Search results for: spread reshaping code
2253 Study on the OTP Authentication Method and Security for User Mobility in the Cloud
Authors: Jong-Won Lee
Abstract:
Since Cloud environment has appeared as the most powerful keyword in the computing industry, the growth in VDI (Virtual Desktop Infrastructure) became remarkable in domestic market. In recent years, with the trend that mobile devices such as smartphones and pads spread so rapidly, the strengths of VDI that allows people to access and perform business on the move along with companies' office needs expedite more rapid spread of VDI. However, although this enhanced accessibility and mobility can bring the enhanced productivity, it sometimes conflicts with the security, so there should be more detailed security solution, which is user authentication. In this paper, mobile OTP (One-Time Password) authentication method is proposed to secure mobile device portability through rapid and secure authentication using mobile devices such as mobile phones or pads, which does not require additional purchase or possession of OTP tokens of users. However, in order to use the service continuously and reliably in the cloud environment, both service provider and user have to prepare for security awareness and security threats, and continuously study the conflicting aspect between the improving user convenience and the security and supplement so that cloud service can provide opportunities to develop as a new growth industry in the future and create a new market in IT industry.Keywords: cloud, OTP, mobility, security, authentication
Procedia PDF Downloads 3522252 A Content Analysis of Sustainability Reporting to Frame the Heterogeneity in Corporate Environment Sustainability Practices
Authors: Venkataraman Sankaranarayanan, Sougata Ray
Abstract:
While extant research has examined many aspects of differential corporate environmental outcomes and behavior, a holistic and integrated view of heterogeneity in corporate environment sustainability (CES) practices remains a puzzle to be fully unraveled – its extent and nature, its relationship to macro or micro level influences, or strategic orientations. Such a perspective would be meaningful for the field given notable strides in CES practices and the corporate social responsibility agenda over the last two decades, in the backdrop of altered global socio-political sensitivities and technological advances. To partly address this gap, this exploratory research adopted a content analysis approach to code patterns in the sustainability disclosures of the 160 largest global firms spread over 8 years. The sample of firms spanned seven industries, nine countries and three continents thereby presenting data rich and diverse enough in several dimensions to be representative of global heterogeneity in CES practices. Through a factor analysis of the coded data, four strategic CES orientations were extracted through the analysis, that effectively straddles most of the variation observed in current CES practices – one that seeks to reduce environmental damage on account of the firm’s operations, another that prioritizes minimalism, a third that focuses on broader ecological status quo, and a final one that champions the ‘business of green’, extending the CES agenda beyond the firm’s boundaries. These environment sustainability strategy orientations are further examined to elicit prominent patterns and explore plausible antecedents.Keywords: corporate social responsibility, corporate sustainability, environmental management, heterogeneity, strategic orientation
Procedia PDF Downloads 3362251 Unlocking the Genetic Code: Exploring the Potential of DNA Barcoding for Biodiversity Assessment
Authors: Mohammed Ahmed Ahmed Odah
Abstract:
DNA barcoding is a crucial method for assessing and monitoring species diversity amidst escalating threats to global biodiversity. The author explores DNA barcoding's potential as a robust and reliable tool for biodiversity assessment. It begins with a comprehensive review of existing literature, delving into the theoretical foundations, methodologies and applications of DNA barcoding. The suitability of various DNA regions, like the COI gene, as universal barcodes is extensively investigated. Additionally, the advantages and limitations of different DNA sequencing technologies and bioinformatics tools are evaluated within the context of DNA barcoding. To evaluate the efficacy of DNA barcoding, diverse ecosystems, including terrestrial, freshwater and marine habitats, are sampled. Extracted DNA from collected specimens undergoes amplification and sequencing of the target barcode region. Comparison of the obtained DNA sequences with reference databases allows for the identification and classification of the sampled organisms. Findings demonstrate that DNA barcoding accurately identifies species, even in cases where morphological identification proves challenging. Moreover, it sheds light on cryptic and endangered species, aiding conservation efforts. The author also investigates patterns of genetic diversity and evolutionary relationships among different taxa through the analysis of genetic data. This research contributes to the growing knowledge of DNA barcoding and its applicability for biodiversity assessment. The advantages of this approach, such as speed, accuracy and cost-effectiveness, are highlighted, along with areas for improvement. By unlocking the genetic code, DNA barcoding enhances our understanding of biodiversity, supports conservation initiatives and informs evidence-based decision-making for the sustainable management of ecosystems.Keywords: DNA barcoding, biodiversity assessment, genetic code, species identification, taxonomic resolution, next-generation sequencing
Procedia PDF Downloads 272250 A Semidefinite Model to Quantify Dynamic Forces in the Powertrain of Torque Regulated Bascule Bridge Machineries
Authors: Kodo Sektani, Apostolos Tsouvalas, Andrei Metrikine
Abstract:
The reassessment of existing movable bridges in The Netherlands has created the need for acceptance/rejection criteria to assess whether the machineries are meet certain design demands. However, the existing design code defines a different limit state design, meant for new machineries which is based on a simple linear spring-mass model. Observations show that existing bridges do not confirm the model predictions. In fact, movable bridges are nonlinear systems consisting of mechanical components, such as, gears, electric motors and brakes. Next to that, each movable bridge is characterized by a unique set of parameters. However, in the existing code various variables that describe the physical characteristics of the bridge are neglected or replaced by partial factors. For instance, the damping ratio ζ, which is different for drawbridges compared to bascule bridges, is taken as a constant for all bridge types. In this paper, a model is developed that overcomes some of the limitations of existing modelling approaches to capture the dynamics of the powertrain of a class of bridge machineries First, a semidefinite dynamic model is proposed, which accounts for stiffness, damping, and some additional variables of the physical system, which are neglected by the code, such as nonlinear braking torques. The model gives an upper bound of the peak forces/torques occurring in the powertrain during emergency braking. Second, a discrete nonlinear dynamic model is discussed, with realistic motor torque characteristics during normal operation. This model succeeds to accurately predict the full time history of the occurred stress state of the opening and closing cycle for fatigue purposes.Keywords: Dynamics of movable bridges, Bridge machinery, Powertrains, Torque measurements
Procedia PDF Downloads 1572249 Legal Study on the Construction of Olympic and Paralympic Soft Law about Manipulation of Sports Competition
Authors: Clemence Collon, Didier Poracchia
Abstract:
The manipulation of sports competitions is a new type of sports integrity problem. While doping has become an organized, institutionalized struggle, the manipulation of sports competitions is gradually building up. This study aims to describe and understand how the soft Olympic and Paralympic law was gradually built. It also summarizes the legal tools for prevention, detection, and sanction developed by the international Olympic movement. Then, it analyzes the impact of this soft law on the law of the States, in particular in French law. This study is mainly based on an analysis of existing legal literature and non-binding law in the International Olympic and Paralympic movement and on the French National Olympic Committee. Interviews were carried out with experts from the Olympic movement or experts working on combating the manipulation of sports competitions; the answers are also used in this article. The International Olympic Committee has created a supranational legal base to fight against the manipulation of sports competitions. This legal basis must be respected by sports organizations. The Olympic Charter, the Olympic Code of Ethics, the Olympic Movement Code on the prevention of the manipulation of sports competitions, the rules of standards, the basic universal principles, the manuals, the declarations have been published in this perspective. This sports soft law has influences or repercussions in each state. Many states take this new form of integrity problem into account by creating state laws or measures in favor of the fight against sports manipulations. France has so far only a legal basis for manipulation related to betting on sports competitions through the infraction of sports corruption included in the penal code and also created a national platform with various actors to combat this cheating. This legal study highlights the progressive construction of the sports law rules of the Olympic movement in the fight against the manipulation of sports competitions linked to sports betting and their impact on the law of the states.Keywords: integrity, law and ethics, manipulation of sports competitions, olympic, sports law
Procedia PDF Downloads 1552248 A Software Engineering Methodology for Developing Secure Obfuscated Software
Authors: Carlos Gonzalez, Ernesto Linan
Abstract:
We propose a methodology to conciliate two apparently contradictory processes in the development of secure obfuscated software and good software engineered software. Our methodology consists first in the system designers defining the type of security level required for the software. There are four types of attackers: casual attackers, hackers, institution attack, and government attack. Depending on the level of threat, the methodology we propose uses five or six teams to accomplish this task. One Software Engineer Team and one or two software Obfuscation Teams, and Compiler Team, these four teams will develop and compile the secure obfuscated software, a Code Breakers Team will test the results of the previous teams to see if the software is not broken at the required security level, and an Intrusion Analysis Team will analyze the results of the Code Breakers Team and propose solutions to the development teams to prevent the detected intrusions. We also present an analytical model to prove that our methodology is no only easier to use, but generates an economical way of producing secure obfuscated software.Keywords: development methodology, obfuscated software, secure software development, software engineering
Procedia PDF Downloads 2522247 Static Headspace GC Method for Aldehydes Determination in Different Food Matrices
Authors: A. Mandić, M. Sakač, A. Mišan, B. Šojić, L. Petrović, I. Lončarević, B. Pajin, I. Sedej
Abstract:
Aldehydes as secondary lipid oxidation products are highly specific to the oxidative degradation of particular polyunsaturated fatty acids present in foods. Gas chromatographic analysis of those volatile compounds has been widely used for monitoring of the deterioration of food products. Developed static headspace gas chromatography method using flame ionization detector (SHS GC FID) was applied to monitor the aldehydes present in processed foods such as bakery, meat and confectionary products. Five selected aldehydes were determined in samples without any sample preparation, except grinding for bakery and meat products. SHS–GC analysis allows the separation of propanal, pentanal, hexanal, heptanal and octanal, within 15min. Aldehydes were quantified in fresh and stored samples, and the obtained range of aldehydes in crackers was 1.62±0.05-9.95±0.05mg/kg, in sausages 6.62±0.46-39.16±0.39mg/kg; and in cocoa spread cream 0.48±0.01-1.13±0.02mg/kg. Referring to the obtained results, the following can be concluded, proposed method is suitable for different types of samples, content of aldehydes varies depending on the type of a sample, and differs in fresh and stored samples of the same type.Keywords: lipid oxidation, aldehydes, crackers, sausage, cocoa cream spread
Procedia PDF Downloads 4302246 Judicial Control in a Context of the Concept of Legal Policy of the Republic of Kazakhstan
Authors: G. A. Kuanaliyeva, G. T. Aigarinova, G. K. Shulanbekova
Abstract:
This article is devoted to judicial control in criminal legal proceedings of the Republic of Kazakhstan in the light of the new Concept of legal policy till 2020. In article the general characteristic and concept of judicial control, and also its signs and types are considered. Different views of scientists are analyzed. Foreign experiment on application of judicial control is given. The author states also the point sight on this problem and gives the definition to concept of judicial control. The code of criminal procedure of the Republic of Kazakhstan (RK Criminal Procedure Code) doesn't consolidate concept of judicial control. The author in article suggests making change and addition to the existing Code of criminal procedure of the Republic of Kazakhstan by definition of judicial control. The decree of the President of the Republic of Kazakhstan of August 24, 2009 No. 858 approved the Concept of legal policy of the Republic for the period from 2010 to 2020. The new Concept of legal policy of the Republic of Kazakhstan, defines prospects of development of national legal system of the country on the following decade. The concept of legal policy completely mentions also institute of judicial control. Since finding of the independence by Kazakhstan the set of laws, including the rights directed on providing, freedoms and a legitimate interest of citizens was accepted. Certainly, in any country, whatever democratic it was, there are problems to human rights. However, it is obvious that Kazakhstan strongly intends to guarantee all Republic of Kazakhstan proclaimed in the Constitution the rights and freedoms of the citizens. Our country seeks for creation of the constitutional state, tries to provide a guarantee from various arbitrariness in activity of competent government bodies, officials. In the concept of legal policy of the Republic of Kazakhstan it is specified: "...priority of development of the criminal procedure right there is a further consecutive realization of the fundamental principles of the criminal legal proceedings directed on protection of the rights and freedoms of the person". Judicial control just also is such guarantee.Keywords: rights and freedoms of the person, concept, legal policy, court, judicial control
Procedia PDF Downloads 4962245 Revisiting the Fiscal Theory of Sovereign Risk from the DSGE View
Authors: Eiji Okano, Kazuyuki Inagaki
Abstract:
We revisit Uribe's `Fiscal Theory of Sovereign Risk' advocating that there is a trade-off between stabilizing inflation and suppressing default. We develop a class of dynamic stochastic general equilibrium (DSGE) model with nominal rigidities and compare two de facto inflation stabilization policies, optimal monetary policy and optimal monetary and fiscal policy with the minimizing interest rate spread policy which completely suppress the default. Under the optimal monetary and fiscal policy, not only the nominal interest rate but also the tax rate work to minimize welfare costs through stabilizing inflation. Under the optimal monetary both inflation and output gap are completely stabilized although those are fluctuating under the optimal monetary policy. In addition, volatility in the default rate under the optimal monetary policy is considerably lower than one under the optimal monetary policy. Thus, there is not the SI-SD trade-off. In addition, while the minimizing interest rate spread policy makes inflation rate severely volatile, the optimal monetary and fiscal policy stabilize both the inflation and the default. A trade-off between stabilizing inflation and suppressing default is not so severe what pointed out by Uribe.Keywords: sovereign risk, optimal monetary policy, fiscal theory of the price level, DSGE
Procedia PDF Downloads 3212244 Ab Initio Studies of Structural and Thermal Properties of Aluminum Alloys
Authors: M. Saadi, S. E. H. Abaidia, M. Y. Mokeddem.
Abstract:
We present the results of a systematic and comparative study of the bulk, the structural properties, and phonon calculations of aluminum alloys using several exchange–correlations functional theory (DFT) with different plane-wave basis pseudo potential techniques. Density functional theory implemented by the Vienna Ab Initio Simulation Package (VASP) technique is applied to calculate the bulk and the structural properties of several structures. The calculations were performed for within several exchange–correlation functional and pseudo pententials available in this code (local density approximation (LDA), generalized gradient approximation (GGA), projector augmented wave (PAW)). The lattice dynamic code “PHON” developed by Dario Alfè was used to calculate some thermodynamics properties and phonon dispersion relation frequency distribution of Aluminium alloys using the VASP LDA PAW and GGA PAW results. The bulk and structural properties of the calculated structures were compared to different experimental and calculated works.Keywords: DFT, exchange-correlation functional, LDA, GGA, pseudopotential, PAW, VASP, PHON, phonon dispersion
Procedia PDF Downloads 4872243 The Comparative Analysis on Pre-Trial in Relation to the Reform of Pre-Trial in Indonesian Criminal Procedural Code
Authors: Muhammad Fatahillah Akbar
Abstract:
Criminal Procedural Law is established to protect the society from the abuse of authority. To achieve that purpose, the criminal procedural law shall be established in accordance with the laws of human right and the protection of the society. One of the mechanisms to protect human rights and to ensure the compliance of authorities in criminal procedural law is pre-trial mechanism. In many countries, there are various mechanisms of pre-trial. In the recent cases in Indonesia, pre-trial has been an interesting issue. The issue is also addressed by the Constitutional Court Decision Number 21/PUU-XII/2014 which enhance the competence of pre-trial which includes the suspect determination and the legality of seizure and search. Before that decision, some pre-trial decisions have made landmark decision by enhancing the competence of pre-trial, such as the suspect determination case in Budi Gunawan Case and legality of the investigation in Hadi Purnomo Case. These pre-trial cases occurred because the society needs protection even though it is not provided by written legislations, in this matter, The Indonesian Criminal Procedural Code (KUHAP). For instance, a person can be a suspect for unlimited time because the Criminal Procedural Code does not regulate the limit of investigation, so the suspect enactment shall be able to be challenged to protect human rights. Before the Constitutional Court Decision Suspect Determination cannot be challenged so that the society is not fully protected. The Constitutional Court Decision has provided more protections. Nowadays, investigators shall be more careful in conducting the investigation. However, those decisions, including the Constitutional Court Decision are not sufficient for society to be protected by abuse of authority. For example, on 7 March 2017, a single judge, in a Pre-Trial, at the Surabaya District Court, decided that the investigation was unlawful and shall be terminated. This is not regulated according to the Code and also any decisions in pre-trial. It can be seen that the reform of pre-trial is necessary. Hence, this paper aims to examine how pre-trial shall be developed in the future to provide wide access for society to have social justice in criminal justice system. The question will be answered by normative, historical, and comparative approaches. Firstly, the paper will examine the history of pre-trial in Indonesia and also landmark decisions on pre-trial. Then, the lessons learned from other countries regarding to the pre-trial mechanism will be elaborated to show how pre-trial shall be developed and what the competences of a pre-trial are. The focus of all discussions shall be on how the society is protected and provided access to legally complain to the authority. At the end of the paper, the recommendation to reform the pre-trial mechanism will be suggested.Keywords: pre-trial, criminal procedural law, society
Procedia PDF Downloads 1682242 Deep Neural Networks for Restoration of Sky Images Affected by Static and Anisotropic Aberrations
Authors: Constanza A. Barriga, Rafael Bernardi, Amokrane Berdja, Christian D. Guzman
Abstract:
Most image restoration methods in astronomy rely upon probabilistic tools that infer the best solution for a deconvolution problem. They achieve good performances when the point spread function (PSF) is spatially invariable in the image plane. However, this latter condition is not always satisfied with real optical systems. PSF angular variations cannot be evaluated directly from the observations, neither be corrected at a pixel resolution. We have developed a method for the restoration of images affected by static and anisotropic aberrations using deep neural networks that can be directly applied to sky images. The network is trained using simulated sky images corresponding to the T-80 telescope optical system, an 80 cm survey imager at Cerro Tololo (Chile), which are synthesized using a Zernike polynomial representation of the optical system. Once trained, the network can be used directly on sky images, outputting a corrected version of the image, which has a constant and known PSF across its field-of-view. The method was tested with the T-80 telescope, achieving better results than with PSF deconvolution techniques. We present the method and results on this telescope.Keywords: aberrations, deep neural networks, image restoration, variable point spread function, wide field images
Procedia PDF Downloads 1362241 Climate Change and the Invasive Alien Species of Western Himalayan State of India
Authors: Yashasvi Thakur, Vikas K. Sharma
Abstract:
The fragile Himalayan ecosystems are sensitive to environmental stresses, including direct and indirect impacts of climate stresses. A total of 297 naturalized alien plant species belonging to 65 families in the IHR have already been reported. Of the total 297 naturalized alien plant species in IHR, the maximum species occur in Himachal Pradesh (232; 78.1%), followed by Jammu & Kashmir (192; 64.6%) and Uttarakhand (181; 60.90%). The present study reports the spread of some invasive and existing weed species like Ageratum conyzoides, Bidens pilosa, Chromolaena odorata, Lantana camara, Brossnetia papyrifera, Oxalis corniculata, Galinsoga parviflora, Panicum maximum at an extent that they are not only invading the agricultural fields but are also replacing the native plant species and degrading the existing grassland quality. Moreover, the degradation of grassland has led to the dry fodder shortage for livestock in the lower Shivalik ranges of the state of Himachal Pradesh and has also encouraged the use of herbicides at an extensive scale. This article provides a mapping of the current spread of some of these species at the block level to allow the development of appropriate management strategies and policy planning for addressing issues pertaining to plant invasion, agricultural fields, and grasslands across the IHR states.Keywords: climate change, invasive alien species, agriculture, grassland, IHR
Procedia PDF Downloads 742240 Crossover Memories and Code-Switching in the Narratives of Arabic-Hebrew and Hebrew-English Bilingual Adults in Israel
Authors: Amani Jaber-Awida
Abstract:
This study examines two bilingual phenomena in the narratives of Arabic Hebrew and Hebrew-English bilingual adults in Israel: CO memories and code-switching (CS). The study examined these phenomena in the context of autobiographical memory, using a cue word technique. Student experimenters held two sessions in the homes of the participants. In separate language sessions, the participant was asked to look first at each of 16 cue words and then to state a concrete memory. After stating the memory, participants reported whether their memories were in the same language of the experiment session or different. Memories were classified as ‘Crossovers’ (CO) or ‘Same Language’ (SL) according to participants' self-reports. Participants were also required to elaborate about the setting, interlocutors and other languages involved in the specific memory. Beyond replicating the procedure of cuing technique, one memory from a specific lifespan period was chosen per participant, and the participant was required to provide further details about it. For the more detailed memories, CS count was conducted. Both bilingual groups confirmed the Reminiscence Bump phenomenon, retrieving more memories in the 10-30 age period. CO memories prevailed in second language sessions (L2). Same language memories were more abundant in first language sessions (L1). Higher CS frequency was found in L2 sessions. Finally, as predicted, 'individual' CS was prevalent in L2 sessions, but 'community-based' CS was not higher in L1 sessions. The two bilingual measures in this study, crossovers, and CS came from different research traditions, the former from an experimental paradigm in the psychology of autobiographical memory based on self-reported judgments, the latter a behavioral measure from linguistics. This merger of approaches offers new insight into the field of bilingual autobiographical memory. In addition, the study attempted to shed light on the investigation of motivations for CS, beginning with Walters’ SPPL Model and concluding with a distinction between ‘community-based’ and individual motivations.Keywords: bilinguals, code-switching, crossover memories, narratives
Procedia PDF Downloads 1722239 Calculating of the Heat Exchange in a Rotating Pipe: Application to the Cooling of Turbine Blades
Authors: A. Miloud
Abstract:
In this work, the results of numerical simulations of the turbulent flow with 3D heat transfer are presented for the case of two U-shaped channels and rotating rectangular section. The purpose of this investigation was to study the effect of the corrugated walls of the heated portion on the improved cooling, in particular the influence of the wavelength. The calculations were performed for a Reynolds number ranging from 10 000 to 100 000, two values of the number of rotation (Ro = 0.0 to 0.14) and a ratio of the restricted density to 0.13. In these simulations, ANSYS FLUENT code was used to solve the Reynolds equations expressing relations between different fields averaged variables over time. Model performance k-omega SST model and RSM are evaluated through a comparison of the numerical results for each model and the experimental and numerical data available. In this work, detailed average temperature predictions, the scope of the secondary flow and distributions of local Nusselt are presented. It turns out that the corrugated configuration further urges the heat exchange provided to reduce the velocity of the coolant inside the channel.Keywords: cooling blades, corrugated walls, model k-omega SST and RSM, fluent code, rotation effect
Procedia PDF Downloads 2512238 Knowledge, Attitude, and Practice Regarding Standard Precautions in Medical Students of Rawalpindi Medical University, Pakistan; A Cross-Sectional Descriptive Study
Authors: Zainab Idrees Ahmad, Mahjabeen Qureshi, Zainab Hussain
Abstract:
Standard precautions are a set of infection control practices used to prevent the transmission of diseases that can be acquired by contact with body fluids, non-intact skin, and mucous membranes. Lack of practice of SPs can result in a considerable increase in morbidity and mortality rates. Medical students (the future physicians) should have the highest knowledge of standard precautions to prevent the spread of nosocomial infections and ensure their safety as well. This study was designed. To assess the knowledge of medical students regarding standard precautions. And explore the attitude of medical students of MBBS in the third, fourth and final year towards standard precautions.: A descriptive cross-sectional study was conducted in the setting of Rawalpindi Medical University, Pakistan including the students of MBBS in their 3rd, 4th and final years. The study duration was from October 2022 to February 2023. The sample size calculated was 282 with a confidence interval of 95%. A questionnaire was structured utilizing the WHO guidelines on SPs assessing knowledge and attitude regarding hand hygiene, needle stick injury, use of gloves and mask, and sharp disposal. A total of 300 responses were received utilizing the technique of non-random convenience sampling. Data was analyzed using the latest version of SPSS.:Knowledge score regarding components of SPs, hand hygiene, and moments of hand hygiene was satisfactory. However, score regarding the use of PPE, needle stick injury, and sharp disposal was low. Almost all the students were compliant with the proper washing of hands but the observation of recommended time length was lacking. Compliance with the use of correct PPE and informing the supervisor upon getting a needle stick injury was low. This study signifies that medical students lack knowledge regarding standard precautions. This is alarming as this can be the vehicle for the spread of nosocomial infections. Proper training should be given to medical students to prevent the spread of hospital-acquired infections.Keywords: attitude, knowledge, medical students, standard precautions
Procedia PDF Downloads 1272237 A High Compression Ratio for a Losseless Image Compression Based on the Arithmetic Coding with the Sorted Run Length Coding: Meteosat Second Generation Image Compression
Authors: Cherifi Mehdi, Lahdir Mourad, Ameur Soltane
Abstract:
Image compression is the heart of several multimedia techniques. It is used to reduce the number of bits required to represent an image. Meteosat Second Generation (MSG) satellite allows the acquisition of 12 image files every 15 minutes and that results in a large databases sizes. In this paper, a novel image compression method based on the arithmetic coding with the sorted Run Length Coding (SRLC) for MSG images is proposed. The SRLC allows us to find the occurrence of the consecutive pixels of the original image to create a sorted run. The arithmetic coding allows the encoding of the sorted data of the previous stage to retrieve a unique code word that represents a binary code stream in the sorted order to boost the compression ratio. Through this article, we show that our method can perform the best results concerning compression ratio and bit rate unlike the method based on the Run Length Coding (RLC) and the arithmetic coding. Evaluation criteria like the compression ratio and the bit rate allow the confirmation of the efficiency of our method of image compression.Keywords: image compression, arithmetic coding, Run Length Coding, RLC, Sorted Run Length Coding, SRLC, Meteosat Second Generation, MSG
Procedia PDF Downloads 3542236 A Comprehensive Model of Professional Ethics Based on the Teachings of the Holy Quran
Authors: Zahra Mohagheghian, Fatema Agharebparast
Abstract:
Professional ethic is a subject that has been an issue today, so most of the businesses, including the teaching profession, understand the need and importance of it. So they need to develop a code of professional ethics for their own. In this regard, this study seeks to answer the question, with respect to the integrity of the Qur'an (Nahl / 89), is it possible to contemplate the divine teachers conduct to extract the divine pattern for teaching and training? In the code of conduct for divine teachers what are the most important moral obligations and duties of the teaching professionals? The results of this study show that the teaching of Khidr, according to the Quran’s verses, Abundant and subtle hints emphasized that it can be as comprehensive and divine pattern used in teaching and in the drafting of the charter of professional ethics of teachers used it. Also, the results show that in there have been many ethical principles in prophet Khidr’s teaching pattern.The most important ethical principles include: Student assessment, using objective and not subjective examples, assessment during teaching, flexibility, and others. According to each of these principles can help teachers achieve their educational goals and lead human being in their path toward spiritual evaluation.Keywords: professional ethics, teaching-learning process, teacher, student, Quran
Procedia PDF Downloads 2982235 Study on Shape Coefficient of Large Statue Building Based on CFD
Authors: Wang Guangda, Ma Jun, Zhao Caiqi, Pan Rui
Abstract:
Wind load is the main control load of large statue structures. Due to the irregular plane and elevation and uneven outer contour, statues’ shape coefficient can not pick up from the current code. Currently a common practice is based on wind tunnel test. But this method is time-consuming and high cost. In this paper, based on the fundamental theory of CFD, using fluid dynamics software of Fluent 15.0, a few large statue structure of 40 to 70m high, which are located in china , including large fairy statues and large Buddha statues, are analyzed by numerical wind tunnel. The results are contrasted with the recommended values in load code and the wind tunnel test results respectively. Results show that the shape coefficient has a good reliability by the numerical wind tunnel method of this kind of building. This will has a certain reference value of wind load values for large statues’ structure.Keywords: large statue structure, shape coefficient, irregular structure, wind tunnel test, numerical wind tunnel simulation
Procedia PDF Downloads 3762234 Integrating Computational Thinking into Classroom Practice – A Case Study
Authors: Diane Vassallo., Leonard Busuttil
Abstract:
Recent educational developments have seen increasing attention attributed to Computational Thinking (CT) and its integration into primary and secondary school curricula. CT is more than simply being able to use technology but encompasses fundamental Computer Science concepts which are deemed to be very important in developing the correct mindset for our future digital citizens. The case study presented in this article explores the journey of a Maltese secondary school teacher in his efforts to plan, develop and integrate CT within the context of a local classroom. The teacher participant was recruited from the Malta EU Code week summer school, a pilot initiative that stemmed from the EU Code week Team’s Train the Trainer program. The qualitative methodology involved interviews with the participant teacher as well as an analysis of the artefacts created by the students during the lessons. The results shed light on the numerous challenges and obstacles that the teacher encountered in his integration of CT, as well as portray some brilliant examples of good practices which can substantially inform further research and practice around the integration of CT in classroom practice.Keywords: computational thinking, digital citizens, digital literacy, technology integration
Procedia PDF Downloads 1542233 Modelling and Management of Vegetal Pest Based On Case of Xylella Fastidiosa in Alicante
Authors: Maria Teresa Signes Pont, Jose Juan Cortes Plana
Abstract:
Our proposal provides suitable modelling to the spread of plant pest and particularly to the propagation of Xylella fastidiosa in the almond trees. We compared the impact of temperature and humidity on the propagation of Xylella fastidiosa in various subspecies. Comparison between Balearic Islands and Alicante (Spain). Most sharpshooter and spittlebug species showed peaks in population density during the month of higher mean temperature and relative humidity (April-October), except for the splittlebug Clastoptera sp.1, whose adult population peaked from September-October (late summer and early autumn). The critical season is from when they hatch from the eggs until they are in the pre-reproductive season (January -April) to expand. We focused on winters in the egg state, which normally hatches in early March. The nymphs secrete a foam (mucilage) in which they live and that protects them from natural enemies of temperature changes and prevents dry as long as the humidity is above 75%. The interaction between the life cycles of vectors and vegetation influences the food preferences of vectors and is responsible for the general seasonal shift of the population from vegetation to trees and vice versa, In addition to the temperature maps, we have observed humidity as it affects the spread of the pest Xylella fastidiosa (Xf).Keywords: xylella fastidiosa, almod tree, temperature, humidity, environmental model
Procedia PDF Downloads 1762232 A Framework for Blockchain Vulnerability Detection and Cybersecurity Education
Authors: Hongmei Chi
Abstract:
The Blockchain has become a necessity for many different societal industries and ordinary lives including cryptocurrency technology, supply chain, health care, public safety, education, etc. Therefore, training our future blockchain developers to know blockchain programming vulnerability and I.T. students' cyber security is in high demand. In this work, we propose a framework including learning modules and hands-on labs to guide future I.T. professionals towards developing secure blockchain programming habits and mitigating source code vulnerabilities at the early stages of the software development lifecycle following the concept of Secure Software Development Life Cycle (SSDLC). In this research, our goal is to make blockchain programmers and I.T. students aware of the vulnerabilities of blockchains. In summary, we develop a framework that will (1) improve students' skills and awareness of blockchain source code vulnerabilities, detection tools, and mitigation techniques (2) integrate concepts of blockchain vulnerabilities for IT students, (3) improve future IT workers’ ability to master the concepts of blockchain attacks.Keywords: software vulnerability detection, hands-on lab, static analysis tools, vulnerabilities, blockchain, active learning
Procedia PDF Downloads 1002231 Mathematical Model of the Spread of Herpes Simplex Virus Type-2 in Heterosexual Relations with and without Condom Usage in a College Population
Authors: Jacob A. Braun
Abstract:
This paper uses mathematical modeling to show the spread of Herpes Simplex type-2 with and without the usage of condoms in a college population. The model uses four differential equations to calculate the data for the simulation. The dt increment used is one week. It also runs based on a fixated period. The period chosen was five years to represent time spent in college. The average age of the individual is 21, once again to represent the age of someone in college. In the total population, there are almost two times as many women who have Herpes Simplex Type-2 as men. Additionally, Herpes Simplex Type-2 does not have a known cure. The goal of the model is to show how condom usage affects women’s chances of receiving the virus in the hope of being able to reduce the number of women infected. In the end, the model demonstrates that condoms offer significant protection to women from the virus. Since fewer women are infected with the virus when condoms are used, in turn, fewer males are infected. Since Herpes Simplex Type-2 affects the carrier for their whole life, a small decrease of infections could lead to large ramifications over time. Specifically, a small decrease of infections at a young age, such as college, could have a very big effect on the long-term number of people infected with the virus.Keywords: college, condom, Herpes, mathematical modelling
Procedia PDF Downloads 2162230 Control of a Plane Jet Spread by Tabs at the Nozzle Exit
Authors: Makito Sakai, Takahiro Kiwata, Takumi Awa, Hiroshi Teramoto, Takaaki Kono, Kuniaki Toyoda
Abstract:
Using experimental and numerical results, this paper describes the effects of tabs on the flow characteristics of a plane jet at comparatively low Reynolds numbers while focusing on the velocity field and the vortical structure. The flow visualization and velocity measurements were respectively carried out using laser Doppler velocimetry (LDV) and particle image velocimetry (PIV). In addition, three-dimensional (3D) plane jet numerical simulations were performed using ANSYS Fluent, a commercially available computational fluid dynamics (CFD) software application. We found that the spreads of jets perturbed by large delta tabs and round tabs were larger than those produced by the other tabs tested. Additionally, it was determined that a plane jet with square tabs had the smallest jet spread downstream, and the jet’s centerline velocity was larger than those of jets perturbed by the other tabs tested. It was also observed that the spanwise vortical structure of a plane jet with tabs disappeared completely. Good agreement was found between the experimental and numerical simulation velocity profiles in the area near the nozzle exit when the laminar flow model was used. However, we also found that large eddy simulation (LES) is better at predicting the developing flow field of a plane jet than the laminar and the standard k-ε turbulent models.Keywords: plane jet, flow control, tab, flow measurement, numerical simulation
Procedia PDF Downloads 3352229 A Sociolinguistic Study of the Outcomes of Arabic-French Contact in the Algerian Dialect Tlemcen Speech Community as a Case Study
Authors: R. Rahmoun-Mrabet
Abstract:
It is acknowledged that our style of speaking changes according to a wide range of variables such as gender, setting, the age of both the addresser and the addressee, the conversation topic, and the aim of the interaction. These differences in style are noticeable in monolingual and multilingual speech communities. Yet, they are more observable in speech communities where two or more codes coexist. The linguistic situation in Algeria reflects a state of bilingualism because of the coexistence of Arabic and French. Nevertheless, like all Arab countries, it is characterized by diglossia i.e. the concomitance of Modern Standard Arabic (MSA) and Algerian Arabic (AA), the former standing for the ‘high variety’ and the latter for the ‘low variety’. The two varieties are derived from the same source but are used to fulfil distinct functions that is, MSA is used in the domains of religion, literature, education and formal settings. AA, on the other hand, is used in informal settings, in everyday speech. French has strongly affected the Algerian language and culture because of the historical background of Algeria, thus, what can easily be noticed in Algeria is that everyday speech is characterized by code-switching from dialectal Arabic and French or by the use of borrowings. Tamazight is also very present in many regions of Algeria and is the mother tongue of many Algerians. Yet, it is not used in the west of Algeria, where the study has been conducted. The present work, which was directed in the speech community of Tlemcen-Algeria, aims at depicting some of the outcomes of the contact of Arabic with French such as code-switching, borrowing and interference. The question that has been asked is whether Algerians are aware of their use of borrowings or not. Three steps are followed in this research; the first one is to depict the sociolinguistic situation in Algeria and to describe the linguistic characteristics of the dialect of Tlemcen, which are specific to this city. The second one is concerned with data collection. Data have been collected from 57 informants who were given questionnaires and who have then been classified according to their age, gender and level of education. Information has also been collected through observation, and note taking. The third step is devoted to analysis. The results obtained reveal that most Algerians are aware of their use of borrowings. The present work clarifies how words are borrowed from French, and then adapted to Arabic. It also illustrates the way in which singular words inflect into plural. The results expose the main characteristics of borrowing as opposed to code-switching. The study also clarifies how interference occurs at the level of nouns, verbs and adjectives.Keywords: bilingualism, borrowing, code-switching, interference, language contact
Procedia PDF Downloads 2762228 Honour Killing in Iraqi Statutory Law
Authors: Hersh Azeez
Abstract:
Honour killing, also known as "honor killing," is a deeply rooted and complex social issue that persists in many parts of the world, including Iraq. This paper seeks to examine the legal framework surrounding honour killing in Iraqi statutory law. The paper begins with an introduction to honour killing as a phenomenon and its cultural and societal context in Iraq. It then delves into the methodology used in this research, including a comprehensive review of relevant legal texts, case studies, and scholarly articles. The paper analyzes the existing legal framework in Iraq, including relevant penal code provisions and other relevant legislation, as well as the challenges and shortcomings in addressing honour killing in the country. The research findings reveal that despite some legal provisions aimed at addressing honour killing, the practice continues to persist due to a lack of effective implementation, societal norms, and cultural attitudes. The paper concludes with recommendations for improving the legal framework to combat honour killing in Iraq, including legal reforms, education and awareness campaigns, and cultural change initiatives.Keywords: honour killing, Iraq, statutory law, legal framework, penal code, cultural norms
Procedia PDF Downloads 672227 Use of Oral Communication Strategies: A Study of Bangladeshi EFL Learners at the Graduate Level
Authors: Afroza Akhter Tina
Abstract:
This paper reports on an investigation into the use of specific types of oral communication strategies, namely ‘topic avoidance’, ‘message abandonment’, ‘code-switching’, ‘paraphrasing’, ‘restructuring’, and ‘stalling’ by Bangladeshi EFL learners at the graduate level. It chiefly considers the frequency of using these strategies as well as the students and teachers attitudes toward such uses. The participants of this study are 66 EFL students and 12 EFL teachers of Jahangirnagar University. Data was collected through questionnaire, oral interview, and classroom observation form. The findings reveal that the EFL students tried to employ all the strategies to various extents due to the language difficulties they encountered in their oral English performance. Among them, the mostly used strategy was ‘stalling’ or the use of fillers, followed by ‘code-switching’. The least used strategies were ‘topic avoidance’, ‘restructuring’, and ‘paraphrasing’. The findings indicate that the use of such strategies was related to the contexts of situation and data-elicitation tasks. It also reveals that the students were not formally trained to use the strategies though the majority of the teachers and students acknowledge them as helpful in communication. Finally the study suggests that an awareness of the nature and functions of these strategies can contribute to the overall improvement of the learners’ communicative competence in spoken English.Keywords: communicative strategies, competency, attitude, frequency
Procedia PDF Downloads 4102226 Manifestations of Moral Imagination during the COVID-19 Pandemic in the Debates of Lithuanian Parliament
Authors: Laima Zakaraite, Vaidas Morkevicius
Abstract:
The COVID-19 pandemic brought important and pressing challenges for politicians around the world. Governments, parliaments, and political leaders had to make quick decisions about containment of the pandemic, usually without clear knowledge about the factual spread of the virus, the possible expected speed of spread, and levels of mortality. Opinions of experts were also divided, as some advocated for ‘herd immunity’ without closing down the economy and public life, and others supported the idea of strict lockdown. The debates about measures of pandemic containment were heated and involved strong moral tensions with regard to the possible outcomes. This paper proposes to study the manifestations of moral imagination in the political debates regarding the COVID-19 pandemic. Importantly, moral imagination is associated with twofold abilities of a decision-making actor: the ability to discern the moral aspects embedded within a situation and the ability to envision a range of possibilities alternative solutions to the situation from a moral perspective. The concept was most thoroughly investigated in business management studies. However, its relevance for the study of political decision-making is also rather clear. The results of the study show to what extent politicians are able to discern the wide range of moral issues related to a situation (in this case, consequences of COVID-19 pandemic in a country) and how broad (especially, from a moral perspective) are discussions of the possible solutions proposed for solving the problem (situation). Arguably, political discussions and considerations are broader and affected by a wider and more varied range of actors and ideas compared to decision making in the business management sector. However, the debates and ensuing solutions may also be restricted by ideological maxims and advocacy of special interests. Therefore, empirical study of policy proposals and their debates might reveal the actual breadth of moral imagination in political discussions. For this purpose, we carried out the qualitative study of the parliamentary debates related to the COVID-19 pandemic in Lithuania during the first wave (containment of which was considered very successful) and at the beginning and consequent acceleration of the second wave (when the spread of the virus became uncontrollable).Keywords: decision making, moral imagination, political debates, political decision
Procedia PDF Downloads 1492225 The Right to State Lands: A Case Study of a Squatter Community in Egypt
Authors: Salwa Salman
Abstract:
On February 2016, Egypt’s President Abdel Fattah Al-Sisi ordered the former Prime Minister, Ibrahim Mehleb, to establish a committee responsible for retrieving looted state lands or providing squatters with land titles according to their individual cases. The specificity of desert lands emerges from its unique position in both Islamic law and Egypt’s Civil Code. In Egypt, desert lands can be transferred to private ownership through peaceful occupation and cultivation. This study explores the (re-) conceptualization of land rights, state territoriality, and sovereignty as a part of an emerging narrative on informal land tenure. Through the lens of an informal settlement, the study employs methodological insights from studies in the anthropology of development and their interpretation of Foucauldian discourse analysis to examine official representations on squatting over state lands and put them in conversation with individual narratives on land ownership and dispossession. It also employs Bruno Latour’s actor-network theory to explore the development of social networks through primary land contracts and informal local resource management.Keywords: State lands, squatter community, Islamic law, Egypt’s Civil Code
Procedia PDF Downloads 1722224 Case Study: The Impact of Creative Play on Children's Bilingualism
Authors: Mingxi Xiao
Abstract:
This case study focused on a bilingual child named Emma and her play. Emma was a four-year-old girl born in Australia while her parents were both Chinese. Emma could speak fluent English, while her Mandarin was not as good as her spoken English. With the research question to figure out whether creative play had an impact on children’s bilingualism, this case study mainly used the anecdotes method to observe Emma’s play and this report presented five observations of Emma, describing detailed information about her play and recording her language use. Based on Emma’s interests and daily activities, this case study chose her creative play for observation, which incorporates a whole range of activities from dancing to drawing, as well as playing instruments. From the five observations, it could be seen that Emma often mixed languages to help her express her meaning. It could be seen that Emma made an effort to use her bilingualism in her creative play. In other words, play encouraged Emma to use the two languages. In conclusion, the observations with Emma showed that although her Mandarin was not good enough, she displayed confidence in speaking both languages and had gradually shifted from mixing languages to code-switching. Recommendations were provided to support Emma’s bilingual abilities for further development in the end.Keywords: bilingual, case study, code-switching, creative play, early childhood
Procedia PDF Downloads 146