Search results for: context aware computing
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 7361

Search results for: context aware computing

1991 Constrains to Financial Engineering for Liquidity Management: A Multiple Case Study of Islamic Banks

Authors: Sadia Bibi, Karim Ullah

Abstract:

Islamic banks have excess liquidity, which needs proper management to earn a high rate of return on them to remain competitive. However, they lack assets-backed avenues and rely on a few sukuks, which led them to liquidity management issues. Financial engineering comes forward to innovate and develop instruments for the requisite financial problem. Still, they face many challenges, explored in the context of liquidity management in Islamic banks. The rigorous literature review shows that Shariah compliance, competition from the conventional banks, lack of sufficient instruments, derivatives are still not accepted as legitimate products, the inter-bank market being less developed, and no possibility of lender of last resort is the six significant constraints to financial engineering for liquidity management of Islamic banks. To further explore the problem, a multiple case study strategy is used to extend and develop the theory with the philosophical stance of social constructivism. Narrative in-depth interviews over the telephone are conducted with key personnel at treasury departments of selected banks. Data is segregated and displayed using NVivo 11 software, and the thematic analysis approach identifies themes related to the constraints. The exploration of further constraints to financial engineering for liquidity management of Islamic banks achieves the research aim. The theory is further developed by the addition of three more constraints to the theoretical framework, which are i) lack of skilled human resources, ii) lack of unified vision, and iii) lack of government support to the Islamic banks. These study findings are fruitful for the use of the government, regulatory authorities of the banking sector, the State Bank of Pakistan (Central Bank), and the product design & development division of Islamic banks to make the financial engineering process feasible and resolve liquidity management issues of Islamic banks.

Keywords: financial engineering, liquidity management, Islamic banks, shariah compliance

Procedia PDF Downloads 84
1990 Cognitive Behaviour Drama: A Research-Based Intervention Model to Improve Social Thinking in High-Functioning Children with Autism

Authors: Haris Karnezi, Kevin Tierney

Abstract:

Cognitive Behaviour Drama is a research-based intervention model that brought together the science of psychology with the art form of drama to create an unobtrusive and exciting approach that would provide children on the higher end of the autism spectrum the motivation to explore the rules of social interaction and develop competencies associated with communicative success. The method involves engaging the participants in exciting fictional scenarios and encouraging them to seek various solutions on a number of problems that will lead them to an understanding of causal relationships and how a different course of action may lead to a different outcome. The sessions are structured to offer opportunities to the participants to practice target behaviours and understand the functions they serve. The study involved six separate interventions and employed both single case and group designs. Overall 8 children aged between 6 to 13 years, diagnosed with ASD participated in the study. Outcomes were measured using theory of mind tests, executive functioning tests, behavioural observations, pre and post intervention standardised social competence questionnaires for parents and teachers. Collectively, the results indicated positive changes in the self esteem and behaviour of all eight participants. In particular, improvements in the ability to solve theory of mind tasks were noted in the younger group; and qualitative improvements in social communication, in terms of verbal (content) and non verbal expression (body posture, vocal expression, fluency, eye contact, reduction of ritualistic mannerisms) were noted in the older group. The need for reliable impact measures to assess the effectiveness of the model in generating global changes in the participants’ behaviour outside the therapeutic context was identified.

Keywords: autism, drama, intervention, social skills

Procedia PDF Downloads 161
1989 Conservation Planning of Paris Polyphylla Smith, an Important Medicinal Herb of the Indian Himalayan Region Using Predictive Distribution Modelling

Authors: Mohd Tariq, Shyamal K. Nandi, Indra D. Bhatt

Abstract:

Paris polyphylla Smith (Family- Liliaceae; English name-Love apple: Local name- Satuwa) is an important folk medicinal herb of the Indian subcontinent, being a source of number of bioactive compounds for drug formulation. The rhizomes are widely used as antihelmintic, antispasmodic, digestive stomachic, expectorant and vermifuge, antimicrobial, anti-inflammatory, heart and vascular malady, anti-fertility and sedative. Keeping in view of this, the species is being constantly removed from nature for trade and various pharmaceuticals purpose, as a result, the availability of the species in its natural habitat is decreasing. In this context, it would be pertinent to conserve this species and reintroduce them in its natural habitat. Predictive distribution modelling of this species was performed in Western Himalayan Region. One such recent method is Ecological Niche Modelling, also popularly known as Species distribution modelling, which uses computer algorithms to generate predictive maps of species distributions in a geographic space by correlating the point distributional data with a set of environmental raster data. In case of P. polyphylla, and to understand its potential distribution zones and setting up of artificial introductions, or selecting conservation sites, and conservation and management of their native habitat. Among the different districts of Uttarakhand (28°05ˈ-31°25ˈ N and 77°45ˈ-81°45ˈ E) Uttarkashi, Rudraprayag, Chamoli, Pauri Garhwal and some parts of Bageshwar, 'Maximum Entropy' (Maxent) has predicted wider potential distribution of P. polyphylla Smith. Distribution of P. polyphylla is mainly governed by Precipitation of Driest Quarter and Mean Diurnal Range i.e., 27.08% and 18.99% respectively which indicates that humidity (27%) and average temperature (19°C) might be suitable for better growth of Paris polyphylla.

Keywords: biodiversity conservation, Indian Himalayan region, Paris polyphylla, predictive distribution modelling

Procedia PDF Downloads 330
1988 Teaching Food Discourse in Cross-Cultural Communication Lectures at University

Authors: Sanjar Davronov

Abstract:

Linguistic research of food discourse helps to analyze gastronomic picture of the world which plays important role in cross-cultural communications. 20 hours lecture can’t provide broad knowledge about national picture of the world of native speakers whose language being studied by future translator students. This abstract analyses how to research food discourse in “Cross-cultural (or lingvo-cultural) communication” lectures for ESL students. During compare Uzbek and American national meals, we found some specific features of food names in both countries. For example: If names of food includes advertising character in USA restaurant menus like: New York strip Sirloin crowned with Fresh – squeezed orange and lemon with a hint of garlic; Uzbek meals names are too simple, short and force general afford in underlining action – preparation process like: “Dimlama” (dimla(verb-to stew)+ma(suffix of past perfect like- stew- stewed). “Qovurdoq” (qovur (verb- to fry)+ doq (suffix of adverb like “fried one”) but these are the most delicious and difficult in preparing national meals however it is heritage of national cuisine. There are also similarity between US and Uzbek food names which has geographical color - South African Lobster tail; Qashqadaryo tandiri (lamb prepared in “tandir” typical national oven with pine leafs in Qashkadarya region). Food for European people contains physical context more than spiritual but in Asian literature especially Uzbek food has some pragmatic stuff: salt and bread (associates with hospitality and humanity), don’t be faithlessness 40 for owners of house where you where a guest. We share some teaching techniques for food discourse analyzing lectures.

Keywords: cross-cultural communications, food discourse, ESL lectures, linguistic research

Procedia PDF Downloads 616
1987 Creating Database and Building 3D Geological Models: A Case Study on Bac Ai Pumped Storage Hydropower Project

Authors: Nguyen Chi Quang, Nguyen Duong Tri Nguyen

Abstract:

This article is the first step to research and outline the structure of the geotechnical database in the geological survey of a power project; in the context of this report creating the database that has been carried out for the Bac Ai pumped storage hydropower project. For the purpose of providing a method of organizing and storing geological and topographic survey data and experimental results in a spatial database, the RockWorks software is used to bring optimal efficiency in the process of exploiting, using, and analyzing data in service of the design work in the power engineering consulting. Three-dimensional (3D) geotechnical models are created from the survey data: such as stratigraphy, lithology, porosity, etc. The results of the 3D geotechnical model in the case of Bac Ai pumped storage hydropower project include six closely stacked stratigraphic formations by Horizons method, whereas modeling of engineering geological parameters is performed by geostatistical methods. The accuracy and reliability assessments are tested through error statistics, empirical evaluation, and expert methods. The three-dimensional model analysis allows better visualization of volumetric calculations, excavation and backfilling of the lake area, tunneling of power pipelines, and calculation of on-site construction material reserves. In general, the application of engineering geological modeling makes the design work more intuitive and comprehensive, helping construction designers better identify and offer the most optimal design solutions for the project. The database always ensures the update and synchronization, as well as enables 3D modeling of geological and topographic data to integrate with the designed data according to the building information modeling. This is also the base platform for BIM & GIS integration.

Keywords: database, engineering geology, 3D Model, RockWorks, Bac Ai pumped storage hydropower project

Procedia PDF Downloads 168
1986 Right Cerebellar Stroke with a Right Vertebral Artery Occlusion Following an Embolization of the Right Glomus Tympanicum Tumor

Authors: Naim Izet Kajtazi

Abstract:

Context: Although rare, glomus tumor (i.e., nonchromaffin chemodectomas and paragan¬gliomas) is the most common middle ear tumor, with female predominance. Pre-operative embolization is often required to devascularize the hypervascular tumor for better surgical outcomes. Process: A 35-year-old female presented with episodes of frequent dizziness, ear fullness, and right ear tinnitus for 12 months. Head imaging revealed a right glomus tympanicum tumor. She underwent pre-operative endovascular embolization of the glomus tympanicum tumor with surgical, cyanoacrylate-based glue. Immediately after the procedure, she developed drowsiness and severe pain in the right temporal region. Further investigations revealed a right cerebellar stroke in the posterior inferior cerebellar artery territory. She was treated with intravenous heparin, followed by one year of oral anticoagulation. With rehabilitation, she significantly recovered from her post embolization stroke. However, the tumor was resected at another institution. Ten years later, follow-up imaging indicated a gradual increase in the size of the glomus jugulare tumor, compressing the nearby critical vascular structures. She subsequently received radiation therapy to treat the residual tumor. Outcome: Currently, she has no neurological deficit, but her mild dizziness, right ear tinnitus, and hearing impairment persist. Relevance: This case highlights the complex nature of these tumors, which often bring challenges to the patients as well as treatment teams. The multi-disciplinary team approach is necessary to tailor the management plan for individual tumors. Although embolization is a safe procedure, careful attention and thoughtful anatomic knowledge regarding dangerous anastomosis are essential to avoid devastating complications. Complications occur due to encountered vessel anomalies and new anastomoses formed during the gluing and changes in hemodynamics.

Keywords: stroke, embolization, MRI brain, cerebral angiogram

Procedia PDF Downloads 71
1985 From Restraint to Obligation: The Protection of the Environment in Times of Armed Conflict

Authors: Aaron Walayat

Abstract:

Protection of the environment in international law has been one of the most developed in the context of international humanitarian law. This paper examines the history of the protection of the environment in times of armed conflict, beginning with the traditional notion of restraint observed in antiquity towards the obligation to protect the environment, examining the treaties and agreements, both binding and non-binding which have contributed to environmental protection in war. The paper begins with a discussion of the ancient concept of restraint. This section examines the social norms in favor of protection of the environment as observed in the Bible, Greco-Roman mythology, and even more contemporary literature. The study of the traditional rejection of total war establishes the social foundation on which the current legal regime has stemmed. The paper then studies the principle of restraint as codified in international humanitarian law. It mainly examines Additional Protocol I of the Geneva Convention of 1949 and existing international law concerning civilian objects and the principles of international humanitarian law in the classification between civilian objects and military objectives. The paper then explores the environment’s classification as both a military objective and as a civilian object as well as explores arguments in favor of the classification of the whole environment as a civilian object. The paper will then discuss the current legal regime surrounding the protection of the environment, discussing some declarations and conventions including the 1868 Declaration of St. Petersburg, the 1907 Hague Convention No. IV, the Geneva Conventions, and the 1976 Environmental Modification Convention. The paper concludes with the outline noting the movement from codification of the principles of restraint into the various treaties, agreements, and declarations of the current regime of international humanitarian law. This paper provides an analysis of the history and significance of the relationship between international humanitarian law as a major contributor to the growing field of international environmental law.

Keywords: armed conflict, environment, legal regime, restraint

Procedia PDF Downloads 204
1984 Electromagnetic Modeling of a MESFET Transistor Using the Moments Method Combined with Generalised Equivalent Circuit Method

Authors: Takoua Soltani, Imen Soltani, Taoufik Aguili

Abstract:

The communications' and radar systems' demands give rise to new developments in the domain of active integrated antennas (AIA) and arrays. The main advantages of AIA arrays are the simplicity of fabrication, low cost of manufacturing, and the combination between free space power and the scanner without a phase shifter. The integrated active antenna modeling is the coupling between the electromagnetic model and the transport model that will be affected in the high frequencies. Global modeling of active circuits is important for simulating EM coupling, interaction between active devices and the EM waves, and the effects of EM radiation on active and passive components. The current review focuses on the modeling of the active element which is a MESFET transistor immersed in a rectangular waveguide. The proposed EM analysis is based on the Method of Moments combined with the Generalised Equivalent Circuit method (MOM-GEC). The Method of Moments which is the most common and powerful software as numerical techniques have been used in resolving the electromagnetic problems. In the class of numerical techniques, MOM is the dominant technique in solving of Maxwell and Transport’s integral equations for an active integrated antenna. In this situation, the equivalent circuit is introduced to the development of an integral method formulation based on the transposition of field problems in a Generalised equivalent circuit that is simpler to treat. The method of Generalised Equivalent Circuit (MGEC) was suggested in order to represent integral equations circuits that describe the unknown electromagnetic boundary conditions. The equivalent circuit presents a true electric image of the studied structures for describing the discontinuity and its environment. The aim of our developed method is to investigate the antenna parameters such as the input impedance and the current density distribution and the electric field distribution. In this work, we propose a global EM modeling of the MESFET AsGa transistor using an integral method. We will begin by describing the modeling structure that allows defining an equivalent EM scheme translating the electromagnetic equations considered. Secondly, the projection of these equations on common-type test functions leads to a linear matrix equation where the unknown variable represents the amplitudes of the current density. Solving this equation resulted in providing the input impedance, the distribution of the current density and the electric field distribution. From electromagnetic calculations, we were able to present the convergence of input impedance for different test function number as a function of the guide mode numbers. This paper presents a pilot study to find the answer to map out the variation of the existing current evaluated by the MOM-GEC. The essential improvement of our method is reducing computing time and memory requirements in order to provide a sufficient global model of the MESFET transistor.

Keywords: active integrated antenna, current density, input impedance, MESFET transistor, MOM-GEC method

Procedia PDF Downloads 198
1983 Beliefs and Rituals among the Urak Lawoi Sea Gypsies in the Bulon Archipelago, Satun Province

Authors: Srisuporn Piyaratanawong, Suchai Assawapantanakul

Abstract:

This study aims to reflect changes in beliefs and rituals among the Urak Lawoi sea gypsies on the Bulon archipelago of Satun Province that are related to changes of society according to each dimension of time. The historical study was conducted using an oral history approach. The study found that the traditional way of life as itinerants who moved seasonally resulted in their dependence on nature and beliefs in supernatural power, and mysterious powers and superstitions in the belief of ghosts, ancestors, guardian spirits, large banyan trees, life and living, treatment of diseases, king of nagas, and other beliefs. They displayed their respect to supernatural powers through rituals by worshiping, making offerings to spirits and performing Rongeng dance for spirits in return for fulfilling their vows. After World War II (1945), the Urak Lawoi sea gypsies on Bulon archipelago changed their itinerant way of life to permanent settlements. However, their beliefs in supernatural powers and ritual performances remained in existence. Until 1987, when tourism began to spread to the archipelago, some of them gradually turned to make a living with tourism. Moreover, during the last 20 years (from around 1994), Islam has spread among the people. With this social context, the traditional beliefs in supernatural powers have changed to beliefs according to the religion and the way of life that has changed. Thus, when the traditional beliefs and rituals can no longer fulfil the new way of life, they slowly disappear, such as the floating the boat ceremony that has been replaced with new beliefs and rituals according to Islam. Nevertheless, some beliefs and rituals still exist, such as beliefs about treatment of diseases and Rongeng dance for spirits in return for vow fulfilling. In conclusion, the traditional beliefs and rituals of the Urak Lawoi sea gypsies on the Bulon archipelago cannot fulfil the new way of life, and have, thus, brought about changes in beliefs and rituals that are congruent with the current society.

Keywords: belief, ritual, Urak Lawoi, sea gypsy, Bulon Archipelago

Procedia PDF Downloads 279
1982 How Vernacular Attributes of Traditional Buildings Can Be Integrated Into Modern Designs - A Case Study of Thirumayilai, Mylapore

Authors: Divya Ramaseshan

Abstract:

The indigenous beauty of a space supported by its local context is unmatchable. India, known to be a hub for varied cultural significance, has one of the best uses of vernacularism. This paper focuses on the traditional houses present in Thirumayilai, Mylapore, one of the oldest and most populous cities in Chennai. The Mylapore houses are known for their Agraharam style with thinnai, courtyard, and sloping roof characteristics. These homes had a combined influence of Indian, Islamic as well as Neo-classical architecture in their design. The design of the houses reflects the lives of Brahmin communities which have almost vanished from sight now. According to the growing demands of local residents as well as urbanization, many houses have been renovated. Some of those structures have been conserved in certain streets showcasing their historical identity. Other structures have either been demolished or redesigned based on people’s needs. Those structures have been identified and studied to understand the comparative features that have been changed. Many of those were in direct relevance to the city’s climate, family size, socializing habits, and local materials. Being a temple town, Mylapore has contour variations sloping towards various water bodies. These factors have been considered for building homes as well. The study aims to list down the possible design guidelines that could be effective in today’s construction field. The pros and cons are analyzed, and the respective methodologies are framed. Our modern construction technologies have brought in the best visual aesthetics in a short frame of time, but the serene touch of teak wood, walking through paved stones, daydreaming in the sunlit courtyards, and chitchatting in porticos are always cherished. Architects around the world are trying hard to achieve such appreciated design elements in upcoming projects with the best use of modern technology. This will also improvise people’s mental health in the comfort of their homes.

Keywords: Agraharam, Mylapore, traditional, vernacularism

Procedia PDF Downloads 102
1981 Meet Automotive Software Safety and Security Standards Expectations More Quickly

Authors: Jean-François Pouilly

Abstract:

This study addresses the growing complexity of embedded systems and the critical need for secure, reliable software. Traditional cybersecurity testing methods, often conducted late in the development cycle, struggle to keep pace. This talk explores how formal methods, integrated with advanced analysis tools, empower C/C++ developers to 1) Proactively address vulnerabilities and bugs, which includes formal methods and abstract interpretation techniques to identify potential weaknesses early in the development process, reducing the reliance on penetration and fuzz testing in later stages. 2) Streamline development by focusing on bugs that matter, with close to no false positives and catching flaws earlier, the need for rework and retesting is minimized, leading to faster development cycles, improved efficiency and cost savings. 3) Enhance software dependability which includes combining static analysis using abstract interpretation with full context sensitivity, with hardware memory awareness allows for a more comprehensive understanding of potential vulnerabilities, leading to more dependable and secure software. This approach aligns with industry best practices (ISO2626 or ISO 21434) and empowers C/C++ developers to deliver robust, secure embedded systems that meet the demands of today's and tomorrow's applications. We will illustrate this approach with the TrustInSoft analyzer to show how it accelerates verification for complex cases, reduces user fatigue, and improves developer efficiency, cost-effectiveness, and software cybersecurity. In summary, integrating formal methods and sound Analyzers enhances software reliability and cybersecurity, streamlining development in an increasingly complex environment.

Keywords: safety, cybersecurity, ISO26262, ISO24434, formal methods

Procedia PDF Downloads 19
1980 Social Sustainability and Affordability of the Transitional Housing Scheme in Hong Kong

Authors: Tris Kee

Abstract:

This research investigates social sustainability factors in transitional housing projects and their impact on fostering healthy living environments that promote physical activity and social interaction for residents. Social sustainability is integral to individual health and well-being, as emphasized by Goal 11 of the 2030 Agenda for Sustainable Development, which highlights the importance of safe, affordable, and accessible transport systems, green spaces, and public spaces catering to vulnerable populations' needs. Communal spaces in urban environments are essential for fostering social sustainability, as they serve as settings for physical activities and social interactions among diverse socio-economic groups. Factors such as neighborhood social atmosphere, historical context, social disparity, and mobility can influence the relationship between existing and transitional communities. Mental health effects can be measured through housing segregation, mobility and accessibility, and housing tenure. A significant research gap exists in understanding the living environment of transitional housing in Hong Kong and the social sustainability factors affecting residents' mental and physical health. To address this gap, our study employs a mixed-methods approach combining survey questionnaires and interviews to gather both quantitative and qualitative data. This methodology will provide comprehensive insights into residents' experiences and perceptions. Our research's main contribution is identifying key social sustainability factors in transitional housing and their impact on residents' well-being, informing policy-making and the creation of inclusive, healthy living environments. By addressing this research gap, we aim to provide valuable insights for future housing projects, ultimately promoting the development of socially sustainable transitional communities.

Keywords: social sustainablity, affordable housing, transitional housing, high density housing

Procedia PDF Downloads 88
1979 Cybersecurity for Digital Twins in the Built Environment: Research Landscape, Industry Attitudes and Future Direction

Authors: Kaznah Alshammari, Thomas Beach, Yacine Rezgui

Abstract:

Technological advances in the construction sector are helping to make smart cities a reality by means of cyber-physical systems (CPS). CPS integrate information and the physical world through the use of information communication technologies (ICT). An increasingly common goal in the built environment is to integrate building information models (BIM) with the Internet of Things (IoT) and sensor technologies using CPS. Future advances could see the adoption of digital twins, creating new opportunities for CPS using monitoring, simulation, and optimisation technologies. However, researchers often fail to fully consider the security implications. To date, it is not widely possible to assimilate BIM data and cybersecurity concepts, and, therefore, security has thus far been overlooked. This paper reviews the empirical literature concerning IoT applications in the built environment and discusses real-world applications of the IoT intended to enhance construction practices, people’s lives and bolster cybersecurity. Specifically, this research addresses two research questions: (a) how suitable are the current IoT and CPS security stacks to address the cybersecurity threats facing digital twins in the context of smart buildings and districts? and (b) what are the current obstacles to tackling cybersecurity threats to the built environment CPS? To answer these questions, this paper reviews the current state-of-the-art research concerning digital twins in the built environment, the IoT, BIM, urban cities, and cybersecurity. The results of these findings of this study confirmed the importance of using digital twins in both IoT and BIM. Also, eight reference zones across Europe have gained special recognition for their contributions to the advancement of IoT science. Therefore, this paper evaluates the use of digital twins in CPS to arrive at recommendations for expanding BIM specifications to facilitate IoT compliance, bolster cybersecurity and integrate digital twin and city standards in the smart cities of the future.

Keywords: BIM, cybersecurity, digital twins, IoT, urban cities

Procedia PDF Downloads 169
1978 Efficient Computer-Aided Design-Based Multilevel Optimization of the LS89

Authors: A. Chatel, I. S. Torreguitart, T. Verstraete

Abstract:

The paper deals with a single point optimization of the LS89 turbine using an adjoint optimization and defining the design variables within a CAD system. The advantage of including the CAD model in the design system is that higher level constraints can be imposed on the shape, allowing the optimized model or component to be manufactured. However, CAD-based approaches restrict the design space compared to node-based approaches where every node is free to move. In order to preserve a rich design space, we develop a methodology to refine the CAD model during the optimization and to create the best parameterization to use at each time. This study presents a methodology to progressively refine the design space, which combines parametric effectiveness with a differential evolutionary algorithm in order to create an optimal parameterization. In this manuscript, we show that by doing the parameterization at the CAD level, we can impose higher level constraints on the shape, such as the axial chord length, the trailing edge radius and G2 geometric continuity between the suction side and pressure side at the leading edge. Additionally, the adjoint sensitivities are filtered out and only smooth shapes are produced during the optimization process. The use of algorithmic differentiation for the CAD kernel and grid generator allows computing the grid sensitivities to machine accuracy and avoid the limited arithmetic precision and the truncation error of finite differences. Then, the parametric effectiveness is computed to rate the ability of a set of CAD design parameters to produce the design shape change dictated by the adjoint sensitivities. During the optimization process, the design space is progressively enlarged using the knot insertion algorithm which allows introducing new control points whilst preserving the initial shape. The position of the inserted knots is generally assumed. However, this assumption can hinder the creation of better parameterizations that would allow producing more localized shape changes where the adjoint sensitivities dictate. To address this, we propose using a differential evolutionary algorithm to maximize the parametric effectiveness by optimizing the location of the inserted knots. This allows the optimizer to gradually explore larger design spaces and to use an optimal CAD-based parameterization during the course of the optimization. The method is tested on the LS89 turbine cascade and large aerodynamic improvements in the entropy generation are achieved whilst keeping the exit flow angle fixed. The trailing edge and axial chord length, which are kept fixed as manufacturing constraints. The optimization results show that the multilevel optimizations were more efficient than the single level optimization, even though they used the same number of design variables at the end of the multilevel optimizations. Furthermore, the multilevel optimization where the parameterization is created using the optimal knot positions results in a more efficient strategy to reach a better optimum than the multilevel optimization where the position of the knots is arbitrarily assumed.

Keywords: adjoint, CAD, knots, multilevel, optimization, parametric effectiveness

Procedia PDF Downloads 110
1977 Understanding the Interactive Nature in Auditory Recognition of Phonological/Grammatical/Semantic Errors at the Sentence Level: An Investigation Based upon Japanese EFL Learners’ Self-Evaluation and Actual Language Performance

Authors: Hirokatsu Kawashima

Abstract:

One important element of teaching/learning listening is intensive listening such as listening for precise sounds, words, grammatical, and semantic units. Several classroom-based investigations have been conducted to explore the usefulness of auditory recognition of phonological, grammatical and semantic errors in such a context. The current study reports the results of one such investigation, which targeted auditory recognition of phonological, grammatical, and semantic errors at the sentence level. 56 Japanese EFL learners participated in this investigation, in which their recognition performance of phonological, grammatical and semantic errors was measured on a 9-point scale by learners’ self-evaluation from the perspective of 1) two types of similar English sound (vowel and consonant minimal pair words), 2) two types of sentence word order (verb phrase-based and noun phrase-based word orders), and 3) two types of semantic consistency (verb-purpose and verb-place agreements), respectively, and their general listening proficiency was examined using standardized tests. A number of findings have been made about the interactive relationships between the three types of auditory error recognition and general listening proficiency. Analyses based on the OPLS (Orthogonal Projections to Latent Structure) regression model have disclosed, for example, that the three types of auditory error recognition are linked in a non-linear way: the highest explanatory power for general listening proficiency may be attained when quadratic interactions between auditory recognition of errors related to vowel minimal pair words and that of errors related to noun phrase-based word order are embraced (R2=.33, p=.01).

Keywords: auditory error recognition, intensive listening, interaction, investigation

Procedia PDF Downloads 513
1976 Macrocephaly-Cutis Marmorata Telangiectatica Congenita Associated with Epilepsy: Case Report

Authors: Atitallah Sofien, Bouyahia Olfa, Krifi Farah, Missaoui Nada, Ben Rabeh Rania, Yahyaoui Salem, Mazigh Sonia, Boukthir Samir

Abstract:

Introduction: Cutis marmorata telangiectatica congenita (CMTC) is a rare cutaneous vascular malformation. It most often appears at birth or during the first days of life. Its origin is still unknown. It associates a livedo with telangiectasias of diffuse or segmental topography. In rare cases, it can be associated with neurological disorders such as macrocephaly and, less frequently, with epilepsy. Methodology: We report a case of an infant with Macrocephaly- Cutis marmorata telangiectatica congenita syndrome associated with epilepsy. Results: This is the case of a one month and 15 days old female infant from a non-consanguineous marriage, admitted for a status epilepticus in the context of apyrexia. Infectious and metabolic causes had been eliminated. Physical examination had shown non-infiltrated and reticular livedoid erythematous patches affecting the left upper limb and atrophic on the back of the left hand. Cerebral magnetic resonance imaging (MRI) showed thin layers of bifrontal, temporal, and left parietal hygromas associated with the widening of the bifrontal subarachnoid spaces. The electroencephalogram showed a well-organized sleep tracing with a single right occipital paroxysmal abnormality. Antiepileptic treatment has been administered with good clinical evolution and regression of the skin lesion and a control electroencephalogram without abnormality. Conclusion: This observation illustrates an association of CMTC with both macrocephaly and epilepsy. This pathology, which is relatively benign and has a good prognosis, generally does not require treatment. However, a detailed examination must be carried out, and a follow-up plan must be put in place for each patient presenting with CMTC, given the risk of association with other abnormalities, which can be potentially serious.

Keywords: cutis marmorata telangiectatica congenita, macrocephaly, epilepsy, children

Procedia PDF Downloads 60
1975 Innovations and Challenges: Multimodal Learning in Cybersecurity

Authors: Tarek Saadawi, Rosario Gennaro, Jonathan Akeley

Abstract:

There is rapidly growing demand for professionals to fill positions in Cybersecurity. This is recognized as a national priority both by government agencies and the private sector. Cybersecurity is a very wide technical area which encompasses all measures that can be taken in an electronic system to prevent criminal or unauthorized use of data and resources. This requires defending computers, servers, networks, and their users from any kind of malicious attacks. The need to address this challenge has been recognized globally but is particularly acute in the New York metropolitan area, home to some of the largest financial institutions in the world, which are prime targets of cyberattacks. In New York State alone, there are currently around 57,000 jobs in the Cybersecurity industry, with more than 23,000 unfilled positions. The Cybersecurity Program at City College is a collaboration between the Departments of Computer Science and Electrical Engineering. In Fall 2020, The City College of New York matriculated its first students in theCybersecurity Master of Science program. The program was designed to fill gaps in the previous offerings and evolved out ofan established partnership with Facebook on Cybersecurity Education. City College has designed a program where courses, curricula, syllabi, materials, labs, etc., are developed in cooperation and coordination with industry whenever possible, ensuring that students graduating from the program will have the necessary background to seamlessly segue into industry jobs. The Cybersecurity Program has created multiple pathways for prospective students to obtain the necessary prerequisites to apply in order to build a more diverse student population. The program can also be pursued on a part-time basis which makes it available to working professionals. Since City College’s Cybersecurity M.S. program was established to equip students with the advanced technical skills needed to thrive in a high-demand, rapidly-evolving field, it incorporates a range of pedagogical formats. From its outset, the Cybersecurity program has sought to provide both the theoretical foundations necessary for meaningful work in the field along with labs and applied learning projects aligned with skillsets required by industry. The efforts have involved collaboration with outside organizations and with visiting professors designing new courses on topics such as Adversarial AI, Data Privacy, Secure Cloud Computing, and blockchain. Although the program was initially designed with a single asynchronous course in the curriculum with the rest of the classes designed to be offered in-person, the advent of the COVID-19 pandemic necessitated a move to fullyonline learning. The shift to online learning has provided lessons for future development by providing examples of some inherent advantages to the medium in addition to its drawbacks. This talk will address the structure of the newly-implemented Cybersecurity Master’s Program and discuss the innovations, challenges, and possible future directions.

Keywords: cybersecurity, new york, city college, graduate degree, master of science

Procedia PDF Downloads 147
1974 The Role of Social Media for the Movement of Modest Fashion in Indonesia

Authors: Siti Dewi Aisyah

Abstract:

Islamic Modest Fashion has become one of the emerging industries. It is said that social media has making a role in its development. From designers, hijabi bloggers and then instagrammers, they are often seen posting their everyday outfits. They want to combine their faith with cutting-edge fashion trend. Muslim consumers has become a potential targeted market due to the increasing of people wearing hijab. Muslim consumers are projected to spend $327 bilion on clothing by 2020. Indonesia, as the biggest Muslim majority country, has targeted to be The World’s Center for Muslim Fashion in the world as its national branding by 2020. This study will examine how social media especially Blog and Instagram can lead the movement of Islamic Modest Fashion in Indonesia, how it also brings consumer culture to hijabi and as the result it triggers Indonesia to brand itself and how all the elements in Indonesia including the designers, bloggers or instagrammers and also Indonesian Agency for Creative Economy together work to make its dream come true. This research will be conducted through interviews with several elements mentioned, and internet, blog, Instagram and Youtube analysis through visual analysis that also examine the semiotic meaning behind the picture that are posted by the people on the social media especially about the Islamic Modest Fashion trend. This research also contains a literature review of a diverse group of works on topics related to the study. This research will be examined through several theoretical frameworks including the study of social media, fashion culture and consumer culture. Fashion and consumer culture are also two main topics because fashion furthermore leads to consumer culture. The possible benefit of this research is to be a reference literature of Islamic Modest Fashion and social media’s role especially in an Indonesian context.

Keywords: blog, instagram, consumer culture, modest fashion, social media, visual analysis

Procedia PDF Downloads 367
1973 Legal Allocation of Risks: A Computational Analysis of Force Majeure Clauses

Authors: Farshad Ghodoosi

Abstract:

This article analyzes the effect of supervening events in contracts. Contracts serve an important function: allocation of risks. In spite of its importance, the case law and the doctrine are messy and inconsistent. This article provides a fresh look at excuse doctrines (i.e., force majeure, impracticability, impossibility, and frustration) with a focus on force majeure clauses. The article makes the following contributions: First, it furnishes a new conceptual and theoretical framework of excuse doctrines. By distilling the decisions, it shows that excuse doctrines rests on the triangle of control, foreseeability, and contract language. Second, it analyzes force majeure clauses used by S&P 500 companies to understand the stickiness and similarity of such clauses and the events they cover. Third, using computational and statistical tools, it analyzes US cases since 1810 in order to assess the weight given to the triangle of control, foreseeability, and contract language. It shows that the control factor plays an important role in force majeure analysis, while the contractual interpretation is the least important factor. The Article concludes that it is the standard for control -whether the supervening event is beyond the control of the party- that determines the outcome of cases in the force majeure context and not necessarily the contractual language. This article has important implications on COVID-19-related contractual cases. Unlike the prevailing narrative that it is the language of the force majeure clause that’s determinative, this article shows that the primarily focus of the inquiry will be on whether the effects of COVID-19 have been beyond the control of the promisee. Normatively, the Article suggests that the trifactor of control, foreseeability, and contractual language are not effective for allocation of legal risks in times of crises. It puts forward a novel approach to force majeure clauses whereby that the courts should instead focus on the degree to which parties have relied on (expected) performance, in particular during the time of crisis.

Keywords: contractual risks, force majeure clauses, foreseeability, control, contractual language, computational analysis

Procedia PDF Downloads 149
1972 The Soundscape of Contemporary Buddhist Music in Taiwan: Tzu Chi Vesak Ceremony

Authors: Sylvia Huang

Abstract:

Contemporary Buddhist music has been emerged at the new forms of large-scale public Buddhist ritual ceremonies that may involve up to 10,000 participants at a time. Since 2007, the Buddha’s Birthday ceremony (Sanskrit, Vesak) by the Buddhist Tzu Chi Foundation has being held at major cities in Taiwan and many affiliated Tzu Chi offices around the world. Analysis of this modern and technologically-dependent ceremony sheds new light on the significance of music in contemporary Buddhist ritual, and also on recently enhanced and increasingly intimate connections between music and Buddhism. Through extensive ethnographic research of ten years (2007-2017), the research explores how the form of contemporary Buddhist music relates to the role of music in participants’ experience of the ritual and the way in which they construct meaning. The theoretical approach draws on both ethnomusicology and Buddhist teachings, Dharma. As soundscape is defined as the entire sonic energy produced by a landscape, the concept of soundscape is utilised to examine the contemporary ritual music in the Tzu Chi Vesak ceremony. The analysis opens new territory in exploring how analysis of Buddhist music can benefit from incorporating Buddhist philosophy within the methodological approach. Main findings are: 1) music becomes a method for Buddhist understanding through a focus in particular on how the ceremonial program is followed by music, and 2) participants engage with each other and entrain with music in the Vesak ceremony. As Buddhist sounding, such as scripture reading, liturgical chanting, and ceremonial music singing, is a sonic epistemological knowing of the conditions in which Buddhism is practiced, experienced, and transmigrated, the research concludes by showing that studies of Buddhist music have the potential to reveal distinctively Buddhist concepts, meaning, and values. Certain principles of Buddhist philosophy are adopted within ethnomusicological analysis to further enhance understandings of the crucial function of music within such a ritual context. Finally, the contemporary Buddhist music performance in the ceremony is possessed as a means of direct access to the spiritual experience in Buddhism.

Keywords: buddhist music, Taiwan, soundscape, Vesak ceremony

Procedia PDF Downloads 137
1971 Cybersecurity Engineering BS Degree Curricula Design Framework and Assessment

Authors: Atma Sahu

Abstract:

After 9/11, there will only be cyberwars. The cyberwars increase in intensity the country's cybersecurity workforce's hiring and retention issues. Currently, many organizations have unfilled cybersecurity positions, and to a lesser degree, their cybersecurity teams are understaffed. Therefore, there is a critical need to develop a new program to help meet the market demand for cybersecurity engineers (CYSE) and personnel. Coppin State University in the United States was responsible for developing a cybersecurity engineering BS degree program. The CYSE curriculum design methodology consisted of three parts. First, the ACM Cross-Cutting Concepts standard's pervasive framework helped curriculum designers and students explore connections among the core courses' knowledge areas and reinforce the security mindset conveyed in them. Second, the core course context was created to assist students in resolving security issues in authentic cyber situations involving cyber security systems in various aspects of industrial work while adhering to the NIST standards framework. The last part of the CYSE curriculum design aspect was the institutional student learning outcomes (SLOs) integrated and aligned in content courses, representing more detailed outcomes and emphasizing what learners can do over merely what they know. The CYSE program's core courses express competencies and learning outcomes using action verbs from Bloom's Revised Taxonomy. This aspect of the CYSE BS degree program's design is based on these three pillars: the ACM, NIST, and SLO standards, which all CYSE curriculum designers should know. This unique CYSE curriculum design methodology will address how students and the CYSE program will be assessed and evaluated. It is also critical that educators, program managers, and students understand the importance of staying current in this fast-paced CYSE field.

Keywords: cyber security, cybersecurity engineering, systems engineering, NIST standards, physical systems

Procedia PDF Downloads 95
1970 Social Networking Application: What Is Their Quality and How Can They Be Adopted in Open Distance Learning Environments?

Authors: Asteria Nsamba

Abstract:

Social networking applications and tools have become compelling platforms for generating and sharing knowledge across the world. Social networking applications and tools refer to a variety of social media platforms which include Facebook, Twitter WhatsApp, blogs and Wikis. The most popular of these platforms are Facebook, with 2.41 billion active users on a monthly basis, followed by WhatsApp with 1.6 billion users and Twitter with 330 million users. These communication platforms have not only impacted social lives but have also impacted students’ learning, across different delivery modes in higher education: distance, conventional and blended learning modes. With this amount of interest in these platforms, knowledge sharing has gained importance within the context in which it is required. In open distance learning (ODL) contexts, social networking platforms can offer students and teachers the platform on which to create and share knowledge, and form learning collaborations. Thus, they can serve as support mechanisms to increase interactions and reduce isolation and loneliness inherent in ODL. Despite this potential and opportunity, research indicates that many ODL teachers are not inclined to using social media tools in learning. Although it is unclear why these tools are uncommon in these environments, concerns raised in the literature have indicated that many teachers have not mastered the art of teaching with technology. Using technological, pedagogical content knowledge (TPCK) and product quality theory, and Bloom’s Taxonomy as lenses, this paper is aimed at; firstly, assessing the quality of three social media applications: Facebook, Twitter and WhatsApp, in order to determine the extent to which they are suitable platforms for teaching and learning, in terms of content generation, information sharing and learning collaborations. Secondly, the paper demonstrates the application of teaching, learning and assessment using Bloom’s Taxonomy.

Keywords: distance education, quality, social networking tools, TPACK

Procedia PDF Downloads 124
1969 The Image of Saddam Hussein and Collective Memory: The Semiotics of Ba'ath Regime's Mural in Iraq (1980-2003)

Authors: Maryam Pirdehghan

Abstract:

During the Ba'ath Party's rule in Iraq, propaganda was utilized to justify and to promote Saddam Hussein's image in the collective memory as the greatest Arab leader. Consequently, urban walls were routinely covered with images of Saddam. Relying on these images, the regime aimed to provide a basis for evoking meanings in the public opinion, which would supposedly strengthen Saddam’s power and reconstruct facts to legitimize his political ideology. Nonetheless, Saddam was not always portrayed with common and explicit elements but in certain periods of his rule, the paintings depicted him in an unusual context, where various historical and contemporary elements were combined in a narrative background. Therefore, an understanding of the implied socio-political references of these elements is required to fully elucidate the impact of these images on forming the memory and collective unconscious of the Iraqi people. To obtain such understanding, one needs to address the following questions: a) How Saddam Hussein is portrayed in mural during his rule? b) What of elements and mythical-historical narratives are found in the paintings? c) Which Saddam's political views were subject to the collective memory through mural? Employing visual semiotics, this study reveals that during Saddam Hussein's regime, the paintings were initially simple portraits but gradually transformed into narrative images, characterized by a complex network of historical, mythical and religious elements. These elements demonstrate the transformation of a secular-nationalist politician into a Muslim ruler who tried to instill three major policies in domestic and international relations i.e. the arabization of Iraq, as well as the propagation of pan-arabism ideology (first period), the implementation of anti-Israel policy (second period) and the implementation of anti-American-British policy (last period).

Keywords: Ba'ath Party, Saddam Hussein, mural, Iraq, propaganda, collective memory

Procedia PDF Downloads 326
1968 The Effect of Diapirs on the Geometry and Evolution of the Ait Ourir Basin, High Atlas Mountains of Marrakesh, Morocco

Authors: Hadach Fatiha, Algouti Ahmed, Algouti Abdellah, Jdaba Naji, Es-Sarrar Othman, Mourabit Zahra

Abstract:

This paper investigates the structure and evolution of diapirism in the Ait Ourir basin, located in the High Atlas of Marrakesh, using structural and sedimentological fieldwork integrated with field mapping. A tectonic-sedimentological study of the Mesozoic cover of the Ait Ourir basin area revealed that these units were subjected to important saccadic halokinetic activity, reflected by anticline structures associated with regional faults that created several synclinal mini-basins. However, the lack of seismic coverage in the study area makes the proposed interpretation based on extrapolations of information observed on the surface. In this work, we suggest that faults and salt activity led to the formation of different structures within the studied area. The growth of the Triassic evaporites at different stages during the Mesozoic is reflected by progressive and local unconformities, recorded as having different ages. These structures created high diapiric zones with reduced sedimentation, showing abrupt lateral thickness variations in several places where this activity was occurring; this is clearly defined within the Wanina and Jbel Sour’s mini-basins, where the Senonian was observed to rest at an angular unconformity over the entire sedimentary cover encompassing the time period from the Liassic to the Turonian. The diapirism associated with the major faults, especially encountered between the basins, is often accompanied by late Triassic volcanic material. This diapir-fault relationship resulted in shallow and often depocentric zones in a pull-apart system within a distensive context.

Keywords: diapir, evaporites, faults, pull-apart, Mesozoic cover, Ait Ourir, western High Atlas, Morocco

Procedia PDF Downloads 71
1967 The Revenue Management Implementation and Its Complexity in the Airline Industry: An Empirical Study on the Egyptian Airline Industry

Authors: Amr Sultan, Sara Elgazzar, Breksal Elmiligy

Abstract:

The airline industry nowadays is becoming a more growing industry facing a severe competition. It is an influential issue in this context to utilize revenue management (RM) concept and practice in order to develop the pricing strategy. There is an unfathomable necessity for RM to assist the airlines and their associates to disparage the cost and recuperate their revenue, which in turn will boost the airline industry performance. The complexity of RM imposes enormous challenges on the airline industry. Several studies have been proposed on the RM adaptation in airlines industry while there is a limited availability of implementing RM and its complexity in the developing countries such as Egypt. This research represents a research schema about the implementation of the RM to the Egyptian airline industry. The research aims at investigating and demonstrating the complexities face implementing RM in the airline industry, up on which the research provides a comprehensive understanding of how to overcome these complexities while adapting RM in the Egyptian airline industry. An empirical study was conducted on the Egyptian airline sector based on a sample of four airlines (Egyptair, Britishair, KLM, and Lufthansa). The empirical study was conducted using a mix of qualitative and quantitative approaches. First, in-depth interviews were carried out to analyze the Egyptian airline sector status and the main challenges faced by the airlines. Then, a structured survey on the three different parties of airline industry; airlines, airfreight forwarders, and passengers were conducted in order to investigate the main complexity factors from different parties' points of view. Finally, a focus group was conducted to develop a best practice framework to overcome the complexities faced the RM adaptation in the Egyptian airline industry. The research provides an original contribution to knowledge by creating a framework to overcome the complexities and challenges in adapting RM in the airline industry generally and the Egyptian airline industry particularly. The framework can be used as a RM tool to increase the effectiveness and efficiency of the Egyptian airline industry performance.

Keywords: revenue management, airline industry, revenue management complexity, Egyptian airline industry

Procedia PDF Downloads 404
1966 Built-Own-Lease-Transfer (BOLT): “An Alternative Model to Subsidy Schemes in Public Private Partnership Projects”

Authors: Nirali Shukla, Neel Shah

Abstract:

The World Bank Institute (WBI) is undertaking a review of government interventions aimed at facilitating sustainable investment in public private partnerships (PPPs) in various under developed countries. The study presents best practice for applying financial model to make PPPs financially viable. The lessons presented here, if properly implemented, can help countries use limited funds to attract more private investment, get more infrastructure built and, as a result, achieve greater economic growth. The four countries Brazil, Colombia, Mexico, and India in total develop an average of nearly US$50 billion in PPPs per year. There are a range of policies and institutional arrangements governments use to provide subsidies to PPPs. For example, some countries have created dedicated agencies, or ‘funds’, capitalized with money from the national budget to manage and allocate subsidies. Other countries have established well-defined policies for appropriating subsidies on an ad hoc basis through an annual budget process. In this context, subsidies are direct fiscal contributions or grants paid by the government to a project when revenues from user fees are insufficient to cover all capital and operating costs while still providing private investors with a reasonable rate of return. Without subsidies, some infrastructure projects that would provide economic or social gains, but are not financially viable, would go undeveloped. But the Financial model of BOLT (PPP) model described in this study suggests that it is most feasible option rather than going for subsidy schemes for making infrastructure projects financially viable. The major advantage for implementing this model is the government money is saved and can be used for other projects as well as the private investors are getting better rate of return than subsidized schemes.

Keywords: PPP, BOLT, subsidy schemes, financial model

Procedia PDF Downloads 767
1965 Effective Environmental Planning Management (EPM) as Panacea to Sustainable Urban Development

Authors: Jegede Kehinde Jacob, Ola Akeem Bayonle, Adewale Yemi Yekeen

Abstract:

The rapid rate of urban growth in most developing countries of the world in recent times is alarming. Mass movement of people from rural areas to the urban centres, the consequence of the uncontrolled rapid urbanisation resulting to many un-conforming environmental challenges such as inadequate infrastructure, land, water and air pollution, poor environmental sanitation, poor and inadequate housing, urban degradation, sprawl and slums, urban violence, crime, robbery and prostitution as well as many other social vices that make the cities unsustainable. The resultant effects of all these are abysmal failure in the management of cities on the part of the governing authorities and other relevant stakeholders as well as unconducive and unwholesome condition of living of the people. This paper attempts to examine holistically the issue of environmental planning management (EPM) process development and management concept with a view for dynamic and interactive approach for various stakeholders as partners in achieving sustainable cities of our dream. The areas of discussion including conceptual and contextual issues, sustainable cities concept, good urban governance including literature review. The paper goes further to examine opportunities and challenges of built environment generally, the nature and context of environmental problems in particular, the role and duties of environmental planning and management (EPM) process in sustainable urban development. The paper further reviewed briefly the various levels of institutionalisation of EPM process with a typical case study of sustainable Ibadan project (SIP). The paper concludes with a list of recommendations to ensure effective and lasting solutions to cities problems through initiation of EPM process achievable in a sustainable manner.

Keywords: built environment, environmental planning, sustainable cities, sustainable development, urbanization

Procedia PDF Downloads 264
1964 Accountant Strategists Challenge the Dominant Business Model: A Strategy-as-Practice Perspective

Authors: Lindie Grebe

Abstract:

This paper reports on a study that explored the strategizing practices of professional accountants in the mining industry, based on Jarratt and Stiles’ dominant strategizing practice models framework. Drawing on a strategy-as-practice perspective, the paper recognises qualified professional accountants in strategic management such as Chief Executive Officers, as strategy practitioners that perform their strategizing practices and praxis within a specific context. The main findings of this paper were produced through semi-structured individual interviews with accountants that perform strategy on a business level in the South African mining industry. Qualitative data were analysed through conversation analysis over two coding-cycles. Findings describe accountant strategists as practitioners who challenge the dominant business model when a disconnect seems to exist between international corporate level strategy and business level strategy in the South African mining industry. Accountant strategy practitioners described their dominant strategizing practice model as incremental change during strategic planning and as a lived experience during strategy implementation. Findings portrayed these strategists as taking initiative as strategy leaders in a dynamic and volatile environment to combine their accounting background with strategic management and challenge the dominant business model. Understanding how accountant strategists perform strategizing offers insight into the social practice of strategic management. This understanding contributes to the body of knowledge on strategizing in the South African mining industry. In addition, knowledge on the transformation of accountants as strategists could provide valuable practice relevant insights for accounting educators and the accounting profession alike.

Keywords: accountant strategists, dominant strategizing practice models framework, mining industry, strategy-as-practice

Procedia PDF Downloads 175
1963 “Waving High the Delicate Mistress”: on Feminist Geography and American Identity in the Valley of the Moon

Authors: Yangyang Zhang

Abstract:

In The Valley of the Moon, Jack London implicitly presents the connection between the city and the male, the country and the female, constructing a gender space where the city and the countryside are opposed. But meanwhile, London is constantly dismantling the gender space through the reversed travel map so as to highlight the fluidity and productivity of female space. Under such circumstance, the original gender space has to be reorganized. Through the construction of gendered urban and rural spaces, Jack London presents the national crisis in the process of urbanization of the American West in the late 19th century, while the female-led reversed travel map reproduces the original contribution of the American West to the construction of nationality. In the end, the reorganized neutral space “valley of the moon” reflects the “garden” motif in American national imagination and plays an important role in rebuilding national identity. This research studies the feminist geography and cartography in Jack London's novel The Valley of the Moon and analyzes the gender-politics attribution in the literary geography writing in London's novel on this basis. The research returns to the American historical context at the end of the 19th century, focusing on how London’s feminist geography embodies his sense of nationality and investigating how female-dominated literary cartography reconstructs American identity. This paper takes Literary Cartography, and feminist geography as the ideological guide combines with the discourse of gender politics. comprehensively uses various literary criticism methods such as deconstructionist literary criticism, and new historicism literary criticism, etc., Through the study of Jack London's work, the paper aims to analyse how London constructs a national image by literary geography.

Keywords: American identity, American west, feminist geography, garden motif, the valley of the moon

Procedia PDF Downloads 126
1962 Crossover Memories and Code-Switching in the Narratives of Arabic-Hebrew and Hebrew-English Bilingual Adults in Israel

Authors: Amani Jaber-Awida

Abstract:

This study examines two bilingual phenomena in the narratives of Arabic Hebrew and Hebrew-English bilingual adults in Israel: CO memories and code-switching (CS). The study examined these phenomena in the context of autobiographical memory, using a cue word technique. Student experimenters held two sessions in the homes of the participants. In separate language sessions, the participant was asked to look first at each of 16 cue words and then to state a concrete memory. After stating the memory, participants reported whether their memories were in the same language of the experiment session or different. Memories were classified as ‘Crossovers’ (CO) or ‘Same Language’ (SL) according to participants' self-reports. Participants were also required to elaborate about the setting, interlocutors and other languages involved in the specific memory. Beyond replicating the procedure of cuing technique, one memory from a specific lifespan period was chosen per participant, and the participant was required to provide further details about it. For the more detailed memories, CS count was conducted. Both bilingual groups confirmed the Reminiscence Bump phenomenon, retrieving more memories in the 10-30 age period. CO memories prevailed in second language sessions (L2). Same language memories were more abundant in first language sessions (L1). Higher CS frequency was found in L2 sessions. Finally, as predicted, 'individual' CS was prevalent in L2 sessions, but 'community-based' CS was not higher in L1 sessions. The two bilingual measures in this study, crossovers, and CS came from different research traditions, the former from an experimental paradigm in the psychology of autobiographical memory based on self-reported judgments, the latter a behavioral measure from linguistics. This merger of approaches offers new insight into the field of bilingual autobiographical memory. In addition, the study attempted to shed light on the investigation of motivations for CS, beginning with Walters’ SPPL Model and concluding with a distinction between ‘community-based’ and individual motivations.

Keywords: bilinguals, code-switching, crossover memories, narratives

Procedia PDF Downloads 171