Search results for: hardening rules
504 Development of Restricted Formula SAE Intake Manifold Using 1D and Flow Simulations Based on Track Analysis
Authors: Sahil Kapahi
Abstract:
A Formula SAE competition is characterized by typical track layouts having slaloms, tight corners and short straights, which favor a particular range of engine speed for a given set of gear ratios. Therefore, it is imperative that the power-train is optimized for the corresponding engine rpm band. This paper describes the process of designing, simulating and validating an air intake manifold for an inline four cylinder four-stroke internal combustion gasoline engine based on analysis of required vehicle performance. The requirements for the design of subject intake were set considering the rules of FSAE competitions and analysis of engine performance patterns for typical competition scenarios, carried out using OPTIMUMLAP software. Manifold geometry was optimized using results of air flow simulations performed on ANSYS CFX, and subsequent effect of this geometry on the engine was modeled using 1D simulation on Ricardo WAVE. A design was developed to meet the targeted performance standards in terms of engine torque output and volumetric efficiency. Finally, the intake manifold was manufactured and assembled onto the vehicle, and the engine output of the vehicle with the designed intake was studied using a dynamometer. The results of the dynamometer testing were then validated against predicted values derived from the Ricardo WAVE modeling and benefits to performance of the vehicle were established.Keywords: 1 D Simulation, air flow simulation, ANSYS CFX, four-stroke engine, OPTIMUM LAP, Ricardo WAVE
Procedia PDF Downloads 246503 Fuzzy Inference-Assisted Saliency-Aware Convolution Neural Networks for Multi-View Summarization
Authors: Tanveer Hussain, Khan Muhammad, Amin Ullah, Mi Young Lee, Sung Wook Baik
Abstract:
The Big Data generated from distributed vision sensors installed on large scale in smart cities create hurdles in its efficient and beneficial exploration for browsing, retrieval, and indexing. This paper presents a three-folded framework for effective video summarization of such data and provide a compact and representative format of Big Video Data. In the first fold, the paper acquires input video data from the installed cameras and collect clues such as type and count of objects and clarity of the view from a chunk of pre-defined number of frames of each view. The decision of representative view selection for a particular interval is based on fuzzy inference system, acquiring a precise and human resembling decision, reinforced by the known clues as a part of the second fold. In the third fold, the paper forwards the selected view frames to the summary generation mechanism that is supported by a saliency-aware convolution neural network (CNN) model. The new trend of fuzzy rules for view selection followed by CNN architecture for saliency computation makes the multi-view video summarization (MVS) framework a suitable candidate for real-world practice in smart cities.Keywords: big video data analysis, fuzzy logic, multi-view video summarization, saliency detection
Procedia PDF Downloads 188502 Comparative Analysis of Classification Methods in Determining Non-Active Student Characteristics in Indonesia Open University
Authors: Dewi Juliah Ratnaningsih, Imas Sukaesih Sitanggang
Abstract:
Classification is one of data mining techniques that aims to discover a model from training data that distinguishes records into the appropriate category or class. Data mining classification methods can be applied in education, for example, to determine the classification of non-active students in Indonesia Open University. This paper presents a comparison of three methods of classification: Naïve Bayes, Bagging, and C.45. The criteria used to evaluate the performance of three methods of classification are stratified cross-validation, confusion matrix, the value of the area under the ROC Curve (AUC), Recall, Precision, and F-measure. The data used for this paper are from the non-active Indonesia Open University students in registration period of 2004.1 to 2012.2. Target analysis requires that non-active students were divided into 3 groups: C1, C2, and C3. Data analyzed are as many as 4173 students. Results of the study show: (1) Bagging method gave a high degree of classification accuracy than Naïve Bayes and C.45, (2) the Bagging classification accuracy rate is 82.99 %, while the Naïve Bayes and C.45 are 80.04 % and 82.74 % respectively, (3) the result of Bagging classification tree method has a large number of nodes, so it is quite difficult in decision making, (4) classification of non-active Indonesia Open University student characteristics uses algorithms C.45, (5) based on the algorithm C.45, there are 5 interesting rules which can describe the characteristics of non-active Indonesia Open University students.Keywords: comparative analysis, data mining, clasiffication, Bagging, Naïve Bayes, C.45, non-active students, Indonesia Open University
Procedia PDF Downloads 315501 Fuzzy Logic Modeling of Evaluation the Urban Skylines by the Entropy Approach
Authors: Murat Oral, Seda Bostancı, Sadık Ata, Kevser Dincer
Abstract:
When evaluating the aesthetics of cities, an analysis of the urban form development depending on design properties with a variety of factors is performed together with a study of the effects of this appearance on human beings. Different methods are used while making an aesthetical evaluation related to a city. Entropy, in its preliminary meaning, is the mathematical representation of thermodynamic results. Measuring the entropy is related to the distribution of positional figures of a message or information from the probabilities standpoint. In this study, analysis of evaluation the urban skylines by the entropy approach was modelled with Rule-Based Mamdani-Type Fuzzy (RBMTF) modelling technique. Input-output parameters were described by RBMTF if-then rules. Numerical parameters of input and output variables were fuzzificated as linguistic variables: Very Very Low (L1), Very Low (L2), Low (L3), Negative Medium (L4), Medium (L5), Positive Medium (L6), High (L7), Very High (L8) and Very Very High (L9) linguistic classes. The comparison between application data and RBMTF is done by using absolute fraction of variance (R2). The actual values and RBMTF results indicated that RBMTF can be successfully used for the analysis of evaluation the urban skylines by the entropy approach. As a result, RBMTF model has shown satisfying relation with experimental results, which suggests an alternative method to evaluation of the urban skylines by the entropy approach.Keywords: urban skylines, entropy, rule-based Mamdani type, fuzzy logic
Procedia PDF Downloads 290500 Antibacterial Evaluation, in Silico ADME and QSAR Studies of Some Benzimidazole Derivatives
Authors: Strahinja Kovačević, Lidija Jevrić, Miloš Kuzmanović, Sanja Podunavac-Kuzmanović
Abstract:
In this paper, various derivatives of benzimidazole have been evaluated against Gram-negative bacteria Escherichia coli. For all investigated compounds the minimum inhibitory concentration (MIC) was determined. Quantitative structure-activity relationships (QSAR) attempts to find consistent relationships between the variations in the values of molecular properties and the biological activity for a series of compounds so that these rules can be used to evaluate new chemical entities. The correlation between MIC and some absorption, distribution, metabolism and excretion (ADME) parameters was investigated, and the mathematical models for predicting the antibacterial activity of this class of compounds were developed. The quality of the multiple linear regression (MLR) models was validated by the leave-one-out (LOO) technique, as well as by the calculation of the statistical parameters for the developed models and the results are discussed on the basis of the statistical data. The results of this study indicate that ADME parameters have a significant effect on the antibacterial activity of this class of compounds. Principal component analysis (PCA) and agglomerative hierarchical clustering algorithms (HCA) confirmed that the investigated molecules can be classified into groups on the basis of the ADME parameters: Madin-Darby Canine Kidney cell permeability (MDCK), Plasma protein binding (PPB%), human intestinal absorption (HIA%) and human colon carcinoma cell permeability (Caco-2).Keywords: benzimidazoles, QSAR, ADME, in silico
Procedia PDF Downloads 375499 A Novel Approach to Design and Implement Context Aware Mobile Phone
Authors: G. S. Thyagaraju, U. P. Kulkarni
Abstract:
Context-aware computing refers to a general class of computing systems that can sense their physical environment, and adapt their behaviour accordingly. Context aware computing makes systems aware of situations of interest, enhances services to users, automates systems and personalizes applications. Context-aware services have been introduced into mobile devices, such as PDA and mobile phones. In this paper we are presenting a novel approaches used to realize the context aware mobile. The context aware mobile phone (CAMP) proposed in this paper senses the users situation automatically and provides user context required services. The proposed system is developed by using artificial intelligence techniques like Bayesian Network, fuzzy logic and rough sets theory based decision table. Bayesian Network to classify the incoming call (high priority call, low priority call and unknown calls), fuzzy linguistic variables and membership degrees to define the context situations, the decision table based rules for service recommendation. To exemplify and demonstrate the effectiveness of the proposed methods, the context aware mobile phone is tested for college campus scenario including different locations like library, class room, meeting room, administrative building and college canteen.Keywords: context aware mobile, fuzzy logic, decision table, Bayesian probability
Procedia PDF Downloads 365498 Barriers to Job Localization Policy in Private Sector: Case Study from Oman
Authors: Yahya Al Nahdi
Abstract:
Even though efforts to increase the participation of nationals in the workforce have been in place for more than a decade in the Sultanate of Oman, the results are not impressive. Citizens’ workforce participation – it is argued in the literature – is hindered by institutional, as well as attitudinal concerns. The purpose of this study was to determine barriers to Omanization (employment of Omani nationals) in the private sector as perceived by the senior managers in government and private sector. Data were collected predominantly through in-depth, semi-structured interviews with managers who directly deal with Omanization policies from both the public and private sector. Results from the data analysis have shown that the majority of participants acknowledged a work preference in the movement (public sector). The private sector employees' compensation and benefits package was perceived to be less attractive than that offered in the government (public sector). The negative perceptions (stereotypes) shared by expatriates regarding work attitudes and competencies of citizens in the local labour market was also overwhelmingly perceived as a major hindrance. Furthermore, institutional issues such as, ineffectiveness of rules and regulation regarding Omanization, inappropriate quota system and lack of public awareness towards private sector’s jobs, are also perceived problematic to successful Omanization. Finally, results from the data analysis were used in recommending strategies for potential consideration in the pursuit of a successful Omanization programme.Keywords: localization, job security, labour force structure, Omanization, private sector, public sector
Procedia PDF Downloads 397497 Consortium Blockchain-based Model for Data Management Applications in the Healthcare Sector
Authors: Teo Hao Jing, Shane Ho Ken Wae, Lee Jin Yu, Burra Venkata Durga Kumar
Abstract:
Current distributed healthcare systems face the challenge of interoperability of health data. Storing electronic health records (EHR) in local databases causes them to be fragmented. This problem is aggravated as patients visit multiple healthcare providers in their lifetime. Existing solutions are unable to solve this issue and have caused burdens to healthcare specialists and patients alike. Blockchain technology was found to be able to increase the interoperability of health data by implementing digital access rules, enabling uniformed patient identity, and providing data aggregation. Consortium blockchain was found to have high read throughputs, is more trustworthy, more secure against external disruptions and accommodates transactions without fees. Therefore, this paper proposes a blockchain-based model for data management applications. In this model, a consortium blockchain is implemented by using a delegated proof of stake (DPoS) as its consensus mechanism. This blockchain allows collaboration between users from different organizations such as hospitals and medical bureaus. Patients serve as the owner of their information, where users from other parties require authorization from the patient to view their information. Hospitals upload the hash value of patients’ generated data to the blockchain, whereas the encrypted information is stored in a distributed cloud storage.Keywords: blockchain technology, data management applications, healthcare, interoperability, delegated proof of stake
Procedia PDF Downloads 138496 Energy Service Companies as a Facilitator for Implementation of Energy-Environment Conventions
Authors: Bahareh Arghand
Abstract:
The establishment of rules and regulations for more effective energy-environment interactions are essential to achieving sustainable development. Sustainable development requires mechanisms that can promote compliance in energy-environment conventions. There are many binding agreements and non-binding instruments at regional and international levels on energy and the environment. These conventions try to decrease conflicts of interest between energy, environment and economic by legal principles and practical mechanisms. The major core of conventions is their implementations because the poor implementation and enforcement power affect their success. In this regard, the main goal of this study is proposing the effective implementation mechanisms. Energy service companies' (ESCOs) activities can improve energy efficiency and decrease the environmental degradations. Therefore, it can be proposed and assessed the merit mechanism of ESCO performance as a facilitator to implement energy-environment conventions. An assessment of ESCO performance, including its potentials, problems, and limitations, as a facilitator for effective implementation of the energy-environment convention, is included. This study is oriented towards effective development and application of laws and the function of ESCOs as appropriate economic instruments and facilitator for implementation of energy-environment conventions. The resulting system of close cooperation between the energy-environment conventions and ESCOs is geared toward advancing environmental protection and economic factors by the transfer of environmentally-sound technologies that meet sustainable development objectives.Keywords: energy-environment conventions, energy service company, facilitator mechanism, sustainable development
Procedia PDF Downloads 182495 Re-Imagining and De-Constructing the Global Security Architecture
Authors: Smita Singh
Abstract:
The paper develops a critical framework to the hegemonic discourses resorted to by the dominant powers in the global security architecture. Within this framework, security is viewed as a discourse through which identities and threats are represented and produced to legitimize the security concerns of few at the cost of others. International security have long been driven and dominated by power relations. Since the end of the Cold War, the global transformations have triggered contestations to the idea of security at both theoretical and practical level. These widening and deepening of the concept of security have challenged the existing power hierarchies at the theoretical level but not altered the substance and actors defining it. When discourses are introduced into security studies, several critical questions erupt: how has power shaped security policies of the globe through language? How does one understand the meanings and impact of those discourses? Who decides the agenda, rules, players and outliers of the security? Language as a symbolic system and form of power is fluid and not fixed. Over the years the dominant Western powers, led by the United States of America have employed various discursive practices such as humanitarian intervention, responsibility to protect, non proliferation, human rights, war on terror and so on to reorient the constitution of identities and interests and hence the policies that need to be adopted for its actualization. These power relations are illustrated in this paper through the narratives used in the nonproliferation regime. The hierarchical security dynamics is a manifestation of the global power relations driven by many factors including discourses.Keywords: hegemonic discourse, global security, non-proliferation regime, power politics
Procedia PDF Downloads 318494 Maximisation of Consumer Welfare in the Enforcement of Intellectual Property Rights in Competition Guidelines: The Malaysian Experience
Authors: Ida Madieha Abdul Ghani Azmi, Heng Gee Lim, Adlan Abdul Razak, Nasaruddin Abdul Rahman
Abstract:
The objective of competition law is to maximise consumer welfare through the regulation of anti-competitive behaviour that results in the distortion of the market. Intellectual property law also seeks to enhance consumer welfare in the long run by encouraging the development of useful devices and processes. Nevertheless, in some circumstances, the IP owners behave in such a way that makes it difficult for rival companies to sell substitute products and technology in the market. Intellectual property owners may also reach a dominant position in the market such that they are able to dictate unfair terms and conditions on other market players. Among the two major categories of anti-competitive behavior is the use of horizontal and vertical agreement to constrain effective competition and abuse of dominant position. As a result, many countries have regulated the conduct of the IP owners that are considered as anti-competitive including the US, Canada, and Singapore. This paper visits the proposed IP Guidelines recently drafted by the Malaysian Competition Commission and investigates to what extent it resolves most of the anti-competitive behavior of the IP owners. The paper concludes by suggesting some of the rules that could be prescribed by the Competition Commission in order to maintain the relevancy of competition law as the main check against the abuse of rights by the intellectual property owners.Keywords: abuse of dominant position, consumer welfare, intellectual property rights, vertical and horizontal agreements
Procedia PDF Downloads 220493 Perceptions of Higher Education Online Learning Faculty in Lebanon
Authors: Noha Hamie Haidar
Abstract:
The purpose of this case study was to explore faculty attitudes toward online learning in a Lebanese Higher Education Institution (HEI). The research problem addressed the disinterest among faculty at the Arts, Sciences, and Technology University of Lebanon (AUL) in enhancing learning using online technology. The research questions for the study examined the attitudes of the faculty toward applying online learning and the extent of the faculty readiness to adopt this technological change. A qualitative case study design was used that employed multiple sources of information including semi-structured interviews and existing literature. The target population was AUL faculty including full-time instructors and administration (n=25). Data analysis was guided by the lens of Kanter’s theoretical approach, which focused on faculty’s awareness, desire, knowledge, ability, and reinforcement model (ADKAR) for adopting change. Key findings indicated negative impressions concerning online learning such as authority (ministry of education, culture, and rules); and change (increased enrollment and different teaching styles). Yet, within AUL’s academic environment, the opportunity for the adoption of online learning was identified; faculty showed positive elements, such as the competitive advantage to first enter the Lebanese Market, and higher student enrollment. These results may encourage AUL’s faculty to adopt online learning and to achieve a positive social change by expanding the ability of students in HEIs to compete globally.Keywords: faculty, higher education, technology, online learning
Procedia PDF Downloads 406492 A Combined Approach Based on Artificial Intelligence and Computer Vision for Qualitative Grading of Rice Grains
Authors: Hemad Zareiforoush, Saeed Minaei, Ahmad Banakar, Mohammad Reza Alizadeh
Abstract:
The quality inspection of rice (Oryza sativa L.) during its various processing stages is very important. In this research, an artificial intelligence-based model coupled with computer vision techniques was developed as a decision support system for qualitative grading of rice grains. For conducting the experiments, first, 25 samples of rice grains with different levels of percentage of broken kernels (PBK) and degree of milling (DOM) were prepared and their qualitative grade was assessed by experienced experts. Then, the quality parameters of the same samples examined by experts were determined using a machine vision system. A grading model was developed based on fuzzy logic theory in MATLAB software for making a relationship between the qualitative characteristics of the product and its quality. Totally, 25 rules were used for qualitative grading based on AND operator and Mamdani inference system. The fuzzy inference system was consisted of two input linguistic variables namely, DOM and PBK, which were obtained by the machine vision system, and one output variable (quality of the product). The model output was finally defuzzified using Center of Maximum (COM) method. In order to evaluate the developed model, the output of the fuzzy system was compared with experts’ assessments. It was revealed that the developed model can estimate the qualitative grade of the product with an accuracy of 95.74%.Keywords: machine vision, fuzzy logic, rice, quality
Procedia PDF Downloads 419491 Deconstruction of Gender Stereotypes through Fashion
Authors: Nihan Akdemir
Abstract:
This research aims to investigate the role of fashion in the context of the deconstruction of gender stereotypes. Expectation of society and culture related to the biological structure of the individual corresponds to the gender. At this point there are some unseen rules which are given to person even from his/her childhoods according to the sex and gender, are called stereotypes. With basic example, girls should wear pink, and the boys should wear blue. Or boys do not wear skirt and the woman must behave like a woman. There are also many many stereotypes like them. But the clothing style the individual uses to express his or her gender identity may not match the expectations of the community and society. In the context of big role of the clothing, these stereotypes could be deconstructed because clothes are the visible expression of gender identity of the person. And fashion is a big part of this structure because fashion is a pioneer of what people wear in other words fashion tells to people what should they wear this season. Nowadays fashion has also meant about expressing identity independent of whether you were born male or female. Many fashion brands prepare their collections in the concept of ‘gender fluid’ by deconstructions. It means that fashion is opening the roads for being more free about the gender identity. The representations of gender fluidity through fashion help bring a sense of normality to people who are trying to find the self-confidence to express who they want to be. Maybe the voice of the streets carries this point to the catwalks firstly, and then it becomes a trend. All these items have been explained with visual images and supported by the literature investigations. And the results are showed that the numbers of collections about it are increasing and fashion sector takes this issue into consideration. And this new approach reached to the streets.Keywords: fashion, gender identity, gender stereotypes, trend
Procedia PDF Downloads 473490 Thermal-Mechanical Analysis of a Bridge Deck to Determine Residual Weld Stresses
Authors: Evy Van Puymbroeck, Wim Nagy, Ken Schotte, Heng Fang, Hans De Backer
Abstract:
The knowledge of residual stresses for welded bridge components is essential to determine the effect of the residual stresses on the fatigue life behavior. The residual stresses of an orthotropic bridge deck are determined by simulating the welding process with finite element modelling. The stiffener is placed on top of the deck plate before welding. A chained thermal-mechanical analysis is set up to determine the distribution of residual stresses for the bridge deck. First, a thermal analysis is used to determine the temperatures of the orthotropic deck for different time steps during the welding process. Twin wire submerged arc welding is used to construct the orthotropic plate. A double ellipsoidal volume heat source model is used to describe the heat flow through a material for a moving heat source. The heat input is used to determine the heat flux which is applied as a thermal load during the thermal analysis. The heat flux for each element is calculated for different time steps to simulate the passage of the welding torch with the considered welding speed. This results in a time dependent heat flux that is applied as a thermal loading. Thermal material behavior is specified by assigning the properties of the material in function of the high temperatures during welding. Isotropic hardening behavior is included in the model. The thermal analysis simulates the heat introduced in the two plates of the orthotropic deck and calculates the temperatures during the welding process. After the calculation of the temperatures introduced during the welding process in the thermal analysis, a subsequent mechanical analysis is performed. For the boundary conditions of the mechanical analysis, the actual welding conditions are considered. Before welding, the stiffener is connected to the deck plate by using tack welds. These tack welds are implemented in the model. The deck plate is allowed to expand freely in an upwards direction while it rests on a firm and flat surface. This behavior is modelled by using grounded springs. Furthermore, symmetry points and lines are used to prevent the model to move freely in other directions. In the thermal analysis, a mechanical material model is used. The calculated temperatures during the thermal analysis are introduced during the mechanical analysis as a time dependent load. The connection of the elements of the two plates in the fusion zone is realized with a glued connection which is activated when the welding temperature is reached. The mechanical analysis results in a distribution of the residual stresses. The distribution of the residual stresses of the orthotropic bridge deck is compared with results from literature. Literature proposes uniform tensile yield stresses in the weld while the finite element modelling showed tensile yield stresses at a short distance from the weld root or the weld toe. The chained thermal-mechanical analysis results in a distribution of residual weld stresses for an orthotropic bridge deck. In future research, the effect of these residual stresses on the fatigue life behavior of welded bridge components can be studied.Keywords: finite element modelling, residual stresses, thermal-mechanical analysis, welding simulation
Procedia PDF Downloads 171489 Intention Mediating Goal and Attitude Relationship with Academic Dishonesty among Undergraduate University Students, Ghana
Authors: Yayra Dzakadzie
Abstract:
The descriptive cross-sectional survey study assessed dishonest academic intention, mediating academic goals, and attitude relationship with academic dishonesty among university undergraduate students in Ghana. The target population for this study was all the final-year undergraduate students enrolled full-time in Ghanaian public universities. One thousand two hundred (1,200) undergraduate students participated in the study. Multistage sampling was used to select the sample for the study. A structured questionnaire was used to collect the needed data to test hypotheses. Structural Equation Modelling (PLS-SEM) was used for the analyses. The results revealed that academic goals and attitudes had direct and indirect effects on academic dishonesty behaviour. Also, academic intention was statistically a significant mediator in the relationship that academic goals and attitude have with academic dishonesty. It was concluded that when academic goals are high, it compels individual students to try new strategies, and when academic goals are low, the students would like to “cut corners” to meet expectations. It was also concluded that when the attitude towards academic dishonesty is low, students are more unlikely to form an intention to be academically dishonest. It is recommended that lecturers should make their students aware of the goals that need to be attained in their courses and provide them with feedback on goal progress. Students should set their proximal goals and enhance their commitment so that they avoid putting things off. Enforcement of rules and regulations against academic dishonesty must be fully adhered to since students’ positive attitudes can result in high intention, which would lead to academic dishonesty behaviour.Keywords: intention, academic goals, attitude, academic dishonesty, public university
Procedia PDF Downloads 99488 Learner's Difficulties Acquiring English: The Case of Native Speakers of Rio de La Plata Spanish Towards Justifying the Need for Corpora
Authors: Maria Zinnia Bardas Hoffmann
Abstract:
Contrastive Analysis (CA) is the systematic comparison between two languages. It stems from the notion that errors are caused by interference of the L1 system in the acquisition process of an L2. CA represents a useful tool to understand the nature of learning and acquisition. Also, this particular method promises a path to un-derstand the nature of underlying cognitive processes, even when other factors such as intrinsic motivation and teaching strategies were found to best explain student’s problems in acquisition. CA study is justified not only from the need to get a deeper understanding of the nature of SLA, but as an invaluable source to provide clues, at a cognitive level, for those general processes involved in rule formation and abstract thought. It is relevant for cross disciplinary studies and the fields of Computational Thought, Natural Language processing, Applied Linguistics, Cognitive Linguistics and Math Theory. That being said, this paper intends to address here as well its own set of constraints and limitations. Finally, this paper: (a) aims at identifying some of the difficulties students may find in their learning process due to the nature of their specific variety of L1, Rio de la Plata Spanish (RPS), (b) represents an attempt to discuss the necessity for specific models to approach CA.Keywords: second language acquisition, applied linguistics, contrastive analysis, applied contrastive analysis English language department, meta-linguistic rules, cross-linguistics studies, computational thought, natural language processing
Procedia PDF Downloads 150487 Evolution of Minangkabau ‘Induk’ House and its influence on the Architecture
Authors: Noor Hayati Binti Ismail, Mastor Bin Surat, Raja Nafida Binti Raja Shahminan, Shahrul Kamil Bin Yunus
Abstract:
This study is to look the changes, development and evolution taking place in the Minangkabau house. Minangkabau traditional house is a part of the assets of Indonesia's culture and history. In addition to custom house, traditional Minangkabau building also serves as a place to live within the context of human habitats but has slowly through the changes. Luhak Nan Tigo of Luhak Tanah Datar, Agam And Luhak 50 Kota are holding the Minangkabau. ‘Induk’ house is the sole home, Main house or an older home for a gathering place doing activities together. The 'Genius Loci' refers to the unique aspects of the history, the value of a place, culturally and socially. Main house has the aspect of Minangkabau is a house occupied by custom rules that practice matrilineal kinship system and tendency to move out from the community. The study involves several villages and traditional houses at Padang, Bukit Tinggi, Kampar Kiri in Indonesia and Rembau, kuala Pilah, tampin in Negeri Sembilan has been selected to serve as a research field. These factors were the occurrence of evolution Minangkabau house from the ‘induk’, kampar and Negeri Sembilan. In this regard, the identity and uniqueness of the house increasingly difficult to sustain as well as lack of clarity can be understood by the people of the present generation.Keywords: evolution, Genius loci, ‘Induk’ house, matrilineal kinship
Procedia PDF Downloads 476486 AniMoveMineR: Animal Behavior Exploratory Analysis Using Association Rules Mining
Authors: Suelane Garcia Fontes, Silvio Luiz Stanzani, Pedro L. Pizzigatti Corrła Ronaldo G. Morato
Abstract:
Environmental changes and major natural disasters are most prevalent in the world due to the damage that humanity has caused to nature and these damages directly affect the lives of animals. Thus, the study of animal behavior and their interactions with the environment can provide knowledge that guides researchers and public agencies in preservation and conservation actions. Exploratory analysis of animal movement can determine the patterns of animal behavior and with technological advances the ability of animals to be tracked and, consequently, behavioral studies have been expanded. There is a lot of research on animal movement and behavior, but we note that a proposal that combines resources and allows for exploratory analysis of animal movement and provide statistical measures on individual animal behavior and its interaction with the environment is missing. The contribution of this paper is to present the framework AniMoveMineR, a unified solution that aggregates trajectory analysis and data mining techniques to explore animal movement data and provide a first step in responding questions about the animal individual behavior and their interactions with other animals over time and space. We evaluated the framework through the use of monitored jaguar data in the city of Miranda Pantanal, Brazil, in order to verify if the use of AniMoveMineR allows to identify the interaction level between these jaguars. The results were positive and provided indications about the individual behavior of jaguars and about which jaguars have the highest or lowest correlation.Keywords: data mining, data science, trajectory, animal behavior
Procedia PDF Downloads 144485 The Interoperability between CNC Machine Tools and Robot Handling Systems Based on an Object-Oriented Framework
Authors: Pouyan Jahanbin, Mahmoud Houshmand, Omid Fatahi Valilai
Abstract:
A flexible manufacturing system (FMS) is a manufacturing system having the capability of handling the variations of products features that is the result of ever-changing customer demands. The flexibility of the manufacturing systems help to utilize the resources in a more effective manner. However, the control of such systems would be complicated and challenging. FMS needs CNC machines and robots and other resources for establishing the flexibility and enhancing the efficiency of the whole system. Also it needs to integrate the resources to reach required efficiency and flexibility. In order to reach this goal, an integrator framework is proposed in which the machining data of CNC machine tools is received through a STEP-NC file. The interoperability of the system is achieved by the information system. This paper proposes an information system that its data model is designed based on object oriented approach and is implemented through a knowledge-based system. The framework is connected to a database which is filled with robot’s control commands. The framework programs the robots by rules embedded in its knowledge based system. It also controls the interactions of CNC machine tools for loading and unloading actions by robot. As a result, the proposed framework improves the integration of manufacturing resources in Flexible Manufacturing Systems.Keywords: CNC machine tools, industrial robots, knowledge-based systems, manufacturing recourses integration, flexible manufacturing system (FMS), object-oriented data model
Procedia PDF Downloads 455484 African Traders Beyond China: Delving Into Their Entrepreneurial Activities Following COVID-19
Authors: Phillip Thebe
Abstract:
African traders in China have generated magnanimous attention from scholars because of their choices to take short-term trips to Guangzhou and other places in search of cheaper products taking advantage of the status of China as a "global manufacturing hub". Nevertheless, their activities only gained traction at the turn of the millennium, with their presence in China incrementally dwindling over the next two decades. Now, with the devastating effects of COVID-19, their journeys have had to be totally cut short by unending lockdowns and stiff migration rules due to China's zero-tolerance of COVID-19 policy. This unfortunate yet untimely occurrence has left many scholars wondering if this marks the end of African traders in China and, indeed, the end of their business careers. Between March and September 2022, 20 traders were followed back to Africa, Zimbabwe, to find out what they are doing after having been shut out of China. Data was collected through ethnographic immersion and purposive in-depth interviewing in and around the city of Bulawayo. Snowballing was employed to reach out to the traders until a saturation point was reached and interview transcripts were filed for analysis. The findings revealed that some still trading online in China, report different opinions and feelings about doing business during COVID-19. Others have left the Chinese marketplace, now pursuing European industries in Turkey and other places. Others are still getting Chinese goods but in African countries such as Tanzania, Mozambique, South Africa, and Botswana. Some are now into the second-hand clothing trade, whereas others have stopped doing business to pursue other life-course interests. These and other issues are addressed in this paper from the anthropology of migration and globalization perspectives.Keywords: entrepreneurship, African traders, China, COVID-19, Africans in China
Procedia PDF Downloads 93483 A Comparative Analysis of Evacuation Behavior in Case of Cyclone Sidr, Typhoon Yolanda and the Great East Japan Earthquake
Authors: Swarnali Chakma, Akihiko Hokugo
Abstract:
Research on three case studies reviewed here explains many aspects and complications of evacuation behavior during an emergency period. The scenario and phenomenon of the disaster were different, but the similarities are that after receiving the warning peoples does not take it seriously. Many individuals evacuated after taking some kind of action, for example; return to home, searching for family members, prepared valuable things etc. Based on a review of the literature, the data identified a number of factors that help explain evacuation behavior during the disaster. In the case of Japan, cultural inhibitors impact people’s behavior; for example, following the traffic rules, some people lost their time to skip because of the slow-moving car makes overcrowded traffic and some of them were washed away by the tsunami. In terms of Bangladeshi culture, women did not want to evacuate without men because staying men and women who do not know each other under the same roof together is not regular practice or comfortable. From these three case studies, it is observed that early warning plays an important role in cyclones, typhoons and earthquakes. A high level of trust from residents in the warning system is important to real evacuation. It is necessary to raise awareness of disaster and provide information on the vulnerability to cyclones, typhoons and earthquakes hazards at community levels. The local level may help decision makers and other stakeholders to make a better decision regarding an effective disaster management.Keywords: disaster management, emergency period, evacuation, shelter, typhoon
Procedia PDF Downloads 157482 Analysis of Legal System of Land Use in Archaeological Sites
Authors: Yen-Sheng Ho
Abstract:
It is important to actively adjust the legal system of land use in archaeological sites and the reward system to meet the needs of modern society and to solve the dilemma of government management. Under the principle of administration according to law and the principle of the clarity of law, human rights, legal orders and legitimate expectation shall be regulated. The Cultural Heritage Preservation Act has many norms related to archaeological sites in Taiwan. However, in practice, the preservation of archaeological sites still encounters many challenges. For instance, some archaeological sites have ‘management and maintenance plans’. The restrictions of land uses are not clearly defined making it difficult to determine how planting types and cultivation methods will impact the underground relics. In addition, there are questions as follows. How to coordinate the ‘site preservation plan’ with the Regional Planning Act and the Urban Planning Act? How to define preservation of land, preservation area and other uses of land or area? How to define land use in practice? How to control land use? After selecting three sites for the case investigation, this study will analyze the site’s land use status and propose the direction of land use and control methods. This study suggests that the prerequisite to limit the use of land is to determine the public interest in the preservation of the site. Another prerequisite is to establish a mechanism for permitting the use of the site and for setting the site preservation and zoning maintenance practices according to the Regional Planning Act, Urban Planning Act and other relevant rules, such as, land use zoning, land use control, land management, land maintenance, regional development and management and etc.Keywords: archaeological site, land use and site preservation plan, regional planning, urban planning
Procedia PDF Downloads 274481 Striking a Balance between Certainty and Flexibility: The Role of Ubuntu in South African Contract Law
Authors: Yeukai Mupangavanhu
Abstract:
The paper examines the concept of ubuntu and the extent to which it can play a role in ensuring fairness and justice in contractual relationships. Courts are expected to balance sanctity of contract and fairness. Public policy is currently a mechanism which is used by courts when balancing the above two competing interests. It, however, generally favours the freedom and sanctity of contract. The question which is addressed in this paper is whether the concept of ubuntu is an alternative mechanism that may be used to mitigate the sometimes harsh and unfair consequences of the doctrine of freedom and sanctity of contract. A comparative study and case analysis is the methodology that is used in this article. Unfairness in contracts is generally related to the problem of inequality in bargaining power underscored by deeply entrenched social and economic inequalities that are a consequence of apartheid and patriarchy. The transformative nature of the constitution demands the inclusion of African legal ideas and values in the legal order. There is a need for the harmonisation of western ideals which are based on the classical model of law of contract with relevant African principles. In order to attain a transformative legal order that promotes a societal transformation and enhances the lives of everyone courts cannot continue to frown upon African values. Ubuntu has the potential of steering the law of contract in a more equitable direction. The substantive rules of contract law undoubtedly need to be infused with the notion of ubuntu. The reconciliation of Western and African values is at the heart of legal transformation.Keywords: fairness, sanctity of contract, contractual justice, transformative constitutionalism
Procedia PDF Downloads 253480 Functions of Public Policy in Private International Law
Authors: Fedorova Elena
Abstract:
In this article, we draw a distinction between two important functions of public policy in private international law. The first function is widely recognized and relates to the prevention of application of foreign laws and enforcement of foreign court judgments whenever their effects are incompatible with the domestic legal system of the forum. This effectively protects sovereign rights of the forum state as it allows to resist against the undesirable effects of foreign law-making and law-enforcement policies. The second function is less obvious, but not less important. As the internal private legal relationships, international private relationships are usually governed by rules of public policy, to which the parties can not derogate by mutual agreement. Thefore, for international private law relations public policy has a different function than previously mentioned: in this case, the public policy acts as a defense against unacceptable effects of the party autonomy. Thus, this second function of public policy consists in the limitation of the party autonomy wich effects would be unacceptable for the local legal system. In the frame of this second function the author will analyse two types of public policy which can limit the party autonomy: « substantial » public policy (which regulates the substance of international legal relationship) and « conflictual » public policy (which regulates the party autonomy to choose the law applicable for the substance of relationship). The author provides an analysis of these functions of the public policy in the field of international contract law because of the important role of the principle of party autonomy for international contract relations.Keywords: public policy, general theory of private international law, substantial public policy, conflictual public policy
Procedia PDF Downloads 573479 The Implementation of Anti-Circumvention Legislations in Thai Copyright System
Authors: Chuencheewin Yimfuang
Abstract:
The WIPO copyright treaty (WCT) was established by the World Intellectual Property Organisation (WIPO). This agreement required the contracting nations to provide adequate protection to technological measures to prevent massive copyright infringement in the internet system. Thailand had to implement the anti-circumvention rules into domestic legislation to comply with this international obligation. The purpose of this paper is to critically discuss the legislative standard under the WCT. It also aims to examine the legal development of technological protection measures in Thailand and demonstrate that the scope of prohibitions under the copyright Act 2022 (NO.5) is similar to the Digital Millennium Copyright Act 1998 (DMCA) of the United States (US). It could be found that the anti-circumvention laws of Thailand prohibit the circumvention of access-control technologies, and the regulation on trafficking circumvention devices has been added to the latest version of the Thai Copyright Act. These legislative evolutions have revealed the attempt to reinforce the legal protection of technological measures and copyright holders in order to be in line with global practices. However, the amendment has problems concerning the legal definitions of effective technological measure and the prohibited act of circumvention. The vagueness might affect the scope of protection and the boundary of prohibition. With this aspect, the DMCA will be evaluated and compared to gain guidelines for interpretation and enforcement in Thailand. The lessons and experiences learned from this study might be useful to correct the flaws or at least clarify the ambiguities embodied in Thai copyright legislation.Keywords: legal development, technological protection measure, circumvention, Thailand
Procedia PDF Downloads 87478 The Effect of Technology on Human Rights Rules
Authors: Adel Fathy Sadek Abdalla
Abstract:
The issue of respect for human rights in Southeast Asia has become a major concern and is attracting the attention of the international community. Basically, the Association of Southeast Asian Nations (ASEAN) made human rights one of its main issues and in the ASEAN Charter in 2008. Subsequently, the Intergovernmental Commission on Human Rights ASEAN Human Rights (AICHR) was established. AICHR is the Southeast Asia Human Rights Enforcement Commission charged with the responsibilities, functions and powers to promote and protect human rights. However, at the end of 2016, the protective function assigned to the AICHR was not yet fulfilled. This is shown by several cases of human rights violations that are still ongoing and have not yet been solved. One case that has recently come to light is human rights violations against the Rohingya people in Myanmar. Using a legal-normative approach, the study examines the urgency of establishing a human rights tribunal in Southeast Asia capable of making a decision binding on ASEAN members or guilty parties. Data shows ASEAN needs regional courts to deal with human rights abuses in the ASEAN region. In addition, the study also highlights three important factors that ASEAN should consider when establishing a human rights tribunal, namely: Volume. a significant difference in terms of democracy and human rights development among the members, a consistent implementation of the principle of non-interference and the financial issue of the continuation of the court.Keywords: sustainable development, human rights, the right to development, the human rights-based approach to development, environmental rights, economic development, social sustainability human rights protection, human rights violations, workers’ rights, justice, security.
Procedia PDF Downloads 40477 Rational Bureaucracy and E-Government: A Philosophical Study of Universality of E-Government
Authors: Akbar Jamali
Abstract:
Hegel is the first great political philosopher who specifically contemplates on bureaucracy. For Hegel bureaucracy is the function of the state. Since state, essentially is a rational organization, its function; namely, bureaucracy must be rational. Since, what is rational is universal; Hegel had to explain how the bureaucracy could be understood as universal. Hegel discusses bureaucracy in his treatment of ‘executive power’. He analyses modern bureaucracy as a form of political organization, its constituent members, and its relation to the social environment. Therefore, the essence of bureaucracy in Hegel’s philosophy is the implementation of law and rules. Hegel argues that unlike the other social classes that are particular because they look for their own private interest, bureaucracy as a class is a ‘universal’ because their orientation is the interest of the state. State for Hegel is essentially rational and universal. It is the actualization of ‘objective Spirit’. Marx criticizes Hegel’s argument on the universality of state and bureaucracy. For Marx state is equal to bureaucracy, it constitutes a social class that based on the interest of bourgeois class that dominates the society and exploits proletarian class. Therefore, the main disagreement between these political philosophers is: whether the state (bureaucracy) is universal or particular. Growing e-government in modern state as an important aspect of development leads us to contemplate on the particularity and universality of e-government. In this article, we will argue that e-government essentially is universal. E-government, in itself, is impartial; therefore, it cannot be particular. The development of e-government eliminates many side effects of the private, personal or particular interest of the individuals who work as bureaucracy. Finally, we will argue that more a state is developed more it is universal. Therefore, development of e-government makes the state a more universal and affects the modern philosophical debate on the particularity or universality of bureaucracy and state.Keywords: particularity, universality, rational bureaucracy, impartiality
Procedia PDF Downloads 249476 Understanding Europe’s Role in the Area of Liberty, Security, and Justice as an International Actor
Authors: Barrere Sarah
Abstract:
The area of liberty, security, and justice within the European Union is still a work in progress. No one can deny that the EU struggles between a monistic and a dualist approach. The aim of our essay is to first review how the European law is perceived by the rest of the international scene. It will then discuss two main mechanisms at play: the interpretation of larger international treaties and the penal mechanisms of European law. Finally, it will help us understand the role of a penal Europe on the international scene with concrete examples. Special attention will be paid to cases that deal with fundamental rights as they represent an interesting case study in Europe and in the rest of the World. It could illustrate the aforementioned duality currently present in the Union’s interpretation of international public law. On the other hand, it will explore some specific European penal mechanism through mutual recognition and the European arrest warrant in the transnational criminality frame. Concerning the interpretation of the treaties, it will first, underline the ambiguity and the general nature of some treaties that leave the EU exposed to tension and misunderstanding then it will review the validity of an EU act (whether or not it is compatible with the rules of International law). Finally, it will focus on the most complete manifestation of liberty, security and justice through the principle of mutual recognition. Used initially in commercial matters, it has become “the cornerstone” of European construction. It will see how it is applied in judicial decisions (its main event and achieving success is via the European arrest warrant) and how European member states have managed to develop this cooperation.Keywords: European penal law, international scene, liberty security and justice area, mutual recognition
Procedia PDF Downloads 407475 Design and Optimization of a Mini High Altitude Long Endurance (HALE) Multi-Role Unmanned Aerial Vehicle
Authors: Vishaal Subramanian, Annuatha Vinod Kumar, Santosh Kumar Budankayala, M. Senthil Kumar
Abstract:
This paper discusses the aerodynamic and structural design, simulation and optimization of a mini-High Altitude Long Endurance (HALE) UAV. The applications of this mini HALE UAV vary from aerial topological surveys, quick first aid supply, emergency medical blood transport, search and relief activates to border patrol, surveillance and estimation of forest fire progression. Although classified as a mini UAV according to UVS International, our design is an amalgamation of the features of ‘mini’ and ‘HALE’ categories, combining the light weight of the ‘mini’ and the high altitude ceiling and endurance of the HALE. Designed with the idea of implementation in India, it is in strict compliance with the UAS rules proposed by the office of the Director General of Civil Aviation. The plane can be completely automated or have partial override control and is equipped with an Infra-Red camera and a multi coloured camera with on-board storage or live telemetry, GPS system with Geo Fencing and fail safe measures. An additional of 1.5 kg payload can be attached to three major hard points on the aircraft and can comprise of delicate equipment or releasable payloads. The paper details the design, optimization process and the simulations performed using various software such as Design Foil, XFLR5, Solidworks and Ansys.Keywords: aircraft, endurance, HALE, high altitude, long range, UAV, unmanned aerial vehicle
Procedia PDF Downloads 397