Search results for: western approach
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 14900

Search results for: western approach

10910 The Analysis of Kru Luen Sun Tharawatin’s Tableau Vivant Singing Style

Authors: Pansak Vandee

Abstract:

The research aims to study the background and format of Tableau Vivant suite song and the singing style of Kru Luen SunTharawatin. The data is gained by content analysis and the in-depth interview from experts on Tableau Vivant suite song, as well as an analysis on singing style of Kru Luen SunTharawatin. The research results are as follows: (1) The Tableau Vivant suite song first appeared in the reign of King Rama V, composing by Prince Naris, for paralleling with the still picture presentation offered to Crown Prince Maha Vajirunahit, which was adapted from the French performance Tableau Vivant. The performance is assigned to perform by the Crown Prince’s younger brother and other young royal siblings. The 8 suite songs were played by archeological Thai orchestra (Piphat duek dam ban) and were restored once again in the reign of King Rama VII for the pleasure of the king, being sung by the Royal Entertainment Department Officers. (2) The format of Tableau Vivant suite song is a short series song, composing a double strand of 4 to 6 songs with 6 suite songs in 8 suites, in the form of a combination of suite lyric – Unnarut (the play narrated by King Rama I) and Phra Pen Chao (the homage to Brahman gods in Na Phat song); and suite song – Khom Dam Din with Khmer tone; the Three Kingdoms with Chinese tone; Rajadhirat with Burmese and Mon tone; Nitra Chakrit (the Arabian Night) with Arabian tone; Cinderella with Western tone; Phra Lor in Laotian tone. (3) The Tableau Vivant suite singing style of Kru Luen SunTharawatin is based on Phra-ya Sanor Duriyang (Cham SunTharawatin) style, which was newly created for Kru Luen, his daughter. The five suite songs Khom Dam Din, the Three Kingdoms, Rajadhirat, Nitra Chakrit (the Arabian Night), Cinderella, Phra Lor have their distinguish tones according to their language accents. The songs were recorded in the album of the Royal Institute of Thailand in 1931; but, unfortunately, the entire album was completely destroyed during the World War II in Germany.

Keywords: Krue Luen Sun Tharawatin, tableau vivant, singing style, suite song

Procedia PDF Downloads 327
10909 Towards a Critical Disentanglement of the ‘Religion’ Nexus in the Global East

Authors: Daan F. Oostveen

Abstract:

‘Religion’ as a term is not native to the Global East. The concept ‘religion’ is both understood in its meaning of ‘religious traditions’, commonly referring to the ‘World Religions’ and in its adjective meaning ‘the religious’ or ‘religiosity’ as a separate domain of human culture, commonly contrasted to the secular. Though neither of these understandings are native to the historical worldviews of East Asia, their development in modern Western scholarship has had an enormous impact on the self-understanding of cultural diversity in the Global East as well. One example is the identification and therefore elevation to the status of World Religion of ‘Buddhism’ which connected formerly dispersed religious practices throughout the Global East and subsumed them under this powerful label. On the other hand, we see how popular religiosity, shamanism and hybrid cultural expressions have become excluded from genuine religion; this had an immense impact on the sense of legitimacy of these practices, which became sometimes labeled as superstition are rejected as magic. Our theoretical frameworks on religion in the Global East do not always consider the complex power dynamics between religious actors, both elites and lay expressions of religion in everyday life, governments and religious studies scholars. In order to get a clear image of how religiosity functions in the context of the Global East, we have to take into account these power dynamics. What is important in particular is the issue of religious identity or absence of religious identity. The self-understanding of religious actors in the Global East is often very different from what scholars of religion observe. Religious practice, from an etic perspective, is often unrelated to religious identification from an emic perspective. But we also witness the rise of Christian churches in the Global East, in which religious identity and belonging does play a pivotal role. Finally, religion in the Global East has since the beginning of the 20th Century been conceptualized as the ‘other’ or republicanism or Marxist-Maoist ideology. It is important not to deny the key role of colonial thinking in the process of religion formation in the Global East. In this paper, it is argued that religious realities constituted emerging as a result from our theory of religion, and that these religious realities in turn inform our theory. Therefore, the relationship between phenomenology of religion and theory of religion can never be disentangled. In fact, we have to acknowledge that our conceptualizations of religious diversity are always already influenced by our valuation of those cultural expressions that we have come to call ‘religious’.

Keywords: global east, religion, religious belonging, secularity

Procedia PDF Downloads 118
10908 Causes and Consequences of Unauthorized Use of Books: Readers, Authors, and Publishers' Perspective

Authors: Arūnas Gudinavičius, Vincas Grigas

Abstract:

Purpose: The current study aims to identify and explore causes and consequences of unauthorized use of books from readers’, publishers’, and authors’ points of view. The case of Lithuania also assessed, especially historical background (banned alphabet, book smuggling, theft as the social norm in Soviet times) of the country. Design/methodology/approach: Aiming for more understanding why readers, authors and publishers are using or not using technology for unauthorized access of books, technology acceptance model approach was used, a total of 30 respondents (publishers, authors and readers) were interviewed in semi-structured face-to-face interviews and thematic analysis of collected qualitative data was conducted. Interviews were coded in English with coding software for further analysis. Findings: Findings indicate that the main cause for the unauthorized use of books is a lack of legal e-book titles and acquisition options. This mainly points at publishers, however, instead of using unauthorized sources as opportunities for author promotion or marketing, they rather concentrate on the causes of unauthorized use of books which they are not in control of, including access to unauthorized sources, habits, and economic causes. Some publishers believe that the lack of legal e-book titles is the consequence of unauthorized use of book rather than its cause. Originality: This research contributed to the body of knowledge by investigating unauthorized use of books from readers’, publishers’, and authors’ points of view which renders to have a better understanding of the causes and consequences of such behavior, as well as differences between these roles. We suggest that these causes lead to the intention to use and actual use of technology which is easier to use and which gives more perceived advantages – technology for unauthorized downloading and reading of books vs legal e-book acquisition options.

Keywords: digital piracy, unauthorized access, publishing industry, book reader, intellectual property rights

Procedia PDF Downloads 154
10907 Research the Causes of Defects and Injuries of Reinforced Concrete and Stone Construction

Authors: Akaki Qatamidze

Abstract:

Implementation of the project will be a step forward in terms of reliability in Georgia and the improvement of the construction and the development of construction. Completion of the project is expected to result in a complete knowledge, which is expressed in concrete and stone structures of assessing the technical condition of the processing. This method is based on a detailed examination of the structure, in order to establish the injuries and the elimination of the possibility of changing the structural scheme of the new requirements and architectural preservationists. Reinforced concrete and stone structures research project carried out in a systematic analysis of the important approach is to optimize the process of research and development of new knowledge in the neighboring areas. In addition, the problem of physical and mathematical models of rational consent, the main pillar of the physical (in-situ) data and mathematical calculation models and physical experiments are used only for the calculation model specification and verification. Reinforced concrete and stone construction defects and failures the causes of the proposed research to enhance the effectiveness of their maximum automation capabilities and expenditure of resources to reduce the recommended system analysis of the methodological concept-based approach, as modern science and technology major particularity of one, it will allow all family structures to be identified for the same work stages and procedures, which makes it possible to exclude subjectivity and addresses the problem of the optimal direction. It discussed the methodology of the project and to establish a major step forward in the construction trades and practical assistance to engineers, supervisors, and technical experts in the construction of the settlement of the problem.

Keywords: building, reinforced concrete, expertise, stone structures

Procedia PDF Downloads 321
10906 Modern Information Security Management and Digital Technologies: A Comprehensive Approach to Data Protection

Authors: Mahshid Arabi

Abstract:

With the rapid expansion of digital technologies and the internet, information security has become a critical priority for organizations and individuals. The widespread use of digital tools such as smartphones and internet networks facilitates the storage of vast amounts of data, but simultaneously, vulnerabilities and security threats have significantly increased. The aim of this study is to examine and analyze modern methods of information security management and to develop a comprehensive model to counteract threats and information misuse. This study employs a mixed-methods approach, including both qualitative and quantitative analyses. Initially, a systematic review of previous articles and research in the field of information security was conducted. Then, using the Delphi method, interviews with 30 information security experts were conducted to gather their insights on security challenges and solutions. Based on the results of these interviews, a comprehensive model for information security management was developed. The proposed model includes advanced encryption techniques, machine learning-based intrusion detection systems, and network security protocols. AES and RSA encryption algorithms were used for data protection, and machine learning models such as Random Forest and Neural Networks were utilized for intrusion detection. Statistical analyses were performed using SPSS software. To evaluate the effectiveness of the proposed model, T-Test and ANOVA statistical tests were employed, and results were measured using accuracy, sensitivity, and specificity indicators of the models. Additionally, multiple regression analysis was conducted to examine the impact of various variables on information security. The findings of this study indicate that the comprehensive proposed model reduced cyber-attacks by an average of 85%. Statistical analysis showed that the combined use of encryption techniques and intrusion detection systems significantly improves information security. Based on the obtained results, it is recommended that organizations continuously update their information security systems and use a combination of multiple security methods to protect their data. Additionally, educating employees and raising public awareness about information security can serve as an effective tool in reducing security risks. This research demonstrates that effective and up-to-date information security management requires a comprehensive and coordinated approach, including the development and implementation of advanced techniques and continuous training of human resources.

Keywords: data protection, digital technologies, information security, modern management

Procedia PDF Downloads 14
10905 Application of Analytic Hierarchy Process Model to Weight and Prioritize Challenges and Barriers to Strategic Approach

Authors: Mohammad Mehdi Mohebi, Nima Kazempour, Mohammad Naeim Kazempour

Abstract:

Strategic thinking enables managers to find out what factors are effective in achieving the desired goals and how these factors create value for the customer. Strategic thinking can be interpreted as a form of mental and inner strength in the manager, who by utilizing it, while considering the conditions of the environment and unstable global environment changes, takes decisions, and plans actions, and designs the strategy of his organization in today's changing and unsustainable business environment. Strategic thinking is very important in today’s business world, because without this thinking, the organization's efforts to achieve developed strategies will not be effective. In this study, through a detailed study of the challenges and barriers to strategic thinking that is carried out by various scholars and experts theoretically and experimentally, 7 major factors were identified. Then, based on these main factors of challenges and related elements, a tool in the form of a questionnaire was developed in order to determine their importance and priority from the perspective of strategic management experts. Using statistical tests the reliability and validity of this instrument, including its structural validity, has been examined and approved using factor analysis. These factors are weighted and prioritized using AHP techniques and the opinions of scholars and experts. Prioritization of barriers to strategic thinking include: lack of participatory management, lack of a systematic approach, difficulty in aligning the organization members, lack of incentive organizational culture, behavioural and internal barriers of managers, lack of key managers and lack of access to timely and accurate information.

Keywords: strategic thinking, challenges and barriers to strategic thinking, EN bank, AHP method

Procedia PDF Downloads 533
10904 Using the Minnesota Multiphasic Personality Inventory-2 and Mini Mental State Examination-2 in Cognitive Behavioral Therapy: Case Studies

Authors: Cornelia-Eugenia Munteanu

Abstract:

From a psychological perspective, psychopathology is the area of clinical psychology that has at its core psychological assessment and psychotherapy. In day-to-day clinical practice, psychodiagnosis and psychotherapy are used independently, according to their intended purpose and their specific methods of application. The paper explores how the Minnesota Multiphasic Personality Inventory-2 (MMPI-2) and Mini Mental State Examination-2 (MMSE-2) psychological tools contribute to enhancing the effectiveness of cognitive behavioral psychotherapy (CBT). This combined approach, psychotherapy in conjunction with assessment of personality and cognitive functions, is illustrated by two cases, a severe depressive episode with psychotic symptoms and a mixed anxiety-depressive disorder. The order in which CBT, MMPI-2, and MMSE-2 were used in the diagnostic and therapeutic process was determined by the particularities of each case. In the first case, the sequence started with psychotherapy, followed by the administration of blue form MMSE-2, MMPI-2, and red form MMSE-2. In the second case, the cognitive screening with blue form MMSE-2 led to a personality assessment using MMPI-2, followed by red form MMSE-2; reapplication of the MMPI-2 due to the invalidation of the first profile, and finally, psychotherapy. The MMPI-2 protocols gathered useful information that directed the steps of therapeutic intervention: a detailed symptom picture of potentially self-destructive thoughts and behaviors otherwise undetected during the interview. The memory loss and poor concentration were confirmed by MMSE-2 cognitive screening. This combined approach, psychotherapy with psychological assessment, aligns with the trend of adaptation of the psychological services to the everyday life of contemporary man and paves the way for deepening and developing the field.

Keywords: assessment, cognitive behavioral psychotherapy, MMPI-2, MMSE-2, psychopathology

Procedia PDF Downloads 314
10903 Assessment of Pedestrian Comfort in a Portuguese City Using Computational Fluid Dynamics Modelling and Wind Tunnel

Authors: Bruno Vicente, Sandra Rafael, Vera Rodrigues, Sandra Sorte, Sara Silva, Ana Isabel Miranda, Carlos Borrego

Abstract:

Wind comfort for pedestrians is an important condition in urban areas. In Portugal, a country with 900 km of coastline, the wind direction are predominantly from Nor-Northwest with an average speed of 2.3 m·s -1 (at 2 m height). As a result, a set of city authorities have been requesting studies of pedestrian wind comfort for new urban areas/buildings, as well as to mitigate wind discomfort issues related to existing structures. This work covers the efficiency evaluation of a set of measures to reduce the wind speed in an outdoor auditorium (open space) located in a coastal Portuguese urban area. These measures include the construction of barriers, placed at upstream and downstream of the auditorium, and the planting of trees, placed upstream of the auditorium. The auditorium is constructed in the form of a porch, aligned with North direction, driving the wind flow within the auditorium, promoting channelling effects and increasing its speed, causing discomfort in the users of this structure. To perform the wind comfort assessment, two approaches were used: i) a set of experiments using the wind tunnel (physical approach), with a representative mock-up of the study area; ii) application of the CFD (Computational Fluid Dynamics) model VADIS (numerical approach). Both approaches were used to simulate the baseline scenario and the scenarios considering a set of measures. The physical approach was conducted through a quantitative method, using hot-wire anemometer, and through a qualitative analysis (visualizations), using the laser technology and a fog machine. Both numerical and physical approaches were performed for three different velocities (2, 4 and 6 m·s-1 ) and two different directions (NorNorthwest and South), corresponding to the prevailing wind speed and direction of the study area. The numerical results show an effective reduction (with a maximum value of 80%) of the wind speed inside the auditorium, through the application of the proposed measures. A wind speed reduction in a range of 20% to 40% was obtained around the audience area, for a wind direction from Nor-Northwest. For southern winds, in the audience zone, the wind speed was reduced from 60% to 80%. Despite of that, for southern winds, the design of the barriers generated additional hot spots (high wind speed), namely, in the entrance to the auditorium. Thus, a changing in the location of the entrance would minimize these effects. The results obtained in the wind tunnel compared well with the numerical data, also revealing the high efficiency of the purposed measures (for both wind directions).

Keywords: urban microclimate, pedestrian comfort, numerical modelling, wind tunnel experiments

Procedia PDF Downloads 213
10902 An Analytical Approach of Computational Complexity for the Method of Multifluid Modelling

Authors: A. K. Borah, A. K. Singh

Abstract:

In this paper we deal building blocks of the computer simulation of the multiphase flows. Whole simulation procedure can be viewed as two super procedures; The implementation of VOF method and the solution of Navier Stoke’s Equation. Moreover, a sequential code for a Navier Stoke’s solver has been studied.

Keywords: Bi-conjugate gradient stabilized (Bi-CGSTAB), ILUT function, krylov subspace, multifluid flows preconditioner, simple algorithm

Procedia PDF Downloads 513
10901 Implementation of a Quality Management Approach in the Laboratory of Quality Control and the Repression of Fraud (CACQE) of the Wilaya of Bechar

Authors: Khadidja Mebarki, Naceur Boussouar, Nabila Ihaddadene, M. Akermi

Abstract:

Food products are particularly sensitive, since they concern the health of the consumer, whether it’s be from the health point of view or commercial, this kind of product must be subjected to rigorous controls, in order to prevent any fraud. Quality and safety are essential for food security, public health and economic development. The strengthening of food security is essential to increase food security which is considered reached when all individuals can at any time access safe and nutritious food they need to lead healthy and active lives. The objective of this project is to initiate a quality approach in the laboratories of the quality control and the repression of fraud. It will be directed towards the application of good laboratory practices, traceability, management of quality documents (quality, procedures and specification manual) and quality audits. And to prepare the ground for a possible accreditation by ISO 17025 standard of BECHAR laboratory’s. The project will take place in four main stages: 1- Preparation of an audit grid; 2- Realization of a quality audit according to the method of 5 M completed by a section on quality documentation; 3- Drafting of an audit report and proposal for recommendations; 4- Implementation of corrective actions on the ground. This last step consisted in the formalization of the cleaning disinfection plan; work on good hygiene practices, establishment of a mapping of processes and flow charts of the different processes of the laboratory, classifying quality documents and formalizing the process of document management. During the period of the study within the laboratory, all facets of the work were almost appreciated, as we participated in the expertise performed in within it.

Keywords: quality, management, ISO 17025 accreditation, GLP

Procedia PDF Downloads 502
10900 Nalanda ‘School of Joy’: Teaching Learning Strategies and Support System, for Implementing Child-Friendly Education in Bangladesh

Authors: Sufia Ferdousi

Abstract:

Child-friendly education (CFE) is very important for the children, especially the early year’s students, because it fosters the holistic development of a child. Teacher plays a key role in creating child-friendly education. This study intends to learn about child-friendly education in Bangladesh. The purpose of the study is to explore how CFE is being practiced in Bangladesh. The study attempted to fulfill the purpose through case study investigation. One school, named Nalanda, was selected for the study as it claims to run the school through CFE approach. The objective of the study was to identify, how this school is different from the other schools in Bangladesh, to explore overall teaching learning system like, curriculum, teaching strategies, assessments and to investigate the support system for Child Friendly Education provided to the teachers through training or mentoring. The nature of the case study was qualitative method to get maximum information from the students, parents, teachers and school authorities. The findings were based on 3 classroom observations, interviews with 1 teacher, 1 head teacher and 1 trainer, FGD with 10 students and 6 parents, were used to collect the data. It has been found that Nalanda is different than the other schools in Bangladesh in terms of, parents’ motivation about school curriculum, and sufficiency of teachers’ knowledge on joyful learning/child-friendly learning. The students took part in the extracurricular activities alongside the national curriculum. Teachers showed particular strength in the teaching learning strategies, using materials and assessment. And Nalanda gives strong support for teacher’s training. In conclusion, The Nalanda School in Dhaka was found appropriate for the requirements of Child-friendly education.

Keywords: child friendly education, overall teaching learning system, the requirements of child-friendly education, the alternative education approach

Procedia PDF Downloads 236
10899 Democratisation of Teaching and Learning in Higher Education

Authors: Jane Ebele Iloanya

Abstract:

The introduction of the learning outcome approach in contemporary curriculum design and instruction, has brought student–centered education to the fore. In teacher –centered teaching and learning, the teacher transfers knowledge to the students, who are always at the receiving end. The teacher is assumed to know it all and hardly trusts the knowledge of the students. Teacher-centered education places emphasis on the supremacy of the teacher over the students who should ideally, be able to dialogue with the teacher. The paper seeks to examine the issue of democratisation of the teaching and learning process in Institutions of Higher Learning in Botswana. Botswana is a landlocked country in Southern Africa, with a total population of about two million people. In 1977, Botswana’s First National Policy on Education was unveiled. This came eleven years after the country gained independence from Great Britain. The philosophy which informed the 1977 Education Policy was “Social Harmony”. The philosophy of social harmony has four main principles: Unity, Development, Democracy and Self- Reliance. These principles were meant to permeate all aspects of lives of the people of Botswana, including, the issue of how teaching and learning is conducted in Botswana’s institutions of higher learning. This paper will examine the practicalisation of the principle of democracy in teaching and learning at higher education level in Botswana. It will in particular, discuss the issue of students’ participation and engagement in the teaching and learning process. The following questions will be addressed: 1.Are students involved in planning the curriculum? 2.How engaged are the students in the teaching and learning process? 3.How democratic are the teachers in terms of students’ rights and privileges? A mixed–method approach will be adopted in this study. Questionnaires will be distributed to the students to elicit their views on the practicalisation of the principle of democracy at the higher education level. Semi-structured interview questions will be administered in order to collect information from the lecturers on the issue of democratisation of teaching and learning at the higher education level in Botswana. In addition, relevant and related literature will be reviewed to augment collected data. The study will focus on three tertiary institutions in Gaborone, the capital city of Botswana. Currently, there are ten tertiary institutions in Gaborone; both privately and government owned. The outcome of this study will add to the existing body of knowledge on the issue of the practicalisation of democracy at the higher education level in Botswana. This research is therefore relevant in helping to find out if democratisation of teaching and learning has been realised in Botswana’s Institutions of higher learning. It is important to examine Botswana’s national policy on education in this way to ascertain if it has been effective in giving the country’s education system that democratic element, which is essential for a student-centered approach to the teaching and learning process.

Keywords: democratisation, higher education, learning, teaching

Procedia PDF Downloads 290
10898 Using the SMT Solver to Minimize the Latency and to Optimize the Number of Cores in an NoC-DSP Architectures

Authors: Imen Amari, Kaouther Gasmi, Asma Rebaya, Salem Hasnaoui

Abstract:

The problem of scheduling and mapping data flow applications on multi-core architectures is notoriously difficult. This difficulty is related to the rapid evaluation of Telecommunication and multimedia systems accompanied by a rapid increase of user requirements in terms of latency, execution time, consumption, energy, etc. Having an optimal scheduling on multi-cores DSP (Digital signal Processors) platforms is a challenging task. In this context, we present a novel technic and algorithm in order to find a valid schedule that optimizes the key performance metrics particularly the Latency. Our contribution is based on Satisfiability Modulo Theories (SMT) solving technologies which is strongly driven by the industrial applications and needs. This paper, describe a scheduling module integrated in our proposed Workflow which is advised to be a successful approach for programming the applications based on NoC-DSP platforms. This workflow transform automatically a Simulink model to a synchronous dataflow (SDF) model. The automatic transformation followed by SMT solver scheduling aim to minimize the final latency and other software/hardware metrics in terms of an optimal schedule. Also, finding the optimal numbers of cores to be used. In fact, our proposed workflow taking as entry point a Simulink file (.mdl or .slx) derived from embedded Matlab functions. We use an approach which is based on the synchronous and hierarchical behavior of both Simulink and SDF. Whence, results of running the scheduler which exist in the Workflow mentioned above using our proposed SMT solver algorithm refinements produce the best possible scheduling in terms of latency and numbers of cores.

Keywords: multi-cores DSP, scheduling, SMT solver, workflow

Procedia PDF Downloads 274
10897 Ultra-Tightly Coupled GNSS/INS Based on High Degree Cubature Kalman Filtering

Authors: Hamza Benzerrouk, Alexander Nebylov

Abstract:

In classical GNSS/INS integration designs, the loosely coupled approach uses the GNSS derived position and the velocity as the measurements vector. This design is suboptimal from the standpoint of preventing GNSSoutliers/outages. The tightly coupled GPS/INS navigation filter mixes the GNSS pseudo range and inertial measurements and obtains the vehicle navigation state as the final navigation solution. The ultra‐tightly coupled GNSS/INS design combines the I (inphase) and Q(quadrature) accumulator outputs in the GNSS receiver signal tracking loops and the INS navigation filter function intoa single Kalman filter variant (EKF, UKF, SPKF, CKF and HCKF). As mentioned, EKF and UKF are the most used nonlinear filters in the literature and are well adapted to inertial navigation state estimation when integrated with GNSS signal outputs. In this paper, it is proposed to move a step forward with more accurate filters and modern approaches called Cubature and High Degree cubature Kalman Filtering methods, on the basis of previous results solving the state estimation based on INS/GNSS integration, Cubature Kalman Filter (CKF) and High Degree Cubature Kalman Filter with (HCKF) are the references for the recent developed generalized Cubature rule based Kalman Filter (GCKF). High degree cubature rules are the kernel of the new solution for more accurate estimation with less computational complexity compared with the Gauss-Hermite Quadrature (GHQKF). Gauss-Hermite Kalman Filter GHKF which is not selected in this work because of its limited real-time implementation in high-dimensional state-spaces. In ultra tightly or a deeply coupled GNSS/INS system is dynamics EKF is used with transition matrix factorization together with GNSS block processing which is well described in the paper and assumes available the intermediary frequency IF by using a correlator samples with a rate of 500 Hz in the presented approach. GNSS (GPS+GLONASS) measurements are assumed available and modern SPKF with Cubature Kalman Filter (CKF) are compared with new versions of CKF called high order CKF based on Spherical-radial cubature rules developed at the fifth order in this work. Estimation accuracy of the high degree CKF is supposed to be comparative to GHKF, results of state estimation are then observed and discussed for different initialization parameters. Results show more accurate navigation state estimation and more robust GNSS receiver when Ultra Tightly Coupled approach applied based on High Degree Cubature Kalman Filter.

Keywords: GNSS, INS, Kalman filtering, ultra tight integration

Procedia PDF Downloads 268
10896 Cars in a Neighborhood: A Case of Sustainable Living in Sector 22 Chandigarh

Authors: Maninder Singh

Abstract:

The Chandigarh city is under the strain of exponential growth of car density across various neighborhood. The consumerist nature of society today is to be blamed for this menace because everyone wants to own and ride a car. Car manufacturers are busy selling two or more cars per household. The Regional Transport Offices are busy issuing as many licenses to new vehicles as they can in order to generate revenue in the form of Road Tax. The car traffic in the neighborhoods of Chandigarh has reached a tipping point. There needs to be a more empirical and sustainable model of cars per household, which should be based on specific parameters of livable neighborhoods. Sector 22 in Chandigarh is one of the first residential sectors to be established in the city. There is scope to think, reflect, and work out a method to know how many cars we need to sell our citizens before we lose the argument to traffic problems, parking problems, and road rage. This is where the true challenge of a planner or a designer of the city lies. Currently, in Chandigarh city, there are no clear visible answers to this problem. The way forward is to look at spatial mapping, planning, and design of car parking units to address the problem, rather than suggesting extreme measures of banning cars (short-term) or promoting plans for citywide transport (very long-term). This is a chance to resolve the problem with a pragmatic approach from a citizen’s perspective, instead of an orthodox development planner’s methodology. Since citizens are at the center of how the problem is to be addressed, acceptable solutions are more likely to emerge from the car and traffic problem as defined by the citizens. Thus, the idea and its implementation would be interesting in comparison to the known academic methodologies. The novel and innovative process would lead to a more acceptable and sustainable approach to the issue of number of car parks in the neighborhood of Chandigarh city.

Keywords: cars, Chandigarh, neighborhood, sustainable living, walkability

Procedia PDF Downloads 140
10895 Challenging Convections: Rethinking Literature Review Beyond Citations

Authors: Hassan Younis

Abstract:

Purpose: The objective of this study is to review influential papers in the sustainability and supply chain studies domain, leveraging insights from this review to develop a structured framework for academics and researchers. This framework aims to assist scholars in identifying the most impactful publications for their scholarly pursuits. Subsequently, the study will apply and trial the developed framework on selected scholarly articles within the sustainability and supply chain studies domain to evaluate its efficacy, practicality, and reliability. Design/Methodology/Approach: Utilizing the "Publish or Perish" tool, a search was conducted to locate papers incorporating "sustainability" and "supply chain" in their titles. After rigorous filtering steps, a panel of university professors identified five crucial criteria for evaluating research robustness: average yearly citation counts (25%), scholarly contribution (25%), alignment of findings with objectives (15%), methodological rigor (20%), and journal impact factor (15%). These five evaluation criteria are abbreviated as “ACMAJ" framework. Each paper then received a tiered score (1-3) for each criterion, normalized within its category, and summed using weighted averages to calculate a Final Normalized Score (FNS). This systematic approach allows for objective comparison and ranking of the research based on its impact, novelty, rigor, and publication venue. Findings: The study's findings highlight the lack of structured frameworks for assessing influential sustainability research in supply chain management, which often results in a dependence on citation counts. A complete model that incorporates five essential criteria has been suggested as a response. By conducting a methodical trial on specific academic articles in the field of sustainability and supply chain studies, the model demonstrated its effectiveness as a tool for identifying and selecting influential research papers that warrant additional attention. This work aims to fill a significant deficiency in existing techniques by providing a more comprehensive approach to identifying and ranking influential papers in the field. Practical Implications: The developed framework helps scholars identify the most influential sustainability and supply chain publications. Its validation serves the academic community by offering a credible tool and helping researchers, students, and practitioners find and choose influential papers. This approach aids field literature reviews and study suggestions. Analysis of major trends and topics deepens our grasp of this critical study area's changing terrain. Originality/Value: The framework stands as a unique contribution to academia, offering scholars an important and new tool to identify and validate influential publications. Its distinctive capacity to efficiently guide scholars, learners, and professionals in selecting noteworthy publications, coupled with the examination of key patterns and themes, adds depth to our understanding of the evolving landscape in this critical field of study.

Keywords: supply chain management, sustainability, framework, model

Procedia PDF Downloads 25
10894 Analyzing the Politico-Religious Order of The 'Islamic State'

Authors: Galit Truman Zinman

Abstract:

The 'Islamic State' (IS) is one of the most successful jihadist groups in the modern history. The 'Islamic State' strives to realize the idea of erasing the borders between Muslim countries and establishing a wide Islamic caliphate. The 'Islamic State' is based on religious unity and opposition to existing political order. In this paper, the main argument is that the 'Islamic State' is characterized by two significant tendencies of state-building: preservation and change. The methodology of this study is based on the process tracing method and the analysis of primary sources: decisions, announcements and speeches of religious leaders of the Islamic State, slogans, rituals and symbols, audio and video clips produced by the Al-Hayat Media Center, films distributed on YouTube, as well as the content analysis of Dabiq`s articles (IS official Journal) and nasheeds (jihadi songs). The major findings of this study indicate that in practice the 'Islamic State' uses the same socio-political functions typical to the modern state (preservation), but introduces a different religious-ideological content (change). On the one hand, there is a preservation of the principles of existing modern state. Even with the rejection of secularization, globalization, and nationalism, there is an establishment of typical modern nation-state patterns. It is still a state entity, which has an ideological infrastructure, territory, population, governance and a monopoly on the use of violence, security services, justice system, tax collection, etc. All these functions characterize the modern state, and despite the desire of the 'Islamic State' to create a new kind of state, it reminds patterns of the typical modern nation-state. As for the religious-ideological content of the new state, here we can see a tendency of great change. The 'Islamic State' aims to create an Islamic caliphate which would allow the establishment of religious law and order, under a big commitment to return civilization to a seventh-century environment. The 'Islamic State' favors the fight against Western culture and its liberal ideology. It supports the struggle for global jihad against the unbelievers. Today, despite the territorial 'contraction' and the undermining of the organization's governance in Iraq and Syria, the 'Islamic State' continues to maintain its brand among jihadist activists around the world.

Keywords: Islamic State, Islamic caliphate, modern nation-state, religious law and order

Procedia PDF Downloads 171
10893 A Phenomenographic Examination of Work Motivation to Perform at the Municipal Corporation of Bangladesh

Authors: Md. Rifad Chowdhury

Abstract:

This research study investigates employees' conception of work motivation to perform at the municipal corporation in Bangladesh. The municipal corporation is one of the key administrative bodies of Bangladesh’s local government. Municipal corporation employees provide essential public services in the country’s semi-urban areas. Work motivation has been defined as a result of interaction between the individual and the environment. Local government studies indicate the work environment of the municipal corporation is unique because of its key colonial and political history, several reform attempts, non-western social perspectives, job functions, and traditional governance. The explorative purpose of this study is to find and analyse the conceptions of employees’ work motivation within this environment to expand a better understanding of work motivation. According to the purpose of this study, a qualitative method has been adopted, which has remained a very unpopular method among work motivational researchers in Bangladesh. Twenty-two semi-structured online interviews were conducted in this study. Phenomenographic research methodology has been adopted to describe the limited number of qualitatively different ways of experiencing work motivation. During the analysis of the semi-structured interview transcripts, the focus was on the employees' perspectives as employees experience work motivation or the second-order perspective to explore and analyse the conceptions. Based on the participants' collective experiences and dimensions of variation across the different ways of experiencing, six conceptions of employee work motivation to perform at the municipal corporation were identified in this study. The relationships between conceptions were further elaborated in terms of critical variations across the conceptions. Six dimensions of critical variations have emerged within and between the conceptions. In the outcome space, the relationships between conceptions and dimensions of critical variations are presented in a logical structure. The findings of this research study show significance to expand the understanding of work motivation and the research context of phenomenography. The findings of this research will contribute to the ongoing attention of contextual work motivational understanding from a Bangladeshi perspective and phenomenographic research conceptions in organisational behaviour studies.

Keywords: work motivation, qualitative, phenomenography, local government

Procedia PDF Downloads 81
10892 The Attitude of Students towards the Use of the Social Networks in Education

Authors: Abdulmjeid Aljerawi

Abstract:

This study aimed to investigate the students' attitudes towards the use of social networking in education. Due to the nature of the study, and on the basis of its problem, objectives, and questions, the researcher used the descriptive approach. An appropriate questionnaire was prepared and validity and reliability were ensured. The questionnaire was then applied to the study sample of 434 students from King Saud University.

Keywords: social networks, education, learning, students

Procedia PDF Downloads 264
10891 Disability and Sexuality: A Human Right Approach to Sexual and Reproductive Health of the Hearing Impaired Adolescents In Developing Countries

Authors: Doctor Akanle Florence Foluso

Abstract:

Access to health care and people’s ability to having a responsible, satisfying and safe sexual life is clearly a defined human right of people with hearing impairment and others with disabilities this paper looks at disability and sexuality: a human right approach to sexual and reproductive health of the hearing impaired adolescents in developing countries. This paper investigates the extent to which the hearing impaired has a satisfying, safe sexual life and whether their human right in regards to information education is violated. The study population consists of all hearing impaired adolescents and young adults aged 10-24 years who are currently enrolled in the primary and secondary schools in Nigeria. A sample of 389 hearing impaired adolescents was selected, an adapted version of the illustrative questionnaire for interview – survey by Johncleland was used to collect the data. A correlation of 0.80 was obtained at p<0.05 level of significance. Teachers in the schools of the deaf who used sign language were used in the administration of the questionnaire. The data generated were analyzed using Frequency Counts, Percentages, Means and Standard Deviation to give a Summary on responses on access to information, education, voluntary testing and counselling and other reproductive services. This is to investigate if the sexual and reproductive right violated or protected. Findings show that a gap exists in the level of knowledge of SRH services, voluntary counselling because more than half the respondents are not aware of these services in their community. Access to information, education and health services are rights denied the hearing impaired. So their SRH rights are violated.

Keywords: sexual right diability, family planning, pregnancy, diability

Procedia PDF Downloads 50
10890 Potentials for Learning History through Role-Playing in Virtual Reality: An Exploratory Study on Role-Playing on a Virtual Heritage Site

Authors: Danzhao Cheng, Eugene Ch'ng

Abstract:

Virtual Reality technologies can reconstruct cultural heritage objects and sites to a level of realism. Concentrating mostly on documenting authentic data and accurate representations of tangible contents, current virtual heritage is limited to accumulating visually presented objects. Such constructions, however, are fragmentary and may not convey the inherent significance of heritage in a meaningful way. In order to contextualise fragmentary historical contents where history can be told, a strategy is to create a guided narrative via role-playing. Such an approach can strengthen the logical connections of cultural elements and facilitate creative synthesis within the virtual world. This project successfully reconstructed the Ningbo Sanjiangkou VR site in Yuan Dynasty combining VR technology and role-play game approach. The results with 80 pairs of participants suggest that VR role-playing can be beneficial in a number of ways. Firstly, it creates thematic interactivity which encourages users to explore the virtual heritage in a more entertaining way with task-oriented goals. Secondly, the experience becomes highly engaging since users can interpret a historical context through the perspective of specific roles that exist in past societies. Thirdly, personalisation allows open-ended sequences of the expedition, reinforcing user’s acquisition of procedural knowledge relative to the cultural domain. To sum up, role-playing in VR poses great potential for experiential learning as it allows users to interpret a historical context in a more entertaining way.

Keywords: experiential learning, maritime silk road, role-playing, virtual heritage, virtual reality

Procedia PDF Downloads 152
10889 The Effect of a Probiotic Diet on htauE14 in a Rodent Model of Alzheimer’s Disease

Authors: C. Flynn, Q. Yuan, C. Reinhardt

Abstract:

Alzheimer’s Disease (AD) is a progressive neurodegenerative disorder affecting broad areas of the cerebral cortex and hippocampus. More than 95% of AD cases are representative of sporadic AD, where both genetic and environmental risk factors play a role. The main pathological features of AD include the widespread deposition of amyloid-beta and neurofibrillary tau tangles in the brain. The earliest brain pathology related to AD has been defined as hyperphosphorylated soluble tau in the noradrenergic locus coeruleus (LC) neurons, characterized by Braak. However, the cause of this pathology and the ultimate progression of AD is not understood. Increasing research points to a connection between the gut microbiota and the brain, and mounting evidence has shown that there is a bidirectional interaction between the two, known as the gut-brain axis. This axis can allow for bidirectional movement of neuroinflammatory cytokines and pathogenic misfolded proteins, as seen in AD. Prebiotics and probiotics have been shown to have a beneficial effect on gut health and can strengthen the gut-barrier as well as the blood-brain barrier, preventing the spread of these pathogens across the gut-brain axis. Our laboratory has recently established a pretangle tau rat model, in which we selectively express pseudo-phosphorylated human tau (htauE14) in the LC neurons of TH-Cre rats. LC htauE14 produced pathological changes in rats resembling those of the preclinical AD pathology (reduced olfactory discrimination and LC degeneration). In this work, we will investigate the effects of pre/probiotic ingestion on AD behavioral deficits, blood inflammation/cytokines, and various brain markers in our experimental rat model of AD. Rats will be infused with an adeno-associated viral vector containing a human tau gene pseudophosphorylated at 14 sites (common in LC pretangles) into 2-3 month TH-Cre rats. Fecal and blood samples will be taken at pre-surgery, and various post-surgery time points. A collection of behavioral tests will be performed, and immunohistochemistry/western blotting techniques will be used to observe various biomarkers. This work aims to elucidate the relationship between gut health and AD progression by strengthening gut-brain relationship and aims to observe the overall effect on tau formation and tau pathology in AD brains.

Keywords: alzheimer’s disease, aging, gut microbiome, neurodegeneration

Procedia PDF Downloads 123
10888 Perceptions of Cognitive Behavioural Therapy in Physiotherapy Management for Chronic Low Back Pain: A Qualitative Exploration of Stakeholder Views

Authors: Latifa Alenezi, Liz Croot, Janet Harris

Abstract:

Chronic Low Back Pain (CLBP) is one of the most common and recurrent musculoskeletal problems that causes patients to access health care services frequently. The Bio-psychosocial Model emphasises that psychological, behavioural and social factors contribute to the development and persistence of CLBP. Cognitive behavioural therapy (CBT) is a psychological pain management strategy that can be used by physiotherapists treating chronic low back pain. However, evidence of the effectiveness of CBT for CLBP varies between different studies. The proposed study was preceded by a mixed methods systematic review that found that CBT has a beneficial effect for CLBP patients when compared to waiting list or other treatments; however, there is variation in effectiveness across different settings. Little is known about how CBT is applied by physiotherapists in physiotherapy settings. The interest of this study is directed towards generating an explanation and understanding of why, when, and how some physiotherapists make decisions and choose to apply CBT for CLBP patients, whereas others do not. Also, how and for what type of CLBP patients does CBT work, and for whom might CBT not work? Therefore, the study will take a qualitative approach to explore CLBP patients’, physiotherapists’ and managers’ perceptions of CBT and how it is used in physiotherapy to enable a deeper understanding and richer explanation of CBT effectiveness and help to inform research and practice. The study will use grounded theory approach to generate an explanatory theory of the clinical application of CBT for CLBP in physiotherapy settings. Physiotherapists, patients and managers of physiotherapy services will be interviewed. Grounded theory techniques will be used to analyse the data. The presentation will describe findings from the interviews and the emerging theory. This research will help to further inform RCTs about the effectiveness of CBT for CLBP in physiotherapy.

Keywords: CBT, CLBP, perception, physiotherapy, theory

Procedia PDF Downloads 218
10887 Prostheticly Oriented Approach for Determination of Fixture Position for Facial Prostheses Retention in Cases with Atypical and Combined Facial Defects

Authors: K. A.Veselova, N. V.Gromova, I. N.Antonova, I. N. Kalakutskii

Abstract:

There are many diseases and incidents that may result facial defects and deformities: cancer, trauma, burns, congenital anomalies, and autoimmune diseases. In some cases, patient may acquire atypically extensive facial defect, including more than one anatomical region or, by contrast, atypically small defect (e.g. partial auricular defect). The anaplastology gives us opportunity to help patient with facial disfigurement in cases when plastic surgery is contraindicated. Using of implant retention for facial prosthesis is strongly recommended because improves both aesthetic and functional results and makes using of the prosthesis more comfortable. Prostheticly oriented fixture position is extremely important for aesthetic and functional long-term result; however, the optimal site for fixture placement is not clear in cases with atypical configuration of facial defect. The objective of this report is to demonstrate challenges in fixture position determination we have faced with and offer the solution. In this report, four cases of implant-supported facial prosthesis are described. Extra-oral implants with four millimeter length were used in all cases. The decision regarding the quantity of surgical stages was based on anamnesis of disease. Facial prostheses were manufactured according to conventional technique. Clinical and technological difficulties and mistakes are described, and prostheticly oriented approach for determination of fixture position is demonstrated. The case with atypically large combined orbital and nasal defect resulting after arteriovenous malformation is described: the correct positioning of artificial eye was impossible due to wrong position of the fixture (with suprastructure) located in medial aspect of supraorbital rim. The suprastructure was unfixed and this fixture wasn`t used for retention in order to achieve appropriate artificial eye placement and better aesthetic result. In other case with small partial auricular defect (only helix and antihelix were absent) caused by squamoized cell carcinoma T1N0M0 surgical template was used to avoid the difficulties. To achieve the prostheticly oriented fixture position in case of extremely small defect the template was made on preliminary cast using vacuum thermoforming method. Two radiopaque markers were incorporated into template in preferable for fixture placement positions taking into account future prosthesis configuration. The template was put on remaining ear and cone-beam CT was performed to insure, that the amount of bone is enough for implant insertion in preferable position. Before the surgery radiopaque markers were extracted and template was holed for guide drill. Fabrication of implant-retained facial prostheses gives us opportunity to improve aesthetics, retention and patients’ quality of life. But every inaccuracy in planning leads to challenges on surgery and prosthetic stages. Moreover, in cases with atypically small or extended facial defects prostheticly oriented approach for determination of fixture position is strongly required. The approach including surgical template fabrication is effective, easy and cheap way to avoid mistakes and unpredictable result.

Keywords: anaplastology, facial prosthesis, implant-retained facial prosthesis., maxillofacil prosthese

Procedia PDF Downloads 92
10886 Data Compression in Ultrasonic Network Communication via Sparse Signal Processing

Authors: Beata Zima, Octavio A. Márquez Reyes, Masoud Mohammadgholiha, Jochen Moll, Luca de Marchi

Abstract:

This document presents the approach of using compressed sensing in signal encoding and information transferring within a guided wave sensor network, comprised of specially designed frequency steerable acoustic transducers (FSATs). Wave propagation in a damaged plate was simulated using commercial FEM-based software COMSOL. Guided waves were excited by means of FSATs, characterized by the special shape of its electrodes, and modeled using PIC255 piezoelectric material. The special shape of the FSAT, allows for focusing wave energy in a certain direction, accordingly to the frequency components of its actuation signal, which makes available a larger monitored area. The process begins when a FSAT detects and records reflection from damage in the structure, this signal is then encoded and prepared for transmission, using a combined approach, based on Compressed Sensing Matching Pursuit and Quadrature Amplitude Modulation (QAM). After codification of the signal is in binary chars the information is transmitted between the nodes in the network. The message reaches the last node, where it is finally decoded and processed, to be used for damage detection and localization purposes. The main aim of the investigation is to determine the location of detected damage using reconstructed signals. The study demonstrates that the special steerable capabilities of FSATs, not only facilitate the detection of damage but also permit transmitting the damage information to a chosen area in a specific direction of the investigated structure.

Keywords: data compression, ultrasonic communication, guided waves, FEM analysis

Procedia PDF Downloads 115
10885 China's New "Pivots" in the Indian Ocean: Towards "String of Pearls" Strategy 2.0

Authors: Mike Chia-Yu Huang

Abstract:

China’s port facility construction projects in the Indian Ocean (IO) region, Gwadar Port and Djibouti Port projects in particular, have led to a heated debate among both Chinese and Western strategists over whether the country has literally been carrying out its “string of pearls” strategy, an alleged Chinese plan to challenge America’s military predominance in South Asia. Even though the Chinese government repeatedly denied the existence of such a strategy and highlighted the civilian/commercial nature of its port projects, it has significantly enhanced its strategic cooperation with littoral countries in the IO region since the “One Belt One Road” initiative was introduced by Chinese President Xi Jinping in 2013. Whether China does have a plan to expand its sphere of military influence westward concerns the balance of power in the IO region. If the answer is positive, the security environment there will be changed drastically. This paper argues that rather than simply copying the U.S. model of developing overseas military bases along the IO periphery, Beijing has been deliberating a more sophisticated plan for its physical presence there: creating a new set of “overseas strategic pivots.” These “pivots,” semi-military and semi-commercial in nature, are designed to help Beijing sustain its anti-piracy operations in the Gulf of Aden and serve as forward stations for the transportation of China’s imported energy and merchandise. They can support the Chinese Navy’s operations overseas but are not supposed to undertake face-to-face combat missions. This upgraded Chinese scheme can be identified as “string of pearls” strategy 2.0. Moreover, it is expected to help China deepen its roots in the IO region, implying that Beijing has to a large extent scratched its old diplomatic philosophy which highlighted the merits of non-interference and nonalignment. While a full-scale maritime confrontation between China and the U.S.-India security alliance is unlikely to be witnessed in the near future, an ambitious Chinese plan to step into the global maritime domain has been evidently shown.

Keywords: Chinese navy, Djibouti, Gwadar, Indian Ocean, string of pearls strategy

Procedia PDF Downloads 322
10884 Massive Open Online Course about Content Language Integrated Learning: A Methodological Approach for Content Language Integrated Learning Teachers

Authors: M. Zezou

Abstract:

This paper focuses on the design of a Massive Open Online Course (MOOC) about Content Language Integrated Learning (CLIL) and more specifically about how teachers can use CLIL as an educational approach incorporating technology in their teaching as well. All the four weeks of the MOOC will be presented and a step-by-step analysis of each lesson will be offered. Additionally, the paper includes detailed lesson plans about CLIL lessons with proposed CLIL activities and games in which technology plays a central part. The MOOC is structured based on certain criteria, in order to ensure success, as well as a positive experience that the learners need to have after completing this MOOC. It addresses to all language teachers who would like to implement CLIL into their teaching. In other words, it presents the methodology that needs to be followed so as to successfully carry out a CLIL lesson and achieve the learning objectives set at the beginning of the course. Firstly, in this paper, it is very important to give the definitions of MOOCs and LMOOCs, as well as to explore the difference between a structure-based MOOC (xMOOC) and a connectivist MOOC (cMOOC) and present the criteria of a successful MOOC. Moreover, the notion of CLIL will be explored, as it is necessary to fully understand this concept before moving on to the design of the MOOC. Onwards, the four weeks of the MOOC will be introduced as well as lesson plans will be presented: The type of the activities, the aims of each activity and the methodology that teachers have to follow. Emphasis will be placed on the role of technology in foreign language learning and on the ways in which we can involve technology in teaching a foreign language. Final remarks will be made and a summary of the main points will be offered at the end.

Keywords: CLIL, cMOOC, lesson plan, LMOOC, MOOC criteria, MOOC, technology, xMOOC

Procedia PDF Downloads 179
10883 Bio-Inspired Design Approach Analysis: A Case Study of Antoni Gaudi and Santiago Calatrava

Authors: Marzieh Imani

Abstract:

Antoni Gaudi and Santiago Calatrava have reputation for designing bio-inspired creative and technical buildings. Even though they have followed different independent approaches towards design, the source of bio-inspiration seems to be common. Taking a closer look at their projects reveals that Calatrava has been influenced by Gaudi in terms of interpreting nature and applying natural principles into the design process. This research firstly discusses the dialogue between Biomimicry and architecture. This review also explores human/nature discourse during the history by focusing on how nature revealed itself to the fine arts. This is explained by introducing naturalism and romantic style in architecture as the outcome of designers’ inclination towards nature. Reviewing the literature, theoretical background and practical illustration of nature have been included. The most dominant practical aspects of imitating nature are form and function. Nature has been reflected in architectural science resulted in shaping different architectural styles such as organic, green, sustainable, bionic, and biomorphic. By defining a set of common aspects of Gaudi and Calatrava‘s design approach and by considering biomimetic design categories (organism, ecosystem, and behaviour as the main division and form, function, process, material, and construction as subdivisions), Gaudi’s and Calatrava’s project have been analysed. This analysis explores if their design approaches are equivalent or different. Based on this analysis, Gaudi’s architecture can be recognised as biomorphic while Calatrava’s projects are literally biomimetic. Referring to these architects, this review suggests a new set of principles by which a bio-inspired project can be determined either biomorphic or biomimetic.

Keywords: biomimicry, Calatrava, Gaudi, nature

Procedia PDF Downloads 275
10882 Configuring Systems to Be Viable in a Crisis: The Role of Intuitive Decision-Making

Authors: Ayham Fattoum, Simos Chari, Duncan Shaw

Abstract:

Volatile, uncertain, complex, and ambiguous (VUCA) conditions threaten systems viability with emerging and novel events requiring immediate and localized responses. Such responsiveness is only possible through devolved freedom and emancipated decision-making. The Viable System Model (VSM) recognizes the need and suggests maximizing autonomy to localize decision-making and minimize residual complexity. However, exercising delegated autonomy in VUCA requires confidence and knowledge to use intuition and guidance to maintain systemic coherence. This paper explores the role of intuition as an enabler of emancipated decision-making and autonomy under VUCA. Intuition allows decision-makers to use their knowledge and experience to respond rapidly to novel events. This paper offers three contributions to VSM. First, it designs a system model that illustrates the role of intuitive decision-making in managing complexity and maintaining viability. Second, it takes a black-box approach to theory development in VSM to model the role of autonomy and intuition. Third, the study uses a multi-stage discovery-oriented approach (DOA) to develop theory, with each stage combining literature, data analysis, and model/theory development and identifying further questions for the subsequent stage. We synthesize literature (e.g., VSM, complexity management) with seven months of field-based insights (interviews, workshops, and observation of a live disaster exercise) to develop a framework of intuitive complexity management framework and VSM models. The results have practical implications for enhancing the resilience of organizations and communities.

Keywords: Intuition, complexity management, decision-making, viable system model

Procedia PDF Downloads 57
10881 A Foodborne Cholera Outbreak in a School Caused by Eating Contaminated Fried Fish: Hoima Municipality, Uganda, February 2018

Authors: Dativa Maria Aliddeki, Fred Monje, Godfrey Nsereko, Benon Kwesiga, Daniel Kadobera, Alex Riolexus Ario

Abstract:

Background: Cholera is a severe gastrointestinal disease caused by Vibrio cholera. It has caused several pandemics. On 26 February 2018, a suspected cholera outbreak, with one death, occurred in School X in Hoima Municipality, western Uganda. We investigated to identify the scope and mode of transmission of the outbreak, and recommend evidence-based control measures. Methods: We defined a suspected case as onset of diarrhea, vomiting, or abdominal pain in a student or staff of School X or their family members during 14 February–10 March. A confirmed case was a suspected case with V. cholerae cultured from stool. We reviewed medical records at Hoima Hospital and searched for cases at School X. We conducted descriptive epidemiologic analysis and hypothesis-generating interviews of 15 case-patients. In a retrospective cohort study, we compared attack rates between exposed and unexposed persons. Results: We identified 15 cases among 75 students and staff of School X and their family members (attack rate=20%), with onset from 25-28 February. One patient died (case-fatality rate=6.6%). The epidemic curve indicated a point-source exposure. On 24 February, a student brought fried fish from her home in a fishing village, where a cholera outbreak was ongoing. Of the 21 persons who ate the fish, 57% developed cholera, compared with 5.6% of 54 persons who did not eat (RR=10; 95% CI=3.2-33). None of 4 persons who recooked the fish before eating, compared with 71% of 17 who did not recook it, developed cholera (RR=0.0, 95%CIFisher exact=0.0-0.95). Of 12 stool specimens cultured, 6 yielded V. cholerae. Conclusion: This cholera outbreak was caused by eating fried fish, which might have been contaminated with V. cholerae in a village with an ongoing outbreak. Lack of thorough cooking of the fish might have facilitated the outbreak. We recommended thoroughly cooking fish before consumption.

Keywords: cholera, disease outbreak, foodborne, global health security, Uganda

Procedia PDF Downloads 184