Search results for: pseudo voter identity scheme PVID
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 3326

Search results for: pseudo voter identity scheme PVID

3296 The Entrepreneurial Journey of Students: An Identity Perspective

Authors: J. Marchand

Abstract:

While university dropout entrepreneurs are celebrated in the practitioner literature, students’ intentions of becoming entrepreneurs have increasingly been the focus of student entrepreneur studies. However, students who are already running a business have rarely been examined. The experience of these students is a phenomenon that requires further research. Entrepreneurial identity represents a gap in the organisational studies literature. This paper utilises studentpreneurs’ self-narratives of their entrepreneurial journey. More specifically, the aim is to answer the following question: what are the types of identity work that individuals go through to build their entrepreneurial identity during that journey? Through long interviews, this paper studies the lived experience of 14 studentpreneurs who have achieved $54,000 in income and who participated publicly in entrepreneurial competitions. A general inductive analysis is performed on their narrative. With its focus on the journey, this paper makes a contribution to the literature on identity work and the entrepreneurial journey. A key contribution is the study of identity work on the journey to becoming an (established) entrepreneur in contrast to routine identity work.

Keywords: entrepreneurial identity, student entrepreneur, identity work, student entrepreneurship

Procedia PDF Downloads 636
3295 Efficient Relay Selection Scheme Utilizing OVSF Code in Cooperative Communication System

Authors: Yeong-Seop Ahn, Myoung-Jin Kim, Young-Min Ko, Hyoung-Kyu Song

Abstract:

This paper proposes a relay selection scheme utilizing an orthogonal variable spreading factor (OVSF) code in a cooperative communication. The relay selection scheme influences on the communication performance in the cooperative communication. Conventional relay selection schemes such as the best harmonic mean relay selection scheme or the threshold-based relay selection scheme should know information such as channel state information (CSI) in advance. The proposed relay selection scheme does not require information in advance by using a reference signal utilizing the OVSF code. The simulation result shows that bit error rate (BER) performance of proposed relay selection scheme is similar to the best harmonic mean relay selection scheme that is known as one of the optimal relay selection schemes.

Keywords: cooperative communication, relay selection, OFDM, OVSF code

Procedia PDF Downloads 605
3294 The Role of Organizational Identity in Disaster Response, Recovery and Prevention: A Case Study of an Italian Multi-Utility Company

Authors: Shanshan Zhou, Massimo Battaglia

Abstract:

Identity plays a critical role when an organization faces disasters. Individuals reflect on their working identities and identify themselves with the group and the organization, which facilitate collective sensemaking under crisis situations and enable coordinated actions to respond to and recover from disasters. In addition, an organization’s identity links it to its regional community, which fosters the mobilization of resources and contributes to rapid recovery. However, identity is also problematic for disaster prevention because of its persistence. An organization’s ego-defenses system prohibits the rethink of its identity and a rigid identity obstructs disaster prevention. This research aims to tackle the ‘problem’ of identity by study in-depth a case of an Italian multi–utility which experienced the 2012 Northern Italy earthquakes. Collecting data from 11 interviews with top managers and key players in the local community and archived materials, we find that the earthquakes triggered the rethink of the organization’s identity, which got reinforced afterward. This research highlighted the importance of identity in disaster response and recovery. More importantly, it explored the solution of overcoming the barrier of ego-defense that is to transform the organization into a learning organization which constantly rethinks its identity.

Keywords: community identity, disaster, identity, organizational learning

Procedia PDF Downloads 697
3293 Economic Analysis of the Impact of Commercial Agricultural Credit Scheme (CACS) on Farmers Income in Nigeria

Authors: Titus Wuyah Yunana

Abstract:

This study analyzed the impact of commercial agricultural credit scheme on income of beneficiary farmers in Kaduna State using the Net farm income and double difference method. A questionnaire was used to source the data from 306 farmers comprising of 153 beneficiaries and 153 non-beneficiaries. The results indicated that the net farm income of the commercial agricultural credit scheme beneficiaries increases from N15,006,352.00 before scheme to N24,862,585.00 after the first and the second phases of the scheme. There was also an increase in the net farm income of the non-beneficiaries from N9, 670,385.40 to N14, 391,469.00 during the scheme. The double difference method analysis indicated a positive mean income difference value between beneficiaries and nonbeneficiaries after the first and the second phases of the scheme. The study recommends expansion in the number of beneficiaries and efficient allocation and utilization of the resources. The government should also introduce more programs that will assist the farmers to increase their productivity, income and the economy as a whole.

Keywords: agriculture, credit scheme, farmers, income, beneficiary

Procedia PDF Downloads 297
3292 The Potential of Walkability in Evoking People’s Perception of Place Identity

Authors: Ibrahim Shinbira

Abstract:

In urban design, much has been discussed on the significance of the physical qualities in creating the place identity; however, the role of walkability as a physical quality that can evokes people's perception of place identity has not been adequately explored. This paper is based on the part findings of a doctoral research examining place identity in the city centre of Misurata, Libya. A number of 176 questionnaire and 23 face-to-face interviews were conducted with residents of the city to investigate physical qualities of place identity that evoked resident's perception. The finding demonstrates that walkability within the city centre is strong and it influences the users’ perception on the place identity. These were regarded as very important in sustaining the socio-cultural values, enjoyment, options, vitality and comfort. The paper concludes by establishing that walkability has a substantial contribution to the place identity, therefore should be considered in the design of urban places specifically the redevelopment one.

Keywords: perception, walkability, physical environment, place identity, residents

Procedia PDF Downloads 600
3291 Efficient Signal Detection Using QRD-M Based on Channel Condition in MIMO-OFDM System

Authors: Jae-Jeong Kim, Ki-Ro Kim, Hyoung-Kyu Song

Abstract:

In this paper, we propose an efficient signal detector that switches M parameter of QRD-M detection scheme is proposed for MIMO-OFDM system. The proposed detection scheme calculates the threshold by 1-norm condition number and then switches M parameter of QRD-M detection scheme according to channel information. If channel condition is bad, the parameter M is set to high value to increase the accuracy of detection. If channel condition is good, the parameter M is set to low value to reduce complexity of detection. Therefore, the proposed detection scheme has better trade off between BER performance and complexity than the conventional detection scheme. The simulation result shows that the complexity of proposed detection scheme is lower than QRD-M detection scheme with similar BER performance.

Keywords: MIMO-OFDM, QRD-M, channel condition, BER

Procedia PDF Downloads 334
3290 The Story of a Spoiled Identity: Blogging on Disability and Feminity

Authors: Anna Ślebioda

Abstract:

The paper discusses intersections between disability and femininity. Their imbrication may impede negotiation of identity. The analysis of a blog of a women with disability aims to prove this hypothesis. It involves 724 entries written in the span of six years. The conceptual framework for the considerations constitute the concepts of stigma and spoiled identity, and overlapping elements of femininity and disability. The empirical part comprises content analysis. It allows to locate the narrative on femininity and disability within the dimensions of imbricated categories described in the theoretical part. The results demonstrate aspects to consider in further research on identity in women with disabilities.

Keywords: disability, femininity, spoiled identity, stigma

Procedia PDF Downloads 634
3289 Common Fixed Point Results and Stability of a Modified Jungck Iterative Scheme

Authors: Hudson Akewe

Abstract:

In this study, we introduce a modified Jungck (Dual Jungck) iterative scheme and use the scheme to approximate the unique common fixed point of a pair of generalized contractive-like operators in a Banach space. The iterative scheme is also shown to be stable with respect to the maps (S,T). An example is taken to justify the convergence of the scheme. Our result is a generalization and improvement of several results in the literature on single map T.

Keywords: generalized contractive-like operators, modified Jungck iterative scheme, stability results, weakly compatible maps, unique common fixed point

Procedia PDF Downloads 318
3288 The Mediating Effect of Resilience on the Relationship between Cultural Identity and Self-Concordance among Tibetan, Han and Hui Students

Authors: Chunhua Ma

Abstract:

Background: There is a relationship between cultural identity and psychological health. Resilience is an important factor of psychological health, and cultural identity will protect the resilience. The research showed that the cultural identity, resilience, and self-concordance of students from different cultures. It should be a theoretical basis to improve mental health of different nationalities students. And the role of resilience factors for adults’ cultural identity and self-concordance was deserve studied. Aims: The current study aimed to examine the relationship between cultural identity and self-concordance among Chinese academician from 3 minorities, postulating mediating by resilience. Methods: This study used cross-sectional and correlational design. Participants were 328 Chinese aged between 18 and 25 years. Data was collected via self-reports including both closed and opened questions. Results: Linear regression analysis controlling for age, gender, the result showed that: (a) Cultural identity was related to self-concordance, resilience was related to self-concordance and cultural identity was related to resilience, (b) Resilience mediated the link between cultural identity and self-concordance, respectively. Discussion: Our findings suggested that resilience and cultural identity are important factors in self-concordance. If minority college students realized the heterogeneous culture, it would alleviate their psychological conflict, stimulate their strength potential and improve their self-concordance.

Keywords: cultural identity, resilience, self-concordance, mediating effect

Procedia PDF Downloads 378
3287 Investigation of the Stability of the F* Iterative Algorithm on Strong Peudocontractive Mappings and Its Applications

Authors: Felix Damilola Ajibade, Opeyemi O. Enoch, Taiwo Paul Fajusigbe

Abstract:

This paper is centered on conducting an inquiry into the stability of the F* iterative algorithm to the fixed point of a strongly pseudo-contractive mapping in the framework of uniformly convex Banach spaces. To achieve the desired result, certain existing inequalities in convex Banach spaces were utilized, as well as the stability criteria of Harder and Hicks. Other necessary conditions for the stability of the F* algorithm on strong pseudo-contractive mapping were also obtained. Through a numerical approach, we prove that the F* iterative algorithm is H-stable for strongly pseudo-contractive mapping. Finally, the solution of the mixed-type Volterra-Fredholm functional non-linear integral equation is estimated using our results.

Keywords: stability, F* -iterative algorithm, pseudo-contractive mappings, uniformly convex Banach space, mixed-type Volterra-Fredholm integral equation

Procedia PDF Downloads 66
3286 Multiple Identity Construction among Multilingual Minorities: A Quantitative Sociolinguistic Case Study

Authors: Stefanie Siebenhütter

Abstract:

This paper aims to reveal criterions involved in the process of identity-forming among multilingual minority language speakers in Northeastern Thailand and in the capital Bangkok. Using sociolinguistic interviews and questionnaires, it is asked which factors are important for speakers and how they define their identity by their interactions socially as well as linguistically. One key question to answer is how sociolinguistic factors may force or diminish the process of forming social identity of multilingual minority speakers. However, the motivation for specific language use is rarely overt to the speaker’s themselves as well as to others. Therefore, identifying the intentions included in the process of identity construction is to approach by scrutinizing speaker’s behavior and attitudes. Combining methods used in sociolinguistics and social psychology allows uncovering the tools for identity construction that ethnic Kui uses to range themselves within a multilingual setting. By giving an overview of minority speaker’s language use in context of the specific border near multilingual situation and asking how speakers construe identity within this spatial context, the results exhibit some of the subtle and mostly unconscious criterions involved in the ongoing process of identity construction.

Keywords: social identity, identity construction, minority language, multilingualism, social networks, social boundaries

Procedia PDF Downloads 234
3285 Thermal End Effect on the Isotachophoretic Separation of Analytes

Authors: Partha P. Gopmandal, S. Bhattacharyya

Abstract:

We investigate the thermal end effect on the pseudo-steady state behavior of the isotachophoretic transport of ionic species in a 2-D microchannel. Both ends of the channel are kept at a constant temperature which may lead to significant changes in electrophoretic migration speed. A mathematical model based on Nernst-Planck equations for transport of ions coupled with the equation for temperature field is considered. In addition, the charge conservation equations govern the potential field due to the external electric field. We have computed the equations for ion transport, potential and temperature in a coupled manner through the finite volume method. The diffusive terms are discretized via central difference scheme, while QUICK (Quadratic Upwind Interpolation Convection Kinematics) scheme is used to discretize the convective terms. We find that the thermal end effect has significant effect on the isotachophoretic (ITP) migration speed of the analyte. Our result shows that the ITP velocity for temperature dependent case no longer varies linearly with the applied electric field. A detailed analysis has been made to provide a range of the key parameters to minimize the Joule heating effect on ITP transport of analytes.

Keywords: finite volume method, isotachophoresis, QUICK scheme, thermal effect

Procedia PDF Downloads 249
3284 An Improved Transmission Scheme in Cooperative Communication System

Authors: Seung-Jun Yu, Young-Min Ko, Hyoung-Kyu Song

Abstract:

Recently developed cooperative diversity scheme enables a terminal to get transmit diversity through the support of other terminals. However, most of the introduced cooperative schemes have a common fault of decreased transmission rate because the destination should receive the decodable compositions of symbols from the source and the relay. In order to achieve high data rate, we propose a cooperative scheme that employs hierarchical modulation. This scheme is free from the rate loss and allows seamless cooperative communication.

Keywords: cooperative communication, hierarchical modulation, high data rate, transmission scheme

Procedia PDF Downloads 397
3283 Illuminating Regional Identity: An Interdisciplinary Exploration in Saskatchewan

Authors: Anne Gibbons

Abstract:

Both inside and outside of academia, people have sought to understand the “sense of place” of various regions, many times over and for many different reasons. The concept of regional identity is highly complex and surrounded by considerable contention. There are multiple bodies of research on regional identity theory in many different disciplines and even across sub-disciplinary classifications. Each discipline takes a slightly different angle or perspective on regional identity, resulting in a fragmented body of work on this topic overall. There is a need to consolidate this body of increasingly fragmented theory through interdisciplinary integration. For the purpose of this study, the province of Saskatchewan will serve as an exemplar for exploring regional identity in a concrete context. Saskatchewan can be thought of as a ‘functional region,’ with clear boundaries and clear residency, from which regional identity can be studied. This thesis shares the outcomes of a qualitative study grounded in a series of group interviews with askatchewan residents, from which it is concluded that the use of interdisciplinary theory is an appropriate approach to the study of regional identity. Regional identity cannot be compartmentalized; it is a web of characteristics, attributes, and feelings that are inextricably linked. The thesis thus concludes by offering lessons learned about how we might better understand regional identity, as illuminated through both interdisciplinary theory and the lived experiences and imaginations of people living in the region of Saskatchewan.

Keywords: interdisciplinary, regional identity, Saskatchewan, tourism studies

Procedia PDF Downloads 503
3282 Design of CMOS CFOA Based on Pseudo Operational Transconductance Amplifier

Authors: Hassan Jassim Motlak

Abstract:

A novel design technique employing CMOS Current Feedback Operational Amplifier (CFOA) is presented. The feature of consumption whivh has a very low power in designing pseudo-OTA is used to decreasing the total power consumption of the proposed CFOA. This design approach applies pseudo-OTA as input stage cascaded with buffer stage. Moreover, the DC input offset voltage and harmonic distortion (HD) of the proposed CFOA are very low values compared with the conventional CMOS CFOA due to symmetrical input stage. P-Spice simulation results using 0.18µm MIETEC CMOS process parameters using supply voltage of ±1.2V and 50μA biasing current. The P-Spice simulation shows excellent improvement of the proposed CFOA over existing CMOS CFOA. Some of these performance parameters, for example, are DC gain of 62. dB, open-loop gain-bandwidth product of 108 MHz, slew rate (SR+) of +71.2V/µS, THD of -63dB and DC consumption power (PC) of 2mW.

Keywords: pseudo-OTA used CMOS CFOA, low power CFOA, high-performance CFOA, novel CFOA

Procedia PDF Downloads 288
3281 A Factor-Analytical Approach on Identities in Environmentally Significant Behavior

Authors: Alina M. Udall, Judith de Groot, Simon de Jong, Avi Shankar

Abstract:

There are many ways in which environmentally significant behavior can be explained. Dominant psychological theories, namely, the theory of planned behavior, the norm-activation theory, its extension, the value-belief-norm theory, and the theory of habit do not explain large parts of environmentally significant behaviors. A new and rapidly growing approach is to focus on how consumer’s identities predict environmentally significant behavior. Identity may be relevant because consumers have many identities that are assumed to guide their behavior. Therefore, we assume that many identities will guide environmentally significant behavior. Many identities can be relevant for environmentally significant behavior. In reviewing the literature, over 200 identities have been studied making it difficult to establish the key identities for explaining environmentally significant behavior. Therefore, this paper first aims to establish the key identities previously used for explaining environmentally significant behavior. Second, the aim is to test which key identities explain environmentally significant behavior. To address the aims, an online survey study (n = 578) is conducted. First, the exploratory factor analysis reveals 15 identity factors. The identity factors are namely, environmentally concerned identity, anti-environmental self-identity, environmental place identity, connectedness with nature identity, green space visitor identity, active ethical identity, carbon off-setter identity, thoughtful self-identity, close community identity, anti-carbon off-setter identity, environmental group member identity, national identity, identification with developed countries, cyclist identity, and thoughtful organisation identity. Furthermore, to help researchers understand and operationalize the identities, the article provides theoretical definitions for each of the identities, in line with identity theory, social identity theory, and place identity theory. Second, the hierarchical regression shows only 10 factors significantly uniquely explain the variance in environmentally significant behavior. In order of predictive power the identities are namely, environmentally concerned identity, anti-environmental self-identity, thoughtful self-identity, environmental group member identity, anti-carbon off-setter identity, carbon off-setter identity, connectedness with nature identity, national identity, and green space visitor identity. The identities explain over 60% of the variance in environmentally significant behavior, a large effect size. Based on this finding, the article reveals a new, theoretical framework showing the key identities explaining environmentally significant behavior, to help improve and align the field.

Keywords: environmentally significant behavior, factor analysis, place identity, social identity

Procedia PDF Downloads 419
3280 Improved Performance of Cooperative Scheme in the Cellular and Broadcasting System

Authors: Hyun-Jee Yang, Bit-Na Kwon, Yong-Jun Kim, Hyoung-Kyu Song

Abstract:

In the cooperative transmission scheme, both the cellular system and broadcasting system are composed. Two cellular base stations (CBSs) communicating with a user in the cell edge use cooperative transmission scheme in the conventional scheme. In the case that the distance between two CBSs and the user is distant, the conventional scheme does not guarantee the quality of the communication because the channel condition is bad. Therefore, if the distance between CBSs and a user is distant, the performance of the conventional scheme is decreased. Also, the bad channel condition has bad effects on the performance. The proposed scheme uses two relays to communicate well with CBSs when the channel condition between CBSs and the user is poor. Using the relay in the high attenuation environment can obtain both advantages of the high bit error rate (BER) and throughput performance.

Keywords: cooperative communications, diversity gain, OFDM, interworking system

Procedia PDF Downloads 544
3279 Political Party Mobilization Strategies in Ghana: A Comparative Analysis of Three Constituencies

Authors: F. Agbele

Abstract:

Elections are core democratic institutions. Consequently, voter participation during elections is paramount to democratic governance as it serves as a medium to legitimize authority and make the privileges of electoral democracy meaningful to citizens. To this effect, the topic of voter mobilization and subsequent turnout level have been largely studied in advanced democracies. In young and consolidating democracies, the debate has, however, revolves around the huge reliance on ethnic and regional appeals. According to the Author’s knowledge, studies on electoral mobilization especially within the African context have argued the use of ethnic linkages by political parties to mobilize voters during elections. Literature has however not differentiated between the level of democratic dispensation among African countries and the use of ethnic linkages. The question, however, is whether the state of the country’s democracy determines the strategies employed by political parties to induce voter participation. In other words, do parties simply play ethno-regional cards as strongly suggested by literature or will consider an arrayed of strategies to mobilize voters? Additionally, studies have not differentiated the impact of mobilization strategy within a country, i.e. between high to low turnout areas. They have also not distinguished between strategies employed by an incumbent or an opposition party. This paper, therefore, is a comparative analysis of voter mobilization in Ghana. It uses original survey and interview data from three constituencies in Ghana: Nanton, Assin North, and Ellembelle, which are typical cases of high, average and low turnout areas, respectively. The data were concurrently collected during fieldworks conducted in November 2016 to February 2017, and again from July to August 2017. The study found that political parties within a consolidating democracy employ a blend of strategies to ensure turnout by both parties’ faithful and swing voters. The dominant strategies used depends on whether the party is an incumbent or in opposition. While an incumbent may depend more on personalistic and clientelistic strategies, parties in opposition will largely use programmatic strategies, which entails making many campaign promises. Additionally, opposition parties do use clientelistic tactics, but not on the same level as the incumbent. Similarly, within the context of this study, the use of ethnic linkage by political parties to mobilize voters has not been found to be as strong as suggested in the literature. Further, location was key in determining the strategy to use. In all, the consolidation process of a democratic country like Ghana means the change of mobilization strategies used by political parties, which entail a gradual shift from ethnic linkages to programmatic and other forms of non-programmatic strategies.

Keywords: comparative analysis, elections, mobilization strategies, voter turnout

Procedia PDF Downloads 142
3278 Solving the Pseudo-Geometric Traveling Salesman Problem with the “Union Husk” Algorithm

Authors: Boris Melnikov, Ye Zhang, Dmitrii Chaikovskii

Abstract:

This study explores the pseudo-geometric version of the extensively researched Traveling Salesman Problem (TSP), proposing a novel generalization of existing algorithms which are traditionally confined to the geometric version. By adapting the "onion husk" method and introducing auxiliary algorithms, this research fills a notable gap in the existing literature. Through computational experiments using randomly generated data, several metrics were analyzed to validate the proposed approach's efficacy. Preliminary results align with expected outcomes, indicating a promising advancement in TSP solutions.

Keywords: optimization problems, traveling salesman problem, heuristic algorithms, “onion husk” algorithm, pseudo-geometric version

Procedia PDF Downloads 170
3277 Addressing Scheme for IOT Network Using IPV6

Authors: H. Zormati, J. Chebil, J. Bel Hadj Taher

Abstract:

The goal of this paper is to present an addressing scheme that allows for assigning a unique IPv6 address to each node in the Internet of Things (IoT) network. This scheme guarantees uniqueness by extracting the clock skew of each communication device and converting it into an IPv6 address. Simulation analysis confirms that the presented scheme provides reductions in terms of energy consumption, communication overhead and response time as compared to four studied addressing schemes Strong DAD, LEADS, SIPA and CLOSA.

Keywords: addressing, IoT, IPv6, network, nodes

Procedia PDF Downloads 262
3276 A Location-based Authentication and Key Management Scheme for Border Surveillance Wireless Sensor Networks

Authors: Walid Abdallah, Noureddine Boudriga

Abstract:

Wireless sensor networks have shown their effectiveness in the deployment of many critical applications especially in the military domain. Border surveillance is one of these applications where a set of wireless sensors are deployed along a country border line to detect illegal intrusion attempts to the national territory and report this to a control center to undergo the necessary measures. Regarding its nature, this wireless sensor network can be the target of many security attacks trying to compromise its normal operation. Particularly, in this application the deployment and location of sensor nodes are of great importance for detecting and tracking intruders. This paper proposes a location-based authentication and key distribution mechanism to secure wireless sensor networks intended for border surveillance where the key establishment is performed using elliptic curve cryptography and identity-based public key scheme. In this scheme, the public key of each sensor node will be authenticated by keys that depend on its position in the monitored area. Before establishing a pairwise key between two nodes, each one of them must verify the neighborhood location of the other node using a message authentication code (MAC) calculated on the corresponding public key and keys derived from encrypted beacon messages broadcast by anchor nodes. We show that our proposed public key authentication and key distribution scheme is more resilient to node capture and node replication attacks than currently available schemes. Also, the achievement of the key distribution between nodes in our scheme generates less communication overhead and hence increases network performances.

Keywords: wireless sensor networks, border surveillance, security, key distribution, location-based

Procedia PDF Downloads 634
3275 Secure E-Voting Using Blockchain Technology

Authors: Barkha Ramteke, Sonali Ridhorkar

Abstract:

An election is an important event in all countries. Traditional voting has several drawbacks, including the expense of time and effort required for tallying and counting results, the cost of papers, arrangements, and everything else required to complete a voting process. Many countries are now considering online e-voting systems, but the traditional e-voting systems suffer a lack of trust. It is not known if a vote is counted correctly, tampered or not. A lack of transparency means that the voter has no assurance that his or her vote will be counted as they voted in elections. Electronic voting systems are increasingly using blockchain technology as an underlying storage mechanism to make the voting process more transparent and assure data immutability as blockchain technology grows in popularity. The transparent feature, on the other hand, may reveal critical information about applicants because all system users have the same entitlement to their data. Furthermore, because of blockchain's pseudo-anonymity, voters' privacy will be revealed, and third parties involved in the voting process, such as registration institutions, will be able to tamper with data. To overcome these difficulties, we apply Ethereum smart contracts into blockchain-based voting systems.

Keywords: blockchain, AMV chain, electronic voting, decentralized

Procedia PDF Downloads 110
3274 Adsorption Studies of Lead from Aqueos Solutions on Cocount Shell Activated Carbon

Authors: G. E. Sharaf El-Deen, S. E. A. Sharaf El-Deen

Abstract:

Activated carbon was prepared from coconut shell (ACS); a discarded agricultural waste was used to produce bioadsorbent through easy and environmental friendly processes. This activated carbon based biosorbent was evaluated for adsorptive removal of lead from water. The characterisation results showed this biosorbent had very high specific surface area and functional groups. The adsorption equilibrium data was well described by Langmuir, whilst kinetics data by pseudo-first order, pseudo-second order and Intraparticle diffusion models. The adsorption process could be described by the pseudo-second order kinetic.

Keywords: coconut shell, activated carbon, adsorption isotherm and kinetics, lead removal

Procedia PDF Downloads 273
3273 An Improved Cooperative Communication Scheme for IoT System

Authors: Eui-Hak Lee, Jae-Hyun Ro, Hyoung-Kyu Song

Abstract:

In internet of things (IoT) system, the communication scheme with reliability and low power is required to connect a terminal. Cooperative communication can achieve reliability and lower power than multiple-input multiple-output (MIMO) system. Cooperative communication increases the reliability with low power, but decreases a throughput. It has a weak point that the communication throughput is decreased. In this paper, a novel scheme is proposed to increase the communication throughput. The novel scheme is a transmission structure that increases transmission rate. And a decoding scheme according to the novel transmission structure is proposed. Simulation results show that the proposed scheme increases the throughput without bit error rate (BER) performance degradation.

Keywords: cooperative communication, IoT, STBC, transmission rate

Procedia PDF Downloads 360
3272 The Georgians’ Discourses of National Identity in the Context of Europeanisation

Authors: Lia Tsuladze

Abstract:

The paper discusses the Georgians’ online discourses of national identity in the context of Europeanisation focusing on two periods - initialing of the EU-Georgia Association Agreement in November 2013 and signing it in June 2014. Discussing how the Georgians’ aspiration to integrate with the EU is combined with their perception of Europeanisation as a threat to the national identity, the author explores how the national sentiment is expressed in the above discourses while performed for the local vs. international audiences.

Keywords: Europeanisation, frontstage, backstage discourses, Georgia, national identity

Procedia PDF Downloads 473
3271 Role of Physical Appearance in Associating People with a Group Identity

Authors: Gurleen Kaur

Abstract:

Being tall-short, fat-thin, black-white, etc. is an inevitable part of how people perceive you. This association of people with your external appearance carves out an identity for you. This paper will look at the reasons why people relate a person to a particular categorization on the basis of his/her physical appearance. The paper delves into reasons for this categorization into groups: Subconscious grouping, personal gain, ease of relating to the group, and social acceptance. Development of certain unique physical features also leads to a person relating himself to a collective identity. Thus, this paper will support the fact that physical appearance plays a crucial role in categorization of people into groups and hence forming a group identity for them. This paper is divided into three parts. The first part will discuss what physical appearance is and how is it linked to our daily lives. The second part will talk about why it works i.e. why this factor of external appearance is important in formation of identity. The last part will talk about the factors which lead to categorization of identity because of physical appearance.

Keywords: group identity, physical appearance, subconscious grouping, collective identity

Procedia PDF Downloads 394
3270 Re-Reading the Impossibility of Identity: Modeling Gender Pluralism in Curriculum and Instruction

Authors: A. K. O’Loughlin

Abstract:

Identity doesn’t exist in discrete categories as it is defined. Kevin Kumashiro reveals the phrase 'an impossibility of identity' in Troubling Education (2000), an investigation of the intersections of culture and gender and the impact of erasure for queer POC identity. This underscores the essentiality of an insider or an outsider identity and the appearance of 'contradiction' or impossibility of these identities. The contradictions between us as subject in our own stories and in the stories of others are often silenced. This silencing of complex, 'contradicting' identity has unmissable implications in the classroom; the developing student in question is done a serious disservice, from which they may never recover. There is no more important point of contact than the teacher, for willingness to encounter a developing person as they are, not as we already think they are, or 'know' them to be, or think they should be. To decide how to regard them based on our own unilateral identity and its associated exhortations and injunctions is, as Hannah Arendt writes in The Origins of Totalitarianism (1951), to sell off our ability to rise, human-like, to the challenge of investigating things as they are. A re-reading of Kumashiro’s impossibility of identity becomes possible through the investigation of pluralism. Identities become possible and un-paradoxical by the notion that contradictions are not problems that an individual is not unilateral, but plural. In this paper, we investigate how philosophies of pluralism can inform our understanding of impossibility of identity in classroom curriculum and pedagogy.

Keywords: identity, gender, culture, pluralism, education, philosophy of education, queer theory, philosophy of mind, adolescent development

Procedia PDF Downloads 263
3269 Examining the Functional and Practical Aspects of Iranian Painting as a Visual-Identity Language in Iranian Graphics

Authors: Arezoo Seifollahi

Abstract:

One of the topics that is receiving a lot of attention in artistic circles and among Iran today and has been the subject of many conversations is the issue of Iranian graphics. In this research, the functional and practical aspects of Iranian painting as a visual-identity language in Iranian graphics have been investigated by relying on Iranian cultural and social posters in order to gain an understanding of the trend of contemporary graphic art in Iran and to help us reach the identity of graphics. In order to arrive at Iranian graphics, first, the issue of identity and what it is has been examined, and then this category has been addressed in Iran and throughout the history of this country in order to reveal the characteristics of the identity that has come to us today under the name of Iranian identity cognition. In the following, the search for Iranian identity in the art of this land, especially the art of painting, and then the art of contemporary painting and the search for identity in it have been discussed. After that, Iranian identity has been investigated in Iranian graphics. To understand Iranian graphics, after a brief description of its contemporary history, this art is examined at the considered time point. By using the inductive method of examining the posters of each course and taking into account the related cultural and social conditions, we tried to get a general and comprehensive understanding of the graphic features of each course.

Keywords: Iranian painting, graphic visual language, Iranian identity, social cultural poster

Procedia PDF Downloads 13
3268 Globalization and Women's Social Identity in Iran: A Case Study of Educated Women in the 'World City' of Yazd

Authors: Mohammad Tefagh

Abstract:

The process of globalization has transformed many social and cultural phenomena and has entered the world into a new era and arena. This phenomenon has introduced new methods, ideas, and identity interactions to human beings and has caused great changes in individual and social identity. Women have also been affected by globalization. Globalization has made the presence of women more and more effective and has caused identity changes and changes in the dimensions of identity in them. The purpose of this study is to investigate the impact of globalization of culture on changes in the social identity of educated women in the global city of Yazd. This study will discuss identity change and identity reconstruction due to globalization. The method of this study is qualitative, and the research data is obtained through in-depth interviews with 15 Yazdi-educated women at the Ph.D. level. The method of data analysis is thematic analysis. Findings of the research show that educated Yazdi women have changed their identity due to new communication processes and globalization, including faster, easier, and cheaper communication with other women in the world near and far. Women's social identity has also changed in the face of elements of globalization in various dimensions such as national, gender, religious, and group identities. The analysis of the interviews revealed the confronting elements such as using new cultural goods and communication technologies, membership in social networks, and increasing awareness of environmental change.

Keywords: globalization, social identity, educated women, Yazd

Procedia PDF Downloads 293
3267 Investigation of Soil Slopes Stability

Authors: Nima Farshidfar, Navid Daryasafar

Abstract:

In this paper, the seismic stability of reinforced soil slopes is studied using pseudo-dynamic analysis. Equilibrium equations that are applicable to the every kind of failure surface are written using Horizontal Slices Method. In written equations, the balance of the vertical and horizontal forces and moment equilibrium is fully satisfied. Failure surface is assumed to be log-spiral, and non-linear equilibrium equations obtained for the system are solved using Newton-Raphson Method. Earthquake effects are applied as horizontal and vertical pseudo-static coefficients to the problem. To solve this problem, a code was developed in MATLAB, and the critical failure surface is calculated using genetic algorithm. At the end, comparing the results obtained in this paper, effects of various parameters and the effect of using pseudo - dynamic analysis in seismic forces modeling is presented.

Keywords: soil slopes, pseudo-dynamic, genetic algorithm, optimization, limit equilibrium method, log-spiral failure surface

Procedia PDF Downloads 309