Search results for: event horizon
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 1410

Search results for: event horizon

840 The Phenomenon of Biofilm Formation and the Subsequent Management of Foodborne Pathogenic Bacteria

Authors: Raana Babadi Fathipour

Abstract:

Biofilms, those intricate structures of microbial aggregation that emerge as microorganisms adhere to animate or inanimate surfaces, possess an innate capacity to shield their inhabitants from adversities within the environment whilst fortifying their endurance against antimicrobial agents. This remarkable aspect facilitates the persistence and virulence of said microorganisms, establishing biofilm formation as an integral component of bacterial survival mechanisms. However, should foodborne pathogens adopt this mode of existence, the potentiality for foodborne disease infections becomes alarmingly intensified—an alarming prospect that harbors significant public health hazards and engenders deleterious economic ramifications. Thus, due to these consequences lurking on the horizon, extensive research concentrating upon comprehending biofilms and devising efficacious removal strategies assumes a position imbued with paramount importance within the realm of the food industry. The problem of food waste resulting from spoilage in the food industry continues to present a widespread challenge to both environmental sustainability and the security of our food supplies. In this comprehensive analysis, we delve into the formation of bacterial biofilms, highlighting the specific issues they pose within the realm of food production. Additionally, we provide an overview of various types of common foodborne pathogens that tend to thrive in these biofilms. Furthermore, we summarize existing strategies aimed at tackling or managing detrimental bacterial biofilm growth. We also introduce contemporary approaches that show promise in terms of controlling this issue and highlight their potential for further advancement. Ultimately, our focus lies on outlining prospects for future development as they pertain specifically to combatting bacterial biofilms within the field.

Keywords: foodborne pathogens, food safety, biofilm, resistance, quorum-sensing

Procedia PDF Downloads 48
839 Dynamic Transmission Modes of Network Public Opinion on Subevents Clusters of an Emergent Event

Authors: Yuan Xu, Xun Liang, Meina Zhang

Abstract:

The rise and attenuation of the public opinion broadcast of an emergent accident, in the social network, has a close relationship with the dynamic development of its subevents cluster. In this article, we take Tianjin Port explosion's subevents as an example to research the dynamic propagation discipline of Internet public opinion in a sudden accident, and analyze the overall structure of dynamic propagation to propose four different routes for subevents clusters propagation. We also generate network diagrams for the dynamic public opinion propagation, analyze each propagation type specifically. Based on this, suggestions on the supervision and guidance of Internet public opinion broadcast can be made.

Keywords: network dynamic transmission modes, emergent subevents clusters, Tianjin Port explosion, public opinion supervision

Procedia PDF Downloads 279
838 Civil Liability for Digital Crimes

Authors: Pál Mészáros

Abstract:

The aim of this research topic is to examine civil law consequences caused by crimes committed in the digital space. During the commission of certain crimes, not only the rights of one person are violated, but also the rights of an entire institution, for example, if the information system of a university is attacked. The consequences of these crimes committed in the digital space may also be that the victim himself is liable to other third parties, for example, in the event that health data comes into the possession of unauthorized persons, and it can be proved that the service provider's IT system was inadequate. An interesting question may also be the civil liability of credit institutions if someone becomes a victim of fraud but is not expected from him/her to notice the fraud. In such a case, the liability of the credit institution may arise if they do not respond in time in the case of unauthorized bank transactions. Based on the above, the main topic of the research is the civil liability of the victim, or another person or company related to the victim in the case of damages caused by crimes.

Keywords: civil liability, digital crimes, transfer of responsibility, civil law

Procedia PDF Downloads 51
837 Determination of Heavy Metal Concentration in Soil from Flood Affected Area

Authors: Nor Sayzwani Sukri, Siti Hajar Ya’acob, Musfiroh Jani, Farah Khaliz Kedri, Noor Syuhadah Subki, Zulhazman Hamzah

Abstract:

In mid-December 2014, the biggest flood event occurred in East Coast of Peninsular Malaysia especially at Dabong area, Kelantan. As a consequent of flood disaster, the heavy metals concentration in soil may changes and become harmful to the environment due to the pollution that deposited in soil. This study was carried out to determine the heavy metal concentration from flood affected area. Sample have been collected and analysed by using Atomic Absorption Spectroscopy (AAS). Lead (Pb), Cadmium (Cd), Mercury (Hg), and Arsenic (As) were chosen for the heavy metals concentration. The result indicated that the heavy metal concentration did not exceed the limit. In-situ parameters also were carried out, were the results showed the range of soil pH (6.5-6.8), temperature (25°C – 26.5°C), and moisture content (1-2), respectively. The results from this study can be used as a base data to improve the soil quality and for consideration of future land use activities.

Keywords: flood, soil, heavy metal, AAS

Procedia PDF Downloads 411
836 Efficiency Validation of Hybrid Cooling Application in Hot and Humid Climate Houses of KSA

Authors: Jamil Hijazi, Stirling Howieson

Abstract:

Reducing energy consumption and CO2 emissions are probably the greatest challenge now facing mankind. From considerations surrounding global warming and CO2 production, it has to be recognized that oil is a finite resource and the KSA like many other oil-rich countries will have to start to consider a horizon where hydro-carbons are not the dominant energy resource. The employment of hybrid ground-cooling pipes in combination with the black body solar collection and radiant night cooling systems may have the potential to displace a significant proportion of oil currently used to run conventional air conditioning plant. This paper presents an investigation into the viability of such hybrid systems with the specific aim of reducing cooling load and carbon emissions while providing all year-round thermal comfort in a typical Saudi Arabian urban housing block. Soil temperatures were measured in the city of Jeddah. A parametric study then was carried out by computational simulation software (DesignBuilder) that utilized the field measurements and predicted the cooling energy consumption of both a base case and an ideal scenario (typical block retro-fitted with insulation, solar shading, ground pipes integrated with hypocaust floor slabs/stack ventilation and radiant cooling pipes embed in floor). Initial simulation results suggest that careful ‘ecological design’ combined with hybrid radiant and ground pipe cooling techniques can displace air conditioning systems, producing significant cost and carbon savings (both capital and running) without appreciable deprivation of amenity.

Keywords: cooling load, energy efficiency, ground pipe cooling, hybrid cooling strategy, hydronic radiant systems, low carbon emission, passive designs, thermal comfort

Procedia PDF Downloads 224
835 N400 Investigation of Semantic Priming Effect to Symbolic Pictures in Text

Authors: Thomas Ousterhout

Abstract:

The purpose of this study was to investigate if incorporating meaningful pictures of gestures and facial expressions in short sentences of text could supplement the text with enough semantic information to produce and N400 effect when probe words incongruent to the picture were subsequently presented. Event-related potentials (ERPs) were recorded from a 14-channel commercial grade EEG headset while subjects performed congruent/incongruent reaction time discrimination tasks. Since pictures of meaningful gestures have been shown to be semantically processed in the brain in a similar manner as words are, it is believed that pictures will add supplementary information to text just as the inclusion of their equivalent synonymous word would. The hypothesis is that when subjects read the text/picture mixed sentences, they will process the images and words just like in face-to-face communication and therefore probe words incongruent to the image will produce an N400.

Keywords: EEG, ERP, N400, semantics, congruency, facilitation, Emotiv

Procedia PDF Downloads 248
834 Shari'ah Supervisory Board's Performance: The Influence to Quality of Disclosure in Islamic Banks

Authors: Dian Andari

Abstract:

In several decades, Islamic Banks (IBs) has proliferated internationally. To ensure IBs’ accountability to all stakeholders, a governance system is established. Similar to conventional banks (CBs), IBs create corporate governance system. In addition, IBs have Shari’ah Supervisory Board (SSB) as part of Shari’ah governance formed purposively to ensure IBs innovative operations comply to the Shari’ah. Thus, all boards in IBs must actively participate in good corporate as well as Shari’ah governance. The research will analyze SSB’s performance and quality of disclosure by observing 10 IBs annual report from 2011 to 2015 in Gulf countries. The content analysis will be done to see the relationship between SSB’s performance and quality of disclosure in the annual report. The analysis found that event all aspects of disclosure have been meet, financial disclosure still dominates the annual report. This can indicate that the SSB’s focus is on the interest of capital providers.

Keywords: Islamic banks, Shari'ah supervisory board, accountability, quality of disclosure

Procedia PDF Downloads 314
833 How to “Eat” without Actually Eating: Marking Metaphor with Spanish Se and Italian Si

Authors: Cinzia Russi, Chiyo Nishida

Abstract:

Using data from online corpora (Spanish CREA, Italian CORIS), this paper examines the relatively understudied use of Spanish se and Italian si exemplified in (1) and (2), respectively. (1) El rojo es … el que se come a los demás. ‘The red (bottle) is the one that outshines/*eats the rest.’(2) … ebbe anche la saggezza di mangiarsi tutto il suo patrimonio. ‘… he even had the wisdom to squander/*eat all his estate.’ In these sentences, se/si accompanies the consumption verb comer/mangiare ‘to eat’, without which the sentences would not be interpreted appropriately. This se/si cannot readily be attributed to any of the multiple functions so far identified in the literature: reflexive, ergative, middle/passive, inherent, benefactive, and complete consumptive. In particular, this paper argues against the feasibility of a recent construction-based analysis of sentences like (1) and (2), which situates se/si within a prototype-based network of meanings all deriving from the central meaning of 'COMPLETE CONSUMPTION' (e.g., Alice se comió toda la torta/Alicesi è mangiata tutta la torta ‘John ate the whole cake’). Clearly, the empirical adequacy of such an account is undermined by the fact that the events depicted in the se/si-sentences at issue do not always entail complete consumption because they may lack an INCREMENTAL THEME, the distinguishing property of complete consumption. Alternatively, it is proposed that the sentences under analysis represent instances of verbal METAPHORICAL EXTENSION: se/si represents an explicit marker of this cognitive process, which has independently developed from the complete consumptive se/si, and the meaning extension is captured by the general tenets of Conceptual Metaphor Theory (CMT). Two conceptual domains, Source (DS) and target (DT), are related by similarity, assigning an appropriate metaphorical interpretation to DT. The domains paired here are comer/mangiare (DS) and comerse/mangiarsi (DT). The eating event (DS) involves (a) the physical process of xEATER grinding yFOOD-STUFF into pieces and swallowing it; and (b) the aspect of xEATER savoring yFOOD-STUFF and being nurtured by it. In the physical act of eating, xEATER has dominance and exercises his force over yFOOD-STUFF. This general sense of dominance and force is mapped onto DT and is manifested in the ways exemplified in (1) and (2), and many others. According to CMT, two other properties are observed in each pair of DS & DT. First, DS tends to be more physical and concrete and DT more abstract, and systematic mappings are established between constituent elements in DS and those in DT: xEATER corresponds to the element that destroys and yFOOD-STUFF to the element that is destroyed in DT, as exemplified in (1) and (2). Though the metaphorical extension marker se/si appears by far most frequently with comer/mangiare in the corpora, similar systematic mappings are observed in several other verb pairs, for example, jugar/giocare ‘to play (games)’ and jugarse/giocarsi ‘to jeopardize/risk (life, reputation, etc.)’, perder/perdere ‘to lose (an object)’ and perderse/perdersi ‘to miss out on (an event)’, etc. Thus, this study provides evidence that languages may indeed formally mark metaphor using means available to them.

Keywords: complete consumption value, conceptual metaphor, Italian si/Spanish se, metaphorical extension.

Procedia PDF Downloads 37
832 The Operation Strategy and Public Relations Trend for Public Relations Strategies Development in Thailand

Authors: Kanyapat U. Tapao

Abstract:

The purpose of this study is to analyze the operation strategy strategies and public relations trend for public relations strategies development in public television station in Thailand. This study is a qualitative approach by indent interview from the 6 key informants that are managers of Voice TV and Thairath TV Channel. The results showed that both TV stations have to do research before making a release on the operation strategy policy such as a slogan, segmentation, integrated marketing communication and PR activity and also in term of Public Relations trend are including online media, online content and online training before opening the station and start promoting. By the way, we found the PR strategy for both TV station should be including application on mobile, online content, CRM activity, online banner, special event, and brand ambassador in order to bring a very reliable way.

Keywords: online banner, operation strategy, public relations trend, public relations strategies development

Procedia PDF Downloads 302
831 Modeling and Simulation of Flow Shop Scheduling Problem through Petri Net Tools

Authors: Joselito Medina Marin, Norberto Hernández Romero, Juan Carlos Seck Tuoh Mora, Erick S. Martinez Gomez

Abstract:

The Flow Shop Scheduling Problem (FSSP) is a typical problem that is faced by production planning managers in Flexible Manufacturing Systems (FMS). This problem consists in finding the optimal scheduling to carry out a set of jobs, which are processed in a set of machines or shared resources. Moreover, all the jobs are processed in the same machine sequence. As in all the scheduling problems, the makespan can be obtained by drawing the Gantt chart according to the operations order, among other alternatives. On this way, an FMS presenting the FSSP can be modeled by Petri nets (PNs), which are a powerful tool that has been used to model and analyze discrete event systems. Then, the makespan can be obtained by simulating the PN through the token game animation and incidence matrix. In this work, we present an adaptive PN to obtain the makespan of FSSP by applying PN analytical tools.

Keywords: flow-shop scheduling problem, makespan, Petri nets, state equation

Procedia PDF Downloads 283
830 Portfolio Restructuring of Banks: The Impact on Performance and Risk

Authors: Hannes Koester

Abstract:

Driven by difficult market conditions and increasing regulations, many banks are making the strategic decision to restructure their portfolio by divesting several business segments. Using a unique dataset of 727 portfolio restructuring announcements by 161 international listed banks over the period 1999 to 2015, we investigate the impact of restructuring measurements on the stock performance as well as on the banks’ profitability and risk. Employing the event study methodology, we detect positive stock market reactions on the announcement of restructuring measurements. These positive stock market reactions indicate that shareholders reward banks’ specialization activities. However, the results of the system GMM regressions show a negative relation between restructuring measurements and banks’ return on assets and a positive relation towards the individual and systemic risk of banks. These empirical results indicate that there is no guarantee that portfolio restructurings will result in a more profitable and less risky institution.

Keywords: bank performance, bank risk, divestiture, restructuring, systemic risk

Procedia PDF Downloads 303
829 Recent Developments in the Internal Arc Test Standard IEC 62271-200 for Switchgear Assemblies

Authors: Rajaramamohanarao Chennu, S. Sudhakara Reddy, Gurudev T, Maroti

Abstract:

With the invent of recent available technology and cost optimization, the switchgear assemblies are becoming more compact and designed to operate at critical levels of thermal and dielectric stress. At the same time, the switchgear assemblies shall be designed for protection of persons, met in the event of internal arc for specified installation conditions, according to the latest available national/international standards. These standards are revising regularly for better product design and personal safety. The switchgear assemblies design shall be modified in accordance with the change in requirements in the latest edition of the standards. This paper presents the signifying changes brought in the latest edition of 62271-200:2021 and effect of these changes and the necessitated design improvements for meeting internal arc test requirements is presented by carrying out the internal arc testing experiments on the switchgear assemblies at High Power Laboratory, Central Power Research Institute, Bangalore, India.

Keywords: internal arc, switchgear assembly, high speed videography, IEC 62271-200

Procedia PDF Downloads 178
828 Social Implementation of Information Sharing Road Safety Measure in South-East Asia

Authors: Hiroki Kikuchi, Atsushi Fukuda, Hirokazu Akahane, Satoru Kobayakawa, Tuenjai Fukuda, Takeru Miyokawa

Abstract:

According to WHO reports, fatalities by road traffic accidents in many countries of South-East Asia region especially Thailand and Malaysia are increasing year by year. In order to overcome these serious problems, both governments are focusing on road safety measures. In response, the Ministry of Land, Infrastructure, Transport and Tourism (MLIT) of Japan and Japan International Cooperation Agency (JICA) have begun active support based on the experiences to reduce the number of fatalities in road accidents in Japan in the past. However, even if the successful road safety measures in Japan is adopted in South-East Asian countries, it is not sure whether it will work well or not. So, it is necessary to clarify the issues and systematize the process for the implementation of road safety measures in South-East Asia. On the basis of the above, this study examined the applicability of "information sharing traffic safety measure" which is one of the successful road safety measures in Japan to the social implementation of road safety measures in South-East Asian countries. The "Information sharing traffic safety measure" is carried out traffic safety measures by stakeholders such as residents, administration, and experts jointly. In this study, we extracted the issues of implementation of road safety measures under local context firstly. This is clarifying the particular issues with its implementation in South-East Asian cities. Secondly, we considered how to implement road safety measures for solving particular issues based on the method of "information sharing traffic safety measure". In the implementation method, the location of the occurrence of a dangerous event was extracted based on the “HIYARI-HATTO” data which were obtained from the residents. This is because it is considered that the implementation of the information sharing traffic safety measure focusing on the location where the dangerous event occurs leads to the reduction of traffic accidents. Also, the target locations for the implementation of measures differ for each city. In Penang, we targeted the intersections in the downtown, while in Suphan Buri, we targeted mainly traffic control on the intercity highway. Finally, we proposed a method for implementing traffic safety measures. For Penang, we proposed a measure to improve the signal phase and showed the effect of the measure on the micro traffic simulation. For Suphan Buri, we proposed the suitable measures for the danger points extracted by collecting the “HIYARI-HATTO” data of residents to the administration. In conclusion, in order to successfully implement the road safety measure based on the "information sharing traffic safety measure", the process for social implementation of the road safety measures should be consistent and carried out repeatedly. In particular, by clarifying specific issues based on local context in South-East Asian countries, the stakeholders, not only such as government sectors but also local citizens can share information regarding road safety and select appropriate countermeasures. Finally, we could propose this approach to the administration that had the authority.

Keywords: information sharing road safety measure, social implementation, South-East Asia, HIYARI-HATTO

Procedia PDF Downloads 141
827 Modeling of Dam Break Flood Wave Propagation Using HEC-RAS 2D and GIS: A Case Study of Taksebt Dam in Algeria

Authors: Abdelghani Leghouchi

Abstract:

This study aims to predict the consequences associated with the propagation of the flood wave that may occur after the failure of the Taksebt dam and suggest an efficient emergency action plan (EAP) for mitigation purposes. To achieve the objectives of this study, the hydrodynamic model HEC-RAS 2D was used for the flood routing of the dam break wave, which gave an estimate of the hydraulic characteristics downstream the Taksebt dam. Geospatial analysis of the simulation results conducted in a Geographic information system (GIS) environment showed that many residential areas are considered to be in danger in case of the Taksebt dam break event. Based on the obtained results, an emergency actions plan was suggested to moderate the causalities in the downstream area at risk. Overall, the present study showed that the integration of 2D hydraulic modeling and GIS provides great capabilities in providing realistic view of the dam break wave propagation that enhances assessing the associated risks and proposing appropriate mitigation measures.

Keywords: taksebt dam, dam break, wave propagation time, HEC-RAS 2D

Procedia PDF Downloads 96
826 From Al Capone to Silk Road: Money Laundering Regulation for Cryptocurrency on the Horizon

Authors: Chinelle van der Westhuizen

Abstract:

The introduction of cryptocurrencies as an alternative payment system have placed governments in a challenging position in relation to the regulatory status of cryptocurrencies and the money laundering activities associated with it. In April 2018, the Australian government amended its Anti-Money Laundering laws to regulate digital currency exchanges in an attempt to regulate money laundering activities and the introduction of ‘know-your-customer’ policies within the digital currency sector. Part one of this paper explores the use of cryptocurrencies for money laundering purposes and its significance to money launderers. Part two studies the efficacy of the current Australian Anti-Money Laundering laws and whether more can be done on a regulatory level. This paper will, therefore, highlight recent court decisions and legislation in terms of money laundering activities within these alternative payment systems in Australia and the United Kingdom. Part three of the paper will further analyze recent case studies by the Australian Transaction Reports and Analysis Centre and the Office for Professional Body Anti-Money Laundering Supervision in the United Kingdom as the regulatory bodies for money laundering activities. The case studies and research will explore the legal disputes and future regulation concerning the use of cryptocurrencies and money laundering on a national as well as international level. This paper intends to highlight that although cryptocurrency is viewed as an innovative global phenomenon and an alternative method of payment, there are a number of legal issues associated with its use that indicate the need for regulatory reform. It is recommended in this paper that the Financial Action Task Force, International Monetary Fund as well as concerned governments have ongoing discussions on these regulatory issues and how to address it appropriately, whether through legislation or universal guidelines. Therefore, the conclusion of this paper will emphasize the benefits of a regulatory regime for money laundering activities within the cryptocurrency space and that the lack of such a regime may be detrimental to countries.

Keywords: cryptocurrency, know-your-customer policy, money laundering, regulation

Procedia PDF Downloads 146
825 A Deep Learning Based Integrated Model For Spatial Flood Prediction

Authors: Vinayaka Gude Divya Sampath

Abstract:

The research introduces an integrated prediction model to assess the susceptibility of roads in a future flooding event. The model consists of deep learning algorithm for forecasting gauge height data and Flood Inundation Mapper (FIM) for spatial flooding. An optimal architecture for Long short-term memory network (LSTM) was identified for the gauge located on Tangipahoa River at Robert, LA. Dropout was applied to the model to evaluate the uncertainty associated with the predictions. The estimates are then used along with FIM to identify the spatial flooding. Further geoprocessing in ArcGIS provides the susceptibility values for different roads. The model was validated based on the devastating flood of August 2016. The paper discusses the challenges for generalization the methodology for other locations and also for various types of flooding. The developed model can be used by the transportation department and other emergency response organizations for effective disaster management.

Keywords: deep learning, disaster management, flood prediction, urban flooding

Procedia PDF Downloads 131
824 Assessing Social Vulnerability and Policy Adaption Application Responses Based on Landslide Risk Map

Authors: Z. A. Ahmad, R. C. Omar, I. Z. Baharuddin, R. Roslan

Abstract:

Assessments of social vulnerability, carried out holistically, can provide an important guide to the planning process and to decisions on resource allocation at various levels, and can help to raise public awareness of geo-hazard risks. The assessments can help to provide answers for basic questions such as the human vulnerability at the geo-hazard prone or disaster areas causing health damage, economic loss, loss of natural heritage and vulnerability impact of extreme natural hazard event. To overcome these issues, integrated framework for assessing the increasing human vulnerability to environmental changes caused by geo-hazards will be introduced using an indicator from landslide risk map that is related to agent based modeling platform. The indicators represent the underlying factors, which influence a community’s ability to deal with and recover from the damage associated with geo-hazards. Scope of this paper is particularly limited to landslides.

Keywords: social, vulnerability, geo-hazard, methodology, indicators

Procedia PDF Downloads 272
823 From Victim to Ethical Agent: Oscar Wilde's The Ballad of Reading Gaol as Post-Traumatic Writing

Authors: Mona Salah El-Din Hassanein

Abstract:

Faced with a sudden, unexpected, and overwhelming event, the individual's normal cognitive processing may cease to function, trapping the psyche in "speechless terror", while images, feelings and sensations are experienced with emotional intensity. Unable to master such situation, the individual becomes a trauma victim who will be susceptible to traumatic recollections like intrusive thoughts, flashbacks, and repetitive re-living of the primal event in a way that blurs the distinction between past and present, and forecloses the future. Trauma is timeless, repetitious, and contagious; a trauma observer could fall prey to "secondary victimhood". Central to the process of healing the psychic wounds in the aftermath of trauma is verbalizing the traumatic experience (i.e., putting it into words) – an act which provides a chance for assimilation, testimony, and reevaluation. In light of this paradigm, this paper proposes a reading of Oscar Wilde's The Ballad of Reading Gaol, written shortly after his release from prison, as a post-traumatic text which traces the disruptive effects of the traumatic experience of Wilde's imprisonment for homosexual offences and the ensuing reversal of fortune he endured. Post-traumatic writing demonstrates the process of "working through" a trauma which may lead to the possibility of ethical agency in the form of a "survivor mission". This paper draws on fundamental concepts and key insights in literary trauma theory which is characterized by interdisciplinarity, combining the perspectives of different fields like critical theory, psychology, psychiatry, psychoanalysis, history, and social studies. Of particular relevance to this paper are the concepts of "vicarious traumatization" and "survivor mission", as The Ballad of Reading Gaol was written in response to Wilde's own prison trauma and the indirect traumatization he experienced as a result of witnessing the execution of a fellow prisoner whose story forms the narrative base of the poem. The Ballad displays Wilde's sense of mission which leads him to recognize the social as well as ethical implications of personal tragedy. Through a close textual analysis of The Ballad of Reading Gaol within the framework of literary trauma theory, the paper aims to: (a) demonstrate how the poem's thematic concerns, structure and rhetorical figures reflect the structure of trauma; (b) highlight Wilde's attempts to come to terms with the effects of the cataclysmic experience which transformed him into a social outcast; and (c) show how Wilde manages to transcend the victim status and assumes the role of ethical agent to voice a critique of the Victorian penal system and the standards of morality underlying the cruelties practiced against wrong doers and to solicit social action.

Keywords: ballad of reading of reading, post-traumatic writing, trauma theory, Wilde

Procedia PDF Downloads 175
822 Working Memory and Audio-Motor Synchronization in Children with Different Degrees of Central Nervous System's Lesions

Authors: Anastasia V. Kovaleva, Alena A. Ryabova, Vladimir N. Kasatkin

Abstract:

Background: The most simple form of entrainment to a sensory (typically auditory) rhythmic stimulus involves perceiving and synchronizing movements with an isochronous beat with one level of periodicity, such as that produced by a metronome. Children with pediatric cancer usually treated with chemo- and radiotherapy. Because of such treatment, psychologists and health professionals declare cognitive and motor abilities decline in cancer patients. The purpose of our study was to measure working memory characteristics with association with audio-motor synchronization tasks, also involved some memory resources, in children with different degrees of central nervous system lesions: posterior fossa tumors, acute lymphoblastic leukemia, and healthy controls. Methods: Our sample consisted of three groups of children: children treated for posterior fossa tumors (PFT-group, n=42, mean age 12.23), children treated for acute lymphoblastic leukemia (ALL-group, n=11, mean age 11.57) and neurologically healthy children (control group, n=36, mean age 11.67). Participants were tested for working memory characteristics with Cambridge Neuropsychological Test Automated Battery (CANTAB). Pattern recognition memory (PRM) and spatial working memory (SWM) tests were applied. Outcome measures of PRM test include the number and percentage of correct trials and latency (speed of participant’s response), and measures of SWM include errors, strategy, and latency. In the synchronization tests, the instruction was to tap out a regular beat (40, 60, 90 and 120 beats per minute) in synchrony with the rhythmic sequences that were played. This meant that for the sequences with an isochronous beat, participants were required to tap into every auditory event. Variations of inter-tap-intervals and deviations of children’s taps from the metronome were assessed. Results: Analysis of variance revealed the significant effect of group (ALL, PFT and control) on such parameters as short-term PRM, SWM strategy and errors. Healthy controls demonstrated more correctly retained elements, better working memory strategy, compared to cancer patients. Interestingly that ALL patients chose the bad strategy, but committed significantly less errors in SWM test then PFT and controls did. As to rhythmic ability, significant associations of working memory were found out only with 40 bpm rhythm: the less variable were inter-tap-intervals of the child, the more elements in memory he/she could retain. The ability to audio-motor synchronization may be related to working memory processes mediated by the prefrontal cortex whereby each sensory event is actively retrieved and monitored during rhythmic sequencing. Conclusion: Our results suggest that working memory, tested with appropriate cognitive methods, is associated with the ability to synchronize movements with rhythmic sounds, especially in sub-second intervals (40 per minute).

Keywords: acute lymphoblastic leukemia (ALL), audio-motor synchronization, posterior fossa tumor, working memory

Procedia PDF Downloads 289
821 Gamification to Enhance Learning Using Gagne's Learning Model

Authors: M. L. McLain, R. Sreelakshmi, Abhishek, Rajeshwaran, Bhavani Rao, Kamal Bijlani, R. Jayakrishnan

Abstract:

Technology enhanced learning has brought drastic changes in the field of education in the modern world. In this study we explore a novel way to improve how high school students learn by building a serious game that uses a pedagogical model developed by Robert Gagne. By integrating serious game with principles of Gagne’s learning model can provide engaging and meaningful instructions to students. The game developed in this study is a waste sorting game that can easily and succinctly demonstrate the principles of this learning model. All the tasks in the game that the player has to accomplish correspond to Gagne’s “Nine Events of Learning”. A quiz is incorporated in order to get data on the progress made by the player in understanding the concept and as well as to assess them. Additionally, an experimental study was conducted which demonstrates that game based learning using Gagne’s event is more effective than a traditional classroom setup.

Keywords: game based learning, sorting and recycling of waste, Gagne’s learning model, e-Learning, technology enhanced learning

Procedia PDF Downloads 620
820 Graphical User Interface Testing by Using Deep Learning

Authors: Akshat Mathur, Sunil Kumar Khatri

Abstract:

This paper presents brief about how the use of Artificial intelligence in respect to GUI testing can reduce workload by using DL-fueled method. This paper also discusses about how graphical user interface and event driven software testing can derive benefits from the use of AI techniques. The use of AI techniques not only reduces the task and work load but also helps in getting better output than manual testing. Although results are same, but the use of Artifical intelligence techniques for GUI testing has proven to provide ideal results. DL-fueled framework helped us to find imperfections of the entire webpage and provides test failure result in a score format between 0 and 1which signifies that are test meets it quality criteria or not. This paper proposes DL-fueled method which helps us to find the genuine GUI bugs and defects and also helped us to scale the existing labour-intensive and skill-intensive methodologies.

Keywords: graphical user interface, GUI, artificial intelligence, deep learning, ML technology

Procedia PDF Downloads 158
819 Optimal Tamping for Railway Tracks, Reducing Railway Maintenance Expenditures by the Use of Integer Programming

Authors: Rui Li, Min Wen, Kim Bang Salling

Abstract:

For the modern railways, maintenance is critical for ensuring safety, train punctuality and overall capacity utilization. The cost of railway maintenance in Europe is high, on average between 30,000 – 100,000 Euros per kilometer per year. In order to reduce such maintenance expenditures, this paper presents a mixed 0-1 linear mathematical model designed to optimize the predictive railway tamping activities for ballast track in the planning horizon of three to four years. The objective function is to minimize the tamping machine actual costs. The approach of the research is using the simple dynamic model for modelling condition-based tamping process and the solution method for finding optimal condition-based tamping schedule. Seven technical and practical aspects are taken into account to schedule tamping: (1) track degradation of the standard deviation of the longitudinal level over time; (2) track geometrical alignment; (3) track quality thresholds based on the train speed limits; (4) the dependency of the track quality recovery on the track quality after tamping operation; (5) Tamping machine operation practices (6) tamping budgets and (7) differentiating the open track from the station sections. A Danish railway track between Odense and Fredericia with 42.6 km of length is applied for a time period of three and four years in the proposed maintenance model. The generated tamping schedule is reasonable and robust. Based on the result from the Danish railway corridor, the total costs can be reduced significantly (50%) than the previous model which is based on optimizing the number of tamping. The different maintenance strategies have been discussed in the paper. The analysis from the results obtained from the model also shows a longer period of predictive tamping planning has more optimal scheduling of maintenance actions than continuous short term preventive maintenance, namely yearly condition-based planning.

Keywords: integer programming, railway tamping, predictive maintenance model, preventive condition-based maintenance

Procedia PDF Downloads 428
818 Terrorism in German and Italian Press Headlines: A Cognitive Linguistic Analysis of Conceptual Metaphors

Authors: Silvia Sommella

Abstract:

Islamic terrorism has gained a lot of media attention in the last years also because of the striking increase of terror attacks since 2014. The main aim of this paper is to illustrate the phenomenon of Islamic terrorism by applying frame semantics and metaphor analysis to German and Italian press headlines of the two online weekly publications Der Spiegel and L’Espresso between 2014 and 2019. This study focuses on how media discourse – through the use of conceptual metaphors – let arise in people a particular reception of the phenomenon of Islamic terrorism and accept governmental strategies and policies, perceiving terrorists as evildoers, as the members of an uncivilised group ‘other’ opposed to the civilised group ‘we’: two groups that are perceived as opposed. The press headlines are analyzed on the basis of the cognitive linguistics, namely Lakoff and Johnson’s conceptualization of metaphor to distinguish between abstract conceptual metaphors and specific metaphorical expressions. The study focuses on the contexts, frames, and metaphors. The method adopted in this study is Konerding’s frame semantics (1993). Konerding carried out on the basis of dictionaries – in particular of the Duden Deutsches Universalwörterbuch (Duden Universal German Dictionary) – in a pilot study of a lexicological work hyperonym reduction of substantives, working exclusively with nouns because hyperonyms usually occur in the dictionary meaning explanations as for the main elements of nominal phrases. The results of Konerding’s hyperonym type reduction is a small set of German nouns and they correspond to the highest hyperonyms, the so-called categories, matrix frames: ‘object’, ‘organism’, ‘person/actant’, ‘event’, ‘action/interaction/communication’, ‘institution/social group’, ‘surroundings’, ‘part/piece’, ‘totality/whole’, ‘state/property’. The second step of Konerding’s pilot study consists in determining the potential reference points of each category so that conventionally expectable routinized predications arise as predictors. Konerding found out which predicators the ascertained noun types can be linked to. For the purpose of this study, metaphorical expressions will be listed and categorized in conceptual metaphors and under the matrix frames that correspond to the particular conceptual metaphor. All of the corpus analyses are carried out using Ant Conc corpus software. The research will verify some previously analyzed metaphors such as TERRORISM AS WAR, A CRIME, A NATURAL EVENT, A DISEASE and will identify new conceptualizations and metaphors about Islamic terrorism, especially in the Italian language like TERRORISM AS A GAME, WARES, A DRAMATIC PLAY. Through the identification of particular frames and their construction, the research seeks to understand the public reception and the way to handle the discourse about Islamic terrorism in the above mentioned online weekly publications under a contrastive analysis in the German and in the Italian language.

Keywords: cognitive linguistics, frame semantics, Islamic terrorism, media

Procedia PDF Downloads 166
817 The Relationship Between Car Drivers' Background Information and Risky Events In I- Dreams Project

Authors: Dagim Dessalegn Haile

Abstract:

This study investigated the interaction between the drivers' socio-demographic background information (age, gender, and driving experience) and the risky events score in the i-DREAMS platform. Further, the relationship between the participants' background driving behavior and the i-DREAMS platform behavioral output scores of risky events was also investigated. The i-DREAMS acronym stands for Smart Driver and Road Environment Assessment and Monitoring System. It is a European Union Horizon 2020 funded project consisting of 13 partners, researchers, and industry partners from 8 countries. A total of 25 Belgian car drivers (16 male and nine female) were considered for analysis. Drivers' ages were categorized into ages 18-25, 26-45, 46-65, and 65 and older. Drivers' driving experience was also categorized into four groups: 1-15, 16-30, 31-45, and 46-60 years. Drivers are classified into two clusters based on the recorded score for risky events during phase 1 (baseline) using risky events; acceleration, deceleration, speeding, tailgating, overtaking, and lane discipline. Agglomerative hierarchical clustering using SPSS shows Cluster 1 drivers are safer drivers, and Cluster 2 drivers are identified as risky drivers. The analysis result indicated no significant relationship between age groups, gender, and experience groups except for risky events like acceleration, tailgating, and overtaking in a few phases. This is mainly because the fewer participants create less variability of socio-demographic background groups. Repeated measure ANOVA shows that cluster 2 drivers improved more than cluster 1 drivers for tailgating, lane discipline, and speeding events. A positive relationship between background drivers' behavior and i-DREAMS platform behavioral output scores is observed. It implies that car drivers who in the questionnaire data indicate committing more risky driving behavior demonstrate more risky driver behavior in the i-DREAMS observed driving data.

Keywords: i-dreams, car drivers, socio-demographic background, risky events

Procedia PDF Downloads 60
816 Pakistan’s English Language Newspapers, Framing, and Aurat March

Authors: Shiza Nisar

Abstract:

This study examines how editorials in Pakistan’s English-language newspapers represented the Aurat March in Pakistan, which is held on International Women’s Day, 8 March, to reclaim public spaces for women. There was a public outcry against the controversial movement, sparked by the key messages and slogans used to communicate with the masses. This research aims to study non-western news frames used by Pakistan’s leading English-language newspapers—Dawn, The Express Tribune, The News, and The Nation—for the portrayal of Aurat March since 2018. The findings show how these editorials construct and reinforce the concept of feminism being threatened by the dangerous other. This research aims to contribute to the understanding of Pakistan’s elite discourse, which insists that this event is a movement led by females in a male-dominated society to voice their rights and reclaim public spaces; however, this movement is more than just that.

Keywords: discourse, Aurat March, media framing, feminist movement, editorials

Procedia PDF Downloads 102
815 Rationale of Eye Pupillary Diameter for the UV Protection for Sunglasses

Authors: Liliane Ventura, Mauro Masili

Abstract:

Ultraviolet (UV) protection is critical for sunglasses, and mydriasis, as well as miosis, are relevant parameters to consider. The literature reports that for sunglasses, ultraviolet protection is critical because sunglasses can cause the opposite effect if the lenses do not provide adequate UV protection due to the greater dilation of the pupil when wearing sunglasses. However, the scientific literature does not properly quantify to support this rationale. The reasoning may be misleading by ignoring not only the inherent absorption of UV by the sunglass lens materials but also by ignoring the absorption of the anterior structures of the eye, i.e., the cornea and aqueous humor. Therefore, we estimate the pupil diameter and calculate the solar ultraviolet influx through the pupil of the human eye for two situations of an individual wearing and not wearing sunglasses. We quantify the dilation of the pupil as a function of the luminance of the surrounding. Therefore, we calculate the influx of solar UV through the pupil of the eye for two situations for an individual wearing sunglass and for the eyes free of shade. A typical boundary condition for the calculation is an individual in an upright position wearing sunglasses, staring at the horizon as if the sun is in the zenith. The calculation was done for the latitude of the geographic center of the state of São Paulo (-22º04'11.8'' S) from sunrise to sunset. A model from the literature is used for determining the sky luminance. The initial approach is to obtain pupil diameter as a function of luminance. Therefore, as a preliminary result, we calculate the pupil diameter as a function of the time of day, as the sun moves, for a particular day of the year. The working range for luminance is daylight (10⁻⁴ – 10⁵ cd/m²). We are able to show how the pupil adjusts to brightness change (~2 - ~7.8 mm). At noon, with the sun higher, the direct incidence of light on the pupil is lower if compared to mid-morning or mid-afternoon, when the sun strikes more directly into the eye. Thus, the pupil is larger at midday. As expected, the two situations have opposite behaviors since higher luminance implies a smaller pupil. With these results, we can progress in the short term to obtain the transmittance spectra of sunglasses samples and quantify how light attenuation provided by the spectacles affects pupil diameter.

Keywords: sunglasses, UV protection, pupil diameter, solar irradiance, luminance

Procedia PDF Downloads 61
814 Investigating the Online Effect of Language on Gesture in Advanced Bilinguals of Two Structurally Different Languages in Comparison to L1 Native Speakers of L2 and Explores Whether Bilinguals Will Follow Target L2 Patterns in Speech and Co-speech

Authors: Armita Ghobadi, Samantha Emerson, Seyda Ozcaliskan

Abstract:

Being a bilingual involves mastery of both speech and gesture patterns in a second language (L2). We know from earlier work in first language (L1) production contexts that speech and co-speech gesture form a tightly integrated system: co-speech gesture mirrors the patterns observed in speech, suggesting an online effect of language on nonverbal representation of events in gesture during the act of speaking (i.e., “thinking for speaking”). Relatively less is known about the online effect of language on gesture in bilinguals speaking structurally different languages. The few existing studies—mostly with small sample sizes—suggests inconclusive findings: some show greater achievement of L2 patterns in gesture with more advanced L2 speech production, while others show preferences for L1 gesture patterns even in advanced bilinguals. In this study, we focus on advanced bilingual speakers of two structurally different languages (Spanish L1 with English L2) in comparison to L1 English speakers. We ask whether bilingual speakers will follow target L2 patterns not only in speech but also in gesture, or alternatively, follow L2 patterns in speech but resort to L1 patterns in gesture. We examined this question by studying speech and gestures produced by 23 advanced adult Spanish (L1)-English (L2) bilinguals (Mage=22; SD=7) and 23 monolingual English speakers (Mage=20; SD=2). Participants were shown 16 animated motion event scenes that included distinct manner and path components (e.g., "run over the bridge"). We recorded and transcribed all participant responses for speech and segmented it into sentence units that included at least one motion verb and its associated arguments. We also coded all gestures that accompanied each sentence unit. We focused on motion event descriptions as it shows strong crosslinguistic differences in the packaging of motion elements in speech and co-speech gesture in first language production contexts. English speakers synthesize manner and path into a single clause or gesture (he runs over the bridge; running fingers forward), while Spanish speakers express each component separately (manner-only: el corre=he is running; circle arms next to body conveying running; path-only: el cruza el puente=he crosses the bridge; trace finger forward conveying trajectory). We tallied all responses by group and packaging type, separately for speech and co-speech gesture. Our preliminary results (n=4/group) showed that productions in English L1 and Spanish L1 differed, with greater preference for conflated packaging in L1 English and separated packaging in L1 Spanish—a pattern that was also largely evident in co-speech gesture. Bilinguals’ production in L2 English, however, followed the patterns of the target language in speech—with greater preference for conflated packaging—but not in gesture. Bilinguals used separated and conflated strategies in gesture in roughly similar rates in their L2 English, showing an effect of both L1 and L2 on co-speech gesture. Our results suggest that online production of L2 language has more limited effects on L2 gestures and that mastery of native-like patterns in L2 gesture might take longer than native-like L2 speech patterns.

Keywords: bilingualism, cross-linguistic variation, gesture, second language acquisition, thinking for speaking hypothesis

Procedia PDF Downloads 67
813 Investigation and Analysis of Vortex-Induced Vibrations in Sliding Gate Valves Using Computational Fluid Dynamics

Authors: Kianoosh Ahadi, Mustafa Ergil

Abstract:

In this study, the event of vibrations caused by vortexes and the distribution of induced hydrodynamic forces due to vortexes on the sliding gate valves has been investigated. For this reason, a sliding valve with the help of computational fluid dynamics (CFD) software was simulated in two-dimensional )2D(, where the flow and turbulence equations were solved for three different valve openings (full, half, and 16.7 %) models. The variety of vortexes formed within the vicinity of the valve structure was investigated based on time where the trend of fluctuations and their occurrence regions have been detected. From the gathered solution dataset of the numerical simulations, the pressure coefficient (CP), the lift force coefficient (CL), the drag force coefficient (CD), and the momentum coefficient due to hydrodynamic forces (CM) were examined, and relevant figures were generated were from these results, the vortex-induced vibrations were analyzed.

Keywords: induced vibrations, computational fluid dynamics, sliding gate valves, vortexes

Procedia PDF Downloads 101
812 Analyzing the Performance of Different Cost-Based Methods for the Corrective Maintenance of a System in Thermal Power Plants

Authors: Demet Ozgur-Unluakin, Busenur Turkali, S. Caglar Aksezer

Abstract:

Since the age of industrialization, maintenance has always been a very crucial element for all kinds of factories and plants. With today’s increasingly developing technology, the system structure of such facilities has become more complicated, and even a small operational disruption may return huge losses in profits for the companies. In order to reduce these costs, effective maintenance planning is crucial, but at the same time, it is a difficult task because of the complexity of systems. The most important aspect of correct maintenance planning is to understand the structure of the system, not to ignore the dependencies among the components and as a result, to model the system correctly. In this way, it will be better to understand which component improves the system more when it is maintained. Undoubtedly, proactive maintenance at a scheduled time reduces costs because the scheduled maintenance prohibits high losses in profits. But the necessity of corrective maintenance, which directly affects the situation of the system and provides direct intervention when the system fails, should not be ignored. When a fault occurs in the system, if the problem is not solved immediately and proactive maintenance time is awaited, this may result in increased costs. This study proposes various maintenance methods with different efficiency measures under corrective maintenance strategy on a subsystem of a thermal power plant. To model the dependencies between the components, dynamic Bayesian Network approach is employed. The proposed maintenance methods aim to minimize the total maintenance cost in a planning horizon, as well as to find the most appropriate component to be attacked on, which improves the system reliability utmost. Performances of the methods are compared under corrective maintenance strategy. Furthermore, sensitivity analysis is also applied under different cost values. Results show that all fault effect methods perform better than the replacement effect methods and this conclusion is also valid under different downtime cost values.

Keywords: dynamic Bayesian networks, maintenance, multi-component systems, reliability

Procedia PDF Downloads 112
811 Detection of Voltage Sag and Voltage Swell in Power Quality Using Wavelet Transforms

Authors: Nor Asrina Binti Ramlee

Abstract:

Voltage sag, voltage swell, high-frequency noise and voltage transients are kinds of disturbances in power quality. They are also known as power quality events. Equipment used in the industry nowadays has become more sensitive to these events with the increasing complexity of equipment. This leads to the importance of distributing clean power quality to the consumer. To provide better service, the best analysis on power quality is very vital. Thus, this paper presents the events detection focusing on voltage sag and swell. The method is developed by applying time domain signal analysis using wavelet transform approach in MATLAB. Four types of mother wavelet namely Haar, Dmey, Daubechies, and Symlet are used to detect the events. This project analyzed real interrupted signal obtained from 22 kV transmission line in Skudai, Johor Bahru, Malaysia. The signals will be decomposed through the wavelet mothers. The best mother is the one that is capable to detect the time location of the event accurately.

Keywords: power quality, voltage sag, voltage swell, wavelet transform

Procedia PDF Downloads 360