Search results for: pseudo voter identity scheme PVID
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 3326

Search results for: pseudo voter identity scheme PVID

3086 Investigating Elements of Identity of Traditional Neighborhoods in Isfahan and Using These Elements in the Design of Modern Neighborhoods

Authors: Saman Keshavarzi

Abstract:

The process of planning, designing and building neighborhoods is a complex and multidimensional part of urban planning. Understanding the elements that give a neighborhood a sense of identity can lead to successful city planning and result in a cohesive and functional community where people feel a sense of belonging. These factors are important in ensuring that the needs of the urban population are met to live in a safe, pleasant and healthy society. This research paper aims to identify the elements of the identity of traditional neighborhoods in Isfahan and analyzes ways of using these elements in the design of modern neighborhoods to increase social interaction between communities and cultural reunification of people. The neighborhood of Jolfa in Isfahan has a unique socio-cultural identity as it dates back to the Safavid Dynasty of the 16th century, and most of its inhabitants are Christian Armenians of a religious minority. The elements of the identity of Jolfa were analyzed through the following research methods: field observations, distribution of questionnaires and qualitative analysis. The basic methodology that was used to further understand the Jolfa neighborhood and deconstruct the identity image that residents associate with their respective neighborhoods was a qualitative research method. This was done through utilizing questionnaires that respondents had to fill out in response to a series of research questions. From collecting these qualitative data, the major finding was that traditional neighborhoods that have elements of identity embedded in them are seen to have closer-knit communities whose residents have strong societal ties. This area of study in urban planning is vital to ensuring that new neighborhoods are built with concepts of social cohesion, community and inclusion in mind as they are what lead to strong, connected, and prosperous societies.

Keywords: development, housing, identity, neighborhood, policy, urbanization

Procedia PDF Downloads 149
3085 Healing the Scars of the Past: The Great Challenge and Failed Attempt of European Union to Create a Supranational Identity

Authors: David Martínez Rico, Juan Pablo Farid Cuéllar Martínez

Abstract:

After more than half a century that the first treaty of European cooperation was created, the final result of a difficult and long historical process, which is the current European Union, is facing economical and social challenges. The barriers of policies differences and national sovereignties seem to be being defeated in the last and present decades. However, the last crisis of 2008 brought back problems as xenophobia and nationalism. In this ambit of identity, European Union has made many efforts to reinforce a European identity and leave behind the radical nationalisms which generated World Wars. Nevertheless, these social problems are increasing and becoming more present in the life of many Europeans. Even, in the last Euro Parliamentarian Elections of the present year, 2014, the extreme right parties, in favor of xenophobic and anti European ideals, got more seats and are increasing their presence in Euro Parliament. This essay approaches to this controversial topic of European identity. Taking as start point the nationalist divisions that are causing internal divergences in Europe, the authors of this research study the role and contributions of the Memorials of the fallen soldiers and heroes of World Wars, present in many cities as Amsterdam, Brussels and Paris, to the impossibility to reach an European identity, it means that Europeans feel first part of Europe in place to feel first part of a nation. The objective of this essay is to reaffirm the thesis that establishes that the European Union won´t reach the longed supranational identity with just with the current strategies, because yet there are many cultural elements in its member states societies which exalt the heroes and soldiers of the past wars, increasing nationalism feelings. Besides, in it are promoted some interesting ideas that could change the course in this quest of a European social identity.

Keywords: identity, memorials, European identity, nationalism, proposals

Procedia PDF Downloads 397
3084 Cooperative CDD scheme Based on Adaptive Modulation in Wireless Communiation System

Authors: Seung-Jun Yu, Hwan-Jun Choi, Hyoung-Kyu Song

Abstract:

Among spatial diversity scheme, orthogonal space-time block code (OSTBC) and cyclic delay diversity (CDD) have been widely studied for the cooperative wireless relaying system. However, conventional OSTBC and CDD cannot cope with change in the number of relays owing to low throughput or error performance. In this paper, we propose a cooperative cyclic delay diversity (CDD) scheme that use hierarchical modulation at the source and adaptive modulation based on cyclic redundancy check (CRC) code at the relays.

Keywords: adaptive modulation, cooperative communication, CDD, OSTBC

Procedia PDF Downloads 401
3083 The Veil of Virtuality: Anonymity and Trust in the Metaverse's New Frontier

Authors: Cheng Xu, Rui Zhong

Abstract:

Utilizing a preregistered randomized experiment, this study explores the effects of anonymity and curated identity on trust within the Metaverse. Participants were randomly assigned to different conditions of anonymity and identity curation and engaged in a series of tasks designed to mirror the complexities of trust in real-world social interactions. Trust was measured using the classical trust game, allowing for a nuanced understanding of how these factors interact and influence trust. The findings reveal that higher levels of anonymity negatively impact trust, while identity curation can moderate this effect. Mechanism analysis uncovers how anonymity influences perceived reciprocity and group cohesion, and how curation can moderate these relationships. The results demonstrate a nuanced interaction between anonymity and trust, with variations across different curation levels. These insights provide a multifaceted understanding of trust within virtual environments, contributing valuable knowledge to the design, policy-making, and ethical considerations of the Metaverse

Keywords: metaverse, anonymity, curated identity, social behavior, trust

Procedia PDF Downloads 94
3082 Secure Transmission Scheme in Device-to-Device Multicast Communications

Authors: Bangwon Seo

Abstract:

In this paper, we consider multicast device-to-device (D2D) direct communication systems in cellular networks. In multicast D2D communications, nearby mobile devices exchanges, their data directly without going through a base station and a D2D transmitter send its data to multiple D2D receivers that compose of D2D multicast group. We consider wiretap channel where there is an eavesdropper that attempts to overhear the transmitted data of the D2D transmitter. In this paper, we propose a secure transmission scheme in D2D multicast communications in cellular networks. In order to prevent the eavesdropper from overhearing the transmitted data of the D2D transmitter, a precoding vector is employed at the D2D transmitter in the proposed scheme. We perform computer simulations to evaluate the performance of the proposed scheme. Through the simulation, we show that the secrecy rate performance can be improved by selecting an appropriate precoding vector.

Keywords: device-to-device communications, wiretap channel, secure transmission, precoding

Procedia PDF Downloads 259
3081 Synthesis and Performance Adsorbent from Coconut Shells Polyetheretherketone for Natural Gas Storage

Authors: Umar Hayatu Sidik

Abstract:

The natural gas vehicle represents a cost-competitive, lower-emission alternative to the gasoline-fuelled vehicle. The immediate challenge that confronts natural gas is increasing its energy density. This paper addresses the question of energy density by reviewing the storage technologies for natural gas with improved adsorbent. Technical comparisons are made between storage systems containing adsorbent and conventional compressed natural gas based on the associated amount of moles contained with Compressed Natural Gas (CNG) and Adsorbed Natural Gas (ANG). We also compare gas storage in different cylinder types (1, 2, 3 and 4) based on weight factor and storage capacity. For the storage tank system, we discussed the concept of carbon adsorbents, when used in CNG tanks, offer a means of increasing onboard fuel storage and, thereby, increase the driving range of the vehicle. It confirms that the density of the stored gas in ANG is higher than that of compressed natural gas (CNG) operated at the same pressure. The obtained experimental data were correlated using linear regression analysis with common adsorption kinetic (Pseudo-first order and Pseudo-second order) and isotherm models (Sip and Toth). The pseudo-second-order kinetics describe the best fitness with a correlation coefficient of 9945 at 35 bar. For adsorption isotherms, the Sip model shows better fitness with the regression coefficient (R2) of 0.9982 and with the lowest RSMD value of 0.0148. The findings revealed the potential of adsorbent in natural gas storage applications.

Keywords: natural gas, adsorbent, compressed natural gas, adsorption

Procedia PDF Downloads 36
3080 The Mask of Motherhood a Changing Identity During the Transition to Motherhood

Authors: Geraldine Mc Loughlin, Mary Horgan, Rosaleen Murphy

Abstract:

Childbirth is a life-changing event, a psychological transition for the mother that must be viewed in a social context. Much has been written and documented regarding the preparation for birth and the immediate postnatal period, but the full psychological impact on the mother is not clear. One aspect of the transition process is Identity. Depending on a person’s worldview, the concept of identity is viewed differently; the nature of reality and how they construct knowledge influence these perspectives. Becoming a mother is not just an event but a process that time and experience will help to shape the understanding of the woman. To explore the emotional and psychological aspects of first-time mother’s experience during the transition to new motherhood. To identify factors affecting women’s identities in the period of 36 weeks gestation to 12 weeks postpartum. Interpretative Phenomenological Analysis (IPA) was used. It explores how these women make sense of and give meaning to their experiences. IPA is underpinned by 3 key principles: phenomenology, hermeneutics and idiographics. A purposeful sample of 10 women was recruited for this longitudinal study, to enable data to be collected during the transition to motherhood. Individual identity was interpreted and viewed as developing in response to changing contexts, such as the birth event becoming a parent, enabling one to construct one’s own sense of a meaningful life. Women effectively differentiated themselves from their personal and social identities and took responsibility for their actions. Identity is culturally and socially shaped and experienced, though not experienced similarly by all women. The individualized perspective on identity recognizes that (a) social influences are seen as external to the individual and (b) the view that social influences are, in fact, internalized by the individual.

Keywords: motherhood, transition, identity, IPA

Procedia PDF Downloads 30
3079 Tatak Noy-Pi: The Branding Evolution of Tesoro's Philippine Handicrafts- A Philippines Creative and Cultural Industry

Authors: Regine R. Villanueva

Abstract:

The study looks into how a cultural industry such as Tesoro’s Philippine Handicrafts underwent the brand revitalization process throughout its 70 years of existence in the Philippine market. This study uses a historical approach which analyzes the changes in product development and promotional strategies. Similarly, its brand identity was determined as well in terms of its internal processes and archival data such as history, mission – vision, customer relations, products, and promotions. The product life cycle model and the brand identity planning model were used as theoretical framework for the study. The life cycle was used in historically tracing the company’s developments and changes in terms of its branding, more specifically the products, promotions, and identity. Interviews were conducted among informants who included the CEO and the heads of each department in the business. The researcher also utilized textual analysis to have an in-depth understanding of Tesoro’s’ brand identity portrayal through its advertisements. The results showed how the company has undergone a progressive and innovative transition in its life cycle. With the changing markets and increased competition, the brand started active promotions and engaged in product development. In terms of identity, they are branded as pioneers of the handicraft industry in the Philippines. They started their brand revitalization to be able to imbibe this identity to their consumers through advertisement communication and identifying their segmented markets.

Keywords: cultural industry, handicrafts, case study, philippines

Procedia PDF Downloads 594
3078 Efficient Signcryption Scheme with Provable Security for Smart Card

Authors: Jayaprakash Kar, Daniyal M. Alghazzawi

Abstract:

The article proposes a novel construction of signcryption scheme with provable security which is most suited to implement on smart card. It is secure in random oracle model and the security relies on Decisional Bilinear Diffie-Hellmann Problem. The proposed scheme is secure against adaptive chosen ciphertext attack (indistiguishbility) and adaptive chosen message attack (unforgebility). Also, it is inspired by zero-knowledge proof. The two most important security goals for smart card are Confidentiality and authenticity. These functions are performed in one logical step in low computational cost.

Keywords: random oracle, provable security, unforgebility, smart card

Procedia PDF Downloads 568
3077 Reductive Control in the Management of Redundant Actuation

Authors: Mkhinini Maher, Knani Jilani

Abstract:

We present in this work the performances of a mobile omnidirectional robot through evaluating its management of the redundancy of actuation. Thus we come to the predictive control implemented. The distribution of the wringer on the robot actions, through the inverse pseudo of Moore-Penrose, corresponds to a -geometric- distribution of efforts. We will show that the load on vehicle wheels would not be equi-distributed in terms of wheels configuration and of robot movement. Thus, the threshold of sliding is not the same for the three wheels of the vehicle. We suggest exploiting the redundancy of actuation to reduce the risk of wheels sliding and to ameliorate, thereby, its accuracy of displacement. This kind of approach was the subject of study for the legged robots.

Keywords: mobile robot, actuation, redundancy, omnidirectional, inverse pseudo moore-penrose, reductive control

Procedia PDF Downloads 481
3076 National Identity in Connecting the Community through Mural Art for Petronas Dagangan Berhad

Authors: Nadiah Mohamad, Wan Samiati Andriana Wan Mohd Daud, M. Suhaimi Tohid, Mohd Fazli Othman, Mohamad Rizal Salleh

Abstract:

This is a collaborative project of the mural art between The Department of Fine Art from Universiti Teknologi MARA (UiTM) and Petronas Dagangan Berhad (PDB), the most leading retailer and marketer of downstream oil and gas products in Malaysia. Five different states in the Peninsular of Malaysia that has been identified in showcasing the National Identity of Malaysia at each Petronas gas station, this also includes the Air Keroh in Melaka, Pasir Pekan in Kelantan, Pontian in Johor, Simpang Pulai in Perak, and also Wakaf Bharu in Terengganu. This project is to analyze the element of national identity that has been demonstrated at the Petronas's Mural. The ultimate aim of the mural is to let the community and local people to be aware about what Malaysians are consists and proud of and how everyone is able to connect with the idea through visual art. The method that is being explained in this research is by using visual data through research and also self-experience in collecting the visual data in identifying what images is considered as the national identity and idea development and visual analysis is being transferred based upon the visual data collection. In this stage, elements and principles of design will be the key in highlighting what is necessary for a work of art. In conclusion, visual image of the National Identity of Malaysia is able to connect to the audience from local and also to the people from outside the country to learn and understand the beauty and diversity of Malaysia as a unique country with art through the wall of five Petronas gas station.

Keywords: community, fine art, mural art, national identity

Procedia PDF Downloads 166
3075 TRNG Based Key Generation for Certificateless Signcryption

Authors: S.Balaji, R.Sujatha, M. Ramakrishnan

Abstract:

Signcryption is a cryptographic primitive that fulfills both the functions of digital signature and public key encryption simultaneously in low cost when compared with the traditional signature-then-encryption approach. In this paper, we propose a novel mouse movement based key generation technique to generate secret keys which is secure against the outer and insider attacks. Tag Key Encapsulation Mechanism (KEM) process is implemented using True Random Number Generator (TRNG) method. This TRNG based key is used for data encryption in the Data Encapsulation Mechanism (DEM). We compare the statistical reports of the proposed system with the previous methods which implements TKEM based on pseudo random number generator

Keywords: pseudo random umber generator, signcryption, true random number generator, node deployment

Procedia PDF Downloads 314
3074 Impacts of Racialization: Exploring the Relationships between Racial Discrimination, Racial Identity, and Activism

Authors: Brianna Z. Ross, Jonathan N. Livingston

Abstract:

Given that discussions of racism and racial tensions have become more salient, there is a need to evaluate the impacts of racialization among Black individuals. Racial discrimination has become one of the most common experiences within the Black American population. Likewise, Black individuals have indicated a need to address their racial identities at an earlier age than their non-Black peers. Further, Black individuals have been found at the forefront of multiple social and political movements, including but not limited to the Civil Rights Movement, Black Lives Matter, MeToo, and Say Her Name. Moreover, the present study sought to explore the predictive relationships that exist between racial discrimination, racial identity, and activism in the Black community. The results of standard and hierarchical regression analyses revealed that racial discrimination and racial identity significantly predict each other, but only racial discrimination is a significant predictor for the relationship to activism. Nonetheless, the results from this study will provide a basis for social scientists to better understand the impacts of racialization on the Black American population.

Keywords: activism, racialization, racial discrimination, racial identity

Procedia PDF Downloads 113
3073 Kinetics, Equilibrium and Thermodynamic Studies on Adsorption of Reactive Blue 29 from Aqueous Solution Using Activated Tamarind Kernel Powder

Authors: E. D. Paul, A. D. Adams, O. Sunmonu, U. S. Ishiaku

Abstract:

Activated tamarind kernel powder (ATKP) was prepared from tamarind fruit (Tamarindus indica), and utilized for the removal of Reactive Blue 29 (RB29) from its aqueous solution. The powder was activated using 4N nitric acid (HNO₃). The adsorbent was characterised using infrared spectroscopy, bulk density, ash content, pH, moisture content and dry matter content measurements. The effect of various parameters which include; temperature, pH, adsorbent dosage, ion concentration, and contact time were studied. Four different equilibrium isotherm models were tested on the experimental data, but the Temkin isotherm model was best-fitted into the experimental data. The pseudo-first order and pseudo-second-order kinetic models were also fitted into the graphs, but pseudo-second order was best fitted to the experimental data. The thermodynamic parameters showed that the adsorption of Reactive Blue 29 onto activated tamarind kernel powder is a physical process, feasible and spontaneous, exothermic in nature and there is decreased randomness at the solid/solution interphase during the adsorption process. Therefore, activated tamarind kernel powder has proven to be a very good adsorbent for the removal of Reactive Blue 29 dyes from industrial waste water.

Keywords: tamarind kernel powder, reactive blue 29, isotherms, kinetics

Procedia PDF Downloads 223
3072 Exploring the Cross-Cultural Practice of Transnational Community in Taiwan

Authors: Ya-Hsuan Wang

Abstract:

This project of intercultural education aimed to explore pluricultural people’s interpretation and evaluation of the transnational community in Taiwan. Based on transnationalism and transculturalism, this study concerns the human right issues for immigrants and pluricultural people. Research participants as immigrants in Taiwan were asked about their typical thinking styles in the transnational community, their cultural integration in terms of transnational behaviors, and their collective memory of the transnational community. Interview questions included what key factors were involved in their identity negotiation, what roles the transnational community and collective memory would be for their identity negotiation and what were the positive or negative aspects impacting cross-border identity. Based on the experiences of pluricultural people and transnational communities, this project expected to enhance the depth and width of developing transcultural knowledge in textbook reform on History in K-12 schools. It is to transform cross-border identity into knowledge embedded with local culture in response to globalization and localization. The purpose of this paper is to portrait the cross-cultural practice of transnational community for Taiwan’s immigrants. It is to report their external socio-cultural expectation of ethnic economics, to understand their internal life course of national identity, and to clarify transnational community in relation to their cross-border identity. In conclusion, the cross-cultural practice of transnational community combined the external contexts such as ethnic economic interaction among transnational communities, social report and ethnic industry, and the internal contexts such as ethnic identity, language use, and collective memory in ethnic history.

Keywords: cross-cultural practice, immigrants, pluricultural people, transnational community

Procedia PDF Downloads 170
3071 Descent Algorithms for Optimization Algorithms Using q-Derivative

Authors: Geetanjali Panda, Suvrakanti Chakraborty

Abstract:

In this paper, Newton-like descent methods are proposed for unconstrained optimization problems, which use q-derivatives of the gradient of an objective function. First, a local scheme is developed with alternative sufficient optimality condition, and then the method is extended to a global scheme. Moreover, a variant of practical Newton scheme is also developed introducing a real sequence. Global convergence of these schemes is proved under some mild conditions. Numerical experiments and graphical illustrations are provided. Finally, the performance profiles on a test set show that the proposed schemes are competitive to the existing first-order schemes for optimization problems.

Keywords: Descent algorithm, line search method, q calculus, Quasi Newton method

Procedia PDF Downloads 373
3070 Secure Automatic Key SMS Encryption Scheme Using Hybrid Cryptosystem: An Approach for One Time Password Security Enhancement

Authors: Pratama R. Yunia, Firmansyah, I., Ariani, Ulfa R. Maharani, Fikri M. Al

Abstract:

Nowadays, notwithstanding that the role of SMS as a means of communication has been largely replaced by online applications such as WhatsApp, Telegram, and others, the fact that SMS is still used for certain and important communication needs is indisputable. Among them is for sending one time password (OTP) as an authentication media for various online applications ranging from chatting, shopping to online banking applications. However, the usage of SMS does not pretty much guarantee the security of transmitted messages. As a matter of fact, the transmitted messages between BTS is still in the form of plaintext, making it extremely vulnerable to eavesdropping, especially if the message is confidential, for instance, the OTP. One solution to overcome this problem is to use an SMS application which provides security services for each transmitted message. Responding to this problem, in this study, an automatic key SMS encryption scheme was designed as a means to secure SMS communication. The proposed scheme allows SMS sending, which is automatically encrypted with keys that are constantly changing (automatic key update), automatic key exchange, and automatic key generation. In terms of the security method, the proposed scheme applies cryptographic techniques with a hybrid cryptosystem mechanism. Proofing the proposed scheme, a client to client SMS encryption application was developed using Java platform with AES-256 as encryption algorithm, RSA-768 as public and private key generator and SHA-256 for message hashing function. The result of this study is a secure automatic key SMS encryption scheme using hybrid cryptosystem which can guarantee the security of every transmitted message, so as to become a reliable solution in sending confidential messages through SMS although it still has weaknesses in terms of processing time.

Keywords: encryption scheme, hybrid cryptosystem, one time password, SMS security

Procedia PDF Downloads 103
3069 Difference Expansion Based Reversible Data Hiding Scheme Using Edge Directions

Authors: Toshanlal Meenpal, Ankita Meenpal

Abstract:

A very important technique in reversible data hiding field is Difference expansion. Secret message as well as the cover image may be completely recovered without any distortion after data extraction process due to reversibility feature. In general, in any difference expansion scheme embedding is performed by integer transform in the difference image acquired by grouping two neighboring pixel values. This paper proposes an improved reversible difference expansion embedding scheme. We mainly consider edge direction for embedding by modifying the difference of two neighboring pixels values. In general, the larger difference tends to bring a degraded stego image quality than the smaller difference. Image quality in the range of 0.5 to 3.7 dB in average is achieved by the proposed scheme, which is shown through the experimental results. However payload wise it achieves almost similar capacity in comparisons with previous method.

Keywords: information hiding, wedge direction, difference expansion, integer transform

Procedia PDF Downloads 453
3068 Gender Identity: Omani College Students Negotiate Their Cultural Expectations

Authors: Mohammed Alkharusi

Abstract:

This study addresses issues of gender identity faced by female and male Omani students studying at educational higher institutions. The study interviewed 16 male and female students to understand how cultural expectations of gender influence these students’ communication, and as a result how these students negotiate their gender identity to facilitate communication practices (or not) with the opposite sex. The context, focus, and theoretical underpinnings of the study are presented. Given that the researcher is also an Omani Arab, methodological and ethical challenges (e.g., recruiting and engaging with participants, and conducting semi-structured face-to-face interviews) will be discussed reflexively. The analysis found that students continued to following cultural expectations. They kept minimum interaction with the opposite sex that was illustrated by preferring to work with the same sex in group assignments only, avoiding sitting alone with the opposite sex, and not participating in academic activities. In the social context, the students started negotiating their gender identity and adopted communication practices that facilitated their social communication with the opposite sex. For example, they accepted to work with the opposite sex in different social mixed activities. In conclusion, students desired to maintain their cultural expectations but adopted certain communication practices to interact with the opposite sex.

Keywords: communication, cultural expectations, gender, identity, negotiation

Procedia PDF Downloads 362
3067 Central African Republic Government Recruitment Agency Based on Identity Management and Public Key Encryption

Authors: Koyangbo Guere Monguia Michel Alex Emmanuel

Abstract:

In e-government and especially recruitment, many researches have been conducted to build a trustworthy and reliable online or application system capable to process users or job applicant files. In this research (Government Recruitment Agency), cloud computing, identity management and public key encryption have been used to management domains, access control authorization mechanism and to secure data exchange between entities for reliable procedure of processing files.

Keywords: cloud computing network, identity management systems, public key encryption, access control and authorization

Procedia PDF Downloads 327
3066 The Effect of Artificial Intelligence on Civil Engineering Outputs and Designs

Authors: Mina Youssef Makram Ibrahim

Abstract:

Engineering identity contributes to the professional and academic sustainability of female engineers. Recognizability is an important factor that shapes an engineer's identity. People who are deprived of real recognition often fail to create a positive identity. This study draws on Hornet’s recognition theory to identify factors that influence female civil engineers' sense of recognition. Over the past decade, a survey was created and distributed to 330 graduate students in the Department of Civil, Civil and Environmental Engineering at Iowa State University. Survey items include demographics, perceptions of a civil engineer's identity, and factors that influence recognition of a civil engineer's identity, such as B. Opinions about society and family. Descriptive analysis of survey responses revealed that perceptions of civil engineering varied significantly. The definitions of civil engineering provided by participants included the terms structure, design and infrastructure. Almost half of the participants said the main reason for studying Civil Engineering was their interest in the subject, and the majority said they were proud to be a civil engineer. Many study participants reported that their parents viewed them as civil engineers. Institutional and operational treatment was also found to have a significant impact on the recognition of women civil engineers. Almost half of the participants reported feeling isolated or ignored at work because of their gender. This research highlights the importance of recognition in developing the identity of women engineers.

Keywords: civil service, hiring, merit, policing civil engineering, construction, surveying, mapping, pile civil service, Kazakhstan, modernization, a national model of civil service, civil service reforms, bureaucracy civil engineering, gender, identity, recognition

Procedia PDF Downloads 24
3065 Identity of Indian Migrants and Muslim Refugee Women in Sydney, Australia

Authors: Sheikh, R. Author, Bhardwaj S. Author, Jr.

Abstract:

The emphasis of this paper is to investigate the identity shifts experienced within the Indian community and among Muslim refugee women in Sydney. Using Goffman’s paradigm of everyday interactions, attention is paid to how migrants navigate and perform their multiple identities in their daily life. By focusing on narratives of the migrant- migration is understood as processual instead of a one time decision of re-location. The paper aims to highlight how individuals choose and re-adapt their cultural and social practices within the context of Australia. Migrant narratives are rooted in specific socio-cultural settings of one’s own community as well as the nature of migration to a specific country. Differences and similarities will be observed within the Indian community, and among Muslim refugee women in terms of how identity is negotiated, social networks are re-established in Australia. Some attention will also be paid to difficulties that are being faced by migrants-especially in terms of Muslim identity for Refugee women, particularly in terms of assimilation, building on Ghassan Hage’s use of appraisal theory and how a diversity of language and religion is accommodated within the Indian community. By using two diverse groups, it would be able to identify and contrast migrant experiences.

Keywords: identity, migrant, refugee, women, assimilation, narratives

Procedia PDF Downloads 159
3064 Promoting Civic Health through Patient Voter Registration

Authors: Amit Syal, Madeline Grade, Alister Martin

Abstract:

Background: Cross-sectional and longitudinal studies demonstrate an association between health and voting. Furthermore, voting enables populations to support policies that impact their health via social determinants like income, education, housing, and healthcare access. Unfortunately, many barriers exist which disproportionately affect the civic participation of certain minority groups. Health professionals have an important role to play in addressing the civic health of all patients and empowering underrepresented communities. Description: Vot-ER is a non-partisan, nonprofit organization that aims to reduce barriers to civic participation by helping patients register to vote while in healthcare settings. The initial approach involved iPad-based kiosks in the emergency department waiting rooms, allowing patients to register themselves while waiting. After the COVID-19 pandemic began, Vot-ER expanded its touchless digital approaches. Vot-ER provides healthcare workers across the country with “Healthy Democracy Kits” consisting of badge backers, posters, discharge paperwork, and other resources. These contain QR and text codes that direct users to an online platform for registering to vote or requesting a mail-in ballot, available in English or Spanish. Outcomes: From May to November 2020, Vot-ER helped prepare 46,320 people to vote. 13,192 individual healthcare providers across all 50 states signed up for and received Healthy Democracy Kits. 80 medical schools participated in the Healthy Democracy Campaign competition. Over 500 institutions ordered site-based materials. Conclusions: A healthy democracy is one in which all individuals in a community have equal and fair opportunities for their voices to be heard. Healthcare settings, such as hospitals, are appropriate and effective venues for increasing both voter registration and education.

Keywords: civic health, enfranchisement, physician, voting

Procedia PDF Downloads 146
3063 Efficient Implementation of Finite Volume Multi-Resolution Weno Scheme on Adaptive Cartesian Grids

Authors: Yuchen Yang, Zhenming Wang, Jun Zhu, Ning Zhao

Abstract:

An easy-to-implement and robust finite volume multi-resolution Weighted Essentially Non-Oscillatory (WENO) scheme is proposed on adaptive cartesian grids in this paper. Such a multi-resolution WENO scheme is combined with the ghost cell immersed boundary method (IBM) and wall-function technique to solve Navier-Stokes equations. Unlike the k-exact finite volume WENO schemes which involve large amounts of extra storage, repeatedly solving the matrix generated in a least-square method or the process of calculating optimal linear weights on adaptive cartesian grids, the present methodology only adds very small overhead and can be easily implemented in existing edge-based computational fluid dynamics (CFD) codes with minor modifications. Also, the linear weights of this adaptive finite volume multi-resolution WENO scheme can be any positive numbers on condition that their sum is one. It is a way of bypassing the calculation of the optimal linear weights and such a multi-resolution WENO scheme avoids dealing with the negative linear weights on adaptive cartesian grids. Some benchmark viscous problems are numerical solved to show the efficiency and good performance of this adaptive multi-resolution WENO scheme. Compared with a second-order edge-based method, the presented method can be implemented into an adaptive cartesian grid with slight modification for big Reynolds number problems.

Keywords: adaptive mesh refinement method, finite volume multi-resolution WENO scheme, immersed boundary method, wall-function technique.

Procedia PDF Downloads 122
3062 Scaffold on Trial: The Rhetorical Controversy of a Public Artifact in Minneapolis

Authors: Cynthia Pope

Abstract:

Though traditional art has been strong on showcasing aesthetics to imbue pleasantries, modern public art has been breaking trends to push citizens beyond the pleasure of seeing beauty. Contemporary public sculpture, in particular, has been the impetus of provoking questions about community standards, identity, and race relations. A phenomenon involving Scaffold, a sculpture by artist Sam Durant, became the focal point of contention within Minneapolis, Minnesota, recently. With intentions to better understand the power public sculpture has to disrupt community identity, in this book, It will use primarily rhetorical theory to explain how all parties involved—The Walker Art Museum, the Dakota Nation, Durant, and local citizens—participated in a controversy touching on racial politics, identity, culture, history and public art. This mixed-methods case study examines the public artifact contextually through historical and cultural frameworks. Findings in this project will reveal Scaffold to be represented as a tool of empowered Caucasians to the exclusion of marginalized people. This project also informs the fields of public rhetoric and political identity, marginalized voices, and community and social justice initiatives to include the difficult topic of race and identity.

Keywords: public art controversy, technical communication, community narrative, ambient rhetoric

Procedia PDF Downloads 41
3061 Operator Splitting Scheme for the Inverse Nagumo Equation

Authors: Sharon-Yasotha Veerayah-Mcgregor, Valipuram Manoranjan

Abstract:

A backward or inverse problem is known to be an ill-posed problem due to its instability that easily emerges with any slight change within the conditions of the problem. Therefore, only a limited number of numerical approaches are available to solve a backward problem. This paper considers the Nagumo equation, an equation that describes impulse propagation in nerve axons, which also models population growth with the Allee effect. A creative operator splitting numerical scheme is constructed to solve the inverse Nagumo equation. Computational simulations are used to verify that this scheme is stable, accurate, and efficient.

Keywords: inverse/backward equation, operator-splitting, Nagumo equation, ill-posed, finite-difference

Procedia PDF Downloads 49
3060 Outcomes from a Qualitative Research: Ethnic Prejudice and Identity Difficulties in Experiences of Young People of Foreign Origin Adopted in Italy

Authors: Stefania Lorenzini

Abstract:

Italy is a country where the phenomenon of international adoption is very considerable: indeed, it is second in the world only to the United States. This contribution deals with issues related to the development of children's identities in international and interethnic adoption. Process of identity construction can be complex in adopted children born and, often, lived for some years of their young life, in geographical, human, social and cultural contexts very different from those they live after adoption. The results of a qualitative research conducted by interviewing young people adopted in Italy make it possible to grasp the different facets of discrimination episodes related to somatic traits, and in particular to the color of the skin, that refer to these young people foreign origin. Outcomes from the research show difficulties in identy construction but also highlight how that evolution of an "intercultural identity" during international and interethnic adoption is possible.

Keywords: discrimination, identity, intercultural education, international adoption

Procedia PDF Downloads 223
3059 Identity Formation Towards Design Typology of Malay Traditional House in Negeri Sembilan, Malaysia

Authors: Noor Hayati Binti Ismail, Mastor Bin Surat, Raja Nafida Binti Raja Shahminan, Shahrul Kamil Bin Yunus

Abstract:

Traditional Malay house built in the various custom and culture for every state in Malaysia. Each state has its characteristics, design and different concepts that form the distinctive identity. The uniqueness of a traditional house design is a symbolize of Negeri Sembilan society. The purpose of this paper is to introduce the feature, a traditional Malay house in Negeri Sembilan, Malaysia. This typology will describe five types of traditional Malay houses in Negeri Sembilan by briefly about the concept of a traditional Malay house design. The design represents a variety of purposes that are often associated with its own culture and customs practiced by the community. In addition, the design of long tapering roof with both ends of the roof went up a little bit architecture has become an identity of its own in Negeri Sembilan. The study involves several villages of traditional houses in Negeri Sembilan, Malaysia. Data collection was obtained through a process of observation, interviews, questionnaire and taking photos related. Through this research, We are expected to provide awareness and also a reference to the next generation of traditional houses in Malaysia especially in Negeri Sembilan. Identity and uniqueness of traditional houses Negeri Sembilan increasingly difficult to maintain and can be kept from being lost in their own land.

Keywords: design, identity, traditional Malay house, typology

Procedia PDF Downloads 593
3058 Optimal Closed-loop Input Shaping Control Scheme for a 3D Gantry Crane

Authors: Mohammad Javad Maghsoudi, Z. Mohamed, A. R. Husain

Abstract:

Input shaping has been utilized for vibration reduction of many oscillatory systems. This paper presents an optimal closed-loop input shaping scheme for control of a three dimensional (3D) gantry crane system including. This includes a PID controller and Zero Vibration shaper which consider two control objectives concurrently. The control objectives are minimum sway of a payload and fast and accurate positioning of a trolley. A complete mathematical model of a lab-scaled 3D gantry crane is simulated in Simulink. Moreover, by utilizing PSO algorithm and a proposed scheme the controller is designed to cater both control objectives concurrently. Simulation studies on a 3D gantry crane show that the proposed optimal controller has an acceptable performance. The controller provides good position response with satisfactory payload sway in both rail and trolley responses.

Keywords: 3D gantry crane, input shaping, closed-loop control, optimal scheme, PID

Procedia PDF Downloads 390
3057 An Investigation of the Operation and Performance of London Cycle Hire Scheme

Authors: Amer Ali, Jessica Cecchinelli, Antonis Charalambous

Abstract:

Cycling is one of the most environmentally friendly, economic and healthy modes of transport but it needs more efficient cycle infrastructure and more effective safety measures. This paper represents an investigation into the performance and operation of the London Cycle Hire Scheme which started to operate in July 2010 using 5,000 cycles and 315 docking stations and currently has more than 10,000 cycles and over 700 docking stations across London which are available 24/7, 365 days a year. The study, which was conducted during the second half of 2014, consists of two parts; namely, the longitudinal review of the hire scheme between its introduction in 2010 and November 2014, and a field survey in November 2014 in the form of face-face interviews of the users of the cycle scheme to ascertain the existing limitations and difficulties experienced by those users and how it could be improved in terms of capability and safety. The study also includes a correlation between the usage of the cycle scheme and the corresponding weather conditions. The main findings are that on average the number of users (hiring frequency) had increased from just over two millions hires in 2010 to just less than ten millions in 2014. The field survey showed that 80% of the users are satisfied with the performance of the scheme whilst 50% of the users raised concern about the safety level of using the available cycle routes and infrastructure. The study also revealed that a high percentage of the cycle trips were relatively short (less than 30 minutes). Although the weather condition had some effect on cycling, the cost of using the cycle scheme and the main events in London had more effect on the number of cycle hires. The key conclusions are that despite the safety concern and the lack of infrastructure for continuous routes there was an encouraging number of people who opted for cycling as a clean, affordable, and healthy mode of transport. There is a need to expand the scheme by providing more cycles and docking stations and to support that by more well-designed and maintained cycle routes. More details about the development of London Cycle Hire Scheme during the last five years, its performance and the key issues revealed by the surveyed users will be reported in the full version of the paper.

Keywords: cycling mode of transport, london cycle hire scheme, safety, environmental and health benefits, user satisfaction

Procedia PDF Downloads 365