Search results for: Christian Kind
1162 Intuitional Insight in Islamic Mysticism
Authors: Maryam Bakhtyar, Pegah Akrami
Abstract:
Intuitional insight or mystical cognition is a different insight from common, concrete and intellectual insights. This kind of insight is not achieved by visionary contemplation but by the recitation of God, self-purification, and mystical life. In this insight, there is no distance or medium between the subject of cognition and its object, and they have a sort of unification, unison, and incorporation. As a result, knowledgeable consider this insight as direct, immediate, and personal. The goal of this insight is God, cosmos’ creatures, and the general inner and hidden aspect of the world that is nothing except God’s manifestations in the view of mystics. AS our common cognitions have diversity and stages, intuitional insight also has diversity and levels. As our senses are divided into concrete and rational, mystical discovery is divided into superficial discovery and spiritual one. Based on Islamic mystics, the preferable way to know God and believe in him is intuitional insight. There are two important criteria for evaluating mystical intuition, especially for beginner mystics of intellect and revelation. Indeed, the conclusion and a brief evaluation of Islamic mystics’ viewpoint is the main subject of this paper.Keywords: intuition, discovery, mystical insight, personal knowledge, superficial discovery, spiritual discovery
Procedia PDF Downloads 941161 Ionic Liquid Desiccant for the Dehumidification System
Authors: Chih-Hao Chen, Yu-Heng Fang, Jyi-Ching Perng, Wei-Chih Lee, Yi-Hsiang Chen, Jiun-Jen Chen
Abstract:
Emerging markets are almost in the high temperature and high humidity area. Regardless of industry or domestic fields, the energy consumption of air conditioning systems in buildings is always significant. Moreover, the proportion of latent heat load is high. A liquid desiccant dehumidification system is one kind of energy-saving air conditioning system. However, traditional absorbents such as lithium chloride are hindered in market promotion because they will crystallized and cause metal corrosion. This study used the commercial ionic liquid to build a liquid desiccant dehumidification system with an air volume of 300 CMH. When the absolute humidity of the inlet air was 15g/kg, the absolute humidity of the outlet air was 10g/kg. The operating condition of a hot water temperature is 45 °C, and the cooling water temperature is 15 °C. The test result proves that the ionic liquid desiccant can completely replace the traditional liquid desiccant.Keywords: ionic liquid desiccant, dehumidification, heat pump, air conditioning systems
Procedia PDF Downloads 1691160 The Significance of Organizational Failure Based on the Instance of Samsung Lions Case
Authors: Jae Soo Do, Kyoung Seok Kim
Abstract:
Korea baseball experts reckoned Samsung Lions as the best baseball team. It has the unparalleled records of winning first place in the pennant race for five straight years from 2011 to 2015 and winning the Korean series for four years in a row from 2011 to 2014. However, the team made an unbelievably miserable record of ninth place in the pennant race in 2016 and 2017. How come the strong competitive superiority has gone and what kind of slump made the team how it is now. This study investigates this organizational failure case of Samsung Lions, the professional baseball team in Korea. What factors have brought the organizational failure to Samsung Lions? Based on an in-depth examination on how a league-fore-runner drastically lost its competitive superiority, this verifies the necessity of risk management to which common corporations as well as sport teams can be subject at any time in these days.Keywords: Samsung Lions, organizational failure, baseball, slump
Procedia PDF Downloads 3151159 Empirical Study on the Organizational Role Stress and its Effect on Private and Government Sector Employees
Authors: Rashmi Shahu
Abstract:
This is a comparative study of the Organizational Role Stress among the private and government sector employees. There was no known similar kind of Organizational Role Stress study in the field area i.e. Nagpur city. Hence, in order to understand the ORS level pertaining to the government and private sector employees in various offices it was taken as the subject for this study. The Method used for this study was the incidental sampling method. The Organizational Role Scale containing 50 statements related to the ten different ORS areas was used for observations. All 60 participants were tested. The results of the study show that there was a significant difference in only one area of ORS i.e. Personal Inadequacy for the participants. The employees from the private sector showed higher Personal Inadequacy than the government employees. Rest of the ORS areas showed no significant difference meaning that the employees were well adjusted in the respective areas.Keywords: organozational role stress, private sector, government sector, personal inadequacy
Procedia PDF Downloads 3641158 Power Aware Modified I-LEACH Protocol Using Fuzzy IF Then Rules
Authors: Gagandeep Singh, Navdeep Singh
Abstract:
Due to limited battery of sensor nodes, so energy efficiency found to be main constraint in WSN. Therefore the main focus of the present work is to find the ways to minimize the energy consumption problem and will results; enhancement in the network stability period and life time. Many researchers have proposed different kind of the protocols to enhance the network lifetime further. This paper has evaluated the issues which have been neglected in the field of the WSNs. WSNs are composed of multiple unattended ultra-small, limited-power sensor nodes. Sensor nodes are deployed randomly in the area of interest. Sensor nodes have limited processing, wireless communication and power resource capabilities Sensor nodes send sensed data to sink or Base Station (BS). I-LEACH gives adaptive clustering mechanism which very efficiently deals with energy conservations. This paper ends up with the shortcomings of various adaptive clustering based WSNs protocols.Keywords: WSN, I-Leach, MATLAB, sensor
Procedia PDF Downloads 2751157 Single Ended Primary Inductance Converter with Internal Model Controller
Authors: Fatih Suleyman Taskincan, Ahmet Karaarslan
Abstract:
In this article, the study and analysis of Single Ended Primary Inductance Converter (SEPIC) are presented for battery charging applications that will be used in military applications. The usage of this kind of converters come from its advantage of non-reverse polarity at outputs. As capacitors charge and discharge through inductance, peak current does not occur on capacitors. Therefore, the efficiency will be high compared to buck-boost converters. In this study, the converter (SEPIC) is designed to be operated with Internal Model Controller (IMC). The traditional controllers like Proportional Integral Controller are not preferred as its linearity behavior. Hence IMC is designed for this converter. This controller is a model-based control and provides more robustness and better set point monitoring. Moreover, it can be used for an unstable process where the conventional controller cannot handle the dynamic operation. Matlab/Simulink environment is used to simulate the converter and its controller, then, the results are shown and discussed.Keywords: DC/DC converter, single ended primary inductance converter, SEPIC, internal model controller, IMC, switched mode power supply
Procedia PDF Downloads 6291156 Robust and Real-Time Traffic Counting System
Authors: Hossam M. Moftah, Aboul Ella Hassanien
Abstract:
In the recent years the importance of automatic traffic control has increased due to the traffic jams problem especially in big cities for signal control and efficient traffic management. Traffic counting as a kind of traffic control is important to know the road traffic density in real time. This paper presents a fast and robust traffic counting system using different image processing techniques. The proposed system is composed of the following four fundamental building phases: image acquisition, pre-processing, object detection, and finally counting the connected objects. The object detection phase is comprised of the following five steps: subtracting the background, converting the image to binary, closing gaps and connecting nearby blobs, image smoothing to remove noises and very small objects, and detecting the connected objects. Experimental results show the great success of the proposed approach.Keywords: traffic counting, traffic management, image processing, object detection, computer vision
Procedia PDF Downloads 2941155 Existence of Rational Primitive Normal Pairs with Prescribed Norm and Trace
Authors: Soniya Takshak, R. K. Sharma
Abstract:
Let q and n be positive integers, then Fᵩ denotes the finite field of q elements, and Fqn denotes the extension of Fᵩ of degree n. Also, Fᵩ* represents the multiplicative group of non-zero elements of Fᵩ, and the generators of Fᵩ* are called primitive elements. A normal element α of a finite field Fᵩⁿ is such that {α, αᵠ, . . . , αᵠⁿ⁻¹} forms a basis for Fᵩⁿ over Fᵩ. Primitive normal elements have several applications in coding theory and cryptography. So, establishing the existence of primitive normal elements under certain conditions is both theoretically important and a natural issue. In this article, we provide a sufficient condition for the existence of a primitive normal element α in Fᵩⁿ of a prescribed primitive norm and non-zero trace over Fᵩ such that f(α) is also primitive, where f(x) ∈ Fᵩⁿ(x) is a rational function of degree sum m. Particularly, we investigated the rational functions of degree sum 4 over Fᵩⁿ, where q = 11ᵏ and demonstrated that there are only 3 exceptional pairs (q, n), n ≥ 7 for which such kind of primitive normal elements may not exist. In general, we show that such elements always exist except for finitely many choices of (q, n). To arrive to our conclusion, we used additive and multiplicative character sums.Keywords: finite field, primitive element, normal element, norm, trace, character
Procedia PDF Downloads 1041154 Measurement Tools of the Maturity Model for IT Service Outsourcing in Higher Education Institutions
Authors: Victoriano Valencia García, Luis Usero Aragonés, Eugenio J. Fernández Vicente
Abstract:
Nowadays, the successful implementation of ICTs is vital for almost any kind of organization. Good governance and ICT management are essential for delivering value, managing technological risks, managing resources and performance measurement. In addition, outsourcing is a strategic IT service solution which complements IT services provided internally in organizations. This paper proposes the measurement tools of a new holistic maturity model based on standards ISO/IEC 20000 and ISO/IEC 38500, and the frameworks and best practices of ITIL and COBIT, with a specific focus on IT outsourcing. These measurement tools allow independent validation and practical application in the field of higher education, using a questionnaire, metrics tables, and continuous improvement plan tables as part of the measurement process. Guidelines and standards are proposed in the model for facilitating adaptation to universities and achieving excellence in the outsourcing of IT services.Keywords: IT governance, IT management, IT services, outsourcing, maturity model, measurement tools
Procedia PDF Downloads 5921153 Relation between Tourism and Health: Case Study AIDS in Lebanon
Authors: Viana Hassan
Abstract:
Each year, 600 million tourists travelled abroad to practice several types of tourism. Nowadays, whatever is the type of tourism practiced it considered as a real public health problem which can contribute the spread of several diseases such as AIDS, H1N1, NDM1 With regard to HIV/AIDS, Lebanon is always considered as a low HIV prevalence country. However, the potential risks associated with the mobility of the population, migration and tourism. The total number of cases reported by the ministry of health since 1989 until the end of 2011 is of 1455 cases, with an average of 85 new cases per year over the last three years. The main reason of the increased number is Travel and migration which represent 50% of the risks reported by cumulative cases. Given the interest of this kind of epidemic it would be interesting to study the Evolution of HIV/ AIDS and its relation with travel and tourism The main aim of this research is to study in general the relation between tourism and health, more specific to understand the relation between Tourism and AIDS, the problem of the transmission of HIV in Lebanon, the ways of contamination and the countries in which these people are contaminated.Keywords: AIDS, tourism, health, Lebanon
Procedia PDF Downloads 3361152 Analytical Solution for Thermo-Hydro-Mechanical Analysis of Unsaturated Porous Media Using AG Method
Authors: Davood Yazdani Cherati, Hussein Hashemi Senejani
Abstract:
In this paper, a convenient analytical solution for a system of coupled differential equations, derived from thermo-hydro-mechanical analysis of three-phase porous media such as unsaturated soils is developed. This kind of analysis can be used in various fields such as geothermal energy systems and seepage of leachate from buried municipal and domestic waste in geomaterials. Initially, a system of coupled differential equations, including energy, mass, and momentum conservation equations is considered, and an analytical method called AGM is employed to solve the problem. The method is straightforward and comprehensible and can be used to solve various nonlinear partial differential equations (PDEs). Results indicate the accuracy of the applied method for solving nonlinear partial differential equations.Keywords: AGM, analytical solution, porous media, thermo-hydro-mechanical, unsaturated soils
Procedia PDF Downloads 2291151 Video-Observation: A Phenomenological Research Tool for International Relation?
Authors: Andreas Aagaard Nohr
Abstract:
International Relations is an academic discipline which is rarely in direct contact with its field. However, there has in recent years been a growing interest in the different agents within and beyond the state and their associated practices; yet some of the research tools with which to study them are not widely used. This paper introduces video-observation as a method for the study of IR and argues that it offers a unique way of studying the complexity of the everyday context of actors. The paper is divided into two main parts: First, the philosophical and methodological underpinnings of the kind of data that video-observation produces are discussed; primarily through a discussion of the phenomenology of Husserl, Heidegger, and Merleau-Ponty. Second, taking simulation of a WTO negotiation round as an example, the paper discusses how the data created can be analysed: in particular with regard to the structure of events, the temporal and spatial organization of activities, rhythm and periodicity, and the concrete role of artefacts and documents. The paper concludes with a discussion of the ontological, epistemological, and practical challenges and limitations that ought to be considered if video-observation is chosen as a method within the field of IR.Keywords: video-observation, phenomenology, international relations
Procedia PDF Downloads 4481150 Study on Wireless Transmission for Reconnaissance UAV with Wireless Sensor Network and Cylindrical Array of Microstrip Antennas
Authors: Chien-Chun Hung, Chun-Fong Wu
Abstract:
It is important for a commander to have real-time information to aware situations and to make decision in the battlefield. Results of modern technique developments have brought in this kind of information for military purposes. Unmanned aerial vehicle (UAV) is one of the means to gather intelligence owing to its widespread applications. It is still not clear whether or not the mini UAV with short-range wireless transmission system is used as a reconnaissance system in Taiwanese. In this paper, previous experience on the research of the sort of aerial vehicles has been applied with a data-relay system using the ZigBee modulus. The mini UAV developed is expected to be able to collect certain data in some appropriate theaters. The omni-directional antenna with high gain is also integrated into mini UAV to fit the size-reducing trend of airborne sensors. Two advantages are so far obvious. First, mini UAV can fly higher than usual to avoid being attacked from ground fires. Second, the data will be almost gathered during all maneuvering attitudes.Keywords: mini UAV, reconnaissance, wireless transmission, ZigBee modulus
Procedia PDF Downloads 1941149 Exploring Multi-Feature Based Action Recognition Using Multi-Dimensional Dynamic Time Warping
Authors: Guoliang Lu, Changhou Lu, Xueyong Li
Abstract:
In action recognition, previous studies have demonstrated the effectiveness of using multiple features to improve the recognition performance. We focus on two practical issues: i) most studies use a direct way of concatenating/accumulating multi features to evaluate the similarity between two actions. This way could be too strong since each kind of feature can include different dimensions, quantities, etc; ii) in many studies, the employed classification methods lack of a flexible and effective mechanism to add new feature(s) into classification. In this paper, we explore an unified scheme based on recently-proposed multi-dimensional dynamic time warping (MD-DTW). Experiments demonstrated the scheme's effectiveness of combining multi-feature and the flexibility of adding new feature(s) to increase the recognition performance. In addition, the explored scheme also provides us an open architecture for using new advanced classification methods in the future to enhance action recognition.Keywords: action recognition, multi features, dynamic time warping, feature combination
Procedia PDF Downloads 4371148 The Pomade for Treatment of Bovine Papilomavirus-Induced Warts in Teats
Authors: Mehmet Kale, Ramazan Sencan, Sibel Yavru, Ahmet Ak, Nuri Mamak, Sibel Hasırcıoglu, Mesih Kocamuftuoglu, Yakup Yıldırım, Hasbi Sait Saltık
Abstract:
Bovine Papilloma Virus (BPV)-induced warts can cause mastitis, teat blindness, reduction of milk yield, udder deformities, and a difficulty in getting the teats into the milking machine. Especially, surgical operations cannot be performed in BPV-induced teat warts because of the increased sensitivity of the breast region and small-sized papillomas. Thus, there is a need to find new topical treatment methods. We have developed a pomade for treatment of BPV in cattle. The pomade is consists of lanoline, snakeskin (two special kind of snake), alcohol, vaseline, and ether. Firstly, we determined 46 cattle with teat warts. In the study, BPV antigen was detected in 28 cattle blood samples (61%) by ELISA. The pomade was applied to all BPV infected animals. The regression and recovery of warts were 100% in all animals. We advised using the pomade for treatment of BPV-induced warts in teats.Keywords: bovine papilloma virus, pomade, teat, udder
Procedia PDF Downloads 2251147 A Secular Advent: A Video-Ethnographic Study of the Preparations for Christmas in Swedish Preschools
Authors: Tunde Puskas, Anita Andersson
Abstract:
In Swedish early childhood education research, the issues related to religious identifications and practices have often been marginalized or relegated either to the realm of diversity and multiculturalism or to the realm of national traditions. This paper is part of a research project about whether religion is considered as part of Swedish cultural heritage in Swedish preschools. Our aim in this paper is to explore how a Swedish preschool balance between keeping the education non-confessional and at the same time introducing the traditions associated with advent and Christmas. Christmas was chosen because of the religious background of the holiday and because it is a tradition widely celebrated in Swedish preschools. In Swedish education system, the concept of freedom of religion is understood in the sense that education is declared to be non-confessional. Nevertheless, as the major state holidays in Sweden are tied to Lutheran Christian traditions, and according to the curriculum preschool educators, are given the task to pass on a cultural heritage, defined in terms of values, traditions, history, language, and knowledge, it is the preschool teams or individual preschool teachers who determine whether and to what extent religious considerations are/ought to be seen as part of the cultural heritage the preschool passes on. The data consists of ten video taped observations from two preschools. The video data was transcribed and the transcripts were thereafter analysed through content analysis. In the analysis, we draw on the concept of banal religiosity that has helped us to draw attention to the workings of religious considerations that are so familiar that they rarely are noticed as religious and on Ninian Smart’s theory on the dimensions of religion. The analysis shows that what the adults actually do with religion fulfils six of seven dimensions common to religious traditions as outlined by Smart. At the same time, Christmas is performed as a lived tradition within which the commercial and religious rituals intersect and result in a banal, national religiosity.Keywords: secular advent, banal religiosity, dimensions of religion, rites
Procedia PDF Downloads 1871146 Merging Sequence Diagrams Based Slicing
Authors: Bouras Zine Eddine, Talai Abdelouaheb
Abstract:
The need to merge software artifacts seems inherent to modern software development. Distribution of development over several teams and breaking tasks into smaller, more manageable pieces are an effective means to deal with the kind of complexity. In each case, the separately developed artifacts need to be assembled as efficiently as possible into a consistent whole in which the parts still function as described. Also, earlier changes are introduced into the life cycle and easier is their management by designers. Interaction-based specifications such as UML sequence diagrams have been found effective in this regard. As a result, sequence diagrams can be used not only for capturing system behaviors but also for merging changes in order to create a new version. The objective of this paper is to suggest a new approach to deal with the problem of software merging at the level of sequence diagrams by using the concept of dependence analysis that captures, formally, all mapping and differences between elements of sequence diagrams and serves as a key concept to create a new version of sequence diagram.Keywords: system behaviors, sequence diagram merging, dependence analysis, sequence diagram slicing
Procedia PDF Downloads 3401145 Public-Public Partnership and Tourism Development Strategy: The Case of Municipality of Gazi Baba in Macedonia
Authors: Dejan Metodijeski, Elizabeta Mitreva, Nako Taskov, Oliver Filiposki
Abstract:
Tourism development strategies are an important link in the tourism policy that is used to make its management better and easier. A public-public partnership (PUP) is a partnership between two or more public authorities or between a public authority and any non-profit organization with the goal of providing services and facilities or transferring technical skills. The paper presents this kind of partnership between two public authorities in Macedonia, the Municipality of Gazi Baba on one hand, and the University of Goce Delcev on the other. The main idea of this partnership is the development of a tourism strategy for the Municipality of Gazi Baba by the University on one side, and on the other, the construction of a mini park in the court of the University by the Municipality. This paper presents the causes and analyzes the procedures relating to this partnership and the methodology of the tourism development strategy. It contains a relevant literature review related to PUPs and tourism development strategy. The results and benefits of this partnership are presented with figures.Keywords: public-public partnership, tourism development strategy, municipality of Gazi Baba, Macedonia
Procedia PDF Downloads 3631144 Material Failure Process Simulation by Improved Finite Elements with Embedded Discontinuities
Authors: Gelacio Juárez-Luna, Gustavo Ayala, Jaime Retama-Velasco
Abstract:
This paper shows the advantages of the material failure process simulation by improve finite elements with embedded discontinuities, using a new definition of traction vector, dependent on the discontinuity length and the angle. Particularly, two families of this kind of elements are compared: kinematically optimal symmetric and statically and kinematically optimal non-symmetric. The constitutive model to describe the behavior of the material in the symmetric formulation is a traction-displacement jump relationship equipped with softening after reaching the failure surface. To show the validity of this symmetric formulation, representative numerical examples illustrating the performance of the proposed formulation are presented. It is shown that the non-symmetric family may over or underestimate the energy required to create a discontinuity, as this effect is related with the total length of the discontinuity, fact that is not noticed when the discontinuity path is a straight line.Keywords: variational formulation, strong discontinuity, embedded discontinuities, strain localization
Procedia PDF Downloads 7811143 Cost Diminution in Supply Chain of a Dairy Industry
Authors: Naveed Ahmed Khan
Abstract:
The ever increasing importance of food industry cannot be denied and especially in the wake of escalating population and prices both in developing and developed nations. Thus, this issue demands the attention of researchers especially in the area of supply chain to identify cost diminution waste eliminating supply chain practices in the said industry. For such purpose the 'Dairy Division' of Engro Foods Limited, one of the biggest food companies in Pakistan was taken into consideration in a case study manner. Based on the literature review and interviews following variables were obtained: energy, losses, maintenance, taxes, and logistics. Having studied the said variables, it was concluded that management of relevant industries operating in a comparable environment need to efficiently manage two major areas: energy and taxes. On the other hand, similar kind of other organizations could be benefited by adopting the proficient supply chain practices being observed at dairy division of Engro foods limited.Keywords: cost diminution, supply chain, dairy industry, Engro Foods Limited
Procedia PDF Downloads 3101142 Chemical Reaction Algorithm for Expectation Maximization Clustering
Authors: Li Ni, Pen ManMan, Li KenLi
Abstract:
Clustering is an intensive research for some years because of its multifaceted applications, such as biology, information retrieval, medicine, business and so on. The expectation maximization (EM) is a kind of algorithm framework in clustering methods, one of the ten algorithms of machine learning. Traditionally, optimization of objective function has been the standard approach in EM. Hence, research has investigated the utility of evolutionary computing and related techniques in the regard. Chemical Reaction Optimization (CRO) is a recently established method. So the property embedded in CRO is used to solve optimization problems. This paper presents an algorithm framework (EM-CRO) with modified CRO operators based on EM cluster problems. The hybrid algorithm is mainly to solve the problem of initial value sensitivity of the objective function optimization clustering algorithm. Our experiments mainly take the EM classic algorithm:k-means and fuzzy k-means as an example, through the CRO algorithm to optimize its initial value, get K-means-CRO and FKM-CRO algorithm. The experimental results of them show that there is improved efficiency for solving objective function optimization clustering problems.Keywords: chemical reaction optimization, expection maimization, initia, objective function clustering
Procedia PDF Downloads 7151141 Proactive WPA/WPA2 Security Using DD-WRT Firmware
Authors: Mustafa Kamoona, Mohamed El-Sharkawy
Abstract:
Although the latest Wireless Local Area Network technology Wi-Fi 802.11i standard addresses many of the security weaknesses of the antecedent Wired Equivalent Privacy (WEP) protocol, there are still scenarios where the network security are still vulnerable. The first security model that 802.11i offers is the Personal model which is very cheap and simple to install and maintain, yet it uses a Pre Shared Key (PSK) and thus has a low to medium security level. The second model that 802.11i provide is the Enterprise model which is highly secured but much more expensive and difficult to install/maintain and requires the installation and maintenance of an authentication server that will handle the authentication and key management for the wireless network. A central issue with the personal model is that the PSK needs to be shared with all the devices that are connected to the specific Wi-Fi network. This pre-shared key, unless changed regularly, can be cracked using offline dictionary attacks within a matter of hours. The key is burdensome to change in all the connected devices manually unless there is some kind of algorithm that coordinate this PSK update. The key idea of this paper is to propose a new algorithm that proactively and effectively coordinates the pre-shared key generation, management, and distribution in the cheap WPA/WPA2 personal security model using only a DD-WRT router.Keywords: Wi-Fi, WPS, TLS, DD-WRT
Procedia PDF Downloads 2331140 Socio-Psychological Significance of Vandalism in the Urban Environment: Destruction, Modernization, Communication
Authors: Olga Kruzhkova, Irina Vorobyeva, Roman Porozov
Abstract:
Vandalism is a common phenomenon, but its definition is still not clearly defined. In the public sense, vandalism is the blatant cases of pogroms in cemeteries, destruction of public places (regardless of whether these actions are authorized), damage to significant objects of culture and history (monuments, religious buildings). From a legal point of view, only such an act can be called vandalism, which is aimed at 'desecrating buildings or other structures, damaging property on public transport or in other public places'. The key here is the notion of public property that is being damaged. In addition, the principal is the semantics of messages, expressed in a kind of sign system (drawing, inscription, symbol), which initially threatens public order, the calmness of citizens, public morality. Because of this, the legal qualification of vandalism doesn’t include a sufficiently wide layer of environmental destructions that are common in modern urban space (graffiti and other damage to private property, broken shop windows, damage to entrances and elevator cabins), which in ordinary consciousness are seen as obvious facts of vandalism. At the same time, the understanding of vandalism from the position of psychology implies an appeal to the question of the limits of the activity of the subject of vandalism and his motivational basis. Also recently, the discourse on the positive meaning of some forms of vandalism (graffiti, street-art, etc.) has been activated. But there is no discussion of the role and significance of vandalism in public and individual life, although, like any socio-cultural and socio-psychological phenomenon, vandalism is not groundless and meaningless. Our aim of the study was to identify and describe the functions of vandalism as a socio-cultural and socio-psychological phenomenon of the life of the urban community, as well as personal determinants of its manifestations. The study was conducted in the spatial environment of the Russian megalopolis (Ekaterinburg) by photographing visual results of vandal acts (6217 photos) with subsequent trace-assessment and image content analysis, as well as diagnostics of personal characteristics and motivational basis of vandal activity of possible subjects of vandalism among youth. The results of the study allowed to identify the functions of vandalism at the socio-environmental and individual-subjective levels. The socio-environmental functions of vandalism include the signaling function, the function of preparing of social changes, the constructing function, and the function of managing public moods. The demonstrative-protest function, the response function, the refund function, and the self-expression function are assigned to the individual-subjective functions of vandalism. A two-dimensional model of vandal functions has been formed, where functions are distributed in the spaces 'construction reconstruction', 'emotional regulation/moral regulation'. It is noted that any function of vandal activity at the individual level becomes a kind of marker of 'points of tension' at the social and environmental level. Acknowledgment: The research was supported financially by Russian Science Foundation, (Project No. 17-18-01278).Keywords: destruction, urban environment, vandal behavior, vandalism, vandalism functions
Procedia PDF Downloads 2001139 Sensor Network Structural Integration for Shape Reconstruction of Morphing Trailing Edge
Authors: M. Ciminello, I. Dimino, S. Ameduri, A. Concilio
Abstract:
Improving aircraft's efficiency is one of the key elements of Aeronautics. Modern aircraft possess many advanced functions, such as good transportation capability, high Mach number, high flight altitude, and increasing rate of climb. However, no aircraft has a possibility to reach all of this optimized performance in a single airframe configuration. The aircraft aerodynamic efficiency varies considerably depending on the specific mission and on environmental conditions within which the aircraft must operate. Structures that morph their shape in response to their surroundings may at first seem like the stuff of science fiction, but take a look at nature and lots of examples of plants and animals that adapt to their environment would arise. In order to ensure both the controllable and the static robustness of such complex structural systems, a monitoring network is aimed at verifying the effectiveness of the given control commands together with the elastic response. In order to achieve this kind of information, the use of FBG sensors network is, in this project, proposed. The sensor network is able to measure morphing structures shape which may show large, global displacements due to non-standard architectures and materials adopted. Chord -wise variations may allow setting and chasing the best layout as a function of the particular and transforming reference state, always targeting best aerodynamic performance. The reason why an optical sensor solution has been selected is that while keeping a few of the contraindication of the classical systems (like cabling, continuous deployment, and so on), fibre optic sensors may lead to a dramatic reduction of the wires mass and weight thanks to an extreme multiplexing capability. Furthermore, the use of the ‘light’ as ‘information carrier’, permits dealing with nimbler, non-shielded wires, and avoids any kind of interference with the on-board instrumentation. The FBG-based transducers, herein presented, aim at monitoring the actual shape of adaptive trailing edge. Compared to conventional systems, these transducers allow more fail-safe measurements, by taking advantage of a supporting structure, hosting FBG, whose properties may be tailored depending on the architectural requirements and structural constraints, acting as strain modulator. The direct strain may, in fact, be difficult because of the large deformations occurring in morphing elements. A modulation transducer is then necessary to keep the measured strain inside the allowed range. In this application, chord-wise transducer device is a cantilevered beam sliding trough the spars and copying the camber line of the ATE ribs. FBG sensors array position are dimensioned and integrated along the path. A theoretical model describing the system behavior is implemented. To validate the design, experiments are then carried out with the purpose of estimating the functions between rib rotation and measured strain.Keywords: fiber optic sensor, morphing structures, strain sensor, shape reconstruction
Procedia PDF Downloads 3291138 Flexural Behavior for Prefabricated Angle Truss Composite Beams Using Precast Concrete
Authors: Jo Kwang-Won, Lee Ho-Jun, Choi In-Rak, Park Hong-Gun
Abstract:
Prefabricated angle truss composited beam is a kind of concrete encased composite beam. It is prefabricated at factory as Pratt truss with steel members. Double angle is used for top, bottom chords and vertical web member. Moreover, diagonal web member is steel plate. Its sectional shape looks like I-shape. This beam system has two stages. The first is construction stage in which the beam is directly connected to the column for resist construction load. This stage beam consists of Pratt truss and precast concrete. The stability of the beam is verified. The second is service stage. After the connection, cast-in-place concrete is used for composite action. Ultimate flexural capacity is verified and show advantage than RC and steel. In this paper, the beam flexural capacity is verified in both stages. And examined the flexural behavior of the beam.Keywords: composite beam, prefabrication, angle, precast concrete, pratt truss
Procedia PDF Downloads 3031137 Using Happening Performance in Vocabulary Teaching
Authors: Mustafa Gultekin
Abstract:
It is believed that drama can be used in language classes to create a positive atmosphere for students to use the target language in an interactive way. Thus, drama has been extensively used in many settings in language classes. Although happening has been generally used as a performance art of theatre, this new kind of performance has not been widely known in language teaching area. Therefore, it can be an innovative idea to use happening in language classes, and thus a positive environment can be created for students to use the language in an interactive way. Happening can be defined as an art performance that puts emphasis on interaction in an audience. Because of its interactive feature, happening can also be used in language classes to motivate students to use the language in an interactive environment. The present study aims to explain how a happening performance can be applied to a learning environment to teach vocabulary in English. In line with this purpose, a learning environment was designed for a vocabulary presentation lesson. At the end of the performance, students were asked to compare the traditional way of teaching and happening performance in terms of effectiveness. It was found that happening performance provided the students with a more creative and interactive environment to use the language. Therefore, happening can be used in language classrooms as an innovative tool for education.Keywords: English, happening, language learning, vocabulary teaching
Procedia PDF Downloads 3671136 Feasibility Study of Air Conditioners Operated by Solar Energy in Saudi Arabia
Authors: Eman Simbawa, Budur Alasmri, Hanan Munahir, Hanin Munahir
Abstract:
Solar energy has become currently the subject of attention around the world and is undergoing many researches and studies. Using solar energy, which is a renewable energy, is aligned with the Saudi Vision 2030. People are more aware of it and are starting to use it more for environmental and economical reasons. A questionnaire was conducted in this paper to measure the awareness of people in Saudi Arabia regarding solar energy and their attitude towards it. Then, two kinds of air conditioners (one powered by electricity only and one powered by solar panels and electricity) are compared in terms of their cost over a period of 20 years. This will help the users to decide which kind of device to use depending on its cost. The result shows that as the electricity tariffs in Saudi Arabia increases, depending on the sector, the solar air conditioner is cheaper. In fact, if the tariff in the future increases to reach 50 Halalah/kWh, the solar air conditioner is more economical. This will influence users to buy more solar powered devices, and it will decrease the consumption of electricity. Therefore, the dependence on oil will decrease.Keywords: Airconditioner, solar energy, photovoltaic cells, present value
Procedia PDF Downloads 1601135 Atwood's Canadianisms and Neologisms: A Cognitive Approach to Literature
Authors: Eleonora Sasso
Abstract:
This paper takes as its starting point the notions of cognitive linguistics and lexical blending, and uses both these theoretical concepts to advance a new reading of Margaret Atwood’s latest writings, one which sees them as paramount literary examples of norm and usage in bilingual Canadian lexicography. Atwood’s prose seems to be imbued with Canadianisms and neologisms, lexical blends of zoomorphic forms, a kind of meeting-point between two conceptual structures which follow the principles of lexical economy and asyntactic relation. Atwood’s neologisms also attest to the undeniable impact on language exerted by Canada’s aboriginal peoples. This paper aims to track through these references and with the aid of the Eskimo-English dictionary look at the linguistic issues – attitudes to contaminations and hybridisations, questions of lexical blending in literary examples, etc – which they raise. Atwood’s fiction, whose cognitive linguistic strategy employs ‘the virtues of scissors and matches’, always strives to achieve isomorphism between word form and concept.Keywords: Atwood, Canadianisms, cognitive science, Eskimo/English dictionary
Procedia PDF Downloads 2641134 Detection Method of Federated Learning Backdoor Based on Weighted K-Medoids
Authors: Xun Li, Haojie Wang
Abstract:
Federated learning is a kind of distributed training and centralized training mode, which is of great value in the protection of user privacy. In order to solve the problem that the model is vulnerable to backdoor attacks in federated learning, a backdoor attack detection method based on a weighted k-medoids algorithm is proposed. First of all, this paper collates the update parameters of the client to construct a vector group, then uses the principal components analysis (PCA) algorithm to extract the corresponding feature information from the vector group, and finally uses the improved k-medoids clustering algorithm to identify the normal and backdoor update parameters. In this paper, the backdoor is implanted in the federation learning model through the model replacement attack method in the simulation experiment, and the update parameters from the attacker are effectively detected and removed by the defense method proposed in this paper.Keywords: federated learning, backdoor attack, PCA, k-medoids, backdoor defense
Procedia PDF Downloads 1141133 Foucault and the Archaeology of Transhumanism
Authors: Michel Foucault, Friedrich Nietzsche, Max More, Natasha Vita-More, Francesca Ferrando
Abstract:
During the early part of his intellectual and academic career (1950s and 1960s), Michel Foucault developed an interest for what we can call the ‘anthropological question’, or how our modernity deals with human nature from an epistemological standpoint. The great originality of Foucault’s thought here lies in the fact that he approaches this question not from the perspective of this ‘sovereign subject’ (that has characterized the History of Western thought) he wishes to disclose and ‘denounce’, but rather at the level of discourses and the way they constitute who we are, so to speak. This led him, in turn, to formulate a series of though-provoking statements during his so-called ‘archaeological period’ of the 1960s concerning what we call ‘man’ in the West, such as that he is an ‘invention of recent date’ (as a proper object of concern and reflection), and, perhaps more importantly, that he might disappear in the near future, ‘like a face drawn in sand at the edge of the sea’. Foucault is following on the footsteps of Nietzsche in that regard, who had famously announced in the 19th ce. the ‘death of God’ and the need for the future generations to surpass (so to speak) the traditional ‘Christian-centred’ Western conception of the human. While Foucault exposed such insights more than half a century ago, they appear to be more actual than ever today with the development and rise in popularity of intellectual movements such as Transhumanism and Posthumanism, which seek to question and propose an alternative to the concepts of ‘man’ or ‘human nature’ in our culture. They rely for that on the same assumption as Foucault and Nietzsche that those concepts (and the meaning we attribute to them) have become ‘obsolete’ as it is and thus must be overcome (at a conceptual, but also a more practical level). Hence, those movements not only echo the important Foucauldian reflection of the 1950s and 1960s on the ‘anthropological question’ but seem to have been literally announced by it, so to speak. The aim of this paper will therefore be to show the relevance of Foucault (and in particular his archaeological method) in understanding the nature of Transhumanism (and Posthumanism), for instance, by analysing and assessing it as a form of discourse that is literally reshaping the way we understand ourselves as human beings in our (post)modern age, drawing for that on a number of key texts including from the early productions of Foucault.Keywords: foucault, nietzsche, archaeology, transhumanism, posthumanism
Procedia PDF Downloads 70