin Liu

Abstract:

Retirement withdrawal strategies are very important to minimize the probability of ruin in retirement. The ruin probability is modeled as a function of initial withdrawal age, gender, asset allocation, inflation rate, and initial withdrawal rate. The ruin probability is obtained based on the 2019 period life table for the Social Security, IRS Required Minimum Distribution (RMD) Worksheets, US historical bond and equity returns, and inflation rates using simulation. Several popular machine learning algorithms of the generalized additive model, random forest, support vector machine, extreme gradient boosting, and artificial neural network are built. The model validation and selection are based on the test errors using hyperparameter tuning and train-test split. The optimal model is recommended for retirees to monitor the ruin probability. The optimal withdrawal strategy can be obtained based on the optimal predictive model.

Keywords: ruin probability, retirement withdrawal strategies, predictive models, optimal model

Procedia PDF Downloads 71
2411 Efficiency of Grover’s Search Algorithm Implemented on Open Quantum System in the Presence of Drive-Induced Dissipation

Authors: Nilanjana Chanda, Rangeet Bhattacharyya

Abstract:

Grover’s search algorithm is the fastest possible quantum mechanical algorithm to search a certain element from an unstructured set of data of N items. The algorithm can determine the desired result in only O(√N) steps. It has been demonstrated theoretically and experimentally on two-qubit systems long ago. In this work, we investigate the fidelity of Grover’s search algorithm by implementing it on an open quantum system. In particular, we study with what accuracy one can estimate that the algorithm would deliver the searched state. In reality, every system has some influence on its environment. We include the environmental effects on the system dynamics by using a recently reported fluctuation-regulated quantum master equation (FRQME). We consider that the environment experiences thermal fluctuations, which leave its signature in the second-order term of the master equation through its appearance as a regulator. The FRQME indicates that in addition to the regular relaxation due to system-environment coupling, the applied drive also causes dissipation in the system dynamics. As a result, the fidelity is found to depend on both the drive-induced dissipative terms and the relaxation terms, and we find that there exists a competition between them, leading to an optimum drive amplitude for which the fidelity becomes maximum. For efficient implementation of the search algorithm, precise knowledge of this optimum drive amplitude is essential.

Keywords: dissipation, fidelity, quantum master equation, relaxation, system-environment coupling

Procedia PDF Downloads 98
2410 Public Perception on Child Street Hawking in Aba Urban, Abia State, Nigeria

Authors: Paul Anyaogu, E. U. M. Igbo

Abstract:

This study examines the public view on child street hawking in Aba Urban, Abia State, Nigeria, its causes and effect on the child participant and society at large. The study tends to investigate the influence of socioeconomic status on child street hawking. The current situation reflects a chronic urban poverty, which disposed of parents/guardians to send their children and wards of school age to income yielding activities. A social survey research design was employed to select the respondents. A total of 1,108 questionnaires were administered to the respondents of 18 years and above and 1,038 were retrieved. Also, 24 in-depth interviews were conducted in the study area. The findings revealed that child street hawking is on the increase and a serious threat to social cohesion and national security. The study also revealed that poverty is a major cause of child street hawking. The study recommends that government should create job opportunities for urban dwellers, as well as provide social amenities and also put up poverty alleviation/eradication programmes for the people.

Keywords: Aba Urban, child street hawking, dangers, disposition, poverty

Procedia PDF Downloads 275
2409 Transforming Challenges of Urban and Peri-Urban Agriculture into Opportunities for Urban Food Security in India

Authors: G. Kiran Kumar, K. Padmaja

Abstract:

The rise of urban and peri-urban agriculture (UPA) is an important urban phenomenon that needs to be well understood before we pronounce a verdict whether it is beneficial or not. The challenge of supply of safe and nutritious food is faced by urban inhabitants. The definition of urban and peri-urban varies from city to city depending on the local policies framed with a view to bring regulated urban habitations as part of governance. Expansion of cities and the blurring of boundaries between urban and rural areas make it difficult to define peri-urban agriculture. The problem is further exacerbated by the fact that definition adopted in one region may not fit in the other. On the other hand the proportion of urban population is on the rise vis-à-vis rural. The rise of UPA does not promise that the food requirements of cities can be entirely met from this practice, since availability of enormous amounts of spaces on rooftops and vacant plots is impossible for raising crops. However, UPA reduces impact of price volatility, particularly for vegetables, which relatively have a longer shelf life. UPA improves access to fresh, nutritious and safe food for the urban poor. UPA provides employment to food handlers and traders in the supply chain. UPA can pose environmental and health risks from inappropriate agricultural practices; increased competition for land, water and energy; alter the ecological landscape and make it vulnerable to increased pollution. The present work is based on case studies in peri-urban agriculture in Hyderabad, India and relies on secondary data. This paper tries to analyze the need for more intensive production technologies without affecting the environment. An optimal solution in terms of urban-rural linkages has to be devised. There is a need to develop a spatial vision and integrate UPA in urban planning in a harmonious manner. Zoning of peri-urban areas for agriculture, milk and poultry production is an essential step to preserve the traditional nurturing character of these areas. Urban local bodies in conjunction with Departments of Agriculture and Horticulture can provide uplift to existing UPA models, without which the UPA can develop into a haphazard phenomenon and add to the increasing list of urban challenges. Land to be diverted for peri-urban agriculture may render the concept of urban and peri-urban forestry ineffective. This paper suggests that UPA may be practiced for high value vegetables which can be cultivated under protected conditions and are better resilient to climate change. UPA can provide models for climate resilient agriculture in urban areas which can be replicated in rural areas. Production of organic farm produce is another option for promote UPA owing to the proximity to informed consumers and access to markets within close range. Waste lands in peri-urban areas can be allotted to unemployed rural youth with the support of Urban Local Bodies (ULBs) and used for UPA. This can serve the purposes of putting wastelands to food production, enhancing employment opportunities and enhancing access to fresh produce for urban consumers.

Keywords: environment, food security, urban and peri-urban agriculture, zoning

Procedia PDF Downloads 314
2408 Thai Tourists’ Satisfaction and Tourist’s Decision Making Process in Southern of Thailand

Authors: Rewadee Waiyawassana

Abstract:

The objectives of the research on Thai tourists’ satisfaction of visiting Southern of Thailand are i) to study the Thai tourists’ satisfaction who select southern of Thailand as their destinations ii) to study their tourist’s decision making process in Southern of Thailand. The samples of the study are 619 Thai visitors at Southern of Thailand by accidental sampling technic and focus group interview for 12 key informant by purposive sampling. The data analysis includes Percentage, Frequency and One-way ANOVA. The findings from the research are the satisfaction of Thai visitors on southern of Thailand ranks from the resources of the destination, transportation, convenience, security, and promotion and public relations; with the high level of satisfaction on all the factors the government or responsible agencies should also modernize the marketing and public relation with increasing public relations, the potential visitors shall be updated with new information and alternative tourist destination also.

Keywords: public relations, Southern of Thailand, Thai Tourists’ satisfaction, Tourist’s decision making process

Procedia PDF Downloads 318
2407 Democracy Bytes: Interrogating the Exploitation of Data Democracy by Radical Terrorist Organizations

Authors: Nirmala Gopal, Sheetal Bhoola, Audecious Mugwagwa

Abstract:

This paper discusses the continued infringement and exploitation of data by non-state actors for destructive purposes, emphasizing radical terrorist organizations. It will discuss how terrorist organizations access and use data to foster their nefarious agendas. It further examines how cybersecurity, designed as a tool to curb data exploitation, is ineffective in raising global citizens' concerns about how their data can be kept safe and used for its acquired purpose. The study interrogates several policies and data protection instruments, such as the Data Protection Act, Cyber Security Policies, Protection of Personal Information(PPI) and General Data Protection Regulations (GDPR), to understand data use and storage in democratic states. The study outcomes point to the fact that international cybersecurity and cybercrime legislation, policies, and conventions have not curbed violations of data access and use by radical terrorist groups. The study recommends ways to enhance cybersecurity and reduce cyber risks using democratic principles.

Keywords: cybersecurity, data exploitation, terrorist organizations, data democracy

Procedia PDF Downloads 197
2406 English and Information and Communication Technology: Zones of Exclusion in Education in Low-Income Countries

Authors: Ram A. Giri, Amna Bedri, Abdou Niane

Abstract:

Exclusion in education on the basis of language in multilingual contexts operates at multiple levels. Learners of diverse ethnolinguistic backgrounds are often expected to learn through English and are pushed further down the learning ladder if they also have to access education through Information and Communication Technology (ICT). The paper explores marginalized children’s lived experiences in accessing technology and English in four low-income countries in Africa and Asia. Based on the findings of the first phase of a multinational qualitative research study, we report on the factors or barriers that affect children’s access, opportunities and motivation for learning through technology and English. ICT and English - the language of ICT and education - can enhance learning and can even be essential. However, these two important keys to education can also function as barriers to accessing quality education, and therefore as zones of exclusion. This paper looks into how marginalized children (aged 13-15) engage in learning through ICT and English and to what extent the restrictive access and opportunities contribute to the widening of the already existing gap in education. By applying the conceptual frameworks of “access and accessibility of learning” and “zones of exclusion,” the paper elucidates how the barriers prevent children’s effective engagement with learning and addresses such questions as to how marginalized children access technology and English for learning; whether the children value English, and what their motivation and opportunity to learn it are. In addition, the paper will point out policy and pedagogic implications.

Keywords: exclusion, inclusion, inclusive education, marginalization

Procedia PDF Downloads 226
2405 Evidence Based Dietary Pattern in South Asian Patients: Setting Goals

Authors: Ananya Pappu, Sneha Mishra

Abstract:

Introduction: The South Asian population experiences unique health challenges that predisposes this demographic to cardiometabolic diseases at lower BMIs. South Asians may therefore benefit from recommendations specific to their cultural needs. Here, we focus on current BMI guidelines for Asians with a discussion of South Asian dietary practices and culturally tailored interventions. By integrating traditional dietary practices with modern nutritional recommendations, this manuscript aims to highlight effective strategies to improving health outcomes among South Asians. Background: The South Asian community, including individuals from India, Pakistan, Bangladesh, and Sri Lanka, experiences high rates of cardiovascular diseases, cancers, diabetes, and strokes. Notably, the prevalence of diabetes and cardiovascular disease among Asians is elevated at BMIs below the WHO's standard overweight threshold. As it stands, a BMI of 25-30 kg/m² is considered overweight in non-Asians, while this cutoff is reduced to 23-27.4 kg/m² in Asians. This discrepancy can be attributed to studies which have shown different associations between BMI and health risks in Asians compared to other populations. Given these significant challenges, optimizing lifestyle management for cardiometabolic risk factors is crucial. Tailored interventions that consider cultural context seem to be the best approach for ensuring the success of both dietary and physical activity interventions in South Asian patients. Adopting a whole food, plant-based diet (WFPD) is one such strategy. The WFPD suggests that half of one meal should consist of non-starchy vegetables. In the South Asian diet, this includes traditional vegetables such as okra, tindora, eggplant, and leafy greens including amaranth, collards, chard, and mustards. A quarter of the meal should include plant-based protein sources like cooked beans, lentils, and paneer, with the remaining quarter comprising healthy grains or starches such as whole wheat breads, millets, tapioca, and barley. Adherence to the WFPD has been shown to improve cardiometabolic risk factors including weight, BMI, total cholesterol, HbA1c, and reduces the risk of developing non-alcoholic fatty liver disease (NAFLD). Another approach to improving dietary habits is timing meals. Many of the major cultures and religions in the Indian subcontinent incorporate religious fasting. Time-restricted eating (TRE), also known as intermittent fasting, is a practice akin to traditional fasting, which involves consuming all daily calories within a specific window. TRE has been shown to improve insulin resistance in prediabetic and diabetic patients. Common regimens include completing all meals within an 8-hour window, consuming a low-calorie diet every other day, and the 5:2 diet, which involves fasting twice weekly. These fasting practices align with the natural circadian rhythm, potentially enhancing metabolic health and reducing obesity and diabetes risks. Conclusion: South Asians develop cardiometabolic disease at lower BMIs; hence, it is important to counsel patients about lifestyle interventions that decrease their risk. Traditional South Asian diets can be made more nutrient-rich by incorporating vegetables, plant proteins like lentils and beans, and substituting refined grains for whole grains. Ultimately, the best diet is one to which a patient can adhere. It is therefore important to find a regimen that aligns with a patient’s cultural and traditional food practices.

Keywords: BMI, diet, obesity, South Asian, time-restricted eating

Procedia PDF Downloads 38
2404 Assessing the Role of Failed-ADR in Civil Litigation

Authors: Masood Ahmed

Abstract:

There is a plethora of literature (including judicial and extra-judicial comments) concerning the virtues of alternative dispute resolution processes within the English civil justice system. Lord Woolf in his Access to Justice Report ushered in a new pro-ADR philosophy and this was reinforced by Sir Rupert Jackson in his review of civil litigation costs. More recently, Briggs LJ, in his review of the Chancery Court, reiterated the significant role played by ADR and the need for better integration of ADR processes within the Chancery Court. His Lordship also noted that ADR which had failed to produce a settlement (i.e. a failed-ADR) continued to play a significant role in contributing to a ‘substantial narrowing of the issues or increased focus on the key issues’ which were ‘capable of assisting both the parties and the court in the economical determination of the dispute at trial.’ With the assistance of empirical data, this paper investigates the nature of failed-ADR and, in particular, assesses the effectiveness of failed-ADR processes as a tool in: (a) narrowing the legal and/or factual issues which may assist the courts in more effective and efficient case management of the dispute; (b) assisting the parties in the future settlement of the matter. This paper will also measure the effectiveness of failed-ADR by considering the views and experiences of legal practitioners who have engaged in failed-ADR.

Keywords: English civil justice system, alternative dispute resolution processes, civil court process, empirical data from legal profession regarding failed ADR

Procedia PDF Downloads 459
2403 Conceptualizing Notions of Poverty in Graduate Social Work Education: Contextualizing the Formation of the ‘Social Worker’ Subjectivity

Authors: Emily Carrothers

Abstract:

This research takes a critical look at the development of the social worker subjectivity, particularly in Canada. Through an interrogation of required graduate course texts, this paper explicates the discursive formation, orientation, and maintenance of the social worker subject and the conceptualizations of poverty in graduate social work education. This research aims to advance understandings of power and ideology in social work graduate texts and formations of particular dominant constructions of poverty and social worker subjectivity. Guiding questions for this inquiry include: What are social workers being oriented to? What are social workers being oriented away from? How is poverty theorized, discussed and/or attached to social location in social work education? And, how are social workers implicated in contesting or reinforcing poverty? Using critical discourse analysis, 6 texts were analyzed with a particular focus on ways in which notions of poverty are discursively represented and ways in which notions of the formation of the social worker were approached. This revealed that discursively underpinning social work in anti-oppressive practice (AOP) can work to reify hierarchal structures of power that orient social workers away from structural poverty reduction strategies and towards punitive interactions with those that experience poverty and multiple forms of marginalization. This highlights that the social worker subjectivity is formed in opposition to the client, with graduate texts constructing the social worker as an expert in client’s lives and experiences even more so than the client.

Keywords: Canada, education, social work, subjectivity

Procedia PDF Downloads 157
2402 Technical and Economic Environment in the Polish Power System as the Basis for Distributed Generation and Renewable Energy Sources Development

Authors: Pawel Sowa, Joachim Bargiel, Bogdan Mol, Katarzyna Luszcz

Abstract:

The article raises the issue of the development of local renewable energy sources and the production of distributed energy in context of improving the reliability of the Polish Power System and the beneficial impact on local and national energy security. The paper refers to the current problems of local governments in the process of investment in the area of distributed energy projects, and discusses the issues of the future role and cooperation within the local power plants and distributed energy. Attention is paid to the local communities the chance to raise their own resources and management of energy fuels (biomass, wind, gas mining) and improving the local energy balance. The material presented takes the issue of the development of the energy potential of municipalities and future cooperation with professional energy. As an example, practical solutions used in one of the communes in Silesia.

Keywords: distributed generation, mini centers energy, renewable energy sources, reliability of supply of rural commune

Procedia PDF Downloads 595
2401 Location Management in Wireless Sensor Networks with Mobility

Authors: Amrita Anil Agashe, Sumant Tapas, Ajay Verma Yogesh Sonavane, Sourabh Yeravar

Abstract:

Due to advancement in MEMS technology today wireless sensors network has gained a lot of importance. The wide range of its applications includes environmental and habitat monitoring, object localization, target tracking, security surveillance etc. Wireless sensor networks consist of tiny sensor devices called as motes. The constrained computation power, battery power, storage capacity and communication bandwidth of the tiny motes pose challenging problems in the design and deployment of such systems. In this paper, we propose a ubiquitous framework for Real-Time Tracking, Sensing and Management System using IITH motes. Also, we explain the algorithm that we have developed for location management in wireless sensor networks with the aspect of mobility. Our developed framework and algorithm can be used to detect emergency events and safety threats and provides warning signals to handle the emergency.

Keywords: mobility management, motes, multihop, wireless sensor networks

Procedia PDF Downloads 411
2400 Highly-Sensitive Nanopore-Based Sensors for Point-Of-Care Medical Diagnostics

Authors: Leyla Esfandiari

Abstract:

Rapid, sensitive detection of nucleic acid (NA) molecules of specific sequence is of interest for a range of diverse health-related applications such as screening for genetic diseases, detecting pathogenic microbes in food and water, and identifying biological warfare agents in homeland security. Sequence-specific nucleic acid detection platforms rely on base pairing interaction between two complementary single stranded NAs, which can be detected by the optical, mechanical, or electrochemical readout. However, many of the existing platforms require amplification by polymerase chain reaction (PCR), fluorescent or enzymatic labels, and expensive or bulky instrumentation. In an effort to address these shortcomings, our research is focused on utilizing the cutting edge nanotechnology and microfluidics along with resistive pulse electrical measurements to design and develop a cost-effective, handheld and highly-sensitive nanopore-based sensor for point-of-care medical diagnostics.

Keywords: diagnostics, nanopore, nucleic acids, sensor

Procedia PDF Downloads 456
2399 The Influence of Gossip on the Absorption Probabilities in Moran Process

Authors: Jurica Hižak

Abstract:

Getting to know the agents, i.e., identifying the free riders in a population, can be considered one of the main challenges in establishing cooperation. An ordinary memory-one agent such as Tit-for-tat may learn “who is who” in the population through direct interactions. Past experiences serve them as a landmark to know with whom to cooperate and against whom to retaliate in the next encounter. However, this kind of learning is risky and expensive. A cheaper and less painful way to detect free riders may be achieved by gossiping. For this reason, as part of this research, a special type of Tit-for-tat agent was designed – a “Gossip-Tit-for-tat” agent that can share data with other agents of its kind. The performances of both strategies, ordinary Tit-for-tat and Gossip-Tit-for-tat, against Always-defect have been compared in the finite-game framework of the Iterated Prisoner’s Dilemma via the Moran process. Agents were able to move in a random-walk fashion, and they were programmed to play Prisoner’s Dilemma each time they met. Moreover, at each step, one randomly selected individual was eliminated, and one individual was reproduced in accordance with the Moran process of selection. In this way, the size of the population always remained the same. Agents were selected for reproduction via the roulette wheel rule, i.e., proportionally to the relative fitness of the strategy. The absorption probability was calculated after the population had been absorbed completely by cooperators, which means that all the states have been occupied and all of the transition probabilities have been determined. It was shown that gossip increases absorption probabilities and therefore enhances the evolution of cooperation in the population.

Keywords: cooperation, gossip, indirect reciprocity, Moran process, prisoner’s dilemma, tit-for-tat

Procedia PDF Downloads 94
2398 Biodiversity and Biotechnology: Some Considerations about the International Regulation of Agriculture and the International Legal System on Access to Genetic Resources

Authors: Leandro Moura da Silva

Abstract:

The international community has strived to create legal mechanisms to protect their biodiversity, but this can represent, sometimes, particularly in the case of regulatory regime on access to genetic resources, an excessive nationalism which transforms itself into a significant obstacle to scientific progress causing damages to the country and to local farmers. Although it has been poorly publicized in the media, the international legal system was marked, in 2014, by the entry into force of the Nagoya Protocol, which regulates the access and benefit sharing of genetic resources of the States Party to that legal instrument. However, it’s not reasonable to think of regulating access to genetic resources without reflecting on the links of this important subject with other related issues, such as family farming and agribusiness, food safety, food security, intellectual property rights (on seeds, genetic material, new plant varieties, etc.), environmental sustainability, biodiversity, and biosafety.

Keywords: international law, regulation on agriculture, agronomy techniques, sustainability, genetic resources and new crop varieties, CBD, Nagoya Protocol, ITPGRFA

Procedia PDF Downloads 497
2397 Exploring How Online Applications Help Students to Learn Music Virtually: A Study in an Australian Music Academy

Authors: Ali Shah

Abstract:

This paper outlines the case study experience of using a variety of online strategies in an Australian music academy context during covid times. The study aimed at exploring how online applications help students to learn music, specifically playing musical instruments, composing songs, and performing virtually. To explore this, music teachers’ perceptions and experiences regarding online learning, the teaching strategies they implemented, and the challenges they faced were examined. For the purpose of this study, a qualitative research structure was adopted through the use of three data collection tools. These methods included pre- and post-research individual interviews of teachers and students, analysis of their lesson plans, virtual classroom observations of the teachers followed by the researcher’sown reflections, post-observation discussions, and teachers’ reflective journals. The findings revealed that teachers had a theoretical understanding of virtual learning and recent musical application such as Flowkey, Skoove, and Piano marvel, which are benefits of e-learning. While teachers faced challenges in implementing strategies to teach keyboard/piano online, overall, both students and teachers felt the positive impact of online applications and strategies on their learning and felt that modern technology made it possible for anyone to take music lessons at home.

Keywords: music, keyboard, piano, online learning, virtual learning

Procedia PDF Downloads 71
2396 Non-Interactive XOR Quantum Oblivious Transfer: Optimal Protocols and Their Experimental Implementations

Authors: Lara Stroh, Nikola Horová, Robert Stárek, Ittoop V. Puthoor, Michal Mičuda, Miloslav Dušek, Erika Andersson

Abstract:

Oblivious transfer (OT) is an important cryptographic primitive. Any multi-party computation can be realised with OT as a building block. XOR oblivious transfer (XOT) is a variant where the sender Alice has two bits, and a receiver, Bob, obtains either the first bit, the second bit, or their XOR. Bob should not learn anything more than this, and Alice should not learn what Bob has learned. Perfect quantum OT with information-theoretic security is known to be impossible. We determine the smallest possible cheating probabilities for unrestricted dishonest parties in non-interactive quantum XOT protocols using symmetric pure states and present an optimal protocol which outperforms classical protocols. We also "reverse" this protocol so that Bob becomes the sender of a quantum state and Alice the receiver who measures it while still implementing oblivious transfer from Alice to Bob. Cheating probabilities for both parties stay the same as for the unreversed protocol. We optically implemented both the unreversed and the reversed protocols and cheating strategies, noting that the reversed protocol is easier to implement.

Keywords: oblivious transfer, quantum protocol, cryptography, XOR

Procedia PDF Downloads 115
2395 Fast Fourier Transform-Based Steganalysis of Covert Communications over Streaming Media

Authors: Jinghui Peng, Shanyu Tang, Jia Li

Abstract:

Steganalysis seeks to detect the presence of secret data embedded in cover objects, and there is an imminent demand to detect hidden messages in streaming media. This paper shows how a steganalysis algorithm based on Fast Fourier Transform (FFT) can be used to detect the existence of secret data embedded in streaming media. The proposed algorithm uses machine parameter characteristics and a network sniffer to determine whether the Internet traffic contains streaming channels. The detected streaming data is then transferred from the time domain to the frequency domain through FFT. The distributions of power spectra in the frequency domain between original VoIP streams and stego VoIP streams are compared in turn using t-test, achieving the p-value of 7.5686E-176 which is below the threshold. The results indicate that the proposed FFT-based steganalysis algorithm is effective in detecting the secret data embedded in VoIP streaming media.

Keywords: steganalysis, security, Fast Fourier Transform, streaming media

Procedia PDF Downloads 141
2394 Teaching and Learning Jazz Improvisation Using Bloom's Taxonomy of Learning Domains

Authors: Graham Wood

Abstract:

The 20th Century saw the introduction of many new approaches to music making, including the structured and academic study of jazz improvisation. The rise of many school and tertiary jazz programs was rapid and quickly spread around the globe in a matter of decades. It could be said that the curriculum taught in these new programs was often developed in an ad-hoc manner due to the lack of written literature in this new and rapidly expanding area and the vastly different pedagogical principles when compared to classical music education that was prevalent in school and tertiary programs. There is widespread information regarding the theory and techniques used by jazz improvisers, but methods to practice these concepts in order to achieve the best outcomes for students and teachers is much harder to find. This research project explores the authors’ experiences as a studio jazz piano teacher, ensemble teacher and classroom improvisation lecturer over fifteen years and suggests an alignment with Bloom’s taxonomy of learning domains. This alignment categorizes the different tasks that need to be taught and practiced in order for the teacher and the student to devise a well balanced and effective practice routine and for the teacher to develop an effective teaching program. These techniques have been very useful to the teacher and the student to ensure that a good balance of cognitive, psychomotor and affective skills are taught to the students in a range of learning contexts.

Keywords: bloom, education, jazz, learning, music, teaching

Procedia PDF Downloads 250
2393 Voices of Fear: A Case Study Of Tobephobia Experienced by Female Teachers

Authors: Prakash Singh

Abstract:

In this exploratory qualitative case study, the voices of female teachers are captured that describe their fear of failure in coping with their daily anxieties, stresses, and tensions in their classrooms. When teachers are usually appointed, the curriculum forms the heart of all their professional obligations. The policy of quality and equality of education for all learners is a must as part of these deliberations, otherwise it would spell the inevitable failure for teachers. Yet, how often have teachers been asked whether they are happy during their professional tenure. Research affirms that this question is not a priority, seeing that the happiness of learners and the educational administrators enjoy precedence. Teachers are often subject to undue pressures and tensions because of environmental factors that extends beyond the curriculum. School violence, bullying, drug abuse, and gangsters are not uncommon to the school milieu, no matter where such schools can be located. In this case study, the voices of female teachers find space concerning their experiences of tobephobia (TBP). The questions that inevitably arise are: Are the educational authorities aware of the effects of TBP in education? What can be done to arrest and eliminate the debilitating effects of TBP? This exploratory study contributes to the growing concerns of TBP in education. It is therefore imperative that the effects of TBP on human resources in education must be accentuated so that meaningful solutions can be found to address challenging educational issues such as school violence, bullying, and drug abuse amongst learners.

Keywords: curriculum, female teachers, school violence, tobephobia

Procedia PDF Downloads 395
2392 Transitioning Teacher Identity during COVID-19: An Australian Early Childhood Education Perspective

Authors: J. Jebunnesa, Y. Budd, T. Mason

Abstract:

COVID-19 changed the pedagogical expectations of early childhood education as many teachers across Australia had to quickly adapt to new teaching practices such as remote teaching. An important factor in the successful implementation of any new teaching and learning approach is teacher preparation, however, due to the pandemic, the transformation to remote teaching was immediate. A timely question to be asked is how early childhood teachers managed the transition from face-to-face teaching to remote teaching and what was learned through this time. This study explores the experiences of early childhood educators in Australia during COVID-19 lockdowns. Data were collected from an online survey conducted through the official Facebook forum of “Early Childhood Education and Care Australia,” and a constructivist grounded theory methodology was used to analyse the data. Initial research results suggest changing expectations of teachers’ roles and responsibilities during the lockdown, with a significant category related to transitioning teacher identities emerging. The concept of transitioning represents the shift from the role of early childhood educator to educational innovator, essential worker, social worker, and health officer. The findings illustrate the complexity of early childhood educators’ roles during the pandemic.

Keywords: changing role of teachers, constructivist grounded theory, lessons learned, teaching during COVID-19

Procedia PDF Downloads 93
2391 Li-Fi Technology: Data Transmission through Visible Light

Authors: Shahzad Hassan, Kamran Saeed

Abstract:

People are always in search of Wi-Fi hotspots because Internet is a major demand nowadays. But like all other technologies, there is still room for improvement in the Wi-Fi technology with regards to the speed and quality of connectivity. In order to address these aspects, Harald Haas, a professor at the University of Edinburgh, proposed what we know as the Li-Fi (Light Fidelity). Li-Fi is a new technology in the field of wireless communication to provide connectivity within a network environment. It is a two-way mode of wireless communication using light. Basically, the data is transmitted through Light Emitting Diodes which can vary the intensity of light very fast, even faster than the blink of an eye. From the research and experiments conducted so far, it can be said that Li-Fi can increase the speed and reliability of the transfer of data. This paper pays particular attention on the assessment of the performance of this technology. In other words, it is a 5G technology which uses LED as the medium of data transfer. For coverage within the buildings, Wi-Fi is good but Li-Fi can be considered favorable in situations where large amounts of data are to be transferred in areas with electromagnetic interferences. It brings a lot of data related qualities such as efficiency, security as well as large throughputs to the table of wireless communication. All in all, it can be said that Li-Fi is going to be a future phenomenon where the presence of light will mean access to the Internet as well as speedy data transfer.

Keywords: communication, LED, Li-Fi, Wi-Fi

Procedia PDF Downloads 336