Search results for: constructivist theoretical approach
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 16032

Search results for: constructivist theoretical approach

9372 Investigation of the Working Processes in Thermocompressor Operating on Cryogenic Working Fluid

Authors: Evgeny V. Blagin, Aleksandr I. Dovgjallo, Dmitry A. Uglanov

Abstract:

This article deals with research of the working process in the thermocompressor which operates on cryogenic working fluid. Thermocompressor is device suited for the conversation of heat energy directly to the potential energy of pressure. Suggested thermocompressor is suited for operation during liquid natural gas (LNG) re-gasification and is placed after evaporator. Such application of thermocompressor allows using of the LNG cold energy for rising of working fluid pressure, which then can be used for electricity generation or another purpose. Thermocompressor consists of two chambers divided by the regenerative heat exchanger. Calculation algorithm for unsteady calculation of thermocompressor working process was suggested. The results of this investigation are to change of thermocompressor’s chambers temperature and pressure during the working cycle. These distributions help to find out the parameters, which significantly influence thermocompressor efficiency. These parameters include regenerative heat exchanger coefficient of the performance (COP) dead volume of the chambers, working frequency of the thermocompressor etc. Exergy analysis was performed to estimate thermocompressor efficiency. Cryogenic thermocompressor operated on nitrogen working fluid was chosen as a prototype. Calculation of the temperature and pressure change was performed with taking into account heat fluxes through regenerator and thermocompressor walls. Temperature of the cold chamber significantly differs from the results of steady calculation, which is caused by friction of the working fluid in regenerator and heat fluxes from the hot chamber. The rise of the cold chamber temperature leads to decreasing of thermocompressor delivery volume. Temperature of hot chamber differs negligibly because losses due to heat fluxes to a cold chamber are compensated by the friction of the working fluid in the regenerator. Optimal working frequency was selected. Main results of the investigation: -theoretical confirmation of thermocompressor operation capability on the cryogenic working fluid; -optimal working frequency was found; -value of the cold chamber temperature differs from the starting value much more than the temperature of the hot chamber; -main parameters which influence thermocompressor performance are regenerative heat exchanger COP and heat fluxes through regenerator and thermocompressor walls.

Keywords: cold energy, liquid natural gas, thermocompressor, regenerative heat exchanger

Procedia PDF Downloads 570
9371 Chemical Vapor Deposition (CVD) of Molybdenum Disulphide (MoS2) Monolayers

Authors: Omar Omar, Yuan Jun, Hong Jinghua, Jin Chuanhong

Abstract:

In this work molybdenum dioxide (MoO2) and sulphur powders are used to grow MoS2 mono layers at elevated temperatures T≥800 °C. Centimetre scale continues thin films with grain size up to 410 µm have been grown using chemical vapour deposition. To our best knowledge, these domains are the largest that have been grown so far. Advantage of our approach is not only because of the high quality films with large domain size one can produce, but also the procedure is potentially less hazardous than other methods tried. The thin films have been characterized using transmission electron microscopy (TEM), atomic force microscopy (AFM) and Raman spectroscopy.

Keywords: molybdenum disulphide (MoS2), monolayers, chemical vapour deposition (CVD), growth and characterization

Procedia PDF Downloads 314
9370 The Influence of Wealth on the Enjoyment of Role and Status of the Rural Elderly in Bangladesh

Authors: Aminul Islam

Abstract:

The issue of aging is now an emerging aspect of all over the world. Both the rural and urban societies of our country are not immune from this problem. This study mainly explored the influence of wealth on the enjoyment of role and status of the elderly in rural Bangladesh. It is based on empirical findings from the four villages of Gopalnagar union of Dhunat upazila of Bogra district. The study depicted that wealth has much influence regarding the enjoyment of role and status. Mixed approach has been given priority in this study. Survey, observation, case study and life history methods and focus group discussion technique have also been used in this study. Data have been collected from both primary and secondary sources. Simple random sampling procedure has also been followed in this study.

Keywords: wealth, role status, elderly

Procedia PDF Downloads 409
9369 Proposed Anticipating Learning Classifier System for Cloud Intrusion Detection (ALCS-CID)

Authors: Wafa' Slaibi Alsharafat

Abstract:

Cloud computing is a modern approach in network environment. According to increased number of network users and online systems, there is a need to help these systems to be away from unauthorized resource access and detect any attempts for privacy contravention. For that purpose, Intrusion Detection System is an effective security mechanism to detect any attempts of attacks for cloud resources and their information. In this paper, Cloud Intrusion Detection System has been proposed in term of reducing or eliminating any attacks. This model concerns about achieving high detection rate after conducting a set of experiments using benchmarks dataset called KDD'99.

Keywords: IDS, cloud computing, anticipating classifier system, intrusion detection

Procedia PDF Downloads 458
9368 Developing API Economy: Associating Value to APIs and Microservices in an Enterprise

Authors: Mujahid Sultan

Abstract:

The IT industry has seen many transformations in the Software Development Life Cycle (SDLC) methodologies and development approaches. SDLCs range from waterfall to agile, and the development approaches from monolith to microservices. Management, orchestration, and monetization of microservices have created an API economy in the modern enterprise. There are two approaches to API design, code first and design first. Design first is gaining popularity in the industry as this allows capturing the API needs from the stakeholders rather than the development teams guesstimating the needs and associating a monetary value with the APIs and microservices. In this publication, we describe an approach to organizing and creating stakeholder needs and requirements for designing microservices and APIs.

Keywords: requirements engineering, enterprise architecture, APIs, microservices, DevOps, continuous delivery, continuous integration, stakeholder viewpoints

Procedia PDF Downloads 180
9367 Exploration of the Protection Theory of Chinese Scenic Heritage Based on Local Chronicles

Authors: Mao Huasong, Tang Siqi, Cheng Yu

Abstract:

The cognition and practice of Chinese landscapes have distinct uniqueness. The intergenerational inheritance of urban and rural landscapes is a common objective fact which has created a unique type of heritage in China - scenic heritage. The current generalization of the concept of scenic heritage has affected the lack of innovation in corresponding protection practices. Therefore, clarifying the concepts and connotations of scenery and scenic heritage, clarifying the protection objects of scenic heritage and the methods and approaches in intergenerational inheritance can provide theoretical support for the practice of Chinese scenic heritage and contribute Chinese wisdom to the transformation of world heritage sites. Taking ancient Shaoxing, which has a long time span and rich descriptions of scenic types and quantities, as the research object and using local chronicles as the basic research material, based on text analysis, word frequency analysis, case statistics, and historical, geographical spatial annotation methods, this study traces back to ancient scenic practices and conducts in-depth descriptions in both text and space. it have constructed a scenic heritage identification method based on the basic connotation characteristics and morphological representation characteristics of natural and cultural correlations, combined with the intergenerational and representative characteristics of scenic heritage; Summarized the bidirectional integration of "scenic spots" and "form scenic spots", "outstanding people" and "local spirits" in the formation process of scenic heritage; In inheritance, guided by Confucian values of education; In communication, the cultural interpretation constructed by scenery and the way of landscape life are used to strengthen the intergenerational inheritance of natural, artificial material elements, and intangible spirits. As a unique type of heritage in China, scenic heritage should improve its standards, values, and connotations in current protection practices and actively absorb historical experience.

Keywords: scenic heritage, heritage protection, cultural landscape, shaoxing, chinese landscape

Procedia PDF Downloads 53
9366 Challenging Airway Management for Tracheal Compression Due to a Rhabdomyosarcoma

Authors: Elena Parmentier, Henrik Endeman

Abstract:

Introduction: Large mediastinal masses often present with diagnostic and clinical challenges due to compression of the respiratory and hemodynamic system. We present a case of a mediastinal mass with symptomatic mechanical compression of the trachea, resulting in challenging airway management. Methods: We present a case of 66-year-old male, complaining of progressive dysphagia. Initial esophagogastroscopy revealed a stenosis secondary to external compression, biopsies were inconclusive. Additional CT scan showed a large mediastinal mass of unknown origin, situated between the vertebrae and esophagus. Symptoms progressed and patient developed dyspnea and stridor. A new CT showed quick growth of the mass with compression of the trachea, subglottic to just above the carina. A tracheal covered stent was successfully placed. Endobronchial ultrasound revealed a large irregular mass without tracheal invasion, biopsies were taken. 4 days after stent placement, the patients’ condition deteriorated with worsening of stridor, dyspnea and desaturation. Migration of the tracheal stent into the right main bronchus was seen on chest X ray, with obstruction of the left main bronchus and secondary atelectasis. Different methods have been described in the literature for tracheobronchial stent removal (surgical, endoscopic, fluoroscopyguided), our first choice in this case was flexible bronchoscopy. However, this revealed tracheal compression above the migrated stent and passage of the scope occurred impossible. Patient was admitted to the ICU, high-flow nasal oxygen therapy was started and the situation stabilized, giving time for extensive assessment and preparation of the airway management approach. Close cooperation between the intensivist, pulmonologist, anesthesiologist and otorhinolaryngologist was essential. Results: In case of sudden deterioration, a protocol for emergency situations was made. Given the increased risk of additional tracheal compression after administration of neuromuscular blocking agents, an approach with awake fiberoptic intubation maintaining spontaneous ventilation was proposed. However, intubation without retrieval of the tracheal stent was found undesirable due to expected massive shunting over the left atelectatic lung. As rescue option, assistance of extracorporeal circulation was considered and perfusionist was kept on standby. The patient stayed stable and was transferred to the operating theatre. High frequency jet ventilation under general anesthesia resulted in desaturations up to 50%, making rigid bronchoscopy impossible. Subsequently an endotracheal tube size 8 could be placed successfully and the stent could be retrieved via bronchoscopy over (and with) the tube, after which the patient was reintubated. Finally, a tracheostomy (Shiley™ Tracheostomy Tube With Cuff, size 8) was placed, fiberoptic control showed a patent airway. Patient was readmitted to the ICU and could be quickly weaned of the ventilator. Pathology was positive for rhabdomyosarcoma, without indication for systemic therapy. Extensive surgery (laryngectomy, esophagectomy) was suggested, but patient refused and palliative care was started. Conclusion: Due to meticulous planning in an interdisciplinary team, we showed a successful airway management approach in this complicated case of critical airway compression secondary to a rare rhabdomyosarcoma, complicated by tracheal stent migration. Besides presenting our thoughts and considerations, we support exploring other possible approaches of this specific clinical problem.

Keywords: airway management, rhabdomyosarcoma, stent displacement, tracheal stenosis

Procedia PDF Downloads 86
9365 Case-Based Reasoning Approach for Process Planning of Internal Thread Cold Extrusion

Authors: D. Zhang, H. Y. Du, G. W. Li, J. Zeng, D. W. Zuo, Y. P. You

Abstract:

For the difficult issues of process selection, case-based reasoning technology is applied to computer aided process planning system for cold form tapping of internal threads on the basis of similarity in the process. A model is established based on the analysis of process planning. Case representation and similarity computing method are given. Confidence degree is used to evaluate the case. Rule-based reuse strategy is presented. The scheme is illustrated and verified by practical application. The case shows the design results with the proposed method are effective.

Keywords: case-based reasoning, internal thread, cold extrusion, process planning

Procedia PDF Downloads 493
9364 Instance Selection for MI-Support Vector Machines

Authors: Amy M. Kwon

Abstract:

Support vector machine (SVM) is a well-known algorithm in machine learning due to its superior performance, and it also functions well in multiple-instance (MI) problems. Our study proposes a schematic algorithm to select instances based on Hausdorff distance, which can be adapted to SVMs as input vectors under the MI setting. Based on experiments on five benchmark datasets, our strategy for adapting representation outperformed in comparison with original approach. In addition, task execution times (TETs) were reduced by more than 80% based on MissSVM. Hence, it is noteworthy to consider this representation adaptation to SVMs under MI-setting.

Keywords: support vector machine, Margin, Hausdorff distance, representation selection, multiple-instance learning, machine learning

Procedia PDF Downloads 18
9363 Comparison of Developed Statokinesigram and Marker Data Signals by Model Approach

Authors: Boris Barbolyas, Kristina Buckova, Tomas Volensky, Cyril Belavy, Ladislav Dedik

Abstract:

Background: Based on statokinezigram, the human balance control is often studied. Approach to human postural reaction analysis is based on a combination of stabilometry output signal with retroreflective marker data signal processing, analysis, and understanding, in this study. The study shows another original application of Method of Developed Statokinesigram Trajectory (MDST), too. Methods: In this study, the participants maintained quiet bipedal standing for 10 s on stabilometry platform. Consequently, bilateral vibration stimuli to Achilles tendons in 20 s interval was applied. Vibration stimuli caused that human postural system took the new pseudo-steady state. Vibration frequencies were 20, 60 and 80 Hz. Participant's body segments - head, shoulders, hips, knees, ankles and little fingers were marked by 12 retroreflective markers. Markers positions were scanned by six cameras system BTS SMART DX. Registration of their postural reaction lasted 60 s. Sampling frequency was 100 Hz. For measured data processing were used Method of Developed Statokinesigram Trajectory. Regression analysis of developed statokinesigram trajectory (DST) data and retroreflective marker developed trajectory (DMT) data were used to find out which marker trajectories most correlate with stabilometry platform output signals. Scaling coefficients (λ) between DST and DMT by linear regression analysis were evaluated, too. Results: Scaling coefficients for marker trajectories were identified for all body segments. Head markers trajectories reached maximal value and ankle markers trajectories had a minimal value of scaling coefficient. Hips, knees and ankles markers were approximately symmetrical in the meaning of scaling coefficient. Notable differences of scaling coefficient were detected in head and shoulders markers trajectories which were not symmetrical. The model of postural system behavior was identified by MDST. Conclusion: Value of scaling factor identifies which body segment is predisposed to postural instability. Hypothetically, if statokinesigram represents overall human postural system response to vibration stimuli, then markers data represented particular postural responses. It can be assumed that cumulative sum of particular marker postural responses is equal to statokinesigram.

Keywords: center of pressure (CoP), method of developed statokinesigram trajectory (MDST), model of postural system behavior, retroreflective marker data

Procedia PDF Downloads 333
9362 Blended Wing Body (BWB) Vertical Takeoff and Landing (VTOL) Hybrids: Bridging Urban Gaps Through Computational Design and Optimization, A Comparative Study

Authors: Sai Siddharth S., Prasanna Kumar G. M., Alagarsamy R.

Abstract:

This research introduces an alternative approach to urban road maintenance by utilizing Blended Wing Body (BWB) design and Vertical Takeoff and Landing (VTOL) drones. The integration of this aerospace innovation, combining blended wing efficiency with VTOL maneuverability, aims to optimize fuel consumption and explore versatile applications in solving urban problems. A few problems are discussed along with optimization of the design and comparative study with other drone configurations.

Keywords: design optimization, CFD, CAD, VTOL, blended wing body

Procedia PDF Downloads 74
9361 Quantitative Analysis of Carcinoembryonic Antigen (CEA) Using Micromechanical Piezoresistive Cantilever

Authors: Meisam Omidi, M. Mirijalili, Mohammadmehdi Choolaei, Z. Sharifi, F. Haghiralsadat, F. Yazdian

Abstract:

In this work, we have used arrays of micromechanical piezoresistive cantilever with different geometries to detect carcinoembryonic antigen (CEA), which is known as an important biomarker associated with various cancers such as the colorectal, lung, breast, pancreatic, and bladder cancer. The sensing principle is based on the surface stress changes induced by antigen–antibody interaction on the microcantilevers surfaces. Different concentrations of CEA in a human serum albumin (HSA) solution were detected as a function of the deflection of the beams. According to the experiments, it was revealed that microcantilevers have surface stress sensitivities in the order of 8 (mJ/m). This matter allows them to detect CEA concentrations as low as 3 ng/mL or 18 pM. This indicates the fact that the self-sensing microcantilever approach is beneficial for pathological tests.

Keywords: micromechanical biosensors, carcinoembryonic antigen (CEA), surface stress

Procedia PDF Downloads 457
9360 Consensus-Oriented Analysis Model for Knowledge Management Failure Evaluation in Uncertain Environment

Authors: Amir Ghasem Norouzi, Mahdi Zowghi

Abstract:

This study propose a framework based on the fuzzy T-Norms, T-conorm, a novel operator, and multi-expert approach to help organizations build awareness of the critical influential factors on the success of knowledge management (KM) implementation, analysis the failure of knowledge management. This study considers the complex uncertainty concept that is in knowledge management implementing capability (KMIC) and it is used by fuzzy logic for this reason. The contribution of our paper is shown with an empirical study in a nonprofit educational organization evaluation.

Keywords: fuzzy logic, knowledge management, multi expert analysis, consensus oriented average operator

Procedia PDF Downloads 610
9359 Site-based Internship Experiences: From Research to Implementation and Community Collaboration

Authors: Jamie Sundvall, Lisa Jennings

Abstract:

Site based field internship learning (SBL) is an educational approach within a Master’s of Social Work (MSW) university field placement department that promotes a more streamlined approach to the integration of theory and evidence based practices for social work students. The SBL model is founded on research in the field, consideration of current work force needs, United States national trends of MSW graduate skill and knowledge deficits, educational trends in students pursing a master’s degree in social work, and current social problems that require unique problem solving skills. This study explores the use of site-based learning in a hybrid social work program. In this setting, site based learning pairs online education courses and social work field education to create training opportunities for social work students within their own community and cultural context. Students engage in coursework in an online setting with both synchronous and asynchronous features that facilitate development of core competencies for MSW students. Through the SBL model, students are then partnered with faculty in a virtual course room and a university vetted site within their community. The study explores how this model of learning creates community partnerships, through which students engage in a learning loop to develop social work skills, while preparing students to address current community, social, and global issues with the engagement of technology. The goal of SBL is to more effectively equip social work students for practice according to current workforce demands, provide access to education and care to populations who have limited access, and create self-sustainable partnerships. Further, the model helps students learn integration of evidence based practices and helps instructors more effectively teach integration of ethics into practice. The study found that the SBL model increases the influence and professional relevance of the social work profession, and ultimately facilitates stronger approaches to integrating theory into practice. Current implementation of the practice in the United States will be presented in the study. dditionally, future research conceptualization of SBL models will be presented, in order to collaborate on advancing best approaches of translating theory into practice, according to the current needs of the profession and needs of social work students.

Keywords: collaboration, fieldwork, research, site-based learning, technology

Procedia PDF Downloads 115
9358 Active Development of Tacit Knowledge Using Social Media and Learning Communities

Authors: John Zanetich

Abstract:

This paper uses a pragmatic research approach to investigate the relationships between Active Development of Tacit Knowledge (ADTK), social media (Facebook) and classroom learning communities. This paper investigates the use of learning communities and social media as the context and means for changing tacit knowledge to explicit and presents a dynamic model of the development of a classroom learning community. The goal of this study is to identify the point that explicit knowledge is converted to tacit knowledge and to test a way to quantify the exchange using social media and learning communities.

Keywords: tacit knowledge, knowledge management, college programs, experiential learning, learning communities

Procedia PDF Downloads 348
9357 Convective Brinkman-Forchiemer Extended Flow through Channel Filled with Porous Material: An Approximate Analytical Approach

Authors: Basant K. Jha, M. L. Kaurangini

Abstract:

An approximate analytical solution is presented for convective flow in a horizontal channel filled with porous material. The Brinkman-Forchheimer extension of Darcy equation is utilized to model the fluid flow while the energy equation is utilized to model temperature distribution in the channel. The solutions were obtained utilizing the newly suggested technique and compared with those obtained from an implicit finite-difference solution.

Keywords: approximate analytical, convective flow, porous material, Brinkman-Forchiemer

Procedia PDF Downloads 376
9356 Morphological and Syntactic Meaning: An Interactive Crossword Puzzle Approach

Authors: Ibrahim Garba

Abstract:

This research involved the use of word distributions and morphological knowledge by speakers of Arabic learning English connected different allomorphs in order to realize how the morphology and syntax of English gives meaning through using interactive crossword puzzles (ICP). Fifteen chapters covered with a class of nine learners over an academic year of an intensive English program were reviewed using the ICP. Learners were questioned about how the use of this gaming element enhanced and motivated their learning of English. The findings were positive indicating a successful implementation of ICP both at creational and user levels. This indicated a positive role technology had when learning and teaching English through adopting an interactive gaming element for learning English.

Keywords: distribution, gaming, interactive-crossword-puzzle, morphology

Procedia PDF Downloads 315
9355 Neural Network in Fixed Time for Collision Detection between Two Convex Polyhedra

Authors: M. Khouil, N. Saber, M. Mestari

Abstract:

In this paper, a different architecture of a collision detection neural network (DCNN) is developed. This network, which has been particularly reviewed, has enabled us to solve with a new approach the problem of collision detection between two convex polyhedra in a fixed time (O (1) time). We used two types of neurons, linear and threshold logic, which simplified the actual implementation of all the networks proposed. The study of the collision detection is divided into two sections, the collision between a point and a polyhedron and then the collision between two convex polyhedra. The aim of this research is to determine through the AMAXNET network a mini maximum point in a fixed time, which allows us to detect the presence of a potential collision.

Keywords: collision identification, fixed time, convex polyhedra, neural network, AMAXNET

Procedia PDF Downloads 407
9354 Expatriation Success: Different Perceptions

Authors: Graziele Zwielewski, Suzana R. Tolfo

Abstract:

The globalization of markets, the need to develop competitive advantages and core competencies, among other things, lead organizations to increasingly cross borders to operate in other countries. The expatriation of professionals who go to work in another country besides their own becomes increasingly common. In order to generate data about this issue, research was conducted concerning the perception of expatriate employees concerning expatriation success. The research method used was case study through a qualitative approach. This research was done through interviews with five India expatriates and five China expatriates, interview with expatriate department heads and analysis of company documents. It was found that there are differences between the organizational perception and perception of expatriates of what constitutes mission success. The paper also provides suggestions for further research and suggestions for future expatriates.

Keywords: expatriation success, international assignments, success factors, success for expatriates

Procedia PDF Downloads 338
9353 Fractional Order Differentiator Using Chebyshev Polynomials

Authors: Koushlendra Kumar Singh, Manish Kumar Bajpai, Rajesh Kumar Pandey

Abstract:

A discrete time fractional orderdifferentiator has been modeled for estimating the fractional order derivatives of contaminated signal. The proposed approach is based on Chebyshev’s polynomials. We use the Riemann-Liouville fractional order derivative definition for designing the fractional order SG differentiator. In first step we calculate the window weight corresponding to the required fractional order. Then signal is convoluted with this calculated window’s weight for finding the fractional order derivatives of signals. Several signals are considered for evaluating the accuracy of the proposed method.

Keywords: fractional order derivative, chebyshev polynomials, signals, S-G differentiator

Procedia PDF Downloads 633
9352 A Syntactic Approach to Applied and Socio-Linguistics in Arabic Language in Modern Communications

Authors: Adeyemo Abduljeeel Taiwo

Abstract:

This research is an attempt that creates a conducive atmosphere of a phonological and morphological compendium of Arabic language in Modern Standard Arabic (MSA) for modern day communications. The research is carried out with the chief aim of grammatical analysis of the two broad fields of Arabic linguistics namely: Applied and Socio-Linguistics. It draws a pictorial record of Applied and Socio-Linguistics in Arabic phonology and morphology. Thematically, it postulates and contemplates to a large degree, the theory of concord in contemporary modern Arabic language acquisition. It utilizes an analytical method while it portrays Arabic as a Semitic language that promotes linguistics and syntax among the scholars of the fields.

Keywords: Arabic language, applied linguistics, socio-linguistics, modern communications

Procedia PDF Downloads 312
9351 Migrants and Non Migrants: Class Level Distinctions from a Village Level Analysis of Mahabubnagar District

Authors: T. P. Muhammed Jamsheer

Abstract:

This paper tries to explains some of differences between migrants and non-migrants households by taking ten indicators like land ownership, land distribution, lease in land, lease out land, demand of labour, supply of labour, land operational potential, holding of agriculture implements and livestock’s, irrigation potential of households and credit holding by the households of highly dry, drought affected, poverty stricken, multi caste and pluralistic sub castes village in very backward Mahabubnagar district of Andhra Pradesh. The paper is purely field work based research and conducted census survey of field work among the 298 households in highly dry village called Keppatta from Bhoothpur mandel. One of the main objectives of the paper is that, to find out the factors which differentiate migrants and non-migrants households and what are distress elements which forced the poor peasants migrants to outside the village. It concludes that among the migrants and non-migrants households and among the differences between the categories wise of both types of households, there are differences, except two indicators like lease in and lease out, all other indicators like land holding pattern, demand and supply of labour, land operation, irrigation potential, implements and livestock and credit facilities of migrants and non-migrants households shows that non-migrants have high share than the migrants households. This paper also showing the landed households are more migrants, means among the BC and FC households landed households are migrants while SC landless are more migrants which is contradictory to general/existing literatures conclusion that, landless are more migrant than landed households, here also showing that when the number of land in acres increases the share of SC is declining while the share of FC is increasing among the both migrants and non-migrants households. In the class wise SC households are more in distress situation than any other class and that might be leading to the highest share of migrants from the respective village. In the logistic econometric model to find out the relation between migration and other ten variables, the result shows that supply of labour, lease in of the land and size of the family are statically significantly related with migration and all other variables not significant relation with migration although the theoretical explanation shows the different results.

Keywords: class, migrants, non migrants, economic indicators, distress factors

Procedia PDF Downloads 316
9350 Women and Terrorism in Nigeria: Policy Templates for Addressing Complex Challenges in a Changing Democratic State

Authors: Godiya Pius Atsiya

Abstract:

One of the most devastating impacts of terrorism on the Nigerian state is the danger it has posed on women, children and other vulnerable groups. The complexity of terrorism in Nigeria, especially in most parts of Northern Nigeria has entrenched unprecedented security challenges such as refugee crisis, kidnapping, food shortages, increase in death tolls, malnutrition, fear, rape and several other psychological factors. Of particular interest in this paper as it relates to terrorism is the high rate of Internally Displaced Persons(IDPs), with women, children and the aged being the most affected. Empirical evidence arising from recent development in Nigeria’s North-East geo-political zone shows that large numbers of refugees fleeing the Boko Haram attacks have doubled. The attendant consequences of this mass exodus of people in the affected areas are that the victims now suffer untold and unwarranted economic hardship. In another dimension, recent findings have it that most powerless women and young teenage girls have been forcefully conscripted into the Islamic extremist groups and used as shields. In some respect, these groups of people have been used as available tools for suicide bombing and other criminal tendencies, the result of which can be detrimental to social cohesion and integration. This work is a theoretical insight into terrorism discourses; hence, the paper relies on existing works of scholars in carrying out the research. The paper argues that the implications of terrorism on women gender have grounding effects on the moral psyche of women who are supposed to be home managers and custodians of morality in society. The burden of terrorism and all it tends to propagate has literally upturned social lives and hence, Nigeria is gradually being plunged into the Hobesian state of nature. As a panacea to resolving this social malaise, the paper submits that government and indeed, all stakeholders in the nation’s democratic project must expedite action to nip this trend in the bud. The paper sums up with conclusion and other alternative policy measures to mitigate the challenges of terrorism in Nigeria.

Keywords: changing democratic state, policy measures, terrorism, women

Procedia PDF Downloads 214
9349 Profiling Risky Code Using Machine Learning

Authors: Zunaira Zaman, David Bohannon

Abstract:

This study explores the application of machine learning (ML) for detecting security vulnerabilities in source code. The research aims to assist organizations with large application portfolios and limited security testing capabilities in prioritizing security activities. ML-based approaches offer benefits such as increased confidence scores, false positives and negatives tuning, and automated feedback. The initial approach using natural language processing techniques to extract features achieved 86% accuracy during the training phase but suffered from overfitting and performed poorly on unseen datasets during testing. To address these issues, the study proposes using the abstract syntax tree (AST) for Java and C++ codebases to capture code semantics and structure and generate path-context representations for each function. The Code2Vec model architecture is used to learn distributed representations of source code snippets for training a machine-learning classifier for vulnerability prediction. The study evaluates the performance of the proposed methodology using two datasets and compares the results with existing approaches. The Devign dataset yielded 60% accuracy in predicting vulnerable code snippets and helped resist overfitting, while the Juliet Test Suite predicted specific vulnerabilities such as OS-Command Injection, Cryptographic, and Cross-Site Scripting vulnerabilities. The Code2Vec model achieved 75% accuracy and a 98% recall rate in predicting OS-Command Injection vulnerabilities. The study concludes that even partial AST representations of source code can be useful for vulnerability prediction. The approach has the potential for automated intelligent analysis of source code, including vulnerability prediction on unseen source code. State-of-the-art models using natural language processing techniques and CNN models with ensemble modelling techniques did not generalize well on unseen data and faced overfitting issues. However, predicting vulnerabilities in source code using machine learning poses challenges such as high dimensionality and complexity of source code, imbalanced datasets, and identifying specific types of vulnerabilities. Future work will address these challenges and expand the scope of the research.

Keywords: code embeddings, neural networks, natural language processing, OS command injection, software security, code properties

Procedia PDF Downloads 92
9348 Increasing Holism: Qualitative, Cross-Dimensional Study of Contemporary Innovation Processes

Authors: Sampo Tukiainen, Jukka Mattila, Niina Erkama, Erkki Ormala

Abstract:

During the past decade, calls for more holistic and integrative organizational innovation research have been increasingly voiced. On the one hand, from the theoretical perspective, the reason for this has been the tendency in contemporary innovation studies to focus on disciplinary subfields, often leading to challenges in integrating theories in meaningful ways. For example, we find that during the past three decades the innovation research has evolved into an academic field consisting of several independent research streams, such as studies on organizational learning, project management, and top management teams, to name but a few. The innovation research has also proliferated according to different dimensions of innovation, such as sources, drivers, forms, and the nature of innovation. On the other hand, from the practical perspective the rationale has been the need to develop understanding of the solving of complex, interdisciplinary issues and problems in contemporary and future societies and organizations. Therefore, for advancing theorizing, as well as the practical applicability of organizational innovation research, we acknowledge the need for more integrative and holistic perspectives and approaches. We contribute to addressing this challenge by developing a ‘box transcendent’ perspective to examine interlinkages in and across four key dimensions of organizational innovation processes, which traditionally have been studied in separate research streams. Building on an in-depth, qualitative analysis of 123 interviews of CTOs (or equivalent) and CEOs in top innovative Finnish companies as well as three in-depth case studies, both as part of an EU-level interview study of more than 700 companies, we specify interlinkages in and between i) strategic management, ii) innovation management, iii) implementation and organization, and iv) commercialization, in innovation processes. We contribute to the existing innovation research in multiple ways. Firstly, we develop a cross-dimensional, ‘box transcendent’ conceptual model at the level of organizational innovation process. Secondly, this modeling enables us to extend existing theorizing by allowing us to distinguish specific cross-dimensional innovation ‘profiles’ in two different company categories: large multinational corporations and SMEs. Finally, from the more practical perspective, we consider the implications of such innovation ‘profiles’ for the societal and institutional, policy-making development.

Keywords: holistic research, innovation management, innovation studies, organizational innovation

Procedia PDF Downloads 308
9347 Matter of the Artistic Content of Music (The Symphonies of Jovdat Hajiyev and the Creativity of Fikrat Amirov)

Authors: Vusala Amirbayova Yusif

Abstract:

As we know the formation of new composer’s schools is determined not with the national belonging, but firstly with the development of the national spirit and eternal traditions. The formation of ancient musical traditions with the classical European genre and forms stand in the center of music art with Azerbaijani written tradition. Though this duty is actual for the neighboring eastern countries (for example, Iran, Turkey, Arabian countries, India), it has not been realized in the same level in real creative practice. It is necessary to mention that, the symphonic mughams formed from the joining of Eastern mugham-magam and classical music forms of Western symphony have been greeted with amazement and it was valuable practice in national composer’s art. It is true that, the new examples of the genre were formed in the next years (S.Alasgarov, T.Bakikhanov and etc.) and F.Amirov came back to the genre of symphonic mugham as he created Gulustani-Bayati-Shiraz”in,-1970. New tendency has begun to show itself in the development of national symphonic genre. The new attitude for mugham traditions showed itself in symphonic creative work of A.Malikov, A.Alizada, M.Guliyev,V.Adigozalov. The voice of mugham mentality has entered the depth of the Azerbaijan symphony, has determined the meditation spirit, dramatist process and content. This movement has formed the new notion of “mugham mphonism” with new meaning by our musicologists. In the modern musical science, in addition to traditional methods and procedures, the formation of new theories and approaches caused to the further increase of scientific interest towards the problem of artistic content in the art of composition. The initiative has been made to have overall look on this important subject as an example of the creativity of FikratAmirov (1922-1984)and JovdatHaciyev(1917-2000), the great composers of Azerbaijan and to analyze his some symphonic works from this point of view in the current report. In this connection, main provisions of the new theoretical concept that were comprehensively annotated in the article of Russian musicologist V. Kholopova named "Special and non-special musical content" were used.

Keywords: content, composer, music, mugham symphony

Procedia PDF Downloads 471
9346 Perceptions of Pregnant Women on the Transitional Use of Traditional Medicine in the Transitional District Western Uganda

Authors: Demmiele Matu Kiiza, Constantine Steven Labongo Loum, Julaina Obika Asinasi

Abstract:

Background: The use of traditional medicine in Uganda forms the preliminary therapeutic approaches among many people. Traditional medicines have been used in Uganda for many years, not only for the management of pregnancy-related complications but also for the management of other physical and psychological illnesses. Traditional medicines are always considered the first line of treatment by a considerable number of people. This study, therefore, sought to explore the lived experiences of pregnant women by assessing their perceptions of the transitional use of traditional medicine. Methods: Ethnography was used to capture data from an emic perspective. The ethnographic approach involved visiting a few selected pregnant women to observe and participate in the identification of traditional medicines. The ethnographic fieldwork was carried out within a period of three months. In-depth interviews were carried out and audio recorded and later transcribed verbatim. Data was thereafter analyzed thematically. The thematic analysis involved identifying statements made by research participants by transcribing audio and reading through field notes, coding was done, and themes were generated according to commonly mentioned experiences of using traditional medicine. Results: The findings revealed that women performed a ritual of ‘cutting the cord’ by making a small horizontal incision on the belly across the linea Nigra (also known as a pregnancy line) at around six months of pregnancy to avoid producing a baby with an umbilical cord tied around the baby’s neck. They also used crushed egg shells, crushed snail shells and herbs such as pawpaw roots, Entarahompo (crassocephalum vitelline), Ekyoganyanja (Erlangea tomentose), to manage Omushohokye (a term used by the study participants to refer to a situation where women pass out too much water when giving birth, producing a child with mold and oozing out of a milky liquid through the breasts before giving births); prepare for safe delivery and also to manage pregnancy-related complications. The study recommends the implementation of a traditional medicine use policy using a bottom-up approach. Designing and implementing of culturally sensitive maternal healthcare intervention programs and involving village health teams and the elderly in health education.

Keywords: traditional medicine, pregnant women, uganda, perceptions

Procedia PDF Downloads 56
9345 Human Resource Development and Social Entrepreneurship: A Pan-African Perspective

Authors: Leon C. Prieto, Simone T. A. Phipps

Abstract:

There is a need to promote social entrepreneurship in order to solve some of the complex problems facing various countries in Africa (poverty, unemployment, crime, HIV, etc.). For example, one possible consequence of the HIV/AIDS crisis in Zimbabwe and elsewhere is a deterioration in the educational opportunities for orphans and other vulnerable children. Given that high returns are associated with education, the loss of education for a large segment of the population would likely worsen the already dire economic consequences of the HIV/AIDS crisis. Using a systems approach, this paper argues that social entrepreneurship can be used as a vehicle to promote national human resource development, which will assist in the alleviation of societal ills on the national level as well as throughout Africa.

Keywords: human resource development, pan-african, social entrepreneurship, social enterprise

Procedia PDF Downloads 366
9344 Issues of Accounting of Lease and Revenue according to International Financial Reporting Standards

Authors: Nadezhda Kvatashidze, Elena Kharabadze

Abstract:

It is broadly known that lease is a flexible means of funding enterprises. Lease reduces the risk related to access and possession of assets, as well as obtainment of funding. Therefore, it is important to refine lease accounting. The lease accounting regulations under the applicable standard (International Accounting Standards 17) make concealment of liabilities possible. As a result, the information users get inaccurate and incomprehensive information and have to resort to an additional assessment of the off-balance sheet lease liabilities. In order to address the problem, the International Financial Reporting Standards Board decided to change the approach to lease accounting. With the deficiencies of the applicable standard taken into account, the new standard (IFRS 16 ‘Leases’) aims at supplying appropriate and fair lease-related information to the users. Save certain exclusions; the lessee is obliged to recognize all the lease agreements in its financial report. The approach was determined by the fact that under the lease agreement, rights and obligations arise by way of assets and liabilities. Immediately upon conclusion of the lease agreement, the lessee takes an asset into its disposal and assumes the obligation to effect the lease-related payments in order to meet the recognition criteria defined by the Conceptual Framework for Financial Reporting. The payments are to be entered into the financial report. The new lease accounting standard secures supply of quality and comparable information to the financial information users. The International Accounting Standards Board and the US Financial Accounting Standards Board jointly developed IFRS 15: ‘Revenue from Contracts with Customers’. The standard allows the establishment of detailed revenue recognition practical criteria such as identification of the performance obligations in the contract, determination of the transaction price and its components, especially price variable considerations and other important components, as well as passage of control over the asset to the customer. IFRS 15: ‘Revenue from Contracts with Customers’ is very similar to the relevant US standards and includes requirements more specific and consistent than those of the standards in place. The new standard is going to change the recognition terms and techniques in the industries, such as construction, telecommunications (mobile and cable networks), licensing (media, science, franchising), real property, software etc.

Keywords: assessment of the lease assets and liabilities, contractual liability, division of contract, identification of contracts, contract price, lease identification, lease liabilities, off-balance sheet, transaction value

Procedia PDF Downloads 306
9343 Teaching Business Process Management using IBM’s INNOV8 BPM Simulation Game

Authors: Hossam Ali-Hassan, Michael Bliemel

Abstract:

This poster reflects upon our experiences using INNOV8, IBM’s Business Process Management (BPM) simulation game, in online MBA and undergraduate MIS classes over a period of 2 years. The game is designed to gives both business and information technology players a better understanding of how effective BPM impacts an entire business ecosystem. The game includes three different scenarios: Smarter Traffic, which is used to evaluate existing traffic patterns and re-route traffic based on incoming metrics; Smarter Customer Service where players develop more efficient ways to respond to customers in a call centre environment; and Smarter Supply Chains where players balance supply and demand and reduce environmental impact in a traditional supply chain model. We use the game as an experiential learning tool, where students have to act as managers making real time changes to business processes to meet changing business demands and environments. The students learn how information technology (IT) and information systems (IS) can be used to intelligently solve different problems and how computer simulations can be used to test different scenarios or models based on business decisions without having to actually make the potentially costly and/or disruptive changes to business processes. Moreover, when students play the three different scenarios, they quickly see how practical process improvements can help meet profitability, customer satisfaction and environmental goals while addressing real problems faced by municipalities and businesses today. After spending approximately two hours in the game, students reflect on their experience from it to apply several BPM principles that were presented in their textbook through the use of a structured set of assignment questions. For each final scenario students submit a screenshot of their solution followed by one paragraph explaining what criteria you were trying to optimize, and why they picked their input variables. In this poster we outline the course and the module’s learning objectives where we used the game to place this into context. We illustrate key features of the INNOV8 Simulation Game, and describe how we used them to reinforce theoretical concepts. The poster will also illustrate examples from the simulation, assignment, and learning outcomes.

Keywords: experiential learning, business process management, BPM, INNOV8, simulation, game

Procedia PDF Downloads 319