Search results for: document similarity
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 1389

Search results for: document similarity

699 Properties of Bacterial Nanocellulose for Scenic Arts

Authors: Beatriz Suárez López, Gabriela Forman

Abstract:

Kombucha (a symbiotic culture of bacteria and yeast) produces material capable of acquiring multiple shapes and textures that change significantly under different environment or temperature variations (e.g., when it is exposed to wet conditions), properties that may be explored in the scenic industry. This paper presents an analysis of its specific characteristics, exploring them as a non-conventional material for arts and performance. Costume Design uses surfaces as a powerful way of expression to represent concepts and stories; it may apply the unique features of nano bacterial cellulose (NBC) as assets in this artistic context. A mix of qualitative and quantitative (interventionist) methodology approaches were used -review of relevant literature to deepen knowledge on the research topic (crossing bibliography from different fields of studies: Biology, Art, Costume Design, etc.); as well as descriptive methods: laboratorial experiments, document quantities, observation to identify material properties and possibilities used to express a multiple narrative ideas, concepts and feelings. The results confirmed that NBC is an interactive and versatile material viable to be used in an alternative scenic context; its unique aesthetic and performative qualities, which change in contact to moisture, is a resource that can be used to show a visual and poetic impact on stage.

Keywords: biotechnological materials, contemporary dance, costume design, nano bacterial cellulose, performing arts

Procedia PDF Downloads 86
698 Semantic Differences between Bug Labeling of Different Repositories via Machine Learning

Authors: Pooja Khanal, Huaming Zhang

Abstract:

Labeling of issues/bugs, also known as bug classification, plays a vital role in software engineering. Some known labels/classes of bugs are 'User Interface', 'Security', and 'API'. Most of the time, when a reporter reports a bug, they try to assign some predefined label to it. Those issues are reported for a project, and each project is a repository in GitHub/GitLab, which contains multiple issues. There are many software project repositories -ranging from individual projects to commercial projects. The labels assigned for different repositories may be dependent on various factors like human instinct, generalization of labels, label assignment policy followed by the reporter, etc. While the reporter of the issue may instinctively give that issue a label, another person reporting the same issue may label it differently. This way, it is not known mathematically if a label in one repository is similar or different to the label in another repository. Hence, the primary goal of this research is to find the semantic differences between bug labeling of different repositories via machine learning. Independent optimal classifiers for individual repositories are built first using the text features from the reported issues. The optimal classifiers may include a combination of multiple classifiers stacked together. Then, those classifiers are used to cross-test other repositories which leads the result to be deduced mathematically. The produce of this ongoing research includes a formalized open-source GitHub issues database that is used to deduce the similarity of the labels pertaining to the different repositories.

Keywords: bug classification, bug labels, GitHub issues, semantic differences

Procedia PDF Downloads 179
697 Hybrid Weighted Multiple Attribute Decision Making Handover Method for Heterogeneous Networks

Authors: Mohanad Alhabo, Li Zhang, Naveed Nawaz

Abstract:

Small cell deployment in 5G networks is a promising technology to enhance capacity and coverage. However, unplanned deployment may cause high interference levels and high number of unnecessary handovers, which in turn will result in an increase in the signalling overhead. To guarantee service continuity, minimize unnecessary handovers, and reduce signalling overhead in heterogeneous networks, it is essential to properly model the handover decision problem. In this paper, we model the handover decision according to Multiple Attribute Decision Making (MADM) method, specifically Technique for Order Preference by Similarity to an Ideal Solution (TOPSIS). In this paper, we propose a hybrid TOPSIS method to control the handover in heterogeneous network. The proposed method adopts a hybrid weighting, which is a combination of entropy and standard deviation. A hybrid weighting control parameter is introduced to balance the impact of the standard deviation and entropy weighting on the network selection process and the overall performance. Our proposed method shows better performance, in terms of the number of frequent handovers and the mean user throughput, compared to the existing methods.

Keywords: handover, HetNets, interference, MADM, small cells, TOPSIS, weight

Procedia PDF Downloads 126
696 Computational Study on the Crystal Structure, Electronic and Optical Properties of Perovskites a2bx6 for Photovoltaic Applications

Authors: Harmel Meriem

Abstract:

The optoelectronic properties and high power conversion efficiency make lead halide perovskites ideal material for solar cell applications. However, the toxic nature of lead and the instability of organic cation are the two key challenges in the emerging perovskite solar cells. To overcome these challenges, we present our study about finding potential alternatives to lead in the form of A2BX6 perovskite using the first principles DFT-based calculations. The highly accurate modified Becke Johnson (mBJ) and hybrid functional (HSE06) have been used to investigate the Main Document Click here to view linked References to optoelectronic and thermoelectric properties of A2PdBr6 (A = K, Rb, and Cs) perovskite. The results indicate that different A-cations in A2PdBr6 can significantly alter their electronic and optical properties. Calculated band structures indicate semiconducting nature, with band gap values of 1.84, 1.53, and 1.54 eV for K2PdBr6, Rb2PdBr6, and Cs2PdBr6, respectively. We find strong optical absorption in the visible region with small effective masses for A2PdBr6. The ideal band gap and optimum light absorption suggest Rb2PdBr6 and Cs2PdBr6 potential candidates for the light absorption layer in perovskite solar cells. Additionally.

Keywords: soler cell, double perovskite, optoelectronic properties, ab-inotio study

Procedia PDF Downloads 107
695 The Fishery and Electricity Symbiosis Environment and Social Inspection in Taiwan: The Kaohsiung City Example

Authors: Bing-Shun Huang, Hung-Ju Chiu, Wen-Kai Hsieh, Hsiu-Chuan Lin, Ming-Lung Hung

Abstract:

Taiwan's solar photovoltaic target in 2025 is 20 GW, of which the fish-electricity symbiosis target is 4 GW. In the future, many solar photovoltaic installations may cause local environmental or social impacts. Therefore, the Taiwan government inspects the fish-electricity symbiosis to reduce the impact of solar photovoltaics on the local environment or society. This stuy takes the symbiosis of fishery and electricity in Kaohsiung City as an example to explore Taiwan's environmental and social inspection practices. It mainly analyzes the two aspects of environmental ecology and social economy. The results show that the environmental inspection is mainly through site surveys, ecological information mapping, on-site interviews, and public consultation meetings. Social inspection mainly includes document analysis, on-site interviews, site surveys, expert discussions, and public consultations to identify possible local problems. Although the government had recognized the local issues, the future status may also change. It is recommended that future photoelectric companies should reconfirm the current situation of development sites when applying for the installation and propose countermeasures to solve the problem.

Keywords: taiwan, fish-electricity symbiosis, environment, society, inspection

Procedia PDF Downloads 182
694 Exploring the Power of Words: Domesticating the Competence/Competency Concept in Ugandan Organisations

Authors: John C. Munene, Florence Nansubuga

Abstract:

The study set out to examine a number of theories that have directly or indirectly implied that words are potent but that the potency depends on the context or practice in which they are utilised. The theories include the Freudian theory of Cathexis, which directly suggests that ambiguous events when named become potent as well as the word that is used to name them. We briefly examine Psychological differentiation, which submit that ambiguity is often a result of failure to distinguish figure from ground. The investigate Prospecting Theory, which suggests that in a situation when people have to make decisions, they have options to utilise intuition or reasoned judgment. It suggests that more often than not, the tendency is to utilise intuition especially when generic heuristics such as representativeness and similarity are available. That usage of these heuristics may depend on lack of a salience or accessibility of the situation due to ambiguity. We also examine Activity Theory, which proposes that meaning of words emerge directly and dialectically from the activities in which they are used. The paper argues that the power of words will depend on either or all of the theories mentioned above. To examine this general proposition we test the utilization of a generic competence framework in a local setting. The assumption is that generic frameworks are inherently ambiguous and lack the potency normally associated with the competence concept in the management of human resources. A number of case studies provide initial supporting evidence for the general proposition.

Keywords: competence, meaning, operationalisation, power of words

Procedia PDF Downloads 387
693 Ethno-Botanical of Seaweeds and Sea Grass in Eastern Indonesia

Authors: Siegfried Berhimpon, Jein Dangeubun, Sandra Baulu, Rene Ch. Kepel

Abstract:

In Indonesia, macro-alga is known as seaweeds or rumput laut and sea grass or lamun, and have been used as vegetables and medicine since long time ago. This studies have been done, to collect data about utilization of seaweed and sea grass as food or medicine in Eastern Indonesia. Six regencies in two provinces have been chosen as sampling areas i.e. South-East Maluku, West-East Maluku, and Aru in province of Maluku; and Sangihe, Sitaro, and Minahasa in province of North Sulawesi. The results shown that in the pass, seaweeds and sea grass have been widely used as food and medicine, and there are similarity between one area and other areas in species and in the way to prepare or to cook the food. Ten species of alga and 2 species of sea grass were consumed as vegetables and desert, and one species of sea grass was used for traditional medicine. Nowadays, because of easier to get terrestrial vegetables, the people in the coastal area rarely consumed marine vegetables, and if there are no attempt to promote and to socialize the custom, the habits trend to disappear. Environmental degradation was another caused has been identified. Seaweed contained high content of Iodine and dietary fiber, therefore, this food can overcomes the problem of iodine deficiency, and to supply an exotic high-fiber foods. In addition, by consuming seaweeds, marine culture industry will be developed, especially in the number of species seaweeds to be cultivated.

Keywords: ethno-botany, seaweed, sea grass, exotic food

Procedia PDF Downloads 481
692 A Novel Protein Elicitor Extracted From Lecanicillium lecanii Induced Resistance Against Whitefly, Bemisia tabaci in Cotton

Authors: Yusuf Ali Abdulle, Azhar Uddin Keerio

Abstract:

Background: Protein elicitors play a key role in signaling or displaying plant defense mechanisms and emerging as vital tools for bio-control of insects. This study was aimed at the characterization of the novel protein elicitor isolated from entomopathogenic fungi Lecanicillium lecanii (V3) strain and its activity against Whitefly, Bemisia tabaci in cotton. The sequence of purified elicitor protein showed 100% similarity with hypothetical protein LEL_00878 [Cordyceps confragosa RCEF 1005], GenBank no (OAA81333.1). This novel protein elicitor has 253 amino acid residues and 762bp with a molecular mass of 29 kDa. The protein recombinant was expressed in Escherichia coli using pET‐28a (+) plasmid. Effects of purified novel protein elicitor on Bemisia tabaci were determined at three concentrations of protein (i.e., 58.32, 41.22, 35.41 μg mL⁻¹) on cotton plants and were exposed to newly molted adult B.tabaci. Bioassay results showed a significant effect of the exogenous application of novel protein elicitor on B. tabaci in cotton. In addition, the gene expression analysis found a significant up-regulation of the major genes associated with salicylic acid (SA) and jasmonic acid (JA) linked plant defense pathways in elicitor protein-treated plants. Our results suggested the potential application of a novel protein elicitor derived from Lecanicillium lecanii as a future bio-intensive controlling approach against the whitefly, Bemisia tabaci.

Keywords: resistance, Lecanicillium lecanii, secondary metabolites, whitefly

Procedia PDF Downloads 158
691 3D Scanning Documentation and X-Ray Radiography Examination for Ancient Egyptian Canopic Jar

Authors: Abdelrahman Mohamed Abdelrahman

Abstract:

Canopic jars are one of the vessels of funerary nature used by the ancient Egyptian in mummification process that were used to save the viscera of the mummified body after being extracted from the body and treated. Canopic jars are made of several types of materials like Limestone, Alabaster, and Pottery. The studied canopic jar dates back to Late period, located in the Grand Egyptian Museum (GEM), Giza, Egypt. This jar carved from limestone with carved hieroglyphic inscriptions, and it filled and closed by mortar from inside. Some aspects of damage appeared in the jar, such as dust, dirts, classification, wide crack, weakness of limestone. In this study, we used documentation and investigation modern techniques to document and examine the jar. 3D scanning and X-ray Radiography imaging used in applied study. X-ray imaging showed that the mortar was placed at a time when the jar contained probably viscera where the mortar appeared that not reach up to the base of the inner jar. Through the three-dimensional photography, the jar was documented, and we have 3D model of the jar, and now we have the ability through the computer to see any part of the jar in all its details. After that, conservation procedures have been applied with high accuracy to conserve the jar, including mechanical, wet, and chemical cleaning, filling wide crack in the body of the jar using mortar consisting of calcium carbonate powder mixing with primal E330 S, and consolidation, so the limestone became strong after using paraloid B72 2% concentrate as a consolidate material.

Keywords: vessel, limestone, canopic jar, mortar, 3D scanning, X-ray radiography

Procedia PDF Downloads 59
690 The Perceptions, Experiences, and Views of E-Tutors on Active Learning in the ODeL Context

Authors: Bunki Enid Pitsoane

Abstract:

This study was influenced by the radical change in the tutorial system of UNISA, immigrating from face to face to E-tutoring. The study was undertaken to investigate the perceptions, experiences, and views of E-tutors in relation to active learning. The study is aimed at capturing the views and experiences of E-tutors as they are deemed to implement active learning within their E-tutoring. The problem was traced from Developmental and behaviorist’s theorists perspective and factors related to perception, experience, and views of E-tutors on active learning. The research is aligned with the views of constructivism which put more emphasis on situated learning, chaos, and digital factors. The basis of the theory is that learning is developmental, situational and context-sensitive and also digital. The theorists further purports that the tutor’s conception of teaching and learning influence their tutoring style. In order to support or reject the findings of the literature study, qualitative research in the form of interviews and document analysis were conducted. The sample of the study constituted of 10 E-tutors who are involved in tutoring modules from the College of Education. The identified E-tutors were randomly selected based on their availability. The data concerning E-tutors perception and experience was analysed and interpreted. The results of the empirical study indicated that some tutors are struggling to implement active learning because they are digital immigrants or they lack in digital knowledge which affect productivity in their teaching.

Keywords: E-Tutoring, active learning, perceptions, views

Procedia PDF Downloads 204
689 Development of Mg-Containing Hydroxyapatite-Based Bioceramics From Phosphate Rock for Bone Applications

Authors: Sara Mercedes Barroso Pinzón, Álvaro Jesús Caicedo Castro, Antonio Javer Sánchez Herencia

Abstract:

In recent years there has been increased academic and industrial research into the development of orthopaedic implants with structural properties and functionality similar to mechanical strength, osseointegration, thermal stability and antibacterial capacity similar to bone structure. Hydroxyapatite has been considered for decades as an ideal biomaterial for bone regeneration due to its chemical and crystallographic similarity to the mineral structure bioapatites. However, the lack of trace elements in the hydroxyapatite structure confers very low mechanical and biological properties. Under this scenario, the objective of the research is the synthesis of hydroxyapatite with Mg from the francolite mineral present in phosphate rock from the central-eastern region of Colombia, taking advantage of the extraction of mineral species as natural precursors of Ca, P and Mg. The minerals present were studied, fluorapatite as the mineral of interest associated with magnesium carbonates and quartz. The chemical and mineralogical composition was determined by X-ray fluorescence (XRF) and X-ray diffraction (XRD), scanning electron microscopy (SEM) and energy dispersive X-ray spectroscopy (EDX); the optimum conditions were established using the acid leaching mechanism in the wet concentration process. From the products obtained and characterised by XRD, XRF, SEM, FTIR, RAMAN, HAp-Mg biocomposite scaffolds are fabricated and the influence of Mg on morphometric parameters, mechanical and biological properties in the formed materials is evaluated.

Keywords: phosphate rock, hydroxyapatite, magnesium, biomaterials

Procedia PDF Downloads 35
688 Basics of SCADA Security: A Technical Approach

Authors: Michał Witas

Abstract:

This paper presents a technical approach to analysis of security of SCADA systems. Main goal of the paper is to make SCADA administrators aware of risks resulting from SCADA systems usage and to familiarize with methods that can be adopt to existing or planned system, to increase overall system security level. Because SCADA based systems become a industrial standard, more attention should be paid to the security of that systems. Industrial Control Systems (ICS) like SCADA are responsible for controlling crucial aspects of wide range of industrial processes. In pair with that responsibility, goes a lot of money that can be earned or lost – this fact is main reason of increased interest of attackers. Additionally ICS are often responsible for maintaining resources strategic from the point of view of national economy, like electricity (including nuclear power plants), heating, water resources or military facilities, so they can be targets of terrorist cybernetic attacks. Without proper risk analysis and management, vulnerabilities resulting from the usage of SCADA can be easily exploited by potential attacker. Paper is based mostly on own experience in systems security, gathered during academic studies and professional work in international company. As title suggests, it will cover only basics of topic, because every of points mentioned in the document can be base for additional research and papers.

Keywords: denial of service, SCADA, security policy, distributed network

Procedia PDF Downloads 353
687 The Reproducibility and Repeatability of Modified Likelihood Ratio for Forensics Handwriting Examination

Authors: O. Abiodun Adeyinka, B. Adeyemo Adesesan

Abstract:

The forensic use of handwriting depends on the analysis, comparison, and evaluation decisions made by forensic document examiners. When using biometric technology in forensic applications, it is necessary to compute Likelihood Ratio (LR) for quantifying strength of evidence under two competing hypotheses, namely the prosecution and the defense hypotheses wherein a set of assumptions and methods for a given data set will be made. It is therefore important to know how repeatable and reproducible our estimated LR is. This paper evaluated the accuracy and reproducibility of examiners' decisions. Confidence interval for the estimated LR were presented so as not get an incorrect estimate that will be used to deliver wrong judgment in the court of Law. The estimate of LR is fundamentally a Bayesian concept and we used two LR estimators, namely Logistic Regression (LoR) and Kernel Density Estimator (KDE) for this paper. The repeatability evaluation was carried out by retesting the initial experiment after an interval of six months to observe whether examiners would repeat their decisions for the estimated LR. The experimental results, which are based on handwriting dataset, show that LR has different confidence intervals which therefore implies that LR cannot be estimated with the same certainty everywhere. Though the LoR performed better than the KDE when tested using the same dataset, the two LR estimators investigated showed a consistent region in which LR value can be estimated confidently. These two findings advance our understanding of LR when used in computing the strength of evidence in handwriting using forensics.

Keywords: confidence interval, handwriting, kernel density estimator, KDE, logistic regression LoR, repeatability, reproducibility

Procedia PDF Downloads 105
686 Exploring the Traditional Uses of Aromatic Plants in Indonesian Culture, Medicine, and Spirituality

Authors: Aida Humaira

Abstract:

Aromatic plants hold an honored place in Indonesian culture, where they are deeply intertwined with everyday customs, rituals, and ceremonies. From the fragrant herbs and spices used in cooking to the aromatic incense burned in temples and homes, aromatic plants play multifaceted roles in enhancing well-being and fostering spiritual connections. These plants are valued not only for their pleasant aromas but also for their medicinal properties and symbolic meanings. This article aims to summarize the role of aromatic plants in Indonesian traditional culture, medicine, spirituality, and how it shifted to a modern version of aromatherapy. Traditional Indonesian medicine, known as Jamu, relies heavily on aromatic plants for their therapeutic benefits. Herbalists and traditional healers use a wide array of aromatic herbs, roots, barks, and resins to treat various ailments, ranging from digestive disorders and respiratory infections to skin conditions and reproductive issues. In conclusion, aromatic plants represent a cultural treasure with multifaceted uses and significance deeply rooted in Indonesia’s tradition. From their medicinal properties to their spiritual symbolism, these plants embody the interconnection of culture, nature, and well-being. Further research and collaboration are needed to document and preserve traditional knowledge surrounding Indonesian aromatic plants and ensure their continued recognition and sustainable utilization in the face of modernization and environmental challenges.

Keywords: aromatic plants, indonesia, Jamu, traditional medicine

Procedia PDF Downloads 36
685 Emerging Research Trends in Routing Protocol for Wireless Sensor Network

Authors: Subhra Prosun Paul, Shruti Aggarwal

Abstract:

Now a days Routing Protocol in Wireless Sensor Network has become a promising technique in the different fields of the latest computer technology. Routing in Wireless Sensor Network is a demanding task due to the different design issues of all sensor nodes. Network architecture, no of nodes, traffic of routing, the capacity of each sensor node, network consistency, service value are the important factor for the design and analysis of Routing Protocol in Wireless Sensor Network. Additionally, internal energy, the distance between nodes, the load of sensor nodes play a significant role in the efficient routing protocol. In this paper, our intention is to analyze the research trends in different routing protocols of Wireless Sensor Network in terms of different parameters. In order to explain the research trends on Routing Protocol in Wireless Sensor Network, different data related to this research topic are analyzed with the help of Web of Science and Scopus databases. The data analysis is performed from global perspective-taking different parameters like author, source, document, country, organization, keyword, year, and a number of the publication. Different types of experiments are also performed, which help us to evaluate the recent research tendency in the Routing Protocol of Wireless Sensor Network. In order to do this, we have used Web of Science and Scopus databases separately for data analysis. We have observed that there has been a tremendous development of research on this topic in the last few years as it has become a very popular topic day by day.

Keywords: analysis, routing protocol, research trends, wireless sensor network

Procedia PDF Downloads 201
684 Application of the Mobile Phone for Occupational Self-Inspection Program in Small-Scale Industries

Authors: Jia-Sin Li, Ying-Fang Wang, Cheing-Tong Yan

Abstract:

In this study, an integrated approach of Google Spreadsheet and QR code which is free internet resources was used to improve the inspection procedure. The mobile phone Application(App)was also designed to combine with a web page to create an automatic checklist in order to provide a new integrated information of inspection management system. By means of client-server model, the client App is developed for Android mobile OS and the back end is a web server. It can set up App accounts including authorized data and store some checklist documents in the website. The checklist document URL could generate QR code first and then print and paste on the machine. The user can scan the QR code by the app and filled the checklist in the factory. In the meanwhile, the checklist data will send to the server, it not only save the filled data but also executes the related functions and charts. On the other hand, it also enables auditors and supervisors to facilitate the prevention and response to hazards, as well as immediate report data checks. Finally, statistics and professional analysis are performed using inspection records and other relevant data to not only improve the reliability, integrity of inspection operations and equipment loss control, but also increase plant safety and personnel performance. Therefore, it suggested that the traditional paper-based inspection method could be replaced by the APP which promotes the promotion of industrial security and reduces human error.

Keywords: checklist, Google spreadsheet, APP, self-inspection

Procedia PDF Downloads 99
683 “Divorced Women are Like Second-Hand Clothes” - Hate Language in Media Discourse (Using the Example of Electronic Media Platforms)

Authors: Sopio Totibadze

Abstract:

Although the legal framework of Georgia reflects the main principles of gender equality and is in line with the international situation (UNDP, 2018), Georgia remains a male-dominated society. This means that men prevail in many areas of social, economic, and political life, which frequently gives women a subordinate status in society and the family (UN women). According to the latest study, “violence against women and girls in Georgia is also recognized as a public problem, and it is necessary to focus on it” (UN women). Moreover, the Public Defender's report on the protection of human rights in Georgia (2019) reveals that “in the last five years, 151 women were killed in Georgia due to gender and family violence”. Sadly, these statistics have increased significantly since that time. The issue was acutely reflected in the document published by the Organization for Security and Cooperation in Europe, “Gender Hate Crime” (March 10, 2021). “Unfortunately, the rates of femicide ..... are still high in the country, and distrust of law enforcement agencies often makes such cases invisible, which requires special attention from the state.” More precisely, the cited document considers that there are frequent cases of crimes based on gender-based oppression in Georgia, which pose a threat not only to women but also to people of any gender whose desires and aspirations do not correspond to the gender norms and roles prevailing in society. According to the study, this type of crime has a “significant and lasting impact on the victim(s) and also undermines the safety and cohesion of society and gender equality”. It is well-known that language is often used as a tool for gender oppression (Rusieshvili-Cartledge and Dolidze, 2021; Totibadze, 2021). Therefore, feminist and gender studies in linguistics ultimately serve to represent the problem, reflect on it, and propose ways to solve it. Together with technical advancement in communication, a new form of discrimination has arisen- hate language against women in electronic media discourse. Due to the nature of social media and the internet, messages containing hate language can spread in seconds and reach millions of people. However, only a few know about the detrimental effects they may have on the addressee and society. This paper aims to analyse the hateful comments directed at women on various media platforms to determine (1) the linguistic strategies used while attacking women and (2) the reasons why women may fall victim to this type of hate language. The data have been collected over six months, and overall, 500 comments will be examined for the paper. Qualitative and quantitative analysis was chosen for the methodology of the study. The comments posted on various media platforms, including social media posts, articles, or pictures, have been selected manually due to several reasons, the most important being the problem of identifying hate speech as it can disguise itself in different ways- humour, memes, etc. The comments on the articles, posts, pictures, and videos selected for sociolinguistic analysis depict a woman, a taboo topic, or a scandalous event centred on a woman that triggered a lot of hatred and hate language towards the person to whom the post/article was dedicated. The study has revealed that a woman can become a victim of hatred directed at them if they do something considered to be a deviation from a societal norm, namely, get a divorce, be sexually active, be vocal about feministic values, and talk about taboos. Interestingly, people who utilize hate language are not only men trying to “normalize” the prejudiced patriarchal values but also women who are equally active in bringing down a "strong" woman. The paper also aims to raise awareness about the hate language directed at women, as being knowledgeable about the issue at hand is the first step to tackling it.

Keywords: femicide, hate language, media discourse, sociolinguistics

Procedia PDF Downloads 70
682 Science Process Skill and Interest Preschooler in Learning Early Science through Mobile Application

Authors: Seah Siok Peh, Hashimah Mohd Yunus, Nor Hashimah Hashim, Mariam Mohamad

Abstract:

A country needs a workforce that encompasses knowledge, skilled labourers to generate innovation, productivity and being able to solve problems creatively via technology. Science education experts believe that the mastery of science skills help preschoolers to generate such knowledge on scientific concepts by providing constructive experiences. Science process skills are skills used by scientists to study or investigate a problem, issue, problem or phenomenon of science. In line with the skills used by scientists. The purpose of this study is to investigate the basic science process skill and interest in learning early science through mobile application. This study aimed to explore six spesific basic science process skills by the use of a mobile application as a learning support tool. The descriptive design also discusses on the extent of the use of mobile application in improving basic science process skill in young children. This study consists of six preschoolers and two preschool teachers from two different classes located in Perak, Malaysia. Techniques of data collection are inclusive of observations, interviews and document analysis. This study will be useful to provide information and give real phenomena to policy makers especially Ministry of education in Malaysia.

Keywords: science education, basic science process skill, interest, early science, mobile application

Procedia PDF Downloads 230
681 Bacteriological Characterization of Drinking Water Distribution Network Biofilms by Gene Sequencing Using Different Pipe Materials

Authors: M. Zafar, S. Rasheed, Imran Hashmi

Abstract:

Very little is concerned about the bacterial contamination in drinking water biofilm which provide a potential source for bacteria to grow and increase rapidly. So as to understand the microbial density in DWDs, a three-month study was carried out. The aim of this study was to examine biofilm in three different pipe materials including PVC, PPR and GI. A set of all these pipe materials was installed in DWDs at nine different locations and assessed on monthly basis. Drinking water quality was evaluated by different parameters and characterization of biofilm. Among various parameters are Temperature, pH, turbidity, TDS, electrical conductivity, BOD, COD, total phosphates, total nitrates, total organic carbon (TOC) free chlorine and total chlorine, coliforms and spread plate counts (SPC) according to standard methods. Predominant species were Bacillus thuringiensis, Pseudomonas fluorescens , Staphylococcus haemolyticus, Bacillus safensis and significant increase in bacterial population was observed in PVC pipes while least in cement pipes. The quantity of DWDs bacteria was directly depended on biofilm bacteria and its increase was correlated with growth and detachment of bacteria from biofilms. Pipe material also affected the microbial community in drinking water distribution network biofilm while Similarity in bacterial species was observed between systems due to same disinfectant dose, time period and plumbing pipes.

Keywords: biofilm, DWDs, pipe material, bacterial population

Procedia PDF Downloads 331
680 Comprehensive Review of Adversarial Machine Learning in PDF Malware

Authors: Preston Nabors, Nasseh Tabrizi

Abstract:

Portable Document Format (PDF) files have gained significant popularity for sharing and distributing documents due to their universal compatibility. However, the widespread use of PDF files has made them attractive targets for cybercriminals, who exploit vulnerabilities to deliver malware and compromise the security of end-user systems. This paper reviews notable contributions in PDF malware detection, including static, dynamic, signature-based, and hybrid analysis. It presents a comprehensive examination of PDF malware detection techniques, focusing on the emerging threat of adversarial sampling and the need for robust defense mechanisms. The paper highlights the vulnerability of machine learning classifiers to evasion attacks. It explores adversarial sampling techniques in PDF malware detection to produce mimicry and reverse mimicry evasion attacks, which aim to bypass detection systems. Improvements for future research are identified, including accessible methods, applying adversarial sampling techniques to malicious payloads, evaluating other models, evaluating the importance of features to malware, implementing adversarial defense techniques, and conducting comprehensive examination across various scenarios. By addressing these opportunities, researchers can enhance PDF malware detection and develop more resilient defense mechanisms against adversarial attacks.

Keywords: adversarial attacks, adversarial defense, adversarial machine learning, intrusion detection, PDF malware, malware detection, malware detection evasion

Procedia PDF Downloads 25
679 The Translation Of Original Metaphor In Literature

Authors: Esther Matthews

Abstract:

This paper looks at ways of translating new metaphors: those conceived and created by authors, which are often called ‘original’ metaphors in the world of Translation Studies. An original metaphor is the most extreme form of figurative language, often dramatic and shocking in effect. It displays unexpected juxtapositions of language, suggesting there could be as many different translations as there are translators. However, some theorists say original metaphors should be translated ‘literally’ or ‘word for word’ as far as possible, suggesting a similarity between translators’ solutions. How do literary translators approach this challenge? This study focuses on Spanish-English translations of a novel full of original metaphors: Nada by Carmen Laforet (1921 – 2004). Original metaphors from the text were compared to the four published English translations by Inez Muñoz, Charles Franklin Payne, Glafyra Ennis, and Edith Grossman. These four translators employed a variety of translation methods, but they translated ‘literally’ in well over half of the original metaphors studied. In a two-part translation exercise and questionnaire, professional literary translators were asked to translate a number of these metaphors. Many different methods were employed, but again, over half of the original metaphors were translated literally. Although this investigation was limited to one author and language pair, it gives a clear indication that, although literary translators’ solutions vary, on the whole, they prefer to translate original metaphors as literally as possible within the confines of English grammar and syntax. It also reveals literary translators’ desire to reproduce the distinctive character of an author’s work as accurately as possible for the target reader.

Keywords: translation, original metaphor, literature, translator training

Procedia PDF Downloads 253
678 Restorative Justice Programmes in South African Prison Environment: A Qualitative Enquiry

Authors: Clarice Zimbili Zondi

Abstract:

This study investigates the effect of restorative justice programmes offered to offenders in prison environment (Correctional Centres) during their rehabilitation. The study looks specifically to programmes offered by a Non-Profit Organisation (NPO), Phoenix Zululand (PZ) in twelve (12) different prisons in Zululand, South Africa. Document analysis, interviews and participant observation methods were used to test whether the work done by Phoenix Zululand is in line with the remarks made on restorative justice as encapsulated in the White Paper on Corrections 2005 in South Africa. Also tested was whether a better understanding of restorative justice programmes assists in coming up with better strategies to change the behaviour of offenders. The study findings discovered that the work that is done by PZ is not in line with the remarks made in the White Paper on Corrections. Also the importance of a full comprehension of what one is doing in order to be effective in rehabilitation. However, rehabilitation that is aimed at only changing the decision-making processes of offenders not to reoffend, does not serve as a total rehabilitation programme. Rehabilitation is only successful if ex-offenders, whilst still in prison, have developed market-related skills and become employed or self-employed. Restorative Justice Programmes offered by PZ, although they play a critical role, appears to be lacking in equipping offenders with skills for effective reintegration into society and, subsequently, self-reliance.

Keywords: offender, rehabilitation, restorative justice, prison

Procedia PDF Downloads 312
677 Design an Algorithm for Software Development in CBSE Envrionment Using Feed Forward Neural Network

Authors: Amit Verma, Pardeep Kaur

Abstract:

In software development organizations, Component based Software engineering (CBSE) is emerging paradigm for software development and gained wide acceptance as it often results in increase quality of software product within development time and budget. In component reusability, main challenges are the right component identification from large repositories at right time. The major objective of this work is to provide efficient algorithm for storage and effective retrieval of components using neural network and parameters based on user choice through clustering. This research paper aims to propose an algorithm that provides error free and automatic process (for retrieval of the components) while reuse of the component. In this algorithm, keywords (or components) are extracted from software document, after by applying k mean clustering algorithm. Then weights assigned to those keywords based on their frequency and after assigning weights, ANN predicts whether correct weight is assigned to keywords (or components) or not, otherwise it back propagates in to initial step (re-assign the weights). In last, store those all keywords into repositories for effective retrieval. Proposed algorithm is very effective in the error correction and detection with user base choice while choice of component for reusability for efficient retrieval is there.

Keywords: component based development, clustering, back propagation algorithm, keyword based retrieval

Procedia PDF Downloads 362
676 A Clustering Algorithm for Massive Texts

Authors: Ming Liu, Chong Wu, Bingquan Liu, Lei Chen

Abstract:

Internet users have to face the massive amount of textual data every day. Organizing texts into categories can help users dig the useful information from large-scale text collection. Clustering, in fact, is one of the most promising tools for categorizing texts due to its unsupervised characteristic. Unfortunately, most of traditional clustering algorithms lose their high qualities on large-scale text collection. This situation mainly attributes to the high- dimensional vectors generated from texts. To effectively and efficiently cluster large-scale text collection, this paper proposes a vector reconstruction based clustering algorithm. Only the features that can represent the cluster are preserved in cluster’s representative vector. This algorithm alternately repeats two sub-processes until it converges. One process is partial tuning sub-process, where feature’s weight is fine-tuned by iterative process. To accelerate clustering velocity, an intersection based similarity measurement and its corresponding neuron adjustment function are proposed and implemented in this sub-process. The other process is overall tuning sub-process, where the features are reallocated among different clusters. In this sub-process, the features useless to represent the cluster are removed from cluster’s representative vector. Experimental results on the three text collections (including two small-scale and one large-scale text collections) demonstrate that our algorithm obtains high quality on both small-scale and large-scale text collections.

Keywords: vector reconstruction, large-scale text clustering, partial tuning sub-process, overall tuning sub-process

Procedia PDF Downloads 411
675 Response Surface Methodology for the Optimization of Sugar Extraction from Phoenix dactylifera L.

Authors: Lila Boulekbache-Makhlouf, Kahina Djaoud, Myriam Tazarourte, Samir Hadjal, Khodir Madani

Abstract:

In Algeria, important quantities of secondary date variety (Phoenix dactylifera L.) are generated in each campaign; their chemical composition is similar to that of commercial dates. The present work aims to valorize this common date variety (Degla-Beida) which is often poorly exploited. In this context, we tried to prepare syrup from the secondary date variety and to evaluate the effect of conventional extraction (CE) or water bath extraction (WBE) and alternative extraction (microwaves assisted extraction (MAE), and ultrasounds assisted extraction (UAE)) on its total sugar content (TSC), using response surface methodology (RSM). Then, the analysis of individual sugars was performed by high-performance liquid chromatography (HPLC). Maximum predicted TSC recoveries under the optimized conditions for MAE, UAE and CE were 233.248 ± 3.594 g/l, 202.889 ± 5.797 g/l, and 233.535 ± 5.412 g/l, respectively, which were close to the experimental values: 233.796 ± 1.898 g/l; 202.037 ± 3.401 g/l and 234.380 ± 2.425 g/l. HPLC analysis revealed high similarity in the sugar composition of date juices obtained by MAE (60.11% sucrose, 16.64% glucose and 23.25% fructose) and CE (50.78% sucrose, 20.67% glucose and 28.55% fructose), although a large difference was detected for that obtained by UAE (0.00% sucrose, 46.94% glucose and 53.06% fructose). Microwave-assisted extraction was the best method for the preparation of date syrup with an optimal recovery of total sugar content. However, ultrasound-assisted extraction was the best one for the preparation of date syrup with high content of reducing sugars.

Keywords: dates, extraction, RSM, sugars, syrup

Procedia PDF Downloads 138
674 Sociological Portrait of the Korean Diaspora in Kazakhstan

Authors: Yefrem Yefremov

Abstract:

In Kazakhstan, there are approximately 100,000 ethnic Koreans with the ethnonym "Koryo Saram". They are part of the global Korean diaspora around the world, deported to Kazakhstan by Stalin’s decree in 1937. Koryo Saram's diasporic identity is a composite of numerous identities based on a shared cultural heritage of the USSR and independent Kazakhstan and has mosaic character. The author has conducted a sociological survey to find out the main features of the identity of the Koryo Saram diaspora. The purpose of this paper is to depict the degree of ethnic, cultural, and diasporic identity of Koryo Saram and which effect on the preserving Korean diaspora in Kazakhstna do they have. The following elements impacting the above-mentioned identities were investigated in the survey: criteria by which Koryo Saram perceive themselves to be Korean, attitude of Koryo Saram to their ethnicity, degree of feeling of ethnocultural similarity between Koreans of Kazakhstan and Koreans of the Republic of Korea, degree of association of Koreans of Kazakhstan with other Koreans living in other CIS countries, degree of practicing Korean traditions Koryo Saram's attitudes towards interethnic marriages. The primary factor in defining the identity among the respondents is the factor of ethnic origin. Nationality is the second most significant component in establishing Koryo Saram’s identity. The maintenance of "Koreanness" of Koryo Sarams in the context of a multiethnic community, particularly in Kazakhstan, is based on genetic elements as well as the preservation of the culture. In conclusion, the high level of preserving Korean identity is being observed in the Korean Diaspora of Kazakhstan.

Keywords: diasporic identity, diaspora, ethnic identity, identity markers, korean diaspora, koreans of kazakhstan, koryo saram, multiethnicity

Procedia PDF Downloads 119
673 The Design and Applied of Learning Management System via Social Media on Internet: Case Study of Operating System for Business Subject

Authors: Pimploi Tirastittam, Sawanath Treesathon, Amornrath Ongkawat

Abstract:

Learning Management System (LMS) is the system which uses to manage the learning in order to grouping the content and learning activity between the lecturer and learner including online examination and evaluation. Nowadays, it is the borderless learning era so the learning activities can be accessed from everywhere in the world and also anytime via the information technology and media. The learner can easily access to the knowledge so the different in time and distance is not a constraint for learning anymore. The learning pattern which was used in this research is the integration of the in-class learning and online learning via internet and will be able to monitor the progress by the Learning management system which will create the fast response and accessible learning process via the social media. In order to increase the capability and freedom of the learner, the system can show the current and history of the learning document, video conference and also has the chat room for the learner and lecturer to interact to each other. So the objectives of the “The Design and Applied of Learning Management System via Social Media on Internet: Case Study of Operating System for Business Subject” are to expand the opportunity of learning and to increase the efficiency of learning as well as increase the communication channel between lecturer and student. The data of this research was collect from 30 users of the system which are students who enroll in the subject. And the result of the research is in the “Very Good” which is conformed to the hypothesis.

Keywords: Learning Management System, social media, Operating System, information technology

Procedia PDF Downloads 339
672 Analysis Model for the Relationship of Users, Products, and Stores on Online Marketplace Based on Distributed Representation

Authors: Ke He, Wumaier Parezhati, Haruka Yamashita

Abstract:

Recently, online marketplaces in the e-commerce industry, such as Rakuten and Alibaba, have become some of the most popular online marketplaces in Asia. In these shopping websites, consumers can select purchase products from a large number of stores. Additionally, consumers of the e-commerce site have to register their name, age, gender, and other information in advance, to access their registered account. Therefore, establishing a method for analyzing consumer preferences from both the store and the product side is required. This study uses the Doc2Vec method, which has been studied in the field of natural language processing. Doc2Vec has been used in many cases to analyze the extraction of semantic relationships between documents (represented as consumers) and words (represented as products) in the field of document classification. This concept is applicable to represent the relationship between users and items; however, the problem is that one more factor (i.e., shops) needs to be considered in Doc2Vec. More precisely, a method for analyzing the relationship between consumers, stores, and products is required. The purpose of our study is to combine the analysis of the Doc2vec model for users and shops, and for users and items in the same feature space. This method enables the calculation of similar shops and items for each user. In this study, we derive the real data analysis accumulated in the online marketplace and demonstrate the efficiency of the proposal.

Keywords: Doc2Vec, online marketplace, marketing, recommendation systems

Procedia PDF Downloads 99
671 Characterization of Solanum tuberosum Ammonium Transporter Gene Using Bioinformatics Approach

Authors: Adewole Tomiwa Adetunji, Francis Bayo Lewu, Richard Mundembe

Abstract:

Plants require nitrogen (N) to support desired production levels. There is a need for better understanding of N transport mechanism in order to improve N assimilation by plant root. Nitrogen is available to plants in the form of nitrate or ammonium, which are transported into the cell with the aid of various transport proteins. Ammonium transporters (AMTs) play a role in the uptake of ammonium, the form in which N is preferentially absorbed by plants. Solanum tuberosum AMT1 (StAMT1) was amplified, sequenced and characterized using molecular biology and bioinformatics methods. Nucleotide database sequences were used to design 976 base pairs AMT1-specific primers which include forward primer 5’- GCCATCGCCGCCGCCGG-3’ and reverse primer 5’-GGGTCAGATCCATACCCGC-3’. These primers were used to amplify the Solanum tuberosum AMT1 internal regions. Nucleotide sequencing, alignment and phylogenetic analysis assigned StAMT1 to the AMT1 family due to the clade and high similarity it shared with other plant AMT1 genes. The deduced amino acid sequences showed that StAMT1 is 92%, 83% and 76% similar to Solanum lycopersicum LeAMT1.1, Lotus japonicus LjAMT1.1, and Solanum lycopersicum LeAMT1.2 respectively. StAMT1 fragments were shown to correspond to the 5th-10th trans-membrane domains. Residue StAMT1 D15 is predicted to be essential for ammonium transport, while mutations of StAMT1 S76A may further enhance ammonium transport.

Keywords: ammonium transporter, bioinformatics, nitrogen, primers, Solanum tuberosum

Procedia PDF Downloads 211
670 A Systemic Maturity Model

Authors: Emir H. Pernet, Jeimy J. Cano

Abstract:

Maturity models, used descriptively to explain changes in reality or normatively to guide managers to make interventions to make organizations more effective and efficient, are based on the principles of statistical quality control promulgated by Shewhart in the years 30, and on the principles of PDCA continuous improvement (Plan, Do, Check, Act) developed by Deming and Juran. Some frameworks developed over the concept of maturity models includes COBIT, CMM, and ITIL. This paper presents some limitations of traditional maturity models, most of them based on points of reflection and analysis done by some authors. Almost all limitations are related to the mechanistic and reductionist approach of the principles over those models are built. As Systems Theory helps the understanding of the dynamics of organizations and organizational change, the development of a systemic maturity model can help to overcome some of those limitations. This document proposes a systemic maturity model, based on a systemic conceptualization of organizations, focused on the study of the functioning of the parties, the relationships among them, and their behavior as a whole. The concept of maturity from the system theory perspective is conceptually defined as an emergent property of the organization, which arises from as a result of the degree of alignment and integration of their processes. This concept is operationalized through a systemic function that measures the maturity of an organization, and finally validated by the measuring of maturity in organizations. For its operationalization and validation, the model was applied to measure the maturity of organizational Governance, Risk and Compliance (GRC) processes.

Keywords: GRC, maturity model, systems theory, viable system model

Procedia PDF Downloads 295