Search: "Networks" Filter:"Networks"

38 tagged events, 30 books, 1 journal found.


Tagged events

May 2015

MAY 26
The Second International Conference on Electrical and Electronics Engineering, Clean Energy and Green Computing (EEECEGC...

Hammamet,
Tunisia

November 2015

NOV 12
Venue: Lisbon, Portugal Event date: 12 – 14 November, 2015 Regular Papers Paper Submission: June 2, 2015 ...

Lisbon,
Portugal

NOV 25
4th ICHCILT 2015 is set to become an exciting event with the potential for continued growth throughout the years. 4th IC...

Dubai,
United Arab Emirates

January 2016

JAN 7
2016 2nd International Conference on Networks and Information (ICNI 2016) Date: January 7-9, 2016 New York, USA http:...

New York,
United States

February 2016

FEB 18
2016 4th International Conference on Electrical Energy and Networks - ICEEN 2016 - Ei Compendex and Scopus Sponsored by...

Nice,
France

FEB 22
2016 4th International Conference on Information and Computer Networks (ICICN 2016) February 22-23, 2016 Hongkong htt...

Hongkong,
China

March 2016

MAR 12
Publication-ICFST 2016 will be published into Conference Proceedings indexed by Ei Compendex, Inspec, DOAJ, CPCI (Web ...

Hongkong,
China

July 2016

JUL 4
Summer School on Fuzzy Cognitive Maps Methods, Learning Algorithms and Software Tool for Modeling and Decision Making ...

Volos,
Greece

September 2017

SEP 27
Oxford Global Conferences are proud to present the 15th Annual Pharmaceutical IT Congress co-located with our Artificial...

London,
United Kingdom

May 2018

MAY 18
The objective of 2nd ICNCCT 2016 is to provide a platform for researchers, engineers, academicians as well as industrial...

Paris,
France

August 2018

AUG 23
International Journal of Network Security & Its Applications (IJNSA) - UGC Listed, ERA Indexed ISSN 0974 - 9330 (Onlin...

,
India

April 2020

APR 15
The conference is promoted by the International Journal of Business, Human and Social Sciences. The conference is or...

Barcelona,
Spain

July 2020

JUL 8
Deep Learning and Big Data Analytics are two major topics of data science, nowadays. Big Data has become important in pr...

Lieusaint,
France

September 2020

SEP 24
International Conference on Inventive Computation and Information Technologies The scope of International Conference ...

Coimbatore, Tamil Nadu,
India

October 2020

OCT 23
International Conference on Artificial Intelligence and Computer Engineering(ICAICE 2020)will be held on October 23-...

Beijing,
China

OCT 30
With blockchain technology set to play an integral role in everything from finance and banking to healthcare, supply cha...

,
India

January 2021

JAN 23
8th International Conference on Bioinformatics and Bioscience (ICBB 2021) January 23~24, 2021, Zurich, Switzerland http...

Zurich,
Switzerland

June 2021

JUN 19
7th International Conference on Networks & Communications (NCOM 2021) June 19 ~ 20, 2021, Copenhagen, Denmark http...

,
Denmark

JUN 25
The advent of more advanced computing and communication technologies are finding their new way to our day-to-day applica...

Namakkal,
India

JUN 28
In recent years, Internet of Things [IoT] technology envisions to develop a hyper- connected world, where the intelligen...

Kerala,
India

July 2021

JUL 29
The 3rd International Conference on Sustainable Communication Networks and Applications [ICSCN 2021] organized on 29-3...

Erode,
India

August 2021

AUG 12
With the intriguing development of technologies in several industries along with the advent of accrescent and ubiquitous...

Coimbatore,
India

AUG 20
There is a new challenge and opportunity that emerge out of new applications and innovations everyday. New computing pla...

,
India

September 2021

SEP 2
In recent years, Computing emerges as an integral part of almost all the modern industries like Software Engineering, Co...

,
India

SEP 22
Accepted papers will be published in International Conference Proceedings, which will be indexed by Ei Compendex, Scopus...

Okinawa,
Japan

October 2021

OCT 15
For papers submitted to ICINC 2021, we offer the publications as following: 1. Publication in JCM. Submissions will...

Barcelona,
Spain

November 2021

NOV 20
13th International Conference on Wireless, Mobile Network and Applications (WiMoA 2021) November 20 ~ 21, 2021, Zuric...

Zurich,
Switzerland

December 2021

DEC 3
Publication: Submitted paper will be peer reviewed by conference committees. The accepted paper will be included into...

Weihai,
China

DEC 9
In this digital era, Internet of Things [IoT], big data and computer networks are dedicated to provide new innovative co...

,
India

DEC 10
Conference Proceedings: Accepted and presented papers will be published into conference proceedings and be indexed by...

Beijing,
China

DEC 10
Proceedings: Accepted papers of ICNCC 2021 will be published by ACM conference proceedings, indexed by 【EI &Scopus....

Beijing,
China

DEC 30
International Journal of peer-to-peer networks (IJP2P) ISSN: 2229 - 3930 [Online]; 2229 - 5240 [Print] https://air...

,
Australia

February 2022

FEB 25
Proceedings: Accepted (Registered and Presented) papers will be published in the International Conference Proceedings...

Shanghai,
China

May 2022

MAY 13
Publication: The registered and presented papers will be published into ICCCAS 2022 conference proceedings, which is ...

Singapore,
Singapore

MAY 20
The state-of-the-art image processing research works are dedicated to cover a wide range of computational intelligence t...

Bangkok,
Thailand

June 2022

JUN 23
Publication: The accepted paper will be included into HP3C 2022 Conference Proceedings, which will be published in th...

Jilin,
China

July 2022

JUL 1
In recent years, Internet of Things [IoT] technology envisions to develop a hyper- connected world, where the intelligen...

,
India

JUL 29
Publication: Accepted papers of ICCFI 2022 after proper registration and presentation will be published in the conferen...

Okayama,
Japan

Books

by Adel A. Al-Rumaih

01/12/1999

In this dissertation, a new spare capacity planning methodology is proposed utilizing path restoration. The approach is based on forcing working flows/traffic which are on paths that are disjoint to share spare backup capacity. The algorithm for determining the spare capacity assignment is based on genetic algorithms and is capable of incorporating non-linear variables such as non-linear cost function and QoS variables into the objective and constraints. The proposed methodology applies to a wider range of fault scenarios than most of the current literature. It can tolerate link-failures, node-failures, and link-and-node failures. It consists of two stages: the first stage generates a set of network topologies that maximize the sharing between backup paths by forcing them to use a subse...

Networks of Design

Proceedings of the 2008 Annual International Conference of the Design History Society (UK) University College Falmouth, 3-6 September

by Fiona Hackney, Jonathan Glynne, & Viv Minton (eds.)

06/18/2009

Networks of Design maps a new methodological territory in design studies, conceived as a field of interdisciplinary inquiry and practice informed by a range of responses to actor network theory. It brings together a rich body of current work by researchers in the social sciences, technology, material culture, cultural geography, information technology, and systems design, and design theory and history. This collection will be invaluable to students and researchers in many areas of design studies and to design practitioners receptive to new and challenging notions of what constitutes the design process. Over ninety essays are thematically organised to address five aspects of the expanded notions of mediation, agency, and collaboration posited by network theory: Ideas, Things, Technology,...

Indoor Wireless Metering Networks

A Collection of Algorithms Enabling Low Power/Low Duty-Cycle Operations

by Nicola Altan

11/23/2010

Wireless Metering Networks (WMN), a special class of Wireless Sensor Networks (WSN), consisting of a large number of tiny inexpensive sensor nodes are a viable solution for many problems in the field of building automation, especially if the expected lifetime of the network permits to synchronize the network maintenance with the schedule for routine maintenance of the building. In order to meet the resulting energy constraints, the nodes have to operate according to an extremely low duty cycle schedule. The existence of an energy efficient MAC Layer protocol, the adoption of a robust time synchronization mechanism and the implementation of effective network discovery and maintenance strategies are key elements for the success of a WMN project. The main goal of this work was the developm...

Computer Aided State Estimation of Electric Power Networks

An Introduction to Data Attacks, Cloud Computing and Distribution System State Estimation

by Subramanian Srikrishna, Ganesan Sivarajan, Hariprasath Manoharan

08/01/2020

Computer Aided State Estimation of Electric Power Networks is a fundamental introduction to the topic of state estimation at an advanced textbook level for teaching a course at either the graduate or undergraduate level, as well as for Post Graduate students and Research Scholars who want to review of the latest techniques and best mathematical approaches for estimating the state of a general system. Theory as well as practice of Distribution System State Estimation (DSSE) is covered with imperative rigidity. The authors present the theory of state estimation clearly providing the right amount of essential information and linked reports in order to enable the researchers and graduate students to apply state estimation techniques across a variety of fields in power systems engineering. A pr...

Artificial Invention

Synthesis of Innovative Thermal Networks, Power Cycles, Process Flowsheets and Other Systems

by Alexander Kott

04/15/2005

This dissertation proposes a computational technique for automated "invention" of conceptual schemes of thermal systems. The input provided to the automated problem solver is a description of the streams entering and leaving the system. The output is a network of elementary processes: compression, expansion, heating, cooling, and chemical processes. The problem solver seeks a network that is feasible, and offers an optimal (or at least favorable) combination of energy and capital costs. The synthesis process is modeled as a heuristic search conducted in a state-space of all possible design versions. The main ideas of the dissertation have been implemented in a computer program called TED, which invented a number of nontrivial schemes. TED starts with an initial state (or states), which ma...

Environmental Policy Processes Surrounding South Africa’s Plastic Bags Regulations

Tensions, Debates and Responses in Waste Product Regulation

by Godwell Nhamo

01/31/2008

This study was conducted in South Africa. South Africa is the first country within the Southern African Development Community to have regulated plastic shopping bags waste through the imposition of both a standard on thickness and a levy. Given this scenario, the Plastic Bags Regulations present an illustrative case for researching complexity, uncertainty and controversies surrounding a new trend in environmental policy making, namely waste product regulation. The thesis focuses on understanding and investigating tensions, debates and responses emerging from the policy process as actors and actor-networks put not only the Plastic Bags Regulations into circulation as focal actant (token) but also other actants and actant-networks as well. To this end, a research question that addressed envi...

by Jose D. Martin

10/01/2000

Se analiza el uso de redes neuro-difusas para solucionar problemas de clasificación y modelización. El objetivo es intentar combinar las cualidades de las redes neuronales y de la descripción de sistemas mediante Lógica Difusa. Las redes neuronales son conocidas por su alta capacidad de aprendizaje, lo que permite una adecuada generalización en el tipo de problemas comentado anteriormente. Su aplicación a problemas reales no ha dejado de crecer durante los últimos años. Por otro lado, la Lógica Difusa es una herramienta más novedosa, cuya propiedad más atractiva es la capacidad que posee de poder tratar con variables numéricas y variables lingüísticas simultáneamente. Las variables lingüísticas permiten un tratamiento del problema más comprensible y cercano al cono...

by Mlindi Mashologu

06/18/2010

The IP Multimedia Subsystem (IMS) is the basic network architecture for Next Generation Networks (NGN) which is intended to bridge the divide between the traditional circuit switched and packet switched networks, thereby providing a single network capable of providing all service offerings. IMS is based on the IP infrastructure and it enables the convergence of data, speech and video on the same network platform. The IMS forms the basis of Fixed Mobile Convergence (FMC), where fixed-line operators are striving to provide mobile access and mobile operators are trying to provide fixed access. This is done to provide both services to a customer in a single device. The IMS is based on Session Initiation Protocol (SIP), which is a text-based protocol. The IMS will generally create additional...

Integrated Asset Management for Corridor Infrastructure

A Wider Asset Management Perspective for an Enhanced Level of Service

by Soliman Abu-Samra & Mahmoud Ahmed

04/27/2017

Integrated Asset Management is gradually becoming an appealing mechanism for undertaking the corridor infrastructure interventions in an efficient manner. Amplified financial pressure on governments, through steeply growing deficits, and the increasing expectations from the end-users for enhanced service levels urge the need for an effective approach that meets their expectations within the limited available resources. This book introduces an integrated asset management approach for proactively managing the cities' corridors effectively. The decision-making system is designed to analyze the roads and water networks integration benefits on the life-cycle costs, physical state/reliability, replacement value, and user costs. Stochastic and multivariate regression deterioration models are deve...

by Dr. Curtis D. Brandon Sr.

06/18/2008

This applied dissertation was designed to investigate the characteristics most represented in two school districts, an inner-city and a suburban district. These characteristics were related to the innovativeness of the school district and the perception of individual leadership in schools that have passed the performance criteria for state accreditation. Forty schools and 200 principals were randomly selected to participate in the study for a period of 3 to 4 months. The researcher used three instruments to determine whether differences existed between the two districts in regard to performance on the Standards of Learning assessments. He developed a checklist for interview questions on instructional technology strategies that might be implemented by leaders and teachers...

A Sociological Theory of Communication

The Self-Organization of the Knowledge-Based Society

by Loet Leydesdorff

02/01/2000

Networks of communication evolve in terms of reflexive exchanges. The codification of these reflections in language, that is, at the social level, can be considered as the operating system of society. Under sociologically specifiable conditions, the discursive reconstructions can be expected to make the systems under reflection increasingly knowledge-intensive. This sociological theory of communication is founded in a tradition that includes Giddens' (1979) structuration theory, Habermas' (1981) theory of communicative action, and Luhmann's (1984) proposal to consider social systems as self-organizing. The study also elaborates on Shannon's (1948) mathematical theory of communication for the formalization and operationalization of the non-linear dynamics. The development of scientif...

by Kevin T. Reynolds, CISSP, PMP

05/01/2004

Are all Wireless LANs equal? A network administrator is faced with a plethora of wireless services, complex radio issues, and products for wireless data. There are brand new protocols and products that could become obsolete a day after installation! Over 40% of all deployed WLANs do not even have minimum security activated, exposing the company's network and records to easy outsider access.The WLAN industry is characterized by rapidly changing, incomplete or proprietary standards, which can impact interoperability goals. There are complicated ownership costs, performance limitations, and security configurations that exist for WLANs which many network administrators may not understand or know how to compare. This dissertation presents a decision support system (DSS) that enables a nov...

Business Database Technology

An Integrative Approach to Data Resource Management with Practical Project Guides, Presentation Slides, Answer Keys to Hands-on Exercises for Students in Business Programs

by Shouhong Wang & Hai Wang

11/29/2013

Business Database Technology provides essential knowledge of relational database design, implementation, and applications, while providing a good balance between the core concepts and secondary concepts. It is intended for four-year college/university business students who study database technology and data resource management. Students will learn data structure techniques for databases, data models, relational database, normalization and logical database design, SQL, physical database design, database administration, database in computer networks, and data warehouse. The book highlights the most important concepts of database development, such as faultless entity-relationships diagrams and normalization process. To maintain a well-rounded approach to the topics, both fundamental knowle...

Weaving Dreams into the Classroom

Practical Ideas for Teaching about Dreams and Dreaming at Every Grade Level, including Adult Education

by Curtiss Hoffman & Jacquie Lewis (editors)

04/07/2014

Weaving Dreams into the Classroom is an extraordinary anthology which combines the seasoned experience of ten educators at all educational levels to provide the reader with practical, hands-on models for bringing the subject of dreams and dreaming to students. It also includes the perspective of a teenage student who has been embedded in a dream-centered education program since early childhood. The authors come from diverse backgrounds, including academic and clinical psychology, anthropology, and religious studies. Their home institutions range from small private colleges and institutes to large research universities, both in the United States and Great Britain. PRAISE FOR WEAVING DREAMS INTO THE CLASSROOM In recent years, there has been an unprecedented interest in dreams and how t...

by Estanislao Arana

12/01/1997

This thesis is dedicated to assess the accuracy of logistic regression (LR) and artificial neural networks (ANN) in the diagnosis of calvarial lesions using computed tomography (CT). The importance of the different features needed for the diagnosis in both models is also analyzed. The models were developed using patients with calvarial lesions as the only known disease were enrolled. All patients were studied with plain films and CT. Other imaging thecniques were used when available. The clinical and CT data were used for developing LR and ANN models. Both models were tested with the jacknife (leave-one-out) method. The best ANNs were obtained varying iterations and hidden neurons by selecting the one with higher area under the receiver operating characteristic curve (ROC). The fi...

Urban Paleontology

Evolution of Urban Forms

by Ming Tang & Dihua Yang

10/26/2008

More than ten years ago, when I first read Mario Gandelsonas’ book The Urban Context, the beautiful abstract diagrams that the book presented -the street network of Chicago- fascinated me with the profound historical and cultural background that they suggested. Without knowing how this would direct me, I started to draw something related with the street network of Beijing. That is the beginning of this book. Among tons of the diagrams that I have created, most of them have not been incorporated into this book, while they have directed me into this fascinating research area which focuses on the "mineralized skeleton," rather than the "soft tissue" of urban forms. It was not until the recent five years when Yang and I came across some theories and approaches in paleontology that we start...

by Lobna Ali Al-Khalifa

07/05/2010

A significant volume of literature has been developed that seeks to provide an explanation for the growth of FDI and its impact on less developed countries. The literature is characterized by diversity and controversy. Based on it, a range of reasons for encouraging investment have been proposed including its favorable effects on employment levels, the balance of payments and balance of trade of the host country and also the potential for acquisition of technology and skills (Cave: 1982 and Dunning: 1993). Equally, the potentially negative effects of growing levels of foreign investment on domestic market structures and national sovereignty have long been the focus of attention (Vernon: 1971 and Jenkins: 1987). More recent studies focused on the positive effect FDI can create through the i...

by Geir E. Hovland

07/15/1999

The problem of controlling sensory perception for use in discrete event feedback control systems is addressed in this thesis. The sensory perception controller (SPC) is formulated as a sequential Markov decision problem. The SPC has two main objectives; 1) to collect perceptual information to identify discrete events with high levels of confidence and 2) to keep the sensing costs low. Several event recognition techniques are available where each of the event recognisers produces confidence levels of recognised events. For a discrete event control system running in normal operation, the confidence levels are typically large and only a few event recognisers are needed. Then, as the event recognition becomes harder, the confidence levels will decrease and additional event recognisers are uti...

by Anish Chand Turlapaty

06/17/2010

Data assimilation of satellite-based observations of hydrological variables with full numerical physics models can be used to downscale these observations from coarse to high resolution to improve microwave sensor-based soil moisture observations. Moreover, assimilation can also be used to predict related hydrological variables, e.g., precipitation products can be assimilated in a land information system to estimate soil moisture. High quality spatio-temporal observations of these processes are vital for a successful assimilation which in turn needs a detailed analysis and improvement. In this research, pattern recognition and adaptive signal processing methods are developed for the spatio-temporal analysis and enhancement of soil moisture and precipitation datasets. These methods are app...

Two American Crusades

Actors and Factors in the Cold War and the Global War on Terrorism

by Marian Leighton

11/01/2020

Here is the first in-depth analysis and comparison of U.S. policy in two seminal conflicts of our recent history: the Cold War and the Global War on Terrorism. Unlike previous publications, which deal with each conflict separately, Two American Crusades treats the two as a seamless web, from the passions of the medieval Crusades through the long twilight struggle of the Cold War to the campaign against al Qaeda and ISIS stemming from the rise of radical political Islam. National security and foreign policy professionals, members of the academic community, and general readers alike will benefit from the insights revealed in this book that exert a profound influence on current international affairs and America’s role. Two American Crusades also illustrates why a peace dividend continues ...

The Temp Factor for Job Seekers

The Job Seeker's Guide to Temporary Employment

by Cathy A. Reilly

08/13/2012

If you are looking for work, consider temporary employment a valuable source of job opportunities. As a temp, you can increase job skills and work experience, expand business networks, strengthen your resume, and avoid gaps in employment, all while being paid. Quite often, temp work can be a “job audition” because it puts temps in front of hiring managers and decision makers for days, weeks, or even months at a time while on job assignments. The Temp Factor for Job Seekers: The Job Seeker's Guide to Temporary Employment presents how this job search strategy may get you back to work faster. Becoming a temp guarantees what a resume cannot: face time inside the doors of potential employers. With over 20 years of experience working with staffing service firms and temps, Cathy A. Reilly ...

A Study of Business Decisions under Uncertainty: The Probability of the Improbable

- With Examples from the Oil and Gas Exploration Industry

by Andreas Stark

08/31/2010

This dissertation will discuss the uncertainty encountered in the daily operations of businesses. The concepts will be developed by first giving an overview of probability and statistics as used in our everyday activities, such as the basic principles of probability, univariate and multivariate statistics, data clustering and mapping, as well as time sequence and spectral analysis. The examples used will be from the oil and gas exploration industry because the risks taken in this industry are normally quite large and are ideal for showing the application of the various techniques for minimizing risk. Subsequently, the discussion will deal with basic risk analysis, spatial and time variations of risk, geotechnical risk analysis, risk aversion and how it is affected by personal biases, an...

Software-Agents and Liberal Order

An Inquiry along the Borderline between Economics and Computer Science

by Dirk N Wagner

12/19/2000

"Liberal order and software-agents" - long-established ideas and modern technology are bridged. The impulse for undertaking this effort comes from the observation that it becomes difficult for computer science alone to create order for and within machines. The growing complexity of computer systems, open networks like the Internet, and the increasingly social role of software entities push the traditional quest for total global control out of reach. Economic theory of social order offers extensive experience with such conditions, so that it can complement and guide research in computer science. It is shown that a common understanding between economics and computer science's sub-field of distributed artificial intelligence is possible on the level of software-agents. On this basis, four fun...

Supersizing Science

On Building Large-Scale Research Projects in Biology

by Niki Vermeulen

10/13/2010

In recent years there has been a clear rise in scientific collaboration, as well as in studies on the subject. While most scholars examine disciplines traditionally known to be collaborative, such as physics and space research, this book focuses on biology. It investigates the growing collaboration in the life sciences, or the emergence of what is called 'big biology'. While the Human Genome Project is often presented as the first large-scale research project in biology, cooperation in the life sciences has a longer history. A comparison between centralised 'big physics' and 'big biology' reveals how the latter has a networked structure, which evolved in interaction with the integration of information and communication technologies. By concentrating on the construction of these networks, t...

by Michael Ernest Jones

10/13/2010

The establishment of alternative education, private foundations, and networks linked to socio-political and spiritual advocacies distinguishes the Thai social movement in this research. This research is a qualitative study that has made use of historical accounts to associate with data gathered from extensive interviews and case studies in order to inquire as to whether alternative education represents an historical spiritual tradition of opposition to reform hegemony, and whether it has had an impact on state reform efforts. Also investigated was whether there are some historical patterns associated with the manner in which the state of Thailand has dealt with the forces of globalization and whether the collective action by informal movements of Thai people also has the same predictable p...

by Patricia Ngozi Anekwe

09/11/2009

This study investigated the characteristics and challenges of high-achieving second-generation Nigerian youths in the United States. An increasing number of youths in America's schools are from immigrant backgrounds due to the flow of immigration from Latin America, Asia, and Africa. Given the local and national mandates to improve the academic achievement of all children, we cannot afford to leave any group behind. Although research on immigrant children from Asia and Latin America and their adaptation and schooling has increased in the last two decades, the educational experiences of Black immigrant children from Africa and the Caribbean have been understudied. The scant research on African immigrants lumps all Africans into a homogeneous group despite the different experiences and obvi...

by Mustafa Mikail Ozciloglu & Mehmet Fatih Akay (advisor)

03/02/2017

Upper body power (UBP) is one of the most important factors affecting the performance of cross-country skiers during races. Although some initial studies have already attempted to predict UBP, until now, no study has attempted to apply machine learning methods combined with various feature selection algorithms to identify the discriminative features for prediction of UBP. The purpose of this study is to develop new prediction models for predicting the 10-second UBP (UBP10) and 60-second UBP (UBP60) of cross-country skiers by using General Regression Neural Networks (GRNN), Radial-Basis Function Network (RBF), Multilayer Perceptron (MLP), Support Vector Machine (SVM), Single Decision Tree (SDT) and Tree Boost (TB) along with the Relief-F feature selection algorithm, minimum redundancy maxim...

by Derman Akgol & Mehmet Fatih Akay (advisor)

06/26/2017

The purpose of this thesis is to forecast the amount of network traffic in Transmission Control Protocol/Internet Protocol (TCP/IP) -based networks by using different time lags and various machine learning methods including Support Vector Machines (SVM), Multilayer Perceptron (MLP), Radial Basis Function (RBF) Neural Network, M5P (a decision tree with linear regression functions at the nodes), Random Forest (RF), Random Tree (RT), and Reduced Error Prunning Error (REPTree), and statistical regression methods including Multiple Linear Regression (MLR) and Holt-Winters and compare the performance of statistical and machine learning methods. Two different Internet Service Providers' (ISPs) traffic data have been utilized to build traffic forecasting models. The first 66% of the data sets has ...

Bullied!

Coping with Workplace Bullying

by Vanessa M. Gattis

02/19/2018

Workplace bullying, the repeated and regular act of harassing, offending, socially excluding someone, or negatively affecting someone’s work over time has been recognized as a serious threat to the health and well-being of employees. This study sought to explore resilience as a coping strategy to help improve the physical and mental health effects of professional women who have or are experiencing workplace bullying. The central research question was, how does perceived resilience, when used as a coping strategy, help with the physical and mental health stressors while helping to improve the overall well-being of professional women who were or have experienced workplace bullying? Using a qualitative methodology with a single-case study design, 10 professional women who have and are still...

Farmers' Rural Community Attachment

A Structural Symbolic Interactionist Explanation

by Forrest L. Sanner

11/28/2003

This research reconceptualizes or elaborates on, or even modifies, the systemic approach of community attachment by looking at its concepts from a structural symbolic interactionist approach. The systemic model conceptualizes community attachment as three forms of community solidarity--strong interpersonal relations among community residents, strong sentiments about the community, and involvement in community affairs. The structural symbolic interactionist approach assumes that farmers' role choices--involvement in community affairs--depends on their resident-identities. The nature of their resident-identities is dependent on how large their social networks are and on the character of those relations. For instance, if their resident-identities were limited to fam...