Search results for: codes of conduct
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 1771

Search results for: codes of conduct

1081 Collision Avoidance Maneuvers for Vessels Navigating through Traffic Separation Scheme

Authors: Aswin V. J., Sreeja S., R. Harikumar

Abstract:

Ship collision is one of the major concerns while navigating in the ocean. In congested sea routes where there are hectic offshore operations, ships are often forced to take close encounter maneuvers. Maritime rules for preventing collision at sea are defined in the International Regulations for Preventing Collision at Sea. Traffic Separation Schemes (TSS) are traffic management route systems ruled by International Maritime Organization (IMO), where the traffic lanes indicate the general direction of traffic flow. The Rule 10 of International Regulations for Preventing Collision at Sea prescribes the conduct of vessels while navigating through TSS. But no quantitative criteria regarding the procedures to detect and evaluate collision risk is specified in International Regulations for Preventing Collision at Sea. Most of the accidents that occur are due to operational errors affected by human factors such as lack of experience and loss of situational awareness. In open waters, the traffic density is less when compared to that in TSS, and hence the vessels can be operated in autopilot mode. A collision avoidance method that uses the possible obstacle trajectories in advance to predict “collision occurrence” and can generate suitable maneuvers for collision avoidance is presented in this paper. The suitable course and propulsion changes that can be used in a TSS considering International Regulations for Preventing Collision at Sea are found out for various obstacle scenarios.

Keywords: collision avoidance, maneuvers, obstacle trajectories, traffic separation scheme

Procedia PDF Downloads 77
1080 A Particle Filter-Based Data Assimilation Method for Discrete Event Simulation

Authors: Zhi Zhu, Boquan Zhang, Tian Jing, Jingjing Li, Tao Wang

Abstract:

Data assimilation is a model and data hybrid-driven method that dynamically fuses new observation data with a numerical model to iteratively approach the real system state. It is widely used in state prediction and parameter inference of continuous systems. Because of the discrete event system’s non-linearity and non-Gaussianity, traditional Kalman Filter based on linear and Gaussian assumptions cannot perform data assimilation for such systems, so particle filter has gradually become a technical approach for discrete event simulation data assimilation. Hence, we proposed a particle filter-based discrete event simulation data assimilation method and took the unmanned aerial vehicle (UAV) maintenance service system as a proof of concept to conduct simulation experiments. The experimental results showed that the filtered state data is closer to the real state of the system, which verifies the effectiveness of the proposed method. This research can provide a reference framework for the data assimilation process of other complex nonlinear systems, such as discrete-time and agent simulation.

Keywords: discrete event simulation, data assimilation, particle filter, model and data-driven

Procedia PDF Downloads 13
1079 Immersive and Interactive Storytelling: Exploring Narratives and Online Multisensory Experience for Cultural Memory and Collective Awareness through Graphic Novel

Authors: Cristina Greco

Abstract:

The spread of the digital and we-based technologies has led to a transformation process, which has coincided with an increase in the number of cases who are beyond the mainstream storytelling and its codes on the interaction with the user. On the base of a previous research on i-docs and virtual museums, this study analyses interactive and immersive online Graphic Novel – one-page, animated, illustrated, and hybrid – to reflect on the transformational implications of this expressive form on the user perception, remembrance, and awareness. The way in which the user experiences a certain level of interaction with the story and immersion in the semantic and figurative universe would bring user’s attention, activating introspection and self-reflection processes, perception, imagination, and creativity. This would have to do with the involvement of different senses – visual, proprioceptive, tactile, auditory, and vestibular – and the activation of a phenomenon of synaesthesia (involuntary cross-modal sensory association) – where, for example, the aural reconnect the user to another sense, providing a multisensory experience. The case studies show specific forms of interactive and immersive graphic novel and reflect on application that has sought to engage innovative ways to communicate different messages and stimulate cultural memory and collective awareness. The visual semiotic and narrative analysis of the distinctive traits of such a complex textuality, along with a study of the user’s experience through observation in naturalistic settings and interviews, allows us to question the functioning of these configurations, with regard to the relationships between the figurative dimension, the perceptive activity, and their impact on the user’s engagement.

Keywords: collective awareness, cultural memory, graphic novel, interactive and immersive storytelling

Procedia PDF Downloads 149
1078 Community Based Disaster Risk Reduction in Mizoram, India

Authors: Lalrokima Chenkual

Abstract:

Legal provision and various guidelines issued by the National Disaster Management Authority in India strives for setting up of disaster management authority from the central government to the district level. Community-Based Disaster Risk Reduction practice is still relevant as the communities are the victim as well as the first responder in any incidents. The primary goal of Community Based Disaster Risk Reduction is to reduce vulnerability of the concerned community and strengthen its existing capacity to cope with disaster. By involving the community in the preparedness phase, it not only increases the likelihood of coordinated action by the communities to help in mitigating disasters and lessening the impact of disaster but also brings the community together to address the issue collectively. Community participation ensures local ownership, addresses local needs, and promotes volunteerism and mutual help to prevent and minimise damage. Community-Based Disaster Risk Reduction is very much relevant for Mizoram as the society is closed knit, population is very less, religion homogeneity i.e Christianity, very active and widespread community-based organization viz, Young Mizo Association, MHIP (Women Federation), MUP (Elders Clubs which are guided together by Mizo code of morals conduct termed as Tlawmngaihna.

Keywords: community, close-knit, first responder, Tlawmngaihna

Procedia PDF Downloads 142
1077 An Edusemiotic Approach to Multimodal Poetry Teaching for Afrikaans

Authors: Kruger Uys

Abstract:

Poetry analysis plays a vital role in promoting critical thinking, literary appreciation, and language skills among learners. This paper proposes an innovative multimodal teaching approach that combines traditional textual analysis of poems with multimodal educational semiotic analysis of animated poetry films. The aim is to present a methodological framework through which poetry concepts and elements, along with the visual and auditory components in animated poetry films, can be comprehensively illuminated. Traditional textual analysis involves close reading, linguistic examination, and thematic exploration to identify, discuss, and apply poetry concepts. When combined with a multimodal edusemiotic analysis of the semiotic signs and codes present in animated poetry films, new perspectives emerge that enrich the interpretation of poetry. Furthermore, the proposed integrated approach, as prescribed by CAPS, enhances a holistic understanding of poetry terminology and elements, as well as complex linguistic and visual patterns that promote visual literacy, refined data interpretation skills, and learner engagement in the poetry classroom. To illustrate this phenomenon, the poem My mamma is bossies (My mom’s bonkers) by Jeanne Goosen (prescribed for Grade 10 Afrikaans Home Language learners in the CAPS curriculum) will be discussed. This study aims to contribute to the existing Afrikaans poetry curriculum but also equip all language educators to cultivate poetry appreciation, critical thinking, and creativity among learners in the ever-evolving landscape of education.

Keywords: edusemiotics, multimodality, poetry education, animated poetry films

Procedia PDF Downloads 24
1076 Ethical Consumers, The Myth or the Reality?: The Effects of Ethics in CSR on Corporate Authenticity and Pro-Firm Behaviours

Authors: K. Shim, J. N. Kim

Abstract:

This study investigates how consumers’ evaluations of a multinational corporation’s corporate social responsibility program connected to the perceived corporate authenticity and consumers’ pro-firm behavioral intention. With special attention to the two different types of CSR motives, business-oriented CSR motive and society-oriented motive, the current study empirically tests a theoretical model of a mediating role of corporate authenticity between perception of CSR motives and the consumers’ subsequent pro-firm behaviours. Results indicate significant mediation effects of corporate authenticity between perception of altruistic and societal CSR motives and consumers’ pro-firm behaviours. Unlike previous notions of the negative influence of self-interested motives on corporate authenticity, perceived strategic and business-oriented motives in CSR does not negatively affect the evalution of corporate authenticity when stakeholders have utilitarian ethical perspectives. Unlike the Korean participants, US participants are not willing to conduct pro-firm behaviors when they perceive strategic and business-oriented CSR motives. Theoretical and practical implications are discussed.

Keywords: corporate authenticity, corporate social responsibility, CSR motives, strategic CSR, utilitarian ethics, kantian ethics

Procedia PDF Downloads 483
1075 Strengthening the Rights of Persons with Disabilities in the Gulf Cooperation Council: Shafallah Foundation as a Model

Authors: Osman Mohamed

Abstract:

Over the past two decades, the global interest in the rights of persons with disabilities (PWDs) has increased that resulted in the United Nations Convention on the Rights of Persons with Disabilities (UNCRPWDs). In this regard, the Gulf States have witnessed remarkable efforts towards strengthening the rights of persons with disabilities, including enactment of laws and establishment of specialized government councils for the Persons with Disabilities. This study aims to highlight the efforts of Shafallah Foundation in strengthening the rights of persons with disabilities as a model for the Gulf States. The researcher will conduct interviews with officials at Shafallah Foundation, some persons with disabilities who have benefited from the Foundation's programmes, officials from government agencies related to Persons with disabilities. The study is expected to reveal the role of Shafallah Foundation in implementing the UNCRPWDs through its programmes and activities as well as an overview of the situation of the rights of PWDs in the Gulf States. The study is important for stakeholders, decision-makers, policy-makers, academics, and the disability’s organizations.

Keywords: GCC, Gulf Cooperation Council, Shafallah Foundation, UNCRPWDs, United Nations Convention on the Rights of Persons with Disabilities, PWDs, persons with disabilities

Procedia PDF Downloads 200
1074 Design and Radio Frequency Characterization of Radial Reentrant Narrow Gap Cavity for the Inductive Output Tube

Authors: Meenu Kaushik, Ayon K. Bandhoyadhayay, Lalit M. Joshi

Abstract:

Inductive output tubes (IOTs) are widely used as microwave power amplifiers for broadcast and scientific applications. It is capable of amplifying radio frequency (RF) power with very good efficiency. Its compactness, reliability, high efficiency, high linearity and low operating cost make this device suitable for various applications. The device consists of an integrated structure of electron gun and RF cavity, collector and focusing structure. The working principle of IOT is a combination of triode and klystron. The cathode lies in the electron gun produces a stream of electrons. A control grid is placed in close proximity to the cathode. Basically, the input part of IOT is the integrated structure of gridded electron gun which acts as an input cavity thereby providing the interaction gap where the input RF signal is applied to make it interact with the produced electron beam for supporting the amplification phenomena. The paper presents the design, fabrication and testing of a radial re-entrant cavity for implementing in the input structure of IOT at 350 MHz operating frequency. The model’s suitability has been discussed and a generalized mathematical relation has been introduced for getting the proper transverse magnetic (TM) resonating mode in the radial narrow gap RF cavities. The structural modeling has been carried out in CST and SUPERFISH codes. The cavity is fabricated with the Aluminum material and the RF characterization is done using vector network analyzer (VNA) and the results are presented for the resonant frequency peaks obtained in VNA.

Keywords: inductive output tubes, IOT, radial cavity, coaxial cavity, particle accelerators

Procedia PDF Downloads 124
1073 Preparation Non-Woven Nanofiber Structures for Uniform and Rapid Drug Releasing Applications Using an Electrospinning Process

Authors: Cho-Liang Chung

Abstract:

Uniform and rapid drug release are important for trauma dressing application. Low glass transition polymer system and non-woven nanofiber structures as the designs conduct rapid-release characteristics. In this study, polyvinylpyrrolidone, polysulfone, and polystyrene were dissolved in dimethylformamide to form precursor solution. These solutions were blended with vitamin C to form the electrospinning solutions. The non-woven nanofibers structures were successfully prepared using an electrospinning process. The following instruments were used to analyze the characteristics of non-woven nanofibers structures: Atomic force microscopy (AFM), Field Emission Scanning Electron Microscope (FE-SEM), and X-ray Diffraction (XRD). The AFM was used to scan the nanofibers. 3D Graphics were applied to explore the surface morphology of nanofibers. FE-SEM was used to explore the morphology of non-woven structures. XRD was used to identify crystal structures in the non-woven structures. The evolution of morphology of non-woven structures was changed dramatically in different durations, because of the moisture absorption and decreasing glass transition temperature; the non-woven nanofiber structures can be applied to uniform and rapid drug release for trauma dressing application.

Keywords: nanofibers, non-woven, electrospinning process, rapid drug releasing

Procedia PDF Downloads 138
1072 Migratory Trajectory of Transnational Street Beggars in South Western, Nigeria

Authors: Usman Adekunle Ojedokun, Adeyinka Abideen Aderinto

Abstract:

Migration remains an important course of action often resort-to by human and some other classes of animal for survival in the face of life-threatening conditions. However, the activity of certain group of immigrants, who are exploiting the socio-economic and environmental challenges in their home countries to conduct street begging across different countries in Africa, is fast becoming a major cause for concern. This paper examined the migratory trajectory of transnational street beggars in South Western, Nigeria. Strain and Migration Network Theories were adopted for the study. The methods of data collection were survey questionnaire, in-depth interview, and key informant interview. Convenience and purposive sampling techniques were employed for the selection of 395 transnational street beggars and 4 key informants were purposively chosen. Findings revealed that transnational street beggars immigrated into Nigeria all year round and all of them came by road. Also, while some of them entered the country officially, others gained entry illegally. The majority (29.3%) arrived through Sokoto, a border State to some neighbouring countries. This study calls for more security measures at the Nigerian borders as a way of controlling the influx of this category of beggars into the country.

Keywords: transnational street beggars, street begging, migration, Nigeria

Procedia PDF Downloads 261
1071 Error Detection and Correction for Onboard Satellite Computers Using Hamming Code

Authors: Rafsan Al Mamun, Md. Motaharul Islam, Rabana Tajrin, Nabiha Noor, Shafinaz Qader

Abstract:

In an attempt to enrich the lives of billions of people by providing proper information, security and a way of communicating with others, the need for efficient and improved satellites is constantly growing. Thus, there is an increasing demand for better error detection and correction (EDAC) schemes, which are capable of protecting the data onboard the satellites. The paper is aimed towards detecting and correcting such errors using a special algorithm called the Hamming Code, which uses the concept of parity and parity bits to prevent single-bit errors onboard a satellite in Low Earth Orbit. This paper focuses on the study of Low Earth Orbit satellites and the process of generating the Hamming Code matrix to be used for EDAC using computer programs. The most effective version of Hamming Code generated was the Hamming (16, 11, 4) version using MATLAB, and the paper compares this particular scheme with other EDAC mechanisms, including other versions of Hamming Codes and Cyclic Redundancy Check (CRC), and the limitations of this scheme. This particular version of the Hamming Code guarantees single-bit error corrections as well as double-bit error detections. Furthermore, this version of Hamming Code has proved to be fast with a checking time of 5.669 nanoseconds, that has a relatively higher code rate and lower bit overhead compared to the other versions and can detect a greater percentage of errors per length of code than other EDAC schemes with similar capabilities. In conclusion, with the proper implementation of the system, it is quite possible to ensure a relatively uncorrupted satellite storage system.

Keywords: bit-flips, Hamming code, low earth orbit, parity bits, satellite, single error upset

Procedia PDF Downloads 130
1070 Definition and Core Components of the Role-Partner Allocation Problem in Collaborative Networks

Authors: J. Andrade-Garda, A. Anguera, J. Ares-Casal, M. Hidalgo-Lorenzo, J.-A. Lara, D. Lizcano, S. Suárez-Garaboa

Abstract:

In the current constantly changing economic context, collaborative networks allow partners to undertake projects that would not be possible if attempted by them individually. These projects usually involve the performance of a group of tasks (named roles) that have to be distributed among the partners. Thus, an allocation/matching problem arises that will be referred to as Role-Partner Allocation problem. In real life this situation is addressed by negotiation between partners in order to reach ad hoc agreements. Besides taking a long time and being hard work, both historical evidence and economic analysis show that such approach is not recommended. Instead, the allocation process should be automated by means of a centralized matching scheme. However, as a preliminary step to start the search for such a matching mechanism (or even the development of a new one), the problem and its core components must be specified. To this end, this paper establishes (i) the definition of the problem and its constraints, (ii) the key features of the involved elements (i.e., roles and partners); and (iii) how to create preference lists both for roles and partners. Only this way it will be possible to conduct subsequent methodological research on the solution method.     

Keywords: collaborative network, matching, partner, preference list, role

Procedia PDF Downloads 233
1069 Chinese Vocabulary Acquisition and Mobile Assisted Language Learning

Authors: Yuqing Sun

Abstract:

Chinese has been regarded as one of the most difficult languages in learning due to its complex spelling structure, difficult pronunciation, as well as its varying forms. Since vocabulary acquisition is the basic process to acquire a language, to express yourself, to compose a sentence, and to conduct a communication, so learning the vocabulary is of great importance. However, the vocabulary contains pronunciation, spelling, recognition and application which may seem as a huge work. This may pose a question for the language teachers (language teachers in China who teach Chinese to the foreign students): How to teach them in an effective way? Traditionally, teachers have no choice but teach it all by themselves, then with the development of technology, they can use computer as a tool to help them (Computer Assisted Language Learning or CALL). Now, they move into the Mobile Assisted Language Learning (MALL) method to guide their teaching, upon which the appraisal is convincing. It diversifies the learning material and the way of output, which can activate learners’ curiosity and accelerate their understanding. This paper will focus on actual case studies occurring in the universities in China of teaching the foreign students to learn Chinese, and the analysis of the utilization of WeChat channel as an example of MALL model to explore the active role of MALL to enhance the effectiveness of Chinese vocabulary acquisition.

Keywords: Chinese, vocabulary acquisition, MALL, case

Procedia PDF Downloads 414
1068 Analyzing the Impact of Code Commenting on Software Quality

Authors: Thulya Premathilake, Tharushi Perera, Hansi Thathsarani, Tharushi Nethmini, Dilshan De Silva, Piyumika Samarasekara

Abstract:

One of the most efficient ways to assist developers in grasping the source code is to make use of comments, which can be found throughout the code. When working in fields such as software development, having comments in your code that are of good quality is a fundamental requirement. Tackling software problems while making use of programs that have already been built. It is essential for the intention of the source code to be made crystal apparent in the comments that are added to the code. This assists programmers in better comprehending the programs they are working on and enables them to complete software maintenance jobs in a more timely manner. In spite of the fact that comments and documentation are meant to improve readability and maintainability, the vast majority of programmers place the majority of their focus on the actual code that is being written. This study provides a complete and comprehensive overview of the previous research that has been conducted on the topic of code comments. The study focuses on four main topics, including automated comment production, comment consistency, comment classification, and comment quality rating. One is able to get the knowledge that is more complete for use in following inquiries if they conduct an analysis of the proper approaches that were used in this study issue.

Keywords: code commenting, source code, software quality, quality assurance

Procedia PDF Downloads 84
1067 Educating on Historic Preservation in the Alabama Gulf Coast: The Case of the Peninsula of Mobile

Authors: Asmaa Benbaba

Abstract:

A series of action plans motivated this work within the city of mobile as the big category and the Peninsula more particularly. Most of the projects sought to educate about the historical and environmental assets of the place, to improve aesthetics, to preserve the natural resources on the Bayou, spread awareness, and reach out to the community. This study was conducted to preserve significant heritage landscapes, and significant historic buildings in the neighborhood of the Peninsula of Mobile at the state of Alabama, while simultaneously strengthen the cultural and historical resources. The purpose of this planning action was to provide planning regulations for the suburban areas of Mobile in Alabama. The plan attempted to overlap three main layers: community, environment, and history. The method that was used to collect data and conduct research was mainly qualitative. The Geographic Information System (GIS) was the tool used to represent this complexity. Results from this study revealed several interventions made to 'neighborhood marina.' The interventions were strategic scenarios to preserve the water landscape, create affordable leisure, connect the Dauphin Island Parkway to the water, preserve all the environmental layers, and add value to the neighborhoods of the Peninsula.

Keywords: community outreach, education, historic preservation, peninsula

Procedia PDF Downloads 136
1066 Environmental Evaluation of Two Kind of Drug Production (Syrup and Pomade Form) Using Life Cycle Assessment Methodology

Authors: H. Aksas, S. Boughrara, K. Louhab

Abstract:

The goal of this study was the use of life cycle assessment (LCA) methodology to assess the environmental impact of pharmaceutical product (four kinds of syrup form and tree kinds of pomade form), which are produced in one leader manufactory in Algeria town that is SAIDAL Company. The impacts generated have evaluated using SimpaPro7.1 with CML92 Method for syrup form and EPD 2007 for pomade form. All impacts evaluated have compared between them, with determination of the compound contributing to each impacts in each case. Data needed to conduct Life Cycle Inventory (LCI) came from this factory, by the collection of theoretical data near the responsible technicians and engineers of the company, the practical data are resulting from the assay of pharmaceutical liquid, obtained at the laboratories of the university. This data represent different raw material imported from European and Asian country necessarily to formulate the drug. Energy used is coming from Algerian resource for the input. Outputs are the result of effluent analysis of this factory with different form (liquid, solid and gas form). All this data (input and output) represent the ecobalance.

Keywords: pharmaceutical product, drug residues, LCA methodology, environmental impacts

Procedia PDF Downloads 246
1065 The Corporate Vision Effect on Rajabhat University Brand Building in Thailand

Authors: Pisit Potjanajaruwit

Abstract:

This study aims to (1) investigate the corporate vision factor influencing Rajabhat University brand building in Thailand and (2) explore influences of brand building upon Rajabhat University stakeholders’ loyalty, and the research method will use mixed methods to conduct qualitative research with the quantitative research. The qualitative will approach by Indebt-interview the executive of Rathanagosin Rajabhat University group for 6 key informants and the quantitative data was collected by questionnaires distributed to stakeholder including instructors, staff, students and parents of the Rathanagosin Rajabhat University group for 400 sampling were selected by multi-stage sampling method. Data was analyzed by Structural Equation Modeling: SEM and also provide the focus group interview for confirming the model. Findings corporate vision had a direct and positive influence on Rajabhat University brand building were showed direct and positive influence on stakeholder’s loyalty and stakeholder’s loyalty was indirectly influenced by corporate vision through Rajabhat University brand building.

Keywords: brand building, corporate vision, Rajabhat University, stakeholder‘s loyalty

Procedia PDF Downloads 215
1064 A Site Unexplored: Recently Discovered In Bangladesh

Authors: Md. Rifat-Ur- Rahman

Abstract:

Dhamairnagar, Sirajganj, Bangladesh, local villagers describe the peculiar mounds spotted scattered among the nearby villages as “Buruj”. Among these, a mound was explored in one of these mounds, in Khirtala village, in early 2019. Primary archaeological surveys and map making has been conducted in this site, where suspect lays the remains of an 8 square miles city, at least 1200 years old. In the government gazettes of Bangladesh from 1990, this place has been linked with a mythical kind from the Indian epic, Mahabharata. In the primary explorations, found bricks, mortars, different kinds of potteries and terracotta pieces. Assumable observation is that this city was a flourishing establishment during the early Pala dynasty of Bengal (800 AD to 1200 AD). At present there are four indigenous groups live around this site and they are known as Mahato, Teli, Oraon and Santals. These four indigenous groups are considered as the core four of Bengali ethnicity. In the folklore of these groups we find stories of ancient kingdoms which have not been documented through archaeological findings yet. So, a question rises about the population that was used to reside in this archaeological site. Were they the ancestors of these indigenous tribes that are dwelling in this area? With such primary information, the aim is to conduct a comparative study of the physiology; osteology and cultural practices of this civilization.

Keywords: Archaeology, Heritage, Indigenous Peoples, Physiology

Procedia PDF Downloads 136
1063 Experimental Investigation of Damaged Reinforced Concrete Beams Repaired with Carbon Fibre Reinforced Polymer (CFRP) Strip under Impact Loading

Authors: M. Al-Farttoosi, M. Y. Rafiq, J. Summerscales, C. Williams

Abstract:

Many buildings and bridges are damaged due to impact loading, explosions, terrorist attacks and wars. Most of the damaged structures members such as beams, columns and slabs are not totally failed and it can be repaired. Nowadays, carbon fibre reinforced polymer CFRP has been wildly used in strengthening and retrofitting the structures members. CFRP can rector the load carrying capacity of the damaged structures members to make them serviceable. An experimental investigation was conducted to investigate the impact behaviour of the damaged beams repaired with CFRP. The tested beams had different degrees of damage and near surface mounted technique NSM was used to install the CFRP. A heavy drop weight impact test machine was used to conduct the experimental work. The study investigated the impact strength, stiffness, cracks and deflection of the CFRP repaired beams. The results show that CFRP significantly increased the impact resistance of the damaged beams. CFRP increased the damaged beams stiffness and reduced the deflection. The results showed that the NSM technique is more effective in repairing beams and preventing the debonding of the CFRP.

Keywords: damaged, concrete, impact, repaired

Procedia PDF Downloads 344
1062 Measurement of Susceptibility Users Using Email Phishing Attack

Authors: Cindy Sahera, Sarwono Sutikno

Abstract:

Rapid technological developments also have negative impacts, namely the increasing criminal cases based on technology or cybercrime. One technique that can be used to conduct cybercrime attacks are phishing email. The issue is whether the user is aware that email can be misused by others so that it can harm the user's own? This research was conducted to measure the susceptibility of selected targets against email abuse. The objectives of this research are measurement of targets’ susceptibility and find vulnerability in email recipient. There are three steps being taken in this research, (1) the information gathering phase, (2) the design phase, and (3) the execution phase. The first step includes the collection of the information necessary to carry out an attack on a target. The next step is to make the design of an attack against a target. The last step is to send phishing emails to the target. The levels of susceptibility are three: level 1, level 2 and level 3. Level 1 indicates a low level of targets’ susceptibility, level 2 indicates the intermediate level of targets’ susceptibility, and level 3 indicates a high level of targets’ susceptibility. The results showed that users who are on level 1 and level 2 more that level 3, which means the user is not too careless. However, it does not mean the user to be safe. There are still vulnerabilities that may occur, such as automatic location detection when opening emails and automatic downloaded malware as user clicks a link in the email.

Keywords: cybercrime, email phishing, susceptibility, vulnerability

Procedia PDF Downloads 287
1061 Sexual Violence against Men in Conflicts: A Neglected Serious Issue

Authors: Olalekan Olaluwoye, Joanne Williams, Elizabeth Hoban, Sonia Brockington

Abstract:

Cases of sexual violence against men have been reported in at least twenty-five conflict situations in history. However, there is a paucity of academic literature and minimal media, policy and legal discussions on sexual violence against men. Most studies and discussions remain locked in the ‘male perpetrators, female victims’ paradigm. Male victims continue to suffer the consequences of sexual violence in conflict and post-conflict settings in silence. A rigorous narrative systematic review of the literature revealed few studies on the subject and those that exist have a narrow focus on rape as the only form of sexual violence despite the existence of other forms of sexual violence that have equally devastating effects. This paper argues that while research and discussions on sexual violence against women should continue, it is time to conduct rigorous mixed methods research to understand the experiences of men and boys survivors of sexual violence. There is a need to study sexual violence more broadly, without limiting it to rape, and to understand the determinants and health implications of sexual violence perpetrated on men. The paper concludes by proposing a research approach that gives voice to the experiences of male survivors of sexual violence in conflict and post-conflict settings.

Keywords: conflict, male survivors, post-conflict settings, sexual violence

Procedia PDF Downloads 151
1060 Methods of Improving Production Processes Based on Deming Cycle

Authors: Daniel Tochwin

Abstract:

Continuous improvement is an essential part of effective process performance management. In order to achieve continuous quality improvement, each organization must use the appropriate selection of tools and techniques. The basic condition for success is a proper understanding of the business need faced by the company and the selection of appropriate methods to improve a given production process. The main aim of this article is to analyze the methods of conduct which are popular in practice when implementing process improvements and then to determine whether the tested methods include repetitive systematics of the approach, i.e., a similar sequence of the same or similar actions. Based on an extensive literature review, 4 methods of continuous improvement of production processes were selected: A3 report, Gemba Kaizen, PDCA cycle, and Deming cycle. The research shows that all frequently used improvement methods are generally based on the PDCA cycle, and the differences are due to "(re)interpretation" and the need to adapt the continuous improvement approach to the specific business process. The research shows that all the frequently used improvement methods are generally based on the PDCA cycle, and the differences are due to "(re) interpretation" and the need to adapt the continuous improvement approach to the specific business process.

Keywords: continuous improvement, lean methods, process improvement, PDCA

Procedia PDF Downloads 80
1059 Accuracy of VCCT for Calculating Stress Intensity Factor in Metal Specimens Subjected to Bending Load

Authors: Sanjin Kršćanski, Josip Brnić

Abstract:

Virtual Crack Closure Technique (VCCT) is a method used for calculating stress intensity factor (SIF) of a cracked body that is easily implemented on top of basic finite element (FE) codes and as such can be applied on the various component geometries. It is a relatively simple method that does not require any special finite elements to be used and is usually used for calculating stress intensity factors at the crack tip for components made of brittle materials. This paper studies applicability and accuracy of VCCT applied on standard metal specimens containing trough thickness crack, subjected to an in-plane bending load. Finite element analyses were performed using regular 4-node, regular 8-node and a modified quarter-point 8-node 2D elements. Stress intensity factor was calculated from the FE model results for a given crack length, using data available from FE analysis and a custom programmed algorithm based on virtual crack closure technique. Influence of the finite element size on the accuracy of calculated SIF was also studied. The final part of this paper includes a comparison of calculated stress intensity factors with results obtained from analytical expressions found in available literature and in ASTM standard. Results calculated by this algorithm based on VCCT were found to be in good correlation with results obtained with mentioned analytical expressions.

Keywords: VCCT, stress intensity factor, finite element analysis, 2D finite elements, bending

Procedia PDF Downloads 305
1058 BROTHERS: World-class Ergonomic Sofa Development

Authors: Aminur Rahman

Abstract:

The Unique feature of BROTHERS Furniture sofa stands in ergonomic Design, skilled hand work and art work. Present world market is passing through a contentious competitive situation that is rapidly and dramatic. Competitive strategy concerns how to create competitive advantage in upholstery businesses. In order to competitive advantage in upholstery sofa market, Design and develop a sofa that have to ergonomic features. Design an ergonomic upholstery sofa knowing and understanding the appropriate seat depth, seat height, angle between Seat & back, back height which is concurrent market demand, world class sofa has to incorporate ergonomic factors. The study the relationships between human, seat and context variables comfort and discomfort. We must have conduct market survey among users whose are need and use sofa. Health & safety factors should be examined from a variety of angle. An attractive design and meet customer requirements, ergonomically fit should be considered for sofa development. This paper will explain how to design & develop sofa’s as per standard specifications which have ergonomic features for users all over the world.

Keywords: ergonomics, angle between seat & back, standard dimension, seat comfort

Procedia PDF Downloads 138
1057 Evaluation of Firearm Injury Syndromic Surveillance in Utah

Authors: E. Bennion, A. Acharya, S. Barnes, D. Ferrell, S. Luckett-Cole, G. Mower, J. Nelson, Y. Nguyen

Abstract:

Objective: This study aimed to evaluate the validity of a firearm injury query in the Early Notification of Community-based Epidemics syndromic surveillance system. Syndromic surveillance data are used at the Utah Department of Health for early detection of and rapid response to unusually high rates of violence and injury, among other health outcomes. The query of interest was defined by the Centers for Disease Control and Prevention and used chief complaint and discharge diagnosis codes to capture initial emergency department encounters for firearm injury of all intents. Design: Two epidemiologists manually reviewed electronic health records of emergency department visits captured by the query from April-May 2020, compared results, and sent conflicting determinations to two arbiters. Results: Of the 85 unique records captured, 67 were deemed probable, 19 were ruled out, and two were undetermined, resulting in a positive predictive value of 75.3%. Common reasons for false positives included non-initial encounters and misleading keywords. Conclusion: Improving the validity of syndromic surveillance data would better inform outbreak response decisions made by state and local health departments. The firearm injury definition could be refined to exclude non-initial encounters by negating words such as “last month,” “last week,” and “aftercare”; and to exclude non-firearm injury by negating words such as “pellet gun,” “air gun,” “nail gun,” “bullet bike,” and “exit wound” when a firearm is not mentioned.

Keywords: evaluation, health information system, firearm injury, syndromic surveillance

Procedia PDF Downloads 166
1056 The Effect Study of Meditation Music in the Elderly

Authors: Metee Pigultong

Abstract:

The research aims at 1) composition of meditation music, 2) study of the meditation time reliability. The population is the older adults who meditated practitioners in the Thepnimitra Temple, Don Mueang District, Bangkok. The sample group was the older persons who meditated practitioners from the age of 60 with five volunteers. The research methodology was time-series to conduct the research progression. The research instruments included: 1) meditation music, 2) brain wave recording form. The research results found that 1) the music combines the binaural beats suitable for the meditation of the older persons, consisting of the following features: a) The tempo rate of the meditation music is no more than 60 beats per minute. b) The musical instruments for the meditation music arrangement include only 4-5 pieces. c) The meditation music arrangement needs to consider the nature of the right instrument. d) Digital music instruments are suitable for composition. e) The pure-tone sound combined in music must generate a brain frequency at the level of 10 Hz. 2) After the researcher conducted a 3-weeks brain training procedure, the researcher performed three tests for the reliability level using Cronbach's Alpha method. The result showed that the meditation reliability had the level = .475 as a moderate concentration.

Keywords: binaural beats, music therapy, meditation, older person, the Buddhist meditated practitioners

Procedia PDF Downloads 191
1055 Aspect-Level Sentiment Analysis with Multi-Channel and Graph Convolutional Networks

Authors: Jiajun Wang, Xiaoge Li

Abstract:

The purpose of the aspect-level sentiment analysis task is to identify the sentiment polarity of aspects in a sentence. Currently, most methods mainly focus on using neural networks and attention mechanisms to model the relationship between aspects and context, but they ignore the dependence of words in different ranges in the sentence, resulting in deviation when assigning relationship weight to other words other than aspect words. To solve these problems, we propose a new aspect-level sentiment analysis model that combines a multi-channel convolutional network and graph convolutional network (GCN). Firstly, the context and the degree of association between words are characterized by Long Short-Term Memory (LSTM) and self-attention mechanism. Besides, a multi-channel convolutional network is used to extract the features of words in different ranges. Finally, a convolutional graph network is used to associate the node information of the dependency tree structure. We conduct experiments on four benchmark datasets. The experimental results are compared with those of other models, which shows that our model is better and more effective.

Keywords: aspect-level sentiment analysis, attention, multi-channel convolution network, graph convolution network, dependency tree

Procedia PDF Downloads 217
1054 Embarrassment as a Trigger Factor of Code Switching From Arabic to English in Egypt: A Case Study in Sociolinguistic

Authors: Samar Mohamed Magdy Abdelrahim

Abstract:

This study is an attempt to investigate the phenomenon of code-switching that takes place between Arabic and English in social discourse among high, well-educated, and young people in Egypt. The study aims at digging deeper to extract the trigger factors of such occurrences, namely when people encounter embarrassing situations in their daily conversations. Nowadays, most young Egyptians tend to use English words in certain situations that might make them feel embarrassed. To disguise their feelings and soften the impact of these words in the context, they code-switch (CS) from Arabic into English. To obtain accurate results, the study utilized a quantitative analysis approach that combines personal observations and a questionnaire to examine the phenomenon appropriately. The questionnaire was designed to categorize different types of embarrassing topics to be evaluated by participants. These topics include certain parts of the human body, types of clothes, taboo words, and specific medical conditions. Many studies have examined the use of CS as a prestigious way of communicating and expressing solidarity between Arabic and English. Other studies have dealt with switches that take place in classrooms. However, not many studies have paid attention to this angle of CS, especially in Egypt. The results conclude that gender and the circumstances that surround the conversation are essential factors of CS since females tend to switch codes more than males in embarrassing situations. According to the study, CS serves the socio-pragmatic function in terms of helping young, well-educated bilinguals express themselves in a second language that would be distressing in the first.

Keywords: code-switching, embarrassment, Arabic, English

Procedia PDF Downloads 97
1053 Reliability Based Analysis of Multi-Lane Reinforced Concrete Slab Bridges

Authors: Ali Mahmoud, Shadi Najjar, Mounir Mabsout, Kassim Tarhini

Abstract:

Empirical expressions for estimating the wheel load distribution and live-load bending moment are typically specified in highway bridge codes such as the AASHTO procedures. The purpose of this paper is to analyze the reliability levels that are inherent in reinforced concrete slab bridges that are designed based on the simplified empirical live load equations in the AASHTO LRFD procedures. To achieve this objective, bridges with multi-lanes (three and four lanes) and different spans are modeled using finite-element analysis (FEA) subjected to HS20 truck loading, tandem loading, and standard lane loading per AASHTO LRFD procedures. The FEA results are compared with the AASHTO LRFD moments in order to quantify the biases that might result from the simplifying assumptions adopted in AASHTO. A reliability analysis is conducted to quantify the reliability index for bridges designed using AASHTO procedures. To reach a consistent level of safety for three- and four-lane bridges, following a previous study restricted to one- and two-lane bridges, the live load factor in the design equation proposed by AASHTO LRFD will be assessed and revised if needed by alternating the live load factor for these lanes. The results will provide structural engineers with more consistent provisions to design concrete slab bridges or evaluate the load-carrying capacity of existing bridges.

Keywords: reliability analysis of concrete bridges, finite element modeling, reliability analysis, reinforced concrete bridge design, load carrying capacity

Procedia PDF Downloads 340
1052 Children with Autistic Spectrum Disorders in Co-Taught Classes in Greece: Teachers’ View

Authors: Tryfon Mavropalias, Anastasia Alevriadou

Abstract:

Co-teaching is a relatively recent model of providing teaching services to students with disabilities in Greece. According to recent studies, it seems that the largest number of students who take part in the Greek co-teaching programme are children with Autistic Spectrum Disorders (ASD). The aim of the suggested study is to investigate the effectiveness and usefulness of co-teaching to students with ASD as well as skills students with ASD develop during co-teaching in primary education classes. To conduct the research, quantitative method of research was used, with the means of research being a questionnaire including open and close type questions. The sample of this research consists of 142 primary school co-teachers from all over Northern Greece (71 general education teachers and 71 special education teachers). Given the results, it was concluded that co-teachers believe that including and educating children with Autistic Spectrum Disorders in the general class benefits those who autism is measured from the middle to the upper end of the spectrum. Additionally, children develop social skills first, followed by emotional and cognitive skills. Ultimately, educators declared that they are prepared only to a limited degree to effectively support students with Autistic Spectrum Disorders in general classes.

Keywords: Autistic spectrum disorders, co-teaching, co-teachers, co-taught class

Procedia PDF Downloads 359