Search results for: grammar rules
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 1292

Search results for: grammar rules

602 First Time Voters Representation of Leadership as Exemplified by 2016 Presidentiables

Authors: Fevy Kae Mateo, Kimberly Javier, Alyzza Marie Palles

Abstract:

Leadership is a process of relationship involving interaction with other people. Leaders emphasise authority, which executes and implements regulations, maintains the rules and leads to a better future. The First Time voters are very significant because there are the stakeholders of the type of leader to be deployed. They also have the capacity of engaging the government and can be the agents of change. The objective of the study is to identify the strengths and weaknesses of leader. Moreover, the study identifies the qualities of a leader. Finally, the study determines first-time voter’s representation of a leader. Focus Group Discussion was carried out into two groups of first time voter’s ages 18 to 21 years old. Verbatim transcripts of the discussion were analyzed using Thematic Analysis. Overall results showed super ordinate themes for weaknesses of leader: Lace of transparency in the government, poor communication strategy, and valuing experience over potential and other contributory factor; for strength of a leader: analytical skill, emotional intelligence in political work, analytical ability and economic status on political participation; finally, in the representation of a leader: positive representation of a leader and negative representation of a leader.

Keywords: first time voters, focus group discussion, leadership, qualitative research design

Procedia PDF Downloads 244
601 Mechanical Behavior of a Pipe Subject to Buckling

Authors: H. Chenine, D. Ouinas, Z. Bennaceur

Abstract:

The thin shell structures like metal are particularly susceptible to buckling or geometric instability. Their sizing is performed by resorting to simplified rules, this approach is generally conservative. Indeed, these structures are very sensitive to the slightest imperfection shape (initial geometrical defects). The design is usually based on the knowledge of the real or perceived initial state. Now this configuration evolves over time, there is usually the addition of new deformities due to operation (accidental loads, creep), but also to loss of material located in the corroded areas. Taking into account these various damage generally led to a loss of bearing capacity. In order to preserve the charge potential of the structure, it is then necessary to find a different material. In our study, we plan to replace the material used for reservoirs found in the company Sonatrach with a composite material made from carbon fiber or glass. 6 to 12 layers of composite are simply stuck. Research is devoted to the study of the buckling of multilayer shells subjected to an imposed displacement, allowed us to identify the key parameters and those whose effect is less. For all results, we find that the carbon epoxy T700E is the strongest, increasing the number of layers increases the strength of the shell.

Keywords: finite element analysis, circular notches, buckling, tank made composite materials

Procedia PDF Downloads 212
600 Buckling a Reservoir Composite Provided with Notches

Authors: H. Chenine, D. Ouinas, Z. Bennaceur

Abstract:

The thin shell structures like metal are particularly susceptible to buckling or geometric instability. Their sizing is performed by resorting to simplified rules, this approach is generally conservative. Indeed, these structures are very sensitive to the slightest imperfection shape (initial geometrical defects). The design is usually based on the knowledge of the real or perceived initial state. Now this configuration evolves over time, there is usually the addition of new deformities due to operation (accidental loads, creep), but also to loss of material located in the corroded areas. Taking into account these various damage generally led to a loss of bearing capacity. In order to preserve the charge potential of the structure, it is then necessary to find a different material. In our study we plan to replace the material used for reservoirs found in the company Sonatrach with a composite material made from carbon fiber or glass. 6 to 12 layers of composite are simply stuck. Research is devoted to the study of the buckling of multilayer shells subjected to an imposed displacement, allowed us to identify the key parameters and those whose effect is less. For all results, we find that the carbon epoxy T700E is the strongest, increasing the number of layers increases the strength of the shell.

Keywords: Finite Element Analysis, circular notches, buckling, tank made composite materials

Procedia PDF Downloads 354
599 The Integrated Urban Strategies Based on Deep Urban History and Modern Technology Study: Tourism and Leisure Industries as Driving Force to Reactivate Historical Area

Authors: Cheng Li, Jie Shen, Yutian Tang

Abstract:

Embracing the upcoming era of urbanization with the challenges of limitation of resources, disappearing cultural identities and conflicts among different groups of stakeholders, new integrated approaches are offered in our urban practice to help decision-makers and stakeholders frame and develop well-conceived, practical strategies for urban developing trajectories to approach urban-level sustainability in multiple social, cultural, ecological dimensions. Through bottom-up participation, we take advantage of tourism and leisure industries as driving forces for urbanization in China to promote integrated sustainable systems, with the hope of approaching both historical and ecological aspects of urban sustainability; and also thanks to top-down participation, we have codes, standards and rules established by the governments to strengthen the implementation of ecological urban sustainability. The results are monitored and evaluated experimentally and multidimensionally and the sustainable systems we constructed with local stakeholder groups turned out to be effective. The presentation of our selected projects would indicate our different focuses on urban sustainability.

Keywords: urban sustainability, integrated urban strategy, tourism and leisure industries, history, modern technology

Procedia PDF Downloads 376
598 Application of Data Mining Techniques for Tourism Knowledge Discovery

Authors: Teklu Urgessa, Wookjae Maeng, Joong Seek Lee

Abstract:

Application of five implementations of three data mining classification techniques was experimented for extracting important insights from tourism data. The aim was to find out the best performing algorithm among the compared ones for tourism knowledge discovery. Knowledge discovery process from data was used as a process model. 10-fold cross validation method is used for testing purpose. Various data preprocessing activities were performed to get the final dataset for model building. Classification models of the selected algorithms were built with different scenarios on the preprocessed dataset. The outperformed algorithm tourism dataset was Random Forest (76%) before applying information gain based attribute selection and J48 (C4.5) (75%) after selection of top relevant attributes to the class (target) attribute. In terms of time for model building, attribute selection improves the efficiency of all algorithms. Artificial Neural Network (multilayer perceptron) showed the highest improvement (90%). The rules extracted from the decision tree model are presented, which showed intricate, non-trivial knowledge/insight that would otherwise not be discovered by simple statistical analysis with mediocre accuracy of the machine using classification algorithms.

Keywords: classification algorithms, data mining, knowledge discovery, tourism

Procedia PDF Downloads 286
597 Emotion Classification Using Recurrent Neural Network and Scalable Pattern Mining

Authors: Jaishree Ranganathan, MuthuPriya Shanmugakani Velsamy, Shamika Kulkarni, Angelina Tzacheva

Abstract:

Emotions play an important role in everyday life. An-alyzing these emotions or feelings from social media platforms like Twitter, Facebook, blogs, and forums based on user comments and reviews plays an important role in various factors. Some of them include brand monitoring, marketing strategies, reputation, and competitor analysis. The opinions or sentiments mined from such data helps understand the current state of the user. It does not directly provide intuitive insights on what actions to be taken to benefit the end user or business. Actionable Pattern Mining method provides suggestions or actionable recommendations on what changes or actions need to be taken in order to benefit the end user. In this paper, we propose automatic classification of emotions in Twitter data using Recurrent Neural Network - Gated Recurrent Unit. We achieve training accuracy of 87.58% and validation accuracy of 86.16%. Also, we extract action rules with respect to the user emotion that helps to provide actionable suggestion.

Keywords: emotion mining, twitter, recurrent neural network, gated recurrent unit, actionable pattern mining

Procedia PDF Downloads 159
596 Taxation, Evidential and Jurisdictional Issues in Electronic Commercial Transactions in Nigeria

Authors: Michael Sunday Afolayan

Abstract:

This research work examined the challenges bedevilling the development of legal framework for electronic commercial transactions (e-commerce) in Nigeria. Nigeria does not have a clear-cut legislation regulating electronic commerce in its jurisdiction despite the geometrical rate of growth and adoption of this method of trade. It specifically posed a great challenge looking at taxation, evidential and jurisdictional issues in e-commerce in Nigeria. The author in a broader research work which is abridged here, traced the origin and development of e-commerce and the attendant laws applicable in Nigeria, examining their sufficiency or otherwise. In carrying out the research work, doctrinal mode of legal research was adopted, examining both primary and secondary sources of legal research materials within their contextual meanings. It was found that the failure to enact a law which has direct regulatory bearing on e-commerce in Nigeria has led to adoption and application of circumstantial laws, rules and common law principles to tackle the problems arising out of electronic commercial transactions, especially in the areas of taxation, evidential and jurisdictional challenges. It was ultimately suggested that there is urgent need to sign into law, the Electronic Transaction Bill which had already been passed by the National Assembly since 2017.

Keywords: e-commerce, legislation, taxation, evidential, jurisdiction

Procedia PDF Downloads 78
595 Emoji, the Language of the Future: An Analysis of the Usage and Understanding of Emoji across User-Groups

Authors: Sakshi Bhalla

Abstract:

On the one hand, given their seemingly simplistic, near universal usage and understanding, emoji are discarded as a potential step back in the evolution of communication. On the other, their effectiveness, pervasiveness, and adaptability across and within contexts are undeniable. In this study, the responses of 40 people (categorized by age) were recorded based on a uniform two-part questionnaire where they were required to a) identify the meaning of 15 emoji when placed in isolation, and b) interpret the meaning of the same 15 emoji when placed in a context-defining posting on Twitter. Their responses were studied on the basis of deviation from their responses that identified the emoji in isolation, as well as the originally intended meaning ascribed to the emoji. Based on an analysis of these results, it was discovered that each of the five age categories uses, understands and perceives emoji differently, which could be attributed to the degree of exposure they have undergone. For example, in the case of the youngest category (aged < 20), it was observed that they were the least accurate at correctly identifying emoji in isolation (~55%). Further, their proclivity to change their response with respect to the context was also the least (~31%). However, an analysis of each of their individual responses showed that these first-borns of social media seem to have reached a point where emojis no longer inspire their most literal meanings to them. The meaning and implication of these emoji have evolved to imply their context-derived meanings, even when placed in isolation. These trends carry forward meaningfully for the other four groups as well. In the case of the oldest category (aged > 35), however, the trends indicated inaccuracy and therefore, a higher incidence of a proclivity to change their responses. When studied in a continuum, the responses indicate that slowly and steadily, emoji are evolving from pictograms to ideograms. That is to suggest that they do not just indicate a one-to-one relation between a singular form and singular meaning. In fact, they communicate increasingly complicated ideas. This is much like the evolution of ancient hieroglyphics on papyrus reed or cuneiform on Sumerian clay tablets, which evolved from simple pictograms to progressively more complex ideograms. This evolution within communication is parallel to and contingent on the simultaneous evolution of communication. What’s astounding is the capacity of humans to leverage different platforms to facilitate such changes. Twiterese, as it is now called, is one of the instances where language is adapting to the demands of the digital world. That it does not have a spoken component, an ostensible grammar, and lacks standardization of use and meaning, as some might suggest, may seem like impediments in qualifying it as the 'language' of the digital world. However, that kind of a declarative remains a function of time, and time alone.

Keywords: communication, emoji, language, Twitter

Procedia PDF Downloads 93
594 Using Blockchain Technology to Extend the Vendor Managed Inventory for Sustainability

Authors: Elham Ahmadi, Roshaali Khaturia, Pardis Sahraei, Mohammad Niyayesh, Omid Fatahi Valilai

Abstract:

Nowadays, Information Technology (IT) is changing the way traditional enterprise management concepts work. One of the most dominant IT achievements is the Blockchain Technology. This technology enables the distributed collaboration of stakeholders for their interactions while fulfilling the security and consensus rules among them. This paper has focused on the application of Blockchain technology to enhance one of traditional inventory management models. The Vendor Managed Inventory (VMI) has been considered one of the most efficient mechanisms for vendor inventory planning by the suppliers. While VMI has brought competitive advantages for many industries, however its centralized mechanism limits the collaboration of a pool of suppliers and vendors simultaneously. This paper has studied the recent research for VMI application in industries and also has investigated the applications of Blockchain technology for decentralized collaboration of stakeholders. Focusing on sustainability issue for total supply chain consisting suppliers and vendors, it has proposed a Blockchain based VMI conceptual model. The different capabilities of this model for enabling the collaboration of stakeholders while maintaining the competitive advantages and sustainability issues have been discussed.

Keywords: vendor managed inventory, VMI, blockchain technology, supply chain planning, sustainability

Procedia PDF Downloads 211
593 Sensitivity to Misusing Verb Inflections in Both Finite and Non-Finite Clauses in Native and Non-Native Russian: A Self-Paced Reading Investigation

Authors: Yang Cao

Abstract:

Analyzing the oral production of Chinese-speaking learners of English as a second language (L2), we can find a large variety of verb inflections – Why does it seem so hard for them to use consistent correct past morphologies in obligatory past contexts? Failed Functional Features Hypothesis (FFFH) attributes the rather non-target-like performance to the absence of [±past] feature in their L1 Chinese, arguing that for post puberty learners, new features in L2 are no more accessible. By contrast, Missing Surface Inflection Hypothesis (MSIH) tends to believe that all features are actually acquirable for late L2 learners, while due to the mapping difficulties from features to forms, it is hard for them to realize the consistent past morphologies on the surface. However, most of the studies are limited to the verb morphologies in finite clauses and few studies have ever attempted to figure out these learners’ performance in non-finite clauses. Additionally, it has been discussed that Chinese learners may be able to tell the finite/infinite distinction (i.e. the [±finite] feature might be selected in Chinese, even though the existence of [±past] is denied). Therefore, adopting a self-paced reading task (SPR), the current study aims to analyze the processing patterns of Chinese-speaking learners of L2 Russian, in order to find out if they are sensitive to misuse of tense morphologies in both finite and non-finite clauses and whether they are sensitive to the finite/infinite distinction presented in Russian. The study targets L2 Russian due to its systematic morphologies in both present and past tenses. A native Russian group, as well as a group of English-speaking learners of Russian, whose L1 has definitely selected both [±finite] and [±past] features, will also be involved. By comparing and contrasting performance of the three language groups, the study is going to further examine and discuss the two theories, FFFH and MSIH. Preliminary hypotheses are: a) Russian native speakers are expected to spend longer time reading the verb forms which violate the grammar; b) it is expected that Chinese participants are, at least, sensitive to the misuse of inflected verbs in non-finite clauses, although no sensitivity to the misuse of infinitives in finite clauses might be found. Therefore, an interaction of finite and grammaticality is expected to be found, which indicate that these learners are able to tell the finite/infinite distinction; and c) having selected [±finite] and [±past], English-speaking learners of Russian are expected to behave target-likely, supporting L1 transfer.

Keywords: features, finite clauses, morphosyntax, non-finite clauses, past morphologies, present morphologies, Second Language Acquisition, self-paced reading task, verb inflections

Procedia PDF Downloads 103
592 Edward Bond's Questioning of Existence in His Play 'Have I None?'

Authors: Aycan Gurluyer

Abstract:

21st-century theatre has been shaped by lots of world-changing forces devastating human psychology and existence. Accepted as the greatest living English playwright, it is post-war British dramatist Edward Bond who uses a late-21st-century apocalyptic landscape as a weapon to question the human existence in his play 'Have I None?'. In this play, he tries to underline the degenerating and destructive effects of the society and environment on a couple whose lives are changed by an unexpected and annoying stranger. As victim of the society and the cultural corruption, the three vulnerable Bondian characters struggle for their expectations to find a place in this fictional world by sacrificing their own lives. Set in the 2077’s world, the play depicts that rigidly formed rules of the system/authority eliminates the existence of humans. According to Bond, the fascist practices of the governments/systems make people paralyzed in any way, so they choose to deny all realities by becoming biological beings or they gather to commit to suicide as troops. Our main aim is to underscore the questioning of the human existence by drawing the socio-political framework of the era, the capitalist system’s dehumanized individuals and their defence to survive, and what reality is in the 21st century, by focusing on Bond’s hallucinatory and tragic vision of the future in 'Have I None?'.

Keywords: Edward Bond, apocalyptic, existence, Have I None?

Procedia PDF Downloads 136
591 Unbreakable Obedience of Safety Regulation: The Study of Authoritarian Leadership and Safety Performance

Authors: Hong-Yi Kuo

Abstract:

Leadership is a key factor of improving workplace safety, and there have been abundant of studies which support the positive effects of appropriate leadership on employee safety performance in the western academic. However, little safety research focus on the Chinese leadership style like paternalistic leadership. To fill this gap, the resent study aims to examine the relationship between authoritarian leadership (one of the ternary mode in paternalistic leadership) and safety outcomes. This study makes hypothesis on different levels. First, on the group level, as an authoritarian leader regards safety value as the most important tasks, there would be positive effect on group safety outcomes through strengthening safety group norms by the emphasis on etiquette. Second, on the cross level, when a leader with authoritarian style has high priority on safety, employees may more obey the safety rules because of fear due to emphasis on absolute authority over the leader. Therefore, employees may show more safety performance and then increase individual safety outcomes. Survey data would be collected from 50 manufacturing groups (each group with more than 5 members and a leader) and a hierarchical linear modeling analysis would be conducted to analyze the hypothesis. Above the predictive result, the study expects to be a cornerstone of safety leadership research in the Chinese academic and practice.

Keywords: safety leadership, authoritarian leadership, group norms, safety behavior, supervisor safety priority

Procedia PDF Downloads 225
590 Automated Vehicle Traffic Control Tower: A Solution to Support the Next Level Automation

Authors: Xiaoyun Zhao, Rami Darwish, Anna Pernestål

Abstract:

Automated vehicles (AVs) have the potential to enhance road capacity, improving road safety and traffic efficiency. Research and development on AVs have been going on for many years. However, when the complicated traffic rules and real situations interacted, AVs fail to make decisions on contradicting situations, and are not able to have control in all conditions due to highly dynamic driving scenarios. This limits AVs’ usage and restricts the full potential benefits that they can bring. Furthermore, regulations, infrastructure development, and public acceptance cannot keep up at the same pace as technology breakthroughs. Facing these challenges, this paper proposes automated vehicle traffic control tower (AVTCT) acting as a safe, efficient and integrated solution for AV control. It introduces a concept of AVTCT for control, management, decision-making, communication and interaction with various aspects in transportation. With the prototype demonstrations and simulations, AVTCT has the potential to overcome the control challenges with AVs and can facilitate AV reaching their full potential. Possible functionalities, benefits as well as challenges of AVTCT are discussed, which set the foundation for the conceptual model, simulation and real application of AVTCT.

Keywords: automated vehicle, connectivity and automation, intelligent transport system, traffic control, traffic safety

Procedia PDF Downloads 131
589 Improving the Foult Ride through Capability and Stability of Wind Farms with DFIG Wind Turbine by Using Statcom

Authors: Abdulfetah Shobole, Arif Karakas, Ugur Savas Selamogullari, Mustafa Baysal

Abstract:

The concern of reducing emissions of Co2 from the fossil fuel generating units and using renewable energy sources increased in our world. Due this fact the integration ratio of wind farms to grid reached 20-30% in some part of our world. With increased integration of large MW scaled wind farms to the electric grid, the stability of the electrical system is a great concern. Thus, operators of power systems usually deman the wind turbine generators to obey the same rules as other traditional kinds of generation, such as thermal and hydro, i.e. not affect the grid stability. FACTS devices such as SVC or STATCOM are mostly installed close to the connection point of the wind farm to the grid in order to increase the stability especially during faulty conditions. In this paper wind farm with DFIG turbine type and STATCOM are dynamically modeled and simulated under three phase short circuit fault condition. The dynamic modeling is done by DigSILENT PowerFactory for the wind farm, STATCOM and the network. The simulation results show improvement of system stability near to the connection point of the STATCOM.

Keywords: DFIG wind turbine, statcom, dynamic modeling, digsilent

Procedia PDF Downloads 709
588 Evaluation of Institutionalization in Public Hospitals: A Province Example

Authors: Manar Aslan, Ayse Yildiz

Abstract:

The study was conducted descriptively to assess their hospital institutionalization of upper and mid-level managers of 18 hospitals affiliated to Public Hospitals Association. In its simplest form institutionalization is whatever the subject matter, is dominated by the rules of articulated and determined behavior in all kinds of business, interaction, and communication. Hospital service is a type of service carried out chained together. It should not be forgotten that this kind of services is carried out without barrier, and who and what to do with definite lines, hospital management is a process, and this process can be achieved through institutionalization. With the establishment of the Public Hospitals Unions in Turkey, all the state hospitals in the provinces have been gathered under this roof. One of the goals is to establish control mechanisms to ensure that hospitals reach pre-determined financial, medical, and administrative standards. In this way, the preparations for the institutionalization of units and hospital enterprises will be completed. The data of the study were collected by institutionalization management attitude scale (cronbach alpha: 0.98) of composed of 5 sub-dimensions and 52 questions in 18 hospitals’ managers (N=310) in the largest province in Turkey. The results of the study revealed that the total score taken by managers at the institutionalization scale was 200.80, and this was close to the maximum score. In addition, it was determined that the difference between the mean score of the scale and its sub-dimensions with the gender, the hospitals, and the management position.

Keywords: institutionalization, hospital, manager, evaluation

Procedia PDF Downloads 221
587 Effects of Classroom Management Strategies on Students’ Well-Being at Secondary Level

Authors: Saba Latif

Abstract:

The study is about exploring the Impact of Classroom Management Techniques on students’ Well-being at the secondary level. The objectives of the study are to identify the classroom management practices of teachers and their impact on students’ achievement. All secondary schools of Lahore city are the population of study. The researcher randomly selected ten schools, and from these schools, two hundred students participated in this study. Data has been collected by using Classroom Management and Students’ Wellbeing questionnaire. Frequency analysis has been applied. The major findings of the study are calculated as follows: The teacher’s instructional activities affect classroom management. The secondary school students' seating arrangement can influence the learning-teaching process. Secondary school students strongly disagree with the statement that the large size of the class affects the teacher’s classroom management. The learning environment of the class helps students participate in question-and-answer sessions. All the activities of the teachers are in accordance with practices in the class. The discipline of the classroom helps the students to learn more. The role of the teacher is to guide, and it enhances the performance of the teacher. The teacher takes time on disciplinary rules and regulations of the classroom. The teacher appreciates them when they complete the given task. The teacher appreciates teamwork in the class.

Keywords: classroom management, strategies, wellbeing, practices

Procedia PDF Downloads 43
586 Analysis of Microbiological Quality and Detection of Antibiotic Residue in Bovine Raw Milk Produced in Blida State, Algeria

Authors: M. N. Boukhatem, M. A. Ferhat, K. Mansour

Abstract:

Bovine raw milk represents a favorable environment for the growth of several food-spoilage strains and some pathogens. It must meet stringent standards to ensure the highest microbiological and toxicological qualities.In order to assess the microbiological risks associated with the consumption of this food, we conducted this study to determine the microbiological quality of bovine raw milk (54 samples) commercialized at the state of Blida (Algeria). The samples analyzed were unsatisfactory in terms of total flora where 61.11% of samples were considered as non acceptable in terms of quality standards, fecal coliforms (40.74%), fecal streptococci (55.55%) and staphylococci (74.07%). Salmonella and Clostridium strains were not detected in all the samples. Furthermore, antibiotic residues were found in 26% of analysed samples. These results reflect non-compliance with the rules of good hygiene practices at milking, storage, transportatio, and sale of milk. Bovine raw milk consumed presents a serious health risk to the population of the study areas.The livestock coaching actors and dissemination of good hygiene practices throughout the production chain are needed to improve the quality of local milk.

Keywords: bovine raw milk, microbiological quality, fecal coliforms, antibiotic residue, Blida state

Procedia PDF Downloads 229
585 The Use of Actoprotectors by Professional Athletes

Authors: Kalin Ivanov, Stanislava Ivanova

Abstract:

Actoprotectors are substances with hight performance enchasing potential and hight antioxidant activity. Most of these drugs have been developed in USSR for military medicine purposes. Based on their chemical composition actoprotectors could be classified into three categories: benzimidazole derivatives (ethomersol, bemitil); adamantane derivatives (bromantane), other chemical classes. First data for intake of actoprotectors from professional athletes is from 1980. The daily intake of actoprotectors demonstrate many benefits for athletes like: positive effect on the efficiency of physical work, antihypoxic effects, antioxidant effects, nootropic effects, rapid recovery. Since 1997, bromantane is considered as doping. This is a result of Summer Olympic Games in Athlanta (1996) when several Russian athletes tested positive for bramantane. Even the drug is safe for athletes health its use is considered as violation of anti- doping rules. More than 37 years bemetil has been used by professional athletes with no risk but currently it is included in WADA monitoring programme for 2018. Current perspectives are that most used actoprotectors would be considered as doping. Many clinical studies have confirmed that intake of bemitil and bromantan demonstrate positive influence on the physical work capacity but data for other actoprotectors like chlodantane, ademol, ethomersol is limited.

Keywords: actoprotector, sport, doping, bemitil

Procedia PDF Downloads 309
584 Vibration control of Bridge Super structure using Tuned Mass Damper (TMD)

Authors: Tauhidur Rahman, Dhrubajyoti Thakuria

Abstract:

In this article, vibration caused by earthquake excitation, wind load and the high-speed vehicle in the superstructure has been studied. An attempt has been made to control these vibrations using passive Tuned Mass Dampers (TMD). Tuned mass damper consists of a mass, spring, and viscous damper which dissipates the vibration energy of the primary structure at the damper of the TMD. In the present paper, the concrete box girder bridge superstructure is considered and is modeled using MIDAS software. The bridge is modeled as Euler-Bernoulli beam to study the responses imposed by high-speed vehicle, earthquake excitation and wind load. In the present study, comparative study for the responses has been done considering different velocities of the train. The results obtained in this study are based on Indian standard loadings specified in Indian Railways Board (Bridge Rules). A comparative study has been done for the responses of the high-speed vehicle with and without Tuned Mass Dampers. The results indicate that there is a significant reduction in displacement and acceleration in the bridge superstructure when Tuned Mass Damper is used.

Keywords: bridge superstructure, high speed vehicle, tuned mass damper, TMD, vibration control

Procedia PDF Downloads 399
583 Management of Religious Endowment Properties for Sustainable Development: A Case Study of Region of Kinniya, Sri Lanka

Authors: Muhammed Buhary Muhammed Thabith, Nor Asiah Mohamad

Abstract:

Religious Endowment (RE) (Waqf) has played an essential role in Islamic history and made a significant impact on the society, particularly in terms of socioeconomics. This has been made possible by having appropriate management of the RE propertiesin order to achieve the Sustainable Development Goals (SDGs), and the region of Kinniya, Sri Lanka, is not an exception. However, since the last Religious Endowment Act of 1982, a considerable deterioration has taken place, and cases of dormant properties have increased. This study proposes a conceptual model based on the SDGs initiatives to fill in the gaps. It analyses the application of the current RE properties management and identifies the issues as well as the challenges in the implementation of the RE Act. It adopts a doctrinal analysis involving the primary and secondary data, including statutes, practices, case law, and reports. The findings show that there are various management modes adopted by the stakeholders of RE. Some approaches are in tandem with the rules and practices of the SDGs with emphasis on support and cooperation from the community, private sector, and the government. Several initiatives such as awareness on RE, legal enforcements without fears and favours, as well as accounting and auditing, are recommended to minimize problems in managing the RE towards attaining the SDGs.

Keywords: sustainable development goals (SDGs), management, endowment, Sri Lanka

Procedia PDF Downloads 95
582 A New DIDS Design Based on a Combination Feature Selection Approach

Authors: Adel Sabry Eesa, Adnan Mohsin Abdulazeez Brifcani, Zeynep Orman

Abstract:

Feature selection has been used in many fields such as classification, data mining and object recognition and proven to be effective for removing irrelevant and redundant features from the original data set. In this paper, a new design of distributed intrusion detection system using a combination feature selection model based on bees and decision tree. Bees algorithm is used as the search strategy to find the optimal subset of features, whereas decision tree is used as a judgment for the selected features. Both the produced features and the generated rules are used by Decision Making Mobile Agent to decide whether there is an attack or not in the networks. Decision Making Mobile Agent will migrate through the networks, moving from node to another, if it found that there is an attack on one of the nodes, it then alerts the user through User Interface Agent or takes some action through Action Mobile Agent. The KDD Cup 99 data set is used to test the effectiveness of the proposed system. The results show that even if only four features are used, the proposed system gives a better performance when it is compared with the obtained results using all 41 features.

Keywords: distributed intrusion detection system, mobile agent, feature selection, bees algorithm, decision tree

Procedia PDF Downloads 401
581 Variables, Annotation, and Metadata Schemas for Early Modern Greek

Authors: Eleni Karantzola, Athanasios Karasimos, Vasiliki Makri, Ioanna Skouvara

Abstract:

Historical linguistics unveils the historical depth of languages and traces variation and change by analyzing linguistic variables over time. This field of linguistics usually deals with a closed data set that can only be expanded by the (re)discovery of previously unknown manuscripts or editions. In some cases, it is possible to use (almost) the entire closed corpus of a language for research, as is the case with the Thesaurus Linguae Graecae digital library for Ancient Greek, which contains most of the extant ancient Greek literature. However, concerning ‘dynamic’ periods when the production and circulation of texts in printed as well as manuscript form have not been fully mapped, representative samples and corpora of texts are needed. Such material and tools are utterly lacking for Early Modern Greek (16th-18th c.). In this study, the principles of the creation of EMoGReC, a pilot representative corpus of Early Modern Greek (16th-18th c.) are presented. Its design follows the fundamental principles of historical corpora. The selection of texts aims to create a representative and balanced corpus that gives insight into diachronic, diatopic and diaphasic variation. The pilot sample includes data derived from fully machine-readable vernacular texts, which belong to 4-5 different textual genres and come from different geographical areas. We develop a hierarchical linguistic annotation scheme, further customized to fit the characteristics of our text corpus. Regarding variables and their variants, we use as a point of departure the bundle of twenty-four features (or categories of features) for prose demotic texts of the 16th c. Tags are introduced bearing the variants [+old/archaic] or [+novel/vernacular]. On the other hand, further phenomena that are underway (cf. The Cambridge Grammar of Medieval and Early Modern Greek) are selected for tagging. The annotated texts are enriched with metalinguistic and sociolinguistic metadata to provide a testbed for the development of the first comprehensive set of tools for the Greek language of that period. Based on a relational management system with interconnection of data, annotations, and their metadata, the EMoGReC database aspires to join a state-of-the-art technological ecosystem for the research of observed language variation and change using advanced computational approaches.

Keywords: early modern Greek, variation and change, representative corpus, diachronic variables.

Procedia PDF Downloads 60
580 A Priori, Transcendental and Naturalistic Argument: Three Defense Strategies for Realism

Authors: SanXi Wu

Abstract:

A priori argument is a kind of reductio ad absurdum provided by Colin McGinn on the premise of accepting the basic rules of Dummett. The core part of the theory is to analyze the three joint positions besides realism and make them invalid, thus proving the rationality of the stance of realism. However, this argument strategy is vulnerable to skepticism because it delays the skeptical problem. In addition to McGinn, John Searle offers a linguistic transcendental argument strategy, which regards realism as the comprehensible condition that all normal activities of understanding must assume, while skepticism does not enjoy the same status. However, Searle's transcendental argument does not solve the problem of the relationship between realist presupposition and representational presupposition. Strawson, Hume, Reid, Wittgenstein, and others provide a naturalistic argument for realism. In this argument, realism is either a priori commitment from nature, or our second nature, or even a background belief that is fundamentally immovable. The key to this argument is to provide a quietistic treatment that ultimately invalidates our anti-realist myths. In comparison, the naturalistic argument is a more promising one. In this paper, methods of theoretical analysis and comparative research are used in order to demonstrate that in the face of skepticism, McGinn's a priori strategy and Searle's transcendental strategy are untenable, while Strawson and others' naturalistic strategy may resist the pressure of skepticism and make realism possible.

Keywords: a priori argument, transcendental argument, naturalism, realism, skepticism

Procedia PDF Downloads 48
579 Linguistic Symbols Principle Construction in Cultural Creative Product Design

Authors: Pei-Jun Xue, Ming-Yu Hsiao

Abstract:

Language is the emblem of a culture, representing the extension of cultural life. In addition, it is also an important tool for communication and message transmission. It carries not only information but also covers the self-conscious of the information constructor as well as the situational experiences of users from different backgrounds. Moreover, design can be regarded as a language, a dynamic process of coding and decoding. With the designers’ experiences in everyday life, they bring them into the products’ experiences. Considered from the aspects of atmosphere and the five senses, a designer should consider and reconsider how to communicate the messages effectively to suit the users’ needs. In the process of language learning, we should understand the construction behind it and the rules of the compositions of language codes. Regarding the understanding of the design of works or the form of product construction, it is necessary for us to understand the coding system during the process of product construction. The form (signifiers) and meanings (signified) of Chinese characters are closely related. At the same time, it is also a process of simplifying the complicated to the simple. This study discusses the chinese characters that used in the cultural symbols construction, and analysis of existing products by Peirce's semiotic triangles. Through people's cognition of Chinese characters and constitute method, help to understand the way of construction product symbol.

Keywords: cultural-creative product design, cultural product, cultural symbols, linguistic symbols

Procedia PDF Downloads 445
578 Determination of the Risks of Heart Attack at the First Stage as Well as Their Control and Resource Planning with the Method of Data Mining

Authors: İbrahi̇m Kara, Seher Arslankaya

Abstract:

Frequently preferred in the field of engineering in particular, data mining has now begun to be used in the field of health as well since the data in the health sector have reached great dimensions. With data mining, it is aimed to reveal models from the great amounts of raw data in agreement with the purpose and to search for the rules and relationships which will enable one to make predictions about the future from the large amount of data set. It helps the decision-maker to find the relationships among the data which form at the stage of decision-making. In this study, it is aimed to determine the risk of heart attack at the first stage, to control it, and to make its resource planning with the method of data mining. Through the early and correct diagnosis of heart attacks, it is aimed to reveal the factors which affect the diseases, to protect health and choose the right treatment methods, to reduce the costs in health expenditures, and to shorten the durations of patients’ stay at hospitals. In this way, the diagnosis and treatment costs of a heart attack will be scrutinized, which will be useful to determine the risk of the disease at the first stage, to control it, and to make its resource planning.

Keywords: data mining, decision support systems, heart attack, health sector

Procedia PDF Downloads 353
577 Corporate Social Responsibility Disclosure, Tax Aggressiveness and Sustainability Report Assurance: Evidence from Thailand

Authors: Eko Budi Santoso, Kazia Laturette, Stanislaus Adnanto Mastan

Abstract:

This study aims to examine the association between disclosure of social responsibility and tax aggressiveness in developing countries, namely Thailand. This is due to the increasing trend of disclosure of social responsibility in developing countries, even though this disclosure of information is still voluntary. On the other hand, developing countries have low taxation rate and investor protection infrastructures that allow the disclosure of social responsibility to be used opportunistically as a tool to fool the attainment of interests. This study also examines the role of assurance on the association between corporate social responsibility disclosure and tax aggressiveness. The assurance aims to provide confidence that the disclosure of social responsibility by the company is valid. This research builds an index to measure the disclosure of social responsibility based on the rules issued by the innovative Global Reporting. The results of the study are based on a sample of publicly traded companies in Thailand, which showed a positive association between disclosure of corporate social responsibility and tax aggressiveness, but it was further discovered that these results were mitigated by the existence of assurance against disclosure of corporate social responsibility. The results of this study indicate that the disclosure of corporate social responsibility can show that the company cares about the issue of social responsibility but does not automatically make the company as one that holds ethical values ​​in its business practices.

Keywords: corporate social responsibility disclosure, tax aggressiveness, sustainability assurance, business ethics

Procedia PDF Downloads 144
576 Adopting Flocks of Birds Approach to Predator for Anomalies Detection on Industrial Control Systems

Authors: M. Okeke, A. Blyth

Abstract:

Industrial Control Systems (ICS) such as Supervisory Control And Data Acquisition (SCADA) can be seen in many different critical infrastructures, from nuclear management to utility, medical equipment, power, waste and engine management on ships and planes. The role SCADA plays in critical infrastructure has resulted in a call to secure them. Many lives depend on it for daily activities and the attack vectors are becoming more sophisticated. Hence, the security of ICS is vital as malfunction of it might result in huge risk. This paper describes how the application of Prey Predator (PP) approach in flocks of birds could enhance the detection of malicious activities on ICS. The PP approach explains how these animals in groups or flocks detect predators by following some simple rules. They are not necessarily very intelligent animals but their approach in solving complex issues such as detection through corporation, coordination and communication worth emulating. This paper will emulate flocking behavior seen in birds in detecting predators. The PP approach will adopt six nearest bird approach in detecting any predator. Their local and global bests are based on the individual detection as well as group detection. The PP algorithm was designed following MapReduce methodology that follows a Split Detection Convergence (SDC) approach.

Keywords: artificial life, industrial control system (ICS), IDS, prey predator (PP), SCADA, SDC

Procedia PDF Downloads 297
575 Incorporating Priority Round-Robin Scheduler to Sustain Indefinite Blocking Issue and Prioritized Processes in Operating System

Authors: Heng Chia Ying, Charmaine Tan Chai Nie, Burra Venkata Durga Kumar

Abstract:

Process scheduling is the method of process management that determines which process the CPU will proceed with for the next task and how long it takes. Some issues were found in process management, particularly for Priority Scheduling (PS) and Round Robin Scheduling (RR). The proposed recommendations made for IPRRS are to combine the strengths of both into a combining algorithm while they draw on others to compensate for each weakness. A significant improvement on the combining technique of scheduler, Incorporating Priority Round-Robin Scheduler (IPRRS) address an algorithm for both high and low priority task to sustain the indefinite blocking issue faced in the priority scheduling algorithm and minimize the average turnaround time (ATT) and average waiting time (AWT) in RR scheduling algorithm. This paper will delve into the simple rules introduced by IPRRS and enhancements that both PS and RR bring to the execution of processes in the operating system. Furthermore, it incorporates the best aspects of each algorithm to build the optimum algorithm for a certain case in terms of prioritized processes, ATT, and AWT.

Keywords: round Robin scheduling, priority scheduling, indefinite blocking, process management, sustain, turnaround time

Procedia PDF Downloads 134
574 The Impact of the Saudi New E-Commerce Law on Protecting E-Commerce Investments in Saudi Arabia

Authors: Faris Algarni

Abstract:

The Kingdom of Saudi Arabia adopted a new law of e-commerce on July 10, 2019, which is the first Saudi law regarding e-commerce. The practice of e-commerce has been started in Saudi Arabia a few years ago with no specific rules to govern e-commerce in the Kingdom. The adoption of the law raises the concern of the ability of the law to provide real protection to both the investors and the customers. Based on that, this article seeks to respond to some questions related to the protection of investors of e-commerce in Saudi Arabia, using a quantitative method through questionnaires to gather primary data. The study tried to find the impact of adopting a new Saudi law of e-commerce on the protection of the investors from the point of view of those investors. By answering this main question, this article provides an answer to the question of whether there is a need to reform the Saudi law of e-commerce to convince existing and potential foreign investors to invest in the Kingdom through e-commerce. Questions were put to the respondents to determine their level of satisfaction with the Saudi law of e-commerce and what reforms to that system would enhance the attractiveness of the Kingdom as an investment environment for e-commerce investors, based on the information gathered and the analysis of them. A key finding is that the law of e-commerce is a core factor in the decision of investors to continue investing in the e-commerce market in Saudi Arabia. A subsequent finding is that some of the respondents are not fully satisfied with the new law and think that the law provides more protection to the customers than the investors. So, they are suggesting some legal reforms to be implemented in the bylaw of e-commerce, which is not adopted yet in order to attract them to continue investing in the Kingdom.

Keywords: e-commerce, law, investors, protection, Saudi Arabia

Procedia PDF Downloads 118
573 A Review of Serious Games Characteristics: Common and Specific Aspects

Authors: B. Ben Amara, H. Mhiri Sellami

Abstract:

Serious games adoption is increasing in multiple fields, including health, education, and business. In the same way, many research studied serious games (SGs) for various purposes such as classification, positive impacts, or learning outcomes. Although most of these research examine SG characteristics (SGCs) for conducting their studies, to author’s best knowledge, there is no consensus about features neither in number not in the description. In this paper, we conduct a literature review to collect essential game attributes regardless of the application areas and the study objectives. Firstly, we aimed to define Common SGCs (CSGCs) that characterize the game aspect, by gathering features having the same meanings. Secondly, we tried to identify specific features related to the application area or to the study purpose as a serious aspect. The findings suggest that any type of SG can be defined by a number of CSGCs depicting the gaming side, such as adaptability and rules. In addition, we outlined a number of specific SGCs describing the 'serious' aspect, including specific needs of the domain and indented outcomes. In conclusion, our review showed that it is possible to bridge the research gap due to the lack of consensus by using CSGCs. Moreover, these features facilitate the design and development of successful serious games in any domain and provide a foundation for further research in this area.

Keywords: serious game characteristics, serious games common aspects, serious games features, serious games outcomes

Procedia PDF Downloads 126