Search results for: peer to peer networks
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 3189

Search results for: peer to peer networks

2949 Defining Polysubstance Use in Adolescents: A Literary Review

Authors: Cailyn Green

Abstract:

This research investigated the lack of standardization that exists in the field of polysubstance use. This standardization has to do with a uniform way of defining when and if polysubstance is taking place. This research is important to the field of substance abuse as it makes future researchers aware of this lack of uniformity in a commonly used word in the field. By investigating, we make researchers aware of these discrepancies to encourage a uniform definition to be created and used. The methodology for this research was a literary review. This literature review consisted of four peer-reviewed and published journal articles in four different journals. These articles focused on adolescents and their polysubstance use. The research question asked what time frame was used to determine if a client's substance use can be classified as polysubstance use when they reported using two or more substances. The results identify that there is no uniform working definition of the time frame for polysubstance to take place.

Keywords: addiction, adolescence, literary review, polysubstance

Procedia PDF Downloads 59
2948 Stronger Together – Micro-Entrepreneurs’ Resilience Development in a Communal Training Space 

Authors: Halonen

Abstract:

Covid-19 pandemic and the succeeding crises have profoundly shaken the accustomed ways of interaction and thereby challenged the customary engagement patterns among entrepreneurs Consequently, this has led to the experience of lack of collegial interaction for some. Networks and relationships are a crucial factor to strengthening resilience, being especially significant in non-ordinary times. This study aims to shed light on entrepreneurs’ resilience development in and through entrepreneurs’ communal and training space. The context for research is a communal training space in a municipality in Finland of which goal is to help entrepreneurs to experience of peer support and community as part of the "tribe" is strengthened, the entrepreneurs' well-being at work, resilience, ability to change, innovativeness and general life management is strengthened. This communal space is regarded as an example of a physical community of practice (CoP) of entrepreneurs. The research aims to highlight the importance of rediscovering the “new normal” communality as itself but as a key building block of resilience. The initial research questions of the study are: RQ1: What is the role of entrepreneurs’ CoP and communal space in nurturing resilience development among them? RQ2: What positive entrepreneurial outcomes can be achieved through established CoP. The data will be gathered starting from the launch of the communality space in September 2023 onwards. It includes participatory observations of training gatherings, interviews with entrepreneurs and utilizes action research as the method. The author has an active role in participating and facilitating the development. The full paper will be finalized by the fall 2024. The idea of the new normal communality in a CoP among entrepreneurs is to be rediscovered due to its positive impact on entrepreneur’s resilience and business success. The other implications of study can extend to wider entrepreneurial ecosystem and other key stakeholders. Especially emphasizing the potential of communality in CoP for fostering entrepreneurs’ resilience and well-being ensuing business growth, community-driven entrepreneurship development and vitality of the case municipality.

Keywords: resilience, resilience development, communal space, community of practice (CoP)

Procedia PDF Downloads 49
2947 Post-Quantum Resistant Edge Authentication in Large Scale Industrial Internet of Things Environments Using Aggregated Local Knowledge and Consistent Triangulation

Authors: C. P. Autry, A. W. Roscoe, Mykhailo Magal

Abstract:

We discuss the theoretical model underlying 2BPA (two-band peer authentication), a practical alternative to conventional authentication of entities and data in IoT. In essence, this involves assembling a virtual map of authentication assets in the network, typically leading to many paths of confirmation between any pair of entities. This map is continuously updated, confirmed, and evaluated. The value of authentication along multiple disjoint paths becomes very clear, and we require analogues of triangulation to extend authentication along extended paths and deliver it along all possible paths. We discover that if an attacker wants to make an honest node falsely believe she has authenticated another, then the length of the authentication paths is of little importance. This is because optimal attack strategies correspond to minimal cuts in the authentication graph and do not contain multiple edges on the same path. The authentication provided by disjoint paths normally is additive (in entropy).

Keywords: authentication, edge computing, industrial IoT, post-quantum resistance

Procedia PDF Downloads 168
2946 IACOP - Route Optimization in Wireless Networks Using Improved Ant Colony Optimization Protocol

Authors: S. Vasundra, D. Venkatesh

Abstract:

Wireless networks have gone through an extraordinary growth in the past few years, and will keep on playing a crucial role in future data communication. The present wireless networks aim to make communication possible anywhere and anytime. With the converging of mobile and wireless communications with Internet services, the boundary between mobile personal telecommunications and wireless computer networks is disappearing. Wireless networks of the next generation need the support of all the advances on new architectures, standards, and protocols. Since an ad hoc network may consist of a large number of mobile hosts, this imposes a significant challenge on the design of an effective and efficient routing protocol that can work well in an environment with frequent topological changes. This paper proposes improved ant colony optimization (IACO) technique. It also maintains load balancing in wireless networks. The simulation results show that the proposed IACO performs better than existing routing techniques.

Keywords: wireless networks, ant colony optimization, load balancing, architecture

Procedia PDF Downloads 384
2945 An Overview of Privacy and Security Issues in Social Networks

Authors: Mohamad Ibrahim Al Ladan

Abstract:

Social networks, such as Facebook, Myspace, LinkedIn, Google+, and Twitter have experienced exponential growth and a remarkable adoption rate in recent years. They provide attractive means of online social interactions and communications with family, friends, and colleagues from around the corner or across the globe, and they have become an important part of daily digital interactions for more than one and a half billion users around the world. The various personal information sharing practices that social network providers encourage have led to their success as innovative social interaction platforms. However, these practices have resulted in ample concerns with respect to privacy and security from different stakeholders. Addressing these privacy and security concerns in social networks is a must for these networks to be sustainable. Existing security and privacy tools may not be enough to address existing concerns. Some guidelines should be followed to protect users from the existing risks. In this paper, we have investigated and discussed the various privacy and security issues and concerns pertaining to social networks. Moreover, we have classified these privacy and security issues and presented a thorough discussion of the implications of these issues and concerns on the future of the social networks. In addition, we have presented a set of guidelines as precaution measures that users can consider to address these issues and concerns.

Keywords: social networks privacy issues, social networks security issues, social networks privacy precautions measures, social networks security precautions measures

Procedia PDF Downloads 272
2944 Marketing–Operations Alignment: A Systematic Literature and Citation Network Analysis Review

Authors: Kedwadee Sombultawee, Sakun Boon-Itt

Abstract:

This research demonstrates a systematic literature review of 62 peer-reviewed articles published in academic journals from 2000-2016 focusing on the operation and marketing interface area. The findings show the three major clusters of recent research domains, which is a review of the alignment between operations and marketing, identification of variables that impact the company and analysis of the effect of interface. Moreover, the Main Path Analysis (MPA) is mapped to show the knowledge structure of the operation and marketing interface issue. Most of the empirical research focused on company performance and new product development then analyzed the data by the structural equation model or regression. Whereas, some scholars studied the conflict of these two functions and proposed the requirement or step for alignment. Finally, the gaps in the literature are provided for future research directions.

Keywords: operations management, marketing, interface, systematic literature review

Procedia PDF Downloads 250
2943 A Literature Review on the Role of Local Potential for Creative Industries

Authors: Maya Irjayanti

Abstract:

Local creativity utilization has been a strategic investment to be expanded as a creative industry due to its significant contribution to the national gross domestic product. Many developed and developing countries look toward creative industries as an agenda for the economic growth. This study aims to identify the role of local potential for creative industries from various empirical studies. The method performed in this study will involve a peer-reviewed journal articles and conference papers review addressing local potential and creative industries. The literature review analysis will include several steps: material collection, descriptive analysis, category selection, and material evaluation. Finally, the outcome expected provides a creative industries clustering based on the local potential of various nations. In addition, the finding of this study will be used as future research reference to explore a particular area with well-known aspects of local potential for creative industry products.

Keywords: business, creativity, local potential, local wisdom

Procedia PDF Downloads 346
2942 Performance Study of ZigBee-Based Wireless Sensor Networks

Authors: Afif Saleh Abugharsa

Abstract:

The IEEE 802.15.4 standard is designed for low-rate wireless personal area networks (LR-WPAN) with focus on enabling wireless sensor networks. It aims to give a low data rate, low power consumption, and low cost wireless networking on the device-level communication. The objective of this study is to investigate the performance of IEEE 802.15.4 based networks using simulation tool. In this project the network simulator 2 NS2 was used to several performance measures of wireless sensor networks. Three scenarios were considered, multi hop network with a single coordinator, star topology, and an ad hoc on demand distance vector AODV. Results such as packet delivery ratio, hop delay, and number of collisions are obtained from these scenarios.

Keywords: ZigBee, wireless sensor networks, IEEE 802.15.4, low power, low data rate

Procedia PDF Downloads 394
2941 Improve of Power Quality in Electrical Network Using STATCOM

Authors: A. R. Alesaadi

Abstract:

Flexible AC transmission system (FACTS) devices have an important rule on expended electrical transmission networks. These devices can provide control of one or more AC transmission system parameters to enhance controllability and increase power transfer capability. In this paper the effect of these devices on reliability of electrical networks is studied and it is shown that using of FACTS devices can improve the reliability of power networks and power quality in electrical networks, significantly.

Keywords: FACTS devices, power networks, power quality, STATCOM

Procedia PDF Downloads 634
2940 Governance Networks of China’s Neighborhood Micro-Redevelopment: The Case of Haikou

Authors: Lin Zhang

Abstract:

Neighborhood redevelopment is vital to improve residents’ living environment, and there has been a national neighborhood micro-redevelopment initiative in China since 2020, which is largely different from the previous large-scale demolition and reconstruction projects. Yet, few studies systematically examine the new interactions of multiple actors in this initiative. China’s neighborhood (micro-) redevelopment is a kind of governance network, and the complexity perspective could reflect the dynamic nature of multiple actors and their relationships in governance networks. In order to better understand the fundamental shifts of governance networks in China’s neighborhood micro-redevelopment, this paper adopted a theoretical framework of complexity in governance networks and analyzed the new governance networks of neighborhood micro-redevelopment projects in Haikou accordingly.

Keywords: neighborhood redevelopment, governance, networks, Haikou

Procedia PDF Downloads 48
2939 Cluster-Based Multi-Path Routing Algorithm in Wireless Sensor Networks

Authors: Si-Gwan Kim

Abstract:

Small-size and low-power sensors with sensing, signal processing and wireless communication capabilities is suitable for the wireless sensor networks. Due to the limited resources and battery constraints, complex routing algorithms used for the ad-hoc networks cannot be employed in sensor networks. In this paper, we propose node-disjoint multi-path hexagon-based routing algorithms in wireless sensor networks. We suggest the details of the algorithm and compare it with other works. Simulation results show that the proposed scheme achieves better performance in terms of efficiency and message delivery ratio.

Keywords: clustering, multi-path, routing protocol, sensor network

Procedia PDF Downloads 370
2938 Risks beyond Cyber in IoT Infrastructure and Services

Authors: Mattias Bergstrom

Abstract:

Significance of the Study: This research will provide new insights into the risks with digital embedded infrastructure. Through this research, we will analyze each risk and its potential negation strategies, especially for AI and autonomous automation. Moreover, the analysis that is presented in this paper will convey valuable information for future research that can create more stable, secure, and efficient autonomous systems. To learn and understand the risks, a large IoT system was envisioned, and risks with hardware, tampering, and cyberattacks were collected, researched, and evaluated to create a comprehensive understanding of the potential risks. Potential solutions have then been evaluated on an open source IoT hardware setup. This list shows the identified passive and active risks evaluated in the research. Passive Risks: (1) Hardware failures- Critical Systems relying on high rate data and data quality are growing; SCADA systems for infrastructure are good examples of such systems. (2) Hardware delivers erroneous data- Sensors break, and when they do so, they don’t always go silent; they can keep going, just that the data they deliver is garbage, and if that data is not filtered out, it becomes disruptive noise in the system. (3) Bad Hardware injection- Erroneous generated sensor data can be pumped into a system by malicious actors with the intent to create disruptive noise in critical systems. (4) Data gravity- The weight of the data collected will affect Data-Mobility. (5) Cost inhibitors- Running services that need huge centralized computing is cost inhibiting. Large complex AI can be extremely expensive to run. Active Risks: Denial of Service- It is one of the most simple attacks, where an attacker just overloads the system with bogus requests so that valid requests disappear in the noise. Malware- Malware can be anything from simple viruses to complex botnets created with specific goals, where the creator is stealing computer power and bandwidth from you to attack someone else. Ransomware- It is a kind of malware, but it is so different in its implementation that it is worth its own mention. The goal with these pieces of software is to encrypt your system so that it can only be unlocked with a key that is held for ransom. DNS spoofing- By spoofing DNS calls, valid requests and data dumps can be sent to bad destinations, where the data can be extracted for extortion or to corrupt and re-inject into a running system creating a data echo noise loop. After testing multiple potential solutions. We found that the most prominent solution to these risks was to use a Peer 2 Peer consensus algorithm over a blockchain to validate the data and behavior of the devices (sensors, storage, and computing) in the system. By the devices autonomously policing themselves for deviant behavior, all risks listed above can be negated. In conclusion, an Internet middleware that provides these features would be an easy and secure solution to any future autonomous IoT deployments. As it provides separation from the open Internet, at the same time, it is accessible over the blockchain keys.

Keywords: IoT, security, infrastructure, SCADA, blockchain, AI

Procedia PDF Downloads 69
2937 A Study of the Effect of the Flipped Classroom on Mixed Abilities Classes in Compulsory Secondary Education in Italy

Authors: Giacoma Pace

Abstract:

The research seeks to evaluate whether students with impairments can achieve enhanced academic progress by actively engaging in collaborative problem-solving activities with teachers and peers, to overcome the obstacles rooted in socio-economic disparities. Furthermore, the research underscores the significance of fostering students' self-awareness regarding their learning process and encourages teachers to adopt a more interactive teaching approach. The research also posits that reducing conventional face-to-face lessons can motivate students to explore alternative learning methods, such as collaborative teamwork and peer education within the classroom. To address socio-cultural barriers it is imperative to assess their internet access and possession of technological devices, as these factors can contribute to a digital divide. The research features a case study of a Flipped Classroom Learning Unit, administered to six third-year high school classes: Scientific Lyceum, Technical School, and Vocational School, within the city of Turin, Italy. Data are about teachers and the students involved in the case study, some impaired students in each class, level of entry, students’ performance and attitude before using Flipped Classrooms, level of motivation, family’s involvement level, teachers’ attitude towards Flipped Classroom, goal obtained, the pros and cons of such activities, technology availability. The selected schools were contacted; meetings for the English teachers to gather information about their attitude and knowledge of the Flipped Classroom approach. Questionnaires to teachers and IT staff were administered. The information gathered, was used to outline the profile of the subjects involved in the study and was further compared with the second step of the study made up of a study conducted with the classes of the selected schools. The learning unit is the same, structure and content are decided together with the English colleagues of the classes involved. The pacing and content are matched in every lesson and all the classes participate in the same labs, use the same materials, homework, same assessment by summative and formative testing. Each step follows a precise scheme, in order to be as reliable as possible. The outcome of the case study will be statistically organised. The case study is accompanied by a study on the literature concerning EFL approaches and the Flipped Classroom. Document analysis method was employed, i.e. a qualitative research method in which printed and/or electronic documents containing information about the research subject are reviewed and evaluated with a systematic procedure. Articles in the Web of Science Core Collection, Education Resources Information Center (ERIC), Scopus and Science Direct databases were searched in order to determine the documents to be examined (years considered 2000-2022).

Keywords: flipped classroom, impaired, inclusivity, peer instruction

Procedia PDF Downloads 26
2936 Raising Intercultural Awareness in Colombia Classrooms: A Descriptive Review

Authors: Angela Yicely Castro Garces

Abstract:

Aware of the relevance that intercultural education has gained in foreign language learning and teaching, and acknowledging the need to make it part of our classroom practices, this literature review explores studies that have been published in the Colombian context from the years 2012 to 2019. The inquiry was done in six national peer-reviewed journals, in order to examine the population benefited, types of studies and most recurrent topics of concern for educators. The findings present a promising panorama as teacher educators from public universities are leading the way in conducting research projects aimed at fostering intercultural awareness and building a critical intercultural discourse. Nonetheless, more studies that involve the different stakeholders and contexts need to be developed, in order to make intercultural education more visible in Colombian elementary and high school classrooms.

Keywords: Colombian scholarship, foreign language learning, foreign language teaching, intercultural awareness

Procedia PDF Downloads 104
2935 Perceived Ethnic Discrimination, Aggression, and School Connectedness among Adolescents in Finland

Authors: Isik Z. Ulubas, Kaj Bjorkqvist

Abstract:

The relationships between perceived ethnic discrimination, peer aggression and school connectedness are being examined among 1,000 adolescents in Ostrobothnia, Finland with an online questionnaire. The study aims at investigating perceived ethnic discrimination in school environment by peers and teachers, and within society in general. Six types of aggressive behavior are measured: physical, verbal, indirect, and cyber aggression, in addition to both verbal and physical sexual harassment. High perceived ethnic discrimination is expected to be related with high aggression and low school connectedness. Adolescents who have special diet and clothing because of their cultural or religious background are expected to score higher on perceived ethnic discrimination and lower school connectedness. Adolescents who have lower domestic language skills (Finnish/Swedish) are expected to show lower school connectedness and higher perceived ethnic discrimination.

Keywords: adolescents, aggression, ethnic discrimination, school connectedness

Procedia PDF Downloads 193
2934 Psychosocial Predictors of Non-Suicidal Self-Injury in Adolescents: Literature Review

Authors: K. Grigoryan, T. Jurcik

Abstract:

Interpersonal and school-related factors, along with individual characteristics, can predict non-suicidal self-injures (NSSI). The objective of this review is to describe psychosocial variables associated with NSSI among adolescents. A better understanding of this phenomenon may facilitate the identification of potentially effective interventions for adolescents. Relevant empirical studies and reviews from clinical, cross-cultural, and social psychology, as well as cognitive psychology literature, were synthesized into two broad topics: social/interpersonal and individual factors. Variables related to the occurrence of NSSI are discussed, including social support, peer modeling, abuse, personality traits, sense of belongingness, self-compassion, and others. Based on these findings, specific clinical recommendations were identified that need to be further evaluated empirically. The systemic interventions recommended in this review may further promote research in circumventing this social and clinical problem.

Keywords: non-suicidal self-injury, psychosocial factors, mental health, adolescence

Procedia PDF Downloads 152
2933 Software-Defined Networks in Utility Power Networks

Authors: Ava Salmanpour, Hanieh Saeedi, Payam Rouhi, Elahe Hamzeil, Shima Alimohammadi, Siamak Hossein Khalaj, Mohammad Asadian

Abstract:

Software-defined network (SDN) is a network architecture designed to control network using software application in a central manner. This ability enables remote control of the whole network regardless of the network technology. In fact, in this architecture network intelligence is separated from physical infrastructure, it means that required network components can be implemented virtually using software applications. Today, power networks are characterized by a high range of complexity with a large number of intelligent devices, processing both huge amounts of data and important information. Therefore, reliable and secure communication networks are required. SDNs are the best choice to meet this issue. In this paper, SDN networks capabilities and characteristics will be reviewed and different basic controllers will be compared. The importance of using SDNs to escalate efficiency and reliability in utility power networks is going to be discussed and the comparison between the SDN-based power networks and traditional networks will be explained.

Keywords: software-defined network, SDNs, utility network, open flow, communication, gas and electricity, controller

Procedia PDF Downloads 79
2932 A New Method to Reduce 5G Application Layer Payload Size

Authors: Gui Yang Wu, Bo Wang, Xin Wang

Abstract:

Nowadays, 5G service-based interface architecture uses text-based payload like JSON to transfer business data between network functions, which has obvious advantages as internet services but causes unnecessarily larger traffic. In this paper, a new 5G application payload size reduction method is presented to provides the mechanism to negotiate about new capability between network functions when network communication starts up and how 5G application data are reduced according to negotiated information with peer network function. Without losing the advantages of 5G text-based payload, this method demonstrates an excellent result on application payload size reduction and does not increase the usage quota of computing resource. Implementation of this method does not impact any standards or specifications and not change any encoding or decoding functionality too. In a real 5G network, this method will contribute to network efficiency and eventually save considerable computing resources.

Keywords: 5G, JSON, payload size, service-based interface

Procedia PDF Downloads 143
2931 Using Gene Expression Programming in Learning Process of Rough Neural Networks

Authors: Sanaa Rashed Abdallah, Yasser F. Hassan

Abstract:

The paper will introduce an approach where a rough sets, gene expression programming and rough neural networks are used cooperatively for learning and classification support. The Objective of gene expression programming rough neural networks (GEP-RNN) approach is to obtain new classified data with minimum error in training and testing process. Starting point of gene expression programming rough neural networks (GEP-RNN) approach is an information system and the output from this approach is a structure of rough neural networks which is including the weights and thresholds with minimum classification error.

Keywords: rough sets, gene expression programming, rough neural networks, classification

Procedia PDF Downloads 348
2930 Expanding Behavioral Crisis Care: Expansion of Psychiatric and Addiction-Care Services through a 23/7 Behavioral Crisis Center

Authors: Garima Singh

Abstract:

Objectives: Behavioral Crisis Center (BCC) is a community solution to a community problem. There has been an exponential increase in the incidence and prevalence of mental health crises around the world. The effects of the crisis negatively impact our patients and their families and strain the law enforcement and emergency room. The goal of the multi-disciplinary care model is to break the crisis cycle and provide 24-7 rapid access to an acre and crisis stabilization. We initiated our first BCC care center in 2020 in the midst of the COVID pandemic and have seen a remarkable improvement in patient ‘care and positive financial outcome. Background: Mental illnesses are common in the United States. Nearly one in five U.S. adults live with a mental illness (52.9 million in 2020). This number represented 21.0% of all U.S. adults. To address some of these challenges and help our community, In May 2020, we opened our first Behavioral crisis center (BCC). Since then, we have served more than 2500 patients and is the first southwest Missouri’s first 24/7 facility for crisis–level behavioral health and substance use needs. It has been proven to be a more effective place than emergency departments, jails, or local law enforcement. Methods: BCC was started in 2020 to serve the unmet need of the community and provide access to behavioral health and substance use services identified in the community. Funding was possible with significant investment from the county and Missouri Foundation for Health, with contributions from medical partners. It is a multi-disciplinary care center consisting of Physicians, nurse practitioners, nurses, behavioral technicians, peer support specialists, clinical intake specialists, and clinical coordinators and hospitality specialists. The center provides services including psychiatry care, outpatient therapy, community support services, primary care, peer support and engagement. It is connected to a residential treatment facility for substance use treatment for continuity of care and bridging the gap, which has resulted in the completion of treatment and better outcomes. Results: BCC has proven to be a great resource to the community and the Missouri Health Coalition is providing funding to replicate the model in other regions and work on a similar model for children and adolescents. Overall, 29% of the patients seen at BCC are stabilized and discharged with outpatient care. 50% needed acute stabilization in a hospital setting and 21% required long-term admission, mostly for substance use treatment. The local emergency room had a 42% reduction in behavioral health encounters compared to the previous 3 years. Also, by a quick transfer to BCC, the average stay in ER was reduced by 10 hours and time to follow up behavioral health assessment decreased by an average of 4 hours. Uninsured patients are also provided Medicaid application assistance which has benefited 55% of individuals receiving care at BCC. Conclusions: BCC is impacting community health and improving access to quality care and substance use treatment. It is a great investment for our patients and families.

Keywords: BCC, behvaioral health, community health care, addiction treatment

Procedia PDF Downloads 47
2929 Voices of the Students From a Fully Inclusive Classroom

Authors: Ashwini Tiwari

Abstract:

Introduction: Inclusive education for all is a multifaceted approach that requires system thinking and the promotion of a "Culture of Inclusion." Such can only be achieved through the collaboration of multiple stakeholders at the community, regional, state, national, and international levels. Researchers have found effective practices used in inclusive general classrooms are beneficial to all students, including students with disabilities, those who experience challenges academically and socially, and students without disabilities as well. However, to date, no statistically significant effects on the academic performance of students without disabilities in the presence of students with disabilities have been revealed. Therefore, proponents against inclusive education practices, based solely on their beliefs regarding the detrimental effects of students without disabilities, appears to have unfounded perceptions. This qualitative case study examines students' perspectives and beliefs about inclusive education in a middle school in South Texas. More specifically, this study examined students understanding of how inclusive education practices intersect with the classroom community. The data was collected from the students attending fully inclusive classrooms through interviews and focus groups. The findings suggest that peer integration and friendships built during classes are an essential part of schooling for both disabled and non-disabled students. Research Methodology: This qualitative case study used observations and focus group interviews with 12 middle school students attending an inclusive classroom at a public school located in South Texas. The participant of this study includes eight females and five males. All the study participants attend a fully inclusive middle school with special needs peers. Five of the students had disabilities. The focus groups and interviews were conducted during for entire academic year, with an average of one focus group and observation each month. The data were analyzed using the constant comparative method. The data from the focus group and observation were continuously compared for emerging codes during the data collection process. Codes were further refined and merged. Themes emerged as a result of the interpretation at the end of the data analysis process. Findings and discussion: This study was conducted to examine disabled and non-disabled students' perspectives on the inclusion of disabled students. The study revealed that non-disabled students generally have positive attitudes toward their disabled peers. The students in the study did not perceive inclusion as a special provision; rather, they perceived inclusion as a way of instructional practice. Most of the participants in the study spoke about the multiple benefits of inclusion. They emphasized that peer integration and friendships built during classes are an essential part of their schooling. Students believed that it was part of their responsibility to assist their peers in the ways possible. This finding is in line with the literature that the personality of children with disabilities is not determined by their disability but rather by their social environment and its interaction with the child. Interactions with peers are one of the most important socio-cultural conditions for the development of children with disabilities.

Keywords: inclusion, special education, k-12 education, student voices

Procedia PDF Downloads 51
2928 The Impact of the Use of Some Multiple Intelligence-Based Teaching Strategies on Developing Moral Intelligence and Inferential Jurisprudential Thinking among Secondary School Female Students in Saudi Arabia

Authors: Sameerah A. Al-Hariri Al-Zahrani

Abstract:

The current study aims at getting acquainted with the impact of the use of some multiple intelligence-based teaching strategies on developing moral intelligence and inferential jurisprudential thinking among secondary school female students. The study has endeavored to answer the following questions: What is the impact of the use of some multiple intelligence-based teaching strategies on developing inferential jurisprudential thinking and moral intelligence among first-year secondary school female students? In the frame of this main research question, the study seeks to answer the following sub-questions: (i) What are the inferential jurisprudential thinking skills among first-year secondary school female students? (ii) What are the components of moral intelligence among first year secondary school female students? (iii) What is the impact of the use of some multiple intelligence‐based teaching strategies (such as the strategies of analyzing values, modeling, Socratic discussion, collaborative learning, peer collaboration, collective stories, building emotional moments, role play, one-minute observation) on moral intelligence among first-year secondary school female students? (iv) What is the impact of the use of some multiple intelligence‐based teaching strategies (such as the strategies of analyzing values, modeling, Socratic discussion, collaborative learning, peer collaboration, collective stories, building emotional moments, role play, one-minute observation) on developing the capacity for inferential jurisprudential thinking of juristic rules among first-year secondary school female students? The study has used the descriptive-analytical methodology in surveying, analyzing, and reviewing the literature on previous studies in order to benefit from them in building the tools of the study and the materials of experimental treatment. The study has also used the experimental method to study the impact of the independent variable (multiple intelligence strategies) on the two dependent variables (moral intelligence and inferential jurisprudential thinking) in first-year secondary school female students’ learning. The sample of the study is made up of 70 female students that have been divided into two groups: an experimental group consisting of 35 students who have been taught through multiple intelligence strategies, and a control group consisting of the other 35 students who have been taught normally. The two tools of the study (inferential jurisprudential thinking test and moral intelligence scale) have been implemented on the two groups as a pre-test. The female researcher taught the experimental group and implemented the two tools of the study. After the experiment, which lasted eight weeks, was over, the study showed the following results: (i) The existence of significant statistical differences (0.05) between the mean average of the control group and that of the experimental group in the inferential jurisprudential thinking test (recognition of the evidence of jurisprudential rule, recognition of the motive for the jurisprudential rule, jurisprudential inferencing, analogical jurisprudence) in favor of the experimental group. (ii) The existence of significant statistical differences (0.05) between the mean average of the control group and that of the experimental group in the components of the moral intelligence scale (sympathy, conscience, moral wisdom, tolerance, justice, respect) in favor of the experimental group. The study has, thus, demonstrated the impact of the use of some multiple intelligence-based teaching strategies on developing moral intelligence and inferential jurisprudential thinking.

Keywords: moral intelligence, teaching, inferential jurisprudential thinking, secondary school

Procedia PDF Downloads 139
2927 How to Reach Adolescents Vulnerable for Suicidal Behaviour: A Qualitative Study

Authors: Birgit Reime, Sonja Gscheidle, Toni Hübener, Lara Hübener

Abstract:

Suicide in individuals under 30 years is a global public health concern. The objective of this study was to identify strategies for the prevention of suicide and suicidal behavior preferred by adolescents and young adults who are vulnerable to suicidal behavior and by relevant experts. Using semi-structured interviews with n= 17 adolescents and young adults (18-25 years of age) and with n= 11 experts from relevant fields, we have applied an inductive approach and applied thematic content analysis. Six strategies for suicide prevention in young individuals were reported. These were digital solutions with appealing designs, anonymous support, trained peer support, spiritual support, improving existing structures, and raising suicide literacy. Accessibility of anonymous digital support may contribute to suicide prevention in young people.

Keywords: suicide prevention, adolescents, E-health, Germany

Procedia PDF Downloads 147
2926 Study of the Use of Artificial Neural Networks in Islamic Finance

Authors: Kaoutar Abbahaddou, Mohammed Salah Chiadmi

Abstract:

The need to find a relevant way to predict the next-day price of a stock index is a real concern for many financial stakeholders and researchers. We have known across years the proliferation of several methods. Nevertheless, among all these methods, the most controversial one is a machine learning algorithm that claims to be reliable, namely neural networks. Thus, the purpose of this article is to study the prediction power of neural networks in the particular case of Islamic finance as it is an under-looked area. In this article, we will first briefly present a review of the literature regarding neural networks and Islamic finance. Next, we present the architecture and principles of artificial neural networks most commonly used in finance. Then, we will show its empirical application on two Islamic stock indexes. The accuracy rate would be used to measure the performance of the algorithm in predicting the right price the next day. As a result, we can conclude that artificial neural networks are a reliable method to predict the next-day price for Islamic indices as it is claimed for conventional ones.

Keywords: Islamic finance, stock price prediction, artificial neural networks, machine learning

Procedia PDF Downloads 192
2925 Use of Social Networks and Mobile Technologies in Education

Authors: Václav Maněna, Roman Dostál, Štěpán Hubálovský

Abstract:

Social networks play an important role in the lives of children and young people. Along with the high penetration of mobile technologies such as smartphones and tablets among the younger generation, there is an increasing use of social networks already in elementary school. The paper presents the results of research, which was realized at schools in the Hradec Králové region. In this research, the authors focused on issues related to communications on social networks for children, teenagers and young people in the Czech Republic. This research was conducted at selected elementary, secondary and high schools using anonymous questionnaires. The results are evaluated and compared with the results of the research, which has been realized in 2008. The authors focused on the possibilities of using social networks in education. The paper presents the possibility of using the most popular social networks in education, with emphasis on increasing motivation for learning. The paper presents comparative analysis of social networks, with regard to the possibility of using in education as well.

Keywords: social networks, motivation, e-learning, mobile technology

Procedia PDF Downloads 287
2924 The Nature and the Structure of Scientific and Innovative Collaboration Networks

Authors: Afshin Moazami, Andrea Schiffauerova

Abstract:

The objective of this work is to investigate the development and the role of collaboration networks in the creation of knowledge and innovations in the US and Canada, with a special focus on Quebec. In order to create scientific networks, the data on journal articles were extracted from SCOPUS, and the networks were built based on the co-authorship of the journal papers. For innovation networks, the USPTO database was used, and the networks were built on the patent co-inventorship. Various indicators characterizing the evolution of the network structure and the positions of the researchers and inventors in the networks were calculated. The comparison between the United States, Canada, and Quebec was then carried out. The preliminary results show that the nature of scientific collaboration networks differs from the one seen in innovation networks. Scientists work in bigger teams and are mostly interconnected within one giant network component, whereas the innovation network is much more clustered and fragmented, the inventors work more repetitively with the same partners, often in smaller isolated groups. In both Canada and the US, an increasing tendency towards collaboration was observed, and it was found that networks are getting bigger and more centralized with time. Moreover, a declining share of knowledge transfers per scientist was detected, suggesting an increasing specialization of science. The US collaboration networks tend to be more centralized than the Canadian ones. Quebec shares a lot of features with the Canadian network, but some differences were observed, for example, Quebec inventors rely more on the knowledge transmission through intermediaries.

Keywords: Canada, collaboration, innovation network, scientific network, Quebec, United States

Procedia PDF Downloads 169
2923 Migration and Policy Dedication in Ethiopia: A Study of Migration of Hadiya People

Authors: Solomon Tagesse

Abstract:

This study has been conducted on “Migration and Policy Dedication in Ethiopia: A Study of Migration of Hadiya People,” which was aimed at scrutinizing the reason for Hadiya people's migration from Ethiopia to the Republic of South Africa. Basically, a qualitative research approach has been employed to address the justified problem and to achieve the objectives stated accordingly. The purposive and snowball sampling techniques were employed to identify the study sites and respondents for the study. Field observations, interviews, focus group discussions and recording of data were used as instruments to collect data. It has been observed that lack of jobs and peer pressure, lack of interest to learn and work, scarcity and low wages were push factors; whereas job opportunity and better income; the existence of families, relatives and friends pull factors. Communication, transportation, the existence of brokers, etc., were also found to be intermediary factors. Based on the findings, recommendations and policy suggestions have been made in specific areas of the study.

Keywords: migration, reason, migrant, households

Procedia PDF Downloads 154
2922 Developing a Research Culture in the Faculty of Engineering and Information Technology at the Central University of Technology, Free State: Implications for Knowledge Management

Authors: Mpho Agnes Mbeo, Patient Rambe

Abstract:

The thirteenth year of the Central University of Technology, Free State’s (CUT) transition from a vocational and professional training orientation institution (i.e. a technikon) into a university with a strong research focus has neither been a smooth nor an easy one. At the heart of this transition was the need to transform the psychological faculties of academic and research staffs compliment who were accustomed to training graduates for industrial placement. The lack of a culture of research that fully embraces a strong ethos of conducting world-class research needed to be addressed. The induction and socialisation of academic staff into the development and execution of cutting-edge research also required the provision of research support and the creation of a conducive academic environment for research, both for emerging and non-research active academics. Drawing on ten cases, comprising four heads of departments, three prolific established researchers, and three emerging researchers, this study explores the challenges faced in establishing a strong research culture at the university. Furthermore, it gives an account of the extent to which the current research interventions have addressed the perceivably “missing research culture”, and the implications of these interventions for knowledge management. Evidence suggests that the endowment of an ideal institutional research environment (comprising strong internet networks, persistent connectivity on and off campus), research peer mentorship, and growing publication outputs should be matched by a coherent research incentive culture and strong research leadership. This is critical to building new knowledge and entrenching knowledge management founded on communities of practice and scholarly networking through the documentation and communication of research findings. The study concludes that the multiple policy documents set for the different domains of research may be creating pressure on researchers to engage research activities and increase output at the expense of research quality.

Keywords: Central University of Technology, performance, publication, research culture, university

Procedia PDF Downloads 146
2921 The Impact of Different Social Networks on the Development of Digital Entrepreneurship

Authors: Mohammad Mehdizadeh, Sara Miri

Abstract:

In today's world, competition is one of the essential components of different markets. Therefore, in addition to economic factors, social factors can also affect the development and prosperity of businesses. In this regard, social networks are of particular importance and play a critical role in the flourishing and development of Internet businesses. The purpose of this article is to investigate the effect of different social networks in promoting digital entrepreneurship. The research method is the descriptive survey. The results show that social networks have a positive and significant impact on digital entrepreneurship development. Among the social networks studied, Instagram and Facebook have the most positive effect on digital entrepreneurship.

Keywords: entrepreneurship, Facebook, Instagram, social media

Procedia PDF Downloads 314
2920 Contagious Corporate Reputation Risk: Uncovering the Pandemic’s Impact

Authors: Yawen Xia, Rubi Yang, Jing Zhao

Abstract:

By using the Reputation Risk Index (RRI) to measure company environmental, social, and governance (ESG) activities, this research studies firms’ ESG comovement with their industry and local peers. This comovement is attenuated during the Covid-19 pandemic. Further analysis shows that corporate governance plays an important role in comovement decrease. We classify companies by region (city, state, region) and industry and calculate the average RRI of companies of the same type. We run separate regressions to test 1) industry comovement; 2) local comovement; 3) Covid-19 pandemic and reputation risk comovement; 4) corporate governance and reputation risk comovement. Our findings are consistent with previous literature that companies follow their industry and local counterparts in engaging in irresponsible activities and reducing ESG engagement. We speculate Covid shock led to a reduction in social activities and information sharing among enterprise managers, and comovement between enterprises, as a result, decreased during the pandemic.

Keywords: ESG, Covid, peer pressure, local comovement, corporate governance

Procedia PDF Downloads 89