Search results for: coding rules
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 1671

Search results for: coding rules

921 Case Study: Optimization of Contractor’s Financing through Allocation of Subcontractors

Authors: Helen S. Ghali, Engy Serag, A. Samer Ezeldin

Abstract:

In many countries, the construction industry relies heavily on outsourcing models in executing their projects and expanding their businesses to fit in the diverse market. Such extensive integration of subcontractors is becoming an influential factor in contractor’s cash flow management. Accordingly, subcontractors’ financial terms are important phenomena and pivotal components for the well-being of the contractor’s cash flow. The aim of this research is to study the contractor’s cash flow with respect to the owner and subcontractor’s payment management plans, considering variable advance payment, payment frequency, and lag and retention policies. The model is developed to provide contractors with a decision support tool that can assist in selecting the optimum subcontracting plan to minimize the contractor’s financing limits and optimize the profit values. The model is built using Microsoft Excel VBA coding, and the genetic algorithm is utilized as the optimization tool. Three objective functions are investigated, which are minimizing the highest negative overdraft value, minimizing the net present worth of overdraft, and maximizing the project net profit. The model is validated on a full-scale project which includes both self-performed and subcontracted work packages. The results show potential outputs in optimizing the contractor’s negative cash flow values and, in the meantime, assisting contractors in selecting suitable subcontractors to achieve the objective function.

Keywords: cash flow optimization, payment plan, procurement management, subcontracting plan

Procedia PDF Downloads 124
920 Replacing MOSFETs with Single Electron Transistors (SET) to Reduce Power Consumption of an Inverter Circuit

Authors: Ahmed Shariful Alam, Abu Hena M. Mustafa Kamal, M. Abdul Rahman, M. Nasmus Sakib Khan Shabbir, Atiqul Islam

Abstract:

According to the rules of quantum mechanics there is a non-vanishing probability of for an electron to tunnel through a thin insulating barrier or a thin capacitor which is not possible according to the laws of classical physics. Tunneling of electron through a thin insulating barrier or tunnel junction is a random event and the magnitude of current flowing due to the tunneling of electron is very low. As the current flowing through a Single Electron Transistor (SET) is the result of electron tunneling through tunnel junctions of its source and drain the supply voltage requirement is also very low. As a result, the power consumption across a Single Electron Transistor is ultra-low in comparison to that of a MOSFET. In this paper simulations have been done with PSPICE for an inverter built with both SETs and MOSFETs. 35mV supply voltage was used for a SET built inverter circuit and the supply voltage used for a CMOS inverter was 3.5V.

Keywords: ITRS, enhancement type MOSFET, island, DC analysis, transient analysis, power consumption, background charge co-tunneling

Procedia PDF Downloads 519
919 Mitigation of Interference in Satellite Communications Systems via a Cross-Layer Coding Technique

Authors: Mario A. Blanco, Nicholas Burkhardt

Abstract:

An important problem in satellite communication systems which operate in the Ka and EHF frequency bands consists of the overall degradation in link performance of mobile terminals due to various types of degradations in the link/channel, such as fading, blockage of the link to the satellite (especially in urban environments), intentional as well as other types of interference, etc. In this paper, we focus primarily on the interference problem, and we develop a very efficient and cost-effective solution based on the use of fountain codes. We first introduce a satellite communications (SATCOM) terminal uplink interference channel model that is classically used against communication systems that use spread-spectrum waveforms. We then consider the use of fountain codes, with focus on Raptor codes, as our main mitigation technique to combat the degradation in link/receiver performance due to the interference signal. The performance of the receiver is obtained in terms of average probability of bit and message error rate as a function of bit energy-to-noise density ratio, Eb/N0, and other parameters of interest, via a combination of analysis and computer simulations, and we show that the use of fountain codes is extremely effective in overcoming the effects of intentional interference on the performance of the receiver and associated communication links. We then show this technique can be extended to mitigate other types of SATCOM channel degradations, such as those caused by channel fading, shadowing, and hard-blockage of the uplink signal.

Keywords: SATCOM, interference mitigation, fountain codes, turbo codes, cross-layer

Procedia PDF Downloads 353
918 Basic Modal Displacements (BMD) for Optimizing the Buildings Subjected to Earthquakes

Authors: Seyed Sadegh Naseralavi, Mohsen Khatibinia

Abstract:

In structural optimizations through meta-heuristic algorithms, analyses of structures are performed for many times. For this reason, performing the analyses in a time saving way is precious. The importance of the point is more accentuated in time-history analyses which take much time. To this aim, peak picking methods also known as spectrum analyses are generally utilized. However, such methods do not have the required accuracy either done by square root of sum of squares (SRSS) or complete quadratic combination (CQC) rules. The paper presents an efficient technique for evaluating the dynamic responses during the optimization process with high speed and accuracy. In the method, first by using a static equivalent of the earthquake, an initial design is obtained. Then, the displacements in the modal coordinates are achieved. The displacements are herein called basic modal displacements (MBD). For each new design of the structure, the responses can be derived by well scaling each of the MBD along the time and amplitude and superposing them together using the corresponding modal matrices. To illustrate the efficiency of the method, an optimization problems is studied. The results show that the proposed approach is a suitable replacement for the conventional time history and spectrum analyses in such problems.

Keywords: basic modal displacements, earthquake, optimization, spectrum

Procedia PDF Downloads 351
917 Exploring Subjective Simultaneous Mixed Emotion Experiences in Middle Childhood

Authors: Esther Burkitt

Abstract:

Background: Evidence is mounting that mixed emotions can be experienced simultaneously in different ways across the lifespan. Four types of patterns of simultaneously mixed emotions (sequential, prevalent, highly parallel, and inverse types) have been identified in middle childhood and adolescence. Moreover, the recognition of these experiences tends to develop firstly when children consider peers rather than the self. This evidence from children and adolescents is based on examining the presence of experiences specified in adulthood. The present study, therefore, applied an exhaustive coding scheme to investigate whether children experience types of previously unidentified simultaneous mixed emotional experiences. Methodology: One hundred and twenty children (60 girls) aged 7 years 1 month - 9 years 2 months (X=8 years 1 month; SD = 10 months) were recruited from mainstream schools across the UK. Two age groups were formed (youngest, n = 61, 7 years 1 month- 8 years 1 months: oldest, n = 59, 8 years 2 months – 9 years 2 months) and allocated to one of two conditions hearing vignettes describing happy and sad mixed emotion events in age and gender-matched protagonist or themselves. Results: Loglinear analyses identified new types of flexuous, vertical, and other experiences along with established sequential, prevalent, highly parallel, and inverse types of experience. Older children recognised more complex experiences other than the self-condition. Conclusion: Several additional types of simultaneously mixed emotions are recognised in middle childhood. The theoretical relevance of simultaneous mixed emotion processing in childhood is considered, and the potential utility of the findings in emotion assessments is discussed.

Keywords: emotion, childhood, self, other

Procedia PDF Downloads 72
916 Employers' Occupational Health and Safety Training Obligations in Framework Directive and Training Procedure and Rules in Turkey

Authors: Nuray Gökçek Karaca, Berrin Gökçek

Abstract:

Employers occupational safety and health training obligations are regulated in 89/391/EEC Framework Directive and also in 6331 numbered Occupational Health and Safety Law in Turkey. The main objective of this research is to determine and evaluate the employers’ occupational health and safety training obligations in Framework Directive in comparison with the 6331 numbered Occupational Health and Safety Law and to examine training principles in Turkey. For this purpose, employers’ occupational health and safety training obligations examined in Framework Directive and Occupational Health and Safety Law. This study carried out through comparative scanning model and literature model. The research data were collected through European Agency and ministry legislations. As a result, employers’ occupational health and safety training obligations in the 6331 numbered Occupational Health and Safety Law are compatible with the 89/391/EEC numbered Framework Directive and training principles are determined by in different ways like the trained workers, training issues, training period, training time, and trainers. In this study, employers’ training obligations are evaluated in detail.

Keywords: directive, occupational health and safety, training, work accidences

Procedia PDF Downloads 338
915 Higher Education Internationalisation: The Case of Indonesia

Authors: Agustinus Bandur, Dyah Budiastuti

Abstract:

With the rapid development of information and communication technology (ICT) in globalisation era, higher education (HE) internationalisation has become a worldwide phenomenon. However, even though various studies have been widely published in existing literature, the settings of these studies were taken places in developed countries. Accordingly, the major purpose of this article is to explore the current trends of higher education internationalisation programs with particular reference to identify the benefits and challenges confronted by participating staff and students. For these purposes, ethnographic qualitative study with the usage of NVivo 11 software was applied in coding, analyzing, and visualization of non-numeric data gathered from interviews, videos, web contents, social media, and relevant documents. Purposive sampling technique was applied in this study with a total of ten high-ranked accredited government and private universities in Indonesia. On the basis of thematic and cross-case analyses, this study indicates that while Australia has led other countries in dual-degree programs, partner universities from Japan and Korea have the most frequent collaboration on student exchange programs. Meanwhile, most visiting scholars who have collaborated with the universities in this study came from the US, the UK, Japan, Australia, Netherlands, and China. Other European countries such as Germany, French, and Norway have also conducted joint research with Indonesian universities involved in this study. This study suggests that further supports of government policy and grants are required to overcome the challenges as well as strategic leadership and management roles to achieve high impacts of such programs on higher education quality.

Keywords: higher education, internationalisation, challenges, Indonesia

Procedia PDF Downloads 264
914 Numerical Applications of Tikhonov Regularization for the Fourier Multiplier Operators

Authors: Fethi Soltani, Adel Almarashi, Idir Mechai

Abstract:

Tikhonov regularization and reproducing kernels are the most popular approaches to solve ill-posed problems in computational mathematics and applications. And the Fourier multiplier operators are an essential tool to extend some known linear transforms in Euclidean Fourier analysis, as: Weierstrass transform, Poisson integral, Hilbert transform, Riesz transforms, Bochner-Riesz mean operators, partial Fourier integral, Riesz potential, Bessel potential, etc. Using the theory of reproducing kernels, we construct a simple and efficient representations for some class of Fourier multiplier operators Tm on the Paley-Wiener space Hh. In addition, we give an error estimate formula for the approximation and obtain some convergence results as the parameters and the independent variables approaches zero. Furthermore, using numerical quadrature integration rules to compute single and multiple integrals, we give numerical examples and we write explicitly the extremal function and the corresponding Fourier multiplier operators.

Keywords: fourier multiplier operators, Gauss-Kronrod method of integration, Paley-Wiener space, Tikhonov regularization

Procedia PDF Downloads 313
913 Teachers’ Experiences regarding Use of Information and Communication Technology for Visually Impaired Students

Authors: Zikra Faiz, Zaheer Asghar, Nisar Abid

Abstract:

Information and Communication Technologies (ICTs) includes computers, the Internet, and electronic delivery systems such as televisions, radios, multimedia, and overhead projectors etc. In the modern world, ICTs is considered as an essential element of the teaching-learning process. The study was aimed to discover the usage of ICTs in Special Education Institutions for Visually Impaired students, Lahore, Pakistan. Objectives of the study were to explore the problems faced by teachers while using ICT in the classroom. The study was phenomenology in nature; a qualitative survey method was used through a semi-structured interview protocol developed by the researchers. The sample comprised of eighty faculty members selected through a purposive sampling technique. Data were analyzed through thematic analysis technique with the help of open coding. The study findings revealed that multimedia, projectors, computers, laptops and LEDs are used in special education institutes to enhance the teaching-learning process. Teachers believed that ICTs could enhance the knowledge of visually impaired students and every student should use these technologies in the classroom. It was concluded that multimedia, projectors and laptops are used in classroom by teachers and students. ICTs can promote effectively through the training of teachers and students. It was suggested that the government should take steps to enhance ICTs in teacher training and other institutions by pre-service and in-service training of teachers.

Keywords: information and communication technologies, in-services teachers, special education institutions

Procedia PDF Downloads 119
912 A Genetic Algorithm Based Ensemble Method with Pairwise Consensus Score on Malware Cacophonous Labels

Authors: Shih-Yu Wang, Shun-Wen Hsiao

Abstract:

In the field of cybersecurity, there exists many vendors giving malware samples classified results, namely naming after the label that contains some important information which is also called AV label. Lots of researchers relay on AV labels for research. Unfortunately, AV labels are too cluttered. They do not have a fixed format and fixed naming rules because the naming results were based on each classifiers' viewpoints. A way to fix the problem is taking a majority vote. However, voting can sometimes create problems of bias. Thus, we create a novel ensemble approach which does not rely on the cacophonous naming result but depend on group identification to aggregate everyone's opinion. To achieve this purpose, we develop an scoring system called Pairwise Consensus Score (PCS) to calculate result similarity. The entire method architecture combine Genetic Algorithm and PCS to find maximum consensus in the group. Experimental results revealed that our method outperformed the majority voting by 10% in term of the score.

Keywords: genetic algorithm, ensemble learning, malware family, malware labeling, AV labels

Procedia PDF Downloads 81
911 Bible of Hospitality: Considering the Hotel Business through the Prism of the Evangelical Approach

Authors: Rimma Kiseleva

Abstract:

The hotel business has a long history. The basis of the service of hospitality industry enterprises is the service, attitude, and consciousness of employees as hospitable “hosts of the house”. It is generally accepted that the founder and main expert of quality service is Caesar Ritz, “the king of hoteliers and the hotelier of kings.” However when deeply immersed in the history of the universe, it turns out that the very first book about hospitality, standardization of guest reception processes and the basics of better service is nothing more than the Bible. A unique study on the topic of considering the Church as a hotel, as well as the hotel business itself as the most gracious work of Jesus Christ Himself, which is confirmed by verses from the Gospel, includes the following approaches: analytical, comparative, empirical. The study shows that it was Jesus Christ who became the founder of the rules of the most sacrificial service, real service to people, filled with brotherly love, humility, love for strangers, those qualities that are the foundation, the “three pillars” of the hospitality industry. And also that the hotel is the most charitable cause, which is still relevant today.

Keywords: Augustine Aurelius, Bible, Gospel, guest house, hospitality, hotel, humility, inn, Jesus Christ, Joseph Fletcher, New Testament, Paul Tillich, service, strangeness

Procedia PDF Downloads 45
910 Facilitators and Barriers of Family Resilience in Cancer Patients Based on the Theoretical Domains Framework: An Integrative Review

Authors: Jiang Yuqi

Abstract:

Aims: The aim is to analyze the facilitators and barriers of family resilience in cancer patients based on the theoretical domain framework, provide a basis for intervention in the family resilience of cancer patients, and identify the progress and enlightenment of existing intervention projects. Methods: NVivo software was used to code the influencing factors using the framework of 14 theoretical domains as primary nodes; secondary nodes were then refined using thematic analysis, and specific influencing factors were aggregated and analyzed for evaluator reliability. Data sources: PubMed, Embase, CINAHL, Web of Science, Cochrane Library, MEDLINE, CNKI, and Wanfang (search dates: from construction to November 2023). Results: A total of 35 papers were included, with 142 coding points across 14 theoretical domains and 38 secondary nodes. The three most relevant theoretical domains are social influences (norms), the environment and resources, and emotions (mood). The factors with the greatest impact were family support, mood, confidence and beliefs, external support, quality of life, economic circumstances, family adaptation, coping styles with illness, and management. Conclusion: The factors influencing family resilience in cancer patients cover most of the theoretical domains in the Theoretical Domains Framework and are cross-cutting, multi-sourced, and complex. Further in-depth exploration of the key factors influencing family resilience is necessary to provide a basis for intervention research.

Keywords: cancer, survivors, family resilience, theoretical domains framework, literature review

Procedia PDF Downloads 39
909 Investigating Non-suicidal Self-Injury Discussions on Twitter

Authors: Muhammad Abubakar Alhassan, Diane Pennington

Abstract:

Social networking sites have become a space for people to discuss public health issues such as non-suicidal self-injury (NSSI). There are thousands of tweets containing self-harm and self-injury hashtags on Twitter. It is difficult to distinguish between different users who participate in self-injury discussions on Twitter and how their opinions change over time. Also, it is challenging to understand the topics surrounding NSSI discussions on Twitter. We retrieved tweets using #selfham and #selfinjury hashtags and investigated those from the United kingdom. We applied inductive coding and grouped tweeters into different categories. This study used the Latent Dirichlet Allocation (LDA) algorithm to infer the optimum number of topics that describes our corpus. Our findings revealed that many of those participating in NSSI discussions are non-professional users as opposed to medical experts and academics. Support organisations, medical teams, and academics were campaigning positively on rais-ing self-injury awareness and recovery. Using LDAvis visualisation technique, we selected the top 20 most relevant terms from each topic and interpreted the topics as; children and youth well-being, self-harm misjudgement, mental health awareness, school and mental health support and, suicide and mental-health issues. More than 50% of these topics were discussed in England compared to Scotland, Wales, Ireland and Northern Ireland. Our findings highlight the advantages of using the Twitter social network in tackling the problem of self-injury through awareness. There is a need to study the potential risks associated with the use of social networks among self-injurers.

Keywords: self-harm, non-suicidal self-injury, Twitter, social networks

Procedia PDF Downloads 123
908 Transferring Data from Glucometer to Mobile Device via Bluetooth with Arduino Technology

Authors: Tolga Hayit, Ucman Ergun, Ugur Fidan

Abstract:

Being healthy is undoubtedly an indispensable necessity for human life. With technological improvements, in the literature, various health monitoring and imaging systems have been developed to satisfy your health needs. In this context, the work of monitoring and recording the data of individual health monitoring data via wireless technology is also being part of these studies. Nowadays, mobile devices which are located in almost every house and which become indispensable of our life and have wireless technology infrastructure have an important place of making follow-up health everywhere and every time because these devices were using in the health monitoring systems. In this study, Arduino an open-source microcontroller card was used in which a sample sugar measuring device was connected in series. In this way, the glucose data (glucose ratio, time) obtained with the glucometer is transferred to the mobile device based on the Android operating system with the Bluetooth technology channel. A mobile application was developed using the Apache Cordova framework for listing data, presenting graphically and reading data over Arduino. Apache Cordova, HTML, Javascript and CSS are used in coding section. The data received from the glucometer is stored in the local database of the mobile device. It is intended that people can transfer their measurements to their mobile device by using wireless technology and access the graphical representations of their data. In this context, the aim of the study is to be able to perform health monitoring by using different wireless technologies in mobile devices that can respond to different wireless technologies at present. Thus, that will contribute the other works done in this area.

Keywords: Arduino, Bluetooth, glucose measurement, mobile health monitoring

Procedia PDF Downloads 314
907 Rules in Policy Integration, Case Study: Victoria Catchment Management

Authors: Ratri Werdiningtyas, Yongping Wei, Andrew Western

Abstract:

This paper contributes to on-going attempts at bringing together land, water and environmental policy in catchment management. A tension remains in defining the boundaries of policy integration. Most of Integrated Water Resource Management is valued as rhetoric policy. It is far from being achieved on the ground because the socio-ecological system has not been understood and developed into complete and coherent problem representation. To clarify the feature of integration, this article draws on institutional fit for public policy integration and uses these insights in an empirical setting to identify the mechanism that can facilitate effective public integration for catchment management. This research is based on the journey of Victoria’s government from 1890-2016. A total of 274 Victorian Acts related to land, water, environment management published in those periods has been investigated. Four conditions of integration have been identified in their co-evolution: (1) the integration policy based on reserves, (2) the integration policy based on authority interest, (3) policy based on integrated information and, (4) policy based coordinated resource, authority and information. Results suggest that policy coordination among their policy instrument is superior rather than policy integration in the case of catchment management.

Keywords: catchment management, co-evolution, policy integration, phase

Procedia PDF Downloads 241
906 Black-Brown and Yellow-Brown-Red Skin Pigmentation Elements are Shared in Common: Using Art and Science for Multicultural Education

Authors: Mary Kay Bacallao

Abstract:

New research on the human genome has revealed secrets to the variation in skin pigmentation found in all human populations. Application of this research to multicultural education has a profound effect on students from all backgrounds. This paper identifies the four locations in the human genome that code for variation in skin pigmentation worldwide. The research makes this new knowledge accessible to students of all ages as they participate in an art project that brings these scientific multicultural concepts to life. Students participate in the application of breakthrough scientific principles through hands-on art activities where they simulate the work of the DNA coding to create their own skin tone using the colors expressed to varying degrees in every people group. As students create their own artwork handprint from the pallet of colors, they realize that each color on the pallet is essential to creating every tone of skin. This research project serves to bring people together and appreciate the variety and diversity in skin tones. As students explore the variations, they create pigmentation with the use of the eumelanins, which are the black-brown sources of pigmentation, and the pheomelanins, which are the yellow-reddish-brown sources of pigmentation. The research project dispels myths about skin tones that have divided people in the past. As a group project, this research leads to greater appreciation and understanding of the diverse family groups.

Keywords: diversity, multicultural, skin pigmentation, eumelanins, pheomelanins, handprint, artwork, science, genome, human

Procedia PDF Downloads 60
905 Analyzing the Factors Effecting Ceramic Porosity Using Integrated Taguchi-Fuzzy Method

Authors: Enes Furkan Erkan, Özer Uygun, Halil Ibrahim Demir, Zeynep Demir

Abstract:

Companies require increase in quality perception level of their products due to competitive conditions. As a result, the tendency to quality and researches to develop the quality are increasing day by day. Cost and time constraints are the biggest problems that companies face in their quality improvement efforts. In this study, factors that affect the porosity of ceramic products are determined and analyzed in a factory producing ceramic tiles. Then, Taguchi method is used in the design phase in order to decrease the number of tests to be performed by means of orthogonal sequences. The most important factors affecting the porosity of ceramic tiles are determined using Taguchi and ANOVA analysis. Based on the analyses, the most affecting factors are determined to be used in the fuzzy implementation stage. Then, the fuzzy rules were established with the factors affecting porosity by the experts’ opinion. Thus, porosity result could be obtained not only for the specified factor levels but also for intermediate values. In this way, it has been provided convenience to the factory in terms of cost and quality improvement.

Keywords: fuzzy, porosity, Taguchi Method, Taguchi-Fuzzy

Procedia PDF Downloads 427
904 Evaluation of Brca1/2 Mutational Status among Algerian Familial Breast Cancer

Authors: Arab M., Ait Abdallah M., Zeraoulia N., Boumaza H., Aoutia M., Griene L., Ait Abdelkader B.,

Abstract:

breast and ovarian cancer are respectively the first and fourth leading causes of cancer among women in Algeria. A family story of cancer in the most important risk factor, and in most cases of families with breast and /or ovarian cancer, the pattern of cancer family can be attributed to mutation in BRCA1/2genes. objectibes: the aim of our study in to investigate the spectrum of BRCA1/2 germiline mutation in familial breast and /or ovarian cancer and to determine the prevalence and the nature of BRCA1/2mutation in Algeria methods: we deremined the prevalence of BRCA1/2 mutation within a cohort of 161 probands selected according the eisinger score double stranded sanger sequencing of all coding exons of BRCA1/2including flanking intronic region were performed results: we identified a total of 23 distinct deleterious mutations (class5) 12 differents mutations in BRCA1(52%) and 11 in BRCA2(48%). 78% (18/23) were protein truncating and 22%(5/23) missens mutations.3 novel deleterious mutations have been identified, which have not been described in public mutation database. one new mutation were found in two unrelated patients. the overall mutation detection rate in our study is 28,5%(46/161).more over, an UVS c7783 located in BRCA2 is found in two unrelated probands and segregate in the 02 families/ conclusion: our results sugget of large spectrum of BRCA1/2 mutation in Algerian breast/ovarian cancer family. The nature and prevalence of BRCA1/2mutation in algerian families are ongoing in a larger study, 80 probands are to day under investigation. This study which may therefore identify the genetic particularity of Algerian breast /ovarian cancer.

Keywords: BRCA1/2 mutations, hereditary breast cancer, algerian women, prvalence

Procedia PDF Downloads 172
903 Cases of Violence against Women: Towards a Proposed Plan of Action

Authors: Murphy P. Mohammed, Rita E. Pulmano

Abstract:

This study determined the cases of violence against women in selected barangays of Tarlac City. In this research, the following questions were answered: what is the description of the cases on violence against women?; what are the causes of violence against women?; what support/assistance is provided by the LGUs?; and what plan of action can be proposed to improve the VAW services of the barangays? The methodologies used in the present study are qualitative and descriptive researches. The researchers used documentary analysis and interview to gather data. The subjects of the study are violence against women survivors from the selected ten (10) populous barangays of Tarlac City. Physical abuse, mental abuse, threatening, abandonment of children, child support issues, child custody, psychological abuse, economic abuse, and rape are the other recorded cases among the evaluated barangays. Based on the information, the researchers found out that a VAW desk was established in every respondent barangay. This in compliance with Section 12 D, Rule IV of the Rules and Regulations Implementing the Magna Carta of Women, which provides for the establishment of a VAW desk in every barangay to ensure that violence against women cases are fully addressed in a gender-responsive manner.

Keywords: Barangay VAW desk, cases of violence against women, violence against women, women's studies

Procedia PDF Downloads 321
902 Settlements of Disputes in the Context of Islamic (Sharia) Economics in Indonesia and Egypt: A Comparative Analysis

Authors: Gemala Dewi, Wirdyaningsih, Farida Prihatini

Abstract:

The development of sharia business activities at present has solidified its societal mark and has crossed influence between several nations. In the practice, there may be disputes, breaches and other forms of conflict that occurred along the way. In the meantime, alternative settlements of disputes are utilized differently between nations in the context of their political, social, economic, legal and infrastructural (technology and transportation) scope. Besides the various conditions, there is a common driving factor, which is a consequence of the need for businesses to settle conflicts in an efficient and cost-efficient manner. This factor is paired symbiotically with the limitations of the court and legal processes. Knowing this, Indonesia and Egypt represent countries that have similar social, political, economic and legal conditions. This academic research establishes a normative analysis that looks and compares the rules that regulate the prospects and challenges in the regards of dispute settlements in reference to sharia economics in Indonesia and Egypt. This work recommends that sharia economics dispute settlement is significant to be incorporated in both Indonesian and Egyptian legal systems.

Keywords: sharia economics, dispute resolution, Indonesia, Egypt

Procedia PDF Downloads 327
901 Fuzzy Inference System for Risk Assessment Evaluation of Wheat Flour Product Manufacturing Systems

Authors: Yas Barzegaar, Atrin Barzegar

Abstract:

The aim of this research is to develop an intelligent system to analyze the risk level of wheat flour product manufacturing system. The model consists of five Fuzzy Inference Systems in two different layers to analyse the risk of a wheat flour product manufacturing system. The first layer of the model consists of four Fuzzy Inference Systems with three criteria. The output of each one of the Physical, Chemical, Biological and Environmental Failures will be the input of the final manufacturing systems. The proposed model based on Mamdani Fuzzy Inference Systems gives a performance ranking of wheat flour products manufacturing systems. The first step is obtaining data to identify the failure modes from expert’s opinions. The second step is the fuzzification process to convert crisp input to a fuzzy set., then the IF-then fuzzy rule applied through inference engine, and in the final step, the defuzzification process is applied to convert the fuzzy output into real numbers.

Keywords: failure modes, fuzzy rules, fuzzy inference system, risk assessment

Procedia PDF Downloads 91
900 Cultural Stereotypes in EFL Classrooms and Their Implications on English Language Procedures in Cameroon

Authors: Eric Enongene Ekembe

Abstract:

Recent calls on EFL teaching posit the centrality of context factors and argue for a correlation between effectiveness in teaching with the learners’ culture in the EFL classroom. Context is not everything; it is defined with indicators of learners’ cultural artifacts and stereotypes in meaningful interactions in the language classroom. In keeping with this, it is difficult to universalise pedagogic procedures given that appropriate procedures are context-sensitive- and contexts differ. It is necessary to investigate what counts as cultural specificities or stereotypes of specific learners to reflect on how different language learning contexts affect or are affected by English language teaching procedures, most especially in under-represented cultures, which have appropriated the English language. This paper investigates cultural stereotypes of EFL learners in the culturally diverse Cameroon to examine how they mediate teaching and learning. Data collected on mixed-method basis from 83 EFL teachers and 1321 learners in Cameroon reveal a strong presence of typical cultural artifacts and stereotypes. Statistical analysis and thematic coding demonstrate that teaching procedures in place were insensitive to the cultural artifacts and stereotypes, resulting in trending tension between teachers and learners. The data equally reveal a serious contradiction between the communicative goals of language teaching and learning: what teachers held as effective teaching was diametrically opposed to success in learning. In keeping with this, the paper argues for a ‘decentred’ teacher preparation in Cameroon that is informed by systemic learners’ feedback. On this basis, applied linguistics has the urgent task of exploring dimensions of what actually counts as contextualized practice in ELT.

Keywords: cultural stereotypes, EFL, implications, procedures

Procedia PDF Downloads 121
899 A Picture is worth a Billion Bits: Real-Time Image Reconstruction from Dense Binary Pixels

Authors: Tal Remez, Or Litany, Alex Bronstein

Abstract:

The pursuit of smaller pixel sizes at ever increasing resolution in digital image sensors is mainly driven by the stringent price and form-factor requirements of sensors and optics in the cellular phone market. Recently, Eric Fossum proposed a novel concept of an image sensor with dense sub-diffraction limit one-bit pixels (jots), which can be considered a digital emulation of silver halide photographic film. This idea has been recently embodied as the EPFL Gigavision camera. A major bottleneck in the design of such sensors is the image reconstruction process, producing a continuous high dynamic range image from oversampled binary measurements. The extreme quantization of the Poisson statistics is incompatible with the assumptions of most standard image processing and enhancement frameworks. The recently proposed maximum-likelihood (ML) approach addresses this difficulty, but suffers from image artifacts and has impractically high computational complexity. In this work, we study a variant of a sensor with binary threshold pixels and propose a reconstruction algorithm combining an ML data fitting term with a sparse synthesis prior. We also show an efficient hardware-friendly real-time approximation of this inverse operator. Promising results are shown on synthetic data as well as on HDR data emulated using multiple exposures of a regular CMOS sensor.

Keywords: binary pixels, maximum likelihood, neural networks, sparse coding

Procedia PDF Downloads 197
898 The Role and Position of Chinese Modern Martial Art in the School Physical Education (1912-1945)

Authors: Hsien-Wei Kuo

Abstract:

The thoughts of the military citizens, pragmatism, naturalism and nationalism related to physical education were developed during the warring period of the Republic of China. Moreover, the development of martial art formed by nationalism and political party was to utilize to save the nation, the people and the world. The martial art was also promoted in the system of school physical education gradually at the same time. The aim of this study is to explore the role, duty and position of the martial art education with the political color and advocacy in the system of school physical education. This study focuses on the practice, course hours, selective materials and competitive rules of physical education in the school system in modern China. Therefore, the methods of the historical research and content analysis were used to collect the historical materials and documents for going into them. The results will give a detailed account of the developed model of institutionalization, unification and regularization of martial art, and its growing, golden and stagnant periods in the school physical education system under the impact of western sport and physical education. It may sum up the meaning relationships among the politics, education practice and sport for all.

Keywords: martial art education, national martial arts institution, sick man of East Asia, the may 4th movement

Procedia PDF Downloads 373
897 Collaborative and Context-Aware Learning Approach Using Mobile Technology

Authors: Sameh Baccari, Mahmoud Neji

Abstract:

In recent years, the rapid developments on mobile devices and wireless technologies enable new dimension capabilities for the learning domain. This dimension facilitates people daily activities and shortens the distances between individuals. When these technologies have been used in learning, a new paradigm has been emerged giving birth to mobile learning. Because of the mobility feature, m-learning courses have to be adapted dynamically to the learner’s context. The main challenge in context-aware mobile learning is to develop an approach building the best learning resources according to dynamic learning situations. In this paper, we propose a context-aware mobile learning system called Collaborative and Context-aware Mobile Learning System (CCMLS). It takes into account the requirements of Mobility, Collaboration and Context-Awareness. This system is based on the semantic modeling of the learning context and the learning content. The adaptation part of this approach is made up of adaptation rules to propose and select relevant resources, learning partners and learning activities based not only on the user’s needs, but also on its current context.

Keywords: mobile learning, mobile technologies, context-awareness, collaboration, semantic web, adaptation engine, adaptation strategy, learning object, learning context

Procedia PDF Downloads 299
896 Earthquakes and Buildings: Lesson Learnt from Past Earthquakes in Turkey

Authors: Yavuz Yardım

Abstract:

The most important criteria for structural engineering is the structure’s ability to carry intended loads safely. The key element of this ability is mathematical modeling of really loadings situation into a simple loads input to use in structure analysis and design. Amongst many different types of loads, the most challenging load is earthquake load. It is possible magnitude is unclear and timing is unknown. Therefore the concept of intended loads and safety have been built on experience of previous earthquake impact on the structures. Understanding and developing these concepts is achieved by investigating performance of the structures after real earthquakes. Damage after an earthquake provide results of thousands of full-scale structure test under a real seismic load. Thus, Earthquakes reveille all the weakness, mistakes and deficiencies of analysis, design rules and practice. This study deals with lesson learnt from earthquake recoded last two decades in Turkey. Results of investigation after several earthquakes exposes many deficiencies in structural detailing, inappropriate design, wrong architecture layout, and mainly mistake in construction practice.

Keywords: earthquake, seismic assessment, RC buildings, building performance

Procedia PDF Downloads 261
895 Cost-Optimized Extra-Lateral Transshipments

Authors: Dilupa Nakandala, Henry Lau

Abstract:

Ever increasing demand for cost efficiency and customer satisfaction through reliable delivery have been a mandate for logistics practitioners to continually improve inventory management processes. With the cost optimization objectives, this study considers an extended scenario where sourcing from the same echelon of the supply chain, known as lateral transshipment which is instantaneous but more expensive than purchasing from regular suppliers, is considered by warehouses not only to re-actively fulfill the urgent outstanding retailer demand that could not be fulfilled by stock on hand but also for preventively reduce back-order cost. Such extra lateral trans-shipments as preventive responses are intended to meet the expected demand during the supplier lead time in a periodic review ordering policy setting. We develop decision rules to assist logistics practitioners to make cost optimized selection between back-ordering and combined reactive and proactive lateral transshipment options. A method for determining the optimal quantity of extra lateral transshipment is developed considering the trade-off between purchasing, holding and backorder cost components.

Keywords: lateral transshipment, warehouse inventory management, cost optimization, preventive transshipment

Procedia PDF Downloads 609
894 Identifying Enablers and Barriers of Healthcare Knowledge Transfer: A Systematic Review

Authors: Yousuf Nasser Al Khamisi

Abstract:

Purpose: This paper presents a Knowledge Transfer (KT) Framework in healthcare sectors by applying a systematic literature review process to the healthcare organizations domain to identify enablers and barriers of KT in Healthcare. Methods: The paper conducted a systematic literature search of peer-reviewed papers that described key elements of KT using four databases (Medline, Cinahl, Scopus, and Proquest) for a 10-year period (1/1/2008–16/10/2017). The results of the literature review were used to build a conceptual framework of KT in healthcare organizations. The author used a systematic review of the literature, as described by Barbara Kitchenham in Procedures for Performing Systematic Reviews. Findings: The paper highlighted the impacts of using Knowledge Management (KM) concept at a healthcare organization in controlling infectious diseases in hospitals, improving family medicine performance and enhancing quality improvement practices. Moreover, it found that good-coding performance is analytically linked with a knowledge sharing network structure rich in brokerage and hierarchy rather than in density. The unavailability or ignored of the latest evidence on more cost-effective or more efficient delivery approaches leads to increase the healthcare costs and may lead to unintended results. Originality: Search procedure produced 12,093 results, of which 3523 were general articles about KM and KT. The titles and abstracts of these articles had been screened to segregate what is related and what is not. 94 articles identified by the researchers for full-text assessment. The total number of eligible articles after removing un-related articles was 22 articles.

Keywords: healthcare organisation, knowledge management, knowledge transfer, KT framework

Procedia PDF Downloads 133
893 Interpreting Form Based Code in Historic Residential Corridor

Authors: Diljan C. K.

Abstract:

Every location on the planet has a history and culture that give it its own identity and character, making it distinct from others. urbanised world, it is fashionable to remould its original character and impression in a contemporary style. The new character and impression of places show a complete detachment from their roots. The heritage and cultural values of the place are replaced by new impressions, and as a result, they eventually lose their identity and character and never have sustenance. In this situation, form-based coding acts as a tool in the urban design process, helping to come up with solutions that strongly bind individuals to their neighbourhood and are closely related to culture through the physical spaces they are associated with. Form-based code was made by pioneers of new urbanism in 1987 in the United States of America. Since then, it has been used in various projects inside and outside the USA with varied scales, from the design of a single building to the design of a whole community. This research makes an effort to interpret the form-based code in historic corridors to establish the association of physical form and space with the public realm to uphold the context and culture. Many of the historic corridors are undergoing a tremendous transformation in their physical form, avoiding their culture and context. This will lead to it losing its identity in form and function. If the case of Valiyashala in Trivandrum is taken as the case, which is transforming its form and will lead to the loss of its identity, the form-based code will be a suitable tool to strengthen its historical value. The study concludes by analysing the existing code (KMBR) of Valiyashala and form-based code to find the requirements in form-based code for Valiyashala.

Keywords: form based code, urban conservation, heritage, historic corridor

Procedia PDF Downloads 104
892 Understanding Gender-Based Violence through an Adolescent Lens: Qualitative Findings from Delhi, India

Authors: Pratishtha Singh

Abstract:

Gender-based violence (GBV) or gendered violence refers to violence inflicted on a person because of their gender. Majority of men who perpetrate gender-based violence, first do so during their teenage years. Further, the first sexual experience of most girls is coerced. In order to reduce the widespread occurrence of GBV, it is vital to intervene and reach people, especially boys, when their attitudes and beliefs about sexuality and gender are developing. This study aims to understand GBV through an adolescent lens, focusing on their knowledge, attitudes and experiences regarding gendered abuse. This is a cross-sectional, qualitative study. The respondents are Delhi based students in grades 11th and 12th, recruited via snowball sampling. Sixteen in-depth, telephonic interviews were carried out in the month of April, 2020. The data was transcribed verbatim into MS Word and qualitative coding was undertaken in Atlas.ti 8. Twelve out of sixteen respondents admitted experiencing sexual GBV. Out of these, a little more than half of the victims reported it to somebody. Thematic analysis revealed key themes of: (i) Introduction and reinforcement of a patriarchal structure (ii) Violence in teen dating (iii) Acceptability and normalization of violence and (iv) Justice System. Findings reflect a process wherein GBV becomes an intricate part of adolescents’ lives. Participants showed a moderately well-informed understanding of gendered abuse whereas attitudes reflected a complex combination of internalized patriarchy and a desire to bring positive societal reform. The results of this study highlight a need for health promoting, gender-equitable interventions.

Keywords: adolescents, gender, health, violence

Procedia PDF Downloads 121