Search results for: social network theory
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 16372

Search results for: social network theory

16102 The Truth about Good and Evil: A Mixed-Methods Approach to Color Theory

Authors: Raniya Alsharif

Abstract:

The color theory of good and evil is the association of colors to the omnipresent concept of good and evil, where human behavior and perception can be highly influenced by seeing black and white, making these connotations almost dangerously distinctive where they can be very hard to distinguish. This theory is a human construct that dates back to ancient Egypt and has been used since then in almost all forms of communication and expression, such as art, fashion, literature, and religious manuscripts, helping the implantation of preconceived ideas that influence behavior and society. This is a mixed-methods research that uses both surveys to collect quantitative data related to the theory and a vignette to collect qualitative data by using a scenario where participants aged between 18-25 will style two characters of good and bad characteristics with color contrasting clothes, both yielding results about the nature of the preconceived perceptions associated with ‘black and white’ and ‘good and evil’, illustrating the important role of media and communications in human behavior and subconscious, and also uncover how far this theory goes in the age of social media enlightenment.

Keywords: color perception, interpretivism, thematic analysis, vignettes

Procedia PDF Downloads 102
16101 Gendered Perspectives on the Understanding of the Politics and the Social Life

Authors: Canan Cetin

Abstract:

This essay analyses how gendered shaped views influence on our understanding of global politics. To do so, feminism used as a framework theory, thus masculinity is discussed in order to explain the male-dominated international relations (IR) discipline and the differences of reflections on our perspective considering the politics in a broader perspective. Particularly, it is highlighted that the social and cultural structures of societies have also an impact on our views about international relations and politics. From a different perspective, it is aimed that the sociological and cultural impression of the shifted gender perspectives on the political approach of different nations and societies will be examined by drawing on a range of sources. Instead of supporting one feminist theory, this essay engages with all traditions and enriches their arguments. Specifically, the main objective of the essay is hegemonic and plural masculinity on societies. The essay sets things up theoretically by looking at the nature of masculinity – the stage is set to show how this informs our understanding of IR.

Keywords: feminism, politics, international affairs, social life

Procedia PDF Downloads 172
16100 Corporate Social Responsibility, Earnings, and Tax Avoidance: Evidence from Indonesia

Authors: Cahyaningsih Cahyaningsih, Fu'ad Rakhman

Abstract:

This study examines empirically the association between corporate social responsibility (CSR) and tax avoidance. This study also investigates the effect of earnings on the relation between CSR and tax avoidance. Effective tax rate (ETR) and cash effective tax rate (CETR) were used to measure tax avoidance. Corporate social responsibility fund (CSRF) and corporate social responsibility disclosure (CSRD) were used as proxies for CSR. Test was conducted for public firms which were listed in the Indonesia Stock Exchange during the period of 2011-2014. Based on slack resource theory, this study finds that the relation between CSR and tax avoidance is moderated by earnings.

Keywords: corporate social responsibility disclosure, corporate social responsibility fund, earnings, tax avoidance

Procedia PDF Downloads 247
16099 The Impact of Socialization Preferences on Perceptions of Generalized Social Trust in China

Authors: Menghzheng Yao

Abstract:

Generalized social trust among Chinese has been declining in the past few decades, making the search for its causes necessary. Drawing on the symbolic interaction theory and the 2012 Chinese General Social Survey data, this research investigated the impact of people’s socialization preferences and frequencies on their perceptions of generalized social trust in China. This research also took a preliminary step towards understanding the spatial differences of the generalized social trust using the ArcGIS software. The results show that respondents who interacted with their neighbors more frequently were more likely to have higher levels of perceptions of generalized social trust. Several demographics were also significantly related to perception of generalized social trust. Elderly and better educated Chinese and people with higher self-perceived social status were associated with greater levels of generalized social trust perception, while urban dwellers and religious respondents expressed lower levels of such perception. Implications for future research and policy are discussed.

Keywords: China, generalized social trust, symbolic interaction, ArcGIS

Procedia PDF Downloads 342
16098 End-to-End Control and Management of Multi-AS Virtual Service Networks Using SDN and Autonomic Computing Architecture

Authors: Yong Xue, Daniel A. Menascé

Abstract:

Automated and end-to-end network resource management and provisioning for virtual service networks in a multiple autonomous systems (a.k.a multi-AS) environment is a challenging and open problem. This paper proposes a novel, scalable and interoperable high-level architecture that incorporates a number of emerging enabling technologies including Software Defined Network (SDN), Network Function Virtualization (NFV), Service Oriented Architecture (SOA), and Autonomic Computing. The proposed architecture can be used to not only automate network resource management and provisioning for virtual service networks across multiple autonomous substrate networks, but also provide an adaptive capability for achieving optimal network resource management and maintaining network-level end-to-end network performance as well. The paper argues that this SDN and autonomic computing based architecture lays a solid foundation that can facilitate the development of the future Internet based on the pluralistic paradigm.

Keywords: virtual network, software defined network, virtual service network, adaptive resource management, SOA, multi-AS, inter-domain

Procedia PDF Downloads 497
16097 Development of an Instructional Model for Health Education Based On Social Cognitive Theory and Strategic Life Planning to Enhance Self-Regulation and Learning Achievement of Lower Secondary School Students

Authors: Adisorn Bansong, Walai Isarankura Na Ayudhaya, Aumporn Makanong

Abstract:

A Development of an Instructional Model for Health Education was the aim to develop and study the effectiveness of an instructional model for health education to enhance self-regulation and learning achievement of lower secondary school students. It was the Quasi-Experimental Designs, used a Single-group Interrupted Time-series Designs, conducted by 2 phases: 1. To develop an instructional model based on Social Cognitive Theory and Strategic Life Planning. 2. To trial and evaluate effectiveness of an instructional model. The results as the following: i. An Instructional Model for Health Education consists of five main components: a) Attention b) Forethought c) Tactic Planning d) Execution and e) Reflection. ii. After an Instructional Model for Health Education has used for a semester trial, found the 4.07 percent of sample’s Self-Regulation higher and learning achievement on post-test were significantly higher than pre-test at .05 levels (p = .033, .000).

Keywords: social cognitive theory, strategic life planning, self-regulation, learning achievement

Procedia PDF Downloads 431
16096 The Relations Between Hans Kelsen’s Concept of Law and the Theory of Democracy

Authors: Monika Zalewska

Abstract:

Hans Kelsen was a versatile legal thinker whose achievements in the fields of legal theory, international law, and the theory of democracy are remarkable. All of the fields tackled by Kelsen are regarded as part of his “pure theory of law.” While the link between international law and Kelsen’s pure theory of law is apparent, the same cannot be said about the link between the theory of democracy and his pure theory of law. On the contrary, the general thinking concerning Kelsen’s thought is that it can be used to legitimize authoritarian regimes. The aim of this presentation is to address this concern by identifying the common ground between Kelsen’s pure theory of law and his theory of democracy and to show that they are compatible in a way that his pure theory of law and authoritarianism cannot be. The conceptual analysis of the purity of Kelsen’s theory and his goal of creating ideology-free legal science hints at how Kelsen’s pure theory of law and the theory of democracy are brought together. The presentation will first demonstrate that these two conceptions have common underlying values and meta-ethical convictions. Both are founded on relativism and a rational worldview, and the aim of both is peaceful co-existence. Second, it will be demonstrated that the separation of law and morality provides the maximum space for deliberation within democratic processes. The conclusion of this analysis is that striking similarities exist between Kelsen’s legal theory and his theory of democracy. These similarities are grounded in the Enlightenment tradition and its values, including rationality, a scientific worldview, tolerance, and equality. This observation supports the claim that, for Kelsen, legal positivism and the theory of democracy are not two separate theories but rather stem from the same set of values and from Kelsen’s relativistic worldview. Furthermore, three main issues determine Kelsen’s orientation toward a positivistic and democratic outlook. The first, which is associated with personality type, is the distinction between absolutism and relativism. The second, which is associated with the values that Kelsen favors in the social order, is peace. The third is legality, which creates the necessary condition for democracy to thrive and reveals that democracy is capable of fulfilling Kelsen’s ideal of law at its fullest. The first two categories exist in the background of Kelsen’s pure theory of law, while the latter is an inherent part of Kelsen’s concept of law. The analysis of the text concerning natural law doctrine and democracy indicates that behind the technical language of Kelsen’s pure theory of law is a strong concern with the trends that appeared after World War I. Despite his rigorous scientific mind, Kelsen was deeply humanistic. He tried to create a powerful intellectual weapon to provide strong arguments for peaceful coexistence and a rational outlook in Europe. The analysis provided by this presentation facilitates a broad theoretical, philosophical, and political understanding of Kelsen’s perspectives and, consequently, urges a strong endorsement of Kelsen’s approach to constitutional democracy.

Keywords: hans kelsen, democracy, legal positivism, pure theory of law

Procedia PDF Downloads 75
16095 Social Data Aggregator and Locator of Knowledge (STALK)

Authors: Rashmi Raghunandan, Sanjana Shankar, Rakshitha K. Bhat

Abstract:

Social media contributes a vast amount of data and information about individuals to the internet. This project will greatly reduce the need for unnecessary manual analysis of large and diverse social media profiles by filtering out and combining the useful information from various social media profiles, eliminating irrelevant data. It differs from the existing social media aggregators in that it does not provide a consolidated view of various profiles. Instead, it provides consolidated INFORMATION derived from the subject’s posts and other activities. It also allows analysis over multiple profiles and analytics based on several profiles. We strive to provide a query system to provide a natural language answer to questions when a user does not wish to go through the entire profile. The information provided can be filtered according to the different use cases it is used for.

Keywords: social network, analysis, Facebook, Linkedin, git, big data

Procedia PDF Downloads 415
16094 Social Network Based Decision Support System for Smart U-Parking Planning

Authors: Jun-Ho Park, Kwang-Woo Nam, Seung-Mo Hong, Tae-Heon Moon, Sang-Ho Lee, Youn-Taik Leem

Abstract:

The aim of this study was to build ‘Ubi-Net’, a decision-making support system for systematic establishment in U-City planning. We have experienced various urban problems caused by high-density development and population concentrations in established urban areas. To address these problems, a U-Service contributes to the alleviation of urban problems by providing real-time information to citizens through network connections and related information. However, technology, devices, and information for consumers are required for systematic U-Service planning in towns and cities where there are many difficulties in this regard, and a lack of reference systems. Thus, this study suggests methods to support the establishment of sustainable planning by providing comprehensive information including IT technology, devices, news, and social networking services(SNS) to U-City planners through intelligent searches. In this study, we targeted Smart U-Parking Planning to solve parking problems in an ‘old’ city. Through this study, we sought to contribute to supporting advances in U-Space and the alleviation of urban problems.

Keywords: desigin and decision support system, smart u-parking planning, social network analysis, urban engineering

Procedia PDF Downloads 404
16093 A Reflection: Looking the Pattern of Political Party (Gerindra Party) Campaign by Social Media in Indonesia General Election 2014

Authors: Clara Stella Anugerah

Abstract:

This study actually is a reflection of the general election in 2014. The researcher was interested in this case as the assessment of several phenomenons that happened recently. One of them is the use of social media for the campaign. By this modern era, social media becomes closer with society. It gains the communication process, and by the time being communicating others also becomes easier than before. Furthermore, social media can minimize the cost of communication with many people as a far distance that often comes to be an obstacle of communication does not become a big problem anymore. In Indonesia, the advantages of social media were used by a political party, Gerindra, to face the election that was held on 2014. Actually Gerindra is a newly formed political party that was established in 2008. In spite of Gerindra is the new comer in the election, according to the General Election Committee’s data in Indonesia, Gerindra has the biggest budget than others to cost campaign in social media. Because of that, this research wants to look “how is the pattern of Gerindra party’s campaign to face the general election in 2014? To ask that question, the theory used for this research is campaign method based on ICT (Information Communication Technology) by Rummele. According to the rummele, Gerindra was a party that used a product of social media massively, mainly facebook and twitter. According to that observation, this research focus on campaign that had been done by Gerindra in both of those social media by the time window given by KPU (General Election Committee) on Maret 16th until April 5th, 2014. The conclusion was derived by content analysis method that was used in the methodology. In this context, that method was used while interpreting the content uploaded by Gerindra to facebook or twitter, such as picture and writing. Finally, by that method and reflecting the rummele theory, this research inferred that the patern used for Gerindra’s campaign in social media tends to be top-down. It means: Gerindra showed uncommunicative tendency in social media and only want to catch much mass without mentioned a mission and vision clearly.

Keywords: Gerindra party, political party, social media, campaign, general election on 2014

Procedia PDF Downloads 445
16092 Cultural Regeneration and Social Impacts of Industrial Heritage Transformation: The Case of Westergasfabriek Cultural Park, Netherland

Authors: Hsin Hua He

Abstract:

The purpose of this study is to strengthen the social cohesion of the local community by injecting the cultural and creative concept into the industrial heritage transformation. The paradigms of industrial heritage research tend to explore from the perspective of space analysis, which concerned less about the cultural regeneration and the development of local culture. The paradigms of cultural quarter research use to from the perspective of creative economy and urban planning, concerned less about the social impacts and the interaction between residents and industrial sites. This research combines these two research areas of industrial heritage and cultural quarter, and focus on the social and cultural aspects. The transformation from the industrial heritage into a cultural park not only enhances the cultural capital and the quality of residents’ lives, but also preserves the unique local values. Internally it shapes the local identity, while externally establishes the image of the city. This paper uses Westergasfabriek Cultural Park in Amsterdam as the case study, through literature analysis, field work, and depth interview to explore how the cultural regeneration transforms industrial heritage. In terms of the planners’ and residents’ point of view adopt the theory of community participation, social capital, and sense of place to analyze the social impact of the industrial heritage transformation. The research finding is through cultural regeneration policies like holding cultural activities, building up public space, social network and public-private partnership, and adopting adaptive reuse to fulfil the people’s need and desire and reach the social cohesion. Finally, the study will examine the transformation of Taiwan's industrial heritage into cultural and creative quarters. The results are expected to use the operating experience of the Amsterdam cases and provide directions for Taiwan’s industrial heritage management to meet the cultural, social, economic symbiosis.

Keywords: cultural regeneration, community participation, social capital, sense of place, industrial heritage transformation

Procedia PDF Downloads 462
16091 An Agent-Based Model of Innovation Diffusion Using Heterogeneous Social Interaction and Preference

Authors: Jang kyun Cho, Jeong-dong Lee

Abstract:

The advent of the Internet, mobile communications, and social network services has stimulated social interactions among consumers, allowing people to affect one another’s innovation adoptions by exchanging information more frequently and more quickly. Previous diffusion models, such as the Bass model, however, face limitations in reflecting such recent phenomena in society. These models are weak in their ability to model interactions between agents; they model aggregated-level behaviors only. The agent based model, which is an alternative to the aggregate model, is good for individual modeling, but it is still not based on an economic perspective of social interactions so far. This study assumes the presence of social utility from other consumers in the adoption of innovation and investigates the effect of individual interactions on innovation diffusion by developing a new model called the interaction-based diffusion model. By comparing this model with previous diffusion models, the study also examines how the proposed model explains innovation diffusion from the perspective of economics. In addition, the study recommends the use of a small-world network topology instead of cellular automata to describe innovation diffusion. This study develops a model based on individual preference and heterogeneous social interactions using utility specification, which is expandable and, thus, able to encompass various issues in diffusion research, such as reservation price. Furthermore, the study proposes a new framework to forecast aggregated-level market demand from individual level modeling. The model also exhibits a good fit to real market data. It is expected that the study will contribute to our understanding of the innovation diffusion process through its microeconomic theoretical approach.

Keywords: innovation diffusion, agent based model, small-world network, demand forecasting

Procedia PDF Downloads 312
16090 Implementation of an Associative Memory Using a Restricted Hopfield Network

Authors: Tet H. Yeap

Abstract:

An analog restricted Hopfield Network is presented in this paper. It consists of two layers of nodes, visible and hidden nodes, connected by directional weighted paths forming a bipartite graph with no intralayer connection. An energy or Lyapunov function was derived to show that the proposed network will converge to stable states. By introducing hidden nodes, the proposed network can be trained to store patterns and has increased memory capacity. Training to be an associative memory, simulation results show that the associative memory performs better than a classical Hopfield network by being able to perform better memory recall when the input is noisy.

Keywords: restricted Hopfield network, Lyapunov function, simultaneous perturbation stochastic approximation

Procedia PDF Downloads 100
16089 Identifying Chaotic Architecture: Origins of Nonlinear Design Theory

Authors: Mohammadsadegh Zanganehfar

Abstract:

Since the modernism, movement, and appearance of modern architecture, an aggressive desire for a general design theory in the theoretical works of architects in the form of books and essays emerges. Since Robert Venturi and Denise Scott Brown’s published complexity and contradiction in architecture in 1966, the discourse of complexity and volumetric composition has been an important and controversial issue in the discipline. Ever since various theories and essays were involved in this discourse, this paper attempt to identify chaos theory as a scientific model of complexity and its relation to architecture design theory by conducting a qualitative analysis and multidisciplinary critical approach through architecture and basic sciences resources. As a result, we identify chaotic architecture as the correlation of chaos theory and architecture as an independent nonlinear design theory with specific characteristics and properties.

Keywords: architecture complexity, chaos theory, fractals, nonlinear dynamic systems, nonlinear ontology

Procedia PDF Downloads 341
16088 The Effect of Theory of Mind Training on Adolescents with Low Social Cognition and Eudaimonic Well-Being

Authors: Leema Jacob

Abstract:

The concept of psychological well-being is complex and has familiar use not only in psychology but also in the area of lifespan development. Eudaimonic well-being is finding a purpose and meaning in life, and this depends on both the individual and society, especially during adolescence; the social-cognitive environment can be decisive. The social environment of adolescents, including family, school, and friends, is recognized as an essential context for successful human life. The development of mature social relationships is also undoubtedly important. Theory of Mind is an emerging domain in cognitive neuroscience that involves the ability to attribute mental states to oneself and others. ToM skills training constitutes a new aspect of the adolescent’s social development, including four domains: cognitive ToM, affective ToM, and an inter-intra-personal understanding of social norms. Still, little effort has been made to promote this training as a modality to foster their psychological well-being. This study aims to use the eudaimonic approach to evaluate psychological well-being with a quasi-experimental research design (pre-post-test). The major objective of the study was to identify the effect of ToM skills training on the eudaimonic well-being of adolescents with low social cognition. The data was analyzed to find their effect size from a sample of 74 adolescents from India between 17 and 19 years old. The result revealed that ToM skills training has a positive outcome on the well-being of adolescents post-training. The results are discussed based on the effect of ToM skills training on psychological well-being during adolescence, as well as on the importance of focusing on mental health as a developmental asset that can potentially influence mental well-being in the future.

Keywords: ToM training, adolescents, eudaimonic well-being, social cognition

Procedia PDF Downloads 44
16087 The Influence of Social Media on the Body Image of First Year Female Medical Students of University of Khartoum, 2022

Authors: Razan Farah, Siham Ballah

Abstract:

Facebook, Instagram, TikTok and other social media applications have become an integral component of everyone’s social life, particularly among younger generations and adolescences. These social apps have been changing a lot of conceptions and believes in the population by representing public figures and celebrities as role models. The social comparison theory, which says that people self-evaluate based on comparisons with similar others, is commonly used to explore the impact of social media on body image. There is a need to study the influence of those social platforms on the body image as there have been an increase in body dissatisfaction in the recent years. This cross sectional study used a self administered questionnaire on a simple random sample of 133 female medical students of the first year. Finding shows that the response rate was 75%. There was an association between social media usage and noticing how the person look(p value = .022), but no significant association between social media use and body image influence or dissatisfaction was found. This study implies more research under this topic in Sudan as the literature are scarce.

Keywords: body image, body dissatisfaction, social media, adolescences

Procedia PDF Downloads 38
16086 Designing Directed Network with Optimal Controllability

Authors: Liang Bai, Yandong Xiao, Haorang Wang, Songyang Lao

Abstract:

The directedness of links is crucial to determine the controllability in complex networks. Even the edge directions can determine the controllability of complex networks. Obviously, for a given network, we wish to design its edge directions that make this network approach the optimal controllability. In this work, we firstly introduce two methods to enhance network by assigning edge directions. However, these two methods could not completely mitigate the negative effects of inaccessibility and dilations. Thus, to approach the optimal network controllability, the edge directions must mitigate the negative effects of inaccessibility and dilations as much as possible. Finally, we propose the edge direction for optimal controllability. The optimal method has been found to be successfully useful on real-world and synthetic networks.

Keywords: complex network, dynamics, network control, optimization

Procedia PDF Downloads 145
16085 A Deep Learning Approach to Online Social Network Account Compromisation

Authors: Edward K. Boahen, Brunel E. Bouya-Moko, Changda Wang

Abstract:

The major threat to online social network (OSN) users is account compromisation. Spammers now spread malicious messages by exploiting the trust relationship established between account owners and their friends. The challenge in detecting a compromised account by service providers is validating the trusted relationship established between the account owners, their friends, and the spammers. Another challenge is the increase in required human interaction with the feature selection. Research available on supervised learning (machine learning) has limitations with the feature selection and accounts that cannot be profiled, like application programming interface (API). Therefore, this paper discusses the various behaviours of the OSN users and the current approaches in detecting a compromised OSN account, emphasizing its limitations and challenges. We propose a deep learning approach that addresses and resolve the constraints faced by the previous schemes. We detailed our proposed optimized nonsymmetric deep auto-encoder (OPT_NDAE) for unsupervised feature learning, which reduces the required human interaction levels in the selection and extraction of features. We evaluated our proposed classifier using the NSL-KDD and KDDCUP'99 datasets in a graphical user interface enabled Weka application. The results obtained indicate that our proposed approach outperformed most of the traditional schemes in OSN compromised account detection with an accuracy rate of 99.86%.

Keywords: computer security, network security, online social network, account compromisation

Procedia PDF Downloads 90
16084 Social Innovation Rediscovered: An Analysis of Empirical Research

Authors: Imen Douzi, Karim Ben Kahla

Abstract:

In spite of the growing attention for social innovation, it is still considered to be in a stage of infancy with minimal progress in theory development. Upon examining the field of study, one would have to conclude that, over the past two decades, academic research has focused primarily on establishing a conceptual foundation. This has resulted in a considerable stream of conceptual papers which have outnumbered empirical articles. Nevertheless, despite its growing popularity, scholars and practitioners are far from reaching a consensus as to what social innovation actually means which resulted in competing definitions and approaches within the field of social innovation and lack of unifying conceptual framework. This paper reviews empirical research studies on social innovation, classifies them along three dimensions and summarizes research findings for each of these dimensions. Preliminary to the analysis of empirical researches, an overview of different perspectives of social innovation is presented.

Keywords: analysis of empirical research, definition, empirical research, social innovation perspectives

Procedia PDF Downloads 350
16083 Collision Theory Based Sentiment Detection Using Discourse Analysis in Hadoop

Authors: Anuta Mukherjee, Saswati Mukherjee

Abstract:

Data is growing everyday. Social networking sites such as Twitter are becoming an integral part of our daily lives, contributing a large increase in the growth of data. It is a rich source especially for sentiment detection or mining since people often express honest opinion through tweets. However, although sentiment analysis is a well-researched topic in text, this analysis using Twitter data poses additional challenges since these are unstructured data with abbreviations and without a strict grammatical correctness. We have employed collision theory to achieve sentiment analysis in Twitter data. We have also incorporated discourse analysis in the collision theory based model to detect accurate sentiment from tweets. We have also used the retweet field to assign weights to certain tweets and obtained the overall weightage of a topic provided in the form of a query. Hadoop has been exploited for speed. Our experiments show effective results.

Keywords: sentiment analysis, twitter, collision theory, discourse analysis

Procedia PDF Downloads 501
16082 System Survivability in Networks

Authors: Asma Ben Yaghlane, Mohamed Naceur Azaiez

Abstract:

We consider the problem of attacks on networks. We define the concept of system survivability in networks in the presence of intelligent threats. Our setting of the problem assumes a flow to be sent from one source node to a destination node. The attacker attempts to disable the network by preventing the flow to reach its destination while the defender attempts to identify the best path-set to use to maximize the chance of arrival of the flow to the destination node. Our concept is shown to be different from the classical concept of network reliability. We distinguish two types of network survivability related to the defender and to the attacker of the network, respectively. We prove that the defender-based-network survivability plays the role of a lower bound while the attacker-based-network survivability plays the role of an upper bound of network reliability. We also prove that both concepts almost never agree nor coincide with network reliability. Moreover, we use the shortest-path problem to determine the defender-based-network survivability and the min-cut problem to determine the attacker-based-network survivability. We extend the problem to a variety of models including the minimum-spanning-tree problem and the multiple source-/destination-network problems.

Keywords: defense/attack strategies, information, networks, reliability, survivability

Procedia PDF Downloads 355
16081 A Brief Review on the Relationship between Pain and Sociology

Authors: Hanieh Sakha, Nader Nader, Haleh Farzin

Abstract:

Introduction: Throughout history, pain theories have been supposed by biomedicine, especially regarding its diagnosis and treatment aspects. Therefore, the feeling of pain is not only a personal experience and is affected by social background; therefore, it involves extensive systems of signals. The challenges in emotional and sentimental dimensions of pain originate from scientific medicine (i.e., the dominant theory is also referred to as the specificity theory); however, this theory has accepted some alterations by emerging physiology. Then, Von Frey suggested the theory of cutaneous senses (i.e., Muller’s concept: the common sensation of combined four major skin receptors leading to a proper sensation) 50 years after the specificity theory. The pain pathway was composed of spinothalamic tracts and thalamus with an inhibitory effect on the cortex. Pain is referred to as a series of unique experiences with various reasons and qualities. Despite the gate control theory, the biological aspect overcomes the social aspect. Vrancken provided a more extensive definition of pain and found five approaches: Somatico-technical, dualistic body-oriented, behaviorist, phenomenological, and consciousness approaches. The Western model combined physical, emotional, and existential aspects of the human body. On the other hand, Kotarba felt confused about the basic origins of chronic pain. Freund demonstrated and argued with Durkhemian about the sociological approach to emotions. Lynch provided a piece of evidence about the correlation between cardiovascular disease and emotionally life-threatening occurrences. Helman supposed a distinction between private and public pain. Conclusion: The consideration of the emotional aspect of pain could lead to effective, emotional, and social responses to pain. On the contrary, the theory of embodiment is based on the sociological view of health and illness. Social epidemiology shows an imbalanced distribution of health, illness, and disability among various social groups. The social support and socio-cultural level can result in several types of pain. It means the status of athletes might define their pain experiences. Gender is one of the important contributing factors affecting the type of pain (i.e., females are more likely to seek health services for pain relief.) Chronic non-cancer pain (CNCP) has become a serious public health issue affecting more than 70 million people globally. CNCP is a serious public health issue which is caused by the lack of awareness about chronic pain management among the general population.

Keywords: pain, sociology, sociological, body

Procedia PDF Downloads 38
16080 A Global Business Network Built on Hive: Two Use Cases: Buying and Selling of Products and Services and Carrying Out of Social Impact Projects

Authors: Gheyzer Villegas, Edgardo Cedeño, Veruska Mata, Edmundo Chauran

Abstract:

One of the most significant changes that occurred in global commerce was the emergence of cryptocurrencies and blockchain technology. There is still much debate about the adoption of the economic model based on crypto assets, and myriad international projects and initiatives are being carried out to try and explore the potential that this new field offers. The Hive blockchain is a prime example of this, featuring two use cases: of how trade based on its native currencies can give successful results in the exchange of goods and services and in the financing of social impact projects. Its decentralized management model and visionary administration of its development fund have become a key part of its success.

Keywords: Hive, business, network, blockchain

Procedia PDF Downloads 38
16079 Maternal-Fetal Bonding for African American Mothers

Authors: Tracey Estriplet-Adams

Abstract:

This paper focuses on the influence of maternal-fetal bonding by examining attachment theory, psycho-social-cultural influences/adaptations, and maternal well-being. A systematic review methodology was used to synthesize research results to summarize current evidence that can contribute to evidence-based practices. It explores the relationship between attachment styles, prenatal attachment, and perceptions of maternal-infant bonding/attachment six weeks postpartum. It also examines the protective factors of maternal-fetal attachment development. The research explores Bowlby's attachment theory and its relevance to maternal-fetal bonding with a Black Feminist Theory lens. Additionally, it discusses the impact of perceived stress, social support, and ecological models on maternal-fetal attachment. The relationship between maternal well-being, maternal-fetal attachment, and early postpartum bonding is reviewed. Moreover, the paper specifically addresses black mothers and maternal-fetal bonding, exploring the intersectionality of race, ethnicity, class, geographic location, cultural identities, and immigration status. It considers the role of familial and partner support, as well as the relationship between maternal attachment style and maternal-fetal bonding, within the framework of attachment theory and black feminist theory. Therefore, it is imperative to center Black women's voices in research, policy, and healthcare practices. Black women are experts in their own experiences and advocate for their autonomy in decision-making regarding maternal-fetal health. By amplifying their voices, we can ensure that interventions are grounded in their lived experiences.

Keywords: maternal-fetal bonding, infant well-being, maternal-infant attachment, black mothers

Procedia PDF Downloads 43
16078 Computational Team Dynamics and Interaction Patterns in New Product Development Teams

Authors: Shankaran Sitarama

Abstract:

New Product Development (NPD) is invariably a team effort and involves effective teamwork. NPD team has members from different disciplines coming together and working through the different phases all the way from conceptual design phase till the production and product roll out. Creativity and Innovation are some of the key factors of successful NPD. Team members going through the different phases of NPD interact and work closely yet challenge each other during the design phases to brainstorm on ideas and later converge to work together. These two traits require the teams to have a divergent and a convergent thinking simultaneously. There needs to be a good balance. The team dynamics invariably result in conflicts among team members. While some amount of conflict (ideational conflict) is desirable in NPD teams to be creative as a group, relational conflicts (or discords among members) could be detrimental to teamwork. Team communication truly reflect these tensions and team dynamics. In this research, team communication (emails) between the members of the NPD teams is considered for analysis. The email communication is processed through a semantic analysis algorithm (LSA) to analyze the content of communication and a semantic similarity analysis to arrive at a social network graph that depicts the communication amongst team members based on the content of communication. The amount of communication (content and not frequency of communication) defines the interaction strength between the members. Social network adjacency matrix is thus obtained for the team. Standard social network analysis techniques based on the Adjacency Matrix (AM) and Dichotomized Adjacency Matrix (DAM) based on network density yield network graphs and network metrics like centrality. The social network graphs are then rendered for visual representation using a Metric Multi-Dimensional Scaling (MMDS) algorithm for node placements and arcs connecting the nodes (representing team members) are drawn. The distance of the nodes in the placement represents the tie-strength between the members. Stronger tie-strengths render nodes closer. Overall visual representation of the social network graph provides a clear picture of the team’s interactions. This research reveals four distinct patterns of team interaction that are clearly identifiable in the visual representation of the social network graph and have a clearly defined computational scheme. The four computational patterns of team interaction defined are Central Member Pattern (CMP), Subgroup and Aloof member Pattern (SAP), Isolate Member Pattern (IMP), and Pendant Member Pattern (PMP). Each of these patterns has a team dynamics implication in terms of the conflict level in the team. For instance, Isolate member pattern, clearly points to a near break-down in communication with the member and hence a possible high conflict level, whereas the subgroup or aloof member pattern points to a non-uniform information flow in the team and some moderate level of conflict. These pattern classifications of teams are then compared and correlated to the real level of conflict in the teams as indicated by the team members through an elaborate self-evaluation, team reflection, feedback form and results show a good correlation.

Keywords: team dynamics, team communication, team interactions, social network analysis, sna, new product development, latent semantic analysis, LSA, NPD teams

Procedia PDF Downloads 36
16077 Policy Monitoring and Water Stakeholders Network Analysis in Shemiranat

Authors: Fariba Ebrahimi, Mehdi Ghorbani

Abstract:

Achieving to integrated Water management fundamentally needs to effective relation, coordination, collaboration and synergy among various actors who have common but different responsibilities. In this sense, the foundation of comprehensive and integrated management is not compatible with centralization and top-down strategies. The aim of this paper is analysis institutional network of water relevant stakeholders and water policy monitoring in Shemiranat. In this study collaboration networks between informal and formal institutions co-management process have been investigated. Stakeholder network analysis as a quantitative method has been implicated in this research. The results of this study indicate that institutional cohesion is medium; sustainability of institutional network is about 40 percent (medium). Additionally the core-periphery index has measured in this study according to reciprocity index. Institutional capacities for integrated natural resource management in regional level are measured in this study. Furthermore, the necessity of centrality reduction and promote stakeholders relations and cohesion are emphasized to establish a collaborative natural resource governance.

Keywords: policy monitoring, water management, social network, stakeholder, shemiranat

Procedia PDF Downloads 233
16076 Multimodal Convolutional Neural Network for Musical Instrument Recognition

Authors: Yagya Raj Pandeya, Joonwhoan Lee

Abstract:

The dynamic behavior of music and video makes it difficult to evaluate musical instrument playing in a video by computer system. Any television or film video clip with music information are rich sources for analyzing musical instruments using modern machine learning technologies. In this research, we integrate the audio and video information sources using convolutional neural network (CNN) and pass network learned features through recurrent neural network (RNN) to preserve the dynamic behaviors of audio and video. We use different pre-trained CNN for music and video feature extraction and then fine tune each model. The music network use 2D convolutional network and video network use 3D convolution (C3D). Finally, we concatenate each music and video feature by preserving the time varying features. The long short term memory (LSTM) network is used for long-term dynamic feature characterization and then use late fusion with generalized mean. The proposed network performs better performance to recognize the musical instrument using audio-video multimodal neural network.

Keywords: multimodal, 3D convolution, music-video feature extraction, generalized mean

Procedia PDF Downloads 186
16075 An Investigation of the Association between Pathological Personality Dimensions and Emotion Dysregulation among Virtual Network Users: The Mediating Role of Cyberchondria Behaviors

Authors: Mehdi Destani, Asghar Heydari

Abstract:

Objective: The present study aimed to investigate the association between pathological personality dimensions and emotion dysregulation through the mediating role of Cyberchondria behaviors among users of virtual networks. Materials and methods: A descriptive–correlational research method was used in this study, and the statistical population consisted of all people active on social network sites in 2020. The sample size was 300 people who were selected through Convenience Sampling. Data collection was carried out in a survey method using online questionnaires, including the "Difficulties in Emotion Regulation Scale" (DERS), Personality Inventory for DSM-5 Brief Form (PID-5-BF), and Cyberchondria Severity Scale Brief Form (CSS-12). Data analysis was conducted using Pearson's Correlation Coefficient and Structural Equation Modeling (SEM). Findings: Findings suggested that pathological personality dimensions and Cyberchondria behaviors have a positive and significant association with emotion dysregulation (p<0.001). The presented model had a good fit with the data. The variable “pathological personality dimensions” with an overall effect (p<0.001, β=0.658), a direct effect (p<0.001, β=0.528), and an indirect mediating effect through Cyberchondria Behaviors (p<.001), β=0.130), accounted for emotion dysregulation among virtual network users. Conclusion: The research findings showed a necessity to pay attention to the pathological personality dimensions as a determining variable and Cyberchondria behaviors as a mediator in the vulnerability of users of social network sites to emotion dysregulation.

Keywords: cyberchondria, emotion dysregulation, pathological personality dimensions, social networks

Procedia PDF Downloads 75
16074 Design of Distribution Network for Gas Cylinders in Jordan

Authors: Hazem J. Smadi

Abstract:

Performance of a supply chain is directly related to a distribution network that entails the location of storing materials or products and how products are delivered to the end customer through different stages in the supply chain. This study analyses the current distribution network used for delivering gas cylinders to end customer in Jordan. Evaluation of current distribution has been conducted across customer service components. A modification on the current distribution network in terms of central warehousing in each city in the country improves the response time and customer experience. 

Keywords: distribution network, gas cylinder, Jordan, supply chain

Procedia PDF Downloads 434
16073 Enhancement of Environmental Security by the Application of Wireless Sensor Network in Nigeria

Authors: Ahmadu Girgiri, Lawan Gana Ali, Mamman M. Baba

Abstract:

Environmental security clearly articulates the perfections and developments of various communities around the world irrespective of the region, culture, religion or social inclination. Although, the present state of insecurity has become serious issue devastating the peace, unity, stability and progress of man and his physical environment particularly in developing countries. Recently, measure of security and it management in Nigeria has been a bottle-neck to the effectiveness and advancement of various sectors that include; business, education, social relations, politics and above all an economy. Several measures have been considered on mitigating environment insecurity such as surveillance, demarcation, security personnel empowerment and the likes, but still the issue remains disturbing. In this paper, we present the application of new technology that contributes to the improvement of security surveillance known as “Wireless Sensor Network (WSN)”. The system is new, smart and emerging technology that provides monitoring, detection and aggregation of information using sensor nodes and wireless network. WSN detects, monitors and stores information or activities in the deployed area such as schools, environment, business centers, public squares, industries, and outskirts and transmit to end users. This will reduce the cost of security funding and eases security surveillance depending on the nature and the requirement of the deployment.

Keywords: application, environment, insecurity, sensor, wireless sensor network

Procedia PDF Downloads 217